One in 18 of the world’s top 100,000 Web sites track users without their consent using a previously undetected cookie-like tracking mechanism embedded in ‘share’ buttons. A new study by researchers at KU Leuven and Princeton University provides the first large-scale investigation of the mechanism and is the first to confirm its use on actual Web sites.
The National Institute of Standards and Technology (NIST) has issued for public review and...
Cellphone metadata has been in the news quite a bit lately, but the National Security Agency isn...
At a busy shopping mall, shoppers walk by store windows to find attractive items to purchase....
By now, most people feel comfortable conducting financial transactions on the Web. The cryptographic schemes that protect online banking and credit card purchases have proven their reliability over decades. As more of our data moves online, a more pressing concern may be its inadvertent misuse by people authorized to access it. Every month seems to bring another story of private information accidentally leaked
In early March, a mysterious ship the size of a large passenger ferry left a Romanian wharf, glided through the narrow Bosporus that separates Europe and Asia, and plotted a course toward Scandinavia. About a month later, at the headquarters of Norway's military intelligence service, the country's spy chief disclosed its identity. It was a $250 million spy ship that will be equipped with sensors and other technology to snoop on Russia.
HP has announced new innovations and sustainable enterprise infrastructure solutions designed to deliver the simplicity, efficiency and investment protection organizations need to bridge the datacenter technologies of today and tomorrow. Big data, mobility, security and cloud computing are forcing organizations to rethink their approach to technology, causing them to invest heavily in IT infrastructure.
As more people use smart phones or tablets to pay bills, make purchases, store personal information and even control access to their houses, the need for robust password security has become more critical than ever. A new study shows that free-form gestures — sweeping fingers in shapes across the screen of a smart phone or tablet — can be used to unlock phones and grant access to apps.
Atos, an international information technology services company, and Bull, a partner for enterprise data, together announced the intended public offer in cash by Atos for all the issued and outstanding shares in the capital of Bull. Atos offer is set at 4.90 euros per Bull's share in cash, representing a 22 percent premium over the Bull's closing price
Web services companies, such as Facebook, Google and Microsoft, all make promises about how they will use personal information they gather. But ensuring that millions of lines of code in their systems operate in ways consistent with privacy promises is labor-intensive and difficult. A team from Carnegie Mellon University and Microsoft Research, however, has shown these compliance checks can be automated.
The United States announced on Monday unprecedented cyber espionage charges against five Chinese military officials accused of hacking into U.S. companies to gain trade secrets. The hackers targeted big-name makers of nuclear and solar technology, stealing confidential business information, sensitive trade secrets and internal communications for competitive advantage, according to a grand jury indictment.
More than a half million computers in over 100 countries were infected by sophisticated malware that lets cybercriminals take over a computer and hijack its webcam, authorities said as charges were announced May 19, 2014, against more than 100 people worldwide.
Researchers have solved one aspect of the discrete logarithm problem. This is considered to be one of the 'holy grails' of algorithmic number theory, on which the security of many cryptographic systems used today is based. The team has devised a new algorithm that calls into question the security of one variant of this problem. The result discredits several cryptographic systems ...
The robust defenses that yeast cells have evolved to protect themselves from environmental threats hold lessons that can be used to design computer networks and analyze how secure they are, say computer scientists at Carnegie Mellon University.
A revolutionary new method of encrypting confidential information has been patented by scientists who were inspired by discoveries from human biology, which model how the heart and lungs coordinate their rhythms by passing information between each other.
Cyber attacks are the primary domestic security threat facing the United States, FBI Director James Comey told the Senate Homeland Security Committee last year. In our brave new world, traditional warfare is now inextricably linked to economic and cyber warfare. In just one example, cyber strikes have the potential to derail a nation's power grid, causing widespread damage, chaos and loss of life.
ACM Turing Award Goes to Leslie Lamport for Work Enabling Distributed Computing in Data Center, Security, Cloud LandscapesMarch 19, 2014 9:33 am | by The Association for Computing Machinery | News | Comments
The Association for Computing Machinery has named Leslie Lamport, a Principal Researcher at Microsoft Research, as the recipient of the 2013 ACM A.M. Turing Award for imposing clear, well-defined coherence on the seemingly chaotic behavior of distributed computing systems, in which several autonomous computers communicate with each other by passing messages.
The British inventor of the World Wide Web wants a digital bill of rights to protect Internet users from surveillance. Speaking on the 25th anniversary of his creation, Tim Berners-Lee says he hopes to spark a global conversation about the need to defend principles that have made the Web successful.
The way we secure digital transactions could soon change. A team has demonstrated a form of quantum cryptography that can protect people doing business with others they may not know or trust — a situation encountered often on the internet and in everyday life. In cryptography, the problem of providing a secure way for two mutually distrustful parties to interact is known as two-party secure computation...
Here is an agency-by-agency summary of President Barack Obama's proposed budget for fiscal 2015, beginning next Oct. 1. The top-line figures do not include spending on automatic entitlement benefits like Medicare and Social Security. The top-line figures for each agency also omit the $55.4 billion "opportunity" initiative Obama would divide equally between domestic and military programs.
Lawrence Livermore has joined forces with two other national labs to deliver next generation supercomputers able to perform up to 200 peak petaflops (quadrillions of floating point operations per second), about 10 times faster than today's most powerful high performance computing (HPC) systems.
AT&T and IBM have announced a new global alliance agreement to develop solutions that help support the "Internet of Things." The companies will combine their analytic platforms, cloud and security technologies with privacy in mind to gain more insights on data collected from machines in a variety of industries.
It used to be that "hacking" was just a type of crime, a computer break-in. But today, the term is also part of a growing — and perfectly legal — mainstay of the tech sector. Computer programming competitions known as "hackathons" have spread like viruses in recent years as ways for geeks, nerds and designers to get together to eat pizza, lose sleep and create something new.
IBM announced a new service offering to help critical infrastructure organizations utilize a new Cybersecurity Framework announced by the Administration at the White House. The new Cybersecurity Framework is the product of a year-long collaboration between the U.S. government and industry, coordinated and led by the National Institute of Standards and Technology (NIST).
Alan Turing: His Work and Impact, was selected for the top honor, R.R. Hawkins Award, at the 38th annual PROSE Awards. Celebrating the centenary of his birth, the bookwas praised as a fitting tribute to the life of the legendary mathematical and scientific genius, considered to be the father of theoretical computer science and artificial intelligence.
A flurry of new reports from major technology companies show that the government collects customer information on tens of thousands of Americans every six months as part of secret national security investigations. And the companies' top lawyers struck a combative stance, saying the Obama administrative needs to provide more transparency about its data collection.
Working on her blog in California one day, Vietnamese democracy activist Ngoc Thu sensed something was wrong. It took a moment for a keystroke to register. Cut-and-paste wasn't working. She had "a feeling that somebody was there" inside her computer. Her hunch turned out to be right.
The earth lurched without warning before dawn, jolting Los Angeles from its sleep. In a flash, freeway overpasses collapsed. Buildings were leveled or ruined. Fires spread. Two decades after a magnitude-6.7 earthquake shattered Los Angeles and surrounding communities, buildings around the region remain vulnerable.
Until recently, measuring a 27-dimensional quantum state would have been a time-consuming, multistage process using a technique called quantum tomography, which is similar to creating a 3-D image from many 2-D ones. Researchers at the University of Rochester have been able to apply a recently developed, alternative method called direct measurement to do this in a single experiment with no post-processing.
- Page 1