security

Unbreakable? An encryption key approach to security that is unclonable and not reverse-engineerable

Data breaches, hacked systems and hostage malware are frequently topics of evening news casts —

Could Wi-Fi detect bombs, weapons and chemical in bags?

Rutgers-led study demonstrates low-cost technology for security screening at public venues like stadiums, theme parks

A secure and anonymous payment system for daily use

No matter whether payment of the public passenger transport ticket is made via a smartphone

Significant security and privacy threats using advanced brain-computer interface technology

Researchers at the University of Alabama at Birmingham suggest that brainwave-sensing headsets, also known as EEG or

Texture fingerprinting of paper documents could provide a cost-effective way to prevent forgery

Fingerprinting official documents could provide a cost-effective way to prevent forgery, new research shows. Scientists

Voice hacking app will help thwart growing cybersecurity threat

Study describes how app, soon to be available, will help thwart growing cybersecurity threat While

A new random numbers generator based on the principles of quantum physics should give hackers a hard time

Whenever we need to communicate in secret, a cryptographic key is needed. For this key

Secure passwords can be sent through your body, instead of air

Sending a password or secret code over airborne radio waves like WiFi or Bluetooth means

Universities fight proposed crackdown on foreign students’ defense research

Leading US universities are pushing back against a proposed State Department rule that would bar

Phoney protection for passwords

Honeywords provide additional password security Corporate data breaches seem to be on the rise, rarely

Hack-proof RFID chips are here

New technology could secure credit cards, key cards, and pallets of goods in warehouses. Researchers

Iris Scans: Security Breakthrough Or Privacy Invasion?

New technology allows irises to be scanned from 40 feet away. Is this a wonder

Malware bites and how to stop it

Zero-day infections are common Antivirus software running on your computer has one big weak point

Unexplainable Unconscious Passwords Cannot Be Compromised

Researchers are developing a security approach that relies on implicit learning to train people to

VIDEO: Deetectee’s invention of Single Burst(TM) will make Smartphones, wearable technologies more social and more secure

Deetectee Microsystems Inc. has invented the first and only technology that enables secure, digital identification