image provided by pixabay

Using AI to Conceal Confidential Information in Images

0
Researchers from Japan, China, and Finland created a system that replaces confidential parts of images with visually similar alternatives using GenAI. The researchers created...
image provided by pixabay

The Danger of Wearable Devices and Harvested Personal Data

0
Wearable devices can collect continuous data about their wearer, even without their knowledge, from sleep patterns to heart fitness. This makes them increasingly prominent...
image provided by pixabay

Revolutionary Contact Lenses Can Control Human-Machine Interaction

0
These smart contact lenses for human-machine interaction (HMI) track eye movements and can be used for health care and augmented reality (AR) applications. They...
image provided by pixabay

Revolutionary High-Resolution Satellites Raise Privacy Concerns

0
Startup company Albedo is setting out to collect and provide the highest resolution optical and thermal imagery from the sky. The images will have...
image provided by pixabay

A Cyberattack Every 39 Seconds – The Dangers of the ‘Remember...

0
The Remember Me checkbox promises online users a convenient, one-time log in, but using this feature has various security implications. Research released by the...
Fingerprint. image provided by pixabay

Hackers Can Use the Sound of Swiping to Steal Your Fingerprints

0
Nowadays, fingerprints are one of the most popular forms of personal identification, whether it’s unlocking your phone, approving online payments, access control, and many...
image provided by pixabay

Can AI be Controlled? Expert Opinion

0
Some experts claim that there is no current evidence that AI can be controlled safely. And if so, should it even be developed? AI Safety...
image provided by pixabay

A Camera That Protects Your Face from Unauthorized Recognition

0
Facial recognition is technology that can identify or verify a person's identity based on their face, and can be used for various purposes, like unlocking smartphones,...
smart city. image by pixabay

Smarter eco-cities, AI and AI of Things

0
Smarter eco-cities are intelligent urban environments that leverage cutting-edge Artificial Intelligence of Things (AIoT) solutions to address and mitigate environmental challenges. The integration of AIoT...
image provided by pixabay

Deep Fakes and Identity Decentralization

0
The growing trend of AI-generated content and deep fakes is making us lose our trust in the internet. Can identity decentralization be the solution?...
image provided by pixabay

AI’s Impact on Cybersecurity

0
The impact of AI on cybersecurity is transforming the methods we use to secure digital platforms. It is both providing attackers with sophisticated new...
images provided by pixabay

Call for Dual Use Technology Startups

0
Are you a startup company related to the security sector? Are you looking for recognition, international exposure, access to investors, and the ability to...
image provided by pixabay

Human Rights Groups Oppose EU’s AI Act

0
The EU has proposed a law to regulate AI, but human rights activists warn that it won’t be enough to protect the public from...
image provided by pixabay

iHLS Innovation Centre Calls for Dual-Use Security Startups

0
Are you a startup company related to the security sector? Are you looking for recognition, international exposure, access to investors, and the ability to...
images provided by pixabay

Robot Dogs and AI Inspectors- The Future of Border Security

0
US Customs and Border Protection (CBP) recently began working with leading trade and travel technology company “Pangiam” to bring cutting-edge artificial intelligence, computer vision, and...

Charging Your Heart Monitor- Wireless Charger for Implants

0
This revolutionary prototype paves the way for wireless charging of implants. Medical technology advancements have allowed us to implant bioelectronic devices like pacemakers into human...
images provided by pixabay

Call for Startups – iHLS Innovation Centre

0
iHLS is an accelerator for the security sector and its various unique characteristics that provides startups with recognition, international exposure, access to investors and...
Password, image by pixabay

Password Reuse is Still a Major Threat

0
44% of users worldwide reportedly reuse their passwords on multiple accounts, putting tons of sensitive data at risk. Dashlane is a password manager, and its...
image provided by pixabay

Will Passkeys Finally Eliminate Passwords?

0
A new report states that despite the rise of new secure authentication methods, passwords are here to stay. Despite having had shortcomings and presenting substantial...
image provided by pixabay

23andMe Investigates Data Leak Claims

0
Malicious actors claim to have acquired a large amount of private user data from one of the most popular genetic testing services “23andMe”. There...
image provided by pixabay

Calls to Ban AI Facial Recognition in the UK

0
A group of politicians and privacy campaigners say police and private companies should immediately stop using facial recognition surveillance, raising concerns regarding human rights,...
image provided by pixabay

New York Bans Facial Recognition in Schools

0
New York State has recently banned the use of facial recognition technology in schools due to a report stating the risks to student privacy...

Latest

image provided by pixabay

Enhancing Thermal Imaging for Military and Medical Use

0
University of Houston professor of electrical and computer engineering Jiming Bao developed a new method to measure the continuous spectrum of light that is...