Wednesday, 24 de August de 2016

Noticias y opinión en Seguridad informática


New report outlines key features of next-generation public safety communications

Creation of a next-generation public safety communications network requires leadership from a single non-profit organization devoted to this purpose, according to a report released today by a federal advisory committee. Such a network would support voice, video and data transmissions, and ideally be at the disposal of all first responders—the medical, emergency, law enforcement or military personnel who are first on the scene of events that threaten public safety.

(hace 4 years, 6 months) | Seguir leyendo

'Your Password Is Invalid': Improving Website Password Practices

(hace 4 years, 6 months) | Seguir leyendo

REDIT presenta en Bruselas el libro “14 razones para innovar”

La publicación recoge 70 casos de colaboración entre empresas e Institutos Tecnológicos que son solamente una pequeña muestra de los más de 1.000 proyectos que se llevan a cabo al año

(hace 4 years, 6 months) | Seguir leyendo

EU data protection framework: is it good news for business?

(hace 4 years, 6 months) | Seguir leyendo

Megaupload user data to be deleted by Thursday

(hace 4 years, 6 months) | Seguir leyendo

Data protection tops UK security investments in 2012

Data protection will be the top security initiative for most UK organisations in 2012, a survey of IT professionals has revealed.

(hace 4 years, 6 months) | Seguir leyendo

Future and Emerging Technologies Newsletter - January 2012

(hace 4 years, 6 months) | Seguir leyendo

Botnet suspect denies involvement

(hace 4 years, 6 months) | Seguir leyendo

Facebook clickjacking legal row

(hace 4 years, 6 months) | Seguir leyendo

Could the Internet Ever Be Destroyed?

(hace 4 years, 6 months) | Seguir leyendo

IT Salaries Rising for Experienced Employees: Dice Report

(hace 4 years, 6 months) | Seguir leyendo

Mobile and social media dominate cybercrime trends in 2011

(hace 4 years, 6 months) | Seguir leyendo

Stolen Source Code Makes Symantec Software Vulnerable to Exploits

(hace 4 years, 6 months) | Seguir leyendo

Security Vendor: One Toolkit Responsible for Large Amount of Web-Based Malware

(hace 4 years, 6 months) | Seguir leyendo

Sony's 'CLEFIA' encryption technology adopted as an international standard

Sony Corporation has been working to standardize ‘CLEFIA,’ the block cipher algorithm it developed and presented as a state-of-the-art cryptography technique in 2007, and announced today that after final ISO/IEC approval, ‘CLEFIA’ was adopted as one of the ISO/IEC 29192 International Standards in lightweight cryptography.

(hace 4 years, 6 months) | Seguir leyendo

Symantec urges users to disable pcAnywhere

Symantec is recommending that users of its pcAnywhere software disable the product following the theft of source code from the US computer security firm.

(hace 4 years, 6 months) | Seguir leyendo

SCADA Systems in Railways Vulnerable to Attack

Reports of a possible cyber-attack against a rail company highlight the issues of protecting industrial control systems that keep the country's critical infrastructure running.

(hace 4 years, 7 months) | Seguir leyendo

FBI releases plans to monitor social networks

(hace 4 years, 7 months) | Seguir leyendo

Amazon Web Services moves backups to the cloud

The appliance costs $125 per month, while storage capacity and data transfer is extra

(hace 4 years, 7 months) | Seguir leyendo

El ITI presenta sus soluciones de optimización inteligentes por primera vez en Madrid

El pasado miércoles 18 de enero tuvo lugar en Madrid, en las instalaciones de la Fundación PONS,  la Jornada Soluciones de Optimización Inteligentes – SOI´s, organizada por el ITI en colaboración con la Fundación Conexus

(hace 4 years, 7 months) | Seguir leyendo