Wednesday, July 29, 2015
Posted by manager
Reader's rate:
0
Contributed by Stephen Allen This paper will present the current security strategies for securing mobile data at U.S. Universities. In today’s high tech world each worker has a mobile device that can also connect to the organization's WiFi and provide a possible breach. My paper will present... + continue reading
Tuesday, July 28, 2015
Posted by manager
Reader's rate:
0
Contributed by Robert Martin This paper focuses on avoiding Social Engineering attacks through Security Education Training and Awareness (SETA). Hackers continue to exploit the weakest asset in IT security, which is the human asset. This paper will outline four Social Engineering attacks that... + continue reading
Tuesday, July 28, 2015
Posted by manager
Reader's rate:
5
Contributed by A. Michele Parrish More and more homes are getting smart appliances. They have refrigerators, toilets, garage doors, thermostats and other appliances that are connected to the Internet and can be controlled from anywhere. The problem is can they also be controlled by anyone or... + continue reading
Monday, July 27, 2015
Posted by manager
Reader's rate:
4
Created by Cameron Meyer Mobile devices with networking capabilities are continuously increasing and users are utilizing these capabilities more. Just like traditional desktop and laptop computers, these mobile devices are vulnerable to attacks from hackers, viruses and other malware. As a... + continue reading
Monday, July 27, 2015
Posted by manager
Reader's rate:
0
Contributed by Larry Jackson Jr Because technology is becoming more and more integral to the education community every day, technology managers need to ensure they have well defined policies in place to assist in maintaining the technology that their users depend on. In this paper I will examine... + continue reading

Home Page

Featured Articles

Tuesday, 28/07/15 - 0 comment(s)
Contributed by A. Michele Parrish More and more homes are getting smart appliances. They have refrigerators, toilets, garage doors, thermostats and other appliances that are connected to the Internet and can be controlled from anywhere. The problem is can they also be controlled by anyone or just the homeowners? With the proliferation of smart... + continue reading
Wednesday, 22/07/15 - 0 comment(s)
Contributed by yours truly, Charles Hornat. Please be kind, I haven't written a white paper in years. Often times I am asked, what’s the best way to remove infections from a computer? How do I know if I am infected? Or other questions along this topic. This paper covers some things to consider, as well as areas to look at on your computer,... + continue reading

Red Tape

355
reads
14 today
Tuesday, 28/07/15 - 0 comment(s)
Contributed by Robert Martin This paper focuses on avoiding Social Engineering attacks through Security Education Training and Awareness (SETA). Hackers continue to exploit the weakest asset in IT... + continue reading

Cryptography

Cryptography
998
reads
6 today
Wednesday, 08/07/15 - 0 comment(s)
Contributed by Ashish Anand and restored from the old Infosecwriters archives. “If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the letter, that’s... + continue reading

Exploitation

261
reads
29 today
Wednesday, 29/07/15 - 0 comment(s)
Contributed by Librado Santibanez A confounding computer bug called “Heartbleed” is causing major security worries across the internet. Heartbleed affects many things, including web servers,... + continue reading

Sistema

181
reads
32 today
Wednesday, 29/07/15 - 0 comment(s)
Contributed by Hang Chau and restored from the old Infosecwriters archives. DoS/DDoS attacks are a virulent, relatively new type of Internet attacks, they have caused some biggest web sites on the... + continue reading

Et Cetera

404
reads
29 today
Tuesday, 28/07/15 - 0 comment(s)
Contributed by A. Michele Parrish More and more homes are getting smart appliances. They have refrigerators, toilets, garage doors, thermostats and other appliances that are connected to the... + continue reading

Recommended Reading

710
reads
17 today
Saturday, 18/07/15 - 0 comment(s)
This is an old challenge that were graced with being a host for. Ed Skoudis continues to do these yearly and you can find more here. http://www.counterhack.net/Counter_Hack/Challenges.html... + continue reading