{"id":16205,"date":"2025-08-09T01:20:48","date_gmt":"2025-08-09T01:20:48","guid":{"rendered":"https:\/\/topat10.com\/?p=16205"},"modified":"2025-08-09T01:20:48","modified_gmt":"2025-08-09T01:20:48","slug":"hackers-went-looking-for-a-backdoor-in-high-security-safes-and-now-can-open-them-in-seconds","status":"publish","type":"post","link":"https:\/\/topat10.com\/?p=16205","title":{"rendered":"Hackers Went Looking for a Backdoor in High-Security Safes\u2014and Now Can Open Them in Seconds"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p class=\"paywall\">Zhou added in his statement that Securam will be fixing the vulnerabilities Omo and Rowley found in future models of the ProLogic lock. \u201cCustomer security is our priority and we have begun the process of creating next-generation products to thwart these potential attacks,\u201d he writes. \u201cWe expect to have new locks on the market by the end of the year.\u201d<\/p>\n<div class=\"GenericCalloutWrapper-IJXIe iZKNRQ callout--has-top-border\" data-testid=\"GenericCallout\">\n<figure class=\"AssetEmbedWrapper-fkZDUs kHRAYC asset-embed\">\n<div class=\"AssetEmbedAssetContainer-eEeytc eRSvCP asset-embed__asset-container\"><span class=\"SpanWrapper-zEXFr hdztbW responsive-asset AssetEmbedResponsiveAsset-cIfZLr fHIkTW asset-embed__responsive-asset\"><picture class=\"ResponsiveImagePicture-cGZhnX jwYQWO AssetEmbedResponsiveAsset-cIfZLr fHIkTW asset-embed__responsive-asset responsive-image\"><noscript><img decoding=\"async\" alt=\"Hackers Went Looking for a Backdoor in HighSecurity Safes\u2014and Now Can Open Them in Seconds\" class=\"ResponsiveImageContainer-eNxvmU cfBbTk responsive-image__image lazyload\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-src=\"https:\/\/media.wired.com\/photos\/6896565819138764ed46535c\/master\/w_1600%2Cc_limit\/Hackers_RChurchill_006.jpg\" data-sizes=\"auto\" data-srcset=\"https:\/\/media.wired.com\/photos\/6896565819138764ed46535c\/master\/w_120,c_limit\/Hackers_RChurchill_006.jpg 120w, https:\/\/media.wired.com\/photos\/6896565819138764ed46535c\/master\/w_240,c_limit\/Hackers_RChurchill_006.jpg 240w, https:\/\/media.wired.com\/photos\/6896565819138764ed46535c\/master\/w_320,c_limit\/Hackers_RChurchill_006.jpg 320w, https:\/\/media.wired.com\/photos\/6896565819138764ed46535c\/master\/w_640,c_limit\/Hackers_RChurchill_006.jpg 640w, https:\/\/media.wired.com\/photos\/6896565819138764ed46535c\/master\/w_960,c_limit\/Hackers_RChurchill_006.jpg 960w, https:\/\/media.wired.com\/photos\/6896565819138764ed46535c\/master\/w_1280,c_limit\/Hackers_RChurchill_006.jpg 1280w, https:\/\/media.wired.com\/photos\/6896565819138764ed46535c\/master\/w_1600,c_limit\/Hackers_RChurchill_006.jpg 1600w\" sizes=\"100vw\"\/><\/noscript><\/picture><\/span><\/div>\n<p><span class=\"BaseWrap-sc-gzmcOU BaseText-eqOrNE CaptionCredit-eowWKH deqABF kpqIso kpuElq caption__credit\">Photograph: Ronda Churchill<\/span><\/p>\n<\/figure>\n<\/div>\n<p class=\"paywall\">In a followup call, Securam director of sales Jeremy Brookes confirmed that Securam has no plan to fix the vulnerability in locks already in use on customers\u2019 safes, but suggests safe owners who are concerned buy a new lock and replace the one on their safe. \u201cWe\u2019re not going to be offering a firmware package that upgrades it,\u201d Brookes says. \u201cWe\u2019re going to offer them a new product.\u201d<\/p>\n<p class=\"paywall\">Brookes adds that he believes Omo and Rowley are \u201csingling out\u201d Securam with the intention of \u201cdiscrediting\u201d the company.<\/p>\n<p class=\"paywall\">Omo responds that\u2019s not at all their intent. \u201cWe\u2019re trying to make the public aware of the vulnerabilities in one of the most popular safe locks on the market,\u201d he says.