Search for tag: "vulnerabilities"

In Plain View - Open Source Intelligence

(InfoSec 201) Did you ever think about all of the data publicly available? What if bad actors collect this “open source intelligence” and use it to attack you or Princeton University? …

From  Stefanie Clerkin on February 23rd, 2021 0 likes 34 plays

CITP Seminar: Josh Goldfoot - Computer Crime

Criminal computer intrusions can endanger privacy, safety, financial security, and more. The problem of computer crime has grown so that it threatens not only businesses and government agencies,…

From  CI Center for Information Technology Policy on December 7th, 2020 0 likes 3 plays

Webinar: History of Cyber Security

(InfoSec 101) Ransomware, spyware viruses, worms…when did it all begin? Today information security is often in the news due to the significant rise in cyber crime. Look back 15-20 years, and…

From  Stefanie Clerkin on November 5th, 2020 0 likes 20 plays

Webinar: Cyber Security in an Uncertain Time

(InfoSec 101) Life has certainly changed. We went from normal life to global pandemic in what seems like overnight. As a result, many of us are now working or studying from our kitchen tables or…

From  Stefanie Clerkin on November 4th, 2020 0 likes 16 plays

cos326-2020-04-04-type-history

Where did type systems come from?

From  Daniel Macleod on August 14th, 2020 0 likes 149 plays

cos326-2020-04-01-c-rant

C Rant

From  Daniel Macleod on August 14th, 2020 0 likes 205 plays