TechAndComputer (Sep. 5, 2012) What if you could shut down several emergency rooms simultaneously without leaving your own home? How about hacking a pacemaker and reprogramming it to cause a heart attack? Share This: See Also: Health & MedicineToday's HealthcareMedical ImagingComputers & MathHackingEncryptionScience & SocietyPrivacy IssuesPublic HealthReference Security engineeringComputer insecurityOxygen therapyCardiac arrest
Although these could be scenes from an espionage film, they are also some of the plausible scenarios that Kansas State University cybersecurity experts are working to prevent.
Eugene Vasserman, assistant professor; John Hatcliff, university...
Hacking
Cybersecurity experts researching how to keep medical devices secure, communicating on hospital networks
- 05 September 2012
- Editor
- Hits: 154
New report on creating clinical public use microdata files
- 15 September 2011
- Editor
- Hits: 281
TechAndComputer (Sep. 15, 2011) The demand for transparency through publicly available healthcare data is on the rise. This is the case for administrative and clinical data for research, and for clinical trials data used to support new drug approvals. Broad data access has a measurable impact on research and policy making. A new report by Dr. Khaled El Emam, the Canada Research Chair in Electronic Health Information at the University of Ottawa...
TechAndComputer (Sep. 15, 2011) The...
TechAndComputer (Sep. 15, 2011) The...
Theft protection developed for virtual machines
- 04 August 2011
- Editor
- Hits: 319
TechAndComputer (Aug. 4, 2011) TU Darmstadt scientists have found a way to promptly detect hacker attacks on virtual machines. Companies and government agencies that employ virtual machines can thus protect data stored on them against theft.
Virtual machines are computers that incorporate no hardware and are totally simulated by software. Virtual machines are much more flexibly and efficiently utilizable than conventional computers, since, like...
TechAndComputer (Aug. 4, 2011) TU...
Virtual machines are computers that incorporate no hardware and are totally simulated by software. Virtual machines are much more flexibly and efficiently utilizable than conventional computers, since, like...
TechAndComputer (Aug. 4, 2011) TU...
Careless behaviour of cloud users leads to crucial security threats, experts find
- 20 June 2011
- Editor
- Hits: 302
TechAndComputer (June 20, 2011) Scientists from the Darmstadt Research Center for Advanced Security (CASED) have discovered major security vulnerabilities in numerous virtual machines published by customers of Amazon's cloud. Among 1100 public Amazon Machine Images (AMIs), which are used to provide cloud services, about 30 percent are vulnerable, allowing attackers to manipulate or compromise web services or virtual infrastructures, the...
TechAndComputer (June 20, 2011) Scientists...
TechAndComputer (June 20, 2011) Scientists...
Making websites accessible and secure
- 17 June 2011
- Editor
- Hits: 248
TechAndComputer (June 17, 2011) Website CAPTCHA technology used to protect sites from hackers, bots and spammers is making those same sites inaccessible to many potential users, according to a survey of 150 typical online forums and other sites.
Details of the findings are reported this month in the International Journal of Web Based Communities.
CAPTCHA stands for "completely automated public Turing test to tell computers and humans apart."...
TechAndComputer (June 17, 2011) Website...
Details of the findings are reported this month in the International Journal of Web Based Communities.
CAPTCHA stands for "completely automated public Turing test to tell computers and humans apart."...
TechAndComputer (June 17, 2011) Website...