Press

“The Underground Market for Spam Twitter Accounts”
August 14, 2013 | Alice Truong, Fast Company

It should be no surprise that spam Twitter accounts can be bought to boost follow counts--or more maliciously, to phish unsuspecting users. A team of university researchers spent more than $5,000 buying fake accounts to learn more about this underground market, presenting their findings Wednesday at the USENIX security conference in Washington, D.C.

"Virtual Currency Gains Ground in Actual World"
August 1, 2013 | Kate Murphy, New York Times

Depending on whom you ask, bitcoins are a goofy geek invention with as much long-term value as Monopoly money — or a technology development that could transform currency the way e-mail and texting have transformed correspondence.

"Roberto Pieraccini to Keynote Speech TEK 2013"
July 25, 2013 | Business Wire, reprinted in Virtual-Strategy Magazine

Information Today, Inc. has announced that Roberto Pieraccini, CEO of the International Computer Science Institute, will be a keynote speaker at the 2013 SpeechTEK Conference, being held August 19-21, at the New York Marriott Marquis in Times Square.

 

Global Positioning System satellite technology (better known as GPS) is embedded into so many of the devices we use today for location purposes, that we sometimes take it for granted. From using it to find our way home when we are lost to getting directions to that new trendy restaurant, we don’t even give it a second thought anymore, yet, it’s a valuable tool in our daily routine.

A start-up named Broala has been formed to expand the open-source intrusion detection system known simply as Bro that has been used in high-speed research networks for about two decades.

"Space Flights Bring Speech Technology Home"
June 7, 2013 | Leonard Klie, Speech Technology Magazine

Members of the IEEE, a global professional organization for technological advances in aerospace systems, computers, telecommunications, biomedical engineering, and consumer electronics, have found that advances in voice activation, wireless power, and remote sensing for space travel and exploration will play an increasingly significant role in the advancement of consumer electronics products used by the average human being here on Earth.

"Hear Ye, Future Deep Throats: This Is How You Leak to the Press"
May 14, 2013  |  Nicholas Weaver, Wired.com

We now live in a world where public servants informing the public about government behavior or wrongdoing must practice the tradecraft of drug dealers and spies. Otherwise, these informants could get caught in the web of administrations that view George Orwell’s 1984 as an operations manual.

"Cybercasing- How Sharing Your Pics, Videos and Status Updates Can Get You Into Trouble"
April 30, 2013  |  Alex Merton-McCann, Cyber Security Mum Australia, McAfee

It can be fun ‘checking in’ at your favourite restaurant on Facebook, sharing pics of your hotel room on Instagram or buying and selling items on eBay. In fact – it can give you quite a buzz. But did you know that ‘geotagging’ (sharing your location via your pics or videos) can put you and your possessions at risk??

"Nowhere to Hide: Video Location Tech Has Arrived"
February 21, 2013  |  Bill Snyder, Tech's Bottom Line, InfoWorld

Researchers at ICSI are currently building a video database by analyzing videos downloaded from Flickr, says Gerald Friedland, who leads ICSI’s multimedia efforts. Data from videos taken at known locations is used to develop profiles of the respective locations.

"Researchers Find Way to Pinpoint Where Online Video Was Shot"
February 19, 2013  |  Bill Snyder, Consumer Tech Radar, CIO Blogs

Suppose a terrorist holding hostages at a secret location makes a video demanding ransom. Now imagine that law enforcement officials can take that video, process it and run it through a database that pinpoints the precise location where it was shot based on images and sounds in the video.

Pages