Monthly Archives: January 2009

Taking the Tweet out of Twitter

According to a recent New York Times article, the popular “micro-blogging” site, Twitter, has been the victim of a series of recent hacking and phishing attacks. The article explains that 33 member accounts, most of them belonging to big-names like … Continue reading

Posted in Current Events | 12 Comments

Most Companies are at Risk

On Slashdot and Finance and Commerce Survey says that most of the Fortune 1,000 companies are not prepared for IT security attacks. The article suggested that companies can start monitoring the networks. If it’s too costly, outsourcing the monitoring job … Continue reading

Posted in Current Events | Tagged | 2 Comments

Intel’s “Trusted eXecution Technology” Circumvented

From an article in Infoworld via Slashdot, two researchers from Invisible Things Lab have discovered a method to circumvent Intel‘s Trusted eXecution Technology (TXT). The TXT system (PDF), part of Intel’s vPro hardware-assisted security product, is designed to allow software … Continue reading

Posted in Current Events, Research | 3 Comments

iGorenje Wi-Fi Application for Home Appliances

More and more household appliances are being designed with wireless internet capabilities. Being able to control home appliances via a web portal may improve convenience, but it comes at the cost of potential security vulnerabilities. The European home appliance manufacturer … Continue reading

Posted in Physical Security, Security Reviews | Tagged | 1 Comment

What to contribute (Winter 2009 CSE 484 / CSE M 584)

Welcome to 2009 and another rendition of CSE 484 / CSE M 584, the University of Washington undergraduate and 5-th year Masters computer security course.  Please familiarize yourself with this post from last year; it explains why we have this … Continue reading

Posted in Announcements, Current Events, Security Reviews | Comments Off on What to contribute (Winter 2009 CSE 484 / CSE M 584)