Retinal recognition: pros and cons
In Part 1 of this series, Ravi Das looked at an overview into and the process of retinal recognition, which he describes as the...
Cybermarket for forged identity documents
The online market of forged identity documents is quickly evolving. Sellers of these documents operate both on the surface Web and on the deep...
Hand geometry recognition: pros and cons
Ravi Das
The biometric template creation process of hand geometry recognition
To start the enrolment process with a hand geometry recognition system, a combination of both...
The new German ID card: one year on
With the new German ID card and the IT systems working in the background, electronic identities have become the key to trustworthy activities on...
The types of malware injection attacks
Introduction
The cloud computing infrastructure is susceptible to malware injection attacks. In these instances, the cyber attacker creates a malicious application and injects it into...