Researchers Develop a Secure and Anonymous Payment System That Leaves No Trace

Every day people use their prepaid cards to pay for various goods, their smartphone apps for public transport tickets, and their bonus cards for supermarkets – all the while not realizing that by doing so, they’re giving away their privacy. Most of these payment systems disclose in detail what and when users buy, consume or …

Browsers: Privacy and Security Risks

Nowadays, many websites provide a broad range of features, with capabilities being added every day. But new research shows that numerous browser functionalities are rarely used or even needed by websites; however, they pose significant privacy and security risks to users.A team of researchers at the University of Illinois, Chicago (UIC), has shown that many …

New Device Improves Wireless Signal Strength and Security

Researchers led by a team from Dartmouth College have developed an inexpensive device that could finally solve the problem of improving wireless signal strength for indoor spaces with multiple rooms. The same device also greatly improves wireless security.As Xia Zhou, who is an assistant professor of computer science at Dartmouth College explains, this single solution …

Email Security: Small Words Reveal Identity

According to new research conducted by Nottingham Trent University, it’s possible to identify the author of an email by analyzing small sequences of words they use. In fact, by analyzing as little as two words, you could reveal the person’s identity.In a new research, Dr. David Wright, who is an expert in forensic linguistics, examined …

VibWrite: New Finger Vibration-Based Security System

Engineers at the Rutgers University have created a new security system that uses finger vibrations to verify users. The technology, called VibWrite, is a low-cost security system that could be used to gain access to anything with a solid surface, including access to homes, apartment buildings, appliances, and cars.As Yingying (Jennifer) Chen, a professor in …

Boosting Security of Voice-Based Log-Ins with Wearables

Researchers at the University of Michigan have developed a wearable that could eliminate vulnerabilities in voice authentication and therefore boost the security of voice-based log-ins.Today, when talking to electronics has become perfectly normal and even essential in the Internet of Things world, it’s more important than ever to stay safe. Through our spoken interactions we …

Research Shows Digital Services Collect Unnecessary Personal Data

Recently, at an international conference about digital identities at Karlstad University, scientists have presented research about methods digital services use to collect personal data about users that may encroach their privacy.The research showed that digital services that require users to log in with a personal account often collect more than users are aware of and …

How Hospitals Can Combat Ransomware

f you thought that hacking personal computers, companies, and banks is awful, wait ‘till you hear about the hospitals. Hackers who hold a hospital’s computer system hostage as they did in the recent WannaCry attack, know that lives are on the line. Patients can suffer severe health effects when a hospital’s system is held hostage, …

New Biometric Tool Advances Computer Security

It may seem like we’re moving away from logins and complex passwords and are going towards fingerprint and retinal identification, but in fact, we’re already over that! Thanks to a team of researchers at the University of Buffalo (UB), we’re now moving towards heart scan computer identifications.The UB team has developed a new computer security …

How to Protect Internet Security Against Quantum Computers

According to experts, in just eight years quantum computers will be among us, and then, our world will change. Yes, quantum computers will help us solve many problems much faster than ever before, they will also be useful for developing advanced medicine and for calculating super-accurate weather forecasts, but they will also quite possibly destroy …

Design a site like this with WordPress.com
Get started