Tuesday, 7 de July de 2015

Noticias y opinión en Seguridad informática


The Next Wave of Botnets Could Descend from the Skies

Researchers are developing hacking drones that could build a wireless botnet or track someone via cell phone.

(hace 3 years, 10 months) | Seguir leyendo

A Simpler Approach to Online Identity

A new service, backed by Google, lets you log into any site using one Web account.

(hace 3 years, 10 months) | Seguir leyendo

Alemania introduce tarjetas biométricas para extranjeros

(hace 3 years, 10 months) | Seguir leyendo

IBM adquiere la empresa de seguridad i2

Con esta adquisición, IBM amplía su cartera de software analítico para gobiernos locales y estatales. Los términos del acuerdo no han sido divulgados.

(hace 3 years, 10 months) | Seguir leyendo

Sé dónde has estado…

(hace 3 years, 10 months) | Seguir leyendo

ISO asks - Is your biometric data safe online?

(hace 3 years, 10 months) | Seguir leyendo

US research is wrong to claim face recognition undermines privacy

(hace 3 years, 10 months) | Seguir leyendo

Simple security for wireless: no password required

(hace 3 years, 10 months) | Seguir leyendo

A Chip to Encrypt the Web

New hardware should make it possible for all online data to be as secure as a credit card transaction.

(hace 3 years, 10 months) | Seguir leyendo

GoldKey releases minidriver with two-factor authentication

(hace 3 years, 10 months) | Seguir leyendo

Facebook responds to Google+ privacy innovations

Updated design makes content sharing preferences clearer

(hace 3 years, 10 months) | Seguir leyendo

USR receives patent for secure transactions

(hace 3 years, 10 months) | Seguir leyendo

Security Issues in Online Social Networks

(hace 3 years, 10 months) | Seguir leyendo

When Social Media Mining Gets It Wrong

Big problems could be ahead if we rely on conclusions drawn from individuals' social-networking data.

(hace 3 years, 10 months) | Seguir leyendo

Motorola-Based Commercial Fingerprint Sensor SDK for Android

Free SDK uses personalization and security features of AuthenTec smart sensors in Android-based phones

(hace 3 years, 11 months) | Seguir leyendo

Theft Protection Developed for Virtual Machines

(hace 3 years, 11 months) | Seguir leyendo

Worldwide Cyber Espionage Revealed

The attacks are evidence of a growing political motivation among hackers.

(hace 3 years, 11 months) | Seguir leyendo

Location-Related Privacy in Geo-Social Networks

(hace 3 years, 11 months) | Seguir leyendo

Preserving Relation Privacy in Online Social Network Data

(hace 3 years, 11 months) | Seguir leyendo

A Taxonomy of Social Networking Data

(hace 3 years, 11 months) | Seguir leyendo