Skip to main content

Home/ Groups/ CSIA 459
1More

Why Telemedicine Is Finally Ready to Take Off - 1 views

  •  
    This is an interesting article regarding my emerging technology topic Telemedicine. With the constant concern of the cost of healthcare telemedicine represents a possible solution to mitigate these costs. It seems that law makers would be increasingly interested in the topic to curb the ever expanding costs of Medicare
1More

Logic Bomb Set Off South Korea Cyberattack - 1 views

  •  
    The recent cyberattack against South Korean media organizations and financial institutions was initiated by a logic bomb.
3More

HowStuffWorks "How the Predator UAV Works" - 0 views

  •  
    Military commanders use tactics and strategy in combat to inflict as much damage on the enemy while trying to risk as few personnel and resources as possible. This principle was at the heart of the development of the RQ-1 and MQ-1 Predator Unmanned Aerial Vehicle.
  •  
    This was a really cool read, before I read your article I did not even know what the predator UAV was. Thanks for this great information.
  •  
    I always use HowStuffWorks if I read an article about a new technology and don't understand how it works. UAVs is an area where most people don't understand how it works. Nice article.
1More

Apple suspends password resets after critical account-hijack bug is found (Updated) - 0 views

  •  
    Update: Apple restored the password resets on Friday night. Apple suspended the password-reset functionality for its iCloud and iTunes services following a published report that hackers could exploit it to hijack other people's accounts. The password reset page stopped loading a few hours after The Verge reported there was an online tutorial that provided detailed instructions for taking unauthorized control of Apple accounts.
1More

Mandiant - 0 views

  •  
    Independent security company Mandiant releases a report on one of China's cyber espionage units. The report is a little over 70 pages and describes, in detail, the five W's on an active persistent threat. The appendix also shows the tools available from the Mandiant to conduct the same type of "research". In all it is a great read.
1More

Global Agenda Council on Emerging Technologies 2012 - 1 views

  •  
    The World Economic Forum (WEF) is a Geneva-based non-profit organization best known for its Annual Meeting in Davos, Switzerland, the Annual Meeting of New Champions in China (Summer Davos) and the Summit on the Global Agenda in Dubai. It also releases research reports such as the Competitiveness Reports and Risk Reports and engages with its members in sector-specific initiatives.
1More

Comprehensive Experimental Analyses of Automotive Attack Surfaces - 0 views

  •  
    An interesting review of the different attack vectors threatening tomorrow's automobiles.
1More

Popular Science | New Technology, Science News, The Future Now - 0 views

shared by Ken Ripley on 24 Mar 13 - Cached
  •  
    Popular Science has always been a resource I depend upon to see whats on the horizon in the technology field.  
1More

Apple's Password-Reset Security Breach - 1 views

  •  
    Apple has fully implemented multifactor authentication, but not without some security issues for their users. Since Apple has fixed the flaws, the article covers the steps in the vulnerability.
1More

ARE THE ELECTROMAGNETIC FIELDS A DANGER TO THE PUBLIC HEALTH? - 0 views

  •  
    Accessed at the UMUC Library, so enter your last name and barcode/EMPLID.
1More

Danger, Will Robinson, danger!! - 1 views

  •  
    Accessed at the UMUC Library, so enter your last name and barcode/EMPLID.
1More

Massive cyberattack hits Internet users - CNN.com - 0 views

  •  
    A (very) recent example of a DDoS attack.
1More

How to mitigate smarthphone threats to your corporate network - 0 views

  •  
    As more and more people have smartphone, it can have the potential risk to an organizations security. This article has a few tips to reduce the threats.
1More

Symbian 'vulnerability' and mobile threats - 0 views

  •  
    A study I found at UMUC's library how mobile OS are attacked by hackers and what methods they use to access OS
1More

Mobile Security: Finally a serious problem? - 1 views

  •  
    Article from UMUC's library on mobile security
1More

Leveraging Mobile Context for Effective Collaboration and Task Management - 0 views

  •  
    Collaboration in a moment of crisis
« First ‹ Previous 181 - 200 Next › Last »
Showing 20 items per page