<\/p>\n<h2 class=\"paywall\">A Senator\u2019s Warning<\/h2>\n<p class=\"paywall\">Beyond Liberty Safe, Securam ProLogic locks are used by a wide variety of safe manufacturers including Fort Knox, High Noble, FireKing, Tracker, ProSteel, Rhino Metals, Sun Welding, Corporate Safe Specialists, and pharmacy safe companies Cennox and NarcSafe, according to Omo and Rowley\u2019s research. The locks can also be found on safes used by CVS for storing narcotics and by multiple US restaurant chains for storing cash.<\/p>\n<p class=\"paywall\">Rowley and Omo aren&#8217;t the first to raise concerns about the security of Securam locks. In March of last year, US senator Ron Wyden wrote an <a href=\"https:\/\/www.wyden.senate.gov\/news\/press-releases\/wyden-urges-ncsc-to-warn-public-about-backdoor-codes-to-commercial-locks-and-safes\">open letter<\/a> to Michael Casey, then director of the National Counterintelligence and Security Center, urging Casey to make clear to American businesses that safe locks made by Securam, which is owned by a Chinese parent company, have a manufacturer reset capability. That capability, Wyden wrote, could be used as a backdoor\u2014a risk that had already led to Securam locks being prohibited for US government use like all other locks with a manufacturer reset, even as they&#8217;re widely used by private US companies.<\/p>\n<p class=\"paywall\">In response to learning about Rowley and Omo\u2019s research, Wyden wrote in a statement to WIRED that the researchers\u2019 findings represent exactly the risk of a backdoor\u2014whether in safes or in encryption software\u2014that he\u2019s tried to call attention to.<\/p>\n<p class=\"paywall\">\u201cExperts have warned for years that backdoors will be exploited by our adversaries, yet instead of acting on my warnings and those of security experts, the government has left the American public vulnerable,\u201d Wyden writes. \u201cThis is exactly why Congress must reject calls for new backdoors in encryption technology and fight all efforts by other governments, <a data-offer-url=\"https:\/\/www.washingtonpost.com\/technology\/2025\/02\/07\/apple-encryption-backdoor-uk\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.washingtonpost.com\/technology\/2025\/02\/07\/apple-encryption-backdoor-uk\/&quot;}\" href=\"https:\/\/www.washingtonpost.com\/technology\/2025\/02\/07\/apple-encryption-backdoor-uk\/\" rel=\"nofollow noopener\" target=\"_blank\">such as the UK<\/a>, to force US companies to weaken their encryption to facilitate government surveillance.\u201d<\/p>\n<h2 class=\"paywall\">ResetHeist<\/h2>\n<p class=\"paywall\">Rowley and Omo\u2019s research began with that same concern, that a largely undisclosed unlocking method in safes might represent a broader security risk. They initially went searching for the mechanism behind the Liberty Safe backdoor that had caused a backlash against the company in 2023, and found a relatively straightforward answer: Liberty Safe keeps a reset code for every safe and, in some cases, makes it available to US law enforcement.<\/p>\n<p class=\"paywall\">Liberty Safe has since <a data-offer-url=\"https:\/\/www.libertysafe.com\/pages\/protecting-your-privacy?srsltid=AfmBOoqDvQTJmLYXWXhIraMN3DtvT_r21ywZMSlLqEaXgXjOfnKs4PTz\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.libertysafe.com\/pages\/protecting-your-privacy?srsltid=AfmBOoqDvQTJmLYXWXhIraMN3DtvT_r21ywZMSlLqEaXgXjOfnKs4PTz&quot;}\" href=\"https:\/\/www.libertysafe.com\/pages\/protecting-your-privacy?srsltid=AfmBOoqDvQTJmLYXWXhIraMN3DtvT_r21ywZMSlLqEaXgXjOfnKs4PTz\" rel=\"nofollow noopener\" target=\"_blank\">written on its website<\/a> that it now requires a subpoena, a court order, or other compulsory legal process to hand over that master code, and will also delete its copy of the code at a safe owner\u2019s request.