security
See the following -
All Scientific Papers to Be Free by 2020 Under EU Proposals
All publicly funded scientific papers published in Europe could be made free to access by 2020, under a “life-changing” reform ordered by the European Union’s science chief, Carlos Moedas. The Competitiveness Council, a gathering of ministers of science, innovation, trade and industry, agreed on the target following a two-day meeting in Brussels last week...
- Login to post comments
An open source cyberattack tracking tool released called Hone
Researchers at an Energy Department lab have released an open-source tool called Hone to spot the source of malicious activity inside the enterprise more quickly. Glenn Fink, a computer scientist at the Pacific Northwest National Laboratory, invented Hone to help pinpoint compromises. Read More »
- Login to post comments
Analysis: Government’s Vast Lockers Of Data Threaten Basic Individual Freedoms
I’m going to try to tie together strands of information NSA-style and see if a pattern emerges. I will be looking for signs that America’s historic definition and understanding of privacy are being eroded. I will also try to understand if that erosion could fundamentally alter an individual American’s relationship to government power. Read More »
- Login to post comments
ANALYSIS: Happy Data Privacy Day, Punk!
Data Privacy Day starts on January 28, but the parties behind it might not be its best advocates, nor even take the concept seriously. Read More »
- Login to post comments
Analysis: IT Experts Question Architecture Of Obamacare Website
Days after the launch of the federal government's Obamacare website, millions of Americans looking for information on new health insurance plans were still locked out of the system even though its designers scrambled to add capacity. Read More »
- Login to post comments
Anatomy Of An Electronic Health Record Zero-Day
How a dangerous security flaw discovered in one of the most pervasive electronic medical record platforms in the U.S. was found and fixed before it could do damage Read More »
- Login to post comments
Anonymous Claim Apple's Touch ID Is Linked To US Surveillance
Anonymous have some big claims concerning Apple [AAPL] Touch ID system, claiming a connection between the technology and the US defense industry to claim it's just another step forward for state surveillance. Read More »
- Login to post comments
Anti-RSA TrustyCon Draws Packed House Seeking Modern Security Know-How
Disgusted by the possibility that RSA took $10 million in NSA money to use a deliberately flawed encryption algorithm, a small contingent of folks originally slated to appear at the 2014 RSA Conference decamped and staged their own security-themed get-together: TrustyCon. Read More »
- Login to post comments
Apple, Google, Facebook, Microsoft, Twitter And Others Call For More NSA Transparency
Apple, Google, Facebook, Microsoft are part of a broad alliance of technology companies and civil liberties groups that will tomorrow demand dramatically increased transparency around U.S. government surveillance efforts. Read More »
- Login to post comments
Apple’s Fingerprint ID May Mean You Can’t ‘Take The Fifth’
[...] While there’s a great deal of discussion around the pros and cons of fingerprint authentication — from the hackability of the technique to the reliability of readers — no one’s focusing on the legal effects of moving from PINs to fingerprints. Read More »
- Login to post comments
Are Apple iOS, OS X Flaws Really Backdoors For Spies?
Two recently-discovered flaws in Apple iOS and Mac OS X have security experts openly asking whether the software vulnerabilities represent backdoors inserted for purposes of cyber-espionage. There's no clear answer so far, but it just shows that anxiety about state-sponsored surveillance is running high. Read More »
- Login to post comments
Are Federal IT Initiatives Strangling Agency Networks?
Dubbing the collective of federal IT efforts currently under way the “Big Five” in a report published Monday, MeriTalk found that the majority of agencies intend to deploy them within the next two years. Read More »
- Login to post comments
B3 Group Awarded DVA T4 Task Order for 24 x 7 Core Infrastructure Service (CIS) Support
B3 Group, Inc. will be partnering with ProSphere-Tek to provide to the VA with 24×7 Core Infrastructure Service (CIS) Support on this five (5) year contract. The mission of the Department of Veterans Affairs (VA), Office of Information & Technology (OI&T), Service Delivery and Engineering (SDE) Enterprise Systems Engineering (ESE), System Design and Core Systems Engineering Services (SDCS), Enterprise Messaging and Collaboration Services (EMCS)
- Login to post comments
Back Off, NSA: Blackphone Promises To Be The First Privacy-Focused Smartphone
You may never have heard of Geeksphone, unless you take a particular interest in Firefox OS, but the Spanish manufacturer could be about to garner some global attention. It says it'll launch a new handset at Mobile World Congress next month that will prioritize privacy and security instead of all the intrusions that smartphone users usually have to put up with [...]. Read More »
- Login to post comments
Battle Heats Up Over HealthCare.gov Paper Trail
A battle over the paper trail documenting the troubled building of the Obama administration’s online health insurance marketplace heated up on Friday as contractors declined to withhold some documents from congressional overseers and the lead investigating committee’s ranking Democrat accused his Republican counterpart of unfair dealing. Read More »
- Login to post comments