Skip to main content

Home/ CSIA 459/ Group items tagged hacker

Rss Feed Group items tagged

Amy Harding

Hackers - 3 views

shared by Amy Harding on 06 Mar 13 - No Cached
  •  
    Optional web resource for week 2.
Robert Scire

Anonymous hackers bring down North Korean websites for a second time - Yahoo! News - 0 views

  •  
    Thought this was interesting - especially with all the current events involving North Korea.
Kerry Tam

DHS seeks student hackers - 0 views

  •  
    Here's an interesting article from DHS. They're seeking high school students and college students.
Phil Kemp

Hacker says phone app could hijack plane - 0 views

  •  
    Interesting article about an app that has been specifically designed to take control of an airplane.
Rumnea Kelly

Twitter and New York Times clash with hackers for control of their sites - 1 views

  •  
    Remember our discussion about DNS being tough to compromise? :D
Kerry Tam

Symbian 'vulnerability' and mobile threats - 0 views

  •  
    A study I found at UMUC's library how mobile OS are attacked by hackers and what methods they use to access OS
alan savage

Apple suspends password resets after critical account-hijack bug is found (Updated) - 0 views

  •  
    Update: Apple restored the password resets on Friday night. Apple suspended the password-reset functionality for its iCloud and iTunes services following a published report that hackers could exploit it to hijack other people's accounts. The password reset page stopped loading a few hours after The Verge reported there was an online tutorial that provided detailed instructions for taking unauthorized control of Apple accounts.
Dan Schulman

Kill the Password - 1 views

  •  
    An article many of us have probably read, but an important one for my paper
Cheryl Hoffman

Phone hackers a threat to safety - 0 views

  •  
    Interesting article on how a hospitals phone network was hacked by someone using VOIP who then performed a DOS attack.
  •  
    This was an interesting article. I wish it explained how the attack was carried out. I am surprised that firewalls would not be a part of VOIP installation for large institutions. The treat has always been there. I am guessing that somebody cut costs up front and paid for it later. Maybe the attacker sold them the firewalls?
Rumnea Kelly

Celebrated Computer Hacker Barnaby Jack Dies - 1 views

  •  
    Interesting story that I'm sure some of you are already aware.
  •  
    I was going to post this as well. I have done a number of projects on body sensors ad telemedicine that pointed out the type of vulnerabilities he said he could exploit up to the point of death. I sad story.
Cheryl Hoffman

Car hackers 'drive' car with laptop - 1 views

  •  
    Next time you have a passenger in the back seat of your car offering infuriatingly "helpful" advice about your driving skills, count yourself lucky that they aren't doing anything more sinister in their attempts to guide your vehicle.
  •  
    I was quite amused by the picture of the man holding the Nintendo controller in the car on the front page of the article. It doesn't surprise me that a cars ECU can be manipulated. They are programmed to control specific tasks and are not complex nor secure. Most of the information they display and/or process is from various sensors within the engine or chassis. If the failure of important sensors occur, you may not even be able to start your car. It's a fragile system, although it was designed that way for safety, not system security.
1 - 13 of 13
Showing 20 items per page