Skip to main content

Home/ Groups/ CSIA 459
Justin Ohm

Cognitive biometrics: A very personal login - 2 views

  •  
    Retina and iris scans, fingerprint and palm logins rely on possession of unique anatomical characteristics that you cannot forget as you might a password. But, Kenneth Revett of the British University in Egypt, in El-Sherouk City, reviews the state of the art in an alternative approach to user authentication in the inaugural issue of the International Journal of Cognitive Biometrics.
  •  
    Very interesting article Justin. I like the idea of using biometrics as an authentication layer, vs. relying on a CA to issue digital certificates. In my opinion, biometrics should only use functions that can be read or measured when the person is alive.
  •  
    Biometrics is great for a multi factored authentication. It is a very expensive approach to authenticating as well. I doubt there will be a market for it until the price for implementation drops drastically. I would not use it as a stand alone authentication approach.
Bob Lloyd

Next-Generation Intrusion Prevention System (NGIPS) | Sourcefire - 2 views

  •  
    I came across Sourcefire when doing research for centralized management solutions. They have some very interesting products and seem to be on the forefront of the industry.
Amy Harding

http://resources.idgenterprise.com/original/AST-0084883_2013_Threat_Report.pdf - 1 views

  •  
    2013 Threat Report
Amy Harding

Video: Flame: Trying to Unravel the Mystery of Spying Malware | Watch PBS NewsHour Onli... - 4 views

  •  
    "Flame: Trying to Unravel the Mystery of Spying Malware"
  • ...1 more comment...
  •  
    Two things I found very interesting about Flame is the size of the malware as well as the ability to utilize Bluetooth to collect data. Considering Bluetooth usage has increased in some countries and is automatically turned on by default on cell phones, this could enable a lot of information to be collected.
  •  
    We will see more of this type of modification of Stuxnet and Flame. The bad thing about finding stuff like this, is others who could not have made malware as technically advanced as this, will be able to modify it much easier than if they would have had to design it from scratch.
  •  
    focused on the comment made by the analyst on the differentiation of cyber "war" vs. cyber "espionage" as it appears that Flame is more on cuber espionage since it is desgined to collect infor from specific targets.
Amy Harding

Down the Security Rabbithole - 0 views

  •  
    If you like podcasts this is interesting - helping to understand that security does not really exist and instead we are just managing risk.
Amy Harding

How fraudulent blackhat SEO monetizers apply Quality Assurance (QA) to their DIY doorwa... - 0 views

  •  
    Scary when the criminals are fighting each other....
Vickye F

Insider Threat Security Reference Architecture - 1 views

  •  
    Framework for Insider threats
Amy Harding

The 15 worst data security breaches of the 21st Century - CSO Online - Security and Risk - 9 views

  •  
    Interesting read, the Dept. of VA breach is a good reminder about physical security. It seems that quite often we focus so much on the technical that the fundamental is overlooked. It find it interesting that they have Stuxnet on this list. It is my understanding that Stuxnet was not really a data breach but more of a process breach.
Trevor Pyle

Big Data, Trying to Build Better Workers - 2 views

  •  
    Interesting article from the NY Times on how some companies are utilizing big data in the work environment.
James Thomas

Spy vs. Spy: Counter-intelligence methods - 0 views

  •  
    This was an interesting and informative paper about rootkit design and methodologies to help us better understand their capabilities, and it give ways in which one can spy on the attackers.
Robert Scire

'World's fastest' home internet service hits Japan with Sony's help, 2 Gbps down - 1 views

  •  
    Wanted to share even though it is off topic for this week. Definitely something that would be good to have over here in the States - especially at 51 dollars per month.
Brandon Kennedy

Anonymous vs. WBC - 0 views

  •  
    In relation to this week's Anonymous reading. WBC says they are going to protest the Boston victims.
Robert Scire

Anonymous hackers bring down North Korean websites for a second time - Yahoo! News - 0 views

  •  
    Thought this was interesting - especially with all the current events involving North Korea.
Kerry Tam

DHS seeks student hackers - 0 views

  •  
    Here's an interesting article from DHS. They're seeking high school students and college students.
Amy Harding

UMUC Achiever Spring 2013 - 2 views

  •  
    This magazine published by UMUC is all about Cybersecurity. Thought you might enjoy reading it.
Trevor Pyle

Local police grapple with abilities to respond to cybercrimes and cyberthreats - 2 views

  •  
    Article from the Washington Post about law enforcement's struggle to respond to "smaller" cybercrimes.
Phil Kemp

Hacker says phone app could hijack plane - 0 views

  •  
    Interesting article about an app that has been specifically designed to take control of an airplane.
Amy Harding

Stop Fake Antivirus - 2 views

  •  
    This paper provides insight into where fake antivirus comes from and how it is distributed, what happens when a system is infected with fake antivirus, and how to stop this persistent threat from infecting your network and your users.
Amy Harding

Ransomware: A growing Menance - 1 views

  •  
    This malware is highly profitable, with as many as 2.9 percent of compromised users paying out.
« First ‹ Previous 161 - 180 of 336 Next › Last »
Showing 20 items per page