Thursday, July 21, 2016
Posted by manager
Reader's rate:
5
Contributed by Michael Mozingo Automated Teller Machines (ATM) are used by millions of individuals every day and play an important factor in the banking footprint. Don Wetzel came up with the idea of the ATM and created the first one with the help of Tom Barnes and George Chastain. (AUTOMATED... + continue reading
Thursday, July 21, 2016
Posted by manager
Reader's rate:
0
Contributed by David Patten Everyday press releases cover information security breaches from many top companies. Often these breaches include releasing the passwords that were stolen. Sadly, these passwords are usually trivial to crack which leads to further exploitation. Simple passwords are a... + continue reading
Wednesday, July 20, 2016
Posted by manager
Reader's rate:
0
Contributed by Jeff Dixon Information Security is akin to a never ending cat and mouse game, it’s rapid pace makes it one of the fastest evolving areas in technology. Every day, new vulnerabilities and new solutions are created. This paper will discuss Cisco’s Next Generation Firewall technology... + continue reading
Wednesday, July 20, 2016
Posted by manager
Reader's rate:
0
Contributed by David W. Mitchell Federal government’s broad powers to act for public safety and national security are limited by the First Amendment and Fourth Amendment. The 9/11 attack have open the doors on warrantless surveillance programs. The mass collection of sensitive information has... + continue reading
Thursday, July 14, 2016
Posted by manager
Reader's rate:
0
Contributed by Albert Dominguez V One of the hottest topics in the field of information technology and information security is the Cloud. The term is almost inescapable and many companies are in the business of ensuring that this term is well known and massively used. Yet in many ways there are... + continue reading

Home Page

Featured Articles

Wednesday, 20/07/16 - 0 comment(s)
Contributed by David W. Mitchell Federal government’s broad powers to act for public safety and national security are limited by the First Amendment and Fourth Amendment. The 9/11 attack have open the doors on warrantless surveillance programs. The mass collection of sensitive information has been challenged by many as an invasion of privacy.... + continue reading
Wednesday, 01/06/16 - 0 comment(s)
Contributed by Robert Underwood Data held hostage has become a recent technology trend with computers and with these types of attacks in which crooks take a victim’s data and hold it for ransom demanding money to release our data back to us, which seems to be clearly a violation in law but how do we prosecute these criminals and what can we do... + continue reading

Red Tape

Thursday, 21/07/16 - 0 comment(s)
Contributed by David Patten Everyday press releases cover information security breaches from many top companies. Often these breaches include releasing the passwords that were stolen. Sadly,... + continue reading

Cryptography

Monday, 11/01/16 - 0 comment(s)
Contributed by M. Orumiehchi Fastflex is a fast and flexible stream cipher that is designed for hardware and software environments. In this article, we point out that the keystream generated from... + continue reading

Exploitation

Monday, 11/04/16 - 0 comment(s)
Contributed by Mazin Ahmed In this post, I will be talking about an interesting bug that affects Google Blogger. This security bug has been left undiscovered since almost 2007. The bug allows an... + continue reading

Sistema

Thursday, 21/07/16 - 0 comment(s)
Contributed by Michael Mozingo Automated Teller Machines (ATM) are used by millions of individuals every day and play an important factor in the banking footprint. Don Wetzel came up with the idea... + continue reading

Et Cetera

Wednesday, 20/07/16 - 0 comment(s)
Contributed by Jeff Dixon Information Security is akin to a never ending cat and mouse game, it’s rapid pace makes it one of the fastest evolving areas in technology. Every day, new... + continue reading

Recommended Reading

Wednesday, 21/10/15 - 0 comment(s)
Contributed by Tarek "...With every technology there are unintended consequences. And in the case of computer technology, the unintended consequence was that inherently bad people could use the... + continue reading