Noticias y opinión en Seguridad informática
A team from the Virginia Tech Information Technology Security Laboratory and Bradley Department of Electrical and Computer Engineering won third place in the 2011 National Security Innovation Competition sponsored by the National Homeland Defense Foundation, a nonprofit forum for responding to terrorism tactics and natural disasters.
Computer models used to forecast storms don't (yet) know how to take advantage of the additional capabilities that will soon be available from advanced dual-polarimetric radar units being installed around the country by the National Weather Service.
Congressional testimony centers around what "location" really means, and who's responsible for how apps behave.
Styrian pumpkin-seed oil or cheap copy? When you choose a product, you want the quality you¡'ve paid for. But how can you test that what's inside is what it says on the label?
Steganography is a form of security through obscurity in which information is hidden within an unusual medium. An artist might paint a coded message into a portrait, for instance, or an author embed words in the text. A traditional paper watermark is a well-known example of steganography in action. At first glance, there would appear to be nothing unusual about the work, but a recipient aware of the presence of the hidden message would be able to extract it easily. In the computer age, steganography has become more of a science than an art.
Lollapalooza opens its data to music hackers, and offers prizes for the best new apps.
New software lets Android users see how apps are collecting their data, and restrict the behavior.
A new publication from the National Institute of Standards and Technology (NIST) provides guidelines to secure the earliest stages of the computer boot process. Commonly known as the Basic Input/Output System (BIOS), this fundamental system firmware computer code built into hardware initializes the hardware when you switch on the computer before starting the operating system. BIOS security is a new area of focus for NIST computer security scientists.
A consortium of hardware security experts from four major universities around the country has received a $1.2 million federal grant to conduct wide-ranging research aimed at enhancing the integrity of integrated circuits (ICs), the computer chips that are used in virtually all electronic devices today, from cell phones and medical instruments to laptop computers and flat-screen TVs.
Searches for images of the happy couple may lead to viruses, thanks to hackers who increasingly harness popular search terms.
El ITI y la OPIDI-CV presentan a las pymes las herramientas públicas diseñadas para financiar proyectos tecnológicos
Más de 70 empresas TICs, centros tecnológicos, asociaciones y administración pública, se dieron cita el pasado 13 de abril en una jornada sobre herramientas de apoyo en I+D+I para pymes del sector TIC, organizada por la Oficina de Proyectos Empresariales de I+D+I de la Comunitat Valenciana (OPIDI – CV) y por el Instituto Tecnológico de Informática (ITI)
Indecipherable for computers: The Captcha with the password is very grainy, as it is generated in a physical system close to a critical change of state (left). In a chaotic process, it is made completely unreadable. The process can be reversed with an easily remembered password, however. © Sergej Flach / MPI for the Physics of Complex Systems
(PhysOrg.com) -- A new way to hide your secrets has been created, which is good news for both the spies and the generally duplicitous regular people of the world. This new system, instead of relying on traditional methods of hiding data such as encryption to scramble the text, hides information in an entirely different way. The newest thing in covert operations it to manipulate the location of data fragments. Essentially, the data is still being scrambled, but it is in an entirely different way.
Smart phones include geotagging features that many people aren't aware of.
New communications schemes could make zombie PC networks far harder to shut down.
A researcher is experimenting with ways that a Web browser could tighten the limits on information provided to websites.
Researchers are harvesting a wealth of intimate detail from our cellphone data, uncovering the hidden patterns of our social lives, travels, risk of disease—even our political views.