Skip to main content

Home/ Groups/ CSIA 459
Jennifer Otto

Emerging Technology in Evaluation of Nanomedicine - Molecular Pharmaceutics (ACS Public... - 0 views

  •  
    Article on emerging technology
Cheryl Hoffman

Search Engine Optimization (SEO) Poisoning - 1 views

  •  
    SEO Poisoning manipulates search engine results to make sites that are malicious in nature place higher in the results list. According to the article in 2011 40% of all cyberattacks resulted from SEO poisoning.
  •  
    I know that when I'm doing a Google or Bing search, I am looking for a specific item or topic and sometimes don't even think about reviewing the link that I'm clicking on. The high amount of malware that is in search engines is scary. The pointers that were in the article were very true and very easy for the every day user to do when they are doing a search. And anyone that does not have an anti-virus or anti-malware on their system is just asking for their system to be attacked.
  •  
    I use AVG security on my laptop and it uses an add-on called link scanner. When I search, the results are rated as safe or not, with a check mark or an "X" accordingly. So you immediately know which sites to avoid. It's worth trying since this could essentially save you the time and headache of undoing malware or spyware you might contract otherwise. It's a nice "peace of mind" tool.
Percy Kendrick

What will IT be like in 50 years? - 0 views

  •  
    This video gives an example of technologies of the future and a different way to pose questions for how technology can improve daily life but also where technology can take us.
  • ...1 more comment...
  •  
    I really like the way they talked about complete integration in the video, as that definitely seems to be the direction that everything is going. Forget about dedicated devices, everything from your couch to your car, to your refrigerator will have intense computing power, and will be able to communicate with you and everything else around you to better your life. The only downfall I see of this is it seems like people would forget how to not use technology, and would be completely helpless if it was lost.
  •  
    Complete integration is really important. It is a focus of many technological advancements. This is due to the fact that people want technology that makes life as whole easier not just individual tasks. I am eager to see what technologies the future will actually hold!
  •  
    Interesting assessments by the individuals in that provided video Percy. I personally keyed into the statement that technology will operate in a more conversational (social) manner that's similar to how humans interact. The further technological-based assessments are interesting especially with regard to gene mapping and what diseases somebody may face within their lifetime.
Funsho Aiyedogbon

5 Emerging Technologies Every Office Will Have In 2020 - 1 views

  •  
    This article explores five emerging technologies that will be commonly used in business offices in the next seven years.
  • ...1 more comment...
  •  
    Now this is scary and yet so amazing. The fact that they are already predicting that typing a password into a device is something that is going to be in the past, is unreal. A device is going to recognize your face and allow you to have access to it. The scary part is the phone aspect in how the devices will pick up your phone conversation and automatically send a calendar invite to your device. New technologies are definitely amazing but still, there is little to no talk on how they are going to secure the environments that they are creating.
  •  
    Very interesting article. Basically, all human existence will be completely gone by 2020. I can't believe these technologies even exist and are currently in the prototype stage. You never know, this technology can take over sooner that what this article expect. The most interesting technology to me the use of sensors. If things come out to be in full effect, with the use of these sensors can provide very accurate data and help avoid the use of any fraudulent it identity threats. Thanks!
  •  
    I read this article and loved it. After reading it a while back I became very interested in Gesture Control. This is the emerging technology that I chose for this class. I know that this article talks about the use of this technology in the office but we have already seen it in Smartphones (the new Galaxy) who knows where it will pop up next!
Joseph Deleon

Cisco Secure BYOD Solution - 0 views

  •  
    Vendor specific solution to BYOD, Cisco systems.
Lee Bry

SANS Newsbites - 2 views

shared by Lee Bry on 09 Jul 13 - No Cached
  •  
    A site that you can subscribe to bi-weekly updates to computer security as a way to keep current on potential emerging threats.
  •  
    This is a great site with a simple archive system. I read the article on the 80% increase for android malware in China. The Android platform is a security nightmare. Everyday it seems like a new exploit is exposed and it takes months for a update.
Marilyn Morgan

