Cyber Security > Nova Content
The Anti-Counterfeiting Trade Agreement (ACTA) is still on the move across the globe. ACTA has a similar aim to the Stop Online Piracy Act (SOPA) and Protect IP Act... Read More »
At the 19th Annual Network & Distributed System Security Symposium in San Diego, California, a research paper called “Location Leaks on the GSM Air... Read More »
Palo Alto Research Center (PARC), A Xerox Company, today announced that it is currently helping the US government proactively identify internal threats... Read More »
Everyone knows that we live in an age of greater security threats and strange new crimes. Still, the media tends to concentrate on very obvious and tired examples... Read More »
Comments
Norton by Symantec today announced several new security offerings. Norton One is a premium service that allows consumers to buy and manage their security software via ... Read More »
Xerox and McAfee are teaming up to design a security system to help companies protect against threats to confidential data. By integrating embedded McAfee... Read More »
Anonymous hacktivists, in their latest high-profile attack, have exposed backroom political dealings that sought to reduce the penalty for convicted staff sergeant... Read More »
Comments
Most of us spend our entire lives building our own personal brand.
We work long hours so to reflect our inner character and establish a reputation of worth. ... Read More »
Reveal Imaging, a wholly-owned subsidiary of Science Applications International Corporation (SAIC), announced today that it has successfully passed laboratory testing ... Read More »
The day after the anti-SOPA/PIPA protests (the largest coordinated protest in the history of the Internet), the Department of Justice took down Megaupload. It would... Read More »
Comments
Talks about universal patient identification (UPI) numbers have been gracing news headlines recently as the debate about privacy and health care continues... Read More »
Comments
18 minutes isn't a very long time for most of us who operate in the civilian world. However, in April of 2010, the Chinese government took control of 15% of the... Read More »
Mikko Hypponen, a cybercrime expert, examines three kinds of cyber attackers in the world -- criminals, hacker activists ('hacktivists') and governments. ... Read More »
Anonymous, a group of hacker activists commonly referred to as 'hacktivists,' has gained notoriety over the past several years for threatening and then... Read More »
General Dynamics opened its new Cyber and Intelligence Solutions Center in Annapolis Junction today. The 28,000 square foot facility can house... Read More »
The last 20 years have seen unprecedented advances in the realm of computer science and engineering. One area that remains remarkably traditional, however, is voting.
... Read More »
Comments
The Chinese government has clandestinely supported the largest theft of intellectual property in the history of the United States. U.S. cybersecurity... Read More »
For those who curse the tightly wrapped plastic packaging that seems to surround every piece of food or medication today, think back to why these packaging rules were ... Read More »
As the U.S. considers its cyber offense options in the wake of charges that Russia and China have hacked and stolen data from U.S. companies and institutions, an... Read More »
WASHINGTON (Reuters) - The United States should be more open about its development of offensive cyber weapons and spell out when it will use them as it... Read More »