At the ACM Programming Language Design and Implementation conference, MIT researchers presented a new system that repairs dangerous software bugs by automatically importing functionality from other, more secure applications. Remarkably, the system, dubbed CodePhage, doesn’t require access to the source code of the applications whose functionality it’s borrowing. Instead, it analyzes the applications’ execution...
In response to public concerns about cryptographic security, the National Institute of Standards...
The 6th Annual Conference...
An OPM official says the agency entrusted with millions of personnel records has a history of...
Hackers linked to China appear to have gained access to the sensitive background information submitted by intelligence and military personnel for security clearances, several U.S. officials said June 12, 2015, describing a second cyberbreach of federal records that could dramatically compound the potential damage.
You might not need to remember those complicated e-mail and bank account passwords for much longer. The way your brain responds to certain words could be used to replace passwords. Researchers observed the brain signals of 45 volunteers as they read a list of 75 acronyms, such as FBI and DVD, and found that participants’ brains reacted differently to each acronym, enough that a computer system was able to identify each volunteer.
Is RAID dead or alive? Are erasure codes replacing RAID for data protection? We present these questions, because some storage vendors promote RAID, while others promote erasure codes. Looking at how vendors are marketing data protection in their products, it almost appears that there is a battle between RAID and erasure code technology and that everyone will agree on a winner at some point.
More than 100,000 taxpayers have had their personal tax information stolen from an IRS Web site as part of an elaborate scheme to claim fraudulent tax refunds. The information was stolen from a system called "Get Transcript," where taxpayers can get tax returns and other tax filings from previous years. In order to access the information, the thieves cleared a security screen...
Everyone has heard the old adage that time is money. In today’s society, business moves at the speed of making a phone call, looking something up online via your cell phone, or posting a tweet. So, when time is money (and can be a lot of money), why are businesses okay with waiting weeks or even months to get valuable information from their data?
A false tweet from a hacked account owned by the Associated Press in 2013 sent financial markets into a tailspin. The Dow Jones Industrial Average dropped 143.5 points and the Standard & Poor’s 500 Index lost more than $136 billion of its value in the seconds that immediately followed the post. Once the nature of the tweet was discovered, markets corrected themselves, but the Hack Crash event demonstrates the need...
Scientists have succeeded in securing chip cards against leaking confidential information. Through the use of smart algorithms, it is now possible to better secure bank cards, public transport chip cards and electronic keys of buildings and cars against hackers. Begül Bilgin developed clever ways to make chip cards more secure against the leaking of confidential information, drafting smart algorithms based on multi-party computation.
In the new era of quantum computers, many daily life applications, such as home banking, are doomed to failure, and new forms of ensuring the confidentiality of our data are being study to overcome this threat. Researchers have taken a step in this direction and propose a quantum blind signature scheme, which ensures that signatures cannot be copied and that the sender must compromise to a single message.
To make cars as safe as possible, we crash them into walls to pinpoint weaknesses and better protect people who use them. That’s the idea behind a series of experiments conducted by an engineering team who hacked a next-gen teleoperated surgical robot — one used only for research purposes — to test how easily a malicious attack could hijack remotely-controlled operations in the future and to make those systems more secure.
A research team at the Georgia Tech Research Institute is studying a range of security challenges involving programmable logic devices — in particular, field programmable gate arrays. FPGAs combine hardware performance and software flexibility so well that they're increasingly used in aerospace, defense, consumer devices, HPC, vehicles, medical devices and other applications. But they come with potential vulnerabilities.
It’s often said that no two human fingerprints are exactly alike. For that reason, police often use them as evidence to link suspects to crime scenes. The same goes for silicon chips: Manufacturing processes cause microscopic variations in chips that are unpredictable, permanent and effectively impossible to clone.
IBM is bringing its Security Intelligence technology, IBM QRadar, to the cloud, giving companies the ability to quickly prioritize real threats and free up critical resources to fight cyberattacks. The new services are available through a cloud-based software as a service (SaaS) model, with optional IBM Security Managed Services to provide deeper expertise and flexibility for security professionals.
