Skip to main content

Home/ CSIA 459/ Group items tagged LOOK

Rss Feed Group items tagged

Phil Kemp

Massive casino scam pulled off via CCTV system compromise - 4 views

  •  
    While society is looking to use technology for it's benefits, there are many pitfalls, and adverse uses for this same technology. This article discusses how the use of CCTV systems for ensuring that players do not cheat was used against the same system, to do the very thing it was protecting against. We as technology professionals should be very congnizant of the security risks that the technology we recommend or put in place, may have alternate uses, which may be used against us, and thereby causing more damage than it helped to protect.
  • ...3 more comments...
  •  
    Good article and I like the site. Haven't been there before. Looks like a good site to find out current news articles for another class I'm taking. Thanks!
  •  
    I read about the scam shortly after it happened, but the article I read didn't provide nearly as many details. Thanks for the article and I think there might be more people unemployed than just the VIP services manager.
  •  
    Phil you are so right about an organization own security technology being used against them. This is a great example of that. It is important when implementing technology to fully analyze its impact, that includes vulnerabilities and threats. A good change managment policy can help reveal problems like this. I wonder if there was an insider involved or maybe the casino failed to properly protect the network.
  •  
    Phil, This is very interesting. You would have thought the casino would have better security than that on their system. It also suprises me that if you were in a game with that much money why did they not see the receiver the person had. A simple pat down could have reveiled it. It is scary what technology can do in the wrong hands. Lee
  •  
    Winning is one thing, but stacking the deck is another. I would have thought that a casino would have a better way of securing their systems. Ben
Jessica Riedel

Mozilla: Ad Networks Have No 'Constitutional Right' To Set Cookies - 2 views

  •  
    With all of the privacy issues running rampant today, it looks like Mozilla is taking a stand against third-party cookies. Essentially they want to stop the third-party cookies from collecting data about the user's browsing habits and create the Internet people expect. Even though it isn't mentioned I think its an excellent marketing strategy against other browsers, cough cough Google, that rely on these cookies to track user habits and provide/tailor their product. This is a short description of the article: Mozilla recently drew the ire of the online ad industry by announcing plans to move forward with a project to block third-party cookies in the Firefox browser. Randall Rothenberg, President and CEO of the Interactive Advertising Bureau, publicly called on the company to retreat, arguing that it shouldn't try to implement "economic and cultural policies."
  •  
    It's bad enough that retailers are looking into or actually using camera footage to capture our spending and shopping habits without posting any warning. Thanks for the artical posting.
  •  
    I give Monzilla credit for being the first to step up about this issue. If they could stop the third party cookies I am sure a lot of users would jump over to their browser. The problem is that data is used for advertising which is used by companies like Monzilla to sell advertising space
Bob Lloyd

Wi-Vi system uses Wi-Fi to see through walls - 0 views

shared by Bob Lloyd on 02 Jul 13 - No Cached
  •  
    Looks like another privacy issue in the near future.
Percy Kendrick

US-CERT | United States Computer Emergency Readiness Team - 3 views

  •  
    US-CERT's mission is to improve the nation's cybersecurity posture, coordinate cyber information sharing, and proactively manage cyber risks to the nation.
  •  
    The "Alerts And Tips" page of this site provides excellent up to date alerts. (http://www.us-cert.gov/ncas). Subheadings include: Current Activity, Alerts, Bulletins, and Tips. The Bulletins page provides weekly vulnerability summaries. It's worth a look for anyone who hasn't seen this already.
Amy Harding

Cryptographic Module Validation Program (CMVP) - 8 views

  •  
    Read and explore this NIST website. Do you see any products that are you are familar with? Can you determine how this program enhances the security of these products?
  •  
    After looking through the website, I found the Vendor list for 140-2, which provides what I would think is the complete product list of Vendors and products which meet the standard. A couple items which meet the standard are Microsoft Windows 7 Bitlocker Drive Encryption, and Research In Motions Blackberry Cryptographic Kernel. It is important that the CMV Program is in place within the U.S. If we are going to rely on encryption to keep our secrets safe, then the products we use to encrypt our data, need to be checked to ensure they are secure.
Amy Harding

Video - Digital Nation Life on the Virtual Frontier - 25 views

shared by Amy Harding on 06 Mar 13 - No Cached
  •  
    This video is 90 minutes long. However, if you open the link, the video is separated by nine chapters. You can put your cursor on the bottom of the video and see each of the chapters and the topic. Find at least one chapter of interest to you and watch it. Each chapter tells you how long it is after you start it.
  •  
    What I found most interesting in this video was the research being conducted regarding students who multitask, and their perceived ability of doing it well. In fact, as the experiments and testing show, the researchers are proving just the opposite. The younger generation that believe they are multitasking well are only able to work in small chunks, and their work tends to show this. Students are unable to carry out long tasks, they get bored, and they put together papers in sections which directly correlates to their on and off study habits. I also found myself relating to the discussion of needing to satisfy a thought at the moment it pops, and change from doing one thing say, watching the video, into another, listening to the video, and looking at the photographs I took today. In either case, not accomplishing either with the same effectiveness that I would have had I completed them one at a time. The internet, and multiple monitors, helps feed this addiction.
samuelrios

