TagsSecurity

Tag: security

Five Famous Cyberattacks Against Critical Infrastructure

When one thinks of a Cyberattack, what often comes to mind is the damage done to Web servers and databases. In those kinds of...

Title: How To Protect Your Smartphone – Part 2

Introduction In this article, we continue to examine some of the remediative actions that you can take to protect your wireless devices. The Best Practices Keep up...

How To Protect Your Smartphone – Part 1

Introduction Our last two articles examined the major threats that are posed to Smartphones.  In this article, we examine some of the remediative actions that...

Strategies for optimisation of security fibres

MoprJoel Zlotnick, Traci Moran and Tyra McConnell Counterfeit Deterrence Laboratory Office of Fraud Prevention Programmes Bureau of Consular Affairs US Department of State Security fibres and planchettes are among...

Can the grid protect us from terror?

In the aftermath of horrific events such as the recent terrorist attacks in Paris, Nice, Manchester, Kabul and London or anywhere else, many of...

Creating confidence

The sovereignty of a State entails the duty to protect the identity of its citizens. The challenge is to create a successful trusted digital...