Security

Understanding emerging blockchain identity management systems

Traditional identity management has typically involved the storing of user credentials (e.g., passwords) by organizations and third parties, which often results in concerns over interoperability, security, and privacy. However, ...

Machine learning & AI

Advanced technology may indicate how brain learns faces

Facial recognition technology has advanced swiftly in the last five years. As University of Texas at Dallas researchers try to determine how computers have gotten as good as people at the task, they are also shedding light ...

Internet

Can anyone be completely anonymous?

Research published in the International Journal of Electronic Governance has investigated whether any of five "anonymous" social media applications are secure in that they do not allow a third party to see personal data or ...

Telecom

How smartphones can verify your identity

Anyone who wants to open a bank account or buy a mobile phone plan has to identify themselves to the respective service provider. The ETH spin-off PXL Vision has a simpler solution: just use an ID scan and a selfie video. ...

Security

Cyber security of connected autonomous vehicles trialled

The privacy and security of data in CAVs has been improved thanks to WMG, University of Warwick who tested four innovations that were results of the PETRAS project. CAVs can now connect to each other, roadside infrastructure, ...

Business

eBay's new 'Managed Delivery' aims to rival Amazon

Online retail giant eBay said Thursday it would create its own "Managed Delivery" for sellers on its platform to better compete with Amazon and boost its brand recognition.

page 1 from 2