Researcher looks for bad guys in cyberspace
Sandia National Laboratories researcher Jeremy Wendt is working on a process for detecting targets of nefarious emails. Their web site receives tens of thousands of requests daily. Wendts goal is to lower the number of visits an analyst need to analyze. His ultimate goal is to be able to spot spear phishing attacks. Namely, Wendt developed an algorithm which is able to separate request generated by web crawlers and ones generated by human visitors. He believes his work can significantly improve security by allowing analysts to look at requests separately. The official news report is available here.
The Internet Needs a Plan B
Danny Hillis, one of the Internet's first users, expressed concern about the vulnerability of the Internet. In his conference talk (TED 2013) he stated that systems from all walks of life now depend on the Internet for service and administrative functions. Great attention is paid to the protection of individuals and systems that are on the Internet. However, very little attention has been given to the protection of the Internet.
New trend in wireless technology
The gathering at the Mobile World Congress presented a new trend in wireless technology. More precisely, machine-to-machine communication that takes place without human intervention. Some of the interesting examples displayed at the gathering include a coffeepot that can be managed via tablets computers or Internet alarm clocks.
China is developing the next generation of Internet. According to the Chinese representatives, the project is on a larger scale than any similar projects being developed in the west. One of the most important aspects of this project represents a new security feature. More precisely, the property is based on adding control points on the network.