In recent years news stories have highlighted the increasing rate of cybercriminal activity targeting both private organizations and government entities. Cases from mischievous amateur hackers managing to exploit basic vulnerabilities, to more advanced security breaches carried out by expert criminal hackers and cybercrime organizations overseas, have grabbed the attention of the media.
“We are moving into a new era of mobile computing, one that promises greater variety in applications highly improved usability, and speedier networking.” Godwin-Jones (2008). This statement rings true for the past five years where mobile computing has seen a massive explosion in growth.
Philosophical Assumptions for Qualitative ResearchView Post
Hacking can be broken into several categories, including criminal hacking where the perpetrator is motivated by some tangible gain, usually monetary. There are other forms of hacking which are driven by other factors such as political reasons.
Just over a decade ago I began learning about web technologies and found myself learning basic HTML. I was excited when I managed to publish my first website, which was no more than a basic homepage with some external links.
In 2007 I graduated from the University of Ulster’s new E-Learning masters program. For my thesis, I developed a research study on collaborative learning and more specifically the adoption of Adobe Connect at the University of Maryland University College.
In their paper on understanding risks associated with hackers/crackers, (Smith, & Rupp 2002) discuss the various types of classification hackers have been placed into by different authors over the years.
Last week I attended my first Drupal ‘learn sprint’. For anyone interested in contributing to the Drupal community, learn sprints are a great way to network with other professionals in the area while learning how you can contribute to Drupal.
The Mandiant report: APT1: Exposing One of China’s Cyber Espionage Units, has stirred up a lot of media attention over the past few weeks. The report was originally released to show evidence that a specific Chinese military unit has been behind many major Advanced Persistent Threats (APTs) within the United States.
Underlying vulnerabilities in mobile device software has also opened up the door to potential security breaches. In an article describing mobile application security flaws, (Westervelt, 2010) wrote that it was discovered that many mobile application security vulnerabilities were similar to those found in early web applications.
- Page 1 of 2