In this day and age, our electronic devices are a treasure chest of information. Cyber espionage is the act of obtaining said private information without permission from the rightful owner in [...]
Washington, DC and Bethesda, MD – November 20, 2013 — KoolSpan, developer of a suite of patented hardware-based mobile security applications, will join a select group of leading U.S. [...]
Thanksgiving is undoubtedly the busiest travel time of the year with notorious transportation delays, traffic and travel snags. As we rely more and more on our mobile devices while we travel, [...]
Generally speaking, a bifurcation is the place where something divides into two branches. However, in the field of biometrics, which is used in cyber security as a form of identification and [...]
Single-factor authentication, usually in the form of a password, has proven to be an inadequate security solution for many companies and individuals as cyber security threats have increased. To [...]
Like forensic science, the goal of computer forensics is to perform an investigation on a computer or mobile device in order to analyze and preserve evidence from the device for use in a court of [...]
Russia has installed a surveillance system at the site of next year’s Winter Olympic Games in Sochi that will allow security services to monitor all phone and web traffic of athletes and [...]