Skip to main content

Home/ ACSE Discussion/ Group items tagged cyber

Rss Feed Group items tagged

Doug Peterson

London Olympic Games to simulate cyber-attacks | Naked Security - 0 views

  •  
    The London 2012 Olympic Games will open in nine months time, and - away from the glories anticipated on the track and field - consideration is being made about how to defend the world's leading sporting event from cyber-attack.
Doug Peterson

Watch worldwide cyber-attacks live with HoneyMap! | Unixmen - 0 views

  •  
    Watch worldwide cyber-attacks live with HoneyMap! http://t.co/VJaJSroV via @zite
Doug Peterson

Cyber security by the numbers: Malware surges, spam declines in third quarter | ZDNet - 0 views

  •  
    McAfee and Cisco have released their detailed cybersecurity reports for the third quarter and there's good news and bad news. Malware surged in the quarter, but spam eased off a bit.
tech vedic

KEYS TO A SECURE PASSWORD - 0 views

  •  
    Are you in a habit of using short or same passwords? Then change it now. Online world is becoming risky day by day. Hackers are always ready to hack your account and thus, it is your responsibility to protect yourself against cyber-crimes. We are providing you important tips to create strong as well as secure password.
Doug Peterson

'Evercookies' and 'Fingerprinting': Are Anti-Fraud Tools Good for Ads? - Digits - WSJ - 0 views

  •  
    Techniques like "evercookies" and "device fingerprinting" are new and controversial in the online ad industry, but they're widely used by firms that seek to catch cyber criminals.
Doug Peterson

Computer Viruses and the Internet « Welcome to a Bloggin' Education - 0 views

  •  
    I have spent a lot of time throughout the years researching and collecting facts and stimulus materials on the topic of Computer Viruses. Recently when I was watching my regular TED talk on my phone I watched this talk by Mikko Hypponen. I found it fascinating for the way in which he not only explores and shows some of the history of viruses but also talks of the social and ethical implications of the contemporary viruses being releases. He explores the use of viruses from a cyber-crime and organised-crime perspective.
tech vedic

Top 5 enterprise security threats - 0 views

  •  
    Nowadays, the list of security concerns is getting bigger and bigger. All enterprises have five types of security threats. Here in this tutorial, let's uncover these top five security threats of enterprises.
tech vedic

E-Commerce Security Tips - 0 views

  •  
    With every innovation of e-commerce, consumers are exposed to new security risks. Talking about U.S. e-commerce sales, it is expected to grow about 12 percent in 2013. Thus, making transactions safe online is a quite difficult job now. In this tutorial, we are introducing five fundamental security tips which you should keep in mind for embracing this dynamic industry.
Peter McAsh

6 weird malware tricks hackers use to bypass security - 0 views

  •  
    6 weird malware tricks hackers use to bypass security Security experts presenting in the upcoming SecTor conference reveal six new tactics that cyber criminals are employing to circumvent security and avoid detection.
1 - 9 of 9
Showing 20 items per page