Inteligencia y Seguridad Frente Externo En Profundidad Economia y Finanzas Transparencia
  En Parrilla Medio Ambiente Sociedad High Tech Contacto
High Tech  
 

  Archivos 1 a 10 de 816

26/12/2015 | Cyber - Feds Scrambling to Close Backdoor in Widely Purchased IT Gear
Aliya Sternstein | Defense One
One former NSA employee calls it "a perfect case example of why cryptographic backdoors are so dangerous in the real world. ...
................................................................................................................................
11/12/2015 | Technology - Drone squad to be launched by Tokyo police
BBC | BBC
A drone squad, designed to locate and - if necessary - capture nuisance drones flown by members of the public, is to be launched by police in Tokyo. ...
................................................................................................................................
03/12/2015 | En torno a la realidad virtual
Alberto Benegas Lynch | El Cato
Es aparentemente paradójico pero la denominada realidad virtual es también real en el sentido que sucede, que existe, que la vivimos. La ciencia ficción en cambio existe en otra dimensión: está plasmada en las letras pero no sucede, no existe. ...
................................................................................................................................
21/11/2015 | Enfoque: China se propone construir sus propios smartphones seguros
De Nuestra Redacción | Offnews.info
China está tratando de hacer sus propios smartphones seguros, en un intento de aislar a sus teléfonos de la vigilancia de Estados Unidos. El esfuerzo involucra tanto a las empresas de propiedad estatal y algunas de las empresas de tecnología más conocedoras del país y marca el último paso en la búsqueda de Beijing para construir una industria de tecnología propia que corte a los proveedores estadounidenses. ...
................................................................................................................................
22/10/2015 | US - New research method identifies stealth attacks on complicated computer systems
GSN Staff | Government Security News
Imagine millions of lines of instructions. Then try and picture how one extremely tiny anomaly could be found in almost real-time and prevent a cyber security attack. ...
................................................................................................................................
22/10/2015 | Cybersecurity - It’s About Time Cybercrimes Appeared in Crime Figures
David S. Wall | The Epoch Times
Crime statistics give us information about changes in criminal behavior, but should never be used as an indicator of the overall health of society. ...
................................................................................................................................
09/10/2015 | US - CIA's Impact on Technology
CIA Staff | CIA
Virtually any job you can imagine is available at the CIA. In addition to the more well-known jobs of analyst or core collector, the Agency needs medical professionals, IT specialists, graphic artists, and other skilled personnel--even sometimes hair stylists, carpenters, and seamstresses--to accomplish its mission of protecting the national security of the United States. Because of the need to work in somewhat of an independent environment, the CIA must sometimes develop technologies to meet the unique requirements of its officers. With this in mind, you might not be surprised to learn that, after a declassification process, publicly released technologies developed by CIA have gone on to impact the world in positive ways. ...
................................................................................................................................
03/10/2015 | Artificial intelligence - Google exec: With robots in our brains, we'll be godlike
Chris Matyszczyk | CNET
Futurist and Google exec Ray Kurzweil thinks that once we have robotic implants, we'll be funnier, sexier and more loving. Because that's what artificial intelligence can do for you.Technically Incorrect offers a slightly twisted take on the tech that's taken over our lives. ...
................................................................................................................................
02/10/2015 | Tecnología - ¿Qué tan fácil es robar un cajero o una cuenta bancaria?
Semana (Co) Staff | Semana
Empresas de seguridad informática alertan sobre el aumento de ataques cibernéticos a bancos y cajeros automáticos, que van en aumento en América Latina. ¿Qué hacen los delincuentes?. ...
................................................................................................................................
21/09/2015 | China - Apple Targeted as Malware Infects China Mobile Apps
Josh Chin | Wall Street Journal
BEIJING—Some of the most popular Chinese names in Apple Inc.’s App Store were found to be infected with malicious software in what is being described as a first-of-its-kind security breach, exposing a rare vulnerability in Apple’s mobile platform, according to multiple researchers. ...
................................................................................................................................