The Latest in IT Security

Posts Tagged ‘Demo’

SafeBreach researchers set out in 2015 to find the perfect method for stealing small amounts of sensitive data from highly secure organizations. While malicious actors often exfiltrate gigabytes of files from the companies they breach, key pieces of information can also be highly valuable — for example, cryptographic keys, passwords, and words or sentences that […]

Read more ...

Two researchers from Michigan State University’s biometrics group have devised a method for hacking mobile phone’s fingerprint authentication by using just a color inkjet printer, a special type of paper and ink. The first step is to scan the target’s fingerprint image at 300 dpi or higher resolution. Then, the image is mirrored and the […]

Read more ...

Self-driving cars may be the future of transportation – it’s possible that eventually they could be safer than vehicles with human drivers. But autonomous vehicles are going to need more and better defenses against the threat of #hackers and cyber-#attacks. #uber has just hired a pair of renowned #car hackers to help the alternative cab […]

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments