Fingerprints are the impressions that are left by the finger friction ridges of any individual. All fingerprints are unique. They differ from person to person and can be used for identifying different individuals.
So why don’t use these differences to identify users of electronic devices? … we do!
Since more than 10 years electronic fingerprint readers are used for security applications such as log-in authentication for the identification of computer users. In 2006, fingerprint sensors became more popular to be used on some notebook PC. Continue reading “Your Phone is Only YOUR Phone – Fingerprint ID on Your Mobile Phone” »
The number of Internet services is continuously increasing. This goes along with the need to create more user accounts, which have to be protected by adequate, ideally unique identifiers (ID) and passwords.
Today most Internet users have probably multiple IDs and passwords for their different accounts.
Who doesn’t feel overwhelmed by all of this? And honestly, we all are probably re-using our IDs and passwords over and over again, which however, may cause significant security holes. Continue reading “Single Sign-On Technology Boosts Password Security” »
Network devices produce high amount of information, so called ‘Big Data’. Most of this information is used for statistical analysis of user behaviors and for getting insight into web site performances.
Network data is also recognized to be of high value for real-time security and defense strategies to create tactical, self-defending networks. One of today’s hottest topics is the potential for Big Data technologies and techniques to help address information security (InfoSec) problems.
Combining virtual infrastructure that modern companies use, Big Data will improve organizations’ capability to react rapidly to cyber threats and to adjust their infrastructure to immediately improve the cybersecurity and defend attacks. Continue reading “Big Data – A Future Strategy for Tactical Security Networking” »
The year 2012 is almost over and it is time to focus on 2013.
Recently, “The Georgia Tech Emerging Cyber Threats Report for 2013” was released that summarizes what Cybersecurity threats are expected in the next year. Continue reading “What will be the Cybersecurity threats of 2013?” »
The openness and interconnectedness of the internet is advantageous but also bears risks for commerce and consumers, private information exchange and sensitive data management. Using the web makes shopping, sharing information and using financial and medical apps extremely fast and suitable but it also opens door for information misuse while transferring data, such as credit card numbers, addresses and shopping preferences.
To reduce the threats of data theft, different encryption technologies have developed that make sure that only authorized persons or organizations are able to decipher sensitive information.
Encryption is defined as the translation of data into a secret code to create and maintain most operative data security. Encryption has it foundation in cryptography, which is the science of codes and ciphers to guard secret information. Continue reading “Encryption Technology – Securing your Information” »
Recent discoveries, that facial recognition applications can easily abused to gain sensitive information about users, induced a new debate about privacy and security regulations for digital identification methods.
In today’s digital age, users continually expose their personal information using cell phones, communicating through social networks, through online shopping and by sending email and other web applications. Each individual leaves behind trails of personal information.
To prevent unauthorized access to such information passwords and PINs are used. Continue reading “Facial Recognition” »
Automated test cases: Bigger companies require it, start-up companies should have it – do you consider it?
As each airline needs to test the functionality of their aircrafts to guarantee complete safety for their passengers, today’s software engineering teams need to test their software to guarantee full functionality and security for their applications. Or do you want that financial apps calculate close-to but not quiet matching data, doctors give wrong recommendations due to an error in a decision-support systems or social app share by default sensitive information to everybody? Continue reading “Automated Test Cases: Would You Board an Aircraft without Back-up Check?” »
Spyware is of increasing overall concern about internet privacy.
Spyware is defined as malicious software (malware) and data collection programs sometimes called “Spybots” or “Tracking Software”, which secretly collect information about the user. Spyware may be designed for advertising – also known as adware – that consistently contains components for tracking and reporting user information. Finally, spyware may be set-up for changing the configuration of a computer.
In general, the gathering of information about a person or organization occurs without their knowledge. Continue reading “Spyware – Who is watching you?” »
Phishing is the fraudulent act of sending emails (or phone calls), misleadingly claiming to be a legitimate business, to lure an individual into providing sensitive information such as banking information, social security numbers, credit card details and passwords that will be used for identity theft.
Cybercriminals may use social engineering to convince users to install malicious software or deceive them to reveal personal information. Continue reading “Cyber Security Threats IX – Phishing” »
Spam is defined as the abuse of electronic messaging systems to send unwanted bulk messages to many people typically for advertising or marketing on the internet.
Sending spam messages is called spamming. People who send spam are called spammers collecting email addresses from numerous sources but, furthermore, buy them from email addresses selling companies. Continue reading “Cyber Security Threats VIII- SPAM” »