General security

Notes On Biometric Template Security

In this article I am going to tell you about biometric template security and current technologies in which researchers are working to improve biometric templ

The Top 8 Ways That Privileged Accounts Are Exploited

Over the last six months the name Edward Snowden has been appearing in the news on an almost daily basis. He has appeared in articles about the US government

SSL in Dot NET – Volume 1 - Hypothesis

Abstract Typically, Internet banking and e-commerce websites are considered to be highly secure, with web mechanisms that implement more foolproof solutions

OpenVPN

Introduction In this tutorial we'll talk about OpenVPN client connection settings, which come in handy when the connection to the OpenVPN server does not wor

How to Perform a Safe Password Analysis

It's one of the most exciting moments in a security researcher's work: while looking through an obscure log file, you see strings like "James1984" and "Secur

Ten Important Privacy Threats

1. Introduction As the Internet becomes more and more important to our lives, the challenge is to enjoy the conveniences of online activities while reducing

The Debate Over Network Neutrality in the EU and the USA

1. Introduction Network neutrality (also known as net neutrality or Internet neutrality) refers to a general principle that Internet service providers (ISPs)

Privacy Implications of Automatic License Plate Recognition Technology

ALPR – Technical Specifications The majority of ALPR devices are mounted on bridges, road signs, and poles near traffic lights or outside public buildings

When APTs Attack

Countless organizations have fallen prey to cyber attacks - from high profile retailers to enterprises and government agencies. Some attacks have been high p

Android App Permissions and Security: What You Need to Know

As of this article, Android has the greatest OS market share on both smartphones and tablets. If you don't own an Android device, chances are that your frien