Tuesday, 3 de March de 2015

Noticias y opinión en Seguridad informática


El Instituto Tecnológico de Informática celebra con éxito VLCTESTING2011

La jornada sobre calidad y testeo de software VLCTESTING también acogió la edición de AutumnTest Valencia, punto de encuentro para profesionales del sector.

(hace 3 years, 3 months) | Seguir leyendo

Russia, The Next Silicon Valley?

Some time in the near future, Russia will no longer be known as a country whose growth depends on natural gas development. The future Russia is a tech powerhouse rivaling the brain trust and talents of Silicon Valley, says the country’s presidential aide Arkady Dvorkovich during the APEC Summit in Honolulu this weekend.

(hace 3 years, 3 months) | Seguir leyendo

Los Institutos Tecnológicos de la Comunitat Valenciana apuestan por la personalización de productos y servicios en el metal

La estrategia de la Unit XPERTU busca posicionar a las empresas metalmecánicas como líderes en el campo de la personalización.

(hace 3 years, 3 months) | Seguir leyendo

Prototype Technology Detects Insider Threats

(hace 3 years, 3 months) | Seguir leyendo

Georgia Tech Helps to Develop System That Will Detect Insider Threats from Massive Data Sets

When a soldier in good mental health becomes homicidal or a government employee abuses access privileges to share classified information, we often wonder why no one saw it coming. When looking through the evidence after the fact, a trail often exists that, had it been noticed, could have possibly provided enough time to intervene and prevent an incident.

(hace 3 years, 3 months) | Seguir leyendo

ITI colabora con la azulejera Keraben en un proyecto de I+D para la secuenciación inteligente de la producción en el sector industrial cerámico

(hace 3 years, 3 months) | Seguir leyendo

Smart Phone Chips Calling for Data Centers

The processors are slower, but they use much less energy—a huge boon for those who run massive data centers.

(hace 3 years, 3 months) | Seguir leyendo

New system will detect insider threats from massive data sets

When a soldier in good mental health becomes homicidal or a government employee abuses access privileges to share classified information, we often wonder why no one saw it coming. When looking through the evidence after the fact, a trail often exists that, had it been noticed, could have possibly provided enough time to intervene and prevent an incident.

(hace 3 years, 3 months) | Seguir leyendo

US Charges Seven in "Massive" Cyber Fraud Scam

(hace 3 years, 3 months) | Seguir leyendo

DoS Attack Hits Japanese Local Goverments' Network

(hace 3 years, 3 months) | Seguir leyendo

Fujitsu introduces new Dynamic Infrastructure Blocks

(hace 3 years, 3 months) | Seguir leyendo

Diario del Puerto: El ITI presente en la feria de logística - LOGISTICS 2011

(hace 3 years, 3 months) | Seguir leyendo

El ITI apuesta por la formación continua de sus trabajadores

El futuro de las organizaciones está en saber potenciar e incentivar la formación entre los miembros de su empresa

(hace 3 years, 3 months) | Seguir leyendo

Compromised MIT Server Used to Launch Attacks

(hace 3 years, 3 months) | Seguir leyendo

Encryption for transit cards hacked on the cheap

(hace 3 years, 3 months) | Seguir leyendo

Researchers Defeat CAPTCHA on Popular Websites

(hace 3 years, 3 months) | Seguir leyendo

Spy software can see smartphone texting realtime (w/ Video)

(PhysOrg.com) -- Last month, there was news from video provider Qumu of their discomforting survey that at least half of Americans would use smartphones to secretly spy on others. Now there is rattling news that spy software can easily do that kind of job. The software can reveal what others are texting in their personal emails or text messages sent forth on their smartphones just by the snooper using a smartphone camera or advanced camera like a digital SLR that shoots HD video, which could read a screen up to 60 metres away.

(hace 3 years, 3 months) | Seguir leyendo

Professional advice on sharing data responsibility to improve security

(hace 3 years, 4 months) | Seguir leyendo

Secure phone communications with a rainbow flash

(hace 3 years, 4 months) | Seguir leyendo

Hackers Release Tool that Exploits SSL

(hace 3 years, 4 months) | Seguir leyendo