A paper was allegedly leaked to civil liberties body the Open Rights Group on May 4th according to the BBC reports shows a proposal in a draft technical paper prepared by the government that the British web users of the…
Category: Security
Mastercard onfolds a Credit card with a fingerprint sensor
A payment card featuring a fingerprint sensor has been unveiled by credit card provider Mastercard. The rollout follows two successful trials in South Africa. The technology works in the same way as it does with mobile phone payments: users must…
Delay Tolerant Networking security challenges and solution
Delay Tolerant Networking security challenges and solution Dr Haitham Cruikshank
WSN TO BENEFIT FROM GROUNDBREAKING VISUALIZATION AND 3D TECHNOLOGIES
A groundbreaking 3D digitization project has led to the creation of a digital copy of the mummy Neswaiu from Medelhavsmuseet in Stockholm, Sweden. The result carried out by Interactive Institute Swedish ICT, Autodesk and CMIV is now presented in a…
PERYTONS MAKE ADVANCEMENT WITH A NEW VERSION OF THEIR PROTOCOL ANALYZER
Perytons Ltd. a leading provider of analyzers for standard and proprietary wireless and PLC wire-line communication protocols, has released version 5.1 of the Perytons Protocol Analyzer. According to Rubi Elbirt, Perytons Vice President, Business Development and International Sales, this new…
Security Technologies: An Industry Perspective
Security has always been about maintaining the initiative over potential threats using a balance of people, procedures and technology. As organisations seek enduring, cost-effective and proportionate security solutions, this balance point continuously moves with the ever-increasing capability of security technology.…
Security Solution For Man-in-the-Browser Attacks
A security solution developed by Cronto that protects against Man-in-the-Browser attacks, one of the most serious threats to online banking customers, and which is responsible for millions in annual losses to the banking sector, is being rolled out across Europe…
Can You Trust Your Car?
Wireless systems are being integrated into modern automobile. However, the security and privacy implication of those systems are not well understood as many of their communication protocols are proprietary. New anti-theft technologies have made today’s cars much harder to steal,…
MIT Researchers Showcase Public-key Encryption Enhancement
MIT researchers show how to secure widely used encryption schemes against attackers who have intercepted examples of successful decryption. “According to Huijia Lin, a postdoc at MIT’s Computer Science and Artificial Intelligence Laboratory “In real life, maybe it seems more…
Student Guide: Principles of Wireless Sensor Networks
This is to help undergraduate student and others to understand the Principles of Wireless Sensor Network. We all know that WSNs have the potential of dwarfing the revolution that the Internet has brought to the world of computing, entertainment, work,…