Press

"Space Flights Bring Speech Technology Home"
June 7, 2013 | Leonard Klie, Speech Technology Magazine

Members of the IEEE, a global professional organization for technological advances in aerospace systems, computers, telecommunications, biomedical engineering, and consumer electronics, have found that advances in voice activation, wireless power, and remote sensing for space travel and exploration will play an increasingly significant role in the advancement of consumer electronics products used by the average human being here on Earth.

"Hear Ye, Future Deep Throats: This Is How You Leak to the Press"
May 14, 2013  |  Nicholas Weaver, Wired.com

We now live in a world where public servants informing the public about government behavior or wrongdoing must practice the tradecraft of drug dealers and spies. Otherwise, these informants could get caught in the web of administrations that view George Orwell’s 1984 as an operations manual.

"Cybercasing- How Sharing Your Pics, Videos and Status Updates Can Get You Into Trouble"
April 30, 2013  |  Alex Merton-McCann, Cyber Security Mum Australia, McAfee

It can be fun ‘checking in’ at your favourite restaurant on Facebook, sharing pics of your hotel room on Instagram or buying and selling items on eBay. In fact – it can give you quite a buzz. But did you know that ‘geotagging’ (sharing your location via your pics or videos) can put you and your possessions at risk??

"Nowhere to Hide: Video Location Tech Has Arrived"
February 21, 2013  |  Bill Snyder, Tech's Bottom Line, InfoWorld

Researchers at ICSI are currently building a video database by analyzing videos downloaded from Flickr, says Gerald Friedland, who leads ICSI’s multimedia efforts. Data from videos taken at known locations is used to develop profiles of the respective locations.

"Researchers Find Way to Pinpoint Where Online Video Was Shot"
February 19, 2013  |  Bill Snyder, Consumer Tech Radar, CIO Blogs

Suppose a terrorist holding hostages at a secret location makes a video demanding ransom. Now imagine that law enforcement officials can take that video, process it and run it through a database that pinpoints the precise location where it was shot based on images and sounds in the video.

A male’s genome contains information that can help scientists guess his surname, American and Israeli researchers have discovered. The findings have serious implications for data privacy; intelligence services around the world are bound to be interested.

“An Interactive Graph of the Certificate Authority Ecosystem”
December 14, 2012 | Posted by Soulskill, Slashdot.org

Researchers of the International Computer Science Institute in Berkeley have created an interactive diagram that shows root-CAs, their intermediates, the relationships between them and how many certificates have been signed by them. The graph was generated by passively monitoring the Internet uplinks of a number of (mostly) edu sites for SSL connections and their certificate Information.

“Rogue Pharma, Fake AV Vendors Feel Credit Card Crunch"
October 18, 2012  |  Brian Krebs, Krebs On Security

Security experts are warning that a newly discovered vulnerability in Internet Explorer 8 is being actively exploited to break into Microsoft Windows systems. Complicating matters further, computer code that can be used to reliably exploit the flaw is now publicly available online. In an advisory released May 3, Microsoft said it was investigating reports of a vulnerability in IE8, and that it was aware of attacks that attempt to exploit this bug. The company stresses that other versions of IE — including IE6, 7, 9 and 10 are not affected by the vulnerability. However, all versions of IE8 are vulnerable, including copies running on Windows XP, Vista and Windows 7.

“Colleges Receive $10 Million Grant to Study Cyber Crime”
September 28, 2012  |  Catherine Groux, U.S. News University Connection

Last year, the federal Internet Crime Complaint Center received more than 300,000 reports of cyber crime, as it watched Americans lose about $485.3 million to such attacks in 2011 alone. These figures show the rise of cyber crime throughout the nation and underline the need for the U.S. to find ways to prevent it.

“Cybercrime Project Receives $10 Million from NSF"
September 28, 2012  |  Caroline Murphy, The Daily Californian

A project conducted by researchers from the UC Berkeley-affiliated International Computer Science Institute, UC San Diego and George Mason University has received a $10 million, five-year grant from the National Science Foundation to study social and economic issues connected to cybercrime. While much of cyber-security research focuses on the technological side of attacks, Beyond Technical Security: Developing an Empirical Basis for Socio-Economic Perspectives will take an interdisciplinary look into cybercriminals — how they work with each other, the marketplaces that they work in and the profit they gain.

Pages