Blog Posts Tagged with "Research"

69dafe8b58066478aea48f3d0f384820

NIST Seeks Proposals to Improve Trust in Cyberspace

February 10, 2012 Added by:Headlines

The National Institute of Standards and Technology (NIST) launched a competition for pilot projects to accelerate progress toward improved systems for interoperable, trusted online credentials that go beyond simple user IDs and passwords...

Comments  (0)

01ceb9281b3fb3dbb90c3efbe327717e

How They Do IT: Spam Filters

February 08, 2012 Added by:Alan Woodward

The current volumes of spam email are extraordinary. Between 70% and 80% of all email sent are spam. As none of the current methods described here are completely effective, there is still scope for much further research in this area...

Comments  (0)

54b393d8c5ad38d03c46d060fa365773

Four Keys for Intellectual Property Protection

February 07, 2012 Added by:Jason Clark

Intellectual property includes product designs, secret formulas, and other trade knowledge. It's what organized cybercrime, state governments and hackers are all going after. Why? Mostly because of the value. One stolen manufacturing process can be worth millions...

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

Hacking Satellite Communications

February 06, 2012 Added by:Pierluigi Paganini

We must consider that compromised satellites are a serious risk, that the exposure could affect communications in the business and military sectors, and could also cause the loss of sensitive and strategic technological information...

Comments  (5)

69dafe8b58066478aea48f3d0f384820

Symantec Identifies Polymorphic Android App Malware

February 06, 2012 Added by:Headlines

Researchers at Symantec have identified a crafty Trojan targeting Android devices which slightly modifies its code every time the malware is downloaded, a called server-side polymorphism, which makes it more difficult to detect by signature-based antivirus software defenses...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

US Air Force Solicits Cutting Edge Cyber Technologies

January 18, 2012 Added by:Headlines

"The Air Force is seeking information on revolutionary hardware and software cyber technology and systems as well as innovative Tactics, Techniques, and Procedures (TTP) that will support, augment and in some cases extend mission range and scope..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Why I Won’t Teach You To Track Terrorists Online

January 17, 2012 Added by:Infosec Island Admin

This is an organic process. I learned by just doing it and in the process of “doing it” I had to learn A LOT of other things apart from technology issues like hacking/security/coding etc. Remember you are dealing with PEOPLE and you have to be adept and reading them...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Smart Grid: There Will be a Successful Attack

December 08, 2011 Added by:Headlines

"Interfacing so many different hardware and software components introduces vulnerabilities—especially when new and legacy hardware and software need to operate together... Perfect protection from cyber attacks is not possible. There will be a successful attack at some point..."

Comments  (0)

7ca9cf570bb97d22b119f3a70d335ede

Printer Hack: Researchers Can Set Media’s Pants on Fire

December 07, 2011 Added by:Brian Smithson

What was most irresponsible in this case was that the researchers took their exploit of one model of printer from one manufacturer and without even a cursory investigation extrapolated the threat to “hundreds of millions” of printers and fed it to a media hungry for sensational headlines...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Javelin Study Shows Increased Credit Card Fraud Risk

November 01, 2011 Added by:Robert Siciliano

Not a week goes by when we don’t hear of another major breach affecting thousands or even millions of customer accounts. Criminal hackers are getting smarter and savvier all the time, and they often have better technology than the banks and retailers tasked with protecting your data...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NIST Cooperative on 21st Century Smart Systems

October 20, 2011 Added by:Headlines

“There is a clear need for unifying principles within and across application domains. Investigating how cyber components can be synergistically interweaved with the diverse physical components in CPS pose foundational research challenges in science, engineering and computing..."

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Cryptography for Emerging Technologies and Applications

August 23, 2011 Added by:Headlines

The National Institute of Standards and Technology (NIST) is hosting a workshop on Cryptography for Emerging Technologies and Applications that is intended to identify the cryptographic requirements for emerging technologies and applications...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Identity Theft Has Long Lasting Psychological Effects

August 19, 2011 Added by:Robert Siciliano

The lack of specifics makes it difficult for victims to attain any closure and move forward. “No matter how well they monitor their financial records for the rest of their lives, they may still feel vulnerable,” Van Vliet says...

Comments  (0)

065b7cfbbb03ac9d18cbf5ed0615b40a

Black Hat OSPF Vulnerabilities: Much Ado about Nothing

August 11, 2011 Added by:Stefan Fouant

There is some merit to what these researchers have found and to a protocol junkie like myself. However, what they've completely overlooked is the first tenet of information security which is to ensure the physical environment is properly secured...

Comments  (0)

E973b16363b3de77b360563237df7e32

Information Gathering - Lessons from The Big Short

August 11, 2011 Added by:Bozidar Spirovski

Regardless of whether you need to collect information on a potential competitor, the target of a penetration test, for financial spread betting and derivatives trading, or even for financial research of a company there are several lessons that the "The Big Short" teaches us...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Capitalizing on Privacy Practices

July 22, 2011 Added by:David Navetta

Businesses that put privacy into the design of their products and services are less likely to face consumer and regulatory backlash. Businesses may benefit in another way from protective privacy practices - this recent study indicates that it may be leveraged as a selling point...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »