The Central Bank of Nigeria has capped newly activated mobile banking app transactions at N20,000 within 24 hours to ...
Abstract: Blockchain systems encompass many distinct and autonomous entities, each utilizing its own self-contained identity authentication algorithm. Unlike identity authentication within a singular ...
A threat actor tracked as Storm-2561 is distributing fake enterprise VPN clients from Ivanti, Cisco, and Fortinet to steal ...
The global payments ecosystem is undergoing a fundamental transformation. For decades, transaction security relied on static rules and reactive fraud detection. Today, artificial intelligence is ...
Microsoft Authenticator Flaw on Android, iOS Could Leak Login Codes for Millions Your email has been sent A newly discovered vulnerability in Microsoft Authenticator could expose sensitive login codes ...
The Central Bank of Nigeria (CBN) has issued new baseline standards requiring banks and other financial institutions to deploy automated ...
Abstract: Authentication is an important security issue for multi-access edge computing (MEC). To restrict user access from untrusted devices, Bring Your Own Device (BYOD) policy has been proposed to ...
Abstract: This survey provides an insightful overview of recent advancements in facial recognition technology, mainly focusing on multi-modal face recognition and its applications in security ...
A new phishing campaign is impersonating Google’s account security checks to trick users into installing a malicious web app that steals passwords, passcodes, and other sensitive data directly from ...
Abstract: With growing frequency and sophistication of cyber threats, there is an urgent need for more adaptive, secure multi-factor authentication systems. Traditional approaches often tend to make ...
As of March 2, 2026, coordinated United States and Israeli airstrikes and Iran’s subsequent response have resulted in active military operation, including retaliatory missile and drone ...
Abstract: The Medical Internet of Things (MIoT) plays a pivotal role in modern healthcare by integrating wireless communication and cloud computing to enhance medical practices. However, this ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results