Advertisement
Security
Subscribe to Security

The Lead

Deriving Real Time Value from Big Data

May 22, 2015 9:51 am | by Pat McGarry, Ryft Systems | Blogs | Comments

Everyone has heard the old adage that time is money. In today’s society, business moves at the speed of making a phone call, looking something up online via your cell phone, or posting a tweet. So, when time is money (and can be a lot of money), why are businesses okay with waiting weeks or even months to get valuable information from their data?

With One False Tweet, Computer-based Hack Crash Led to Real Panic

May 21, 2015 9:30 am | by Bert Gambini, University at Buffalo | News | Comments

A false tweet from a hacked account owned by the Associated Press in 2013 sent financial markets...

Smart Algorithms Secure Chip Cards against Hackers

May 21, 2015 8:47 am | by University of Twente | News | Comments

Scientists have succeeded in securing chip cards against leaking confidential information....

Blind Signatures Using Offline Repositories Provide New Level of Security

May 15, 2015 3:35 pm | by World Scientific | News | Comments

In the new era of quantum computers, many daily life applications, such as home banking, are...

View Sample

FREE Email Newsletter

In future telerobotic procedures, the last communication link may be a wireless uplink (dotted lines) to a drone or satellite that is more easily hacked than pre-established network connections (solid lines.) Courtesy of University of Washington

Researchers hack Teleoperated Surgical Robot to Reveal Security Flaws

May 8, 2015 10:48 am | by Jennifer Langston, University of Washington | News | Comments

To make cars as safe as possible, we crash them into walls to pinpoint weaknesses and better protect people who use them. That’s the idea behind a series of experiments conducted by an engineering team who hacked a next-gen teleoperated surgical robot — one used only for research purposes — to test how easily a malicious attack could hijack remotely-controlled operations in the future and to make those systems more secure.

An FPGA board along with a custom sensor box built by the GTRI team for research purposes. Courtesy of Georgia Tech/Rob Felt

Advancing Security and Trust in Reconfigurable Devices

May 4, 2015 2:24 pm | by Rick Robinson, Georgia Institute of Technology | News | Comments

A research team at the Georgia Tech Research Institute is studying a range of security challenges involving programmable logic devices — in particular, field programmable gate arrays. FPGAs combine hardware performance and software flexibility so well that they're increasingly used in aerospace, defense, consumer devices, HPC, vehicles, medical devices and other applications. But they come with potential vulnerabilities.

MIT spinout Verayo has created technology that tracks random variations in silicon chips to assign them unique "fingerprints." Integrated into radio frequency identification tags (shown here), the chips can be scanned by a mobile device or reader to deter

Fingerprinting Silicon Chips to Fight Counterfeiting

May 1, 2015 9:31 am | by Rob Matheson, MIT | News | Comments

It’s often said that no two human fingerprints are exactly alike. For that reason, police often use them as evidence to link suspects to crime scenes. The same goes for silicon chips: Manufacturing processes cause microscopic variations in chips that are unpredictable, permanent and effectively impossible to clone.

Advertisement
The option of doing predictive analytics via the cloud gives security teams the flexibility to bring in skills, innovation and information on demand across all of their security environments.

Bringing Cyber Threat Predictive Analytics to The Cloud

April 27, 2015 9:51 am | by IBM | News | Comments

IBM is bringing its Security Intelligence technology, IBM QRadar, to the cloud, giving companies the ability to quickly prioritize real threats and free up critical resources to fight cyberattacks. The new services are available through a cloud-based software as a service (SaaS) model, with optional IBM Security Managed Services to provide deeper expertise and flexibility for security professionals.

Defense Secretary Ash Carter said one way the Defense Department is responding is to be more transparent about cybersecurity, and that includes a new cybersecurity strategy that is far more open about the Pentagon's cyber missions. Courtesy of Greg West

New Pentagon Strategy Warns of Cyberwar Capabilities

April 24, 2015 9:45 am | by Lolita C. Baldor, Associated Press | News | Comments

A new Pentagon cybersecurity strategy lays out for the first time publicly that the U.S. military plans to use cyberwarfare as an option in conflicts with enemies. The 33-page strategy says the Defense Department "should be able to use cyber operations to disrupt an adversary's command and control networks, military-related critical infrastructure and weapons capabilities."

