big data

New Big Data Platform Predicts Trends in Business and Defense

0
Gathering insights from big data regarding future trends requires data scientists’ expertise and can take weeks or even months. Now, an MIT spinout has...
iot security

Mounting Efforts to Regulate IoT Security

0
While IoT devices and the data they collect and transmit present enormous benefits to consumers and industry, the relative insecurity of many devices presents...
dual-use technologies

Europe to Increase Control on Dual-Use Products Export

0
Lawmakers in the European Union have advanced plans to subject hacking tools to export controls currently reserved for depleted uranium, human pathogens and other...
smartphone encryption

Smartphone Encryption Frustrates Law Enforcement

0
Many smartphones encrypt their contents when locked, as standard - a security feature that often prevents even the phones' manufacturers from accessing data. Such...
airport

Severe Security Breach at London Heathrow Airport

0
Heathrow Airport’s secret security planning has been revealed in files on a memory stick found in a London street. The documents outline routes and...
authentication technology

Authentication Technology to Deliver Safer Transactions

0
Due to the rise of mobile transactions, passwords are not sufficiently secure as a means of authentication, and additional modes are required for next-generation...
DHS

DHS Seeking Top-Level Identity Security

0
The US Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has awarded a $749,241 Small Business Innovation Program (SBIR) contract to Digital...
blockchain

World’s First Blockchain Secured Smartphone

0
More and more industries have been discovering the blockchain technology advantages in the field of enhanced security against hackers. Blockchain is a secure database...
secure communication

The Secure Communication of the Future City

0
Today, mathematical algorithms are used to encrypt text messages, banking transactions and health information. Intercepting these encrypted messages requires figuring out the exact algorithm...
emergency

New Emergency Function by Smartphone Giants

0
Apple's new operating system will come with an option to lock your iPhone's fingerprint scanner and bring up a hotline to the police. The...
computer security

Computer Security to Be Achieved by Mini-Mazes

0
As hacking techniques are constantly improving, scientists have been trying to find new ways and authentication methods to secure computers. Researchers in South Korea...
mobile communication

A Startup Company is Securing Mobile Communication Privacy for US Enterprises

0
The iHLS Security Accelerator is home to many innovative and successful startups. ListenApp is one of the first startups that's participated in the accelerator...
USB-connected devices

USB-Connected Devices Are Not Secure As Thought

0
Security flaws found in USB-connected devices raise questions about the trustworthy of the devices. Apparently, USB connections should be redesigned to offer more security,...
cyber security rules

Cyber Security Rules for Autonomous Vehicles Set by UK

0
The United Kingdom has recently published a set of cyber security regulations, “Key principles of vehicle cyber security for connected and automated vehicles”. The...
hacking

Meet the World’s Smallest Non-Hackable Chip

0
The more digital the world becomes, the more hacking becomes a serious threat. The world's smallest "non-hackable" security chip that can be widely used...
cybersecurity

Will Blockchain Tech Revolutionize Cybersecurity?

0
With Blockchain becoming more popular these days, a significant number of US government departments are rapidly showing interest. The US Department of Homeland Security...
video streaming

New Video Streaming Solutions for the Battlefield

0
The video and metadata requirements of modern military and defense missions have been evolving rapidly, making live, real-time video delivery and management in the...
cybersecurity law

China’s Cybersecurity Law Influences Tech Giants

0
There has been a growing global trend regarding the security and sovereignty of digital data - building facilities that store online data closer to...
communication encryption

Communication Encryption Dilemma

0
The past few years have been rough on law enforcement agencies around the world. Online communication is encrypted most of the time, making it...
IoT security

Digital Identity and Cryptographic Technology to Enhance IoT Security

0
Recent cybercrime and hacking exploits have shown clearly that much of the IoT – devices, services and applications – is coming online largely in...
iot security

Current IoT Security Industry Trends

0
Internet of Things - IoT security breaches have been dominating headlines lately. Even if you personally don’t suffer consequences of the mediocre security of...
Command and Control Capabilities

Encryption Tech Enhances Marines’ Command and Control Capabilities

0
  The US Marine Corps has been enhancing its command and control capabilities. Since July 2016, the corps has rolled out 1,100 units of its...

Latest

Gmail Data Leak: 183 Million Reasons to Rethink Your Password Security

0
A new trove of stolen login credentials has surfaced online, with 183 million email addresses and passwords added to the “Have I Been Pwned”...