INFORMATION

Site Map - Research & Studies

Security Research

- The European Union has published a considerable amount of information about its Framework Programs, its principal vehicle to fund scientific and technological research and development. A general outline is available here and the program’s homepage can be viewed here.. The EU accepts online submissions, send them here. 

Heart Monitors Can Be Hacked, Researchers Say

- A research team has hacked into a defibrillator, but says the possibility that others will try and succeed are low.

Radiation Detection Machine Tests Inconclusive, Report Says

- Despite their previous statements that the radiation detection machines worked, DHS now says a new round of tests cannot show whether the machines can "detect and identify actual objects that might be smuggled."

Behind the Numbers: Factors Driving Interest in PC Alternatives

-

Quick Bytes: I Spy

- Spyware beat out viruses, worms, and browser-embedded attacks when 1,070 companies were asked to rank their biggest IT security concern in 2007.

Explosive Testing of Window Systems – the Underlying Double-Standard

- Explosive testing can reveal deficiencies in both new technologies and improperly designed window systems. Unfortunately, either through misinterpretation or ill-intent, compliance with selected test standards has been slowly falling by the wayside.

Virginia Tech, Kaine Lobby for Campus Security Study

- Funds sought for study to secure open public environments.

Private Sector Provides Recommendations on Preparedness Standards

- A group of private-sector associations, including ASIS International, have issued a report on security standards being mandated by the Department of Homeland Security.

Youth Violence

- After reviewing over 600 youth violence prevention programs, the University of Colorado’s Center for the Study and Prevention of Violence has chosen the 11 best.

Browser breakers

- The growing popularity of attacks against Web-browser software is evident in new research conducted by CompTIA, the Computing Technology Industry Association. The survey found that 36.8 percent of the nearly 900 organizations interviewed had seen browser-based attacks jump 25 percent from the previous year. Browser-based attacks are those that take place when a Web page contains malicious code that can compromise a Web browser. @ More information on the CompTIA survey is at SM Online.

Quick Bytes: Browser breakers.

- The growing popularity of attacks against Web-browser software is evident in new research conducted by CompTIA, the Computing Technology Industry Association. The survey found that 36.8 percent of the nearly 900 organizations interviewed had seen browser-based attacks jump 25 percent from the previous year. Browser-based attacks are those that take place when a Web page contains malicious code that can compromise a Web browser. @ More information on the CompTIA survey is at SM Online.

A High-Tech R&D Agenda

- A Dartmouth College think tank, the Institute for Security Technology Studies (ISTS), released the third of three reports that analyze and prioritize the technology needs of cyberattack investigators. Read the full report.

Massive Waste at DHS, Says Report

- A new report from a private watchdog group "details billions of dollars in waste and mismanagement of taxpayer dollars" at DHS.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.