This story has been another unfortunate illustration of Bluetooth security vulnerabilities and lock vendors who may lack the expertise in cybersecurity to secure your property properly when using digital keys. In this case, the attack strategy used is known as a relay attack. How we prevent relay attacks Relay attacks are well known. The only […]
Most critical infrastructure environments contain some form of network and/or server cabinets. No matter where these cabinets may be — in IT/telecom closets, wall mounted above factory floors, in remote hallways and parkades, at remote shelters, or even in data centers — the consensus is clear: access control at the network or server cabinet is […]
In 2021, your mobile device is likely the hardest-working item you own. If you left your house with only your mobile device in your pocket, would that stop you from having a productive day? Need to check your bank balance? Use the banking app. Buying a latte? Your mobile wallet can take care of that. Have […]