Is fog more secure than cloud?

Computer scientists in Italy are working on a new concept for remote and distributed storage of documents that could have all the benefits of cloud computing but without the security issues of putting one's sensitive documents ...

Computer-generated images influence trial results

Recent cases involving the use of computer generated images as evidence in courtrooms have shown the powerful impact they can have on jury decision making. But studies show that jurors can be unduly influenced by these images ...

iPhone 5S fingerprint scanning: Thumbs up or down?

Technology to acquire and use biometric data such as fingerprints has been around for several decades and has made its way from forensic investigation to laptop computers – and now, with this week's introduction of iPhone ...

Computer programs improve fingerprint grading

Subjectivity is problematic when evaluating fingerprints, and quality is in the eye of the examiner. But three computer programs used together can give fingerprint grading unprecedented consistency and objectivity, according ...

Footwear forensics: CSI needs to tread carefully

A new computer algorithm can analyze the footwear marks left at a crime scene according to clusters of footwear types, makes and tread patterns even if the imprint recorded by crime scene investigators is distorted or only ...

Voice software helps study of rare Yosemite owls

In the bird world, they make endangered condors seem almost commonplace. The unique Great Gray Owls of Yosemite, left to evolve after glacial ice separated them from their plentiful Canadian brethren 30 millennia ago, are ...

Apple phones are AES-tough, says forensics expert

(Phys.org) -- Monday's Technology Review carries a glowing tribute to Apple iPhone security according to its author, Simson Garfinkel, a contributing editor who works in computer forensics and is highly regarded as a leader ...

Computer memory leaks a turn off

When you switch off your computer any passwords you used to login to web pages, your bank or other financial account evaporate into the digital ether, right? Not so fast! Researchers in Greece have discovered a security loophole ...

page 1 from 3