Inteligencia y Seguridad Frente Externo En Profundidad Economia y Finanzas Transparencia
  En Parrilla Medio Ambiente Sociedad High Tech Contacto
High Tech  
 

  Archivos 871 a 880 de 890

19/02/2010 | Una investigación revela que el origen del ataque a Google está en China
ABC Staff | ABC
Después de varias investigaciones, incluidos expertos en espionaje electrónico de la Agencia de Seguridad Nacional (NSA) de Estados Unidos, se ha podido confirmar el origen de los ciberataques que sufrió Google en China y que llevaron a éste a amenazar a las autoridades chinas con abandonar sus operaciones en el país asiático. ...
................................................................................................................................
18/02/2010 | US - Feds allow prison phone jamming test
Brian Witte | GoogleNews
Equipment that jams cell phones will get its first federally sanctioned test inside a prison in Maryland this week, as state officials try to show Congress how the technology can prevent inmates from using the contraband devices to commit crimes, a governor's spokesman said Tuesday. ...
................................................................................................................................
15/02/2010 | Cyberspace is new front for Kashmiri separatists
Yusuf Jameel | The National
After being placed under house arrest before a rally outside the UN’s Kashmir headquarters earlier this month, Mirwaiz Umar Farooq, the region’s chief Muslim cleric and separatist leader, turned to the internet to deliver his message. ...
................................................................................................................................
13/02/2010 | ¨Operation Titstorm¨hackers declare cyber war on Australia
Kathy Marks | The Independent
Australia is poised to introduce some of the most severe internet restrictions in the democratic world – and the hackers don’t like it. ...
................................................................................................................................
13/02/2010 | China Alarmed by Security Threat From Internet
Sharon LaFraniere and Jonathan Ansfield | NY Times
Deep inside a Chinese military engineering institute in September 2008, a researcher took a break from his duties and decided — against official policy — to check his private e-mail messages. Among the new arrivals was an electronic holiday greeting card that purported to be from a state defense office. ...
................................................................................................................................
12/02/2010 | US - Feds push for tracking cell phones
Declan McCullagh | CNET
Two years ago, when the FBI was stymied by a band of armed robbers known as the "Scarecrow Bandits" that had robbed more than 20 Texas banks, it came up with a novel method of locating the thieves. ...
................................................................................................................................
09/02/2010 | China closes training website for hackers
Tania Branigan | The Guardian
Black Hawk Safety Net site taught thousands how to launch cyber attacks and supplied malware, China Daily reports. ...
................................................................................................................................
09/02/2010 | China is aiming at America’s soft underbelly: the Internet
Nathan Gardels | CSMonitor
Cyberattacks on Google might be just the beginning. America's former director of National Intelligence says the US should do what is necessary to defend itself before there is a catastrophic event. ...
................................................................................................................................
08/02/2010 | Security Tips for Personally Managed Apple iPhones
NSA Staff | National Security Agency
................................................................................................................................
08/02/2010 | La Red espía tus movimientos
David Alandete | El Pais (Es)
Internet, como red de redes sobre la que no gobierna nadie, no conoce fronteras. Pero los regímenes autoritarios, sí. Países como China e Irán han invertido verdaderas fortunas en tecnologías para poner coto a la libertad de expresión en sus conexiones a la Red. Ya no se limitan a cerrar páginas o censurar resultados en motores de búsqueda. Ahora son capaces de espiar al internauta a través de sus proveedores de conexión. Leen sus correos electrónicos y blogs restringidos y controlan al detalle qué páginas visitan. Esa tecnología acaba con la intimidad en la Red. Y no sólo la aplican los Gobiernos no democráticos. Proveedores de Internet de Estados Unidos la utilizan para combatir lo que consideran piratería. ...
................................................................................................................................
 
Center for the Study of the Presidency
Freedom House