Security
4 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Scooped by beijingxiaoji
Scoop.it!

斯诺登商机爆发,中国科技企业面临前所未有发展机遇 - IT经理网

斯诺登商机爆发,中国科技企业面临前所未有发展机遇 - IT经理网 | Security | Scoop.it

a a一方面在华美国科技企业的销售大幅下滑,另一方面,中国的IT市场却处于高速增长之中,这意味着继互联网企业之后,中国本土的IT企业面临着前所未有的发展空间和机遇。

beijingxiaoji's insight:

The Snowden effect is ramping up, Chinese tech companies posed for a surging growth

more...
No comment yet.
Rescooped by beijingxiaoji from Digital-News on Scoop.it today
Scoop.it!

Security Experts Warn Healthcare.gov Is Vulnerable to Hacking - ABC News (blog)

Security Experts Warn Healthcare.gov Is Vulnerable to Hacking - ABC News (blog) | Security | Scoop.it
Times of India Security Experts Warn Healthcare.gov Is Vulnerable to Hacking ABC News (blog) Cyber security experts told Congress today that the Obama administration should take Healthcare.gov offline until privacy vulnerabilities are addressed and...

Via Thomas Faltin
more...
No comment yet.
Rescooped by beijingxiaoji from Metaglossia: The Translation World
Scoop.it!

DARPA awards translation software license contract to Integrated Wave Technologies | Government Security News

DARPA awards translation software license contract to Integrated Wave Technologies | Government Security News | Security | Scoop.it

The Miltrans app provides approximately 350 phrases in over 50 languages to enable front-line military personnel to communicate with non-English-speaking people. This application was based on IWT’s highly successful Voice Response Translator (VRT) used by the Army, Navy, Marine Corps, Special Operations Forces and Coast Guard.

The system was also acquired in significant numbers by Canadian Forces. The application was developed in cooperation with DARPA’s Transformative Apps program.

Altogether, IWT has manufactured over 12,500 VRTs for military use. The VRT received excellent reviews from combat users, as reported through US FORSCOM command language program managers and other evaluators.

“For hot combat environments, the VRT excels,” says an Institute for Defense Analyses Report,  S&T Responsiveness In Support of Current Military Operations.  

The IWT Miltrans app enables operational personnel to translate basic phrases into over 50 languages commonly spoken in countries where U.S. and allied forces are deployed. These phrases support force protection, civil affairs, combat patrol, humanitarian, disaster relief, medical and other missions.   

 


Via Charles Tiayon
more...
Charles Tiayon's curator insight, November 21, 2013 12:44 AM

The Miltrans app provides approximately 350 phrases in over 50 languages to enable front-line military personnel to communicate with non-English-speaking people. This application was based on IWT’s highly successful Voice Response Translator (VRT) used by the Army, Navy, Marine Corps, Special Operations Forces and Coast Guard.

The system was also acquired in significant numbers by Canadian Forces. The application was developed in cooperation with DARPA’s Transformative Apps program.

Altogether, IWT has manufactured over 12,500 VRTs for military use. The VRT received excellent reviews from combat users, as reported through US FORSCOM command language program managers and other evaluators.

“For hot combat environments, the VRT excels,” says an Institute for Defense Analyses Report,  S&T Responsiveness In Support of Current Military Operations.  

The IWT Miltrans app enables operational personnel to translate basic phrases into over 50 languages commonly spoken in countries where U.S. and allied forces are deployed. These phrases support force protection, civil affairs, combat patrol, humanitarian, disaster relief, medical and other missions.   

 
Scooped by beijingxiaoji
Scoop.it!

DDoS attack from Browser-based Botnets that lasted for 150 hours

DDoS attack from Browser-based Botnets that lasted for 150 hours | Security | Scoop.it
How to flush out Browser-based botnets, T-1000s of the DDoS World ?
more...
No comment yet.
Scooped by beijingxiaoji
Scoop.it!

Anonymous Has Been Hacking US Government Sites Since Last ...

Anonymous Has Been Hacking US Government Sites Since Last ... | Security | Scoop.it
The FBI has released an official memo indicating that hackers related to Anonymous have been accessing federal government computers in various agencies for almost a year and stealing data.
more...
No comment yet.
Scooped by beijingxiaoji
Scoop.it!

Microsoft Releases New Mitigation Guidance for Active Directory - Microsoft Security Blog - Site Home - TechNet Blogs

Microsoft Releases New Mitigation Guidance for Active Directory - Microsoft Security Blog - Site Home - TechNet Blogs | Security | Scoop.it
The official Microsoft Security Blog provides in-depth discussion of security, cybersecurity and technology trends affecting trust in computing, as well as timely security news, trends, and practical security guidance.
more...
No comment yet.
Scooped by beijingxiaoji
Scoop.it!

Cyber-Security Training a Top Priority for Industry, Government - eWeek

Cyber-Security Training a Top Priority for Industry, Government - eWeek | Security | Scoop.it
Cyber-Security Training a Top Priority for Industry, Government eWeek This week, IBM expanded its Cyber Security Innovation Program, a program through which the company works with universities to develop courses, provide tools to educators and fund...
more...
No comment yet.
Scooped by beijingxiaoji
Scoop.it!

