Skip to main content

Home/ CSIA 459/ Group items tagged news

Rss Feed Group items tagged

Marilyn Morgan

Naked Security - 2 views

  •  
    Naked Security - Computer security news, opinion, advice and research.
  •  
    This site has great daily news on a variety of security topics from malware to privacy. I like the blog post styled interface that this site incorporates. This sets it apart from standard news feed sites.
  •  
    Thank you for the link. This is a good source or quick news bites.
Ken Ripley

Popular Science | New Technology, Science News, The Future Now - 0 views

shared by Ken Ripley on 24 Mar 13 - Cached
  •  
    Popular Science has always been a resource I depend upon to see whats on the horizon in the technology field.  
Amy Harding

Biometrics and Cyber Security - 8 views

  •  
    Review the presentation.
  • ...3 more comments...
  •  
    This article does mention balancing some weaknesses of biometrics. The one weakness that is common right now among these systems is the use of usernames and passwords to form a secondary means of accessing the system once the biometrics no longer work. With the implementation of multi-modal systems, this could be resolved. The article also discusses international based systems, which could be difficult, personal information is a source of contention between many countries. Where is the information stored, and what laws become enforceable depending on the users point of presence?
  •  
    Interesting article thank you for posting it. As Phil and the article mentioned where is this information stored. The security of this information is deeply concenring. Not that I am a conspiracy theorist but I really do not want my biometric information to be stored on some database. I remember when my daughter was young there was a push to have your child's DNA sample taken and stored in case it was ever needed in the event the child was kidnapped or lost. After thinking about it back then I just did not see how the government having her DNA sample was a good thing. Of course if she ever comitted a crime I would like to think that I would want her punished for the crime but being a parent I also know that I would do anything to protect her, so why would I give the government a readily available DNA sample for them to identify her with. In the event a sample was needed because of some terrible event happening to her one could be provided through other methods. Just my thoughts.
  •  
    I just posted up an article on fooling biometric fingerprint scanners, Facial scanners can be fooled with photos http://thehackernews.com/2011/11/android-facial-recognition-based.html The Danger is that while one can get a new password or smart card if the old is compromised, You only have one face, two eyes and 10 fingers to use for ID and can't get new ones when someone figures out how to comprimise them.
  •  
    Thanks for the posting especially since my project deals with Ambient Intelligence wherein biometrics can be an integral part of its implementation. One of the most common and frequent incidents in Service Management is authentication. Whether it is with entering secure facilities or logging into computer systems both in the office and remotely, people tend to forget their credentials. Consequently, this causes a loss in productivity as someone tries to regain their access to systems or for system administrators to provide them with temporary access. Ambient intelligence and biometrics may seem as a viable solution since the physical characteristics is intrinsic in each individual. This presentation presents me with the cybersecurity flaws and weaknesses that should be mitigated.
  •  
    Biometrics is always something I have found to be fascinating. Because like this article stated no one knows who you are on the other end of that computer so being able to authenticate that in some sort of method is a great thing
Vickye F

http://www.northjersey.com/news/international/199167071_S__Korean_Banks_Fall_Victim_to_... - 0 views

  •  
    How can you tell who is servicing your systems if they are in the clouds? Should the ATM network be placed in the clouds? Something to ponder about
Ben Garey

3D printing - 0 views

  •  
    Here is something from Fox News about 3D printing and the benefits to the army.
Robert Scire

Anonymous hackers bring down North Korean websites for a second time - Yahoo! News - 0 views

  •  
    Thought this was interesting - especially with all the current events involving North Korea.
Rumnea Kelly

Intel's TV 'Black Box Project' poised for big changes in debut - 0 views

  •  
    As new devices such as these come on-line, we have to take extra care on how we can secure these things. They are connected directly into our house bypassing any internet firewalls, etc...These devices such as slingbox can be remotely controlled so you're basically leaving the key to your network exposed to everyone around the World.
Funsho Aiyedogbon

5 Emerging Technologies Every Office Will Have In 2020 - 1 views

  •  
    This article explores five emerging technologies that will be commonly used in business offices in the next seven years.
  • ...1 more comment...
  •  
    Now this is scary and yet so amazing. The fact that they are already predicting that typing a password into a device is something that is going to be in the past, is unreal. A device is going to recognize your face and allow you to have access to it. The scary part is the phone aspect in how the devices will pick up your phone conversation and automatically send a calendar invite to your device. New technologies are definitely amazing but still, there is little to no talk on how they are going to secure the environments that they are creating.
  •  
    Very interesting article. Basically, all human existence will be completely gone by 2020. I can't believe these technologies even exist and are currently in the prototype stage. You never know, this technology can take over sooner that what this article expect. The most interesting technology to me the use of sensors. If things come out to be in full effect, with the use of these sensors can provide very accurate data and help avoid the use of any fraudulent it identity threats. Thanks!
  •  
    I read this article and loved it. After reading it a while back I became very interested in Gesture Control. This is the emerging technology that I chose for this class. I know that this article talks about the use of this technology in the office but we have already seen it in Smartphones (the new Galaxy) who knows where it will pop up next!
Marie Arrington

Cloud Compliance: Tackling Compliance in the Cloud - 0 views

  •  
    Most organizations already have started to use virtualization technology or cloud computing. Yet some still may be reluctant to move their mission-critical-tier-1 - applications to these relatively new environments. While the flexibility and cost benefits of virtualization are widely accepted, questions linger on how to adapt to new and different risks.
cpanagopulos

Threat Level - Privacy, Crime and Security Online | Wired.com - 0 views

  •  
    News oriented site that covers breaking news on Privacy, Crime and Security Online.
Bob Lloyd

