jueves, 27 de abril de 2017

Noticias y opinión en Seguridad informática


Sony PlayStation Network Fixes Password Security Breach

(hace 5 años, 11 meses) | Seguir leyendo

Researchers show Android devices susceptible to eavesdropping

(hace 5 años, 11 meses) | Seguir leyendo

One-in-14 software downloads malicious: Microsoft

Microsoft on Wednesday warned that hackers use mind tricks more often than software skills to get viruses into computers.

(hace 5 años, 11 meses) | Seguir leyendo

A new RFID privacy framework has been taken up by Europe

(hace 5 años, 11 meses) | Seguir leyendo

What's behind the biometric template?

Mathematical templates enhance privacy and usability of biometric systems

(hace 5 años, 11 meses) | Seguir leyendo

El ITI recuerda las medidas de protección de los usuarios, tras el ataque a Sony

Desde abril se han sucedido varios incidentes de seguridad relacionados con la fuga de información y pérdida de datos, entre los que destaca, principalmente, el nuevo robo de datos en los servicios online de PSN y Qriocity de Sony.

(hace 5 años, 11 meses) | Seguir leyendo

Earth Day Report: Green Computing Beyond the Datacenter

(hace 5 años, 11 meses) | Seguir leyendo

Researchers Find Android Security Vulnerability

(hace 5 años, 11 meses) | Seguir leyendo

Hardware Encryption Developed for New Computer Memory Technology

(hace 5 años, 11 meses) | Seguir leyendo

Security flaws found in the WebGL standard

(hace 5 años, 11 meses) | Seguir leyendo

Telos lanza nuevo sistema móvil de registro biométrico

(hace 5 años, 11 meses) | Seguir leyendo

Cyber security team creates winning network security product

A team from the Virginia Tech Information Technology Security Laboratory and Bradley Department of Electrical and Computer Engineering won third place in the 2011 National Security Innovation Competition sponsored by the National Homeland Defense Foundation, a nonprofit forum for responding to terrorism tactics and natural disasters.

(hace 5 años, 11 meses) | Seguir leyendo

Research Helps Exploit Data from New Radar

Computer models used to forecast storms don't (yet) know how to take advantage of the additional capabilities that will soon be available from advanced dual-polarimetric radar units being installed around the country by the National Weather Service.

(hace 5 años, 11 meses) | Seguir leyendo

Apple and Google Defend Their Handling of Data

Congressional testimony centers around what "location" really means, and who's responsible for how apps behave.

(hace 5 años, 11 meses) | Seguir leyendo

Graz University of Technology Researchers Develop Prototypes for Product Authentication

Styrian pumpkin-seed oil or cheap copy? When you choose a product, you want the quality you¡'ve paid for. But how can you test that what's inside is what it says on the label?

(hace 5 años, 11 meses) | Seguir leyendo

Hide files within files for better data security

Steganography is a form of security through obscurity in which information is hidden within an unusual medium. An artist might paint a coded message into a portrait, for instance, or an author embed words in the text. A traditional paper watermark is a well-known example of steganography in action. At first glance, there would appear to be nothing unusual about the work, but a recipient aware of the presence of the hidden message would be able to extract it easily. In the computer age, steganography has become more of a science than an art.

(hace 5 años, 11 meses) | Seguir leyendo

Automatic Music Data for the People

Lollapalooza opens its data to music hackers, and offers prizes for the best new apps.

(hace 5 años, 11 meses) | Seguir leyendo

An App to Stop Tracking

New software lets Android users see how apps are collecting their data, and restrict the behavior.

(hace 5 años, 11 meses) | Seguir leyendo

Build safety into the very beginning of the computer system

A new publication from the National Institute of Standards and Technology (NIST) provides guidelines to secure the earliest stages of the computer boot process. Commonly known as the Basic Input/Output System (BIOS), this fundamental system firmware computer code built into hardware initializes the hardware when you switch on the computer before starting the operating system. BIOS security is a new area of focus for NIST computer security scientists.

(hace 5 años, 12 meses) | Seguir leyendo

Research initiative to enhance integrity of integrated circuits

A consortium of hardware security experts from four major universities around the country has received a $1.2 million federal grant to conduct wide-ranging research aimed at enhancing the integrity of integrated circuits (ICs), the computer chips that are used in virtually all electronic devices today, from cell phones and medical instruments to laptop computers and flat-screen TVs.

(hace 5 años, 12 meses) | Seguir leyendo