Monday, June 27, 2016
Posted by manager
Reader's rate:
0
Contributed by William Jason Haddock The author explains geo-fencing and how it works and its applications in the real world, including how they pertain to information security and also elaborates the strengths, weaknesses, opportunities, and threats associated. The author includes more... + continue reading
Monday, June 27, 2016
Posted by manager
Reader's rate:
0
Contributed by Demonte Harris Security, a key aspect of assuring that important things are kept safe, is evolving daily. According to the National Information Systems Security Glossary, information security is defined as “the protection of information systems against unauthorized access to or... + continue reading
Friday, June 17, 2016
Posted by manager
Reader's rate:
0
Contributed by Carl Brackett As technology advances, so do the security risks involved. In the last couple of years, a new term has been introduced to society called “Internet of Things”. This term can be used for any type of device that now connects to the Internet (Sasso, 2015). The question... + continue reading
Friday, June 10, 2016
Posted by manager
Reader's rate:
5
Contributed by Taylor Broach Auto markets today are flooded with new cars equipped with features harnessing cutting edge technology. Tesla Motors leads this wave of technologically advanced cars; however, their cars not only boast the best features but they offer security in their products like... + continue reading
Thursday, June 9, 2016
Posted by manager
Reader's rate:
0
Contributed by Matthew Cantu This paper explains the effects hacking has on the video game industry. The paper also goes into great detail about why these hackers have become so apparent the last decade as games have become more sophisticated. The video game industry is taking a major hit each... + continue reading

Home Page

Featured Articles

Wednesday, 01/06/16 - 0 comment(s)
Contributed by Robert Underwood Data held hostage has become a recent technology trend with computers and with these types of attacks in which crooks take a victim’s data and hold it for ransom demanding money to release our data back to us, which seems to be clearly a violation in law but how do we prosecute these criminals and what can we do... + continue reading
Tuesday, 31/05/16 - 0 comment(s)
Contributed by Riya Shah and Manisha Valera The amount of digital data generated is growing by the day and so is the need to protect sensitive content from being published on the Internet. This paper talks about studies in the field of content-based detection of both personal sensitive information like name, birth date, medical records and... + continue reading

Red Tape

843
reads
3 today
Wednesday, 01/06/16 - 0 comment(s)
Contributed by Robert Underwood Data held hostage has become a recent technology trend with computers and with these types of attacks in which crooks take a victim’s data and hold it for ransom... + continue reading

Cryptography

2.648
reads
4 today
Monday, 11/01/16 - 0 comment(s)
Contributed by M. Orumiehchi Fastflex is a fast and flexible stream cipher that is designed for hardware and software environments. In this article, we point out that the keystream generated from... + continue reading

Exploitation

1.732
reads
6 today
Monday, 11/04/16 - 0 comment(s)
Contributed by Mazin Ahmed In this post, I will be talking about an interesting bug that affects Google Blogger. This security bug has been left undiscovered since almost 2007. The bug allows an... + continue reading

Sistema

1.267
reads
4 today
Wednesday, 04/05/16 - 0 comment(s)
Contributed by Leonard M. Pickering Android is a mobile Operating System (OS) developed by Google based on the Linux kernel. The OS was initially developed by Android, Inc. with the backing of... + continue reading

Et Cetera

67
reads
67 today
Monday, 27/06/16 - 0 comment(s)
Contributed by William Jason Haddock The author explains geo-fencing and how it works and its applications in the real world, including how they pertain to information security and also elaborates... + continue reading

Recommended Reading

3.565
reads
8 today
Wednesday, 21/10/15 - 0 comment(s)
Contributed by Tarek "...With every technology there are unintended consequences. And in the case of computer technology, the unintended consequence was that inherently bad people could use the... + continue reading