Cloud Security Reaches Silicon: Defending against Memory-access Attacks

April 23, 2015 1:53 pm | by Larry Hardesty, MIT | News | Comments

In the last 10 years, computer security researchers have shown that malicious hackers don’t need to see your data in order to steal your data. From the pattern in which your computer accesses its memory banks, adversaries can infer a shocking amount about what’s stored there.

The winners of the CyberCenturion National Finals Competition, King Edward VI Grammar School, Chelmsford, with their coach pictured in front of Collossus at The National Museum of Computing, Bletchley Park. Their awards were presented April 17 by Andrew T

UK CyberCenturion Competition Launches in Search for Young Cyber Security Talent

April 22, 2015 2:43 pm | by Northrop Grumman | News | Comments

Northrop Grumman has renewed its commitment to run the CyberCenturion competition for a second year, continuing its efforts to seek out the UK's best young cyber talent. CyberCenturion is the UK's first team-based cyber security contest specifically designed to attract 12- to 18-year-olds. The competition aims to engage young people with an interest in cyber as a way to address the STEM skills gap and encourage careers in cyber security.

Suresh Venkatasubramanian, left, and Matt Might, both associate professors of computer science at the University of Utah, have received a $3 million government grant to produce software that can sniff out the next generation of computer vulnerabilities. T

Algorithmic Attacks: Fighting Next-gen Cyber Threats

April 17, 2015 3:45 pm | by University of Utah | News | Comments

The next generation of cyberattacks will be more sophisticated, more difficult to detect and more capable of wreaking untold damage on the nation’s computer systems. So, the DoD has given a $3 million grant to a team of computer scientists to develop software that can hunt down a new kind of vulnerability nearly impossible to find with today’s technology. The team is tasked with creating an analyzer that can thwart algorithmic attacks.

Advertisement
Ransomware infiltrates a computer after a user clicks on a link or attachment in an e-mail. It can also attack when a user visits a Web site, including well-known ones with good security systems.

A Q&A about the Malicious Software Known as Ransomware

April 9, 2015 4:23 pm | by Joyce M. Rosenberg, AP Business Writer | News | Comments

Ransomware is a growing threat to computer users, who can suddenly find they're unable to open or use their files when their machines are infected. The malicious software can attack any user — an individual, small business, Fortune 500 company or a government agency.

President Barack Obama speaks in the Oval Office of the White House in Washington. President Barack Obama on Wednesday authorized a new U.S. government approach to deterring cyberattacks: financial sanctions against malicious overseas hackers and companie

Obama Signs Order Creating New Cyber Sanctions Program

April 9, 2015 9:59 am | by Ken Dilanian, AP Intelligence Writer | News | Comments

President Barack Obama authorized a new U.S. government approach to deterring cyberattacks on April 8, 2015: financial sanctions against malicious overseas hackers and companies that knowingly benefit from the fruits of cyberespionage. The latter category could include state-owned corporations in Russia, China and elsewhere, setting the stage for major diplomatic friction if the sanctions are employed in that way.

A high resolution image of the data transition region on a CD-ROM taken with an Olympus OLS 4000 LEXT 3-D digital laser confocal microscope. The sharp points are data on a compact disk. Courtesy of Greg Gogolin, Ph.D., Information Security & Intelligence,

Restoring Lost Data: 3-D Digital Laser Microscopy Creates Visual Roadmap

April 6, 2015 4:12 pm | by Marlene Cimons, National Science Foundation | News | Comments

It can be disheartening to learn that something precious, such as a one-of-a-kind family photo, has disappeared from a scratched or broken CD or DVD. It also can become serious, dangerous and potentially costly if it happens to a disc containing criminal forensic evidence, corporate records or scientific data. But there may be a way in the future to bring the material back.

Genomics processing is now moving mainstream to clinical applications, as new approaches to diagnosing and treatment involving genomics are gaining interest.

