Saturday, 30 de May de 2015

Noticias y opinión en Seguridad informática


Study: Open source libraries propagate security flaws

Research finds that one-third of the most commonly used open source Java components contain security vulnerabilities

(hace 3 years, 2 months) | Seguir leyendo

Survey: Network Security Top Reason for Stalled Next-Gen Data Center Deployments

(hace 3 years, 2 months) | Seguir leyendo

How Data Center Services Market Differs in Geographic Regions: Gartner

In North America, hosting (42 percent) and cloud IaaS have achieved the highest level of client adoption, while the markets in the rest of the world are dominated by data center outsourcing (80 percent), Gartner reported.

(hace 3 years, 2 months) | Seguir leyendo

Industria da los primeros pasos hacia la Agenda Digital Española

José Manuel Soria, ministro de Industria, Energía y Turismo, ha presidido hoy la primera reunión del Grupo de Expertos de Alto Nivel que propondrá y tutelará las medidas más adecuadas para desarrollar la estrategia del Gobierno en telecomunicaciones y Sociedad de la Información, denominada Agenda Digital Española.

(hace 3 years, 2 months) | Seguir leyendo

Facebook privacy flaw nailed at Lugano workshop

(PhysOrg.com) -- As if Facebook has not has enough invasion-of-privacy problems, a pair of researchers have come up with one more reason why Facebook cannot rest. Shah Mahmood and Yvo Desmedt, Chair of Information Communication Technology at University College London, want the wide world of Facebook-account users to know that there is a hole in Facebook's settings that allows stalkers, whether they are personal mischief makers or governments, to spy on accounts without the account holder aware that anything is wrong. The technique is called “cloaking” and it works when the attacker deactivates and reactivates accounts, which Facebook allows.

(hace 3 years, 2 months) | Seguir leyendo

Expertos de la industria móvil confían en tarjetas NFC como medio de pago

(hace 3 years, 2 months) | Seguir leyendo

Mobile apps raise new privacy concerns

Smartphone in hand, you tap into your local application store. You click on a nifty tool that promises to massage your belly and pat your head at the same time. But just as you're about to download it, you decide to click on that little Terms of Service icon. And you're hit with a phone-book-sized data dump of not-so-fine fine print.

(hace 3 years, 2 months) | Seguir leyendo

Just How Much Is Your Privacy Worth?

A new study is one of the first to explore the monetary value of personal information shared online.

(hace 3 years, 2 months) | Seguir leyendo

Russia issues FIME-tested, biometric passports

(hace 3 years, 2 months) | Seguir leyendo

Cryptography Pioneer: We Need Good Code

(hace 3 years, 2 months) | Seguir leyendo

NSA Wants to Inject More Science Into Computer Security

(hace 3 years, 2 months) | Seguir leyendo

Security Researchers Successfully Decode DuQu Worm via Crowdsourcing

(hace 3 years, 2 months) | Seguir leyendo

Biometric market to grow 21% by 2014

(hace 3 years, 2 months) | Seguir leyendo

Diseñan un método para gestionar la información personal en los móviles

Investigadores de la Universidad Politécnica de Madrid han desarrollado un sistema para el teléfono móvil que mantiene el delicado equilibrio entre el uso de información personal y el respeto a la privacidad.

(hace 3 years, 2 months) | Seguir leyendo

¡Participa en la encuesta sobre la demanda de los servicios de Cloud Computing en PYMES y autónomos!

(hace 3 years, 2 months) | Seguir leyendo

IETF explores new working group on identity management in the cloud

Cisco, Salesforce, and Google are among the backers of the SCIM protocol for cloud-to-cloud provisioning

(hace 3 years, 2 months) | Seguir leyendo

Cebit offers visions of future

(hace 3 years, 2 months) | Seguir leyendo

El ITI participa en la Jornada "Fondos Europeos 2.0"

El pasado lunes 5 de marzo tuvo lugar en Valencia, en la Sede del Centro Cultural Bancaja, la Jornada “Fondos Europeos 2.0”, organizada por la Asociación de Empresas y Profesionales de Internet de la Comunitat Valenciana (AVALNET), en colaboración con la Generalitat Valenciana

(hace 3 years, 2 months) | Seguir leyendo

Norton Mobile Security now available for Samsung Galaxy users

(hace 3 years, 2 months) | Seguir leyendo

Cybercriminals embrace popularity of Pinterest

(hace 3 years, 2 months) | Seguir leyendo