Skip to main content

Home/ Groups/ CSIA 459
Seth Molin

Why Telemedicine Is Finally Ready to Take Off - 1 views

  •  
    This is an interesting article regarding my emerging technology topic Telemedicine. With the constant concern of the cost of healthcare telemedicine represents a possible solution to mitigate these costs. It seems that law makers would be increasingly interested in the topic to curb the ever expanding costs of Medicare
Trevor Pyle

Logic Bomb Set Off South Korea Cyberattack - 1 views

  •  
    The recent cyberattack against South Korean media organizations and financial institutions was initiated by a logic bomb.
samuelrios

HowStuffWorks "How the Predator UAV Works" - 0 views

  •  
    Military commanders use tactics and strategy in combat to inflict as much damage on the enemy while trying to risk as few personnel and resources as possible. This principle was at the heart of the development of the RQ-1 and MQ-1 Predator Unmanned Aerial Vehicle.
  •  
    This was a really cool read, before I read your article I did not even know what the predator UAV was. Thanks for this great information.
  •  
    I always use HowStuffWorks if I read an article about a new technology and don't understand how it works. UAVs is an area where most people don't understand how it works. Nice article.
alan savage

Apple suspends password resets after critical account-hijack bug is found (Updated) - 0 views

  •  
    Update: Apple restored the password resets on Friday night. Apple suspended the password-reset functionality for its iCloud and iTunes services following a published report that hackers could exploit it to hijack other people's accounts. The password reset page stopped loading a few hours after The Verge reported there was an online tutorial that provided detailed instructions for taking unauthorized control of Apple accounts.
Jeremy Croghan

Mandiant - 0 views

  •  
    Independent security company Mandiant releases a report on one of China's cyber espionage units. The report is a little over 70 pages and describes, in detail, the five W's on an active persistent threat. The appendix also shows the tools available from the Mandiant to conduct the same type of "research". In all it is a great read.
James Thomas

Global Agenda Council on Emerging Technologies 2012 - 1 views

  •  
    The World Economic Forum (WEF) is a Geneva-based non-profit organization best known for its Annual Meeting in Davos, Switzerland, the Annual Meeting of New Champions in China (Summer Davos) and the Summit on the Global Agenda in Dubai. It also releases research reports such as the Competitiveness Reports and Risk Reports and engages with its members in sector-specific initiatives.
Michael Austin

Comprehensive Experimental Analyses of Automotive Attack Surfaces - 0 views

  •  
    An interesting review of the different attack vectors threatening tomorrow's automobiles.
Ken Ripley

Popular Science | New Technology, Science News, The Future Now - 0 views

shared by Ken Ripley on 24 Mar 13 - Cached
  •  
    Popular Science has always been a resource I depend upon to see whats on the horizon in the technology field.  
Trevor Pyle

Apple's Password-Reset Security Breach - 1 views

  •  
    Apple has fully implemented multifactor authentication, but not without some security issues for their users. Since Apple has fixed the flaws, the article covers the steps in the vulnerability.
Ken Ripley

ARE THE ELECTROMAGNETIC FIELDS A DANGER TO THE PUBLIC HEALTH? - 0 views

  •  
    Accessed at the UMUC Library, so enter your last name and barcode/EMPLID.
Ken Ripley

Danger, Will Robinson, danger!! - 1 views

  •  
    Accessed at the UMUC Library, so enter your last name and barcode/EMPLID.
Michael Austin

Massive cyberattack hits Internet users - CNN.com - 0 views

  •  
    A (very) recent example of a DDoS attack.
Kerry Tam

How to mitigate smarthphone threats to your corporate network - 0 views

  •  
    As more and more people have smartphone, it can have the potential risk to an organizations security. This article has a few tips to reduce the threats.
Kerry Tam

Symbian 'vulnerability' and mobile threats - 0 views

  •  
    A study I found at UMUC's library how mobile OS are attacked by hackers and what methods they use to access OS
Kerry Tam

Mobile Security: Finally a serious problem? - 1 views

  •  
    Article from UMUC's library on mobile security
James Thomas

Leveraging Mobile Context for Effective Collaboration and Task Management - 0 views

  •  
    Collaboration in a moment of crisis
« First ‹ Previous 181 - 200 Next › Last »
Showing 20 items per page