Password protection is an ongoing security issue. People may see you typing your password and steal the login information. That passwords get hacked through a smart computer algorithm is getting a bigger problem.
The alternative of using fingerprint and retina scans or facial or voice recognition is much more secure than physical passwords are but also comparable slow, unpleasant and costly.
As presented at the 2013 Workshop on Usable Security at the 17th International Conference on Financial Cryptography and Data Security in Okinawa, Japan, there may be a new solution for these problems.
A study by the School of Information led professor John Chuang explored the possibility to replace password authentication by using brainwave measurements (electroencephalograms (EEGs). Continue reading “Thinking Your Password to Login – Brainwave Readers Will Make It Possible” »
Internet and cloud security and protecting your devices such as desktop PC, mobile phone or the tablets is a continuing matter of concern.
Most account providers have reacted and request a minimum length of passwords with capital letters, numbers and eventually even special characters to increase security.
Because long passwords are more difficult to remember, it is often suggested to create passphrases that easy to recall and strung the words together to form a long password.
For instance, “the sun shines bright” becomes “thesunshinesbright”. Continue reading “What is a secure password?” »
Fingerprints are the impressions that are left by the finger friction ridges of any individual. All fingerprints are unique. They differ from person to person and can be used for identifying different individuals.
So why don’t use these differences to identify users of electronic devices? … we do!
Since more than 10 years electronic fingerprint readers are used for security applications such as log-in authentication for the identification of computer users. In 2006, fingerprint sensors became more popular to be used on some notebook PC. Continue reading “Your Phone is Only YOUR Phone – Fingerprint ID on Your Mobile Phone” »
The “Internet of Things” (IoT) aims to improve overall systems efficiency and to simplify data-sharing across powered networks, public facilities and physical infrastructure. Its goal is to improve consumer goods, sales and transportation, security and even individuals’ wellness.
This blog article will give some examples how the IoT is used to improve security in our daily life. Continue reading “The Internet of Things – Intelligent Security Monitoring” »
The number of Internet services is continuously increasing. This goes along with the need to create more user accounts, which have to be protected by adequate, ideally unique identifiers (ID) and passwords.
Today most Internet users have probably multiple IDs and passwords for their different accounts.
Who doesn’t feel overwhelmed by all of this? And honestly, we all are probably re-using our IDs and passwords over and over again, which however, may cause significant security holes. Continue reading “Single Sign-On Technology Boosts Password Security” »
Network devices produce high amount of information, so called ‘Big Data’. Most of this information is used for statistical analysis of user behaviors and for getting insight into web site performances.
Network data is also recognized to be of high value for real-time security and defense strategies to create tactical, self-defending networks. One of today’s hottest topics is the potential for Big Data technologies and techniques to help address information security (InfoSec) problems.
Combining virtual infrastructure that modern companies use, Big Data will improve organizations’ capability to react rapidly to cyber threats and to adjust their infrastructure to immediately improve the cybersecurity and defend attacks. Continue reading “Big Data – A Future Strategy for Tactical Security Networking” »
“Money” comprises a multifaceted ecosystem of private and public sector institutions which keeps on going digital, is probably getting virtual and possibly becoming universal.
“Digital currencies” is used as the collective term for financial cryptography and its enabling technologies including electronic money (e-money), electronic currency (e-currency), electronic cash, digital cash, cyber currency, Electronic Funds Transfer (EFT), direct deposit, digital gold currency (DGC) and more. Continue reading “The Digitalization of Money” »
Recent discoveries, that facial recognition applications can easily abused to gain sensitive information about users, induced a new debate about privacy and security regulations for digital identification methods.
In today’s digital age, users continually expose their personal information using cell phones, communicating through social networks, through online shopping and by sending email and other web applications. Each individual leaves behind trails of personal information.
To prevent unauthorized access to such information passwords and PINs are used. Continue reading “Facial Recognition” »
In the financial services and banking industry, Big Data isn’t a choice anymore – it is the new reality, because it continues to be flooded with global data from financial transactions, customer interactions, demographic information, social media data and records relating to financial and purchasing behaviors. Continue reading “The Need for Global Financial Data Solutions” »
Spyware is of increasing overall concern about internet privacy.
Spyware is defined as malicious software (malware) and data collection programs sometimes called “Spybots” or “Tracking Software”, which secretly collect information about the user. Spyware may be designed for advertising – also known as adware – that consistently contains components for tracking and reporting user information. Finally, spyware may be set-up for changing the configuration of a computer.
In general, the gathering of information about a person or organization occurs without their knowledge. Continue reading “Spyware – Who is watching you?” »