Skip to main content

Home/ CSIA 459/ Group items tagged china

Rss Feed Group items tagged

Amy Harding

U.S. business groups worried by cybersecurity law aimed at China | Reuters - 0 views

  •  
    This article talks about buying technology products from China and whether the US should. The supply chain is an important part of emerging technologies. As you worked on your bibliography - did you question where the technology comes from?
scott thomas

Automated biometrics-based personal identification - 1 views

  •  
    Identification Technology Division, EER Systems Inc. McLean, VA 22102; and†National Laboratory of Pattern Recognition (NLPR), Institute of Automation, Chinese Academy of Sciences, Beijing 100080, China Why Use Biometrics-Based Personal Identification? Biometrics-based personal identification attempts to answer the questions "Who are you?" and "Are you who you claim to be?"
  •  
    Scott, this technology appears not to far away especially when it comes to biometrics/fingerprinting the last car dealership I worked at 4 years ago employed this for retrieving keys to test drive cars and the salespeople liked this a lot because we did not have to worry about keeping up with a key to unlock the key box before signing a car out to test drive. I mean you always got your finger with you and key log kept track of last known person with key so salespeople would not be charged for lost keys. Thanks.
  •  
    Identification Technology Division, EER Systems Inc. McLean, VA 22102; and†National Laboratory of Pattern Recognition (NLPR), Institute of Automation, Chinese Academy of Sciences, Beijing 100080, China Why Use Biometrics-Based Personal Identification? Biometrics-based personal identification attempts to answer the questions "Who are you?" and "Are you who you claim to be?"
Amy Harding

Scope Of APTs More Widespread Than Thought - Dark Reading - 3 views

  •  
    Researcher uncovers hundreds of different custom malware families used by cyberspies -- and discovers an Asian security company conducting cyberespionage
  •  
    This article raises some serious questions in my opinion. As we move more into an environment where cyber warfare is to be used against different countries, where are the lines drawn between declaring war. As this article discusses, it is not as easy to see who actually was behind the attack, and an attack coming from Chinese, or some other countries IP space, is not neccessarily a state sponsored attack, nor is it neccessarily coming from someone inside the country. In a hack back scenario, it could be determined after the fact that whatever country was thought to initiate the first move, was actually a victim of a "zombie/bot" type of controlled attack that was actually initiated in another country. Can you say, Wargames? Edited 3222013: as I spoke yesterday, today guess what? http://news.yahoo.com/skorea-misidentifies-china-cyberattack-origin-071350510.html
James Thomas

Global Agenda Council on Emerging Technologies 2012 - 1 views

  •  
    The World Economic Forum (WEF) is a Geneva-based non-profit organization best known for its Annual Meeting in Davos, Switzerland, the Annual Meeting of New Champions in China (Summer Davos) and the Summit on the Global Agenda in Dubai. It also releases research reports such as the Competitiveness Reports and Risk Reports and engages with its members in sector-specific initiatives.
Lee Bry

SANS Newsbites - 2 views

shared by Lee Bry on 09 Jul 13 - No Cached
  •  
    A site that you can subscribe to bi-weekly updates to computer security as a way to keep current on potential emerging threats.
  •  
    This is a great site with a simple archive system. I read the article on the 80% increase for android malware in China. The Android platform is a security nightmare. Everyday it seems like a new exploit is exposed and it takes months for a update.
1 - 5 of 5
Showing 20 items per page