Game of drones: Big security and privacy threats and concerns
Ever since the first commercial drone was demonstrated at the Consumer Electronics Show (CES) in 2010, drones or unmanned aircraft systems (UAS) have shown...
Mitigating ransomware attacks at your business – A complete guide
Among all the malware that attacks people's data, ransomware happens to be one of the worst! Its impact is immediate and can result in...
How Virtual Private Networks (VPN) create big holes in your cybersecurity
Have you ever wondered what the digital world is like today? It is the hub of all knowledge, but yet, it comes with many...
Anti-drone systems: Interview with Lucas Le Bell, CEO of CERBAIR
The use of drones or unmanned aerial vehicles (UAVs) generates heavy deliberation and debate over the malicious uses of the technology, which can potentially...
How to prevent brute-force attacks on Remote Desktop Protocol (RDP)
The number of people working from home has risen astronomically this year due to COVID-19. Consequently, numerous companies have been reliant on remote desktop...
Top security risks of dedicated short-range communication (DSRC)
Most modern vehicles use dedicated short-range communication (DSRC) technologies to enable reliable and very high data transmission between vehicle-based devices and active safety applications...
Hacking an autonomous vehicle – Common attacks and vulnerabilities
Autonomous vehicles (AVs) incorporate several key technologies to enable driverless, safe, and efficient transportation. They use sensor technology and advanced driver assistance systems to...
Six emerging biometric technologies – Pros and cons
For thousands of years, we have been identifying our fellow human beings based on their voice, appearance, or gait. However, a scientific and systematic...
Iris Recognition vs. Retina Scanning – Pros and Cons
Traditional authentication systems require the user to perform the cumbersome task of memorizing numerous passwords, personal identification numbers (PIN), pass-phrase, and answers to secret...
Busting myths about biometric identification and authentication
Biometric authentication is an automated method of identifying or verifying a living person's identity in real-time, based on distinctive personal traits or physiological characteristics,...
Fingerprint Recognition System (FRS) – Benefits and challenges
Fingerprint recognition is a biometrics-based pattern recognition system widely used to identify or authenticate a person by determining the authenticity of the fingerprint, an...
Must-read reports on safety and security in autonomous vehicles
Safety and security are among the primary requirements of autonomous and high automation vehicles. Why? Because an autonomous driving system (or driving automation system...