Skip to main content

Home/ Groups/ CSIA 459
Bob Lloyd

Wi-Vi system uses Wi-Fi to see through walls - 0 views

shared by Bob Lloyd on 02 Jul 13 - No Cached
  •  
    Looks like another privacy issue in the near future.
Phil Kemp

Hacker says phone app could hijack plane - 0 views

  •  
    Interesting article about an app that has been specifically designed to take control of an airplane.
Amy Harding

http://resources.idgenterprise.com/original/AST-0084883_2013_Threat_Report.pdf - 1 views

  •  
    2013 Threat Report
Lee Bry

Enterprise Network Guide - 1 views

  •  
    White paper describing impacts and benefits to new technologies and the requirments and pressures for organizations to implement them (Cyber nightmare?)
  • ...1 more comment...
  •  
    Interesting read. I came across BYOD on other school projects. I think the idea is insane. I could not believe how many organizations were encouraging the bring your own device concept to cut costs. The healthcare industry was one of the biggest advocates from the research I came across.
  •  
    Hmmm I agree with you both, this seems like a horrible idea. I cannot imagine the amount of people who do not properly update, patch and run security scans on their personal devices, I for one would not want to be connected to that in anyway, especially on a business function. I also have to think heavily about the government and contractors dealing with highly sensitive material and I cannot see these trends happening with them. Not just BYOD but also getting rid of the wired LAN's. Good/interesting post.
  •  
    Testing
Bob Lloyd

Next-Generation Intrusion Prevention System (NGIPS) | Sourcefire - 2 views

  •  
    I came across Sourcefire when doing research for centralized management solutions. They have some very interesting products and seem to be on the forefront of the industry.
Michael Madrzykowski

2013 Emerging Cyber Threats Report - 2 views

  •  
    Georgia Tech's security summit report
  • ...1 more comment...
  •  
    Nice find and I'm glad you posted this. On the topic of mobile malware, the report states that more smartphones were purchased in 2012 than PC's, and the Internet was accessed more on smartphones than any other device. The article mentions this, and I agree that the mobile malware threat will increase as the android and iOS ecosystems stretch wider and wider. It was also interesting to read about cloud storage, and how authorization will be one of it's major vulnerabilities as it becomes more widely used for business.
  •  
    Great article. Thing like this are very interesting to me. The section on Cloud Computing was by far my favorite. This type of technology is emerging and at the same time it has turned into a challenge for attackers to try to break. Security is going to be very vital for this service to work and more likely will be the subject of any topic related to cloud technology. Cloud service providers need to make a stronger statement and provide some type of assurance to the customer. Thanks!
  •  
    I had actually read this article before, but it was good to read it again. While they are many elements that are concerning I find the "filter bubbles" troubling. A user has the right to know that their search results have been filtered. You think you're conducting an open search, only to read this and find out your results may be limited.
Bob Lloyd

Centralized Management | Sourcefire - 0 views

  •  
    Testing.....
  • ...1 more comment...
  •  
    I see Bob's post
  •  
    Bob, still not sure what was up (prob my issue), I can def. see/comment on it now. The sourcefire technologies you posted stuck out to me mainly in one way...they boast that they are a little bit more secure, which is always good, but at under half the price (of the industry average for IDS). They have many good ideas and tools in place to try and get to the top it seems!
  •  
    I used this product in 2010. Very cool and as I recall rather expensive.
Justin Ohm

Cognitive biometrics: A very personal login - 2 views

  •  
    Retina and iris scans, fingerprint and palm logins rely on possession of unique anatomical characteristics that you cannot forget as you might a password. But, Kenneth Revett of the British University in Egypt, in El-Sherouk City, reviews the state of the art in an alternative approach to user authentication in the inaugural issue of the International Journal of Cognitive Biometrics.
  •  
    Very interesting article Justin. I like the idea of using biometrics as an authentication layer, vs. relying on a CA to issue digital certificates. In my opinion, biometrics should only use functions that can be read or measured when the person is alive.
  •  
    Biometrics is great for a multi factored authentication. It is a very expensive approach to authenticating as well. I doubt there will be a market for it until the price for implementation drops drastically. I would not use it as a stand alone authentication approach.
Jessica Riedel

How to run your own NSA spy program - 2 views

  •  
    With everything going on in the news about this I found this to be a humorous approach to the whole thing. This article basically describes the NSA program on a fundamental level and how an everyday Joe (if they had enough data storage that is) could create their own spy program using these tactics.
  •  
    A spy kit to go. Virtually everything you need to set up shop to gather information and spy on something ( corporate or private). All the hacking tools are nearly " off the shelf" and are most likely used for spying. Great post and article.
  •  
    This article gave me a headache thinking about all the data collection. I am not surprised by this at all Google and Facebook are the biggest privacy violators out there. At what point do people drop off the grid to hide from this potential? The reality is that most people have no idea that this potential is out there except for the ones that want to exploit it.
Amy Harding

Down the Security Rabbithole - 0 views

  •  
    If you like podcasts this is interesting - helping to understand that security does not really exist and instead we are just managing risk.
Amy Harding

How fraudulent blackhat SEO monetizers apply Quality Assurance (QA) to their DIY doorwa... - 0 views

  •  
    Scary when the criminals are fighting each other....
Vickye F

Insider Threat Security Reference Architecture - 1 views

  •  
    Framework for Insider threats
Trevor Pyle

Local police grapple with abilities to respond to cybercrimes and cyberthreats - 2 views

  •  
    Article from the Washington Post about law enforcement's struggle to respond to "smaller" cybercrimes.
Amy Harding

UMUC Achiever Spring 2013 - 2 views

  •  
    This magazine published by UMUC is all about Cybersecurity. Thought you might enjoy reading it.
Kerry Tam

DHS seeks student hackers - 0 views

  •  
    Here's an interesting article from DHS. They're seeking high school students and college students.
Robert Scire

Anonymous hackers bring down North Korean websites for a second time - Yahoo! News - 0 views

  •  
    Thought this was interesting - especially with all the current events involving North Korea.
Brandon Kennedy

Anonymous vs. WBC - 0 views

  •  
    In relation to this week's Anonymous reading. WBC says they are going to protest the Boston victims.
« First ‹ Previous 41 - 60 Next › Last »
Showing 20 items per page