• U.S. government takes leap into the Internet cloud

    Vivek Kundra, the White House CIO, said wider adoption of cloud computing solutions would allow federal agencies to “fulfill their missions at lower cost, faster, and ultimately, in a more sustainable manner”

  • How cloud computing can help the U.S. government -- and citizens

    The administration has seen benefits in the way private industry uses cloud computing, and intends to mirror these benefits; ultimately, the idea is to make it simple for agencies to procure the applications they need

  • Swayze's death, Williams's outburst, exploited to serve up fake anti-virus

    Cyber criminals exploit the interest of people in breaking news by creating Web sites designed to rip off users searching for more information; surfers visiting these sites are warned of non-existent security problems in a bid to trick them into buying software of little or no utility

  • Cocoon Data: Securing Internet communication

    Cocoon Data’s Secure Envelopes is a way of electronically “wrapping” sensitive files, e-mail attachments, and other data to keep them from being seen by unintended eyes

  • view counter
  • New data protection approach

    New data security system developed by Israeli researchers automatically protects sensitive data because it travels with the data even when it is saved to removable devices like a USB flash drive

  • Code-breaking quantum algorithm runs on a silicon chip

    fifteen years ago, Peter Shor, a computer scientist at MIT, predicted that quantum computers could beat even the most powerful supercomputers and crack the widely used RSA encryption algorithm; he was right: University of Bristol researchers built a silicon chip that can do just that

  • view counter
  • Russia's cyber warfare strategies, I

    The August 2008 Georgia-Russia war was accompanied by a sustained, well-integrated, and pre-planned information warfare campaign against Georgia’s Internet structure

  • Cloud computing, social network to help software security

    The difference between Immunet’s offering and other companies’ products, say its founders, is the software’s ability to protect digital communities — those users connected together via social networks such as instant messaging, Facebook, or Twitter

  • Simulation to help in preparing for wildfires

    Increasingly complex systems which combine simulation and monitoring tools could help emergency services prevent future ecological disasters on the scale witnessed in Greece this week

  • Writing style identity tool easily fooled

    It was thought that writing style is almost as unique to a person as a fingerprint or DNA, and literary historians and courts used the approach; a new study suggests that some of these so-called stylometry techniques are easily fooled, even by people without linguistic or literary training

  • Making software safer

    More and more security systems in aircraft and motor vehicles rely on software for their operation; Aussie researchers develop away to make sure such software is safe

  • University of Detroit Mercy receives cyber security research contract

    The aim of the $551,500 federal contract is to develop and disseminate the knowledge necessary to ensure that the software that enables America’s business and critical infrastructure is safe and secure

  • Hacking schools flourish in China

    Chinese hackers have been on the forefront of sustained hacking and disruption campaign against Western business and government networks — some do it for fun, other for profit, but many do so on behalf of the Chinese government and its many intelligence and military agencies; ever wondered where all these hackers come from? “Hacker schools” are big business in China, generating $34.8 million last year

  • Anti-theft software creates security hole

    A piece of anti-theft software built into many laptops at the factory opens a serious security hole

  • U r pwned: text messaging as a hacking tool

    Text messages appear on mobile phones without any interaction from the user, and sometimes with limited interference from the cellular network operators — giving criminals an opening to break into those devices