The technologies change, but the challenge remains the same: How can a digital system authenticate an analog human's identity?
You can log in to your smartphone by talking to it. Current security systems don't protect enough against imitators. The best way to ensure voice authentication is secure is to start with the sound.
Already becoming a darling of Wall Street, blockchain technology's biggest real benefits could come to the world's poorest people. Here's how.
Despite years of public information efforts, even simple cyberattacks still succeed. Here are five steps to avoiding having your emails appear on WikiLeaks.
The conviction of two men in relation to the sale of forged Brett Whiteley paintings indicates that Australia needs to get its act together when it comes to authenticating artworks.
If our homes and property are protected from the law, by the law, then our digital devices should be, too.
President Obama's call for better electronic gun-safety systems put a spotlight on the technologies currently in the R&D pipeline that aim to make sure only authorized users can fire a gun.
No matter how many times people are warned to set strong secure passwords, many don't. So why do people take the risk? And is there anything else they can do to be more secure online?
Invisible under normal light but fluorescent under UV light, this ink can print out unique signatures that use 'molecular encryption' to authenticate anything they tag.