Iris Recognition vs. Retina Scanning – Pros and Cons
Traditional authentication systems require the user to perform the cumbersome task of memorizing numerous passwords, personal identification numbers (PIN), pass-phrase, and answers to secret...
Busting myths about biometric identification and authentication
Biometric authentication is an automated method of identifying or verifying a living person's identity in real-time, based on distinctive personal traits or physiological characteristics,...
Fingerprint Recognition System (FRS) – Benefits and challenges
Fingerprint recognition is a biometrics-based pattern recognition system widely used to identify or authenticate a person by determining the authenticity of the fingerprint, an...
Must-read reports on safety and security in autonomous vehicles
Safety and security are among the primary requirements of autonomous and high automation vehicles. Why? Because an autonomous driving system (or driving automation system...
Defending airports from drones: Counter-drone technologies
Airports differ in size, capacity, air traffic, and proximity to populated areas. But some hazards associated with drones or unmanned aerial vehicles (UAVs) are...
Top AI surveillance techniques used by governments worldwide
AI surveillance technology is spreading faster than anyone anticipated before. At least 75 leading countries worldwide are actively using intelligent video surveillance technologies that...
Intelligent video – The next big trend in IP surveillance
IP surveillance is rapidly becoming the most flexible and future-proof option for security and surveillance for businesses, warehouses, and campuses, which have plenty of...
Are we giving up our privacy in the middle of COVID-19?
Before 2020, most people had some reservations about the idea of robots and AI, taking on more significant roles in our everyday social life....
Alias Robotics’ CEO Endika Gil-Uriarte talks about Robot Immune System
Meet Endika Gil-Uriarte, CEO of Alias Robotics, which is a Spanish startup specialized in robot cybersecurity. Trained in Biological Sciences, Endika is a former...
Four robot-specific cyber attacks on industrial robots
Mechanically, industrial robots may like an arm with two or more joints terminated by an end effector that interacts with the environment. But they...
What to do if a drone is spying on you – How to react?
Have you ever had the unusual sight of an unmanned aerial vehicle (UAV), commonly known as a drone, peeping you through your window? And...
Anonymous shipping services: Advantages and disadvantages
With online shopping, anyone can enjoy the comfort and convenience of the doorstep delivery of essential products. Without the hassle of driving to any...