UW Computer Security Research and Course Blog
Pages
-
Recent Posts
- Moving to a Forum
- Current Event – A Broader Look on Wireless Access Point Vulnerabilities
- Current Event : Keyboard hacking (from thin air!)
- Security Review: Urban Chicken Coops
- Google’s Online Library
- Security Review: New Weapons in the Fight Against Doping
- Security Review: Helios Online Voting
- Security Review: Online Taxes
- Security Review: Eye-Fi
- Security Review: Hollywood Awards Presentations
Recent Comments
- Mike on Current Event – A Broader Look on Wireless Access Point Vulnerabilities
- Evil Rocks on Current Event: California Politician Wants All Satellite Imagery of Schools, Churches, and Government Buildings to Be ‘Blurred’
- Evil Rocks on Security Review: Apartment Complex Rent Drop-boxes
- jap24 on Current Event: California Politician Wants All Satellite Imagery of Schools, Churches, and Government Buildings to Be ‘Blurred’
- UW Computer Security Research and Course Blog » Security Review: Google Voice on Security Review – Google Voice
- Matt on Current Event: Kremlin loyalist admits to launching DDoS attack on Estonia
- Claudel on Current Event: Telegraph website hacked
- alexmeng on Security Review: Portable Computing
- alexmeng on Current events: Adobe Reader Vulnerability
- Father_Of_1000000 on Facebook’s lax security
- Lisa P on Security Review: Automobiles
- Matt on Security Review: Portable Computing
- devynp on Security Review: Portable Computing
- liaowt on Current Event: The Elusive Tigger.A Trojan
- Josh Goodwin on Security Review: Automobiles
Archives
Categories
Course Staff
Security Blogs
UW CSE Resources
Meta
Daily Archives: March 13, 2009
Subverting SSL with SSLstrip
At the recent Black Hat security conference, independent hacker Moxie Marlinspike gave a speech about his new tool sslstrip and the techniques that it uses to subvert SSL on a network (a write up can be found at http://www.itpro.co.uk/609932/website-danger-as-hacker-breaks-ssl-encryption and … Continue reading
Posted in Current Events
Comments Off on Subverting SSL with SSLstrip
Current Event: Air Force Engineers develop BitTorrent sniffer
Original article: http://arstechnica.com/security/news/2009/02/airforce-engineers-develop-bittorrent-sniffer.ars The Air Force Institute of Technology has a new method for passive BitTorrent tracking. The system attempts to read the header of BitTorrent packets, and compare the hash in the packet to a known set of bad … Continue reading
Posted in Current Events, Ethics, Integrity, Privacy
Comments Off on Current Event: Air Force Engineers develop BitTorrent sniffer
Security Review: iTunes DAAP Authentication
I am, at the moment of writing this, sitting in Cafe Solstice on the Ave. There are probably about a dozen computers in here, and judging from my neighbor’s screen, 4 of them are running iTunes with the “sharing” feature … Continue reading
Posted in Miscellaneous
Comments Off on Security Review: iTunes DAAP Authentication
Security Review – Google Voice
Product Page: http://www.google.com/voice/about Recently, Google has rolled out another product designed to change the way people use existing technologies. This time, it’s called Google Voice, a replacement/advancement of an existing technology called GrandCentral. Google Voice aims to centralize phone calls … Continue reading
Posted in Security Reviews
1 Comment
Democratized DDoS attacks
Distributed Denial of Service attacks are becoming less the tool of centralized attackers Continue reading
Security Review: Cell Phone Projectors
Authors: Heather Underwood & Guy Bordelon As mobile phones continue to become one of the most popular, universal, and comprehensive computing devices, researchers and mobile phone companies are enthralled with adding more features. As described in a recent article by … Continue reading
Posted in Miscellaneous
Comments Off on Security Review: Cell Phone Projectors
Face Recognition System: Clever or Creepy?
Photo programs that could organize, recognize, and cluster people’s photos are neat because it allows the user to search for pictures. The face recognition technology has also been used to identify people. The way the system works is that the … Continue reading
Posted in Current Events, Privacy
Comments Off on Face Recognition System: Clever or Creepy?
Current Event: Google’s new behavioral based ads v.s. Privacy
Recently, Google released a new way for it to perform interest-based advertising to its users. It utilizes its users’ behavior to send them targeted ads. The question that arises is how do they obtain the users’ behavior? Google saves previous … Continue reading
Posted in Miscellaneous
Tagged current event
Comments Off on Current Event: Google’s new behavioral based ads v.s. Privacy
The BBC Borrows a Botnet
In an effort to make the public aware of the threat of botnets, the BBC comes very close to violating the UK’s Computer Misuse Act. The BCC technology program Click acquired a botnet of about 22,000 computers and used them … Continue reading
Posted in Current Events, Ethics
Comments Off on The BBC Borrows a Botnet
Security Review – BitTorrent
Summary BitTorrent is a peer-to-peer communications protocol that has risen in popularity very rapidly. It is a file-distribution protocol that facilitates transferring large files between peers. In order to download a certain set of files, a user would typically find … Continue reading