Category: Security

Security Technologies: An Industry Perspective

Security has always been about maintaining the initiative over potential threats using a balance of people, procedures and technology. As organisations seek enduring, cost-effective and proportionate security solutions, this balance point continuously moves with the ever-increasing capability of security technology.…

Security Solution For Man-in-the-Browser Attacks

A security solution developed by Cronto that protects against Man-in-the-Browser attacks, one of the most serious threats to online banking customers, and which is responsible for millions in annual losses to the banking sector, is being rolled out across Europe…

Can You Trust Your Car?

Wireless systems are being integrated into modern automobile. However, the security and privacy implication of those systems are not well understood as many of their communication protocols are proprietary.  New anti-theft technologies have made today’s cars much harder to steal,…

MIT Researchers Showcase Public-key Encryption Enhancement

MIT researchers show how to secure widely used encryption schemes against attackers who have intercepted examples of successful decryption. “According to Huijia Lin, a postdoc at MIT’s Computer Science and Artificial Intelligence Laboratory “In real life, maybe it seems more…

Student Guide: Principles of Wireless Sensor Networks

This is to help undergraduate student and others to understand the Principles of Wireless Sensor Network. We all know that WSNs have the potential of dwarfing the revolution that the Internet has brought to the world of computing, entertainment, work,…

Intruders Are Red Alert To Strike

Researchers have come to realise that data can be intercepted based on what was sent, whom it was sent to, when the message was sent and where the message was sent from and to. They are also considering the level…

Energy Conservation in WSN Nodes Security Application

Energy conservation is one of the challenging issue among numerous stringent requirements for the implementation of WSN security using key management. There are many ongoing research aimed at realising a practical and robust keying model that tends to address this problems.…