Press

A start-up named Broala has been formed to expand the open-source intrusion detection system known simply as Bro that has been used in high-speed research networks for about two decades.

"Space Flights Bring Speech Technology Home"
June 7, 2013 | Leonard Klie, Speech Technology Magazine

Members of the IEEE, a global professional organization for technological advances in aerospace systems, computers, telecommunications, biomedical engineering, and consumer electronics, have found that advances in voice activation, wireless power, and remote sensing for space travel and exploration will play an increasingly significant role in the advancement of consumer electronics products used by the average human being here on Earth.

"Hear Ye, Future Deep Throats: This Is How You Leak to the Press"
May 14, 2013  |  Nicholas Weaver, Wired.com

We now live in a world where public servants informing the public about government behavior or wrongdoing must practice the tradecraft of drug dealers and spies. Otherwise, these informants could get caught in the web of administrations that view George Orwell’s 1984 as an operations manual.

"Cybercasing- How Sharing Your Pics, Videos and Status Updates Can Get You Into Trouble"
April 30, 2013  |  Alex Merton-McCann, Cyber Security Mum Australia, McAfee

It can be fun ‘checking in’ at your favourite restaurant on Facebook, sharing pics of your hotel room on Instagram or buying and selling items on eBay. In fact – it can give you quite a buzz. But did you know that ‘geotagging’ (sharing your location via your pics or videos) can put you and your possessions at risk??

"Nowhere to Hide: Video Location Tech Has Arrived"
February 21, 2013  |  Bill Snyder, Tech's Bottom Line, InfoWorld

Researchers at ICSI are currently building a video database by analyzing videos downloaded from Flickr, says Gerald Friedland, who leads ICSI’s multimedia efforts. Data from videos taken at known locations is used to develop profiles of the respective locations.

"Researchers Find Way to Pinpoint Where Online Video Was Shot"
February 19, 2013  |  Bill Snyder, Consumer Tech Radar, CIO Blogs

Suppose a terrorist holding hostages at a secret location makes a video demanding ransom. Now imagine that law enforcement officials can take that video, process it and run it through a database that pinpoints the precise location where it was shot based on images and sounds in the video.

A male’s genome contains information that can help scientists guess his surname, American and Israeli researchers have discovered. The findings have serious implications for data privacy; intelligence services around the world are bound to be interested.

“An Interactive Graph of the Certificate Authority Ecosystem”
December 14, 2012 | Posted by Soulskill, Slashdot.org

Researchers of the International Computer Science Institute in Berkeley have created an interactive diagram that shows root-CAs, their intermediates, the relationships between them and how many certificates have been signed by them. The graph was generated by passively monitoring the Internet uplinks of a number of (mostly) edu sites for SSL connections and their certificate Information.

“Rogue Pharma, Fake AV Vendors Feel Credit Card Crunch"
October 18, 2012  |  Brian Krebs, Krebs On Security

Security experts are warning that a newly discovered vulnerability in Internet Explorer 8 is being actively exploited to break into Microsoft Windows systems. Complicating matters further, computer code that can be used to reliably exploit the flaw is now publicly available online. In an advisory released May 3, Microsoft said it was investigating reports of a vulnerability in IE8, and that it was aware of attacks that attempt to exploit this bug. The company stresses that other versions of IE — including IE6, 7, 9 and 10 are not affected by the vulnerability. However, all versions of IE8 are vulnerable, including copies running on Windows XP, Vista and Windows 7.

“Colleges Receive $10 Million Grant to Study Cyber Crime”
September 28, 2012  |  Catherine Groux, U.S. News University Connection

Last year, the federal Internet Crime Complaint Center received more than 300,000 reports of cyber crime, as it watched Americans lose about $485.3 million to such attacks in 2011 alone. These figures show the rise of cyber crime throughout the nation and underline the need for the U.S. to find ways to prevent it.

Pages