The next generation of cyberattacks will be more sophisticated, more difficult to detect and more capable of wreaking untold damage on the nation’s computer systems. So, the DoD has given a $3 million grant to a team of computer scientists to develop software that can hunt down a new kind of vulnerability nearly impossible to find with today’s technology. The team is tasked with creating an analyzer that can thwart algorithmic attacks.
Ransomware is a growing threat to computer users, who can suddenly find they're unable to open...
President Barack Obama authorized a new U.S. government approach to deterring cyberattacks on...
It can be disheartening to learn that something precious, such as a one-of-a-kind family photo,...
Efficient, Time Sensitive Execution of Next-gen Sequencing Pipelines Critical for Translational MedicineApril 6, 2015 3:26 pm | by Suzanne Tracy, Editor-in-Chief, Scientific Computing and HPC Source | Blogs | Comments
Demand for genomics processing is rapidly spreading from research labs to the clinical arena. Genomics is now a "must have" tool for researchers in areas of oncology and rare diseases. It is also becoming a requirement in the clinical space for precision medicine, translational medicine and similar "bench to bedside" initiatives.
MOVIA Big Data Analytics Platform is designed to help organizations watch for important patterns in their data and generate instant alerts to users or other systems. The software enables improved prediction of trends through advanced data modeling that captures situational context, so decisions are not ‘made in a vacuum.’
Mathematicians have designed an encryption code capable of fending off the phenomenal hacking power of a quantum computer. Using high-level number theory and cryptography, the researchers reworked an infamous old cipher called the knapsack code to create an online security system better prepared for future demands.
Integer overflows are one of the most common bugs in computer programs — not only causing programs to crash but, even worse, potentially offering points of attack for malicious hackers. A new algorithm for identifying integer-overflow bugs was tested on five common open-source programs, in which previous analyses had found three bugs. The new algorithm found all three known bugs — and 11 new ones.
In the wake of the revelations that intelligence agencies have been engaged in mass surveillance activities, both industry and society at large are looking for practicable encryption solutions that protect businesses and individuals. Previous technologies have failed in practice because they were too expensive or not user friendly enough. An open initiative called “Volksverschlüsselung” aims to bring end-to-end encryption to the masses.
An e-pi-c day is coming! On 3.14.15 at 9:26:53; the date/time will correspond to the first 10 digits of the mathematical constant pi (3.141592653). This happens only once per century — a truly once-in-a-lifetime event for most people.
Users of an e-mail service backed by the German government will soon be able to rely on strong encryption of the kind that used to be the preserve of geeks and hackers, officials said on March 9, 2015. From April onward De-Mail, an e-mail service available to anyone in Germany, will feature end-to-end encryption based on the Pretty Good Privacy system.
QR codes have been used to convey information about everything from cereals to cars and new homes. But researchers think the codes have a greater potential: protecting national security. Using advanced 3-D optical imaging and extremely low light photon counting encryption, researchers have taken the ordinary QR code and transformed it into a high-end cybersecurity application to protect the integrity of computer microchips.
The U.S. has elevated its appraisal of the cyber threat from Russia, the U.S. intelligence chief said February 26, 2015, as he delivered the annual assessment by intelligence agencies of the top dangers facing the country. "While I can't go into detail here, the Russian cyber threat is more severe than we had previously assessed," James Clapper, the director of national intelligence, told the Senate Armed Services Committee.
One of the fundamental and open problems in computer science is effective data storage. Unfortunately, magnetic and flash storage devices alone have proven to be unreliable to guarantee data availability and survivability, due to their frequent and unpredictable failures. ATOMICDFS aims to investigate the existence of highly efficient DFS able to provide atomic guarantees in harsh environments.
Did the National Security Agency plant spyware deep in the hard drives of thousands of computers used by foreign governments, banks and other surveillance targets around the world? A new report from Russian cybersecurity firm Kaspersky Lab said its researchers identified a new family of malicious programs or worms that infected computers in multiple countries, primarily overseas.
Cyberspace is the new "Wild West," President Barack Obama said, with everyone looking to the government to be the sheriff. But he told the private sector it must do more to stop cyber attacks aimed at the U.S. every day. Obama signed an executive order aimed at making it easier for private firms to have access to classified information about cyber attacks.