<\/p>\n<div class=\"GenericCalloutWrapper-IJXIe gCTXMi callout--has-top-border\" data-testid=\"GenericCallout\">\n<figure class=\"AssetEmbedWrapper-fkZDUs kHRAYC asset-embed\">\n<div class=\"AssetEmbedAssetContainer-eEeytc eRSvCP asset-embed__asset-container\"><span class=\"SpanWrapper-zEXFr hdztbW responsive-asset AssetEmbedResponsiveAsset-cIfZLr fHIkTW asset-embed__responsive-asset\"><picture class=\"ResponsiveImagePicture-cGZhnX jwYQWO AssetEmbedResponsiveAsset-cIfZLr fHIkTW asset-embed__responsive-asset responsive-image\"><noscript><img decoding=\"async\" alt=\"Image may contain Mohamed El Shorbagy Purple Face Head Person Photography Portrait Accessories Glasses and Blouse\" class=\"ResponsiveImageContainer-eNxvmU cfBbTk responsive-image__image lazyload\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-src=\"https:\/\/media.wired.com\/photos\/68965728184196b8873ba655\/master\/w_1600%2Cc_limit\/Hackers_RChurchill_009.jpg\" data-sizes=\"auto\" data-srcset=\"https:\/\/media.wired.com\/photos\/68965728184196b8873ba655\/master\/w_120,c_limit\/Hackers_RChurchill_009.jpg 120w, https:\/\/media.wired.com\/photos\/68965728184196b8873ba655\/master\/w_240,c_limit\/Hackers_RChurchill_009.jpg 240w, https:\/\/media.wired.com\/photos\/68965728184196b8873ba655\/master\/w_320,c_limit\/Hackers_RChurchill_009.jpg 320w, https:\/\/media.wired.com\/photos\/68965728184196b8873ba655\/master\/w_640,c_limit\/Hackers_RChurchill_009.jpg 640w, https:\/\/media.wired.com\/photos\/68965728184196b8873ba655\/master\/w_960,c_limit\/Hackers_RChurchill_009.jpg 960w, https:\/\/media.wired.com\/photos\/68965728184196b8873ba655\/master\/w_1280,c_limit\/Hackers_RChurchill_009.jpg 1280w, https:\/\/media.wired.com\/photos\/68965728184196b8873ba655\/master\/w_1600,c_limit\/Hackers_RChurchill_009.jpg 1600w\" data-sizes=\"100vw\"\/><\/noscript><\/picture><\/span><\/div>\n<p><span class=\"BaseWrap-sc-gzmcOU BaseText-eqOrNE CaptionText-brNLzD deqABF imSbFE hMBSFK caption__text\">Rowley and Omo planned to reveal the existence of Securam\u2019s vulnerabilities more than a year ago, but held off until now due to the company\u2019s legal threats.<\/span><span class=\"BaseWrap-sc-gzmcOU BaseText-eqOrNE CaptionCredit-eowWKH deqABF kpqIso kpuElq caption__credit\">Photograph: Ronda Churchill<\/span><\/p>\n<\/figure>\n<\/div>\n<p class=\"paywall\">Rowley and Omo didn&#8217;t find any security flaw that would allow them to abuse that particular law-enforcement-friendly backdoor. When they started examining the Securam ProLogic lock, however, their research on the higher-end version of the two kinds of Securam lock used on Liberty Safe products revealed something more intriguing. The locks have a reset method documented in their manual, intended in theory for use by locksmiths helping safe owners who have forgotten their unlock code.<\/p>\n<p class=\"paywall\">Enter a \u201crecovery code\u201d into the lock\u2014set to \u201c999999\u201d by default\u2014and it uses that value, another number stored in the lock called an encryption code, and a third, random variable to compute a code that&#8217;s displayed on the screen. An authorized locksmith can then read that code to a Securam representative over the phone, who then uses that value and a secret algorithm to compute a reset code the locksmith can enter into the keypad to set a new unlock combination.