AI-powered smarthome camera uses dual lenses for dark environments
EZVIZ has announced the launch of its most advanced and highly anticipated outdoor smarthome camera, the C3X. Thanks to dual-lens camera setup, C3X produces colour video in extremely dark environments (lab test result: 0.005 lux condition), without turning on the spotlight. As a result, C3X users see authentic details in night time images, such as the colour of clothes and cars, which are routinely lost in traditional security cameras.
Advanced detection system for visibility into security and analytics of IoT devices
Sternum has announced the launch of its Advanced Detection System (ADS), an agentless data analytics solution that can be seamlessly embedded onto a wide array of IoT devices. With its analysis of data gleaned from closed source binaries from within a device, ADS is the first and only product capable of providing manufacturers with a resource-light method for detecting vulnerabilities and exploitations that pose a threat, all while enhancing...
How can blockchain support the paradigm shift in retail rents?
New Look, a fashion retailer in the UK, last week completed its second Company Voluntary Agreement (CVA) and, by doing so, sparked a ground-breaking change to the retail rental model. New Look persuaded some 400+ landlords (c. 90% of its estate) to agree to rents based on shop turnover in order to better align store costs with trading conditions: a radical demand in a sector where the rental model is traditionally built on fixed rents that only g...
Setting a global standard for cybersecurity in the IoT
The value of data in an information-driven society makes any connected device a prime target for cyber attacks. Back when devices operated offline or were only accessible physically, over short-range network links, the threat was limited; only devices that were physically accessible were at risk. By Alex Leadbeater, Chair of ETSI Technical Committee CYBER.
Online threats retain high levels as pandemic continues
The COVID-19 pandemic has touched virtually every aspect of human life—from health to housing to economy in general. With uncertainty looming over the future of physical services and remote work on the rise, many businesses and organisations have taken the opportunity to move online and put an extra effort into increasing digital presence. But this decision has been met with multiple challenges, including an ever-increasing number of c...
Secure knowledge for better cyber security
The notion that ideas become reality especially applies to cyber security in critical national infrastructure. Security breaches can result in very real losses of water or energy; but ideas around cyber threats are obscured by misconceptions around the nature of such attacks and how to deal with them. Here Sean Robinson, Service Leader of automation specialist Novotek UK and Ireland, has explained how a compact controller could negate these ...
Answering the cyber security demand in Africa
Cyber Risk Aware has been selected as the security awareness education and phishing simulation solution for Liquid Telecom, a pan-African telecommunications group, within its newly unveiled Cyber Security unit.
Fujitsu develops technology to block facial authentication fraud
Fujitsu Laboratories has announced the development of a facial recognition technology that uses conventional cameras to successfully identify efforts to spoof authentication systems. This includes impersonation attempts in which a person presents a printed photograph or an image from the internet to a camera.
How GOV.UK will verify new influx of benefit applicants with selfies
Mitek and Digidentity, a digital identity verification solutions provider in Europe, have securely scaled operations to enable faster onboarding of those registering with GOV.UK Verify. Working together, Mitek and Digidentity ensured processing speeds of up to 400 applicants per minute to accommodate the growing need for UK nationals and residents to apply for government services, including Universal Credit, during the pandemic.
Defending the IIoT
By creating a world in which physical objects seamlessly integrate into the information network, transferring data between themselves and the cloud, the IIoT is transforming everything from wind turbines and factory automation to critical infrastructure. However, with this smart, connected world comes an increased and very real threat of cyber attacks. Josef Haid of Infineon Technologies explains.