Drones over U.S. get OK by Congress - 0 views

  •  
    Look! Up in the sky! Is it a bird? Is it a plane? It's ... a drone, and it's watching you. That's what privacy advocates fear from a bill Congress passed this week to make it easier for the government to fly unmanned spy planes in U.S. airspace.
  •  
    The commentary on that one is pretty heated... As for the article, I could take it or leave it. Working in Law Enforcement, I can definitely see the benefits in having drones in the air (they are sure useful here in Afghanistan...) I also see the argument stating they are a violation of 4th Amendment rights. Really, it is all about how it gets implemented. For instance, they could restrict the drones to prevent them from flying through residential airspace without a Magistrates Authorization, thereby protecting the rights of citizens when they are at home. Outside of home, 4th Amendment rights really don't exist when you are walking under clear skies... there's just no expectation of privacy there.
samuelrios

Unmanned drones making U.S. a Predator nation - 3 views

  •  
    (TomDispatch) Here's the essence of it: you can trust America's creme de la creme, the most elevated, responsible people, no matter what weapons, what powers, you put in their hands. No need to constantly look over their shoulders.
  • ...1 more comment...
  •  
    Samuel, A god article, even though the writer seems very passionate about the topic. Like everything else there are good and bad sides it. I can understand the view point, but have also talked to people who use some of these and people who have been supported by these and yes in the hands of "good" they are a valuable asset. I have even heard of the police using them as they are quiter than choppers. Very good article. Lee
  •  
    Great article Samuel, I had wondered about this topic for a while but did not have the chance to actual research the in's and out's. This article has definitely informed me of the issue. Great find!
  •  
    Sam, Great article. Sometimes people don't always think about the negative side of things. I know about unmanned drones I had not. Thank you for informing us of this.
Ben Garey

3D printing - 1 views

shared by Ben Garey on 31 Mar 13 - Cached
  •  
    Here is something to look at about 3D printing.
Lee Seranni

CNET Report on Google Glass - 1 views

  •  
    I searched this group first and did not see that anyone has reported this yet, but it produced (expecting 2014) could link us even more than we are now.
  •  
    Looks great. However would this just be another distraction for drivers that may end up being a hazard? Just asking. Ben
LaToya White

From Smart House to Networked Home - 0 views

  •  
    In this publication, the author looks towards the next 10 years describing the next technological advances that will change the way we live even further.
Joseph Walbert

DISA: Emerging Services - 0 views

  •  
    For the first week I've decided to share the Defense Information Systems Agency (DISA) Emerging Services webpage. This offers a non-DOD individual a chance to explore some of the technologies that are being looked at or currently used by our national assets (Federal and Military).
  •  
    I'm more of a fan to the PKI restricted content, stuff the public can get to seems to be a bulletin board for NG or GD to post their latest brochures.
Allen Hotte

When Everybody Starts Wearing Smartglasses, Google Won't Be the Only Player - 0 views

  •  
    Sales of the devices will depend on development of compelling apps Google Glass is just the beginning. The search giant's smartglasses are in the headlines, but numerous other players are also looking to cash in on what's expected to be a boom in eyewear that puts virtual and augmented reality face-front.
cpanagopulos

A Brief Look at the Fitbit Flex Personal Tracker - 1 views

  •  
    Here's a cool new wearable tech gadget called the FitBit Flex. Designed for personal fitness tracking. It's a wristband that's tracks your steps and monitors sleep. You can sync your daily stats with an Android or iOS app. There are a lot of rumors about Apple's development of an iWatch, so more wrist gadgets could be released soon.
  •  
    My wife loves her fitbit zip. This type of tracking technology is very cool, but can leave some consumers wondering what else is being tracked, recorded and uploaded when synching it with its application.
  •  
    Fitbit Flex Personal Tracker is interesting, but needs to be easier to put on and change the sensor. I also would like to have a battery that lasted longer than five to six days. It would be nice to know how the other trackers' batteries held up. I did like the silent alarm feature.
Cheryl Hoffman

Gait recognition without subject cooperation - 0 views

  •  
    This article addresses gait analysis from a non-lab perspective and looks at real work applicability.
Cheryl Hoffman

Search Engine Optimization (SEO) Poisoning - 1 views

  •  
    SEO Poisoning manipulates search engine results to make sites that are malicious in nature place higher in the results list. According to the article in 2011 40% of all cyberattacks resulted from SEO poisoning.
  •  
    I know that when I'm doing a Google or Bing search, I am looking for a specific item or topic and sometimes don't even think about reviewing the link that I'm clicking on. The high amount of malware that is in search engines is scary. The pointers that were in the article were very true and very easy for the every day user to do when they are doing a search. And anyone that does not have an anti-virus or anti-malware on their system is just asking for their system to be attacked.
  •  
    I use AVG security on my laptop and it uses an add-on called link scanner. When I search, the results are rated as safe or not, with a check mark or an "X" accordingly. So you immediately know which sites to avoid. It's worth trying since this could essentially save you the time and headache of undoing malware or spyware you might contract otherwise. It's a nice "peace of mind" tool.
1 - 16 of 16
Showing 20 items per page