The states’ handover of driver licence data for a beefed up national facial biometric matching capability would only bring existing arrangements into ‘real time’.
Hostile foreign powers and even tech companies are not attacking us with bullets and bombs; they’re doing it with bits and bytes. It’s Cyber Security Awareness Month, so what to do about the third world war being waged in cyberspace?
Richard Forno, University of Maryland, Baltimore County
The modern world depends on critical systems, networks and data repositories that are not as secure as they should be. Breaches will continue until society as a whole makes some big changes.
While security researchers are yet to perform a thorough analysis of iOS 11 and Face ID, past issues with the hardware and software of the iPhone point to areas of potential concern.
US military bases usually get their electricity from the civilian grid, which is vulnerable to attack and to disaster. Solar-powered microgrids could protect national security, and would save money.
It’s impossible to be certain of safety while using Gmail, Yahoo mail and other web-based email systems. The best solution is a radical one: It’s time to return to plain, text-only email.
Recent federal changes to password-strength guidelines echo the findings of research we’ve been doing. It’s time to think differently about what makes a password secure.
As companies make quantum computers available through their cloud services, take a look at what it means for computing to move beyond classical mechanics and into quantum physics.