Saturday, 6 de February de 2016

Noticias y opinión en Seguridad informática


Iranian Cyber Army To Trade Botnets

Malicious hacker group to sell access to its botnets

(hace 5 years, 3 months) | Seguir leyendo

Un sistema de vigilancia por radiofrecuencia protegerá la Universidad de Sevilla y la Pablo de Olavide

(hace 5 years, 3 months) | Seguir leyendo

Changes in energy R&D needed to combat climate change

(hace 5 years, 3 months) | Seguir leyendo

Video Ads that Outwit Spammers

(hace 5 years, 3 months) | Seguir leyendo

TSSG Research Cloud Potential for eGovernment

(hace 5 years, 3 months) | Seguir leyendo

YIP research leads to new security algorithms

The Air Force Office of Scientific Research's Young Investigator Research Program is enabling new scientists and engineers with exceptional ability to do creative basic research, enhance their career development and develop tools and techniques.

(hace 5 years, 3 months) | Seguir leyendo

"Austin" Release of Open Source Cloud Platform

Available now from OpenStack under "Austin" code release: Object Storage and Compute

(hace 5 years, 3 months) | Seguir leyendo

Key Management Plays Crucial Role In Database Encryption

Key Management Plays Crucial Role In Database Encryption

(hace 5 years, 3 months) | Seguir leyendo

Las Empresas TIC adoptan Estrategias para Conseguir una Tecnología Verde

El ITI organiza un Desayuno Tecnológico para empresas sobre “TIC aplicadas a la Eficiencia Energética”

(hace 5 years, 3 months) | Seguir leyendo

Mac OS X Lion On the Horizon

Apple also unveils plans for the Mac App Store for delivering Mac OS X apps

(hace 5 years, 3 months) | Seguir leyendo

Canon digital: La UE prohíbe su cobro a personas jurídicas

(hace 5 years, 3 months) | Seguir leyendo

Scrutinizing Facebook Spam

Researchers downloaded 3.5 million profiles to see how accounts are used to send out spam.

(hace 5 years, 3 months) | Seguir leyendo

"Fabric" To Weave Security Into Code

Cornell researchers' programming language, an extension to the Java language, builds in security as a program is written

(hace 5 years, 3 months) | Seguir leyendo

Long Distance, Top Secret Messages: Critical Component of Quantum Communication Device May Enable Cryptography

(hace 5 years, 3 months) | Seguir leyendo

The rise of Java exploits

(hace 5 years, 3 months) | Seguir leyendo

Nuevas amenazas acechan a las redes sociales

La Web 2.0 allana el camino al software malicioso, advierte un estudio

(hace 5 years, 3 months) | Seguir leyendo

SpamBot Wants to Be Your Friend

(hace 5 years, 3 months) | Seguir leyendo

Graves problemas de privacidad con FarmVille y otros juegos de Facebook

(hace 5 years, 3 months) | Seguir leyendo

Facebook and eBay share green data centre tips

Better air flow and cooling can save big money

(hace 5 years, 3 months) | Seguir leyendo

Censorship Circumvention Tools Aren't Widely Used

Users in authoritarian regimes either don't know about them or aren't interested.

(hace 5 years, 3 months) | Seguir leyendo