Sample Category Title

retinal recognition

Retinal recognition: pros and cons

In Part 1 of this series, Ravi Das looked at an overview into and the process of retinal recognition, which he describes as the...

Cybermarket for forged identity documents

The online market of forged identity documents is quickly evolving. Sellers of these documents operate both on the surface Web and on the deep...
hand geometry recognition

Hand geometry recognition: pros and cons

Ravi Das The biometric template creation process of hand geometry recognition To start the enrolment process with a hand geometry recognition system, a combination of both...

The new German ID card: one year on

With the new German ID card and the IT systems working in the background, electronic identities have become the key to trustworthy activities on...

The types of malware injection attacks

Introduction The cloud computing infrastructure is susceptible to malware injection attacks. In these instances, the cyber attacker creates a malicious application and injects it into...