Skip to main content

Home/ Groups/ CSIA 459
Jennifer Otto

Emerging Technology in Evaluation of Nanomedicine - Molecular Pharmaceutics (ACS Public... - 0 views

  •  
    Article on emerging technology
Cheryl Hoffman

Search Engine Optimization (SEO) Poisoning - 1 views

  •  
    SEO Poisoning manipulates search engine results to make sites that are malicious in nature place higher in the results list. According to the article in 2011 40% of all cyberattacks resulted from SEO poisoning.
  •  
    I know that when I'm doing a Google or Bing search, I am looking for a specific item or topic and sometimes don't even think about reviewing the link that I'm clicking on. The high amount of malware that is in search engines is scary. The pointers that were in the article were very true and very easy for the every day user to do when they are doing a search. And anyone that does not have an anti-virus or anti-malware on their system is just asking for their system to be attacked.
  •  
    I use AVG security on my laptop and it uses an add-on called link scanner. When I search, the results are rated as safe or not, with a check mark or an "X" accordingly. So you immediately know which sites to avoid. It's worth trying since this could essentially save you the time and headache of undoing malware or spyware you might contract otherwise. It's a nice "peace of mind" tool.
Percy Kendrick

What will IT be like in 50 years? - 0 views

  •  
    This video gives an example of technologies of the future and a different way to pose questions for how technology can improve daily life but also where technology can take us.
  • ...1 more comment...
  •  
    I really like the way they talked about complete integration in the video, as that definitely seems to be the direction that everything is going. Forget about dedicated devices, everything from your couch to your car, to your refrigerator will have intense computing power, and will be able to communicate with you and everything else around you to better your life. The only downfall I see of this is it seems like people would forget how to not use technology, and would be completely helpless if it was lost.
  •  
    Complete integration is really important. It is a focus of many technological advancements. This is due to the fact that people want technology that makes life as whole easier not just individual tasks. I am eager to see what technologies the future will actually hold!
  •  
    Interesting assessments by the individuals in that provided video Percy. I personally keyed into the statement that technology will operate in a more conversational (social) manner that's similar to how humans interact. The further technological-based assessments are interesting especially with regard to gene mapping and what diseases somebody may face within their lifetime.
GHISLAIN NCHOTU

Gizmo's Freeware | Find the best freeware fast - 0 views

  •  
    The best freeware independently reviewed and rated by the web's most popular freeware review site
Joseph Deleon

Exploring Bring Your Own Device In the Public Sector - 0 views

  •  
    Great article that covers the basics of BYOD and the issues this concept introduces.
Bob Lloyd

Facebook's Graph Search available to all in U.S. - CNN.com - 0 views

  •  
    Description of Facebook's graph search and the privacy concerns around it.
Lee Bry

SANS Newsbites - 2 views

shared by Lee Bry on 09 Jul 13 - No Cached
  •  
    A site that you can subscribe to bi-weekly updates to computer security as a way to keep current on potential emerging threats.
  •  
    This is a great site with a simple archive system. I read the article on the 80% increase for android malware in China. The Android platform is a security nightmare. Everyday it seems like a new exploit is exposed and it takes months for a update.
Marilyn Morgan

Naked Security - 2 views

  •  
    Naked Security - Computer security news, opinion, advice and research.
  •  
    This site has great daily news on a variety of security topics from malware to privacy. I like the blog post styled interface that this site incorporates. This sets it apart from standard news feed sites.
  •  
    Thank you for the link. This is a good source or quick news bites.
Marilyn Morgan

Dark Reading | Security | Protect The Business - Enable Access - 1 views

shared by Marilyn Morgan on 09 Jul 13 - Cached
  •  
    Dark Reading is a comprehensive source of news, commentary and analysis on cybersecurity, designed for use by IT security professionals.
Percy Kendrick

US-CERT | United States Computer Emergency Readiness Team - 3 views

  •  
    US-CERT's mission is to improve the nation's cybersecurity posture, coordinate cyber information sharing, and proactively manage cyber risks to the nation.
  •  
    The "Alerts And Tips" page of this site provides excellent up to date alerts. (http://www.us-cert.gov/ncas). Subheadings include: Current Activity, Alerts, Bulletins, and Tips. The Bulletins page provides weekly vulnerability summaries. It's worth a look for anyone who hasn't seen this already.
Percy Kendrick

Free IT Community, Help Desk, and Network Monitoring - Spiceworks - 2 views

  •  
    Do your job, talk-shop with IT pros and vendors...and get the scoop on everything from products and services to zombies and bacon (yup, seriously). All in one place. All for free! Download Free App Join Free Community Tech vendor? We can help you too! Learn how "
cpanagopulos

Threat Level - Privacy, Crime and Security Online | Wired.com - 0 views

  •  
    News oriented site that covers breaking news on Privacy, Crime and Security Online.
cpanagopulos

IT Security Threats | Symantec - 0 views

  •  
    Excellent emerging threat resource using graphical charts displaying daily security threats, including malware, security risks, vulnerabilities, and spam.
Marie Arrington

UW Experimental Computer Engineering Lab - Securing Emerging Technologies - 0 views

  •  
    Unexpected security risks can arise with new, emerging computer technologies. We seek to stay one step ahead of the "bad guys" and identify, measure, and learn from their risks before actual threats manifest. We co-led the first experimental study of the computer security properties of wireless implantable medical devices.
Alexandr Yezersky

[1304.5672] Fit and Vulnerable: Attacks and Defenses for a Health Monitoring Device - 0 views

  •  
    Abstract: The fusion of social networks and wearable sensors is becoming increasingly popular, with systems like Fitbit automating the process of reporting and sharing user fitness data. In this paper we show that while compelling, the integration of health data into social networks is fraught with privacy and security vulnerabilities.
Christopher Salinas

DNA goes digital - 2 views

  •  
    This makes complete sense to me but seems like something in a science fiction book. The ability to put mankind's years worth of data on a few grams of DNA seems far reaching to me but interesting all the same.
Joseph Deleon

Cisco Secure BYOD Solution - 0 views

  •  
    Vendor specific solution to BYOD, Cisco systems.
Joseph Deleon

THE NUTS AND BOLTS OF MAKING BYOD WORK - 0 views

  •  
    Kind of long, but good article that covers BYOD from devices to information management.
Joseph Frank

Step Into the Virtual Zone - 0 views

  •  
    Easy to setup
« First ‹ Previous 81 - 100 Next › Last »
Showing 20 items per page