Many people already use fingerprint recognition technology to access their phones, but new research demonstrates a technique that maps out not only the unique...
Researchers found new critical vulnerabilities in various automotive giants such as Tesla, Ferrari, BMW, Toyota, and others. The researchers found a compromise in a...
We need to shift from ‘Defense-in-Depth’ strategies to incorporate ‘Resilience-in-Depth’ strategies, which offers a new cyber defense strategy that places multiple layers of security...
By using machine learning and rule-based algorithms, network traffic analysis is the process of analyzing network traffic. It enables the network to be monitored...
The ubiquity of smartphones combined with the developing trend toward smart living will make biometrics an important element to incorporate into homes of the...
The Internet of Vehicle (IoV) field allows vehicles to communicate with drivers, other vehicles, management systems, pedestrians, other smart devices, and infrastructure, all in...
Fraud has become an ongoing threat and concern for the telecom industry. Approximately 40B$ are lost annually to fraud in telecoms worldwide, and this...
With the world of security constantly changing and hackers adapting to those changes, nothing is perfect in terms of security. While two-factor authentication is...
Internet of Things (IoT) devices use the internet to communicate, collect, and exchange information. It’s only natural that as these device numbers grow, the...
The autonomous, connected, electric and shared (ACES) trends bring new requirements that modern automotive operating systems need to be capable of handling. The growing...
Industry 4.0 brings into the industrial manufacturing process growing automation and data exchange. But industry 4.0 also introduces more risk for operational technology (OT)...
The Tactical Humanitarian Operations Response vehicle (THOR) was built to operate under any network in any environment, from dense forests during wildfires to remote...
The Georgia State University has developed a new and innovative technology for artificial vision, which utilizes a new architecture to enhance color recognition on...
According to reports, a US Strategy will be developed and will implement “superior electromagnetic spectrum operations (EMSO) capabilities” through improved enabling technologies to “sense,...
Many media outlets have begun talking about an "automotive revolution" which might begin soon. Well, apparently it has already begun. This technology goes by...
The terahertz frequency range -- which sits in the middle of the electromagnetic spectrum between microwaves and infrared light -- has remained difficult to...
While cyber criminals are constantly changing their tactics, legislation and standardization often take years, leaving law enforcement efforts without substantial countermeasures. Now, Europe is...
During spring and summer, rising temperatures and low precipitation lead to long-term soil dryness. Furthermore, global warming and drought contribute to an increase in...