Tag Archives | Security
Accuracy of Mobile Phone Population Mapping Demonstrated

Accuracy of Mobile Phone Population Mapping Demonstrated

A study by an international team, including the University of Southampton, has shown population maps based on anonymous mobile phone call record data can be as accurate as those based on censuses.   Their findings show maps made using mobile records are detailed, reliable and flexible enough to help inform infrastructure and emergency planners; particularly [...]

Read full story Comments { 0 }

Is Your Data Safe? Why You Should Care More About Spam

The Center for Research on Electronic Commerce (CREC) at The University of Texas at Austin is working to protect consumer data by using a company’s spam volume to evaluate its security vulnerability through the SpamRankings.net project. “The goal is to alert companies that they are spamming [and] hold them accountable to stop spamming, thus enhancing [...]

Read full story Comments { 0 }
Tool to Make the Internet of Things Safer

Tool to Make the Internet of Things Safer

Computer scientists at the University of California, San Diego, have developed a tool that allows hardware designers and system builders to test security- a first for the field. One of the tool’s potential uses is described in the May-June issue of IEEE Micro magazine.   “The stakes in hardware security are high,” said Ryan Kastner, [...]

Read full story Comments { 0 }
Measuring Fine Dust Concentration Via Smartphone

Measuring Fine Dust Concentration Via Smartphone

Big cities in the smog: Photos from Beijing and, more recently, Paris clearly illustrate the extent of fine dust pollution. But what about our direct environment? What is the pollution concentration near our favorite jogging route? Scientists of Karlsruhe Institute of Technology (KIT) are developing a sensor that can be connected easily to smartphones. In [...]

Read full story Comments { 0 }
Enhanced Autopilot System to Prevent Accidents

Enhanced Autopilot System to Prevent Accidents

Thirty lines of computer code might have saved Air France flight 447, and 228 passengers and crew aboard, from plunging into the Atlantic Ocean on June 1, 2009, according to new research by Carlos Varela, an associate professor of computer science at Rensselaer Polytechnic Institute. Varela and his research group have developed a computer system [...]

Read full story Comments { 0 }
Body Odor as a Biometric Identifier

Body Odor as a Biometric Identifier

The research of the Group of Biometrics, Biosignals and Security (GB2S) of the Universidad Politécnica de Madrid (UPM) in collaboration with Ilía Sistemas SL unveils that there are recognizable patterns of each person’s body odor that remain steady. Therefore, every person has his/hers own odor and this would allow his/her identification within a group of [...]

Read full story Comments { 0 }
New Hardware Design Protects Data in the Cloud

New Hardware Design Protects Data in the Cloud

Cloud computing — outsourcing computational tasks over the Internet — could give home-computer users unprecedented processing power and let small companies launch sophisticated Web services without building massive server farms.   But it also raises privacy concerns. A bank of cloud servers could be running applications for 1,000 customers at once; unbeknownst to the hosting [...]

Read full story Comments { 0 }

BYOD Requires Secure Containers for Mobile Devices

The BYOD, or bring your own device, trend seems to be expanding. There are many aspects to BYOD, but the use of end devices, whether they are PCs, netbooks, laptops, smartphones, or tablets, for both personal and business uses opens up security problems. The business use by enterprises in general requires more stringent security measures, [...]

Read full story Comments { 0 }
App to Protect Private Data On iOS Devices Finds Almost Half of Other Apps Access Private Data

App to Protect Private Data On iOS Devices Finds Almost Half of Other Apps Access Private Data

Almost half of the mobile apps running on Apple’s iOS operating system access the unique identifier of the devices where they’re downloaded, computer scientists at the University of California, San Diego, have found. In addition, more than 13 percent access the devices’ location and more than 6 percent the address book. The researchers developed a [...]

Read full story Comments { 0 }
Remote Control Is Everywhere, Thanks to Proliferation of Smart End Devices

Remote Control Is Everywhere, Thanks to Proliferation of Smart End Devices

With the proliferation of smart end devices, we can do what was not done easily or inexpensively before, thanks to innovations such as cloud, low-power yet powerful processors, high-capacity yet inexpensive storage, and enhanced wireless technologies. Many companies have come up with interesting technologies and products in this emerging market. People Power is one such [...]

Read full story Comments { 0 }