UW Computer Security Research and Course Blog
Pages
-
Recent Posts
- Moving to a Forum
- Current Event – A Broader Look on Wireless Access Point Vulnerabilities
- Current Event : Keyboard hacking (from thin air!)
- Security Review: Urban Chicken Coops
- Google’s Online Library
- Security Review: New Weapons in the Fight Against Doping
- Security Review: Helios Online Voting
- Security Review: Online Taxes
- Security Review: Eye-Fi
- Security Review: Hollywood Awards Presentations
Recent Comments
- Mike on Current Event – A Broader Look on Wireless Access Point Vulnerabilities
- Evil Rocks on Current Event: California Politician Wants All Satellite Imagery of Schools, Churches, and Government Buildings to Be ‘Blurred’
- Evil Rocks on Security Review: Apartment Complex Rent Drop-boxes
- jap24 on Current Event: California Politician Wants All Satellite Imagery of Schools, Churches, and Government Buildings to Be ‘Blurred’
- UW Computer Security Research and Course Blog » Security Review: Google Voice on Security Review – Google Voice
- Matt on Current Event: Kremlin loyalist admits to launching DDoS attack on Estonia
- Claudel on Current Event: Telegraph website hacked
- alexmeng on Security Review: Portable Computing
- alexmeng on Current events: Adobe Reader Vulnerability
- Father_Of_1000000 on Facebook’s lax security
- Lisa P on Security Review: Automobiles
- Matt on Security Review: Portable Computing
- devynp on Security Review: Portable Computing
- liaowt on Current Event: The Elusive Tigger.A Trojan
- Josh Goodwin on Security Review: Automobiles
Archives
Categories
Course Staff
Security Blogs
UW CSE Resources
Meta
Monthly Archives: March 2009
Security Review – BitTorrent
Summary BitTorrent is a peer-to-peer communications protocol that has risen in popularity very rapidly. It is a file-distribution protocol that facilitates transferring large files between peers. In order to download a certain set of files, a user would typically find … Continue reading
Second most dangerous virus?
Romanian firm SOFTWIN has released an update to their BitDefender security suite claiming to have created a vaccination for Conficker. So what is Conficker? Fast Stats: Release Date: October 2008 Target Platform: Windows >= Windows 2000 (including Windows 7 Beta) … Continue reading
Posted in Current Events, Miscellaneous
Comments Off on Second most dangerous virus?
Security Review: Electronic Voting
Summary The rise of electronic voting machines in recent years has led to some heated debates as to how secure these machines actually are. Voting is a fundamental right of a democratic society, so ensuring that each citizen’s vote is … Continue reading
Posted in Security Reviews
Comments Off on Security Review: Electronic Voting
Security Review – Mobile Banking in the Developing World
One of the interesting topics brought up by Microsoft Research India during their Change talk last week was that of mobile banking in the developing world. Managing and distributing money can be a tricky proposition in the developing world – … Continue reading
Posted in Physical Security, Policy, Privacy, Security Reviews
Comments Off on Security Review – Mobile Banking in the Developing World
Security Review: CV2 codes
A CV2 code is a three-digit number that is known to the issuing bank and printed on a credit to verify physical possession of the card. Online merchants often require customers to enter the CV2 code along with the rest … Continue reading
Posted in Security Reviews
Comments Off on Security Review: CV2 codes
DDoS attack on Time Warner Cable’s DNS Servers
At the end of February, a distributed denial of service attack on Time Warner Cable’s DNS Servers severely impacted subscribers connections for over a week. The problems were supposedly localized to Southern California, according to TWC. Although DDoS attacks are … Continue reading
Posted in Current Events
Comments Off on DDoS attack on Time Warner Cable’s DNS Servers
Security Review: Virtual Reality Helmet
As technology advances to the point of interacting with and in some cases replacing our bodies’ biological functions, security on these technologies must also advance to ensure the safety of users. The virtual reality helmet being designed by researchers at … Continue reading
Posted in Security Reviews
Comments Off on Security Review: Virtual Reality Helmet
Security Review: In-Eye Video Camera
Rob Spence, a Canadian Filmmaker, is currently developing a prototype to equip his prosthetic eye with a built-in, wireless video camera. The digital system, while not able to transmit information to his brain, will be able to route the signal … Continue reading
Posted in Ethics, Physical Security, Privacy, Security Reviews
Tagged Camera, Eye, Video
Comments Off on Security Review: In-Eye Video Camera
Facebook’s lax security
Facebook’s policy on applications have a some people concerened and wondering if application writing should be more restricted. The latest attacks have involved privacy leaks, and the installation of malware. Over the last week, five seperate security issues have come … Continue reading
Posted in Current Events, Policy
1 Comment
Current Event: Convicted Botnet Leader Retains Job
In three sequential articles, ComputerWorld traces the sentencing of convicted botnet leader John Schiefer as well as his continued employment at the start-up Mahalo. Schiefer is an ex-security consultant and is the first botnet leader to be charged under the … Continue reading
Posted in Current Events, Ethics, Policy
Comments Off on Current Event: Convicted Botnet Leader Retains Job