Internet-connected toys (IoToys) offer children opportunities to play and learn, and also educational support thanks to their interactive and personalized features. IoToys, like any other Internet of Things (IoT) devices, contain embedded electronics and computing elements, such as microphones, cameras, sensors of various kinds, which enable them to interact with users and adapt to their …
De nos jours, la cybersécurité est aussi essentielle qu’omniprésente. Les utilisateurs finaux doivent être prêts et disposés à participer à la protection de leurs informations. Afin de s’assurer que les utilisateurs se conforment à la protection de leurs données, il est essentiel que les dispositifs mis en place soit faciles d’utilisation et de garder, par …
Nowadays, cybersecurity is as essential as it is ubiquitous. End-users have to be willing and able participants in the protection of their information. In order to ensure user compliance with data protection, the mechanisms put in place must be easy to use and, thus, it is essential to keep the user in mind when conceiving …
When Pennsylviania State University decided to change their two factor authentication system Jake Weidman and Jens Grossklags took advantage of the situation to look at the transition from an organisational perspective. Their paper “I Like It, but I Hate It: Employee Perceptions Towards an Institutional Transition to BYOD Second-Factor Authentication” provides some interesting insights. They …
People often make predictable passwords. They use common methods to create passwords such as common words, substituting characters or using patterns on the keyboard. Blase Ur from the University of Chicago and a team from Carnegie Mellon University developed and evaluated a password security meter that provides a more accurate rating of password strength and …
Apple Pay was launched more than 3 years ago to provide a “fast and secure” method of payment and quickly became very popular in the US. It was shortly followed by Android Pay which is also becoming popular. However, not everyone uses these systems despite their claimed security, convenience and speed. Jun Ho Huh, Saurabh …