UW Computer Security Research and Course Blog
Pages
-
Recent Posts
- Moving to a Forum
- Current Event – A Broader Look on Wireless Access Point Vulnerabilities
- Current Event : Keyboard hacking (from thin air!)
- Security Review: Urban Chicken Coops
- Google’s Online Library
- Security Review: New Weapons in the Fight Against Doping
- Security Review: Helios Online Voting
- Security Review: Online Taxes
- Security Review: Eye-Fi
- Security Review: Hollywood Awards Presentations
Recent Comments
- Mike on Current Event – A Broader Look on Wireless Access Point Vulnerabilities
- Evil Rocks on Current Event: California Politician Wants All Satellite Imagery of Schools, Churches, and Government Buildings to Be ‘Blurred’
- Evil Rocks on Security Review: Apartment Complex Rent Drop-boxes
- jap24 on Current Event: California Politician Wants All Satellite Imagery of Schools, Churches, and Government Buildings to Be ‘Blurred’
- UW Computer Security Research and Course Blog » Security Review: Google Voice on Security Review – Google Voice
- Matt on Current Event: Kremlin loyalist admits to launching DDoS attack on Estonia
- Claudel on Current Event: Telegraph website hacked
- alexmeng on Security Review: Portable Computing
- alexmeng on Current events: Adobe Reader Vulnerability
- Father_Of_1000000 on Facebook’s lax security
- Lisa P on Security Review: Automobiles
- Matt on Security Review: Portable Computing
- devynp on Security Review: Portable Computing
- liaowt on Current Event: The Elusive Tigger.A Trojan
- Josh Goodwin on Security Review: Automobiles
Archives
Categories
Course Staff
Security Blogs
UW CSE Resources
Meta
Daily Archives: March 13, 2009
Current Event: California Politician Wants All Satellite Imagery of Schools, Churches, and Government Buildings to Be ‘Blurred’
A politician in California, Assemblyman Joel Anderson, has just proposed legislation to be drafted that would require Google’s map application to blur satellite imagery of all schools, churches, and government buildings. The Assemblyman’s proposal would require not just Google, but … Continue reading
Posted in Current Events
2 Comments
Security Review: Web based Remote Access
Many operating systems include some sort of remote access solution by default. Windows XP, for example, ship with Microsoft’s Remote Desktop as a simple remote administration interface. Even OpenBSD, the Unix variant which is usually regarded as the most secure … Continue reading
Posted in Security Reviews
Comments Off on Security Review: Web based Remote Access
Cryptography towards a new kind of election?
Computer scientists at the Harvard School of Engineering and Applied Sciences recently deployed the first “practical, Web-based, secure, verifiable voting system.” After testing through 2008 and early 2009, the system, dubbed “Helios,” was used for the university presidential elections at … Continue reading
Posted in Current Events, Integrity, Privacy
Comments Off on Cryptography towards a new kind of election?
Security Review: PayPal
PayPal, along with other services like Ebay, is an online tool used to transfer money that most are familiar with. Web payment services are a major conveinence, but come with a number of significant risks. Services like PayPal can allow … Continue reading
Posted in Security Reviews
Comments Off on Security Review: PayPal
Security Review: VoIP Communication
Over the past five years or so, voice over IP has rapidly gained in popularity and use. It touts cheaper calls for residential users and corporations can save big because additional extensions on a VoIP infrastructure are less costlythan their … Continue reading
Posted in Security Reviews
Comments Off on Security Review: VoIP Communication
Security Review: DTV coupon program
This June, all U.S. television stations must shut off their analog broadcasts, and replace them with digital ones. In order to make the transition less painful, the DTV Coupon Program offers up to two coupons to every U.S. household, good … Continue reading
Posted in Security Reviews
Comments Off on Security Review: DTV coupon program
Security Review: Google Latitude
Google Latitude is yet another product available by the well established makers of the Gmail internet based mail system. Latitude is a web based service, running in sync with a client side application Google Gears, which allows Google to pinpoint … Continue reading
Posted in Privacy, Security Reviews
Comments Off on Security Review: Google Latitude
Linux Desktop Security Vulnerabilities
A common method for infection of many operating systems is a malicious executable file–either sent in an email or downloaded otherwise–that the user simply double clicks without thinking. Linux .desktop files allow arbitrary code execution without the need for an executable bit set on the file. Continue reading
Posted in Availability, Current Events
Tagged Linux, security
Comments Off on Linux Desktop Security Vulnerabilities
Current Event: iTunes Gift Voucher Hacked?
Many online news agencies are reporting that a Chinese group of hackers have broken Apple’s iTunes Gift Voucher code generator. The original story seems to come from Outdustry, a Chinese music industry website, and tells of $200 gift certificates being … Continue reading
Posted in Current Events
Comments Off on Current Event: iTunes Gift Voucher Hacked?