Monthly Archives: February 2009

Illegal file transfer using BitTorrent protocol

BitTorrent has been popularly used for transferring files illegally because it reduces a vast amount of networking bandwidth that would have been required. The way it works is that users can connect to each other directly to send and receive … Continue reading

Posted in Current Events | 1 Comment

Current Event – FAA, Kaiser Permanente Security Breaches; Tens of Thousands of Names Compromised

In another of a long line of high-profile security breaches both in and out of the government recently, the Federal Aviation Administration has announced that in the course of a breach of their computer system, over 45,000 employee names – … Continue reading

Posted in Current Events | 3 Comments

Facebook Opens Status API

“Facebook is slowly tearing down the wall around its silo and is starting to expose more of its data to the outside” (From Facebook Opens Up: Lets Developers Access Status Updates, Notes, Links, and Videos). Now Facebook allows the third-party … Continue reading

Posted in Security Reviews | Comments Off on Facebook Opens Status API

USB power in airports

I noticed that the Denver airport has upgraded its power stands to include USB ports that presumably give power to recharge devices like cell phones, iPhones, and iPods. What I wonder is how I know that’s all that’s going on. … Continue reading

Posted in Physical Security | 4 Comments

Current Event: Kaspersky Hacked

Kaspersky, an Antivirus vendor and Internet Security Lab, recently fell victim to an internet hacker using an SQL-injection attack. The attack compromised data in all databases accessible to the web server. According to the hacker, “Alter one of the parameters … Continue reading

Posted in Current Events, Ethics | Comments Off on Current Event: Kaspersky Hacked

Security Review: MMO Gaming

  Most people in our society today are familiar with the concept of MMO gaming.  World of Warcraft, for example, is something most everyone has heard of.  Most MMO games operate under a fairly strict client/server paradigm.  A company that … Continue reading

Posted in Security Reviews | 3 Comments

Security Review: The Bike and its Lock

EDIT: It appears that I goofed with the “more” tag when I first posted this, so I’ve included the rest of the article below. Since the days of waking up at 5am to watch the Tour de France live with … Continue reading

Posted in Announcements, Ethics, Physical Security, Security Reviews | Tagged , , | 2 Comments

Security Review: Smashing abstract—more on Lab 2

While experimenting with Lab 2 I began discovering real vulnerabilities and decided to make a security review out of it. I spent a couple days experimenting and taking notes only to find that I’d been beaten to the punch yesterday. I nearly despaired at several days’ work gone for naught, but after carefully reading both of the posts I believe that I still have something to contribute. My discussion will focus a bit more on the security of abstract and provide other additional details. Continue reading

Posted in Security Reviews | Tagged | 1 Comment

Security review: Powered Exoskeletons

Exoskeletons look impressive in movies. They look impressive in real life also. Electronics reads brain signals sent to muscles and cause actuators to move, thus ‘amplifying’ human strength. Exoskeletons are close to get mass-produced and available to people around the … Continue reading

Posted in Miscellaneous, Security Reviews | Comments Off on Security review: Powered Exoskeletons

Security Review: New Technology Could Display Dreams on Screen

For years there have been research going on in neurobiological field with attempts to decode images from the brain activity. In 1999, University of California, Berkley, has been able to reconstruct the video images from cat’s observed brain activity. However, … Continue reading

Posted in Security Reviews | 1 Comment