NIST, in collaboration with IEEE, is inviting teams currently engaged in microrobotic, microelectronic or microelectromechanical systems research to participate in the NIST Mobile Microrobotics Challenge 2011. The competition will be held as part of the IEEE International Conference on Robotics and Automation, May 9-13, 2011, in Shanghai, China.
Taking the first steps of what would be a major historical advance in the science of measurement, NIST is participating in a worldwide effort to recommend major revisions to the International System of Units (SI), the modern metric system that is the basis of global measurements in commerce, science and other aspects of everyday life.
Researchers at NIST have demonstrated for the first time the conversion of single photons produced by a true quantum source to a near-visible wavelength. The ability to change the color of single photons may aid in the development of hybrid quantum systems for applications in quantum communication, computation and metrology.
After 23 years as the ‘Baldrige National Quality Program,’ the nation’s public-private partnership dedicated to performance excellence has decided to highlight that mission with a new name, the Baldrige Performance Excellence Program.
NIST and the National Telecommunications and Information Administration are seeking partners in the telecommunications industry to help create a demonstration broadband communications network for the nation’s emergency services agencies.
On November 4 and 5, NIST will host the Cloud Computing Forum and Workshop II to give government and industry stakeholders opportunity to comment on the next steps in developing cloud computing standards.
The NIST Manufacturing Extension Partnership has awarded $9.1 million in cooperative agreements for 22 projects designed to enhance the productivity, technological performance and global competitiveness of U.S. manufacturers.
NIST has released the 2009 technology transfer report, an annual report summarizing the technology transfer activities and achievements of the U.S. Department of Commerce’s scientific research agencies.
NIST has advised the Federal Energy Regulatory Commission (FERC) that it has identified five ‘foundational’ sets of standards for Smart Grid interoperability and cyber security that are ready for consideration by federal and state energy regulators.
NIST has awarded a total of $50 million in grants to five institutions to support the construction of new scientific research facilities that will explore topics ranging from nanometer-scale electronics and green buildings to microbe ecosystems in the oceans.
NIST’s Ian Spielman is highlighted in the November issue of Popular Science, where the magazine’s editors have named him to their annual ‘Brilliant Ten’ list.
George Arnold of NIST has been honored with a 2010 GridWeek Award for his work in advancing international Smart Grid cooperation and standards.
Original release date: October 11, 2010 | Last revised: February 06, 2013
Fake antivirus is malicious software (malware) designed to steal information from unsuspecting users by mimicking legitimate security software. It’s important to protect your computer from fake antivirus infection and to be able to recognize when an infection has occurred.
What is fake antivirus?
Fake antivirus is malicious software (malware) designed to steal information from unsuspecting users by mimicking legitimate security software. The malware makes numerous system modifications making it extremely difficult to terminate unauthorized activities and remove the program. It also causes realistic, interactive security warnings to be displayed to the computer user.
How can my computer become infected with fake antivirus?
Criminals distribute this type of malware using search engines, emails, social networking sites, internet advertisements and other malware. They leverage advanced social engineering methodologies and popular technologies to maximize number of infected computers.
How will I know if I am infected?
The presence of pop-ups displaying unusual security warnings and asking for credit card or personal information is the most obvious method of identifying a fake antivirus infection.
What can I do to protect myself?
- Be cautious when visiting web links or opening attachments from unknown senders. See Using Caution with Email Attachments for more information.
- Keep software patched and updated. See Understanding Patches for more information on the importance of software patching.
- To purchase or renew software subscriptions, visit the vendor sites directly.
- Monitor your credit cards for unauthorized activity.
- To report Internet crime or fraud, contact the Internet Crime Complaint Center (http://www.ic3.gov).
Author: Mindi McDowell