UW Computer Security Research and Course Blog
Pages
-
Recent Posts
- Moving to a Forum
- Current Event – A Broader Look on Wireless Access Point Vulnerabilities
- Current Event : Keyboard hacking (from thin air!)
- Security Review: Urban Chicken Coops
- Google’s Online Library
- Security Review: New Weapons in the Fight Against Doping
- Security Review: Helios Online Voting
- Security Review: Online Taxes
- Security Review: Eye-Fi
- Security Review: Hollywood Awards Presentations
Recent Comments
- Mike on Current Event – A Broader Look on Wireless Access Point Vulnerabilities
- Evil Rocks on Current Event: California Politician Wants All Satellite Imagery of Schools, Churches, and Government Buildings to Be ‘Blurred’
- Evil Rocks on Security Review: Apartment Complex Rent Drop-boxes
- jap24 on Current Event: California Politician Wants All Satellite Imagery of Schools, Churches, and Government Buildings to Be ‘Blurred’
- UW Computer Security Research and Course Blog » Security Review: Google Voice on Security Review – Google Voice
- Matt on Current Event: Kremlin loyalist admits to launching DDoS attack on Estonia
- Claudel on Current Event: Telegraph website hacked
- alexmeng on Security Review: Portable Computing
- alexmeng on Current events: Adobe Reader Vulnerability
- Father_Of_1000000 on Facebook’s lax security
- Lisa P on Security Review: Automobiles
- Matt on Security Review: Portable Computing
- devynp on Security Review: Portable Computing
- liaowt on Current Event: The Elusive Tigger.A Trojan
- Josh Goodwin on Security Review: Automobiles
Archives
Categories
Course Staff
Security Blogs
UW CSE Resources
March 2026 M T W T F S S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Meta
Category Archives: Availability
Linux Desktop Security Vulnerabilities
A common method for infection of many operating systems is a malicious executable file–either sent in an email or downloaded otherwise–that the user simply double clicks without thinking. Linux .desktop files allow arbitrary code execution without the need for an executable bit set on the file. Continue reading
Posted in Availability, Current Events
Tagged Linux, security
Comments Off on Linux Desktop Security Vulnerabilities
Wikipedia Editing Could Be Made More Restrictive Due to Vandalism
According to this article, the English version of Wikipedia may be implementing a system called “flagged revisions” to the editing software, which would require that edits would have to be approved (“flagged”) by a “trusted” user (see the Wikipedia page … Continue reading
Security Review: Network Solutions’ Worldnic Domain Name Hosting Service
Network Solutions runs one of the largest domain registrars and DNS hosting providers in the world. It currently hosts more than 7.5 million domain names, including many of the most popular web sites on the Internet. The domain name servers … Continue reading
Posted in Availability, Security Reviews
Comments Off on Security Review: Network Solutions’ Worldnic Domain Name Hosting Service
Security Review: “Smart Guns”
Overview This is a security review of “Smart Guns,” a general class of locking/use prevention mechanisms for firearms that rely on biometrics or other authentication indicators (such as “smart” chips embedded in the gun and in rings or other tokens … Continue reading
Posted in Availability, Physical Security, Policy, Security Reviews
18 Comments
Security Review: Car GPS Navigation Systems
Summary Car GPS navigation systems are handy tool for finding one’s way on the road. With features like local points of interest, address book and SD card backup it would not be surprising if becomes a common everyday item soon. … Continue reading
Posted in Availability, Privacy, Security Reviews
8 Comments
Amazon’s S3 Outage: Usage spike or DDoS attack?
Amazon’s Simple Storage Service (S3) experienced an outage on the morning of February 15th, causing inaccessible content in the thousands of websites that rely on S3 for data storage. According to Amazon’s official explanation, the outage was due to a … Continue reading
Posted in Availability, Current Events
Comments Off on Amazon’s S3 Outage: Usage spike or DDoS attack?
ISP vs. BitTorrent
Since ISPs, most notably Comcast, some time ago began identifying and purposefully destroying or severely throttling BitTorrent connections passing through their networks, the struggles on both sides of the fence have been nothing short of a game of cat and … Continue reading
Posted in Availability, Current Events, Privacy
2 Comments
Security Review: Quiet Care
Home monitoring systems like Quiet Care exist to allow independent living for elderly people. The system works by monitoring the person’s daily movements with wireless activity sensors in each room. The information collected from these sensors is gathered at a … Continue reading
Posted in Availability, Privacy, Security Reviews
5 Comments
Four Undersea Cables Cut In Middle East In Less Than a Week
As many of you may have heard, two undersea cables were cut on January 31st severing internet to millions of users in the middle east. At first it was reported that these cables were severed by a ship’s anchor, but … Continue reading
Pillaged MySpace Photos Show Up in BitTorrent Download
More than half of the million images that are private photos of MySpace users was stolen and uploaded onto BitTorrent. This is a huge privacy breach to MySpace users. The hacker, “DMaul”, said that he learned the security hole from … Continue reading
Posted in Availability, Current Events, Privacy
5 Comments