Category: Technical Articles

Technical papers written in the field of wireless sensor networks

Second Security Bypass Detected in Credit Cards

After the discovery of a loophole in some credit cards, ETH researchers have now figured out a way to bypass the PIN codes for other payment cards. Contactless payment is very important, especially during these trying times to help reduce…

New Executive Order by Biden to Address Chip Shortage

On Wednesday, President Joe Biden signed an executive order to address the worldwide chip shortage affecting a vast range of industries; from electric vehicles to medical supplies. The order consists of a 100-day review of essential products including semiconductors and…

The Challenges of Online Voting Discussed by Experts

The use of technology in electronic voting for elections has been a constantly discussed topic for years. It has the potential to reduce the stress associated with manual voting and collate results faster and more accurately. However, it is not…

Singapore With Wide Tech Talent Gap as Tech Giants Scale Up

Every day, Singapore-based Software Engineer Xiao Yuguang is approached with job offers from at least three recruiters. Xiao’s skills have been in high demand since his graduation in 2014 with a degree in Computer Engineering. However, since his recruitment into…

Filling of Gender Gap in Cyber Security Sector

While the pandemic led to an exponential increase in remote working and more attempts for hackers to exploit systems, it inadvertently led to an increased need for cyber security analysts. ‘People are starting to understand the role of cyber security…

Remote Workers Battle Home-Working Security

As employees have been working from home for the past year, there have been an increase in the rate at which organizations witness malware attacks in remote devices. The coronavirus pandemic has resulted in more remote working than ever before…

Will We Be Able to Control Superintelligent Machines?

While great advances are being made in Artificial Intelligence (AI), some scientists have forewarned us of the risks of a super-intelligent AI that may be difficult to control. Making use of theoretical calculations, an international team of researchers, inclusive of…

Backdoor in Zyxel Devices. Make Sure You’re Patched

Recently, a backdoor built into Zyxel device models was discovered and is being exploited by hackers. These device models are used by multitudes of people as VPNs, firewalls and wireless access points. According to a researcher from a Netherlands-based security…