Advertisement
Security
Subscribe to Security

The Lead

So far, JOANA is the only software analysis tool worldwide that does not only find all security gaps but also minimizes the number of false alarms without affecting the functioning of programs.

For Secure Software: X-rays instead of Passport Control

August 27, 2014 3:13 pm | by Karlsruhe Institute of Technology | News | Comments

Trust is good, control is better. This also applies to the security of computer programs. Instead of trusting “identification documents” in the form of certificates, the JOANA software analysis tool examines the source text (code) of a program. In this way, it detects leaks, via which secret information may get out or strangers may enter the system from outside. At the same time, JOANA reduces the number of false alarms to a minimum.

National Security: Lessons Learned Drawn from Perfect Heists

August 25, 2014 12:00 pm | by Sandia National Laboratories | News | Comments

The Antwerp Diamond Center theft and other sophisticated, high-value heists show that motivated...

Smartphones Set Out to Decipher Cryptographic System

August 25, 2014 4:33 am | by Sébastien Corthésy, EPFL | News | Comments

An Android app has been created that allows users to get together to crack a modern...

Top Cybersecurity Advice from the Rock Stars

August 22, 2014 10:57 am | by Amanda Sawyer, IEEE Computer Society | Blogs | Comments

High-profile security breaches, data thefts and cyberattacks are increasing in frequency,...

View Sample

FREE Email Newsletter

TCP Stealth defense software can help to prevent cyberattacks. Courtesy of Artur Marciniec/Fotolia

TCP Stealth Offers Protection against Hacienda Intelligence Program

August 20, 2014 10:00 am | by Technische Universität München | News | Comments

According to a group of journalists, a spy program known as "Hacienda" is being used by five western intelligence agencies to identify vulnerable servers across the world in order to control them and use them for their own purposes. However, scientists at the Technische Universität München have developed free software that can help prevent this kind of identification and, thus, the subsequent capture of systems.

Florida Polytechnic University is the newest addition to the State University System of Florida and the only one dedicated exclusively to science, technology, engineering and mathematics (STEM).

New Supercomputing Center to Support Big Data and Analytics, Cybersecurity and other STEM Skills

August 18, 2014 3:57 pm | by IBM | News | Comments

Florida Polytechnic University, Flagship Solutions Group and IBM have announced a new supercomputing center at the University composed of IBM high performance systems, software and cloud-based storage, to help educate students in emerging technology fields. Florida Polytechnic University is the newest addition to the State University System and the only one dedicated exclusively to science, technology, engineering and mathematics (STEM).

In one brief lapse of concentration, I didn’t examine the URL on a “Windows update” and my venerable Dell Dimension 8300 was infected with a rootkit virus when I clicked “OK” to upgrade Internet Explorer.

The Root(kit) of all Evil: Software Criminals are Winning the Arms Race

August 12, 2014 11:40 am | by Randy C. Hice | Blogs | Comments

Ah, sad news in the Hice household. The patient is terminal, and I’m keeping it alive on life support. I keep wallowing in self-pity and ask myself, “Why me?” I feel as though I’m somehow responsible for the illness. Well, OK, I’m definitely responsible, why lie? I may as well have been sharing blood-soaked hypos with a drug addict, but what I did was equally careless. In one brief lapse of concentration, I didn’t examine the URL ...

Advertisement
Paul Denny-Gouldson is Vice President of Strategic Solutions at IDBS.

The ELN Command Center: Gateway to Better Knowledge Management and Re-Use

August 7, 2014 10:35 am | by Paul Denny-Gouldson, IDBS | Blogs | Comments

The command center: any place which provides centralized command, a source of leadership and guidance to the rest of the organization. That’s what I see the concept of ELN developing into in research and development (R&D) across all sectors. Furthermore, it won’t be just a notebook, but a ’workplace.’

NSF's Secure and Trustworthy Cyberspace (SaTC) program will support more than 225 new projects in 39 states in 2014. The awards enable research from the theoretical to the experimental, and aim to minimize the misuses of cyber technology, bolster educatio

Frontier-scale Projects Expand Breadth and Impact of Cybersecurity, Privacy Research

August 6, 2014 3:35 pm | by NSF | News | Comments

As our lives and businesses become ever more intertwined with the Internet and networked technologies, it is crucial to continue to develop and improve cybersecurity measures to keep our data, devices and critical systems safe, secure, private and accessible. The NSF's Secure and Trustworthy Cyberspace program has announced two new center-scale "Frontier" awards to support projects that address grand challenges in cybersecurity science

The researchers traced 95 percent of canvas fingerprinting scripts back to share buttons provided by AddThis, the world’s largest content sharing platform.

