Noticias y opinión en Seguridad informática
Microsoft on Wednesday warned that hackers use mind tricks more often than software skills to get viruses into computers.
Mathematical templates enhance privacy and usability of biometric systems
Desde abril se han sucedido varios incidentes de seguridad relacionados con la fuga de información y pérdida de datos, entre los que destaca, principalmente, el nuevo robo de datos en los servicios online de PSN y Qriocity de Sony.
A team from the Virginia Tech Information Technology Security Laboratory and Bradley Department of Electrical and Computer Engineering won third place in the 2011 National Security Innovation Competition sponsored by the National Homeland Defense Foundation, a nonprofit forum for responding to terrorism tactics and natural disasters.
Computer models used to forecast storms don't (yet) know how to take advantage of the additional capabilities that will soon be available from advanced dual-polarimetric radar units being installed around the country by the National Weather Service.
Congressional testimony centers around what "location" really means, and who's responsible for how apps behave.
Styrian pumpkin-seed oil or cheap copy? When you choose a product, you want the quality you¡'ve paid for. But how can you test that what's inside is what it says on the label?
Steganography is a form of security through obscurity in which information is hidden within an unusual medium. An artist might paint a coded message into a portrait, for instance, or an author embed words in the text. A traditional paper watermark is a well-known example of steganography in action. At first glance, there would appear to be nothing unusual about the work, but a recipient aware of the presence of the hidden message would be able to extract it easily. In the computer age, steganography has become more of a science than an art.
Lollapalooza opens its data to music hackers, and offers prizes for the best new apps.
New software lets Android users see how apps are collecting their data, and restrict the behavior.
A new publication from the National Institute of Standards and Technology (NIST) provides guidelines to secure the earliest stages of the computer boot process. Commonly known as the Basic Input/Output System (BIOS), this fundamental system firmware computer code built into hardware initializes the hardware when you switch on the computer before starting the operating system. BIOS security is a new area of focus for NIST computer security scientists.
A consortium of hardware security experts from four major universities around the country has received a $1.2 million federal grant to conduct wide-ranging research aimed at enhancing the integrity of integrated circuits (ICs), the computer chips that are used in virtually all electronic devices today, from cell phones and medical instruments to laptop computers and flat-screen TVs.