Data breaches, hacked systems and hostage malware are frequently topics of evening news casts — including stories of department store, hospital, government and bank data leaking into unsavor... Read more
Whenever we need to communicate in secret, a cryptographic key is needed. For this key to work, it must consist of numbers chosen at random without any structure – just the opposite of using... Read more
Action is needed to monitor and control the emerging Internet of Toys, concludes a new JRC report. Privacy and security are highlighted as main areas of concern. Large numbers of connected t... Read more
Scientists have discovered a way to authenticate or identify any object by generating an unbreakable ID based on atoms. The technology, which is being patented at Lancaster University and co... Read more
You might not need to remember those complicated e-mail and bank account passwords for much longer. According to a new study, the way your brain responds to certain words could be used to re... Read more
New technology allows irises to be scanned from 40 feet away. Is this a wonder weapon against crime and terrorism or a way for governments to invade our privacy and track our movements? Imag... Read more
Research conducted at Griffith University in Queensland, Australia, may lead to greatly improved security of information transfer over the internet. In a paper published in the online journa... Read more
FLIP through any newspaper and go from the foreign news to the business pages and what you’ll see is the “other” great geopolitical struggle in the world today. It’s not the traditional one... Read more
Forgotten passwords are a serious problem for both IT managers and users. The root of the problem is a trade-off between memorability and security: simple passwords are easy to remember but... Read more
“The true significance of this security approach is its potential proactive defense capability. Conventional security systems scan for known attack patterns, which is reactive. Our ano... Read more
Online identification and authentication keeps transactions secure on the Internet, however this has also implications for your privacy. Disclosing more personal information than needed onli... Read more
It may seem like teens are always over-sharing without a thought. But in a world where opting out of online culture is hardly an option, many take a far more sophisticated view of privacy th... Read more
Computer security: Spam in the fridge “THE internet of things” is one of the buzziest bits of jargon around in consumer electronics. The idea is to put computers in all kinds of products—tel... Read more
Researchers have shown that it is possible to compromise the functioning of a cryptographic chip without changing its physical layout. Based on altering the distribution of dopants in a few... Read more