Single Sign-On Technology Boosts Password Security
The number of Internet services is continuously increasing. This goes along with the need to create more user accounts, which have to be protected by adequate, ideally unique identifiers (ID) and...
View ArticleYour Phone is Only YOUR Phone – Fingerprint ID on Your Mobile Phone
Fingerprints are the impressions that are left by the finger friction ridges of any individual. All fingerprints are unique. They differ from person to person and can be used for identifying different...
View ArticleThinking Your Password to Login – Brainwave Readers Will Make It Possible
Password protection is an ongoing security issue. People may see you typing your password and steal the login information. That passwords get hacked through a smart computer algorithm is getting a...
View ArticleObject-recognition Software – Why is the Error Rate that High?
Humans recognize most objects in images and videos even when the objects are shown from different viewpoints, vary in sizes and scales or are transformed, converted or rotated. They also can identify...
View ArticleNew Algorithm to Fight Click Fraud
Advertising is found on most free websites and smartphone apps. Click-spam is defined as fraudulent or invalid clicks on online advertisements when users have no actual interest in the site of the...
View ArticlePulseWallet – The Wallet that Knows You by Your Blood Flow
Security and privacy are hot topics and there is ever more technology developed to make the access to systems more secure. Advanced approaches are using biometric characteristics of users e.g....
View ArticleDigital Data Privacy in Healthcare – Opportunities vs. Challenges in Using...
Data security and privacy are ongoing hot topics. With growing data volumes in different industries and higher activity of hackers finding leaks in the protected networks it is getting ever more...
View ArticleA New Generation of Computer Viruses Spreading via WiFi
Computer viruses are malware that can replicate themselves by inserting their copies in the original or a modified version into other computer programs, data files or the boot sector of the hard drive....
View ArticleHow to make Networks Safer?
Digital networks are connecting our world. One big fear of the modern society is that those networks get disconnected and communication is breaking down. Disasters of natural and/or human origin can...
View ArticleLogin without a Password? – Yes, Zero-Interaction Authentication
Today, most technological systems use passwords as a security measure to protect personal information. However, most commonly used password systems don’t have the capability to stop hackers from...
View Article
More Pages to Explore .....