Computer Sciences

Tightening up facial biometrics

Facial biometrics for security applications is an important modern technology. Unfortunately, there is the possibility of "spoofing" a person's face to the sensor or detection system through the use of a photograph or even ...

Security

Hackers get stuck in an evolving honeypot

Malware, malicious software, is on the rise, whether in the form of Trojans, worms, and viruses, bot-net systems, denial of service tools, and hacking programs. Antivirus, firewall, and intrusion detection systems are all ...

Security

An ethical hacker explains how to track down the bad guys

When a cyberattack occurs, ethical hackers are called in to be digital detectives. In a certain sense, they are like regular police detectives on TV. They have to search computer systems to find ways an intruder might have ...

page 2 from 2