AI surveillance cameras can learn, remember … and forget
The AISight cameras used during the Republican convention adapt to their environment to determine if anything is amiss.
The AISight cameras used during the Republican convention adapt to their environment to determine if anything is amiss.
TrustCall system can turn almost any Android phone into a secure communication device.
A cloud-based case management system with mobile components helps veterans get back into the workforce.
Reportedly concerned about unauthorized disclosures, FDA officials installed monitoring software on some scientists’ laptops. The scientists say the action is in retaliation for blowing the whistle.
Intel's approach to managing personal devices, which includes evaluations under five general criteria, could be of interest to agencies of similar size.
It would be a shame if feds were scared away from information-rich conferences like Black Hat because of the excesses of some GSA managers.
The NSA's chief says attacks on U.S. critical infrastructure increased 17-fold in two years, while Iran's nuclear program continues to be a target.
Smart meters have an optical port that, if attacked, can let someone change the way they operate, a researcher says at Black Hat.
The theft of Yahoo passwords, including those of government users, highlights the problem with weak authentication. But it doesn’t have to be that way.
If you have a none working LCD TV PBM now works on them. Most fixes are under 200.00