Hacking the PS4′s facial recognition by creating a universal login ...

Hacking the PS4′s facial recognition by creating a universal login ... | Security | Scoop.it
A lesser known feature of the PS4 is that if the PlayStation Camera is connected, you can log into a ...
more...
No comment yet.
Scooped by beijingxiaoji
Scoop.it!

Yahoo Mail is switching to default SSL encryption | The Verge

Yahoo Mail is switching to default SSL encryption | The Verge | Security | Scoop.it
On the heels of its recent redesign, Yahoo Mail is adding a new feature many users have been requesting for years: encryption. The Washington Post revealed today that Yahoo Mail will begin using...
more...
No comment yet.
Rescooped by beijingxiaoji from Big Data Security Analytics
Scoop.it!

3 Big Data Security Analytics Techniques You Can Apply Now to Catch Advanced Persistent Threats

In this informative white paper, unveil 3 ways that big data security analytics can help you gain actionable intelligence to thwart advanced persistent threats (APTs) and achieve visibility into IT infrastructures for top defense.

Via cysap
more...
No comment yet.
Rescooped by beijingxiaoji from Digital-News on Scoop.it today
Scoop.it!

Cloud Security Experts Discuss 2013 Attack Trends

FireHost CEO Chris Drake and WhiteHat Security Founder & CTO discuss latest security trends, sharing industry secrets about how to protect your applications from hackers.

Via Thomas Faltin
more...
No comment yet.
Rescooped by beijingxiaoji from Surfing the Broadband Bit Stream
Scoop.it!

Schneier tells Washington NSA broke Internet’s security for everyone | Ars Technica

Schneier tells Washington NSA broke Internet’s security for everyone | Ars Technica | Security | Scoop.it

To say that there are a lot of people who are angry with the National Security Agency (NSA) right now would be an understatement. But the things that are getting the most political attention right now—such as the invasion of the privacy of American citizens and spying on the leaders of American allies—are just a fraction of the problem, according to cryptographer and Harvard University Berkman Center for Internet and Society Fellow Bruce Schneier.


At a presentation in a conference room inside the US Capitol on Friday, Schneier—who has been helping The Guardian review the trove of documents provided by Snowden—said that in its haste to "weaponize" the Internet, the NSA has broken its mechanisms of security. And those breaks—including the backdoors that the NSA convinced or coerced software developers to put into the implementations of their encryption and other security products, are so severe that it is now just a matter of time before others with less-noble causes than fighting terrorism will be able to exploit the holes the NSA has created.


Schneier said that the vulnerabilities inserted into security products by the NSA through its BULLRUN program could easily be exploited by criminals and other nation-states as well once they are discovered. And the other attacks and surveillance methods used by the NSA "will be tomorrow's doctoral theses and next week's Science Fair projects."


But with Congress focused on the woes of the Affordable Care Act, it's not clear if anyone other than those already friendly to Schneier's message was listening.


Click headline to read more--


Via Chuck Sherwood, Senior Associate, TeleDimensions, Inc
more...
No comment yet.
Rescooped by beijingxiaoji from itsyourbiz
Scoop.it!

APT has a legion of geeks that help analyze data so companies can make better ... - Washington Post

APT has a legion of geeks that help analyze data so companies can make better ... - Washington Post | Security | Scoop.it
Washington Post
APT has a legion of geeks that help analyze data so companies can make better ...

Via Skip Boykin
more...
No comment yet.
Scooped by beijingxiaoji
Scoop.it!

Encrypt the Web Report: Who's Doing What - EFF

Encrypt the Web Report: Who's Doing What - EFF | Security | Scoop.it
Encrypt the Web Report: Who's Doing What
EFF
We've asked the companies in our Who Has Your Back Program what they are doing to bolster encryption in light of the NSA's unlawful surveillance of your communications.
more...
No comment yet.
Rescooped by beijingxiaoji from opexxx
Scoop.it!

What is Encryption and Why is it Used?

What is Encryption and Why is it Used? | Security | Scoop.it
This primer provides the nuts and bolts for understanding basic cryptographic applications.

Via alexander knorr
more...
No comment yet.
Scooped by beijingxiaoji
Scoop.it!

Obamacare website developers rush to fix bug suggesting hacking methods - The Guardian

Obamacare website developers rush to fix bug suggesting hacking methods - The Guardian | Security | Scoop.it
Obamacare website developers rush to fix bug suggesting hacking methods
The Guardian
A flaw in the website of President Obama's flagship Affordable Care programme has left the site and its users vulnerable to hacking, the Guardian has discovered.
more...
No comment yet.
Rescooped by beijingxiaoji from Digital-News on Scoop.it today
Scoop.it!

Future Of Risk Management Technology: Embracing The Innovation Conundrum

Future Of Risk Management Technology: Embracing The Innovation Conundrum | Security | Scoop.it
Financial institutions are faced with a once in a lifetime opportunity (or threat, depending on whether one sees the glass as half-empty or hall-full).

Via Thomas Faltin
more...
No comment yet.