Authentication

Authentication

cybersecurity

By Or Shalom, security and cyber expert and adviser The establishment of a work plan in the cyber field is not a simple task. Alongside...

Many people use simple and weak passwords for their devices, making it easy for intruders to hack their phones, computers, emails etc. Many employees...
cybersecurity

During the last few weeks, the media headlines kept us informed about the triple data leak from the Elector application - an app developed...
border control and biometric technologies

Border threats have been creating various challenges, met by innovative control technologies. New systems deliver high security and fast passenger processing times in border...
security camera

A recent spate of breaches involving in-home Ring security cameras, owned by Amazon, in several states across the US have raised concerns that these...
Photo EasySec Solutions at Nimrod Group

Industrial connected devices, the Industrial IoT, is a real opportunity for industries to share efficiently their resources and increase their productivity. However, network sharing...
Photo NSWC Crane Corporate Communications

The rapidly growing world of connected smart devices presents enormous security risks and the existing security solutions find it hard to keep pace. Be...
Blockchain illust Pixabay

The US Department of Homeland Security (DHS) has been pushing for the adoption of blockchain technology in order to enhance the agency’s ability to...
Photo illustration Pixabay

In April 2019, the PDF management service Lumin PDF suffered a data breach. The breach wasn't publicly disclosed until September when 15.5M records of...
Photo illustration US Navy

A new technology provides a quick, easy confirmation that the person you’re looking at is the person they say they are.  When the driver,...
Photo illust US Army, smartphone

How do you translate the powerful consumer technology of smartphones into something that can be useful and secure on the battlefield? Soldiers need something...
photo port illust Pixabay

Increasingly connected and automated vessels are becoming a cybersecurity challenge. In an incident last February, a deep draft vessel on an international voyage sailed...
smart home devices

Some experts expect Earth to pass the threshold of 1 trillion internet-connected sensors within five years, so there is growing pressure to improve the...
passwords

Conventional password security measures have become insufficient when massive data breaches frequently expose millions of users to hacking attacks. More than 92M customer records...
data breach

More than 87GB of passwords and email addresses have been leaked and distributed in a folder dubbed "Collection #1" by hackers in a significant...

BlackBerry’s Security Credential and Management System (SCMS) lets autonomous vehicles communicate with wired objects in the Intelligent Traffic Systems, as part of the Smart...
two-factor

In a quest to make online accounts safer, many services now offer two-factor authentication. Cybersecurity professionals have advised enabling two-factor to add an extra...

A new technology will help law enforcement not only to maximize situational awareness but also to manage fleet and human resources. The iris...

As 2018 ends, it’s crucial to step back and reflect on some cybersecurity realities. Although US government cybersecurity...
data breaches

Data breaches compromised the personal information of millions of people around the globe in 2018. Data breaches are...

In an attempt to target Islamist terrorism, pedophile networks and organized crime, several governments worldwide have been leading a policy forcing technology companies to...
cyber, photo illus. by pixabay

The Internet of Things (IoT) has been making major shifts in the world of both consumer and industrial electronics, however, it opens a door...

Latest