<\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Zhou added in his statement that Securam will be fixing the vulnerabilities Omo and Rowley found in future models of the ProLogic lock. \u201cCustomer security is our priority and we have begun the process of creating next-generation products to thwart these potential attacks,\u201d he writes. \u201cWe expect to have new locks on the market by [&hellip;]<\/p>\n","protected":false},"author":290,"featured_media":16206,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[703],"tags":[2419,1603,2420,2431,921],"class_list":["post-16205","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology","tag-black-hat","tag-cybersecurity","tag-defcon","tag-hacking","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackers Went Looking for a Backdoor in High-Security Safes\u2014and Now Can Open Them in Seconds | Unlock Informed Choices with Us<\/title>\n<meta name=\"description\" content=\"Security researchers found two techniques to crack at least eight brands of electronic safes\u2014used to secure everything from guns to narcotics\u2014that are sold with Securam Prologic locks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/topat10.com\/?p=16205\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers Went Looking for a Backdoor in High-Security Safes\u2014and Now Can Open Them in Seconds | Unlock Informed Choices with Us\" \/>\n<meta property=\"og:description\" content=\"Security researchers found two techniques to crack at least eight brands of electronic safes\u2014used to secure everything from guns to narcotics\u2014that are sold with Securam Prologic locks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/topat10.com\/?p=16205\" \/>\n<meta property=\"og:site_name\" content=\"Unlock Informed Choices with Us\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-09T01:20:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/topat10.com\/wp-content\/uploads\/2025\/08\/Hackers_RChurchill_006.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1067\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Andy Greenberg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andy Greenberg\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/topat10.com\\\/?p=16205#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/topat10.com\\\/?p=16205\"},\"author\":{\"name\":\"Andy Greenberg\",\"@id\":\"https:\\\/\\\/topat10.com\\\/#\\\/schema\\\/person\\\/e1ebe163a56539016c5ce130d0470478\"},\"headline\":\"Hackers Went Looking for a Backdoor in High-Security Safes\u2014and Now Can Open Them in Seconds\",\"datePublished\":\"2025-08-09T01:20:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/topat10.com\\\/?p=16205\"},\"wordCount\":802,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/topat10.com\\\/?p=16205#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/topat10.com\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Hackers_RChurchill_006.jpg\",\"keywords\":[\"black hat\",\"cybersecurity\",\"defcon\",\"hacking\",\"security\"],\"articleSection\":[\"Technology\"],\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/topat10.com\\\/?p=16205#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/topat10.com\\\/?p=16205\",\"url\":\"https:\\\/\\\/topat10.com\\\/?p=16205\",\"name\":\"Hackers Went Looking for a Backdoor in High-Security Safes\u2014and Now Can Open Them in Seconds | Unlock Informed Choices with Us\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/topat10.