Share Button, Web Site Plug-Ins can be used to Track You against Your Will

July 22, 2014 3:24 pm | by KU Leuven | News | Comments

One in 18 of the world’s top 100,000 Web sites track users without their consent using a previously undetected cookie-like tracking mechanism embedded in ‘share’ buttons. A new study by researchers at KU Leuven and Princeton University provides the first large-scale investigation of the mechanism and is the first to confirm its use on actual Web sites.

Digital Crime-Fighters Face Technical Challenges with Cloud Computing

July 16, 2014 10:26 am | by NIST | News | Comments

The National Institute of Standards and Technology (NIST) has issued for public review and comment a draft report summarizing 65 challenges that cloud computing poses to forensics investigators who uncover, gather, examine and interpret digital evidence to help solve crimes.

Own Your Own Data: System allows you to Pick and Choose what Data to Share

July 11, 2014 3:00 pm | by Larry Hardesty | MIT News Office | News | Comments

Cellphone metadata has been in the news quite a bit lately, but the National Security Agency isn’t the only organization that collects information about people’s online behavior. Newly downloaded cellphone apps routinely ask to access your location information, your address book or other apps and, of course, Web sites like Amazon or Netflix track your browsing history in the interest of making personalized recommendations.

Advertisement

Transparent Two-Sided Touchable Display Wall Developed

July 8, 2014 4:18 pm | by The Korea Advanced Institute of Science and Technology (KAIST) | News | Comments

At a busy shopping mall, shoppers walk by store windows to find attractive items to purchase. Through the windows, shoppers can see the products displayed, but may have a hard time imagining doing something beyond just looking, such as touching the displayed items or communicating with sales assistants inside the store. With TransWall, however, window shopping could become more fun and real than ever before.

New Web technology would let you track how private data is used online. (Left to right) Tim Berners-Lee, Oshani Seneviratne, and Lalana Kagal  Courtesy of Bryce Vickmark

Who’s Using your Data?

June 17, 2014 2:57 pm | by Larry Hardesty, MIT | News | Comments

By now, most people feel comfortable conducting financial transactions on the Web. The cryptographic schemes that protect online banking and credit card purchases have proven their reliability over decades. As more of our data moves online, a more pressing concern may be its inadvertent misuse by people authorized to access it. Every month seems to bring another story of private information accidentally leaked

A Norwegian vessel passing through the Bosporus in Istanbul Turkey, on March 2, 2014. The mysterious ship the size of a large passenger ferry left a Romanian wharf, glided through the narrow Bosporus that separates Europe and Asia, and plotted a course to

Cold War-style Spy Games Re-join Cyber-attacks, Other Espionage Ops

June 12, 2014 12:45 pm | by Karl Ritter, Associated Press | News | Comments

In early March, a mysterious ship the size of a large passenger ferry left a Romanian wharf, glided through the narrow Bosporus that separates Europe and Asia, and plotted a course toward Scandinavia. About a month later, at the headquarters of Norway's military intelligence service, the country's spy chief disclosed its identity. It was a $250 million spy ship that will be equipped with sensors and other technology to snoop on Russia.

The all-flash HP 3PAR StoreServ 7450 Storage array

Making Enterprise Architecture of the Future a Reality

June 10, 2014 4:29 pm | by HP | News | Comments

HP has announced new innovations and sustainable enterprise infrastructure solutions designed to deliver the simplicity, efficiency and investment protection organizations need to bridge the datacenter technologies of today and tomorrow. Big data, mobility, security and cloud computing are forcing organizations to rethink their approach to technology, causing them to invest heavily in IT infrastructure.

Rutgers engineering researchers are exploring the security and memorability of free-form gestures as passwords

Are Squiggly Lines the Future of Password Security?

June 5, 2014 10:20 am | by Rutgers University | News | Comments

As more people use smart phones or tablets to pay bills, make purchases, store personal information and even control access to their houses, the need for robust password security has become more critical than ever. A new study shows that free-form gestures — sweeping fingers in shapes across the screen of a smart phone or tablet — can be used to unlock phones and grant access to apps.

Advertisement
Atos, an international information technology services company, and Bull, a partner for enterprise data, together announced the intended public offer in cash by Atos for all the issued and outstanding shares in the capital of Bull.

Atos to Acquire Bull, Create Global Cloud, Cybersecurity, Big Data Company

June 2, 2014 3:33 pm | by Bull | News | Comments

Atos, an international information technology services company, and Bull, a partner for enterprise data, together announced the intended public offer in cash by Atos for all the issued and outstanding shares in the capital of Bull. Atos offer is set at 4.90 euros per Bull's share in cash, representing a 22 percent premium over the Bull's closing price

Researchers developed a prototype automated system that is now running on the data analytics pipeline of Bing. It's the first time automated privacy compliance analysis has been applied to the production code of an Internet-scale system.

Carnegie Mellon, Microsoft Research Automate Privacy Compliance for Big Data Systems

May 22, 2014 3:19 pm | by Carnegie Mellon University | News | Comments

Web services companies, such as Facebook, Google and Microsoft, all make promises about how they will use personal information they gather. But ensuring that millions of lines of code in their systems operate in ways consistent with privacy promises is labor-intensive and difficult. A team from Carnegie Mellon University and Microsoft Research, however, has shown these compliance checks can be automated.

Press materials are displayed on a table of the Justice Department in Washington, May 19, 2014, before Attorney General Eric Holder was to speak at a news conference. Holder was announcing that a U.S. grand jury has charged five Chinese hackers with econo

US Charges Chinese Officials in Cyberspying Case

May 21, 2014 3:11 pm | by Eric Tucker, Associated Press | News | Comments

The United States announced on Monday unprecedented cyber espionage charges against five Chinese military officials accused of hacking into U.S. companies to gain trade secrets. The hackers targeted big-name makers of nuclear and solar technology, stealing confidential business information, sensitive trade secrets and internal communications for competitive advantage, according to a grand jury indictment.

Exterior view of the Europol headquarters in The Hague, Netherlands

FBI: BlackShades Infected Half Million Computers

May 19, 2014 4:37 pm | by Larry Neumeister and Toby Sterling, Associated Press | News | Comments

More than a half million computers in over 100 countries were infected by sophisticated malware that lets cybercriminals take over a computer and hijack its webcam, authorities said as charges were announced May 19, 2014, against more than 100 people worldwide.

Researchers have solved one aspect of the discrete logarithm problem. This is considered to be one of the 'holy grails' of algorithmic number theory, on which the security of many cryptographic systems used today is based.

New Algorithm Shakes Up Cryptography

May 15, 2014 4:38 pm | by CNRS (Délégation Paris Michel-Ange) | News | Comments

Researchers have solved one aspect of the discrete logarithm problem. This is considered to be one of the 'holy grails' of algorithmic number theory, on which the security of many cryptographic systems used today is based. The team has devised a new algorithm that calls into question the security of one variant of this problem. The result discredits several cryptographic systems ...

The generative model can be used to tailor networks to the environments in which they are expected to operate.

Molecular, Neural, Bacterial Networks Provide Security Insights

May 8, 2014 3:02 pm | by Carnegie Mellon University | News | Comments

The robust defenses that yeast cells have evolved to protect themselves from environmental threats hold lessons that can be used to design computer networks and analyze how secure they are, say computer scientists at Carnegie Mellon University.

Unbreakable Security Codes Inspired by Nature

April 10, 2014 2:10 pm | by Lancaster University | News | Comments

A revolutionary new method of encrypting confidential information has been patented by scientists who were inspired by discoveries from human biology, which model how the heart and lungs coordinate their rhythms by passing information between each other.

Conquering Computer Zombies in Real Time

April 4, 2014 4:01 pm | by American Friends of Tel Aviv University | News | Comments

Cyber attacks are the primary domestic security threat facing the United States, FBI Director James Comey told the Senate Homeland Security Committee last year. In our brave new world, traditional warfare is now inextricably linked to economic and cyber warfare. In just one example, cyber strikes have the potential to derail a nation's power grid, causing widespread damage, chaos and loss of life.

ACM Turing Award Goes to Leslie Lamport for Work Enabling Distributed Computing in Data Center, Security, Cloud Landscapes

March 19, 2014 9:33 am | by The Association for Computing Machinery | News | Comments

The Association for Computing Machinery has named Leslie Lamport, a Principal Researcher at Microsoft Research, as the recipient of the 2013 ACM A.M. Turing Award for imposing clear, well-defined coherence on the seemingly chaotic behavior of distributed computing systems, in which several autonomous computers communicate with each other by passing messages.

Tim Berners-Lee, Inventor of Web, Calls for Digital Bill of Rights

March 12, 2014 12:22 pm | by AP | News | Comments

The British inventor of the World Wide Web wants a digital bill of rights to protect Internet users from surveillance. Speaking on the 25th anniversary of his creation, Tim Berners-Lee says he hopes to spark a global conversation about the need to defend principles that have made the Web successful.

Quantum Physics Secures New Cryptography Scheme

March 12, 2014 7:36 am | by National University of Singapore | News | Comments

The way we secure digital transactions could soon change. A team has demonstrated a form of quantum cryptography that can protect people doing business with others they may not know or trust — a situation encountered often on the internet and in everyday life. In cryptography, the problem of providing a secure way for two mutually distrustful parties to interact is known as two-party secure computation...

Agency-by-agency Summary of President Obama's Proposed 2015 Budget

March 4, 2014 12:26 pm | by The Associated Press | News | Comments

Here is an agency-by-agency summary of President Barack Obama's proposed budget for fiscal 2015, beginning next Oct. 1. The top-line figures do not include spending on automatic entitlement benefits like Medicare and Social Security. The top-line figures for each agency also omit the $55.4 billion "opportunity" initiative Obama would divide equally between domestic and military programs.

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading