Authentication

Authentication

smart home devices

Some experts expect Earth to pass the threshold of 1 trillion internet-connected sensors within five years, so there is growing pressure to improve the...
passwords

Conventional password security measures have become insufficient when massive data breaches frequently expose millions of users to hacking attacks. More than 92M customer records...
data breach

More than 87GB of passwords and email addresses have been leaked and distributed in a folder dubbed "Collection #1" by hackers in a significant...

BlackBerry’s Security Credential and Management System (SCMS) lets autonomous vehicles communicate with wired objects in the Intelligent Traffic Systems, as part of the Smart...
two-factor

In a quest to make online accounts safer, many services now offer two-factor authentication. Cybersecurity professionals have advised enabling two-factor to add an extra...

A new technology will help law enforcement not only to maximize situational awareness but also to manage fleet and human resources. The iris...

As 2018 ends, it’s crucial to step back and reflect on some cybersecurity realities. Although US government cybersecurity...
data breaches

Data breaches compromised the personal information of millions of people around the globe in 2018. Data breaches are...

In an attempt to target Islamist terrorism, pedophile networks and organized crime, several governments worldwide have been leading a policy forcing technology companies to...
the internet of things

The Internet of Things (IoT) has been making major shifts in the world of both consumer and industrial electronics, however, it opens a door...
smart gun

Smart guns are firearms equipped with technology that enables them to only be fired by an authorized user. Smart guns have the potential to...

The physical driver’s license is probably here to stay, but there are also other options that make identification and authentication more efficient, such as...
IOT security

Cloudflare, the internet infrastructure and networking giant, has been expanding its focus to include mobile privacy and the security of connected devices. On November 11,...
cyber

The recent wave of ransomware attacks and preceding waves of cyber breaches could make it appear as though cyber criminals want their pay-off immediately....
5g network

5G wireless network deployments at major world events such as the 2018 Winter Games in PyeongChang have shown the great potential of a 5G-driven...
Cryptomining

Author: Aryeh Danon, Data Security Department Manager at Abnet Communications, distributing Sophos solutions in Israel. Hackers have discovered a new way to take advantage...

Manual authentication in airports means that passengers need to present different forms of ID such as boarding cards, booking reference numbers as well as...
Router

Securing our routers and ensuring they are safe and protected is sometimes neglected by many. It is essential to check your router settings and...
IoT

Cybersecurity is an ongoing concern for many, especially with the proliferation of Internet of Things (IoT) technologies. The importance of securing IoT is increasingly...
Internet

Facebook has recently been in the spotlight for a security breach that compromised over 50 million accounts. This is a concern not only to...
iot security

In 2017, there were about 20 billion connected devices worldwide, according to Statista, which projects that the number will be more than 75 billion...

By Ilan Segelman, Power Communication (distributing Sophos solutions in Israel) Revealing private and secret information to unauthorized sources is an ever headline-grabbing issue. The Authority for...

iHLS Events