Secure Communications – Enabled by 3mm Chip

0
In most leading security standards used in secure communication methods — from withdrawing cash from the ATM to purchasing goods online on the smartphone...
smart watch

Smart Campus Access Enabled by Smart Watch

0
A new series of smart campus products now support contactless student IDs in Apple Wallet. Allegion, which specializes in seamless access technologies, announced that the...

US SOCOM Defines New Priorities

0
As quantum computers become more readily available, the concern is that they will be able to guess passwords and break through the layers of...

Privacy Concerns Over Amazon’s New Indoor Drone 

0
Amazon's new Ring Always Home Cam, a security camera is also a drone that flies around the inside of your house shooting video that...
cryptography. image provided by pixabay

Military IoT Devices Might Be Too Valnurable

0
Due partly to the low cost of internet of things equipment, the US military has been able to adopt “unprecedented numbers” of IoT-enabled devices....
DHS

DHS Seeking Top-Level Identity Security

0
The US Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has awarded a $749,241 Small Business Innovation Program (SBIR) contract to Digital...
cyber security rules

Cyber Security Rules for Autonomous Vehicles Set by UK

0
The United Kingdom has recently published a set of cyber security regulations, “Key principles of vehicle cyber security for connected and automated vehicles”. The...
image provided by pixabay

Iranian State-Actors Aid Ransomware Gangs in campaigns Against Israel

0
The Federal Bureau of Investigation (FBI) has issued warnings regarding Iranian state-sponsored hackers, who are involved in trading access to organizations for financial gain,...
passwords

Two Steps to Protect Your Passwords

0
Conventional password security measures have become insufficient when massive data breaches frequently expose millions of users to hacking attacks. More than 92M customer records...
iot

Power-Saving Chip to Revolutionize IoT Network

0
The IoT network is capable of connecting many different sensors integrated in civil structures, appliances, vehicles, manufacturing equipment, etc. to online servers. However, one...
airport

Severe Security Breach at London Heathrow Airport

0
Heathrow Airport’s secret security planning has been revealed in files on a memory stick found in a London street. The documents outline routes and...
innovation

InnoTech 2020: How COVID-19 Changed Cyber & HLS World: Special Broadcast...

0
The COVID-19 pandemic has intensified the multiple challenges states and cities are currently facing. Technology has become more and more important in our daily...
fax

Your Home Fax Might Help Hackers Take Over Your Network

0
A ground-breaking research dubbed Faxploit, conducted by CheckPoint, unfolds the shocking dangers of the seemingly simple and technologically innocent fax machine. The daunting news...

New Encryption Solution for Microsoft

0
WinMagic Inc., a data encryption firm, announced recently the availability of SecureDoc for Microsoft’s BitLocker, an intelligent key management and encryption solution that improves...
computer security

Computer Security to Be Achieved by Mini-Mazes

0
As hacking techniques are constantly improving, scientists have been trying to find new ways and authentication methods to secure computers. Researchers in South Korea...

Can’t be Cloned: Hydrogel Gives Products a Unique ID

0
A new material developed by researchers offers a promising route to secure, tamper-proof authentication for physical objects. At the heart of the innovation is...

Vulnerabilities in Smart Security System of Leading Companies’ Installations

0
A  smart security system was found vulnerable for access to uploaded video recordings. Researchers found that Guardzilla’s top-selling indoor wireless security system contains a...
Image provided by pixabay

The Growing Need for Satellite Cybersecurity

0
The expansion of the digital realm into space has opened new frontiers for cyber threats, posing unprecedented challenges. The satellites orbiting Earth are crucial for...

Prepare Now for Year Y2Q Quantum Threats

0
Quantum computers are expected to supply the most powerful computing capabilities ever. Advances in quantum computing are finally beginning to reach commercial applications, such...

An Equivalent to License plates – for UAV’s?

0
AirMap, a world leader in airspace management for unmanned aircraft, recently announced a partnership with DigiCert that will enable, for the first time, instant...

Will Blockchain Secure Connected Devices?

0
IoT security is a substantial challenge as the use of the connected devices is becoming more and more widespread in every field. The consequences...
image by pixabay

Call for Technologies: Defense Industry Seeks AI Solutions

0
iHLS, in collaboration with a large defense industry is looking for companies with proven capabilities in several areas to participate in a demonstration of...

Latest

Metal That Behaves Like a Gel Could Redefine High-Temperature Systems

0
A research team at Texas A&M University has developed the world’s first metallic gel — a new class of material that combines the strength...