Tech and Computer

Tech and Computer news

 

 

Wed04032013

Last update06:42:42 PM GMT

Back Computer Science Encryption

Encryption

Privacy risks from geographic information

  • PDF
TechAndComputer (Apr. 10, 2010) — In today's world more geographic information is being collected about us, such as where we live, where the clinic we visited is located, and where we work. Web sites are also collecting more geographic information about their users. This location information makes it easier to identify individuals, which can raise privacy concerns when location is coupled with basic demographics and sensitive health information....

TechAndComputer (Apr. 10, 2010) — In today's world more geographic information is being collected about us, such as where we live, where the clinic we visited is located, and where we work. Web sites are also collecting more geographic information about their users. This location...

Groundbreaking cyber espionage report released; Identifies Dalai Lama as target

  • PDF
TechAndComputer (Apr. 7, 2010) — The Information Warfare Monitor (Citizen Lab, Munk School of Global Affairs, University of Toronto and the SecDev Group, Ottawa) and the Shadowserver Foundation announce the release of "Shadows in the Cloud: An investigation into cyber espionage 2.0."

The report documents a complex ecosystem of cyber espionage that systematically targeted and compromised computer systems in India, the Offices of the Dalai Lama,...

TechAndComputer (Apr. 7, 2010) — The...

New software design technique allows programs to run faster

  • PDF
TechAndComputer (Apr. 6, 2010) — Researchers at North Carolina State University have developed a new approach to software development that will allow common computer programs to run up to 20 percent faster and possibly incorporate new security measures.

The researchers have found a way to run different parts of some programs -- including, for the first time, such widely used programs as word processors and Web browsers -- at the same time, which...

TechAndComputer (Apr. 6, 2010) —...

A portable security risk

  • PDF
TechAndComputer (Mar. 31, 2010) — More and more employees are bringing personal mobile devices, such as media players, flash drives and smart phones, to work for entertainment, communications and other purposes. Equally, many employers issue their staff with such devices to allow them to be more mobile and to run business applications as part of their job.

This explosion of personal devices with built in web connectivity, office applications and...

TechAndComputer (Mar. 31, 2010) — More...

Laser security for the Internet: Scientist invents a digital security tool good enough for the CIA -- and for you

  • PDF
TechAndComputer (Mar. 24, 2010) — A British computer hacker equipped with a "Dummies" guide recently tapped into the Pentagon. As hackers get smarter, computers get more powerful and national security is put at risk. The same goes for your own personal and financial information transmitted by phone, on the Internet or through bank machines.

Now a new invention developed by Dr. Jacob Scheuer of Tel Aviv University's School of Electrical...

TechAndComputer (Mar. 24, 2010) — A British...