Archives For admin

In recent years news stories have highlighted the increasing rate of cybercriminal activity targeting both private organizations and government entities. Cases from mischievous amateur hackers managing to exploit basic vulnerabilities, to more advanced security breaches carried out by expert criminal hackers and cybercrime organizations overseas, have grabbed the attention of the media. Continue Reading…

“We are moving into a new era of mobile computing, one that promises greater variety in applications highly improved usability, and speedier networking.” Godwin-Jones (2008). This statement rings true for the past five years where mobile computing has seen a massive explosion in growth.

Continue Reading…

In any kind of work or study, we always bring a certain set of beliefs as well as philosophical assumptions.  Qualitative researchers understand the importance of beliefs and theories that inform their work and also actively write about them in their research.  Continue Reading…

Hacking can be broken into several categories, including criminal hacking where the perpetrator is motivated by some tangible gain, usually monetary.  There are other forms of hacking which are driven by other factors such as political reasons.  Continue Reading…

Just over a decade ago I began learning about web technologies and found myself learning basic HTML.  I was excited when I managed to publish my first website, which was no more than a basic homepage with some external links.  Continue Reading…

In 2007 I graduated from the University of Ulster’s new E-Learning masters program.  For my thesis, I developed a research study on collaborative learning and more specifically the adoption of Adobe Connect at the University of Maryland University College. Continue Reading…

In their paper on understanding risks associated with hackers/crackers, (Smith, & Rupp 2002) discuss the various types of classification hackers have been placed into by different authors over the years. Continue Reading…

Drupal Ladder

Ian Carnaghan —  March 18, 2013 — Leave a comment

Last week I attended my first Drupal ‘learn sprint’.  For anyone interested in contributing to the Drupal community, learn sprints are a great way to network with other professionals in the area while learning how you can contribute to Drupal. Continue Reading…

The Mandiant report: APT1: Exposing One of China’s Cyber Espionage Units, has stirred up a lot of media attention over the past few weeks.  The report was originally released to show evidence that a specific Chinese military unit has been behind many major Advanced Persistent Threats (APTs) within the United States.  Continue Reading…

Mobile Security

Ian Carnaghan —  March 7, 2013 — Leave a comment

Underlying vulnerabilities in mobile device software has also opened up the door to potential security breaches.  In an article describing mobile application security flaws, (Westervelt, 2010) wrote that it was discovered that many mobile application security vulnerabilities were similar to those found in early web applications. Continue Reading…