Security
Fujitsu develops technology to block facial authentication fraud
Fujitsu Laboratories has announced the development of a facial recognition technology that uses conventional cameras to successfully identify efforts to spoof authentication systems. This includes impersonation attempts in which a person presents a printed photograph or an image from the internet to a camera.
How GOV.UK will verify new influx of benefit applicants with selfies
Mitek and Digidentity, a digital identity verification solutions provider in Europe, have securely scaled operations to enable faster onboarding of those registering with GOV.UK Verify. Working together, Mitek and Digidentity ensured processing speeds of up to 400 applicants per minute to accommodate the growing need for UK nationals and residents to apply for government services, including Universal Credit, during the pandemic.
Defending the IIoT
By creating a world in which physical objects seamlessly integrate into the information network, transferring data between themselves and the cloud, the IIoT is transforming everything from wind turbines and factory automation to critical infrastructure. However, with this smart, connected world comes an increased and very real threat of cyber attacks. Josef Haid of Infineon Technologies explains.
The anatomy of security microcontrollers for IoT
At a time when implementing security in embedded designs seems an overwhelming task, microcontrollers (MCUs) specialising in security features are coming forward to enable security at the inception of the embedded design. That’s a good thing, because there’s no question that a new breed of embedded solutions is needed to secure the Internet of Things (IoT) applications. Rolf Horn, Applications Engineer at Digi-Key Electronics, explain...
Paessler and Flowmon deliver security for IT networks
Paessler has announced an alliance with global network intelligence company, Flowmon Networks to offer more extensive IT monitoring and security for IT networks combined with in-depth analysis. IT monitoring specialist Paessler and Flowmon Networks have integrated their solutions to bring together comprehensive IT monitoring capabilities with AI-powered analysis and advanced security features. The integration ensures availability, performanc...
3D printing poses a growing threat to people’s privacy
3D printing technology poses a 'grave and growing threat' to individual privacy because of the potential for products to reveal private information about individuals, experts have warned. People could use cameras, laptops or mobile phones to track and trace the origins of 3D printed objects and how they have been used if they have watermarks.
ERA Protect Alarm accredited by the BSI IoT
ERA has launched the ERA Protect Alarm, part of its next generation wireless smart security system – ERA Protect. The BSI IoT (British Standards Institute Internet of Things) accredited Alarm works with other ERA Protect products, including the Outdoor Camera and the Floodlight Camera, via the intuitive, easy to use smartphone app, which allows easy management of all components of the security system at anytime from anywhere in the world.
IoT security suite wins key endorsements
Key security endorsements have been announced by Silicon Labs. The company’s Secure Vault security suite of hardware and software technologies dedicated to securing Internet of Things (IoT) devices against growing and evolving threats has earned third-party IoT security certifications from both PSA Certified and the ioXt Alliance.
Local governments target of ransomware attacks in 2020
Local government bodies are the most likely target for ransomware attacks, according to new threat spotlight research from Barracuda Networks. The research, which identified and analysed 71 global ransomware incidents in the last 112 months, found that 44% of all observed ransomware attacks in 2020 have been aimed at municipalities.
LDRA delivers secure software development resource
LDRA has launched the Secure Software Development Resource Centre. The online portal guides developers through the phases of the software development lifecycle—from requirements, design, model, code, and verification whether developers are using traditional V-model, waterfall lifecycle, or an agile approach.