Finding fake fingerprints

It was once the stuff of science fiction security, open your eye wide and look into the camera to gain entry to the spaceship flight deck or press a finger tip or palm of your against the pad to access the secret database ...

Tracking security staff at large-scale events

Spectacular fireworks, a large crowd, and music with a driving beat—on the first weekend in May the Rhine in Flames event will set the large parks along the Rhine in Bonn topsy-turvy. In 2019, a team of researchers from ...

Top Australian university reports vast, 'sophisticated' hack

A top Australian university with close ties to the country's government and security services on Tuesday said it had been the victim of a vast hack by a "sophisticated operator" who gained access to 19 years of sensitive ...

Watchdog says FBI has access to about 640M photographs

A government watchdog says the FBI has access to about 640 million photographs—including from driver's licenses, passports and mugshots—that can be searched using facial recognition technology.

Biometric recognition technology in the workplace

In Back to the Future II (1989), fingerprints are used to lock and unlock doors. It's a benign technology, apart from the rise of "thumb bandits" who amputate thumbs. Gattaca (1997) envisages a bleaker future, where corporations ...

ARCHANGEL: Securing UK national archives with AI and blockchain

The University of Surrey is using its state-of-the-art blockchain and artificial intelligence technologies to secure the digital government records of national archives across the globe—including the UK, Australia and the ...

Vulnerability of cloud service hardware uncovered

Field-programmable gate arrays (FPGAs) are kind of like a computer manufacturer's Lego bricks: electronic components that can be employed in a more flexible way than other computer chips. Even large data centers that are ...

page 6 from 297