Data breaches, hacked systems and hostage malware are frequently topics of evening news casts — including stories of department store, hospital, government and bank data leaking into unsavor... Read more
Rutgers-led study demonstrates low-cost technology for security screening at public venues like stadiums, theme parks and schools Ordinary WiFi can easily detect weapons, bombs and explosive... Read more
No matter whether payment of the public passenger transport ticket is made via a smartphone app or whether a prepaid card is used for the public swimming pool or a bonus card for the superma... Read more
Researchers at the University of Alabama at Birmingham suggest that brainwave-sensing headsets, also known as EEG or electroencephalograph headsets, need better security after a study reveal... Read more
Fingerprinting official documents could provide a cost-effective way to prevent forgery, new research shows. Scientists from Newcastle University, UK, have found an inexpensive and easy way... Read more
Study describes how app, soon to be available, will help thwart growing cybersecurity threat While convenient, Siri, WeChat and other voice-based smartphone apps can expose you to a growing... Read more
Whenever we need to communicate in secret, a cryptographic key is needed. For this key to work, it must consist of numbers chosen at random without any structure – just the opposite of using... Read more
Sending a password or secret code over airborne radio waves like WiFi or Bluetooth means anyone can eavesdrop, making those transmissions vulnerable to hackers who can attempt to break the e... Read more
Leading US universities are pushing back against a proposed State Department rule that would bar foreign students from more research projects and classes involving information seen as vital... Read more
Honeywords provide additional password security Corporate data breaches seem to be on the rise, rarely a week passes without a company revealing that its database has been hacked and regrett... Read more
New technology could secure credit cards, key cards, and pallets of goods in warehouses. Researchers at MIT and Texas Instruments have developed a new type of radio frequency identification... Read more
New technology allows irises to be scanned from 40 feet away. Is this a wonder weapon against crime and terrorism or a way for governments to invade our privacy and track our movements? Imag... Read more
Zero-day infections are common Antivirus software running on your computer has one big weak point – if a new virus is released before the antivirus provider knows about it or before th... Read more
Researchers are developing a security approach that relies on implicit learning to train people to enter a unique pattern, which they can perform over time but can’t consciously remember. De... Read more
Deetectee Microsystems Inc. has invented the first and only technology that enables secure, digital identification of a person in a mobile environment. The invention of Single Burst Optical... Read more