Naked Security - 2 views

  •  
    Naked Security - Computer security news, opinion, advice and research.
  •  
    This site has great daily news on a variety of security topics from malware to privacy. I like the blog post styled interface that this site incorporates. This sets it apart from standard news feed sites.
  •  
    Thank you for the link. This is a good source or quick news bites.
Marilyn Morgan

Dark Reading | Security | Protect The Business - Enable Access - 1 views

shared by Marilyn Morgan on 09 Jul 13 - Cached
  •  
    Dark Reading is a comprehensive source of news, commentary and analysis on cybersecurity, designed for use by IT security professionals.
Percy Kendrick

US-CERT | United States Computer Emergency Readiness Team - 3 views

  •  
    US-CERT's mission is to improve the nation's cybersecurity posture, coordinate cyber information sharing, and proactively manage cyber risks to the nation.
  •  
    The "Alerts And Tips" page of this site provides excellent up to date alerts. (http://www.us-cert.gov/ncas). Subheadings include: Current Activity, Alerts, Bulletins, and Tips. The Bulletins page provides weekly vulnerability summaries. It's worth a look for anyone who hasn't seen this already.
Percy Kendrick

Free IT Community, Help Desk, and Network Monitoring - Spiceworks - 2 views

  •  
    Do your job, talk-shop with IT pros and vendors...and get the scoop on everything from products and services to zombies and bacon (yup, seriously). All in one place. All for free! Download Free App Join Free Community Tech vendor? We can help you too! Learn how "
cpanagopulos

Threat Level - Privacy, Crime and Security Online | Wired.com - 0 views

  •  
    News oriented site that covers breaking news on Privacy, Crime and Security Online.
cpanagopulos

IT Security Threats | Symantec - 0 views

  •  
    Excellent emerging threat resource using graphical charts displaying daily security threats, including malware, security risks, vulnerabilities, and spam.
cpanagopulos

Agency Spends Millions Purging Fake Cyber Threat - 3 views

  •  
    Call it the cyber-attack that never happened. A false alarm that sent the Economic Development Agency scrambling. When the dust settled, the EDA had spent half of its information technology budget - or nearly $3 million - destroying hundreds of thousands of dollars worth of perfectly functioning computer equipment. Talk about using up your resources...literally.
  • ...1 more comment...
  •  
    Great artical. There must have been enough positive indicators for the EDA to take action. In a case like this it's better to be safe than sorry, but that doesn't make it easier to explain to tax payers!
  •  
    What stood out to me was that they did not follow the incident handling procedure. Those documents are put together for a reason. I also question why there was not a manager to oversee the incident response for something of this size. I blame management for this one.
  •  
    I agree with a better safe than sorry approach most of the time, but I have to agree with Bob that procedures weren't followed and equipment was unnecessarily destroyed.
Bob Lloyd

Facebook's Graph Search available to all in U.S. - CNN.com - 0 views

  •  
    Description of Facebook's graph search and the privacy concerns around it.
Marie Arrington

UW Experimental Computer Engineering Lab - Securing Emerging Technologies - 0 views

  •  
    Unexpected security risks can arise with new, emerging computer technologies. We seek to stay one step ahead of the "bad guys" and identify, measure, and learn from their risks before actual threats manifest. We co-led the first experimental study of the computer security properties of wireless implantable medical devices.
Alexandr Yezersky

[1304.5672] Fit and Vulnerable: Attacks and Defenses for a Health Monitoring Device - 0 views

  •  
    Abstract: The fusion of social networks and wearable sensors is becoming increasingly popular, with systems like Fitbit automating the process of reporting and sharing user fitness data. In this paper we show that while compelling, the integration of health data into social networks is fraught with privacy and security vulnerabilities.
Joseph Deleon

THE NUTS AND BOLTS OF MAKING BYOD WORK - 0 views

  •  
    Kind of long, but good article that covers BYOD from devices to information management.
Joseph Frank

Step Into the Virtual Zone - 0 views

  •  
    Easy to setup
« First ‹ Previous 81 - 100 Next › Last »
Showing 20 items per page