Saturday, 18 de April de 2015

Noticias y opinión en Seguridad informática


Researchers Find Phone Apps Sending Data Without Notification; TaintDroid Tool IDs Untrustworthy Apps

(hace 4 years, 6 months) | Seguir leyendo

'Fabric' would tighten the weave of online security

(PhysOrg.com) -- As we become increasingly dependent on computers to manage our lives and businesses, our money and privacy become less and less secure. But now, Cornell researchers offer a way to build security into computer systems from the start, by incorporating security in the language used to write the programs.

(hace 4 years, 6 months) | Seguir leyendo

Gartner: How to reduce your software costs

(hace 4 years, 6 months) | Seguir leyendo

Detecting Danger in the Cloud

HyperSentry software improves ability to detect malware in cloud-computing systems

(hace 4 years, 6 months) | Seguir leyendo

Private Cloud Computing Deployment at a National Lab

(hace 4 years, 6 months) | Seguir leyendo

RFID-enabled energy monitoring solution for data centers

(hace 4 years, 6 months) | Seguir leyendo

Cloud vendors seek better legal protections for online data

Lack of legal certainty may be keeping some enterprises from using cloud services, vendors tell Congressional committee

(hace 4 years, 6 months) | Seguir leyendo

Discoverer of JSON Recommends Suspension of HTML5

(hace 4 years, 6 months) | Seguir leyendo

Microsoft Scrambles to Patch Encryption Hole

(hace 4 years, 6 months) | Seguir leyendo

Google Could Drive Mobile Two-Factor Authentication Model

Google Could Drive Mobile Two-Factor Authentication Model

(hace 4 years, 6 months) | Seguir leyendo

New research improves ability to detect malware in cloud-computing systems

Researchers from North Carolina State University have developed new software that offers significantly enhanced security for cloud-computing systems. The software is much better at detecting viruses or other malware in the "hypervisors" that are critical to cloud computing, and does so without alerting the malware that it is being examined.

(hace 4 years, 6 months) | Seguir leyendo

Looking for loopholes in microchip security

(PhysOrg.com) -- When it comes to making sure our information is secure, sometimes researchers have to think like hackers. This is true of Avishai Wool, a professor at Tel Aviv University. Along with Ph.D. student Yossi Oren, Wool has come up with a way to extract information from microchips that are thought to be secure. Wool and Oren created a special computer program that is designed to reduce the noise that limits hackers from identifying information on chips through the use of power source tracing.

(hace 4 years, 6 months) | Seguir leyendo

El Instituto Tecnológico de Informática participa en el CEDI 2010

El ITI aborda, en el marco del Congreso Español de Informática, los aspectos más innovadores y con mayor proyección futura, siempre desde una perspectiva científica y empresarial

(hace 4 years, 6 months) | Seguir leyendo

ITI participa en un proyecto que acerca las TIC al sector vitivinícola para potenciar su competitividad

El Proyecto de Investigación Agrintel se basa en un sistema inteligente de vigilancia a tiempo real para el control optimizado del proceso vitivinícola.

(hace 4 years, 7 months) | Seguir leyendo

Anatomy of an Intrusion

(hace 4 years, 7 months) | Seguir leyendo

Anticensorship Tool Proves Too Good to Be True

Experts warn that the software could identify those it claims to protect.

(hace 4 years, 7 months) | Seguir leyendo

New Wave Of DDoS Botnets Emerge

New Wave Of DDoS Botnets Emerge

(hace 4 years, 7 months) | Seguir leyendo

New company offers virtualised datacentre on-the-fly

VirtualSharp claims new predictability for disaster recovery

(hace 4 years, 7 months) | Seguir leyendo

ITI participa junto a INESCOP en el desarrollo de un calzado con propiedades biocidas

El Instituto Tecnológico de Informática junto al Instituto Tecnológico del Calzado, con el apoyo de IMPIVA a través de los Fondos Feder, está desarrollando un calzado que protege, hidrata y repara el pie además de aportarle propiedades aromáticas y fungicidas.

(hace 4 years, 7 months) | Seguir leyendo

Computer Scientists from Saarbrücken Search Through Large Datasets using "Good Trojans"

Social networks, search engines, digital archives, and several global-scale internet companies host very large data collections.

(hace 4 years, 7 months) | Seguir leyendo