Sample Category Title

retinal recognition

Retinal recognition: pros and cons

0
In Part 1 of this series, Ravi Das looked at an overview into and the process of retinal recognition, which he describes as the...

Cybermarket for forged identity documents

0
The online market of forged identity documents is quickly evolving. Sellers of these documents operate both on the surface Web and on the deep...
hand geometry recognition

Hand geometry recognition: pros and cons

0
Ravi Das The biometric template creation process of hand geometry recognition To start the enrolment process with a hand geometry recognition system, a combination of both...

The new German ID card: one year on

0
With the new German ID card and the IT systems working in the background, electronic identities have become the key to trustworthy activities on...
malware

The types of malware injection attacks

0
Introduction The cloud computing infrastructure is susceptible to malware injection attacks. In these instances, the cyber attacker creates a malicious application and injects it into...