Efficient, Time Sensitive Execution of Next-gen Sequencing Pipelines Critical for Translational Medicine

April 6, 2015 3:26 pm | by Suzanne Tracy, Editor-in-Chief, Scientific Computing and HPC Source | Blogs | Comments

Demand for genomics processing is rapidly spreading from research labs to the clinical arena. Genomics is now a "must have" tool for researchers in areas of oncology and rare diseases. It is also becoming a requirement in the clinical space for precision medicine, translational medicine and similar "bench to bedside" initiatives.

MOVIA Big Data Analytics Platform

MOVIA Big Data Analytics Platform

March 30, 2015 1:38 pm | by Modus Operandi, Inc. | Modus Operandi, Inc. | Product Releases | Comments

MOVIA Big Data Analytics Platform is designed to help organizations watch for important patterns in their data and generate instant alerts to users or other systems. The software enables improved prediction of trends through advanced data modeling that captures situational context, so decisions are not ‘made in a vacuum.’

Advertisement
Hamlin, left, and Webb with a book about breaking the Nazi Enigma code, which was also the subject of the recent film, The Imitation Game. Courtesy of Rebecca Phillips, WSU

Mathematicians adapt Knapsack Code to take on Quantum-level Cyber Attacks

March 27, 2015 11:24 am | by Rebecca Phillips, Washington State University | News | Comments

Mathematicians have designed an encryption code capable of fending off the phenomenal hacking power of a quantum computer. Using high-level number theory and cryptography, the researchers reworked an infamous old cipher called the knapsack code to create an online security system better prepared for future demands.

Integer overflows occur when a computer tries to store too large a number in the memory space reserved for it. The leading digits are discarded — much as they are when a car odometer turns over. Courtesy of Jose-Luis Olivares/MIT

Better Debugger: Algorithm Automatically Finds Integer-overflow Bugs

March 26, 2015 9:52 am | by Larry Hardesty, MIT | News | Comments

Integer overflows are one of the most common bugs in computer programs — not only causing programs to crash but, even worse, potentially offering points of attack for malicious hackers. A new algorithm for identifying integer-overflow bugs was tested on five common open-source programs, in which previous analyses had found three bugs. The new algorithm found all three known bugs — and 11 new ones.

The aim of Public Encryption is to bring end-to-end encryption to the masses. © Fraunhofer SIT

Cryptography for Everyone: Bringing End-to-end Encryption to the Masses

March 17, 2015 2:42 pm | by Fraunhofer-Gesellschaft | News | Comments

In the wake of the revelations that intelligence agencies have been engaged in mass surveillance activities, both industry and society at large are looking for practicable encryption solutions that protect businesses and individuals. Previous technologies have failed in practice because they were too expensive or not user friendly enough. An open initiative called “Volksverschlüsselung” aims to bring end-to-end encryption to the masses.

People celebrate Pi Day around the world with pie-eating, pie-throwing and even pi-recitation contests, where participants recite digits of this irrational number from memory. Courtesy of Medea Material

Once-in-a-Century: Celebrating 10 Digits of Pi on 3.14.15 at 9:26:53

March 12, 2015 9:42 am | by Suzanne Tracy, Editor-in-Chief, Scientific Computing and HPC Source | Blogs | Comments

An e-pi-c day is coming! On 3.14.15 at 9:26:53; the date/time will correspond to the first 10 digits of the mathematical constant pi (3.141592653). This happens only once per century — a truly once-in-a-lifetime event for most people.

From April onward De-Mail, an e-mail service available to anyone in Germany, will feature end-to-end encryption based on the Pretty Good Privacy system. Courtesy of Safwat Sayed

German Government Backs End-to-End E-mail Encryption

March 10, 2015 10:29 am | by Frank Jordans, Associated Press | News | Comments

Users of an e-mail service backed by the German government will soon be able to rely on strong encryption of the kind that used to be the preserve of geeks and hackers, officials said on March 9, 2015. From April onward De-Mail, an e-mail service available to anyone in Germany, will feature end-to-end encryption based on the Pretty Good Privacy system.

