Editorial

How DARPA crushed the hopes for touch-based authentication
Editorial How DARPA crushed the hopes for touch-based authentication

Smartphones head towards touch-based continuous authentication – a type of permanent identity validation that is also passive, since it does not hinder in any way other human-phone interactions that may be taking place during the same time. That would eliminate the risks of intrusion currently at t

Find out the basics on the most famous mobile payment systems
Editorial Find out the basics on the most famous mobile payment systems

While a recent report coming from the Institute of Electrical and Electronics Engineers shows that according to nearly 1400 tech enthusiasts (out of 2000 surveyed) mobile payment is sure to take over the payment market and clearly will surpass cash and credit cards by the year 2030, other online

Is homomorphic encryption the ultimate in cloud security?
Editorial Is homomorphic encryption the ultimate in cloud security?

The simplest way to describe homomorphic encryption would be the following: HE is the particular type of converting data into cipher text that allows this encrypted data to further get analyzed, permuted, associated to, and generally used into various computations without any decryption involved.

Network events monitoring – enjoy an useful cyber-sentinel
Editorial Network events monitoring – enjoy an useful cyber-sentinel

In-depth cyber defense sees the process of stopping attacks as being only half of the protection activity. Going to the roots of the incident or of the event and thus preparing the system in order to fend off future similar situations is the subsidiary defense move that completes any cyber-shield.

Protect your company from the risks of metadata shadows
Editorial Protect your company from the risks of metadata shadows

Metadata represents the context generated by and/or surrounding all digital communications, or the traces left by digital data during its processing and digital existence. Since it may be construed as a digital halo that reflects the characteristics of the user data, metadata can be used for

Fast&dangerous: do you know the risks of URL shorteners?
Editorial Fast&dangerous: do you know the risks of URL shorteners?

URL shorteners are right under our eyes. You may have noticed how for a while now many of the links shared online, especially (but not exclusively) on social networks started to look like “http://tinyurl.com/SomethingSomething”. Replace tinyurl with goo.gl or bit.ly (where in both cases the inc

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later