Authentication

Authentication

Cyberattacks and the methods by which the public and private sectors deter and counter them have occupied the headlines with increasing frequency in today’s...

Protecting against phishing attacks, in which malicious actors attempt to gain access to a user’s credentials (and then to systems and networks) through social...
supply chains

A recent research report from Accenture demonstrates that 86 percent of aerospace and defense companies (A&D) expect to integrate blockchain technology into their corporate...
voice recognition technology

China has been developing voice recognition technology for identification and surveillance purposes after it already turned face recognition into a constantly used technology. In...
autonomous car

With the increasing automation and widespread use of unmanned aerial systems, potential cyber-attacks on aerial fleets are already a major concern. A recent collaboration...
authentication

Cybercrime will become one of the greatest threats of our time, and this is particularly true for banks and insurers, who will increasingly look...
cybersecurity

The cyber incidents that dominated global headlines over the past year indicated not only a growing trend but one that is escalating in size,...
video systems

By Dorit Guterman, Ledico Security Systems, Tomer Nuri, Team Information and cyber security events can occur also via security cameras and other IoT devices. As result,...
cybersecurity

Blockchain technology has recently caught the world's attention because of the central role it plays in enabling cryptocurrencies. It enables secure information transmission on...
smartphone password security

New study from Nanyang Technological University, Singapore (NTU Singapore) has found a new security breach that hackers could use to guess your phone's PIN...
ransomware attacks

Ransomware attacks have become more and more common, attracting more global focus. Rob Wainright the head of the Europol, the European Union Agency for...
iot devices

The Internet of Things (IoT) ecosystem includes a broad variety of devices and device-systems such as power plants, vehicles, home appliances, etc. Its global...
authentication technology

Due to the rise of mobile transactions, passwords are not sufficiently secure as a means of authentication, and additional modes are required for next-generation...