A 3.15 mm QR code storing an encrypted and compressed image shown placed on an integrated circuit and an image of the QR code placed next to a dime. Courtesy of Adam Markman/Brhram Javidi

Ordinary QR Code Transformed into High-End Cybersecurity Application

March 2, 2015 11:21 am | by Colin Poitras, University of Connecticut | News | Comments

QR codes have been used to convey information about everything from cereals to cars and new homes. But researchers think the codes have a greater potential: protecting national security. Using advanced 3-D optical imaging and extremely low light photon counting encryption, researchers have taken the ordinary QR code and transformed it into a high-end cybersecurity application to protect the integrity of computer microchips.

Russia's defense ministry is establishing its own cyber command responsible for offensive activities, "including propaganda operations and inserting malware into enemy command and control systems." Courtesy of Contando Estrelas

Russian Cyber Threat more Severe than Previously Assessed

February 26, 2015 1:11 pm | by Ken Dilanian, AP Intelligence Writer | News | Comments

The U.S. has elevated its appraisal of the cyber threat from Russia, the U.S. intelligence chief said February 26, 2015, as he delivered the annual assessment by intelligence agencies of the top dangers facing the country. "While I can't go into detail here, the Russian cyber threat is more severe than we had previously assessed," James Clapper, the director of national intelligence, told the Senate Armed Services Committee.

Building on two decades of incremental research on data storage, IMDEA Networks launches the scientific project ATOMICDFS, with the aim to tackle the challenge of “Seeking Efficient Atomic Implementations of Distributed Data Storage.”

Achieving Efficient, Strongly Consistent Data Storage

February 18, 2015 12:15 pm | by Nicolas Nicolaou, IMDEA Networks Institute | Blogs | Comments

One of the fundamental and open problems in computer science is effective data storage. Unfortunately, magnetic and flash storage devices alone have proven to be unreliable to guarantee data availability and survivability, due to their frequent and unpredictable failures. ATOMICDFS aims to investigate the existence of highly efficient DFS able to provide atomic guarantees in harsh environments.

id the National Security Agency plant spyware deep in the hard drives of thousands of computers used by foreign governments, banks and other surveillance targets around the world?  A new report from Russian cybersecurity firm Kaspersky Lab said its resear

Cyber Espionage: Seagate, Western Digital, Toshiba, IBM Products Reported Compromised

February 18, 2015 9:36 am | by Brandon Bailey, AP Technology Writer | News | Comments

Did the National Security Agency plant spyware deep in the hard drives of thousands of computers used by foreign governments, banks and other surveillance targets around the world? A new report from Russian cybersecurity firm Kaspersky Lab said its researchers identified a new family of malicious programs or worms that infected computers in multiple countries, primarily overseas.

Apple CEO Tim Cook, right, watches as President Barack Obama speaks during a summit on cybersecurity and consumer protection at Stanford University in Palo Alto, CA. (AP Photo/Evan Vucci)

Obama calls on Silicon Valley to help thwart Cyber Attacks

February 17, 2015 2:15 pm | by Darlene Superville and Martha Mendoza, Associated Press | News | Comments

Cyberspace is the new "Wild West," President Barack Obama said, with everyone looking to the government to be the sheriff. But he told the private sector it must do more to stop cyber attacks aimed at the U.S. every day. Obama signed an executive order aimed at making it easier for private firms to have access to classified information about cyber attacks.

Cybersecurity students Kai Greshake, Eric Petryka and Jens Heyens have discovered 39,890 unprotected Internet databases.

Security Gaps Discovered in 39,890 Online Databases

February 11, 2015 12:24 pm | by University Saarland | News | Comments

Due to a misconfigured open source database upon which millions of online stores and platforms from all over the world base their services, anyone had the ability to call up or modify several million pieces of customer data online including names, addresses and e-mails. According to the Center for IT-Security, Privacy and Accountability, this vulnerability was demonstrated for 40,000 online databases.

Map generated by more than 250 million public tweets Courtesy of Salathé et al.

Digital Disease Detection: Using Big Data to Detect Outbreaks

February 10, 2015 11:42 am | by PLOS | News | Comments

Personal information taken from social media, blogs, page views and so on is used to detect disease outbreaks, but does this violate our privacy, consent and trust? Dr. Effy Vayena from the University of Zurich and colleagues have mapped the numerous ethical challenges confronting digital disease detection and propose a framework to address the questions.

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading