Many of us have seen fingerprint and eye scanners used in futuristic movies as a form of security, but now the examination of biological data from unique traits like your heartbeat to your [...]
Many of us remember the days when the only way to connect our multitude of devices was with a tangled mess of cables. Luckily, today we are able to avoid those pesky wires with Bluetooth [...]
The successor to Secure Sockets Layer (SSL) protocol, the original internet massage transmission security tool, today the Transport Layer Security (TLS) protocol is used for ensuring privacy [...]
The “Internet of Things” is a catch-all phrase that has been hot in the headlines recently. With the influx of wearables into the consumer spotlight, mostly led by Google Glass and [...]
An important feature in many software programs and mobile applications, geofencing makes use of global positioning systems (GPS) and radio frequency identification (RFID) technologies by creating [...]
With connected cars becoming the way of the future, it’s easy to wonder how drivers will keep their vehicles safe from hackers finding their way into the internal computer of the car. And [...]
Up until recently, it was believed that isolated devices with no internet or phone connection were unhackable without direct, physical access. However, a recent study from the German Fraunhofer [...]
With the frequency of data leaks increasing, cyber criminals are getting more and more practice with decrypting the data and making use of what they obtain. An independent researcher in the [...]
As the number of active zombie devices continues to increase, so does the number of DDoS attacks. When several compromised devices attack a single system during a DDoS attack, the surge of [...]
As physicians, nurses, and patients increasingly use mobile devices to communicate sensitive health information, it’s important to remember that there are strict protocols to adhere to when it [...]