Skip to main content

Home/ Groups/ Computer Technologies & Cyber Crime
Kim Gabelmann

ID Theft & Fraud | StaySafeOnline.org - 1 views

  •  
    The good news is that federal, state, and local law enforcement authorities are becoming more sophisticated about and devoting more resources to responding to cybercrime. Furthermore, over the past several years, many new anti-cybercrime statutes have been passed empowering federal, state, and local authorities to investigate and prosecute these crimes.
Kim Gabelmann

Cybersecurity: Awareness Training and the 90/10 Rule - 1 views

  •  
    Cybersecurity: Awareness Training and the 90/10 Rule Information security is not only about physical and logical measures such as locks, firewalls or anti-virus software. These technical measures may protect universities against many network attacks, but cannot protect against soft attacks, such as social engineering.
  •  
    In order to deploy cybersecurity effectively all students and staff would be required to attend initial and annual training. Necessary but, it seems like a monumental undertaking for all schools, not only colleges.
David Hernandez Jr.

"The Mask" - A Cyber Spying Ring - 1 views

  •  
    No body wants to be left behind, they hear of the U.S. spying on other countries and even small governments want to get in the action, even if it is just show off.
Nick Bulko

Smartphones with Flappy Bird Sell for Thousands on eBay - 0 views

  •  
    I post this because selling a phone/tablet on eBay that hasn't been wiped is a very obvious cyber security risk.
bnathoo

Experts warn of coming wave of serious cybercrime - 2 views

This article shocked me because it's hard to believe how easy a person can be hacked. All their personal information can be found easily just by going shopping. There has to be more done to keep pe...

http:__m.washingtonpost.com_business_economy_target-breach-could-represent-leading-edge-of-wave-of-serious-cybercrime_2014_02_09_dc8ea02c-8daa-11e3-833c-33098f9e5267_story.html

started by bnathoo on 13 Feb 14 no follow-up yet
tngodwin11

iPhone fingerprint spoof - 3 views

http://www.theguardian.com/technology/2013/oct/04/iphone-5s-fingerprint-id-theft

http:__www.theguardian.com_technology_2013_oct_04_iphone-5s-fingerprint-id-theft

Meagan Yuppa

Cybercrime on the rise - 1 views

Very good article on how more and more companies are being hacked, and how companies do not have the means to protect themselves and their customers. http://www.washingtonpost.com/business/econom...

started by Meagan Yuppa on 12 Feb 14 no follow-up yet
Javier Crespo

Piracy and the Lego Movie - 1 views

Even though it is a blog, I thought it would be interesting and funny to share. Not necessarily a reliable source but it is an interesting point of view from this person. http://www.gizmodo.com.au...

started by Javier Crespo on 12 Feb 14 no follow-up yet
Javier Crespo

Busting a Credit Card Hacker - 1 views

I like this article because it describes how an undercover agent infiltrated a criminal ring and worked with them so he could get information on them. The agent describes his experience there and w...

started by Javier Crespo on 12 Feb 14 no follow-up yet
Javier Crespo

On a previous post, I found a more recent report on the Target Hacking that describes e... - 0 views

I was quite shocked when I read this article about how Target was hacked through one of their vendors. I believe it is quite crazy how some hackers can be so creative and intelligent. http://www.n...

started by Javier Crespo on 12 Feb 14 no follow-up yet
Jonathan Cespedes

Chinese Hackers Target U.S Media - 1 views

http://online.wsj.com/news/articles/SB10001424127887323926104578276202952260718 It is said that Chinese Hackers have been spying and making multiple attempts to breach cybersecurity of many U.S me...

started by Jonathan Cespedes on 12 Feb 14 no follow-up yet
1 - 20 of 53 Next › Last »
Showing 20 items per page