News

featured item

Israeli Technology – Portable X-Ray Security Detection System

Airports, central railway stations, and other large perimeters are well equipped with X-Ray screening systems for the detection of explosives or suspicious objects. But what about screening missions in outdoor environments such as battlefields, border posts, energy installations, etc.?

A series of portable flat-panel digital x-ray inspection systems offers an effective detection solution for sectors such as security, nondestructive testing, science, and more.

featured item

New Technologies for Border Perimeter Security

The 3,323-km stretch that India shares with Pakistan is one of the most sensitive sections of its land borders. Fencing the entire stretch has been a challenge due to the difficult terrain and weather conditions. A Delhi-based startup is developing a perimeter security system for protecting India’s borders.

Kavach, developed by Cron Systems, is a laser and infrared-based fencing system that is weatherproof and can be implemented in all kinds of terrain. The company is currently piloting the system.

featured item

Cisco Jumps On IoT Security Train with IoT Threat Defense

Cisco’s new Internet of Things (IoT) security technology isn’t exactly new. Rather, it’s a bunch of existing security services and software bundled together to target IoT security and that’s exactly what makes Cisco IoT Threat Defense reliable and effective, said Cisco’s Marc Blackmer, product marketing manager for the company’s industrial solutions and security business group.

featured item

ATF Launches IoT Security Device for Construction Industry

Site safety company ATF Services has announced the launch of its Internet of Things (IoT) wireless monitoring device aimed at addressing the issue of theft on construction sites and remote locations.

According to ATF, 39 percent of residential builders in Australia have been affected by theft or vandalism at their building sites, and 61 perfect of those affected, experienced the theft of raw materials, while 46 percent experienced the theft of small hand-held tools.

featured item

Dual Biometrics May Just Be the Authentication Answer We Need

It solves a big problem with biometric authentication and opens up some intriguing possibilities

A major problem with biometric authentication is that, when it doesn’t work, there are few good options to proceed with the authentication. When the system says that’s not your eyeball, there’s no fallback akin to “Forgot your password?” You have to revert to some less discerning authentication method, such as a PIN.

featured item

Helsinki Airport Has Successfully Trialled Using Face-Recognition Technology Instead of Travel Documents

Finavia, Helsinki-Vantaa airport’s operating body, has just concluded its most advanced test of facial recognition technology to date. Run in cooperation with Finnair and digital solutions company Futurice, the test-run was conducted over a period of three weeks in May, to follow-up on a preliminary trial last year.

featured item

Cisco and IBM Team Up On Security

The enemy of my enemy is my friend, so the saying goes.

As the WannaCry ransomware attacks lit up the globe earlier this month, the security research teams at Cisco and IBM set up an open line of communication with one another as they scrambled, along with the rest of the world, to ascertain the digital worm's damage and to prevent others from falling victim. Now the pair of companies is consummating the partnership.

featured item

WannaCry Ransomware Promises Second Wave of Attacks

Investigators find clues that may lead to a connection between the ransomware and North Korea.

The latest cyber attack against computer users came from a group of anonymous hackers who wanted to raise money. The unknown hackers released a type of software called ransomware, which meant that users had to pay a fee to stop the software and get their data back. Currently, the software has infected millions of computers worldwide in about 150 countries. It has affected many government systems as well as healthcare systems. Few have paid the bitcoin ransom.

featured item

Integrating Biometrics into Visitor Screening

Next-generation technology can remedy the missing link in homeland security

The horrible attack in Manchester, coupled with the recent release of the Department of Homeland Security’s Visa Overstay Report, should again force us to ask the question, are we doing everything we can to properly vet those seeking to come to the United States?

featured item

Biometric Earbuds to Help Secure Your Devices from Hackers

Security experts always recommend users to enable two-factor authentication to secure the devices as much as possible. In two-factor authentications, users receive a one-time-password via text messages or they have to swipe their fingers across a sensor, but now NEC has come with an even easier method, as they think verifying one's identity should be done without the users having to make any extra effort.

That's why the company has developed a pair of biometric earbuds.