Due to a misconfigured open source database upon which millions of online stores and platforms from all over the world base their services, anyone had the ability to call up or modify several million pieces of customer data online including names, addresses and e-mails. According to the Center for IT-Security, Privacy and Accountability, this vulnerability was demonstrated for 40,000 online databases.
Personal information taken from social media, blogs, page views and so on is used to detect disease outbreaks, but does this violate our privacy, consent and trust? Dr. Effy Vayena from the University of Zurich and colleagues have mapped the numerous ethical challenges confronting digital disease detection and propose a framework to address the questions.
The five universities have been selected to lead the new Alan Turing Institute. The Institute will build on the UK's existing academic strengths and help position the country as a world leader in the analysis and application of big data and algorithm research. Its headquarters will be based at the British Library at the center of London’s Knowledge Quarter.
IBM researchers have announced a cloud-based technology that holds potential to help consumers better protect online personal data, including date of birth, home address and credit card numbers. The technology, called Identity Mixer, uses a cryptographic algorithm to encrypt the certified identity attributes of a user in a way that allows the user to reveal only selected pieces to third parties.
A new online resource, called the Biosurveillance Gateway, is in place at Los Alamos National Laboratory, providing a centralized portal for all news, information, resources and research related to biosurveillance at the laboratory. The goal of the site is to support global disease surveillance, providing useful tools for professionals around the world to reference from a single location.
By analyzing such parameters as the force applied by key presses and the time interval between them, a new self-powered non-mechanical intelligent keyboard could provide a stronger layer of security for computer users. The self-powered device generates electricity when a user’s fingertips contact the multi-layer plastic materials that make up the device.
Researchers have demonstrated that the 1935 Einstein-Podolsky-Rosen quantum mechanics paradox may be extended to more than two optical systems, paving the way for exploration of larger quantum networks. The experiment also identified properties that may be useful in establishing secure quantum communication networks where shared sequences of numbers created between two parties need to be kept secret from a third party.
A handwritten notebook by Alan Turing, the World War II code-breaking genius depicted by Benedict Cumberbatch in the Oscar-nominated The Imitation Game, is going on the auction block. The 56-page manuscript was written at the time the British mathematician and computer science pioneer was working to break the seemingly unbreakable Enigma codes used by the Germans throughout World War II. It is expected to bring at least $1 million.
Cybersecurity Expert Warns Not Enough Being Done to Prevent Highly Destructive Cyberattacks on Critical InfrastructureJanuary 21, 2015 1:13 pm | by International Society of Automation | News | Comments
Inadequate training and a culture of complacency among many owners and operators of critical infrastructure are significantly raising the risks of highly damaging cyberattack throughout the world. That’s the viewpoint expressed by Steve Mustard, an industrial cybersecurity subject-matter expert and consultant with extensive development and management experience in real-time embedded equipment and automation systems.
The U.S. and U.K. will stage cyber "war games" together, starting this year, to boost both countries' resistance to cyberattacks, Britain's government said. The two Western powers have also agreed to launch a joint cyber cell to share information on cyberthreats, as both countries seek to ramp up their cyberdefenses in the wake of alarming attacks. The FBI and National Security Agency will be involved, along with Britain's GCHQ and MI5...
No software-based technique can fully replace bulk collection of signals intelligence, but methods can be developed to more effectively conduct targeted collection and to control usage of collected data, says the NRC. Automated systems for isolating collected data, restricting queries that can be made against those data, and auditing usage of the data can help to enforce privacy protections and allay some civil liberty concerns.
President Barack Obama has said that recent cyberthreats to Sony and the military's U.S. Central Command are reminders of the serious threats facing the nation. Obama laid out plans on January 13, 2015, as part of a push for new cybersecurity legislation that increases government information-sharing and protects businesses from lawsuits for revealing cyberthreats.
If you’re sitting in a coffee shop, tapping away on your laptop, feeling safe from hackers because you didn’t connect to the shop’s Wi-Fi, think again. The bad guys may be able to see what you’re doing just by analyzing the low-power electronic signals your laptop emits, even when it’s not connected to the Internet. Side-channel signals could provide hackers with another way to see what the devices are doing.
- Page 1