MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
September 17, 2010
Rice University Deals With New Data Breach A stolen device containing student and faculty data went missing, putting personal information including Social Security numbers and birth dates up for grabs. mark for My Articles similar articles
InternetNews
January 28, 2009
Richard Adhikari
Monster Breach Shows Security Needs Rethinking Is corporate security fighting yesterday's war with last decade's weapons? mark for My Articles similar articles
CIO
May 15, 2004
Paul Roberts
Fed Fingerprint Database Spreads Across U.S. - Criminal Justice The wider use of fingerprint scanning technology in recent years has made it easier than ever for law enforcement officials to share information about criminals and quickly compare a suspect's fingerprint image with millions of similar imprints. mark for My Articles similar articles
CIO
January 1, 2003
Alison Bass
Identity Crisis If identity theft isn't already on your radar screen, this headline will put it there: 13,000 Credit Reports Stolen by Hackers. To avoid a similar disaster on their turf, CIOs should insist their company's customer data be kept in separate databases protected by a number of different security measures. mark for My Articles similar articles
Fast Company
Neal Ungerleider
Hackers Who Stole U.S. Government Employee Data Reportedly Breached American Airlines According to Bloomberg, both the airline and travel reservation firm Sabre appear to have been the subject of recent breaches. mark for My Articles similar articles
National Defense
April 2010
Stew Magnuson
Face, Iris and Fingerprint Biometrics Good Enough for Now, Says White House Staffer Federal agencies that collect biometric data to screen individuals should concentrate their efforts on fingerprints, faces and irises, and perfect the collection of those technologies first. mark for My Articles similar articles
Fast Company
Neal Ungerleider
China Allegedly Arrested Hackers To Comply With The U.S. Government's Demands Whether China will actually prosecute the hackers is a whole other issue; it's possible the country only made the arrests to skirt the economic sanctions that President Obama was lording over China. mark for My Articles similar articles
Military & Aerospace Electronics
November 2004
Lockheed Martin to Build Fingerprint I.D. System for DOD This new system will be patterned after the Integrated Automated Fingerprint Identification System (IAFIS). The contract was awarded as a task order under the U.S. Army's Information Technology Enterprise Solutions (ITES) contracting vehicle. mark for My Articles similar articles
InternetNews
December 16, 2010
760,000 Exposed in Ohio State Breach A massive data breach at Ohio State University has current and former students and staff scrambling to check their credit reports. mark for My Articles similar articles
Fast Company
Neal Ungerleider
Australia: China Hacked Our Weather Service Australian authorities are alleging China is behind a massive cyberattack on the country's weather service, the Australian Broadcasting Corporation reports. mark for My Articles similar articles
Fast Company
Pavithra Mohan
Your Fingerprint Could Be Stolen Remotely If Your Android Phone Has A Scanner During the Black Hat conference on Wednesday, security researchers presented findings that reveal hackers can remotely obtain fingerprints from Android devices that use biometric sensors. mark for My Articles similar articles
Information Today
February 4, 2013
Paula J. Hane
A Cyber War Is Brewing A cyberwar has been brewing and although you might view this battle as governments going head to head in a shadow fight, experts say the battleground is shifting from government entities to the private sector, to civilian targets that provide many essential services to U.S. citizens. mark for My Articles similar articles
National Defense
December 2009
Austin Wright
National-Security Infrastructure Faces Relentless Cyberespionage Campaign U.S. government and defense-industry networks face a relentless onslaught from cyber-spies who seek some of the nation's most heavily guarded secrets mark for My Articles similar articles
Entrepreneur
March 2005
Amanda C. Kooser
Touch and Go Fingerprint readers mean better security--and no more tricky passwords. mark for My Articles similar articles
Fast Company
Daniel Terdiman
AP Report: U.S. Power Grid Subject To Repeated Foreign Hacks The U.S. power grid is subject to being hacked from abroad, and foreign hackers have gained remote access to American power operations about a dozen times over the last decade. mark for My Articles similar articles
The Motley Fool
February 19, 2010
Tim Beyers
This Is Google's Nightmare Scenario A massive cyberattack scars 75,000 systems mark for My Articles similar articles
CIO
May 1, 2003
Ben Worthen
Database Cracks Murder Case Now, searching a set of prints against the 45 million on file in the FBI's national database takes only a couple of minutes. The system helped crack a case that had been closed for 45 years. mark for My Articles similar articles
IEEE Spectrum
December 2010
Sargur N. Srihari
Beyond C.S.I.: The Rise of Computational Forensics Pattern recognition and other computational methods can reduce the bias inherent in traditional criminal forensics mark for My Articles similar articles