Tuesday, June 28, 2016
Posted by manager
Reader's rate:
0
Contributed by Samuel Sanchez Lately, in the past few years there has been a popular belief that the Mac OS X and the mobile IPhone are immune to viruses, worms, Trojans, etc. Apple, Inc. has repeatedly made advertisements stating that their devices are virus free and that anyone using a device... + continue reading
Monday, June 27, 2016
Posted by manager
Reader's rate:
0
Contributed by William Jason Haddock The author explains geo-fencing and how it works and its applications in the real world, including how they pertain to information security and also elaborates the strengths, weaknesses, opportunities, and threats associated. The author includes more... + continue reading
Monday, June 27, 2016
Posted by manager
Reader's rate:
0
Contributed by Demonte Harris Security, a key aspect of assuring that important things are kept safe, is evolving daily. According to the National Information Systems Security Glossary, information security is defined as “the protection of information systems against unauthorized access to or... + continue reading
Friday, June 17, 2016
Posted by manager
Reader's rate:
0
Contributed by Carl Brackett As technology advances, so do the security risks involved. In the last couple of years, a new term has been introduced to society called “Internet of Things”. This term can be used for any type of device that now connects to the Internet (Sasso, 2015). The question... + continue reading
Friday, June 10, 2016
Posted by manager
Reader's rate:
5
Contributed by Taylor Broach Auto markets today are flooded with new cars equipped with features harnessing cutting edge technology. Tesla Motors leads this wave of technologically advanced cars; however, their cars not only boast the best features but they offer security in their products like... + continue reading

Home Page

Featured Articles

Wednesday, 01/06/16 - 0 comment(s)
Contributed by Robert Underwood Data held hostage has become a recent technology trend with computers and with these types of attacks in which crooks take a victim’s data and hold it for ransom demanding money to release our data back to us, which seems to be clearly a violation in law but how do we prosecute these criminals and what can we do... + continue reading
Tuesday, 31/05/16 - 0 comment(s)
Contributed by Riya Shah and Manisha Valera The amount of digital data generated is growing by the day and so is the need to protect sensitive content from being published on the Internet. This paper talks about studies in the field of content-based detection of both personal sensitive information like name, birth date, medical records and... + continue reading

Red Tape

866
reads
13 today
Wednesday, 01/06/16 - 0 comment(s)
Contributed by Robert Underwood Data held hostage has become a recent technology trend with computers and with these types of attacks in which crooks take a victim’s data and hold it for ransom... + continue reading

Cryptography

2.663
reads
4 today
Monday, 11/01/16 - 0 comment(s)
Contributed by M. Orumiehchi Fastflex is a fast and flexible stream cipher that is designed for hardware and software environments. In this article, we point out that the keystream generated from... + continue reading

Exploitation

1.754
reads
5 today
Monday, 11/04/16 - 0 comment(s)
Contributed by Mazin Ahmed In this post, I will be talking about an interesting bug that affects Google Blogger. This security bug has been left undiscovered since almost 2007. The bug allows an... + continue reading

Sistema

120
reads
120 today
Tuesday, 28/06/16 - 0 comment(s)
Contributed by Samuel Sanchez Lately, in the past few years there has been a popular belief that the Mac OS X and the mobile IPhone are immune to viruses, worms, Trojans, etc. Apple, Inc. has... + continue reading

Et Cetera

260
reads
16 today
Monday, 27/06/16 - 0 comment(s)
Contributed by William Jason Haddock The author explains geo-fencing and how it works and its applications in the real world, including how they pertain to information security and also elaborates... + continue reading

Recommended Reading

3.602
reads
23 today
Wednesday, 21/10/15 - 0 comment(s)
Contributed by Tarek "...With every technology there are unintended consequences. And in the case of computer technology, the unintended consequence was that inherently bad people could use the... + continue reading