A new Pentagon cybersecurity strategy lays out for the first time publicly that the U.S. military plans to use cyberwarfare as an option in conflicts with enemies. The 33-page strategy says the Defense Department "should be able to use cyber operations to disrupt an adversary's command and control networks, military-related critical infrastructure and weapons capabilities."
In the last 10 years, computer security researchers have shown that malicious hackers don’t need to see your data in order to steal your data. From the pattern in which your computer accesses its memory banks, adversaries can infer a shocking amount about what’s stored there.
Northrop Grumman has renewed its commitment to run the CyberCenturion competition for a second year, continuing its efforts to seek out the UK's best young cyber talent. CyberCenturion is the UK's first team-based cyber security contest specifically designed to attract 12- to 18-year-olds. The competition aims to engage young people with an interest in cyber as a way to address the STEM skills gap and encourage careers in cyber security.
The next generation of cyberattacks will be more sophisticated, more difficult to detect and more capable of wreaking untold damage on the nation’s computer systems. So, the DoD has given a $3 million grant to a team of computer scientists to develop software that can hunt down a new kind of vulnerability nearly impossible to find with today’s technology. The team is tasked with creating an analyzer that can thwart algorithmic attacks.
Ransomware is a growing threat to computer users, who can suddenly find they're unable to open or use their files when their machines are infected. The malicious software can attack any user — an individual, small business, Fortune 500 company or a government agency.
President Barack Obama authorized a new U.S. government approach to deterring cyberattacks on April 8, 2015: financial sanctions against malicious overseas hackers and companies that knowingly benefit from the fruits of cyberespionage. The latter category could include state-owned corporations in Russia, China and elsewhere, setting the stage for major diplomatic friction if the sanctions are employed in that way.
It can be disheartening to learn that something precious, such as a one-of-a-kind family photo, has disappeared from a scratched or broken CD or DVD. It also can become serious, dangerous and potentially costly if it happens to a disc containing criminal forensic evidence, corporate records or scientific data. But there may be a way in the future to bring the material back.
Efficient, Time Sensitive Execution of Next-gen Sequencing Pipelines Critical for Translational MedicineApril 6, 2015 3:26 pm | by Suzanne Tracy, Editor-in-Chief, Scientific Computing and HPC Source | Blogs | Comments
Demand for genomics processing is rapidly spreading from research labs to the clinical arena. Genomics is now a "must have" tool for researchers in areas of oncology and rare diseases. It is also becoming a requirement in the clinical space for precision medicine, translational medicine and similar "bench to bedside" initiatives.
MOVIA Big Data Analytics Platform is designed to help organizations watch for important patterns in their data and generate instant alerts to users or other systems. The software enables improved prediction of trends through advanced data modeling that captures situational context, so decisions are not ‘made in a vacuum.’
Mathematicians have designed an encryption code capable of fending off the phenomenal hacking power of a quantum computer. Using high-level number theory and cryptography, the researchers reworked an infamous old cipher called the knapsack code to create an online security system better prepared for future demands.
Integer overflows are one of the most common bugs in computer programs — not only causing programs to crash but, even worse, potentially offering points of attack for malicious hackers. A new algorithm for identifying integer-overflow bugs was tested on five common open-source programs, in which previous analyses had found three bugs. The new algorithm found all three known bugs — and 11 new ones.
In the wake of the revelations that intelligence agencies have been engaged in mass surveillance activities, both industry and society at large are looking for practicable encryption solutions that protect businesses and individuals. Previous technologies have failed in practice because they were too expensive or not user friendly enough. An open initiative called “Volksverschlüsselung” aims to bring end-to-end encryption to the masses.
An e-pi-c day is coming! On 3.14.15 at 9:26:53; the date/time will correspond to the first 10 digits of the mathematical constant pi (3.141592653). This happens only once per century — a truly once-in-a-lifetime event for most people.
- Page 1