domingo, 26 de febrero de 2017

Noticias y opinión en Seguridad informática


Security flaws found in the WebGL standard

(hace 5 años, 9 meses) | Seguir leyendo

Telos lanza nuevo sistema móvil de registro biométrico

(hace 5 años, 9 meses) | Seguir leyendo

Cyber security team creates winning network security product

A team from the Virginia Tech Information Technology Security Laboratory and Bradley Department of Electrical and Computer Engineering won third place in the 2011 National Security Innovation Competition sponsored by the National Homeland Defense Foundation, a nonprofit forum for responding to terrorism tactics and natural disasters.

(hace 5 años, 9 meses) | Seguir leyendo

Research Helps Exploit Data from New Radar

Computer models used to forecast storms don't (yet) know how to take advantage of the additional capabilities that will soon be available from advanced dual-polarimetric radar units being installed around the country by the National Weather Service.

(hace 5 años, 9 meses) | Seguir leyendo

Apple and Google Defend Their Handling of Data

Congressional testimony centers around what "location" really means, and who's responsible for how apps behave.

(hace 5 años, 9 meses) | Seguir leyendo

Graz University of Technology Researchers Develop Prototypes for Product Authentication

Styrian pumpkin-seed oil or cheap copy? When you choose a product, you want the quality you¡'ve paid for. But how can you test that what's inside is what it says on the label?

(hace 5 años, 9 meses) | Seguir leyendo

Hide files within files for better data security

Steganography is a form of security through obscurity in which information is hidden within an unusual medium. An artist might paint a coded message into a portrait, for instance, or an author embed words in the text. A traditional paper watermark is a well-known example of steganography in action. At first glance, there would appear to be nothing unusual about the work, but a recipient aware of the presence of the hidden message would be able to extract it easily. In the computer age, steganography has become more of a science than an art.

(hace 5 años, 9 meses) | Seguir leyendo

Automatic Music Data for the People

Lollapalooza opens its data to music hackers, and offers prizes for the best new apps.

(hace 5 años, 9 meses) | Seguir leyendo

An App to Stop Tracking

New software lets Android users see how apps are collecting their data, and restrict the behavior.

(hace 5 años, 9 meses) | Seguir leyendo

Build safety into the very beginning of the computer system

A new publication from the National Institute of Standards and Technology (NIST) provides guidelines to secure the earliest stages of the computer boot process. Commonly known as the Basic Input/Output System (BIOS), this fundamental system firmware computer code built into hardware initializes the hardware when you switch on the computer before starting the operating system. BIOS security is a new area of focus for NIST computer security scientists.

(hace 5 años, 10 meses) | Seguir leyendo

Research initiative to enhance integrity of integrated circuits

A consortium of hardware security experts from four major universities around the country has received a $1.2 million federal grant to conduct wide-ranging research aimed at enhancing the integrity of integrated circuits (ICs), the computer chips that are used in virtually all electronic devices today, from cell phones and medical instruments to laptop computers and flat-screen TVs.

(hace 5 años, 10 meses) | Seguir leyendo

A Royal Wedding Scam

Searches for images of the happy couple may lead to viruses, thanks to hackers who increasingly harness popular search terms.

(hace 5 años, 10 meses) | Seguir leyendo

Biometrics may have helped find Bin Laden

(hace 5 años, 10 meses) | Seguir leyendo

El ITI y la OPIDI-CV presentan a las pymes las herramientas públicas diseñadas para financiar proyectos tecnológicos

Más de 70 empresas TICs, centros tecnológicos, asociaciones y administración pública, se dieron cita el pasado 13 de abril en una jornada sobre herramientas de apoyo en I+D+I para pymes del sector TIC, organizada por la Oficina de Proyectos Empresariales de I+D+I de la Comunitat Valenciana (OPIDI – CV) y por el Instituto Tecnológico de Informática (ITI)




(hace 5 años, 10 meses) | Seguir leyendo

Strong protection for weak passwords

Indecipherable for computers: The Captcha with the password is very grainy, as it is generated in a physical system close to a critical change of state (left). In a chaotic process, it is made completely unreadable. The process can be reversed with an easily remembered password, however. © Sergej Flach / MPI for the Physics of Complex Systems

(hace 5 años, 10 meses) | Seguir leyendo

Embedding spy secrets in the hard drive fragments

(PhysOrg.com) -- A new way to hide your secrets has been created, which is good news for both the spies and the generally duplicitous regular people of the world. This new system, instead of relying on traditional methods of hiding data such as encryption to scramble the text, hides information in an entirely different way. The newest thing in covert operations it to manipulate the location of data fragments. Essentially, the data is still being scrambled, but it is in an entirely different way.

(hace 5 años, 10 meses) | Seguir leyendo

How People Broadcast Their Locations Without Meaning To

Smart phones include geotagging features that many people aren't aware of.

(hace 5 años, 10 meses) | Seguir leyendo

The Botnets That Won't Die

New communications schemes could make zombie PC networks far harder to shut down.

(hace 5 años, 10 meses) | Seguir leyendo

Microsoft Explores Privacy-Protecting Personalization

A researcher is experimenting with ways that a Web browser could tighten the limits on information provided to websites.

(hace 5 años, 10 meses) | Seguir leyendo

The Really Smart Phone

Researchers are harvesting a wealth of intimate detail from our cellphone data, uncovering the hidden patterns of our social lives, travels, risk of disease—even our political views.

(hace 5 años, 10 meses) | Seguir leyendo