Tag Archives | Security
Enhanced Autopilot System to Prevent Accidents

Enhanced Autopilot System to Prevent Accidents

Thirty lines of computer code might have saved Air France flight 447, and 228 passengers and crew aboard, from plunging into the Atlantic Ocean on June 1, 2009, according to new research by Carlos Varela, an associate professor of computer science at Rensselaer Polytechnic Institute. Varela and his research group have developed a computer system [...]

Read full story Comments { 0 }
Body Odor as a Biometric Identifier

Body Odor as a Biometric Identifier

The research of the Group of Biometrics, Biosignals and Security (GB2S) of the Universidad Politécnica de Madrid (UPM) in collaboration with Ilía Sistemas SL unveils that there are recognizable patterns of each person’s body odor that remain steady. Therefore, every person has his/hers own odor and this would allow his/her identification within a group of [...]

Read full story Comments { 0 }
New Hardware Design Protects Data in the Cloud

New Hardware Design Protects Data in the Cloud

Cloud computing — outsourcing computational tasks over the Internet — could give home-computer users unprecedented processing power and let small companies launch sophisticated Web services without building massive server farms.   But it also raises privacy concerns. A bank of cloud servers could be running applications for 1,000 customers at once; unbeknownst to the hosting [...]

Read full story Comments { 0 }

BYOD Requires Secure Containers for Mobile Devices

The BYOD, or bring your own device, trend seems to be expanding. There are many aspects to BYOD, but the use of end devices, whether they are PCs, netbooks, laptops, smartphones, or tablets, for both personal and business uses opens up security problems. The business use by enterprises in general requires more stringent security measures, [...]

Read full story Comments { 0 }
App to Protect Private Data On iOS Devices Finds Almost Half of Other Apps Access Private Data

App to Protect Private Data On iOS Devices Finds Almost Half of Other Apps Access Private Data

Almost half of the mobile apps running on Apple’s iOS operating system access the unique identifier of the devices where they’re downloaded, computer scientists at the University of California, San Diego, have found. In addition, more than 13 percent access the devices’ location and more than 6 percent the address book. The researchers developed a [...]

Read full story Comments { 0 }
Remote Control Is Everywhere, Thanks to Proliferation of Smart End Devices

Remote Control Is Everywhere, Thanks to Proliferation of Smart End Devices

With the proliferation of smart end devices, we can do what was not done easily or inexpensively before, thanks to innovations such as cloud, low-power yet powerful processors, high-capacity yet inexpensive storage, and enhanced wireless technologies. Many companies have come up with interesting technologies and products in this emerging market. People Power is one such [...]

Read full story Comments { 0 }
Wind River’s View on M2M, Intelligent Systems, and the Internet of Things

Wind River’s View on M2M, Intelligent Systems, and the Internet of Things

I hear more and more about intelligent systems. Are they different from M2M and the Internet of Things? In a recent Design West, one of the themes was intelligent systems. What is it, and how is it different from M2M and the Internet of Things? I attended one informative session by speakers from a research [...]

Read full story Comments { 4 }
Computer Scientists Find Vulnerabilities in Cisco VoIP Phones

Computer Scientists Find Vulnerabilities in Cisco VoIP Phones

Columbia Engineering’s Computer Science PhD candidate Ang Cui and Computer Science Professor Salvatore Stolfo have found serious vulnerabilities in Cisco VoIP (voice over internet protocol) telephones, devices used around the world by a broad range of networked organizations from governments to banks to major corporations, and beyond. In particular, they have discovered troubling security breaches [...]

Read full story Comments { 0 }
Low Power Implies Lightweight Software on Processors

Low Power Implies Lightweight Software on Processors

This year’s ARM TechCon’s theme was low power. As we reduce the power consumption of computer systems, we can apply them to many areas that we never even considered before. Reducing power involves several elements, including low-power processors and memory. But we tend to overlook software impacts. Software includes both utilities and applications. At the [...]

Read full story Comments { 0 }

‘Attack Navigator’ Protects Against Weak Spots in Security

Everyone is familiar with the yellow ‘Post-it’ memos, showing login details, that are often found stuck to computer monitors. The same goes for USB sticks found in car parks. However, few grasp the real impact of such actions on an organization’s business or brand. Both may eventually lead to data theft, not as a result [...]

Read full story Comments { 0 }