Quantcast
Channel: MIT News - Topic - Security
Browsing all 14 articles
Browse latest View live

Protecting medical implants from attack

Millions of Americans have implantable medical devices, from pacemakers and defibrillators to brain stimulators and drug pumps; worldwide, 300,000 more people receive them every year. Most such devices...

View Article



The new NSE strategy

Nuclear technology is inextricably bound up with great issues — energy, international security, climate change and the environment, to name a few. MIT’s Department of Nuclear Science and Engineering...

View Article

3 Questions: Stephen Van Evera on the withdrawal from Iraq

This month marks the formal withdrawal of U.S. troops from Iraq, more than eight years after they arrived in 2003. What effect will the departure of the troops have on Iraq, and what are the remaining...

View Article

MIT's open wireless networks will be retired in 2012

Almost everyone who has a wireless network at home protects it with a password. Most businesses also require authentication to access their wireless networks. These protective measures have become...

View Article

System improves automated monitoring of security cameras

Police and security teams guarding airports, docks and border crossings from terrorist attack or illegal entry need to know immediately when someone enters a prohibited area, and who they are. A...

View Article


Travel safely with your laptop this summer

IS&T strongly encourages you to take the following safety precautions before traveling and/or working remotely. BackupBacking up your computer’s contents to a secure network server lets you restore...

View Article

R. Scott Kemp brings new perspectives on nuclear technology and society

All engineering disciplines interact with society, but nuclear engineering is a special case, inexorably bound up with critical issues of our era: energy, the environment and international security....

View Article

3 Questions: Violence and protests in the Muslim world

The world has been roiled by violence in North Africa and the Middle East in recent days. The U.S. ambassador to Libya, J. Christopher Stevens, was killed in an attack this week, while violent protests...

View Article


How civil wars evolve

When the Taliban took control of Kabul, Afghanistan, in late 1996, they soon launched a sustained military offensive to the north, an area they did not control. The following May, however, Abdul Malik...

View Article


Securing the cloud

Homomorphic encryption is one of the most exciting new research topics in cryptography, which promises to make cloud computing perfectly secure. With it, a Web user would send encrypted data to a...

View Article

Protecting data in the cloud

Cloud computing — outsourcing computational tasks over the Internet — could give home-computer users unprecedented processing power and let small companies launch sophisticated Web services without...

View Article

Encryption is less secure than we thought

Information theory — the discipline that gave us digital communication and data compression — also put cryptography on a secure mathematical foundation. Since 1948, when the paper that created...

View Article

After the U.S. leaves Afghanistan, then what?

After more than a decade of involvement, the U.S. has pledged to draw down its Afghanistan troops in 2014, a move with major security implications for both countries. The change will also have a direct...

View Article


Modeling cyberspace control worldwide

“Cyberspace is fluid, it is pervasive, it affects anybody who wants to participate, and it is very difficult to control,” says Nazli Choucri, MIT professor of political science and a leading researcher...

View Article
Browsing all 14 articles
Browse latest View live


Latest Images