Skip to main content

Home/ CSIA 459/ Group items tagged SITE

Rss Feed Group items tagged

Brandon Kennedy

Honeypot Annotated Bibliography - 0 views

Vickye F

http://www.us-cert.gov/sites/default/files/publications/cyber_threats-to_mobile_phones.pdf - 0 views

  •  
    This website gives information about Cyber Threats to Mobile Phones. The US-CERT provides valuable information on this site concerning recent threats.
Cheryl Hoffman

Search Engine Optimization (SEO) Poisoning - 1 views

  •  
    SEO Poisoning manipulates search engine results to make sites that are malicious in nature place higher in the results list. According to the article in 2011 40% of all cyberattacks resulted from SEO poisoning.
  •  
    I know that when I'm doing a Google or Bing search, I am looking for a specific item or topic and sometimes don't even think about reviewing the link that I'm clicking on. The high amount of malware that is in search engines is scary. The pointers that were in the article were very true and very easy for the every day user to do when they are doing a search. And anyone that does not have an anti-virus or anti-malware on their system is just asking for their system to be attacked.
  •  
    I use AVG security on my laptop and it uses an add-on called link scanner. When I search, the results are rated as safe or not, with a check mark or an "X" accordingly. So you immediately know which sites to avoid. It's worth trying since this could essentially save you the time and headache of undoing malware or spyware you might contract otherwise. It's a nice "peace of mind" tool.
Marilyn Morgan

Naked Security - 2 views

  •  
    Naked Security - Computer security news, opinion, advice and research.
  •  
    This site has great daily news on a variety of security topics from malware to privacy. I like the blog post styled interface that this site incorporates. This sets it apart from standard news feed sites.
  •  
    Thank you for the link. This is a good source or quick news bites.
Phil Kemp

Massive casino scam pulled off via CCTV system compromise - 4 views

  •  
    While society is looking to use technology for it's benefits, there are many pitfalls, and adverse uses for this same technology. This article discusses how the use of CCTV systems for ensuring that players do not cheat was used against the same system, to do the very thing it was protecting against. We as technology professionals should be very congnizant of the security risks that the technology we recommend or put in place, may have alternate uses, which may be used against us, and thereby causing more damage than it helped to protect.
  • ...3 more comments...
  •  
    Good article and I like the site. Haven't been there before. Looks like a good site to find out current news articles for another class I'm taking. Thanks!
  •  
    I read about the scam shortly after it happened, but the article I read didn't provide nearly as many details. Thanks for the article and I think there might be more people unemployed than just the VIP services manager.
  •  
    Phil you are so right about an organization own security technology being used against them. This is a great example of that. It is important when implementing technology to fully analyze its impact, that includes vulnerabilities and threats. A good change managment policy can help reveal problems like this. I wonder if there was an insider involved or maybe the casino failed to properly protect the network.
  •  
    Phil, This is very interesting. You would have thought the casino would have better security than that on their system. It also suprises me that if you were in a game with that much money why did they not see the receiver the person had. A simple pat down could have reveiled it. It is scary what technology can do in the wrong hands. Lee
  •  
    Winning is one thing, but stacking the deck is another. I would have thought that a casino would have a better way of securing their systems. Ben
Ken Ripley

ARE THE ELECTROMAGNETIC FIELDS A DANGER TO THE PUBLIC HEALTH? - 0 views

  •  
    Accessed at the UMUC Library, so enter your last name and barcode/EMPLID.
Ken Ripley

Malware goes mobile - 1 views

  •  
    Accessed at the UMUC Library, so enter your last name and barcode/EMPLID.
Ken Ripley

Danger, Will Robinson, danger!! - 1 views

  •  
    Accessed at the UMUC Library, so enter your last name and barcode/EMPLID.
Ken Ripley

Your cell phone is spying on you - 2 views

  •  
    Accessed at the UMUC Library, so enter your last name and barcode/EMPLID.
  •  
    Ken, This was a very good article. Nothing that I had not heard in the recent couple years, but you can see how society is being tracked to the point that no civil liberties union will be able to do anything anymore. The byproducts of the features that everyone wants, i.e. for convenience, are what allow these agencies monitoring and mining all of this data, with our silent approval. The use of this data will only continue to rise, and we will soon see if the secure state we are building will do more good than bad.
Phil Kemp

Arm's Flex when Responding Call for Implicit User Authentication in Smartphone - 0 views

  •  
    Link goes to UMUC library, so you will need to provide last name and pass if you want to access.
Phil Kemp

BIOMETRIC AUTHENTICATION THROUGH A VIRTUAL KEYBOARD FOR SMARTPHONES - 0 views

  •  
    Link goes to UMUC Library Resources so you will need to provide last name and pass to access.
glenn_g

Cyberstroke - 1 views

  •  
    Describese the efforts to create cyberweapons and some good descriptions of some that are in development
glenn_g

Surge of Cybersecurity Beuracracies Sparks Lucrative Opertunities - 1 views

  •  
    How we can make buckets of money due to the changing cybersecurity environment and the tools we will have to develop and be proficient with. Good stuff about the DHS in cybersecurity here
glenn_g

Cloud computing in Cyberwarfare - 0 views

  •  
    If you want to know about cloud computing or the Flame virus, you need to read this article
glenn_g

First Strike - 0 views

  •  
    The US shift from defense to offense and the development of 'cyberweapons'
glenn_g

Terrorists use smartphone technology to create invisible networks - 1 views

  •  
    Part of my cyberwarfare paper
1 - 20 of 56 Next › Last »
Showing 20 items per page