image provided by pixabay

Businesses are Harvesting our Biometric Data – Should We Be Worried?

0
In our highly digital age, biometric data is everywhere- from facial recognition on our phones to fingerprints unlocking our laptops. Facial recognition is the most...

INNOFENSE Open Call For Dual-Use Technologies

0
INNOFENSE Call for startups – Dual-Use Technologies: Following the immense success of the previous four cycles and their integration into the defense sector, iHLS invites...
image provided by pixabay

Police Use Facial Recognition, Arrests Wrong Man

0
A police department in Detroit announced it will no longer be using facial recognition technology as the basis for arrest after wrongfully jailing the...
images provided by pixabay

Face-Detecting Camera Can Recognize Drunk Drivers

0
Researchers from Edith Cowan University have developed a new computer tracking technology that uses camera footage to detect drunk drivers. The scientists took data and...
image provided by pixabay

Using AI to Conceal Confidential Information in Images

0
Researchers from Japan, China, and Finland created a system that replaces confidential parts of images with visually similar alternatives using GenAI. The researchers created...
image provided by pixabay

The Danger of Wearable Devices and Harvested Personal Data

0
Wearable devices can collect continuous data about their wearer, even without their knowledge, from sleep patterns to heart fitness. This makes them increasingly prominent...
image provided by pixabay

Revolutionary Contact Lenses Can Control Human-Machine Interaction

0
These smart contact lenses for human-machine interaction (HMI) track eye movements and can be used for health care and augmented reality (AR) applications. They...
image provided by pixabay

Revolutionary High-Resolution Satellites Raise Privacy Concerns

0
Startup company Albedo is setting out to collect and provide the highest resolution optical and thermal imagery from the sky. The images will have...
image provided by pixabay

A Cyberattack Every 39 Seconds – The Dangers of the ‘Remember...

0
The Remember Me checkbox promises online users a convenient, one-time log in, but using this feature has various security implications. Research released by the...
Fingerprint. image provided by pixabay

Hackers Can Use the Sound of Swiping to Steal Your Fingerprints

0
Nowadays, fingerprints are one of the most popular forms of personal identification, whether it’s unlocking your phone, approving online payments, access control, and many...
image provided by pixabay

Can AI be Controlled? Expert Opinion

0
Some experts claim that there is no current evidence that AI can be controlled safely. And if so, should it even be developed? AI Safety...
image provided by pixabay

A Camera That Protects Your Face from Unauthorized Recognition

0
Facial recognition is technology that can identify or verify a person's identity based on their face, and can be used for various purposes, like unlocking smartphones,...
smart city. image by pixabay

Smarter eco-cities, AI and AI of Things

0
Smarter eco-cities are intelligent urban environments that leverage cutting-edge Artificial Intelligence of Things (AIoT) solutions to address and mitigate environmental challenges. The integration of AIoT...
image provided by pixabay

Deep Fakes and Identity Decentralization

0
The growing trend of AI-generated content and deep fakes is making us lose our trust in the internet. Can identity decentralization be the solution?...
image provided by pixabay

AI’s Impact on Cybersecurity

0
The impact of AI on cybersecurity is transforming the methods we use to secure digital platforms. It is both providing attackers with sophisticated new...
images provided by pixabay

Call for Dual Use Technology Startups

0
Are you a startup company related to the security sector? Are you looking for recognition, international exposure, access to investors, and the ability to...
image provided by pixabay

Human Rights Groups Oppose EU’s AI Act

0
The EU has proposed a law to regulate AI, but human rights activists warn that it won’t be enough to protect the public from...
image provided by pixabay

iHLS Innovation Centre Calls for Dual-Use Security Startups

0
Are you a startup company related to the security sector? Are you looking for recognition, international exposure, access to investors, and the ability to...
images provided by pixabay

Robot Dogs and AI Inspectors- The Future of Border Security

0
US Customs and Border Protection (CBP) recently began working with leading trade and travel technology company “Pangiam” to bring cutting-edge artificial intelligence, computer vision, and...

Charging Your Heart Monitor- Wireless Charger for Implants

0
This revolutionary prototype paves the way for wireless charging of implants. Medical technology advancements have allowed us to implant bioelectronic devices like pacemakers into human...
images provided by pixabay

Call for Startups – iHLS Innovation Centre

0
iHLS is an accelerator for the security sector and its various unique characteristics that provides startups with recognition, international exposure, access to investors and...
Password, image by pixabay

Password Reuse is Still a Major Threat

0
44% of users worldwide reportedly reuse their passwords on multiple accounts, putting tons of sensitive data at risk. Dashlane is a password manager, and its...

Latest

3D-Printed Antennas Bend Without Breaking the Signal

0
A new type of 3D-printed antenna could transform how vehicles, drones, and wearable devices maintain wireless communication while in motion. Developed by researchers at...