Wednesday, 29 de July de 2015

Noticias y opinión en Seguridad informática


How energy-efficient is cloud computing?

(PhysOrg.com) -- Conventionally, data storage and data processing are done at the user's own computer, using that computer's storage system and processor. An alternative to this method is cloud computing, which is Internet-based computing that enables users at home or office computers to transfer data to a remote data center for storage and processing. Cloud computing offers potential benefits – especially financial ones – to users, but in a new study, researchers have investigated a different aspect of cloud computing: how does its energy consumption compare with conventional computing?

(hace 4 years, 9 months) | Seguir leyendo

La tecnología verde atrae como ideal, pero no vende

Los consumidores muestran conciencia ecológica, pero compran en función de precio y funcionalidades técnicas.

(hace 4 years, 9 months) | Seguir leyendo

Half the productivity, twice the carbon

Green technologies key for IT industry profitability in 2020

(hace 4 years, 9 months) | Seguir leyendo

Green Technologies Key for IT Industry Profitability in 2020

(hace 4 years, 9 months) | Seguir leyendo

Una nueva herramienta bloquea el software malicioso

El sistema no produce falsos positivos y apenas requiere recursos del ordenador

(hace 4 years, 9 months) | Seguir leyendo

Georgia Tech Builds System to Stop Phone Phishing Scams

Phishing scams are making the leap from email to the world's voice systems, and a team of researchers in the Georgia Tech College of Computing has found a way to tag fraudulent calls with a digital "fingerprint" that will help separate legitimate calls from phone scams.

(hace 4 years, 9 months) | Seguir leyendo

Yahoo Revamps its Search Engine

(hace 4 years, 9 months) | Seguir leyendo

Google opens up can of open source worms in Oracle Java suit

(hace 4 years, 9 months) | Seguir leyendo

BLADE Software Eliminates 'Drive-by Downloads' from Malicious Websites

(hace 4 years, 9 months) | Seguir leyendo

Michigan students get DC vote site to play song

(AP) -- University of Michigan students hacked a prototype D.C. elections voting site and programmed it to play their fight song, prompting election officials to temporarily take it down.

(hace 4 years, 9 months) | Seguir leyendo

Product Watch: Symantec Launches New Reputation-Based Product Line

Product Watch: Symantec Launches New Reputation-Based Product Line

(hace 4 years, 9 months) | Seguir leyendo

Information and Communication Technologies Exhibition in Brussels

(hace 4 years, 9 months) | Seguir leyendo

ITI presenta en SIMO la Primera Patente Mundial en Inspección Industrial en 3D

El Instituto estará presente en SIMO Network durante los días 5 a 7 de Octubre en IFEMA (Madrid). Su estancia en esta Feria Internacional de Servicios y Soluciones TIC para empresas, tiene su origen en 2004.

(hace 4 years, 9 months) | Seguir leyendo

'Man In The Mobile' Attacks Highlight Weaknesses In Out-Of-Band Authentication

'Man In The Mobile' Attacks Highlight Weaknesses In Out-Of-Band Authentication

(hace 4 years, 9 months) | Seguir leyendo

Researchers design system to trace call paths across multiple networks

(PhysOrg.com) -- Phishing scams are making the leap from email to the world's voice systems, and a team of researchers in the Georgia Tech College of Computing has found a way to tag fraudulent calls with a digital "fingerprint" that will help separate legitimate calls from phone scams.

(hace 4 years, 9 months) | Seguir leyendo

RiTech develops new biometric flash drive

(hace 4 years, 9 months) | Seguir leyendo

Android Mobile App Misbehavior

The mobile OS is safer by design, but Google's approach to apps highlights security problems.

(hace 4 years, 9 months) | Seguir leyendo

En el Software la Calidad no es Opcional

El Instituto Tecnológico de Informática impartirá el curso "Diseño Ágil con Test Driven Development"

(hace 4 years, 9 months) | Seguir leyendo

ITI Informa sobre Herramientas de Virtualización Libres en el Primer Evento TIC del Mediterráneo

El I Congreso de Internet del Mediterráneo tendrá lugar en el recinto ferial (IFA) de Alicante durante los días 24 a 26 de Septiembre

El Instituto Tecnológico de Informática (ITI) participa en una mesa redonda sobre herramientas de virtualización y presenta una ponencia sobre herramientas de virtualización que se distribuyen bajo licencias libres y funcionan sobre sistemas GNU/Linux. El ponente es Sergio Talens, director del Área de Sistemas, Seguridad y Software Libre del ITI y desarrollador del Proyecto Debian, que participará en el Congreso junto a renombrados expertos y empresas que, a nivel ...

(hace 4 years, 9 months) | Seguir leyendo

Researchers Find Phone Apps Sending Data Without Notification; TaintDroid Tool IDs Untrustworthy Apps

(hace 4 years, 9 months) | Seguir leyendo