Friday, April 22, 2016
Posted by manager
Reader's rate:
0
Contributed by Robert Underwood Managing cyber security vulnerabilities in a large network is a big challenge where the implementation of cyber security techniques can create network slowdowns that negatively impact customers and the delivery of service. The challenge of managing cyber security... + continue reading
Thursday, April 21, 2016
Posted by manager
Reader's rate:
5
Contributed by Justice E. Thurman Biometric technology has become the newest thing to implement in mobile devices, office building and is even being used to keep track of employees start and end time for work through a finger print clock out system. Biometric has come a long way since its first... + continue reading
Wednesday, April 20, 2016
Posted by manager
Reader's rate:
5
Contributed by Jeanna Long Those of us in the Information Technology (IT) field all know what ransomware is. It is a type of malicious software that blocks access to a computer or computer system and demands payment, “ransom”, to have access to the computer system again. Over the years,... + continue reading
Monday, April 18, 2016
Posted by manager
Reader's rate:
0
Contributed by Larry Lee Jackson Jr. This paper seeks to review current trends associated with securing an enterprise network and demonstrate an effective plan for doing so. With the continued rapid increase of information technology and application usage in the business world comes the need for... + continue reading
Wednesday, April 13, 2016
Posted by manager
Reader's rate:
0
Contributed by Jeremiah Everett This paper will discuss security for the Android OS and Apple's iOS. So for a little background we will look at when Android and iOS were first released. Android was released to the public on the HTC Dream in October of 2008, and Apple’s iOS came out in March of... + continue reading

Home Page

Featured Articles

Monday, 11/04/16 - 0 comment(s)
Contributed by Mazin Ahmed In this post, I will be talking about an interesting bug that affects Google Blogger. This security bug has been left undiscovered since almost 2007. The bug allows an attacker to trick the victim into revealing his email address using UI-Redressing techniques. This document is in PDF format. To view it click here. + continue reading
Friday, 08/04/16 - 0 comment(s)
Contributed by Mazin Ahmed NoScript Security Suite is a powerful security add-on for Firefox, Seamonkey and other Mozilla-based browsers. Its main task is to block Javascript, Flash, Java, as well as many other plugins from executing untrusted code on the user’s browser through blocking it and only allowing certain trusted whitelisted sites... + continue reading

Red Tape

806
reads
12 today
Monday, 11/04/16 - 0 comment(s)
Contributed by David Mitchell Over the past years there have been targeted data breaches that affected many large corporation and even the federal government. Target store and Office of Personnel... + continue reading

Cryptography

1.931
reads
10 today
Monday, 11/01/16 - 0 comment(s)
Contributed by M. Orumiehchi Fastflex is a fast and flexible stream cipher that is designed for hardware and software environments. In this article, we point out that the keystream generated from... + continue reading

Exploitation

921
reads
13 today
Monday, 11/04/16 - 0 comment(s)
Contributed by Mazin Ahmed In this post, I will be talking about an interesting bug that affects Google Blogger. This security bug has been left undiscovered since almost 2007. The bug allows an... + continue reading

Sistema

829
reads
25 today
Wednesday, 13/04/16 - 0 comment(s)
Contributed by Jeremiah Everett This paper will discuss security for the Android OS and Apple's iOS. So for a little background we will look at when Android and iOS were first released. Android... + continue reading

Et Cetera

594
reads
18 today
Friday, 22/04/16 - 0 comment(s)
Contributed by Robert Underwood Managing cyber security vulnerabilities in a large network is a big challenge where the implementation of cyber security techniques can create network slowdowns... + continue reading

Recommended Reading

2.511
reads
13 today
Wednesday, 21/10/15 - 0 comment(s)
Contributed by Tarek "...With every technology there are unintended consequences. And in the case of computer technology, the unintended consequence was that inherently bad people could use the... + continue reading