Category Archives: Ethics
Weak Password
According to yahoo!News, the statistics of 28,000 passwords that are recently stolen from a popular US website that is posted in physorg.com “16 percent took a first name as a password … 14 percent relied on the easiest keyboard combinations … Continue reading
Current Event: Kaspersky Hacked
Kaspersky, an Antivirus vendor and Internet Security Lab, recently fell victim to an internet hacker using an SQL-injection attack. The attack compromised data in all databases accessible to the web server. According to the hacker, “Alter one of the parameters … Continue reading
Security Review: The Bike and its Lock
EDIT: It appears that I goofed with the “more” tag when I first posted this, so I’ve included the rest of the article below. Since the days of waking up at 5am to watch the Tour de France live with … Continue reading
Current Event: Google Releases ‘Latitude’
Google has released a new product called ‘Latitude’. It is an extension based on the extremely popular Google Maps web application that allows users to track the exact location of friends and family members using the GPS signal in their … Continue reading
Current Event: racial profiling no more effective than random screening
In “Study: racial profiling no more effective than random screen”, ArsTechnica reports on a new study by William Press, who claims that using profiling at security checkpoints such as airports is not effective in catching threats. The ineffectiveness, according to … Continue reading
Current Event: Rigged Red Lights
Summary In Italy, public officials have been abusing their authority to make more money from the public by making reds come earlier than they are supposed to (a shorter duration yellow than legally allowed). This means that, since they use … Continue reading
UW CSE Resources
As an undergraduate student in the computer science department, there are a number of computing resources available for use. A number of these resources are through the web browser, and have private, personal information associated with them (for instance, MyCSE). … Continue reading
Security Professional Works as Botmaster
Security Professional John Schiefer has continued to work in the computer security field for 15 months while he has been waiting to be sentenced for being a botmaster of a 250,000 bot herd (http://www.theregister.co.uk/2009/01/23/botmaster_sentencing_kerfuffle/). This Los Angeles based security consultant … Continue reading
Security Review: Pandemic Prevention
According to a New Scientist Article, a company called Biorics wants to control the spread of pandemic disease by dispersing “cough-detecting” microphones throughout airport lounges. The proposed technology would detect coughing passengers and distinguish a common-cold-like cough from one that … Continue reading
Current events: Sony Ericsson a victim of its own employee
Issues of stealing physical or intellectual property (physically or electronically) in the context of a malicious company insider are closely interrelated, as some common prevention mechanisms can be adopted for both. According to the recent article by Mikael Ricknas, cell … Continue reading