Electronic Engagement

 
The Danish Soccer club Brøndby IF has announced that starting in July 2019, automated facial recognition (AFR) technology will be [...]
Source: Security Magazine
We haven't exactly had a strong past year in the data security and privacy world. [...]
Source: Security Magazine
For the past several years, there has been a focus by users to assure that their card-based access control systems [...]
Source: Security Magazine
With the Level 3 integration behind it and EIS opportunities on the horizon, CenturyLink looks for more growth in the [...]
Source: Washington Technology
Programs and projects often go off the rails because of a lack of communication between contractor and customer. In this [...]
Source: Washington Technology
The Defense Department says it expects to award the massive JEDI cloud contract this summer, regardless of the outcome of [...]
Source: Washington Technology
Smart mobile devices have become almost as necessary as breathing today. A wide range of devices are available – more [...]
Source: Security Magazine
The next big Raspberry Pi thing is now here, with lots more computing power and more options. The Raspberry Pi [...]
Source: Technews
A Democrat and a Republican have filed a U.S. Senate bill to require companies to report to financial regulators and [...]
Source: Technews
The traditional federal contracting industry is entering an unprecedented period of disruption driven by commercial technologies and new business models. [...]
Source: Washington Technology
We all thought we'd have flying cars by the end of last century, but we are due to be up [...]
Source: Technews
The Threatpost team discusses the top news of the week - from a NASA cyberincident to dating app privacy issues. [...]
Source: Kapersky Threatpost - Privacy
Uber Elevate, the aerial arm of rideshare service Uber, will test a fast food delivery by drone service later [...]
Source: Technews
Analysts at ProPrivacy say the dating apps collect everything from chat content to financial data on their users -- and [...]
Source: Kapersky Threatpost - Privacy
Google's new multi-party computation tool allows companies to work together with confidential data sets. [...]
Source: Kapersky Threatpost - Cryptography
Threatpost editors Tara Seals and Lindsey O'Donnell discuss a recent lawsuit against Amazon for its privacy policies, a Telegram DDoS [...]
Source: Kapersky Threatpost - Privacy
Two lawsuits are seeking class-action status, alleging that Amazon records children and stores their voiceprints indefinitely. [...]
Source: Kapersky Threatpost - Privacy
The Windows 10 update that's rolling out addresses insecure Wi-Fi hotspots with new user notifications. [...]
Source: Kapersky Threatpost - Cryptography
Attackers have been tampering with TLS signatures at a scale never before seen using a technique called cipher-stunting. [...]
Source: Kapersky Threatpost - Cryptography
Researchers warn customers to reconsider the use of the camera’s remote access feature if the device is monitoring highly sensitive [...]
Source: Kapersky Threatpost - Cryptography

 

 Leave a Reply

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

(required)

(required)