Editorial

Editorial Keystroke profiling

Also known as keystroke or typing dynamics , keystroke profiling translates into associating an individual with his/hers way of interacting with an interface via a keyboard or another device of input. This identification method can serve for authentication (it belongs to the inherence factors

IDN Homograph Attacks
Editorial IDN Homograph Attacks

IDN homograph attacks belong to the #phishing strategies. Usually the bait emails include a spoofed (homograph) internationalized domain name (IDN). Creating such IDNs is based upon the identical appearance of different logical #characters. Also known as script #spoofing, the hacking technique uses

The bad side of cloud
Editorial The bad side of cloud

Cloud computing and cloud storage provide network access to a shared virtual space, in order to use computing resources or to store data. Although seen as a continuation of the 70’s RJE (Remote Job Entry) and of the 80’s VPN (Virtual Private Network), cloud computing in its current sense dates from

Tokenization – security’s knight in shining armor?
Editorial Tokenization – security’s knight in shining armor?

#tokenization translates as replacing sensitive data elements with their non-sensitive equivalents. The value of the resulting elements being non-exploitable, this #security procedure is supposed to reduce the risks. In order to retrace the steps back to the original sensitive data, the

Air gapped computers – security issues
Editorial Air gapped computers – security issues

The air gap or air wall technique implies isolating one or more computers from unsecured networks. It can be implemented physically or theoretically, in the second case the isolation being realized only at a cryptographic level. Used in order to protect classified information, payment networks and

Security Trends That Dominate 2015
Editorial Security Trends That Dominate 2015

The latest types of security exploits target connected cars and airplanes . Attacks aiming the essential systems of these kind of machines take the idea of cyber warfare to a whole new level. Since firewalls cannot offer the needed degree of protection, security defense must take a dramatic turn in

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later