Computer memory leaks a turn off

When you switch off your computer any passwords you used to login to web pages, your bank or other financial account evaporate into the digital ether, right? Not so fast! Researchers in Greece have discovered a security loophole ...

Apple phones are AES-tough, says forensics expert

(Phys.org) -- Monday's Technology Review carries a glowing tribute to Apple iPhone security according to its author, Simson Garfinkel, a contributing editor who works in computer forensics and is highly regarded as a leader ...

iPhone 5S fingerprint scanning: Thumbs up or down?

Technology to acquire and use biometric data such as fingerprints has been around for several decades and has made its way from forensic investigation to laptop computers – and now, with this week's introduction of iPhone ...

XBox forensics

A forensics toolkit for the Xbox gaming console is described by US researchers in the latest issue of the International Journal of Electronic Security and Digital Forensics. The toolkit could allow law enforcement agencies ...

Computer programs improve fingerprint grading

Subjectivity is problematic when evaluating fingerprints, and quality is in the eye of the examiner. But three computer programs used together can give fingerprint grading unprecedented consistency and objectivity, according ...

Social-network use leads companies to boost security

When Randy Kortering decided to upgrade computer network defenses at Haworth, a $1 billion-a-year office fixtures manufacturer, his chief of security warned him about social-networking use.

Is fog more secure than cloud?

Computer scientists in Italy are working on a new concept for remote and distributed storage of documents that could have all the benefits of cloud computing but without the security issues of putting one's sensitive documents ...

page 1 from 3