Monday, 25 de May de 2015

Noticias y opinión en Seguridad informática


Half of business apps open to security breaches

(hace 5 years, 2 months) | Seguir leyendo

Researchers Find Materials That Could Lead to Super Crypto Chips

Researchers at Florida State University have discovered crystals that could lead to super security chips as well as contribute to the discovery of materials that expand the capacity of electronic storage devices by 1,000 to 1 million times.

(hace 5 years, 2 months) | Seguir leyendo

Netgear's New SMB Network Storage Solutions Ready For Virtualization

The 2 new network storage platforms in the Netgear ReadyNAS product line support up to 500 users and are optimized for storage virtualization applications.

(hace 5 years, 2 months) | Seguir leyendo

Intruders Automating Threats

Report documents attempts to infect educational servers

(hace 5 years, 2 months) | Seguir leyendo

Strato presenta un disco duro on-line en CeBIT 2010

Strato va a presentar en CeBIT Hidrive, un disco duro on-line que permite almacenar archivos en la red y acceder a ellos a través de cualquier dispositivo con conexión a Internet.

(hace 5 years, 2 months) | Seguir leyendo

Big Tech in Online Health Care Push

(hace 5 years, 2 months) | Seguir leyendo

New report analyzes online location privacy

(PhysOrg.com) -- More and more, the Internet knows where you are. In a new study, three scholars at UC Berkeley's School of Information analyze implications of new online geolocation standards.

(hace 5 years, 2 months) | Seguir leyendo

"Vanish" , un sistema que destruye documentos

Un equipo de la Universidad de Washington, en Seattle, está desarrollando un sistema que aprovecha las redes de intercambio entre particulares para asegurar que nuestros archivos están a buen recaudo. Esto es, vaporizados.

(hace 5 years, 2 months) | Seguir leyendo

Openistas squish security bugs twice as fast

Software security MOT results dispel FUD

(hace 5 years, 2 months) | Seguir leyendo

RSA 2010: HP shares findings on cloud security study

(hace 5 years, 2 months) | Seguir leyendo

Microsoft investigating new zero-day exploit

(hace 5 years, 2 months) | Seguir leyendo

Google signs up for Cloud Security Alliance

(hace 5 years, 2 months) | Seguir leyendo

Fujitsu unveils new palm vein scanner

(hace 5 years, 2 months) | Seguir leyendo

Hiding the honeypots: Is it possible to hide honeypot traps from Botnet drones

Armies of networked computers that have been compromised by malicious software are commonly known as Botnets. Such Botnets are usually used to carry out fraudulent and criminal activity on the Internet. Now, writing in the International Journal of Information and Computer Security, US computer scientists reveal that the honeypot trap designed to protect computers from Botnets are now vulnerable to attack because of advances in Botnet malware.

(hace 5 years, 2 months) | Seguir leyendo

VMware compra software y personal a EMC

VMware, propiedad de EMC, comprará los programas FastScale, Application Discovery Manager, Server Configuration Manager y Service Manager.

(hace 5 years, 2 months) | Seguir leyendo

Fedora 13 Alpha release delayed

Tuesday ties makes for 7 day truancy

(hace 5 years, 2 months) | Seguir leyendo

WaveMark unveils RFID-enabled smart cabinets

(hace 5 years, 2 months) | Seguir leyendo

Microsoft takes down big botnet

(hace 5 years, 2 months) | Seguir leyendo

Comcast Goes DNSSEC, OpenDNS Adopts Alternative DNS Security

Comcast Goes DNSSEC, OpenDNS Adopts Alternative DNS Security

(hace 5 years, 2 months) | Seguir leyendo

IBM Offers De-Duplication for Mainframes

IBM announced the availability of an appliance that de-duplicates data being backed up for mainframes, offering as much as a 25:1 data reduction ratio.

(hace 5 years, 2 months) | Seguir leyendo