In a city in Southern California, drones using artificial intelligence are assisting investigations, while presenting a somewhat controversial question on civil rights. In Chula Vista, California, when the police receive a 911 distress call, with just the press of a…
Category: Security
Biosecurity Hazard as Scientists’ Computer Can Now Be Infected With Malware to Create Deadly Viruses or Toxins
Researchers of cybersecurity have discovered a novel kind of attack which deceives scientists into the creation of harmful chemicals or deadly viruses in their own lab. A research team from Ben-Gurion University of the Negev can infect the computer of…
MIT Researchers: Voting Risks Associated with Blockchain
Proving that the losing party did, in fact, lose in an election is an important part, one that is very difficult to solve electronically. Researchers from the Massachusetts Institute of Technology (MIT) have said that claims that “voting on the…
Exploring Opportunities in Covid-19: Artificial Intelligence & Security
IEEE Sweden board member and SMIEEE, Dr Celestine Iwendi was put on SPOTLIGHT by the students and Faculties of ILMA University, Pakistan on the 30th of June 2020. The Talk is below. Happy reading. in Pdf
What Is a CVV Shop?
Deep in the recesses of the Internet lies the Dark web. While there’s plenty of good that modern technology has provided, some parts can harm us and are best to avoid. We hear about data breaches and multimillion-dollar corporations getting…
ACO Based KMT Mechanism for WSN Security and Data Collection
[gview file=”http://www.wsnmagazine.com/wp-content/uploads/2018/02/cele.pdf”]
ICIT 2018: WIRELESS SENSOR NETWORKS: HARDWARE/SOFTWARE DESIGN ASPECTS FOR INDUSTRY
[gview file=”http://www.wsnmagazine.com/wp-content/uploads/2017/08/SS_4_ICIT2018_WSN_web_version.pdf”]
MIT’s Solve 2017 Problem Solving Global challenges
Solve has launched its new challenges for 2017, which is a good base for wireless sensor network practitioners, researchers and IoT experts to showcase why the future belongs to us. According to MIT President Rafael Reif at Solve at MIT…
The Beginning of the End of End-To-End Encryption
A paper was allegedly leaked to civil liberties body the Open Rights Group on May 4th according to the BBC reports shows a proposal in a draft technical paper prepared by the government that the British web users of the…
Mastercard onfolds a Credit card with a fingerprint sensor
A payment card featuring a fingerprint sensor has been unveiled by credit card provider Mastercard. The rollout follows two successful trials in South Africa. The technology works in the same way as it does with mobile phone payments: users must…