Inteligencia y Seguridad Frente Externo En Profundidad Economia y Finanzas Transparencia
  En Parrilla Medio Ambiente Sociedad High Tech Contacto
High Tech  
 

  Archivos 831 a 836 de 836

24/07/2010 | Fake femme fatale shows social network risks
Jaikumar Vijayan | ITworld
Researcher Thomas Ryan says fictitious Robin Sage character fooled many holding security, military and intelligence posts. ...
................................................................................................................................
24/07/2010 | Pentagon's Robots Transform Warfare
Sher Zieve | Consortium News
Editor’s Note: The Obama administration -- even more than its predecessor -- has turned to unmanned drones to hunt down and kill suspects in the global war against Islamic militants, a tactic that U.S. politicians like since no American troops are put in danger. ...
................................................................................................................................
21/07/2010 | Google's Wi-Spying and Intelligence Ties Prompt Call for Congressional Hearing
PR Newswire Staff | PR Newswire
Citing new information about Google's classified government contracts and the Internet giant's admitted Wi-Spying activity, Consumer Watchdog today said it is more imperative than ever for the Energy and Commerce Committee to conduct hearings into possible privacy violations by Google. ...
................................................................................................................................
20/07/2010 | Guerra virtual entre turcos e israelíes
Sal Emergui | El Mundo
Desde la masiva ofensiva israelí en la Franja de Gaza (diciembre 2008-enero 2009), el primer ministro turco, Recep Tayyip Erdogan, ataca sin pausa a Israel. La estrecha alianza estratégica entre ambos paises ha pasado duros exámenes en los últimos 18 meses siendo el asalto israelí a la flotilla organizada por el grupo turco IHH (9 muertos) el más grave y letal. ...
................................................................................................................................
10/07/2010 | US - Cybersecurity R&D efforts lack direction, leadership
Emily Long | NextGov
Poor coordination among federal agencies and with the private sector as well as lack of leadership from the Obama administration are threatening national cybersecurity research and development initiatives, according to the Government Accountability Office. ...
................................................................................................................................
10/07/2010 | Researcher cracks 'secret' code in U.S. Cyber Command logo
Gregg Keizer | Computerworld
MD5 cryptographic hash translates into cyber defense command's mission statement. ...
................................................................................................................................
09/07/2010 | Re-Categorizing Cyber Conflict
Eric R. Sterner | World Politics Review
At the end of May, the Senate confirmed Army Gen. Keith Alexander as commander of U.S. Cyber Command. The command's creation had already been controversial, and as a result, the Senate Armed Services Committee delayed Alexander's confirmation due to questions over roles and missions, authorities and restrictions. ...
................................................................................................................................
09/07/2010 | U.S. Plans Cyber Shield for Utilities, Companies
Siobhan Gorman | Wall Street Journal
The federal government is launching an expansive program dubbed "Perfect Citizen" to detect cyber assaults on private companies and government agencies running such critical infrastructure as the electricity grid and nuclear-power plants, according to people familiar with the program. ...
................................................................................................................................
05/07/2010 | Cybersecurity: Protect the Internet, but How?
Chris Bronk | World Politics Review


Since late last year, members of the U.S. Congress have introduced no less than 34 different bills dealing with information security and Internet policy. Many of these bills are well-meaning, such as the House resolution calling upon Vietnam to "release imprisoned bloggers and respect Internet freedom" -- even if the bill applies no penalties and, more importantly, appropriates no money. ...
................................................................................................................................
04/07/2010 | Hack into a smart phone? It's easy, security experts find
David Sarno | Los Angeles Times
Just one number can unlock your personal information, your private conversations and even your whereabouts to smart-phone hackers. ...
................................................................................................................................
 
Center for the Study of the Presidency
Freedom House