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/topat10.com\\\/?p=16205#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/topat10.com\\\/?p=16205#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/topat10.com\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Hackers_RChurchill_006.jpg\",\"datePublished\":\"2025-08-09T01:20:48+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/topat10.com\\\/#\\\/schema\\\/person\\\/e1ebe163a56539016c5ce130d0470478\"},\"description\":\"Security researchers found two techniques to crack at least eight brands of electronic safes\u2014used to secure everything from guns to narcotics\u2014that are sold with Securam Prologic locks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/topat10.com\\\/?p=16205#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/topat10.com\\\/?p=16205\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\\\/\\\/topat10.com\\\/?p=16205#primaryimage\",\"url\":\"https:\\\/\\\/topat10.com\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Hackers_RChurchill_006.jpg\",\"contentUrl\":\"https:\\\/\\\/topat10.com\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Hackers_RChurchill_006.jpg\",\"width\":1600,\"height\":1067},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/topat10.com\\\/?p=16205#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/topat10.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers Went Looking for a Backdoor in High-Security Safes\u2014and Now Can Open Them in Seconds\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/topat10.com\\\/#website\",\"url\":\"https:\\\/\\\/topat10.com\\\/\",\"name\":\"Topat10.com\",\"description\":\"Your Trusted Source for Honest Reviews on the Best Online Services, Products, and Websites &ndash; Unlock Informed Choices with Us\",\"alternateName\":\"Topat10\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/topat10.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/topat10.com\\\/#\\\/schema\\\/person\\\/e1ebe163a56539016c5ce130d0470478\",\"name\":\"Andy Greenberg\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=mm&r=g\",\"caption\":\"Andy Greenberg\"},\"url\":\"https:\\\/\\\/topat10.com\\\/?author=290\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers Went Looking for a Backdoor in High-Security Safes\u2014and Now Can Open Them in Seconds | Unlock Informed Choices with Us","description":"Security researchers found two techniques to crack at least eight brands of electronic safes\u2014used to secure everything from guns to narcotics\u2014that are sold with Securam Prologic locks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/topat10.com\/?p=16205","og_locale":"en_US","og_type":"article","og_title":"Hackers Went Looking for a Backdoor in High-Security Safes\u2014and Now Can Open Them in Seconds | Unlock Informed Choices with Us","og_description":"Security researchers found two techniques to crack at least eight brands of electronic safes\u2014used to secure everything from guns to narcotics\u2014that are sold with Securam Prologic locks.","og_url":"https:\/\/topat10.com\/?p=16205","og_site_name":"Unlock Informed Choices with Us","article_published_time":"2025-08-09T01:20:48+00:00","og_image":[{"width":1600,"height":1067,"url":"https:\/\/topat10.com\/wp-content\/uploads\/2025\/08\/Hackers_RChurchill_006.jpg","type":"image\/jpeg"}],"author":"Andy Greenberg","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Andy Greenberg","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/topat10.com\/?p=16205#article","isPartOf":{"@id":"https:\/\/topat10.com\/?p=16205"},"author":{"name":"Andy Greenberg","@id":"https:\/\/topat10.com\/#\/schema\/person\/e1ebe163a56539016c5ce130d0470478"},"headline":"Hackers Went Looking for a Backdoor in High-Security Safes\u2014and Now Can Open Them in Seconds","datePublished":"2025-08-09T01:20:48+00:00","mainEntityOfPage":{"@id":"https:\/\/topat10.com\/?p=16205"},"wordCount":802,"commentCount":0,"image":{"@id":"https:\/\/topat10.com\/?p=16205#primaryimage"},"thumbnailUrl":"https:\/\/topat10.com\/wp-content\/uploads\/2025\/08\/Hackers_RChurchill_006.jpg","keywords":["black hat","cybersecurity","defcon","hacking","security"],"articleSection":["Technology"],"inLanguage":"en","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/topat10.com\/?p=16205#respond"]}]},{"@type":"WebPage","@id":"https:\/\/topat10.com\/?p=16205","url":"https:\/\/topat10.com\/?p=16205","name":"Hackers Went Looking for a Backdoor in High-Security Safes\u2014and Now Can Open Them in Seconds | Unlock Informed Choices with Us","isPartOf":{"@id":"https:\/\/topat10.