Friday, June 17, 2016
Posted by manager
Reader's rate:
0
Contributed by Carl Brackett As technology advances, so do the security risks involved. In the last couple of years, a new term has been introduced to society called “Internet of Things”. This term can be used for any type of device that now connects to the Internet (Sasso, 2015). The question... + continue reading
Friday, June 10, 2016
Posted by manager
Reader's rate:
5
Contributed by Taylor Broach Auto markets today are flooded with new cars equipped with features harnessing cutting edge technology. Tesla Motors leads this wave of technologically advanced cars; however, their cars not only boast the best features but they offer security in their products like... + continue reading
Thursday, June 9, 2016
Posted by manager
Reader's rate:
0
Contributed by Matthew Cantu This paper explains the effects hacking has on the video game industry. The paper also goes into great detail about why these hackers have become so apparent the last decade as games have become more sophisticated. The video game industry is taking a major hit each... + continue reading
Thursday, June 2, 2016
Posted by manager
Reader's rate:
0
Contributed by LoyCurtis Smith Multiprotocol Label Switching (MPLS) is a revolutionary packet forwarding WAN technology that operates between Layer 2 and Layer 3 of the OSI model, which has been classified as Layer 2.5. It is placed between the two layers because it integrates the fast paced... + continue reading
Wednesday, June 1, 2016
Posted by manager
Reader's rate:
0
Contributed by Robert Underwood Data held hostage has become a recent technology trend with computers and with these types of attacks in which crooks take a victim’s data and hold it for ransom demanding money to release our data back to us, which seems to be clearly a violation in law but how... + continue reading

Home Page

Featured Articles

Wednesday, 01/06/16 - 0 comment(s)
Contributed by Robert Underwood Data held hostage has become a recent technology trend with computers and with these types of attacks in which crooks take a victim’s data and hold it for ransom demanding money to release our data back to us, which seems to be clearly a violation in law but how do we prosecute these criminals and what can we do... + continue reading
Tuesday, 31/05/16 - 0 comment(s)
Contributed by Riya Shah and Manisha Valera The amount of digital data generated is growing by the day and so is the need to protect sensitive content from being published on the Internet. This paper talks about studies in the field of content-based detection of both personal sensitive information like name, birth date, medical records and... + continue reading

Red Tape

835
reads
2 today
Wednesday, 01/06/16 - 0 comment(s)
Contributed by Robert Underwood Data held hostage has become a recent technology trend with computers and with these types of attacks in which crooks take a victim’s data and hold it for ransom... + continue reading

Cryptography

2.631
reads
6 today
Monday, 11/01/16 - 0 comment(s)
Contributed by M. Orumiehchi Fastflex is a fast and flexible stream cipher that is designed for hardware and software environments. In this article, we point out that the keystream generated from... + continue reading

Exploitation

1.705
reads
4 today
Monday, 11/04/16 - 0 comment(s)
Contributed by Mazin Ahmed In this post, I will be talking about an interesting bug that affects Google Blogger. This security bug has been left undiscovered since almost 2007. The bug allows an... + continue reading

Sistema

1.255
reads
4 today
Wednesday, 04/05/16 - 0 comment(s)
Contributed by Leonard M. Pickering Android is a mobile Operating System (OS) developed by Google based on the Linux kernel. The OS was initially developed by Android, Inc. with the backing of... + continue reading

Et Cetera

591
reads
12 today
Friday, 17/06/16 - 0 comment(s)
Contributed by Carl Brackett As technology advances, so do the security risks involved. In the last couple of years, a new term has been introduced to society called “Internet of Things”. This... + continue reading

Recommended Reading

3.534
reads
3 today
Wednesday, 21/10/15 - 0 comment(s)
Contributed by Tarek "...With every technology there are unintended consequences. And in the case of computer technology, the unintended consequence was that inherently bad people could use the... + continue reading