Tuesday, 31 de May de 2016

Noticias y opinión en Seguridad informática


Researchers Building Tools To Clean Up Infected Smart Phones Via The Wireless Network

Researchers Building Tools To Clean Up Infected Smart Phones Via The Wireless Network

(hace 6 years, 6 months) | Seguir leyendo

Majority Of Web Apps Have Severe Vulnerabilities

Majority Of Web Apps Have Severe Vulnerabilities

(hace 6 years, 6 months) | Seguir leyendo

Keeping Pacemakers Safe from Hackers

Communicating with ultrasound could help make implantable medical devices safe from attack.

(hace 6 years, 6 months) | Seguir leyendo

Microsoft delivers six patches

(hace 6 years, 6 months) | Seguir leyendo

Disability site vulnerable to XSS attack

(hace 6 years, 6 months) | Seguir leyendo

Web application security efforts fall short, report shows

(hace 6 years, 6 months) | Seguir leyendo

Panda launches free 'cloud' antivirus scanner

While SMBs get managed service.

(hace 6 years, 6 months) | Seguir leyendo

The problem with S/MIME email encryption

Searching emails becomes virtually impossible, once they are encrypted

(hace 6 years, 6 months) | Seguir leyendo

CA launches encryption key management tool

CA Encryption Key Manager runs on Linux, Unix, Windows and Solaris

(hace 6 years, 6 months) | Seguir leyendo

Apple update tackles domain spoofing, other attacks

(hace 6 years, 6 months) | Seguir leyendo

Facebook Hijacking Points To Social-Networking Holes

(hace 6 years, 6 months) | Seguir leyendo

'Software' del siglo XXI patentado con leyes del XIX

Programas informáticos y de comercio electrónico saturan los registros de patentes y amenazan con bloquear el sistema - El Supremo de EE UU analiza si son inventos que merecen protección - Numerosas voces creen que así se frena el progreso

(hace 6 years, 6 months) | Seguir leyendo

El Supremo de EE UU decide qué invenciones son patentables

Su doctrina podría dar un vuelco total a la industria del 'software'

(hace 6 years, 6 months) | Seguir leyendo

What computer science can teach economics

(hace 6 years, 6 months) | Seguir leyendo

Which ITIL Software Features Work Best?

(hace 6 years, 6 months) | Seguir leyendo

New ITIL/ITSM Qualification from APM Group

(hace 6 years, 6 months) | Seguir leyendo

Web Security Tool Copies Apps' Moves

A Microsoft clones the environment running on a user\'s machine.

(hace 6 years, 6 months) | Seguir leyendo

Rickroll virus attacks iPhones

(hace 6 years, 6 months) | Seguir leyendo

iPhone hit by first worm

Hackers never gonna to give it up

(hace 6 years, 6 months) | Seguir leyendo

El CDTI ha aprobado 132 nuevos proyectos de I+D y Ayudas Neotec

(hace 6 years, 6 months) | Seguir leyendo