UW Computer Security Research and Course Blog
Pages
-
Recent Posts
- Moving to a Forum
- Current Event – A Broader Look on Wireless Access Point Vulnerabilities
- Current Event : Keyboard hacking (from thin air!)
- Security Review: Urban Chicken Coops
- Google’s Online Library
- Security Review: New Weapons in the Fight Against Doping
- Security Review: Helios Online Voting
- Security Review: Online Taxes
- Security Review: Eye-Fi
- Security Review: Hollywood Awards Presentations
Recent Comments
- Mike on Current Event – A Broader Look on Wireless Access Point Vulnerabilities
- Evil Rocks on Current Event: California Politician Wants All Satellite Imagery of Schools, Churches, and Government Buildings to Be ‘Blurred’
- Evil Rocks on Security Review: Apartment Complex Rent Drop-boxes
- jap24 on Current Event: California Politician Wants All Satellite Imagery of Schools, Churches, and Government Buildings to Be ‘Blurred’
- UW Computer Security Research and Course Blog » Security Review: Google Voice on Security Review – Google Voice
- Matt on Current Event: Kremlin loyalist admits to launching DDoS attack on Estonia
- Claudel on Current Event: Telegraph website hacked
- alexmeng on Security Review: Portable Computing
- alexmeng on Current events: Adobe Reader Vulnerability
- Father_Of_1000000 on Facebook’s lax security
- Lisa P on Security Review: Automobiles
- Matt on Security Review: Portable Computing
- devynp on Security Review: Portable Computing
- liaowt on Current Event: The Elusive Tigger.A Trojan
- Josh Goodwin on Security Review: Automobiles
Archives
Categories
Course Staff
Security Blogs
UW CSE Resources
March 2026 M T W T F S S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Meta
Author Archives: mccoyt
Virus laden hardware emerges
While the idea of software viruses is by no means new to those who work with computers, a new vector of attack seems to be developing in the form of hardware shipped from the manufacturer that is already infected with malware. … Continue reading
Posted in Current Events
1 Comment
Security Review: Full disk encryption
Summary The past week has seen a renewed interest on the part of the security community in the reliability of hard disk encryption. With the recent revelation that data on encrypted drives is vulnerable to unauthorized access via memory manipulation, … Continue reading
Posted in Security Reviews
Comments Off on Security Review: Full disk encryption
Security Review: Cell Phone GPS
With the increasing popularity of auto-enabled GPS features in cell phones, a group at UC Berkeley is experimenting with using the phones as a means to gather real-time traffic information. The phones will broadcast their locations back to a central server … Continue reading
Posted in Privacy, Security Reviews
3 Comments
AT&T Investigating Copyrighted Material Network Filter
In one of the more interesting stories to come out of the telecom industry in recent weeks, the New York Times is reporting that AT&T is currently in the testing phases of developing a network filter that will monitor their … Continue reading
Posted in Current Events, Privacy
Comments Off on AT&T Investigating Copyrighted Material Network Filter
Security Review – The USPS Mailbox
Overview The blue USPS mailbox, a ubiquitous object on American streets today, is one of the most recognizable security devices currently in use. Despite its many shapes and sizes, its purpose boils down simply to one of protection of privacy, … Continue reading
Posted in Physical Security, Security Reviews
2 Comments