Tech and Computer

Tech and Computer news

 

 

Sun10132013

Last update06:42:42 PM GMT

Hacking

Cybersecurity experts researching how to keep medical devices secure, communicating on hospital networks

  • PDF
TechAndComputer (Sep. 5, 2012) — What if you could shut down several emergency rooms simultaneously without leaving your own home? How about hacking a pacemaker and reprogramming it to cause a heart attack? Share This: See Also: Health & MedicineToday's HealthcareMedical ImagingComputers & MathHackingEncryptionScience & SocietyPrivacy IssuesPublic HealthReference Security engineeringComputer insecurityOxygen therapyCardiac arrest

Although these could be scenes from an espionage film, they are also some of the plausible scenarios that Kansas State University cybersecurity experts are working to prevent.

Eugene Vasserman, assistant professor; John Hatcliff, university...

New report on creating clinical public use microdata files

  • PDF
TechAndComputer (Sep. 15, 2011) — The demand for transparency through publicly available healthcare data is on the rise. This is the case for administrative and clinical data for research, and for clinical trials data used to support new drug approvals. Broad data access has a measurable impact on research and policy making. A new report by Dr. Khaled El Emam, the Canada Research Chair in Electronic Health Information at the University of Ottawa...

TechAndComputer (Sep. 15, 2011) — The...

Theft protection developed for virtual machines

  • PDF
TechAndComputer (Aug. 4, 2011) — TU Darmstadt scientists have found a way to promptly detect hacker attacks on virtual machines. Companies and government agencies that employ virtual machines can thus protect data stored on them against theft.

Virtual machines are computers that incorporate no hardware and are totally simulated by software. Virtual machines are much more flexibly and efficiently utilizable than conventional computers, since, like...

TechAndComputer (Aug. 4, 2011) — TU...

Careless behaviour of cloud users leads to crucial security threats, experts find

  • PDF
TechAndComputer (June 20, 2011) — Scientists from the Darmstadt Research Center for Advanced Security (CASED) have discovered major security vulnerabilities in numerous virtual machines published by customers of Amazon's cloud. Among 1100 public Amazon Machine Images (AMIs), which are used to provide cloud services, about 30 percent are vulnerable, allowing attackers to manipulate or compromise web services or virtual infrastructures, the...

TechAndComputer (June 20, 2011) — Scientists...

Making websites accessible and secure

  • PDF
TechAndComputer (June 17, 2011) — Website CAPTCHA technology used to protect sites from hackers, bots and spammers is making those same sites inaccessible to many potential users, according to a survey of 150 typical online forums and other sites.

Details of the findings are reported this month in the International Journal of Web Based Communities.

CAPTCHA stands for "completely automated public Turing test to tell computers and humans apart."...

TechAndComputer (June 17, 2011) — Website...