The states’ handover of driver licence data for a beefed up national facial biometric matching capability would only bring existing arrangements into ‘real time’.
What are Chinese hackers after in U.S. computer systems?
BeeBright/Shutterstock.com
The cyberthreat from China is one more of espionage than destruction. And it’s changing – perhaps even lessening.
There’s a global war going on, and a global arms race to go with it. It’s not a race for physical weapons, it’s a race to develop cyber weapons of psychological, emotional, financial and infrastructure attack.
(Shutterstock)
Hostile foreign powers and even tech companies are not attacking us with bullets and bombs; they’re doing it with bits and bytes. It’s Cyber Security Awareness Month, so what to do about the third world war being waged in cyberspace?
It’s not so easy to keep up with technology.
alphaspirit/Shutterstock.com
Richard Forno, University of Maryland, Baltimore County
The modern world depends on critical systems, networks and data repositories that are not as secure as they should be. Breaches will continue until society as a whole makes some big changes.
Scholars have ideas about how to help solve our password problems.
vladwei/Shutterstock.com
While security researchers are yet to perform a thorough analysis of iOS 11 and Face ID, past issues with the hardware and software of the iPhone point to areas of potential concern.
Using solar power could give the U.S. military some advantages – and more security.
Diane Durden/U.S. Marine Corps
US military bases usually get their electricity from the civilian grid, which is vulnerable to attack and to disaster. Solar-powered microgrids could protect national security, and would save money.
It’s impossible to be certain of safety while using Gmail, Yahoo mail and other web-based email systems. The best solution is a radical one: It’s time to return to plain, text-only email.
Are Australian police doing enough with the data they have?
REUTERS/Phil Noble
Support from overseas law enforcement and tech companies is typically a slow and cumbersome process.
Embedded medical devices will continue to be vulnerable to cybersecurity threats. The pacemaker depicted is not made by Abbott’s.
REUTERS/Fabrizio Bensch
Recent federal changes to password-strength guidelines echo the findings of research we’ve been doing. It’s time to think differently about what makes a password secure.
Hackers will start to get help from robots and artificial intelligence soon.
Jinning Li/Shutterstock.com
As companies make quantum computers available through their cloud services, take a look at what it means for computing to move beyond classical mechanics and into quantum physics.