Security

An ethical hacker explains how to track down the bad guys

When a cyberattack occurs, ethical hackers are called in to be digital detectives. In a certain sense, they are like regular police detectives on TV. They have to search computer systems to find ways an intruder might have ...

Computer Sciences

Tightening up facial biometrics

Facial biometrics for security applications is an important modern technology. Unfortunately, there is the possibility of "spoofing" a person's face to the sensor or detection system through the use of a photograph or even ...

Computer Sciences

Algorithms inspired by nature sustain wireless sensor networks

Wireless sensor networks have many applications in environmental monitoring, safety and control monitoring of industrial processes, in healthcare, and in disaster management. To be effective the devices, the sensors, must ...

Security

Hackers get stuck in an evolving honeypot

Malware, malicious software, is on the rise, whether in the form of Trojans, worms, and viruses, bot-net systems, denial of service tools, and hacking programs. Antivirus, firewall, and intrusion detection systems are all ...

page 2 from 2