Inteligencia y Seguridad Frente Externo En Profundidad Economia y Finanzas Transparencia
  En Parrilla Medio Ambiente Sociedad High Tech Contacto
High Tech  
 

  Archivos 1 a 10 de 790

22/04/2015 | Security - Cyber extortion: A growth industry
Taylor Armerding | ITworld
The traditional philosophy of never negotiating with extortionists has had to adapt to the realities of cybercrime – if you don’t pay, your data may be lost forever ...
................................................................................................................................
08/04/2015 | Cyber Security of Critical Infrastructures in the Americas
Trend Micro Incorporated Staff | Trend Micro Incorporated
New report from Trend Micro and the Organization of American States (OAS) ...
................................................................................................................................
04/04/2015 | Hardware - Las hormigas robot que sustituirán a los obreros en las fábricas
ABC Staff | ABC
Desarrollan componentes autónomos individuales capaces de realizar tareas complejas en equipo. ...
................................................................................................................................
31/03/2015 | Dark Net - How the dark web spurs a spying ¨arms race¨
Frank Gardner | BBC
It's a technological arms race, pure and simple.That's how Jamie Bartlett, author of The Dark Net, sums up the constantly evolving battle in cyberspace between terrorists and the intelligence agencies trying to discover their hidden communications. ...
................................................................................................................................
31/03/2015 | US - We Can Build a Hijack-Proof Airplane But Should We?
Clive Irving | The Daily Beast
Avionics experts have tested a system that wrests control of a plane from a pilot who might be suicidal or crazed, but no one knows what would happen after the pilot is out of the picture.Is there a technology solution that would neutralize the actions of a crazed pilot or a hijacker?. ...
................................................................................................................................
15/03/2015 | US - OSU researchers create fast robot modeled after birds
Keely Chalmers, KGW Staff | KGW.com
CORVALLIS, Ore. -- Researchers at Oregon State University have built a robot that's the first of its kind. Its name is Atrias. ...
................................................................................................................................
27/01/2015 | Congo and Rwanda -Ever again
The Economist Staff | The Economist
A long-awaited push to destroy some of Africa’s most notorious killers. ...
................................................................................................................................
28/12/2014 | Paraguay: El contexto internacional 2015
Víctor Pavón | El Cato
EE.UU., luego de la crisis del 2008 que impactó a escala mundial, empieza a mostrar signos de recuperación económica. Europa, por su parte, se encuentra estancada desde hace casi diez años, pese a los esfuerzos de la “locomotora” alemana; Japón, no puede reponerse pese a la política monetaria implementada para lograr su reactivación y se prepara para una fuerte expansión de política fiscal, enfrentándose a una trampa de liquidez. ...
................................................................................................................................
27/12/2014 | Colombia - Hacker Network Foiled in $70 Million Bank Heist
David Gagne | Insightcrime.org
A transnational criminal group nearly pulled off a historic cyber-heist of one of Colombia's biggest banks, highlighting how even the most advanced cyber security systems can be breached by what could soon be seen as the most common form of crime in the region. ...
................................................................................................................................
23/12/2014 | US - Warning of Post-Sony Cyber Attacks on U.S. Grid Underscored by Penetration of South Korean Nuclear Plants' Computers
Center for Security Policy - Staff | Center for Security Policy
Washington, DC: In the aftermath of the devastating attacks on Sony Pictures computers, there is a heightened recognition that other information technology systems may be at risk of what President Obama last week depicted as “cyber vandalism.” Others call it an act of war in the new domain known as the cyberbattlespace. ...
................................................................................................................................