UW Computer Security Research and Course Blog
Pages
-
Recent Posts
- Moving to a Forum
- Current Event – A Broader Look on Wireless Access Point Vulnerabilities
- Current Event : Keyboard hacking (from thin air!)
- Security Review: Urban Chicken Coops
- Google’s Online Library
- Security Review: New Weapons in the Fight Against Doping
- Security Review: Helios Online Voting
- Security Review: Online Taxes
- Security Review: Eye-Fi
- Security Review: Hollywood Awards Presentations
Recent Comments
- Mike on Current Event – A Broader Look on Wireless Access Point Vulnerabilities
- Evil Rocks on Current Event: California Politician Wants All Satellite Imagery of Schools, Churches, and Government Buildings to Be ‘Blurred’
- Evil Rocks on Security Review: Apartment Complex Rent Drop-boxes
- jap24 on Current Event: California Politician Wants All Satellite Imagery of Schools, Churches, and Government Buildings to Be ‘Blurred’
- UW Computer Security Research and Course Blog » Security Review: Google Voice on Security Review – Google Voice
- Matt on Current Event: Kremlin loyalist admits to launching DDoS attack on Estonia
- Claudel on Current Event: Telegraph website hacked
- alexmeng on Security Review: Portable Computing
- alexmeng on Current events: Adobe Reader Vulnerability
- Father_Of_1000000 on Facebook’s lax security
- Lisa P on Security Review: Automobiles
- Matt on Security Review: Portable Computing
- devynp on Security Review: Portable Computing
- liaowt on Current Event: The Elusive Tigger.A Trojan
- Josh Goodwin on Security Review: Automobiles
Archives
Categories
Course Staff
Security Blogs
UW CSE Resources
Meta
Monthly Archives: January 2009
Taking the Tweet out of Twitter
According to a recent New York Times article, the popular “micro-blogging” site, Twitter, has been the victim of a series of recent hacking and phishing attacks. The article explains that 33 member accounts, most of them belonging to big-names like … Continue reading
Posted in Current Events
12 Comments
Most Companies are at Risk
On Slashdot and Finance and Commerce Survey says that most of the Fortune 1,000 companies are not prepared for IT security attacks. The article suggested that companies can start monitoring the networks. If it’s too costly, outsourcing the monitoring job … Continue reading
Intel’s “Trusted eXecution Technology” Circumvented
From an article in Infoworld via Slashdot, two researchers from Invisible Things Lab have discovered a method to circumvent Intel‘s Trusted eXecution Technology (TXT). The TXT system (PDF), part of Intel’s vPro hardware-assisted security product, is designed to allow software … Continue reading
Posted in Current Events, Research
3 Comments
iGorenje Wi-Fi Application for Home Appliances
More and more household appliances are being designed with wireless internet capabilities. Being able to control home appliances via a web portal may improve convenience, but it comes at the cost of potential security vulnerabilities. The European home appliance manufacturer … Continue reading
What to contribute (Winter 2009 CSE 484 / CSE M 584)
Welcome to 2009 and another rendition of CSE 484 / CSE M 584, the University of Washington undergraduate and 5-th year Masters computer security course. Please familiarize yourself with this post from last year; it explains why we have this … Continue reading
Posted in Announcements, Current Events, Security Reviews
Comments Off on What to contribute (Winter 2009 CSE 484 / CSE M 584)