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/topat10.com\/?p=16205#primaryimage"},"image":{"@id":"https:\/\/topat10.com\/?p=16205#primaryimage"},"thumbnailUrl":"https:\/\/topat10.com\/wp-content\/uploads\/2025\/08\/Hackers_RChurchill_006.jpg","datePublished":"2025-08-09T01:20:48+00:00","author":{"@id":"https:\/\/topat10.com\/#\/schema\/person\/e1ebe163a56539016c5ce130d0470478"},"description":"Security researchers found two techniques to crack at least eight brands of electronic safes\u2014used to secure everything from guns to narcotics\u2014that are sold with Securam Prologic locks.","breadcrumb":{"@id":"https:\/\/topat10.com\/?p=16205#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/topat10.com\/?p=16205"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/topat10.com\/?p=16205#primaryimage","url":"https:\/\/topat10.com\/wp-content\/uploads\/2025\/08\/Hackers_RChurchill_006.jpg","contentUrl":"https:\/\/topat10.com\/wp-content\/uploads\/2025\/08\/Hackers_RChurchill_006.jpg","width":1600,"height":1067},{"@type":"BreadcrumbList","@id":"https:\/\/topat10.com\/?p=16205#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/topat10.com\/"},{"@type":"ListItem","position":2,"name":"Hackers Went Looking for a Backdoor in High-Security Safes\u2014and Now Can Open Them in Seconds"}]},{"@type":"WebSite","@id":"https:\/\/topat10.com\/#website","url":"https:\/\/topat10.com\/","name":"Topat10.com","description":"Your Trusted Source for Honest Reviews on the Best Online Services, Products, and Websites &ndash; Unlock Informed Choices with Us","alternateName":"Topat10","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/topat10.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Person","@id":"https:\/\/topat10.com\/#\/schema\/person\/e1ebe163a56539016c5ce130d0470478","name":"Andy Greenberg","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","caption":"Andy Greenberg"},"url":"https:\/\/topat10.com\/?author=290"}]}},"jetpack_featured_media_url":"https:\/\/topat10.com\/wp-content\/uploads\/2025\/08\/Hackers_RChurchill_006.jpg","uagb_featured_image_src":{"full":["https:\/\/topat10.com\/wp-content\/uploads\/2025\/08\/Hackers_RChurchill_006.jpg",1600,1067,false],"thumbnail":["https:\/\/topat10.com\/wp-content\/uploads\/2025\/08\/Hackers_RChurchill_006-150x150.jpg",150,150,true],"medium":["https:\/\/topat10.com\/wp-content\/uploads\/2025\/08\/Hackers_RChurchill_006-300x200.jpg",300,200,true],"medium_large":["https:\/\/topat10.com\/wp-content\/uploads\/2025\/08\/Hackers_RChurchill_006-768x512.jpg",768,512,true],"large":["https:\/\/topat10.com\/wp-content\/uploads\/2025\/08\/Hackers_RChurchill_006-1024x683.jpg",1024,683,true],"1536x1536":["https:\/\/topat10.com\/wp-content\/uploads\/2025\/08\/Hackers_RChurchill_006-1536x1024.jpg",1536,1024,true],"2048x2048":["https:\/\/topat10.com\/wp-content\/uploads\/2025\/08\/Hackers_RChurchill_006.jpg",1600,1067,false],"mailpoet_newsletter_max":["https:\/\/topat10.com\/wp-content\/uploads\/2025\/08\/Hackers_RChurchill_006-1320x880.jpg",1320,880,true],"woocommerce_thumbnail":["https:\/\/topat10.com\/wp-content\/uploads\/2025\/08\/Hackers_RChurchill_006-380x380.jpg",380,380,true],"woocommerce_single":["https:\/\/topat10.com\/wp-content\/uploads\/2025\/08\/Hackers_RChurchill_006-1000x1067.jpg",1000,1067,true],"woocommerce_gallery_thumbnail":["https:\/\/topat10.com\/wp-content\/uploads\/2025\/08\/Hackers_RChurchill_006-120x120.jpg",120,120,true],"shareblock_justify":["https:\/\/topat10.com\/wp-content\/uploads\/2025\/08\/Hackers_RChurchill_006-800x534.jpg",800,534,true],"shareblock_small":["https:\/\/topat10.com\/wp-content\/uploads\/2025\/08\/Hackers_RChurchill_006-120x120.jpg",120,120,true],"shareblock_largeslider":["https:\/\/topat10.com\/wp-content\/uploads\/2025\/08\/Hackers_RChurchill_006.jpg",1600,1067,false],"shareblock_featurelarge":["https:\/\/topat10.com\/wp-content\/uploads\/2025\/08\/Hackers_RChurchill_006-1000x650.jpg",1000,650,true],"shareblock_midlarge":["https:\/\/topat10.com\/wp-content\/uploads\/2025\/08\/Hackers_RChurchill_006-760x600.jpg",760,600,true],"shareblock_slidergrid":["https:\/\/topat10.com\/wp-content\/uploads\/2025\/08\/Hackers_RChurchill_006-500x350.jpg",500,350,true],"shareblock_featurelist":["https:\/\/topat10.com\/wp-content\/uploads\/2025\/08\/Hackers_RChurchill_006-500x368.jpg",500,368,true],"shareblock_featuresmall":["https:\/\/topat10.com\/wp-content\/uploads\/2025\/08\/Hackers_RChurchill_006-450x450.jpg",450,450,true],"shareblock_justify_sload":["https:\/\/topat10.com\/wp-content\/uploads\/2025\/08\/Hackers_RChurchill_006-20x13.jpg",20,13,true],"shareblock_small_sload":["https:\/\/topat10.com\/wp-content\/uploads\/2025\/08\/Hackers_RChurchill_006-20x20.jpg",20,20,true],"shareblock_largeslider_sload":["https:\/\/topat10.com\/wp-content\/uploads\/2025\/08\/Hackers_RChurchill_006-20x13.jpg",20,13,true],"shareblock_featurelarge_sload":["https:\/\/topat10.com\/wp-content\/uploads\/2025\/08\/Hackers_RChurchill_006-20x13.jpg",20,13,true],"shareblock_slidergrid_sload":["https:\/\/topat10.com\/wp-content\/uploads\/2025\/08\/Hackers_RChurchill_006-20x14.jpg",20,14,true],"shareblock_midlarge_sload":["https:\/\/topat10.com\/wp-content\/uploads\/2025\/08\/Hackers_RChurchill_006-20x16.jpg",20,16,true],"shareblock_featurelist_sload":["https:\/\/topat10.com\/wp-content\/uploads\/2025\/08\/Hackers_RChurchill_006-20x15.jpg",20,15,true],"shareblock_featuresmall_sload":["https:\/\/topat10.com\/wp-content\/uploads\/2025\/08\/Hackers_RChurchill_006-20x20.jpg",20,20,true]},"uagb_author_info":{"display_name":"Andy Greenberg","author_link":"https:\/\/topat10.com\/?author=290"},"uagb_comment_info":0,"uagb_excerpt":"Zhou added in his statement that Securam will be fixing the vulnerabilities Omo and Rowley found in future models of the ProLogic lock. \u201cCustomer security is our priority and we have begun the process of creating next-generation products to thwart these potential attacks,\u201d he writes. \u201cWe expect to have new locks on the market by&hellip;","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/topat10.com\/index.php?rest_route=\/wp\/v2\/posts\/16205","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/topat10.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/topat10.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/topat10.com\/index.php?rest_route=\/wp\/v2\/users\/290"}],"replies":[{"embeddable":true,"href":"https:\/\/topat10.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=16205"}],"version-history":[{"count":0,"href":"https:\/\/topat10.com\/index.php?rest_route=\/wp\/v2\/posts\/16205\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/topat10.com\/index.php?rest_route=\/wp\/v2\/media\/16206"}],"wp:attachment":[{"href":"https:\/\/topat10.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=16205"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/topat10.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=16205"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/topat10.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=16205"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}