Decision time? Read Gizmag's latest product comparisons

Authentication

ZEBRA matches keyboard and mouse input with movement data transmitted by an electronic bra...

There are already a variety of technologies for verifying a computer user's identity when they attempt to access sensitive data ... data such as patients' health records on hospital computer systems. The problem is, those users may sometimes forget to log off when they're done, or they may temporarily leave their computer unguarded when leaving their desk. That's why Dartmouth College computer science student Shrirang Mare is developing ZEBRA. It utilizes a sensor-equipped bracelet to continuously authenticate a user's identity.  Read More

The Mobile Authentication via Retina Scanner (MARS) prototype is compact and portable (Pho...

Retinal scans have a lot going for them as a form of identification. You can’t forget your retinas, they're unique, they’re a lot harder to steal than passwords, and Captain Kirk uses them. The problem is, the technology needed to run a reliable retinal scan is often bulky, expensive, and hard to use. Scientists at the Dresden-based Fraunhofer Institute for Photonic Microsystems (IPMS) have shrunk down retinal scanning technology in the hopes of making retinal scans a more widespread identification technology.  Read More

Olive oil counterfeiters may be thwarted by DNA particles, that are mixed into the liquid ...

When most people think of counterfeit goods, they probably picture things like handbags or watches. In fact, there's also a huge market for knock-off high-end food products, such as extra-virgin olive oil. Scientists from Switzerland's ETH Zurich research group, however, have come up with a possible method of thwarting the makers of that bogus oil – just add synthetic DNA particles to the real thing. And yes, consumers would proceed to swallow those particles.  Read More

The Heartbleed Bug has shown how fragile passwords can be as a means of secure authenticat...

As a result of the Heartbleed bug that has made data on two-thirds of the world's servers potentially accessible to hackers, users have been told to change their passwords. It goes to show that not only is the security of passwords fragile, but they are impractical too. So what are the alternatives?  Read More

Looking for something? Search our 28,719 articles