Thursday, 5 de March de 2015

Noticias y opinión en Seguridad informática


Google Could Drive Mobile Two-Factor Authentication Model

Google Could Drive Mobile Two-Factor Authentication Model

(hace 4 years, 5 months) | Seguir leyendo

New research improves ability to detect malware in cloud-computing systems

Researchers from North Carolina State University have developed new software that offers significantly enhanced security for cloud-computing systems. The software is much better at detecting viruses or other malware in the "hypervisors" that are critical to cloud computing, and does so without alerting the malware that it is being examined.

(hace 4 years, 5 months) | Seguir leyendo

Looking for loopholes in microchip security

(PhysOrg.com) -- When it comes to making sure our information is secure, sometimes researchers have to think like hackers. This is true of Avishai Wool, a professor at Tel Aviv University. Along with Ph.D. student Yossi Oren, Wool has come up with a way to extract information from microchips that are thought to be secure. Wool and Oren created a special computer program that is designed to reduce the noise that limits hackers from identifying information on chips through the use of power source tracing.

(hace 4 years, 5 months) | Seguir leyendo

El Instituto Tecnológico de Informática participa en el CEDI 2010

El ITI aborda, en el marco del Congreso Español de Informática, los aspectos más innovadores y con mayor proyección futura, siempre desde una perspectiva científica y empresarial

(hace 4 years, 5 months) | Seguir leyendo

ITI participa en un proyecto que acerca las TIC al sector vitivinícola para potenciar su competitividad

El Proyecto de Investigación Agrintel se basa en un sistema inteligente de vigilancia a tiempo real para el control optimizado del proceso vitivinícola.

(hace 4 years, 5 months) | Seguir leyendo

Anatomy of an Intrusion

(hace 4 years, 5 months) | Seguir leyendo

Anticensorship Tool Proves Too Good to Be True

Experts warn that the software could identify those it claims to protect.

(hace 4 years, 5 months) | Seguir leyendo

New Wave Of DDoS Botnets Emerge

New Wave Of DDoS Botnets Emerge

(hace 4 years, 5 months) | Seguir leyendo

New company offers virtualised datacentre on-the-fly

VirtualSharp claims new predictability for disaster recovery

(hace 4 years, 5 months) | Seguir leyendo

ITI participa junto a INESCOP en el desarrollo de un calzado con propiedades biocidas

El Instituto Tecnológico de Informática junto al Instituto Tecnológico del Calzado, con el apoyo de IMPIVA a través de los Fondos Feder, está desarrollando un calzado que protege, hidrata y repara el pie además de aportarle propiedades aromáticas y fungicidas.

(hace 4 years, 5 months) | Seguir leyendo

Computer Scientists from Saarbrücken Search Through Large Datasets using "Good Trojans"

Social networks, search engines, digital archives, and several global-scale internet companies host very large data collections.

(hace 4 years, 5 months) | Seguir leyendo

Corvus Integration - Miniature Automatic OEM Iris Camera Now Available

(hace 4 years, 5 months) | Seguir leyendo

Product Watch: New Tool Moves Browser Into Virtual Environment For Security

Product Watch: New Tool Moves Browser Into Virtual Environment For Security

(hace 4 years, 5 months) | Seguir leyendo

Quantum Cryptography Breached With Lasers

Using lasers to blind quantum cryptography photon detectors, Norwegian computer scientists were able to obtain a copy of a secure key without leaving any trace of their presence.

(hace 4 years, 5 months) | Seguir leyendo

Scientists view cybersecurity as an intimidating conundrum

(hace 4 years, 5 months) | Seguir leyendo

Verifying next-generation hardware and software systems

(hace 4 years, 5 months) | Seguir leyendo

Latest Xilinx FPGA Gets NSA Approval for High-Grade Cryptographic Processing

(hace 4 years, 5 months) | Seguir leyendo

Google Researcher Finds New MSFT Zero-Day Exploit

(hace 4 years, 5 months) | Seguir leyendo

CLR XXVI

(hace 4 years, 5 months) | Seguir leyendo

Nace un grupo para evitar el fraude en móviles

La educación, la concienciación y la continua investigación entre los objetivos principales del grupo de trabajo.

(hace 4 years, 5 months) | Seguir leyendo