2,174 research outputs found

    A Joint Report by Check Point and Europol

    Get PDF
    The “Holy Grail” for most cybercriminals is to steal the money of unsuspecting users. Unfortunately, there are many ways for cybercriminals to access confidential financial information, including bank account credentials. These methods include phishing campaigns with a fake bank web page, and info-stealing malware with simple keylogging capabilities for documenting victims’ usernames and passwords. Banking Trojans differ from standard Trojans, as they are written for the express purpose of stealing confidential information from victims’ bank accounts and online payment services. They are sophisticated and equipped with Man-in-the-Browser (MiB) techniques such as web injections or redirection mechanisms

    Spartan Daily, February 11, 2005

    Get PDF
    Volume 124, Issue 11https://scholarworks.sjsu.edu/spartandaily/10083/thumbnail.jp

    The BG News April 16, 1990

    Get PDF
    The BGSU campus student newspaper April 16, 1990. Volume 72 - Issue 117https://scholarworks.bgsu.edu/bg-news/6071/thumbnail.jp

    Spartan Daily, February 11, 2005

    Get PDF
    Volume 124, Issue 11https://scholarworks.sjsu.edu/spartandaily/10083/thumbnail.jp

    Spartan Daily, February 11, 2005

    Get PDF
    Volume 124, Issue 11https://scholarworks.sjsu.edu/spartandaily/10083/thumbnail.jp

    Survey and Analysis of Android Authentication Using App Locker

    Full text link
    Android Smart phones have gained immense popularity over the years and is undoubtedly more popular than other operating system phones. Following the similar lines android wear was introduced. Steadily android wear is making its way into our daily lives. It helps keep track of the sleep you have, helps you reach fitness goals, keeps track of phone and helps users have easy authentication. Due to the usage of smart lock which enables phone to be unlocked as long as connected to the android wear, this leads to almost no security on both the ends as android wear before Android 5.0 has no lock. We aim to produce the existing authentication methods in android phones and wear and the threats that plague both kinds of devices. As authentication is one of the major building blocks of security, through research we aim at designing a system for android phones which will be able to protect the sensitive data on devices which will be at risk through smart lock using encryption techniques. In this proposed system, the user would be able to decide which applications are needed to be secured when he is using smart lock. This application will enable lock for those user chosen applications as soon as the smart phone device is connected to android wear and similarly disables the lock when connection is disabled between the devices and communication between devices is made secure using encryption algorithms. This application does not interfere with easy phone authentication which users demand but it makes sure data is protected and users are authenticated with the help of multiple authentication layering

    The Cord (November 30, 2011)

    Get PDF

    The art of fighting back: Dissertation on business leader's comebacks after a career setback

    Get PDF
    This master thesis dissertation aims to discuss andarrive to conclusions regarding the way business leaders fight back after a career setback. The work takes the form of a critical view correlating business leader’s comebacks, after a career setback, and the concept of leadership. In the first chapter are presented and discussed the most consensual and updated leadership types/styles and the new trends in the leadership field. Subsequently, are addressed some myths associated with the concept ofleadership – in this section, the concepts of Emotional Intelligence and Social Intelligence are discussed. In the second chapter, is presented the data and the outputs that resulted from the interviews made to three Portuguese business leaders. The interviews were made in order to gather and analyze information, finding out whatare the common aspects of a career setback and of a fighting back process, and to understand and draw conclusions regarding how the Portuguese market and business environment reacts to leaders that are hit by failure. Next, are discussed the three phases of the fighting back process. The shock phase, the retreat and reaction phase, and the comeback phase. At the end, in the third chapter, a conclusion is taken regarding the achievability of a leader to overcome the ultimate challenge thatis to transform failure into success.A presente dissertação de tese de mestrado tem comoobjectivo discutir e chegar a conclusĂ”es relativamente ao modo como lĂ­deres de negĂłcios reagem depois de passarem pelo fracasso nas suas carreiras profissionais. A dissertação toma a forma de uma visĂŁo crĂ­tica que correlaciona a recuperação de lĂ­deres em situaçÔes adversas com o conceito de liderança. No primeiro capĂ­tulo sĂŁo discutidos os diferentes conceitos e estilos de liderança e as novas tendĂȘncias no campo da liderança. Subsequentemente, sĂŁo abordados alguns mitos associados ao conceito de liderança – nesta parte, sĂŁo discutidos os conceitos de InteligĂȘncia Emocional e de InteligĂȘncia Social. No segundo capĂ­tulo sĂŁo apresentados os dados e outputs resultantes das entrevistas realizadas a trĂȘs lĂ­deres de negĂłcios portugueses. As entrevistas foram realizadas com o objectivo de recolher e analisar informação de modo a determinar quais os aspectos comuns aos processos de adversidade e aos processos de recuperação ao nĂ­vel da carreira profissional, bem como compreender e retirar conclusĂ”es acerca de como o mercado portuguĂȘs e o ambiente de negĂłcios reagem alĂ­deres que sĂŁo atingidos pela adversidade e pelo fracasso. Seguidamente, sĂŁo discutidas as trĂȘs fases constituintes do processo de recuperação dos lĂ­deres: a fase do choque, a fase da retirada e reacção, e a fase do regresso. No final, no terceiro capĂ­tulo, sĂŁo retiradas conclusĂ”es acerca da possibilidade de um lĂ­der ultrapassar o desafio derradeiro que Ă© a capacidade de transformar o fracasso em sucesso

    Managing the boundary of an 'open' project

    Get PDF
    In the past ten years, the boundaries between public and open science and commercial research efforts have become more porous. Scholars have thus more critically examined ways in which these two institutional regimes intersect. Large open source software projects have also attracted commercial collaborators and now struggle to develop code in an open public environment that still protects their communal boundaries. This research applies a dynamic social network approach to understand how one community-managed software project, Debian, developed a membership process. We examine the project's face-to-face social network over a five-year period (1997-2001) to see how changes in the social structure affected the evolution of membership mechanisms and the determination of gatekeepers. While the amount and importance of a contributor's work increased the probability that a contributor would become a gatekeeper, those more central in the social network were more likely to become gatekeepers and influence the membership process. A greater understanding of the mechanisms open projects use to manage their boundaries has critical implications for research and knowledge-producing communities operating in pluralistic, open and distributed environments.open source software; social networks; organizational design; institutional design;
    • 

    corecore