Intelligent 'iKnife' diagnoses cancer midsurgery | Cutting Edge - CNET News - 1 views

  •  
    This article is about an intelligent knife that allows surgeons to minimize bleeding during operations but also has a mass spectrometer that analyzes chemicals when cutting. The knife has the potential to reduce tumor recurrence.
  •  
    I had read this article on the Internet and found this an amazing use of the technology. The ability to determine if an entire tumor is removed at the time it's being done eliminates risk for the patient and waiting for lab results.
Bob Lloyd

3D-printed button-bashing robot guesses phone PINs | Cutting Edge - CNET News - 1 views

  •  
    I thought this was interesting. Hacking has gone to another level of automation by using robotics to brute force hack the 4 digit pin on cell phones.
  •  
    It's nice to know my first thought when I started reading this of locking the phone after X number of unsuccessful attempts is what they suggested.
Rumnea Kelly

Twitter and New York Times clash with hackers for control of their sites - 1 views

  •  
    Remember our discussion about DNS being tough to compromise? :D
Amy Harding

Scope Of APTs More Widespread Than Thought - Dark Reading - 3 views

  •  
    Researcher uncovers hundreds of different custom malware families used by cyberspies -- and discovers an Asian security company conducting cyberespionage
  •  
    This article raises some serious questions in my opinion. As we move more into an environment where cyber warfare is to be used against different countries, where are the lines drawn between declaring war. As this article discusses, it is not as easy to see who actually was behind the attack, and an attack coming from Chinese, or some other countries IP space, is not neccessarily a state sponsored attack, nor is it neccessarily coming from someone inside the country. In a hack back scenario, it could be determined after the fact that whatever country was thought to initiate the first move, was actually a victim of a "zombie/bot" type of controlled attack that was actually initiated in another country. Can you say, Wargames? Edited 3222013: as I spoke yesterday, today guess what? http://news.yahoo.com/skorea-misidentifies-china-cyberattack-origin-071350510.html
Amy Harding

Security Requirements for Cryptographic Modules - 4 views

  •  
    This standards publication (FIPS 140-2) is a key standard's document. Skim through it and see if you can find some ideas for emerging threats against the standard(s).
  • ...1 more comment...
  •  
    FIPS 140-3 is on its way and is needed as 140-2 is quite old now. Interestingly however, crypto is one of the slower moving changes in information security. Many of our algorithms have been around for many years; we have moved forward by increasing key size rather than changing the algorithms. AES and 3DES are still FIPS approved, whereas RC4 is not (which is used by many internet giants such as google and facebook).
  •  
    Any time you are allowed to introduce code into a program, you have a chance for error. By allowing cryptographic software and firmware to be updated, I think you will always have the chance for emerging threats to be introduced in the form of malware. Recently, the U.S. has stopped allowing the use of Chinese built hardware for certain DOD/ Federal agencies. if we allow the enemy to build the devices we use to form our security foundations, we have already lost the war.
  •  
    I believe the frequency of review of this policy is untimely to the speed technology advances in. If they could move the review from 5 years to 2 years will suffice. At times, once the policy is published folks are already working on the revision to keep up with technology growth. "Since a standard of this nature must be flexible enough to adapt to advancements and innovations in science and technology, this standard will be reviewed every five years in order to consider new or revised requirements that may be needed to meet technological and economic changes."
Amy Harding

Verizon's '2013 Data Breach Investigations Report' Expands Types of Threats Analyzed to... - 23 views

  •  
    For your Week 6 discussion. "Verizon's '2013 Data Breach Investigations Report' Expands Types of Threats Analyzed to Present Even Broader, More Extensive Picture of Cybercrime"
samuelrios

Court Says C.I.A. Must Yield Some Data on Drones - NYTimes.com - 3 views

  •  
    Article supports drones as being an emerging technology. ASSignment1, Part1 Support
  •  
    Interesting article, It seems to me that this is just another one of those cases about flexing the "muscle" of the Freedom of Information Act. In my opinion it is pretty common knowledge that targeted drone strikes are being used to eliminate enemies; so why is it so important here that the C.I.A. has to acknowledge these attacks? What would that accomplish? The media outlets already report on successful drone strikes and now there are even military medals to recognize drone pilots. http://www.fsunews.com/article/20130318/FSVIEW0303/130317001/New-military-medal-stirs-controversy-?odyssey=mod|newswell|text|frontpage|s
  •  
    I just wonder how long it's going to take before something comes out of these attacks. Using these drones to fly into other countries like Pakistan, and "take out" suspected enemies is pretty borderline in my opinion. If this were to happen in America, we would certainly not stand for it, and would declare war on the country that carried out the action. Pushing the button from California on a drone missle is alot like conducting cyber warfare from one country to another. The damage that can be done is becoming greater and greater every day as technology is starting to tie together national infrastructures. In my opinion, drones are the some of the first of the cyber warfare machines.
samuelrios

HowStuffWorks "How the Predator UAV Works" - 0 views

  •  
    Military commanders use tactics and strategy in combat to inflict as much damage on the enemy while trying to risk as few personnel and resources as possible. This principle was at the heart of the development of the RQ-1 and MQ-1 Predator Unmanned Aerial Vehicle.
  •  
    This was a really cool read, before I read your article I did not even know what the predator UAV was. Thanks for this great information.
  •  
    I always use HowStuffWorks if I read an article about a new technology and don't understand how it works. UAVs is an area where most people don't understand how it works. Nice article.
1 - 20 of 54 Next › Last »
Showing 20 items per page