In the digital age in which we live, monitoring, security breaches and hacks of sensitive data are all too common. It has been argued that privacy has no place in this big data environment and anything we put online can, and probably will, be seen by prying eyes. In a new paper, a privacy law expert makes the case that, when properly understood, privacy rules will be an essential and valuable part of our digital future.
The National Institute of Standards and Technology (NIST) has published the final version of the...
The supply chain is ground zero for several recent cyber breaches. Hackers, for example, prey on...
IBM announced that Caris Life Sciences is using IBM technical computing and storage technology...
Governor Jindal and LSU President and Chancellor Alexander announced creation of the LSU Transformational Technology and Cyber Research Center, which will pursue major federal and commercial research projects in applied technology fields, leveraging the university’s unique strengths in such disciplines as supercomputing, cybersecurity and nanotechnology.
The largest information technology agreement ever signed by Los Alamos National Laboratory brings the potential for truly secure data encryption to the marketplace after nearly 20 years of development at the nation's national-security science laboratory.
CAPTCHA services that require users to recognize and type in static distorted characters may be a method of the past, according to studies published by researchers at the University of Alabama at Birmingham. Nitesh Saxena led a team that investigated the security and usability of the next generation of CAPTCHAs that are based on simple computer games.
Trust is good, control is better. This also applies to the security of computer programs. Instead of trusting “identification documents” in the form of certificates, the JOANA software analysis tool examines the source text (code) of a program. In this way, it detects leaks, via which secret information may get out or strangers may enter the system from outside. At the same time, JOANA reduces the number of false alarms to a minimum.
The Antwerp Diamond Center theft and other sophisticated, high-value heists show that motivated criminals can find ways to overcome every obstacle between them and their targets. Can the Energy and Defense departments, responsible for analyzing, designing and implementing complex systems to protect vital national security assets, learn from security failures in the banking, art and jewelry worlds? Sandia Labs set out to answer that question
An Android app has been created that allows users to get together to crack a modern cryptographic code. All encryption types, among which we can find the widely used RSA, can theoretically be broken. If so, how to ensure that our data remains protected? The answer lies in the time and effort required to break the code.
High-profile security breaches, data thefts and cyberattacks are increasing in frequency, ferocity and stealth. They result in significant loss of revenue and reputation for organizations, destabilize governments, and hit everyone’s wallets. Cybersecurity is in the global spotlight and, now more than ever, organizations must understand how to identify weaknesses and protect company infrastructure from incursions.
According to a group of journalists, a spy program known as "Hacienda" is being used by five western intelligence agencies to identify vulnerable servers across the world in order to control them and use them for their own purposes. However, scientists at the Technische Universität München have developed free software that can help prevent this kind of identification and, thus, the subsequent capture of systems.
Florida Polytechnic University, Flagship Solutions Group and IBM have announced a new supercomputing center at the University composed of IBM high performance systems, software and cloud-based storage, to help educate students in emerging technology fields. Florida Polytechnic University is the newest addition to the State University System and the only one dedicated exclusively to science, technology, engineering and mathematics (STEM).
Ah, sad news in the Hice household. The patient is terminal, and I’m keeping it alive on life support. I keep wallowing in self-pity and ask myself, “Why me?” I feel as though I’m somehow responsible for the illness. Well, OK, I’m definitely responsible, why lie? I may as well have been sharing blood-soaked hypos with a drug addict, but what I did was equally careless. In one brief lapse of concentration, I didn’t examine the URL ...
The command center: any place which provides centralized command, a source of leadership and guidance to the rest of the organization. That’s what I see the concept of ELN developing into in research and development (R&D) across all sectors. Furthermore, it won’t be just a notebook, but a ’workplace.’
As our lives and businesses become ever more intertwined with the Internet and networked technologies, it is crucial to continue to develop and improve cybersecurity measures to keep our data, devices and critical systems safe, secure, private and accessible. The NSF's Secure and Trustworthy Cyberspace program has announced two new center-scale "Frontier" awards to support projects that address grand challenges in cybersecurity science
One in 18 of the world’s top 100,000 Web sites track users without their consent using a previously undetected cookie-like tracking mechanism embedded in ‘share’ buttons. A new study by researchers at KU Leuven and Princeton University provides the first large-scale investigation of the mechanism and is the first to confirm its use on actual Web sites.
The National Institute of Standards and Technology (NIST) has issued for public review and comment a draft report summarizing 65 challenges that cloud computing poses to forensics investigators who uncover, gather, examine and interpret digital evidence to help solve crimes.
Cellphone metadata has been in the news quite a bit lately, but the National Security Agency isn’t the only organization that collects information about people’s online behavior. Newly downloaded cellphone apps routinely ask to access your location information, your address book or other apps and, of course, Web sites like Amazon or Netflix track your browsing history in the interest of making personalized recommendations.
At a busy shopping mall, shoppers walk by store windows to find attractive items to purchase. Through the windows, shoppers can see the products displayed, but may have a hard time imagining doing something beyond just looking, such as touching the displayed items or communicating with sales assistants inside the store. With TransWall, however, window shopping could become more fun and real than ever before.
By now, most people feel comfortable conducting financial transactions on the Web. The cryptographic schemes that protect online banking and credit card purchases have proven their reliability over decades. As more of our data moves online, a more pressing concern may be its inadvertent misuse by people authorized to access it. Every month seems to bring another story of private information accidentally leaked
In early March, a mysterious ship the size of a large passenger ferry left a Romanian wharf, glided through the narrow Bosporus that separates Europe and Asia, and plotted a course toward Scandinavia. About a month later, at the headquarters of Norway's military intelligence service, the country's spy chief disclosed its identity. It was a $250 million spy ship that will be equipped with sensors and other technology to snoop on Russia.
HP has announced new innovations and sustainable enterprise infrastructure solutions designed to deliver the simplicity, efficiency and investment protection organizations need to bridge the datacenter technologies of today and tomorrow. Big data, mobility, security and cloud computing are forcing organizations to rethink their approach to technology, causing them to invest heavily in IT infrastructure.
As more people use smart phones or tablets to pay bills, make purchases, store personal information and even control access to their houses, the need for robust password security has become more critical than ever. A new study shows that free-form gestures — sweeping fingers in shapes across the screen of a smart phone or tablet — can be used to unlock phones and grant access to apps.
Atos, an international information technology services company, and Bull, a partner for enterprise data, together announced the intended public offer in cash by Atos for all the issued and outstanding shares in the capital of Bull. Atos offer is set at 4.90 euros per Bull's share in cash, representing a 22 percent premium over the Bull's closing price
Web services companies, such as Facebook, Google and Microsoft, all make promises about how they will use personal information they gather. But ensuring that millions of lines of code in their systems operate in ways consistent with privacy promises is labor-intensive and difficult. A team from Carnegie Mellon University and Microsoft Research, however, has shown these compliance checks can be automated.
The United States announced on Monday unprecedented cyber espionage charges against five Chinese military officials accused of hacking into U.S. companies to gain trade secrets. The hackers targeted big-name makers of nuclear and solar technology, stealing confidential business information, sensitive trade secrets and internal communications for competitive advantage, according to a grand jury indictment.
More than a half million computers in over 100 countries were infected by sophisticated malware that lets cybercriminals take over a computer and hijack its webcam, authorities said as charges were announced May 19, 2014, against more than 100 people worldwide.
Researchers have solved one aspect of the discrete logarithm problem. This is considered to be one of the 'holy grails' of algorithmic number theory, on which the security of many cryptographic systems used today is based. The team has devised a new algorithm that calls into question the security of one variant of this problem. The result discredits several cryptographic systems ...
- Page 1