Options for Integrating or developing a physical security solution (physical access control via in-house mobile apps [NFC/Bluetooh])

Our team is looking to either integrate or develop a physical security solution for a rather large campus.
Requirements:
Ability to either integrate (with reader/electronic lock hardware) from our mobile apps which would allow access contr… Continue reading Options for Integrating or developing a physical security solution (physical access control via in-house mobile apps [NFC/Bluetooh])

What is the best defense for a multi-layered attack: Spoofing, MiTM, Login CSRF?

How would one go about defending against this sort of attack to best protect a sloppy user? There can be obvious signs of a spoofing attack, such as not using SSL, slightly different domain, etc, but I am assuming Tristed.com (the maliciou… Continue reading What is the best defense for a multi-layered attack: Spoofing, MiTM, Login CSRF?