Social Engineering Blogs

An Aggregator for Blogs About Social Engineering and Related Fields

The Security Dialogue Blog February 24, 2014

Physical Security: An Ever Changing Mission by PublicResourceOrg

This video provides an overview of the evolution of physical security measures, due to increased criminal activity, and outlines pro-active strategies and physical security techniques used to augment the traditional reactive responses to crime.

Filed Under: Uncategorized

The Security Dialogue Blog February 24, 2014

Defcon 18 – Physical Security Your doing it wrong- A.P. Delchi – Part.mov by killab66661

Filed Under: Uncategorized

The Security Dialogue Blog February 24, 2014

DEFCON 14: An Analysis of Current and Emerging Threats to Physical Security by Christiaan008

Speakers: Marc Weber Tobias, Investigative Law Offices, Security.org Matt Fiddler, Security Consultant – Security.org Although there has been a significant amount of attention paid to the topic of late, there are complexities that must be understood to accurately gauge the impact of “Bumping Locks” on physical security. This talk will explore the vulnerabilities and exposures of virtually all pin-tumbler locks, highlighting the legal issues surrounding the possession and use of bump-keys and bumping implements. Case examples and demonstrations detailing a major security flaw and vulnerability in locks used by the federal government and a private sector corporation that affect millions of users will be presented. For more information visit: http://bit.ly/defcon14_information To download the video visit: http://bit.ly/defcon14_videos

Filed Under: Uncategorized

  • « Previous Page
  • 1
  • …
  • 59
  • 60
  • 61
  • 62
  • 63
  • …
  • 88
  • Next Page »

About

Welcome to an aggregator for blogs about social engineering and related fields. Feel free to take a look around, and make sure to visit the original sites.

If you would like to suggest a site or contact us, use the links below.

Contact

  • Contact
  • Suggest a Site
  • Remove a Site

© Copyright 2025 Social Engineering Blogs · All Rights Reserved ·