Business Security

Business Security

The use of commercial drones for delivering mail is one step closer to reality in Singapore, after the testing of Singpost’s Unmanned Aerial Vehicle...

A study of the information security measures at civilian nuclear energy facilities around the world found a wide range of problems at many facilities...

The European Court of Justice (ECJ) in Luxembourg has ruled that U.S. digital data storage systems fail to provide sufficient privacy from state surveillance. According...

Voice biometrics is based on the assumption that each person has a unique voice that depends not only on his or her physiological features...

One of the things the United States has learned from the war in Iraq was to foresee the threat lurking around the corner. Soldiers...

Amidst all the excitement about the possible benefits of the Internet of Things, a slew of warnings have been sounded by IT pros, vendors...

In an era where most organizations run on electronic communications, it is not only executives and IT engineers who hold the keys to the...

They Look like the latest rage in jewelry and gadgetry, but like all computer devices, smart watches are vulnerable to hackers, say researchers at...

Russian president's official website was targeted by a massive hacker attack during country-wide local elections, but the Kremlin's cyber defenses managed to cope with...

Most of us have already heard about ways of defending against possible cyber attacks: Don't open e-mails from people you don't know, choose a...

In light of numerous cyber attacks and security breaches, of which the attack on the American Office of Personnel Management (OPM) was perhaps the...

The United States has had to deal with a series of embarassing cyber attack in the past few months, chief among them is the...

Security leaks have reached an all-time high these days, and are causing great concern among financial advisors, business owners and consumers. Nowadays there are...

Natural disasters may cause loss of information existing in the computer systems, leading to businesses and infrastructure collapsing. Proper planning for recovery after natural...

Biometric identification means have been around for some time now, helping commercial companies to keep their information secure and their offices compartmentalized. Being an...

Canadian company Nymi has managed to develop a unique, first of its kind, technological solution: Paying with a wrist-bracelet that can detect the heartbeat...

In the past, wars took place only in the real world: Armies battled each other in the physical spaces while using guns, cannons set...

A group of hackers, supposedly originating in China, has comitted a cyber attack and managed to break into the American Airlines computer system, as...

Maxim Rupp, a information security researcher for the german company Cure53, has managed to penetrate the bimetric security of the Taiwanese company Chiuy Technology....

Researchers from the College of Computing at the Georgia Institute of Technology were awarded $4.2 million from the Defense Advanced Research Projects Agency (DARPA)...

The Internet of Things (IoT) trend is becoming more central in our lives and surrounds us everywhere. In everyday life this means the smart...

Researchers from the  Ben-Gurion University of the Negev (BGU) Cyber Security Research Center have discovered that virtually any cellphone infected with a malicious code can use GSM phone frequencies...