Sources on this Page

> Headlines by Category

 Home / Technology / Security / Authentication & Encryption

You are using the plain HTML view, switch to advanced view for a more complete experience.

The 10 geekiest Twitter accounts you should follow
Add a new burst of nerdery to your Twitter feed with these 10 accounts.
FREAK flags are waving across the digital landscape
FREAK flags are waving across the digital landscape, now that another SSL bug has appeared. Jack Wallen offers up his take on the latest flaw and how you can test your servers agai...
Channel Bindings for TLS based on the PRF
10 ways IT can hit the ground running in 2015
Kick off the New Year with these smart practices for propelling your IT department -- and your company -- toward success.
10 easy ways to ruin your smartphone
One minute you have an indispensable high-tech tool... and the next minute, you have a doorstop. Avoid the cost and inconvenience of a damaged smartphone by following a few best pr...
Samsung's big power play is packed in a small chip
Jack Wallen is ready to eat his words with regards to the demise of Samsung as a powerhouse smartphone manufacturer. A new chip could be just what the once-giant of the industry ne...
CTB-Locker virus: How to protect your systems, and what to do if infected
Jesus Vigo examines the CTB-Locker virus, its effects on your data, and how to best protect your computer from this ransomware infection.
Multimodal Biometric Authentication Using ECG and Fingerprint
Biometric system is a very important recognition system which is used for individual verification and identification. Various types of biometric traits are used in today's world, i...
An FPGA Based Minutiae Extraction System for Fingerprint Recognition
Fingerprint holds a higher priority among other identification techniques such as passwords, keys and ID cards. Biometric systems which include fingerprint recognition, is essentia...
A Multimodal Behavioral Biometric Technique for User Identification Using Mouse and Keystroke Dynamics
A novel multimodal behavioral biometric technique is implemented to authenticate/identify users by the way they interact with the input devices namely mouse and keyboard. It is als...
Post Selected Items to:

Showing 10 items of 48

home  •   advertising  •   terms of service  •   privacy  •   about us  •   contact us  •   press release design by Popshop •   Official PR partner B2BLogger.com •   © 1999-2015 NewsKnowledge