UW Computer Security Research and Course Blog
Pages
-
Recent Posts
- Moving to a Forum
- Current Event – A Broader Look on Wireless Access Point Vulnerabilities
- Current Event : Keyboard hacking (from thin air!)
- Security Review: Urban Chicken Coops
- Google’s Online Library
- Security Review: New Weapons in the Fight Against Doping
- Security Review: Helios Online Voting
- Security Review: Online Taxes
- Security Review: Eye-Fi
- Security Review: Hollywood Awards Presentations
Recent Comments
- Mike on Current Event – A Broader Look on Wireless Access Point Vulnerabilities
- Evil Rocks on Current Event: California Politician Wants All Satellite Imagery of Schools, Churches, and Government Buildings to Be ‘Blurred’
- Evil Rocks on Security Review: Apartment Complex Rent Drop-boxes
- jap24 on Current Event: California Politician Wants All Satellite Imagery of Schools, Churches, and Government Buildings to Be ‘Blurred’
- UW Computer Security Research and Course Blog » Security Review: Google Voice on Security Review – Google Voice
- Matt on Current Event: Kremlin loyalist admits to launching DDoS attack on Estonia
- Claudel on Current Event: Telegraph website hacked
- alexmeng on Security Review: Portable Computing
- alexmeng on Current events: Adobe Reader Vulnerability
- Father_Of_1000000 on Facebook’s lax security
- Lisa P on Security Review: Automobiles
- Matt on Security Review: Portable Computing
- devynp on Security Review: Portable Computing
- liaowt on Current Event: The Elusive Tigger.A Trojan
- Josh Goodwin on Security Review: Automobiles
Archives
Categories
Course Staff
Security Blogs
UW CSE Resources
Meta
Monthly Archives: February 2008
Facebook storing your information
While this may not be breaking news, it turns out that Facebook has taken just one more step in not respecting their user’s privacy. According to a semi-recent article in the New York Times, Facebook retains user profile information even after the … Continue reading
Posted in Current Events, Ethics, Policy, Privacy
5 Comments
RIAA investigators unaware of IP spoofing or BGP hijacking?
Slashdot reports that an assistant professor of Delft University Technology in the Netherlands calls a recent investigation by the RIAA, “Borderline Incompetent”. A recent investigation by the RIAA was accusing the defendants of distributing copyright material over Kazaa. In the … Continue reading
Posted in Current Events
1 Comment
Wii hacked using buffer overflow
Slashdot is reporting that a lot of Wii homebrew code is being developed and released now. Apparently, a bug was found in The Legend of Zelda: Twilight Princess that allows you to smash the stack by overflowing the horse name … Continue reading
Posted in Miscellaneous
5 Comments
Pakistan ISPs, Routing, and YouTube
Here’s a link to the article I mentioned today in class, which is related to the material that we covered on Friday: http://blog.washingtonpost.com/securityfix/2008/02/pakistan_censorship_order_take.html (from The Washington Post). Here’s a quote from the article: So, what happened? From everything I’ve read … Continue reading
Posted in Current Events
Comments Off on Pakistan ISPs, Routing, and YouTube
DVD Jon’s DoubleTwist
Jon Johansen (known for his work in defeating CSS in DVDs) has recently released an application known as DoubleTwist. DoubleTwist is designed to defeat Apple’s FairPlay DRM by playing the track’s in fast forward and capturing the analog signal as … Continue reading
Posted in Current Events
3 Comments
Google to Store Patient Health Data
News article here, covered on Slashdot here. Google, with the cooperation of the Cleveland Clinic, is beginning a project to record medical history and other health-related data for patients. The stated goal is to provide patients with a way to … Continue reading
ISP caching issue exposes Gmail data
Last week, when a Kuwait-based Gmail user tried logging in, he was denied access to his own account, and instead was granted access to over 30 accounts that did not belong to him. He was able to peek into other … Continue reading
Security Review: Coin-Operated Laundromats
They’re out there…Some of us use them everyday…Especially college students living away from home…We can’t avoid them, unless we want to be stinky… Yes I’m talking about coin-operated laundries… Coin-operated washing facilities provide an interesting security problem, since the users … Continue reading
Posted in Miscellaneous, Physical Security, Security Reviews
6 Comments
U.S. Intelligence wants to monitor WoW chat
Called The Reynard project, it is a series of plans for the U.S. Intelligence to monitor more internet traffic, most notably, data mining from several major MMORPGs, including WoW. The goal being to eventually create a system that can “automatically … Continue reading
Posted in Current Events, Policy, Privacy
2 Comments