|
|
|
Author: Donald Carroll
Company: Security University
Region: Reston, VA 20190
Website: www.securityuniversity.net
Memorable Quote 1: World Class How To Article Base
Memorable Quote 2: Security University - Computer Security Training, Ethical Hacking, & Security Certification Exams
Author Comment / Biography: C I S S P, free practice tests, Q/ISP, CEH, CEH version7, CEH7, hacking, Computer security training, DoD 8570, Cyber Security, Intense School, CCCure, Infosec Institute, CISA, CISM, DoD training, IAT I, QISP, CND, Qualified Information Security Professional, Qualified Assurance Professional, QSA, certification exam, Qualified Security Analyst Pen Tester, QPTL, Qualified Penetration Tester License, QEH, Qualified Ethical Hacker Defender,QEP, Edge Protector, QFE, Forensic Expert, ECSA, CHFI, QWAD, tactical security skills, CND, Hacker, CNSS, Trojans, ISC2, CISSP, CWNA, CWSP, CISSP Prep Review Class, SSCP, ITIL, CCNA, Security+, Network+, QSSE, Reverse Engineering, FISMA, NIST SP 800-53 Compliance.
|
Articles by Donald Carroll |
81. Theft Protection Developed for Virtual Machines
September 10, 2011
ScienceDaily (Aug. 5, 2011) — TU Darmstadt scientists have found a way to promptly detect hacker attacks on virtual machines. Companies and government agencies that employ virtual machines can thus protect data stored on them against theft.
Virtual machines are computers that incorporate no ...
|
|
|
82. Tracking Crime in Real Time
September 10, 2011
ScienceDaily (Aug. 8, 2011) — Almost everything we do leaves a digital trace, whether we send an email to a friend or make a purchase online. That includes law-abiding citizens -- and criminals. And with digital information multiplying by the second, there are seemingly endless amounts of informatio...
|
|
|
83. Scientists Develop New Technique to Protect Photographers from Persecution
September 10, 2011
ScienceDaily (Aug. 9, 2011) — Scientists at the University of Luxembourg have developed a new technique that may help photographers protect their anonymity. This idea came from Prof. Shishir Nagaraja, professor for IT Security at the Institute for Information Technology in Delhi (IIIT), after seeing...
|
|
|
84. Most Canadians Can Be Uniquely Identified from Their Date of Birth and Postal Code; New Research Un
September 10, 2011
ScienceDaily (Aug. 9, 2011) — There are increasing pressures for health care providers to make individual-level data readily available for research and policy making. But Canadians are more likely to allow the sharing of their personal data if they believe that their privacy is protected. A new repo...
|
|
|
85. Quantum Computers? Physicists 'Entangle' Two Atoms Using Microwaves for the First Time
September 10, 2011
ScienceDaily (Aug. 11, 2011) — Physicists at the National Institute of Standards and Technology (NIST) have for the first time linked the quantum properties of two separated ions (electrically charged atoms) by manipulating them with microwaves instead of the usual laser beams, suggesting it may be ...
|
|
|
86. New Anti-Censorship Scheme Could Make It Impossible to Block Individual Web Sites
September 10, 2011
ScienceDaily (Aug. 12, 2011) — A radical new approach to thwarting Internet censorship would essentially turn the whole web into a proxy server, making it virtually impossible for a censoring government to block individual sites.
The system is called Telex, and it is the brainchild of comput...
|
|
|
87. Simple Security for Wireless
September 10, 2011
ScienceDaily (Aug. 24, 2011) — In early August, at the Def Con conference -- a major annual gathering of computer hackers -- someone apparently hacked into many of the attendees' cell phones, in what may have been the first successful breach of a 4G cellular network. If early reports are correct, th...
|
|
|
88. 'Hanging' Computers Can Be Life Threatening
September 10, 2011
ScienceDaily (Aug. 26, 2011) — When your email program or word processor "hangs" it is annoying, you lose messages or have to reboot your computer and start that writing project again if you hadn't saved the text. But, we depending increasingly on computers in almost all walks of life, not least cri...
|
|
|
89. First Flaws in the Advanced Encryption Standard Used for Internet Banking Identified
September 10, 2011
ScienceDaily (Sep. 1, 2011) — Researchers have found a weakness in the AES algorithm. They managed to come up with a clever new attack that can recover the secret key four times easier than anticipated by experts.
The attack is a result of a long-term cryptanalysis project carried out by And...
|
|
|
90. Nasdaq spends to fend off "constant" hack attacks
August 29, 2011
By Jonathan Spicer
NEW YORK | Wed Jul 27, 2011 2:01pm EDT
(Reuters) - The operator of the Nasdaq Stock Market is "under constant attack" from would-be hackers and will spend more on security as a result, its top executive said.
"As we sit here, there are people trying to slam...
|
|
|
|
|
|
>
|