Cyber Security, InfoSec, IT, and STEM News

NEWS FEATURE

Gh0st's Corner

@ Brief History of the Computer Pa$$w0rd

Computer passwords have been around since 1961. Massachusetts Institute of Technology (MIT) had built the Compatible Time-Sharing System (CTSS), a time-share research computer. Researchers were restricted to using CTSS to four hours per week, and so Fernando Corbató developed individual logins with passwords to be able keep track of when researchers hit their time limit and to keep their individual files separate. This, of course, led to the first computer hack in 1962. Ph.D. researcher Allen Scherr wanted to extend his usage beyond four hours, and so found the means to print the password file so he could log in as other users (CTSS 50th Anniversary Commemorative Overview) and use their time. Likewise, the original UNIX machines kept username/passwords in a single file, and we can still see remnants of that in today's /etc/passwd file, though that doesn't actually contain passwords anymore.

Read More...

Information To Keep You Informed

Cyber Security

Nvidia Patches Eight Security Vulnerabilities Across Most Product Lines

Most graphics drivers are exciting because they add support for new hardware, include optimizations for the latest games, or fix issues found in their predecessors. A batch of new drivers from Nvidia offers a different incentive: protection against eight vulnerabilities that could be used to conduct various attacks.

Read More...

InfoSec

Spotting Insider Breaches: Employees Can Help

In one incident, an employee at Rutland Regional Medical Center in Vermont noticed unusual activity with their email account and reported it to the medical center's IT department. In the other incident, a former employee of Kentucky Counseling Center in Louisville reported to the mental health services provider that they had received an email containing unauthorized patient information from a staff member.

Read More...

Information Technology

Ericsson reveals vision for next-gen cellular IoT solutions

Ericsson is empowering service providers across multiple industries to address a larger part of the IoT market with the help of its newly introduced next-generation cellular solutions. These solutions will help proliferation of the cellular IoT evolution in what Ericsson sees as four market segments: broadband IoT, industrial automation IoT, massive IoT, and critical IoT.

Read More...

STEM

White House Outlines Five-Year STEM Push

THE WHITE HOUSE announced Monday evening a five-year strategic plan for science, technology, engineering and math education, setting forth what it calls a "North Star" that "charts a course for the Nation's success. It represents an urgent call to action for a nationwide collaboration with learners, families, educators, communities, and employers," the White House plan reads.

Read More...

News Archives

CyberSecurity

Click Here

Information Security

Click Here

Information Technology

Click Here

STEM

Click Here

Do you have a topic you'd like us to discuss?