Search Images Maps Play YouTube News Gmail Drive More »
Settings | Sign in

Computer security

See realtime coverage

Security is only as good as your fastest computer

The Australian Financial Review - ‎21 hours ago‎
The Chinese developed supercomputer Sunway-TaihuLight operates at the National Supercomputing Centre in Wuxi. Wang Feng. by Tom Mullaney.

Is Computer Security Becoming a Hardware Problem?

Motherboard - ‎Jul 24, 2016‎
In December of 1967 the Silver Bridge collapsed into the Ohio River, killing 46 people. The cause was determined to be a single 2.5 millimeter defect in a single steel bar—some credit the Mothman for the disaster, but to most it was an avoidable ...

Summer Cyber Workshops To Switch Wakefield Residents On To Computer Security

West Yorkshire Police (press release) - ‎Jul 26, 2016‎
Wakefield residents will be given a helping hand to protect themselves against cyber criminals and make the web work better for them this summer through a series of new workshops.

AI could rescue failing cyber security sector

Raconteur - ‎Jul 25, 2016‎
What do security experts actually mean when they talk about AI? “In the context of cyber security solutions, artificial intelligence means the use of machine-learning techniques to enable computers to learn from the data in a similar way to humans ...

Computer security stymies volunteers' efforts to find homes for dogs at county shelter - ‎Jul 23, 2016‎
The reason: Volunteers no longer have access to the computer system that keeps track of animals at the county shelter, so they can't contribute to the inventory.
See realtime coverage

UK education system failing to support cyber security profession - ‎12 hours ago‎
Countries and companies must act quickly to address the cyber security skills shortage through improvements in education, workforce diversity, training opportunities, security technology and data collection, a report says ...
See realtime coverage

DARPA's Cyber Grand Challenge: Security Gurus Team To Beat Viruses for Good

Top Tech News - ‎Jul 22, 2016‎
The culmination of the world's first tournament of automated computer security systems is set to take place in Las Vegas, Nevada on August 4. The Cyber Grand Challenge (CGC) will be hosted by DARPA (Defense Advanced Research Projects Agency) in the ...

'Security Is Only as Good as Your Fastest Computer'

Foreign Policy (blog) - ‎Jul 21, 2016‎
“There is no U.S.-made system that comes close to the performance of China's new system,” concluded U.S.-based Computer World on June 20. What the reports don't explain is precisely how supercomputing serves national security interests, which in turn ...

Campus course CYBEAR prepares students for careers in cyber security

Daily Californian - ‎12 hours ago‎
The future of cyber security may lay in part in the hands of 23 Bay Area high school students participating in a six-week campus cyber security course, called CYBEAR, which aims to prepare students for careers in government and private industry.

Personal Computer Security Expert to Speak

The Apopka Voice - ‎Jul 16, 2016‎
Apopka resident, Robert Samson, retired professional business security expert, will be the guest speaker at next week's Northwest Orange Republican Women, Federated, luncheon.
See realtime coverage

Computer security experts issue virus warning

Lufkin Daily News - ‎Jul 23, 2016‎
A user's computer screen freezes with a pop-up message that looks like it's from the FBI or another federal agency stating the user violated some sort of federal law and the computer will remain locked until they pay a fine. kAmp?@E96C 4@>AFE6C FD6C ...
See realtime coverage

FBI Director Speaks at Cyber Security Gathering

Federal Bureau of Investigation (press release) (blog) - ‎12 hours ago‎
This morning at the sixth annual International Conference on Cyber Security in New York City, Director James Comey briefed participants on current cyber threats and the FBI's multi-pronged strategy—which includes strong collaboration with law ...

Government must take computer security seriously

Loveland Reporter-Herald - ‎Jul 18, 2016‎
During World War II, I observed blackouts, searchlights, and search planes - and heard booms offshore as U-boats torpedoed the Liberty Ships my mother helped build.
See realtime coverage

Williams F1 teams up with Thales cyber security - ‎Jul 20, 2016‎
Thales designs, develops and operates resilient and high-performance critical information systems in the aerospace, defence, finance, technology and transport sectors, supported by its 2,000 cyber security experts, 22,000 researchers and engineers, and ...
See realtime coverage

Security industry welcomes cyber crime's inclusion in official stats - ‎Jul 21, 2016‎
The IT security industry welcomes the fact that the ONS will be including online crime in its future crime reports, said Rober Norris, director enterprise and cyber security, Fujitsu UK and Ireland. “There are daily news headlines reporting on the ...
See realtime coverage

UK security startup discovers one-stop-shop for cyber crime ... - ‎15 hours ago‎
Setting up a cyber criminal business is far easier than ever previously believed, according to UK information security startup Digital Shadows.

Microsoft mandates Windows 10 hardware change for PC security

Computerworld - ‎7 hours ago‎
Microsoft is rolling out a change in minimum hardware requirements for Windows 10 PCs and mobile devices, and expects hardware makers to comply in order to make their devices more secure. Starting Thursday, PC makers should include a ...
See realtime coverage

Democrats Ignored Cybersecurity Warnings Before Theft - Bloomberg

Bloomberg - ‎12 hours ago‎
The Democratic National Committee was warned last fall that its computer network was susceptible to attacks but didn't follow the security advice it was given, ...
See realtime coverage

Cyber security basics: 4 best practices for stopping the insider threat

Computer Business Review - ‎Jul 20, 2016‎
The insider threat, simply meaning a threat that comes from within an organisation, is a growing concern for cyber security practitioners. Unlike with external threats such as hackers or the latest malware, organisations can not simply buy a shiny new ...