Category Archives: Integrity
Phalanx attains Slashdot fame!
I’m not sure if many people read this blog, but I recently noticed that the UW project Phalanx (slides, paper, and poster available from Colin Dixon’s site, recently featured on Slashdot) brought up the idea of countering botnets by setting … Continue reading
In-Flight Web Page Modifications
Our research group (Charlie Reis, Yoshi Kohno, and Steve Gribble from UW CSE, and Nick Weaver from ICSI) has just presented a measurement study showing that many users are receiving web pages that have been modified in-flight. The pages are … Continue reading
Security Review: The Human Heart
As our professor has continually emphasized throughout the quarter, one of the primary aims of our course has been to go beyond technical details of current computer security in order to learn the security mindset. This new way of thinking … Continue reading
Collaborative Current Event: Counterfeit Cisco Network Hardware Imported From China Seized
http://www.thestandard.com/news/2008/02/29/us-canadian-agencies-seize-counterfeit-cisco-gear USA and Canadian law enforcement has seized US$78 million worth of Cisco routers, switches, and network cards in 400 seizures since the coordinated operation between the two nations was launched in 2005. The reason for the seizures is “illegal … Continue reading
16 hackers got arrested in Quebec recently
Recently, the police department in Quebec, Canada, busted an international hacking network. 16 people that were between the ages of 17 and 26 were arrested and this was the biggest hacking scam in Canadian history according to the police. These … Continue reading
Security Review: IE7 Protected Mode
The latest version (7) of Microsoft’s Internet Explorer web browser, like their latest Windows (Vista) operating system, is supposed to be the most secure version in the product’s history. A complete security review of either IE7 or Vista is outside … Continue reading
Security Review: Deep Siren
According to Scientific American, the US Navy is considering to deploy a new technology, Deep Siren, to improve communication to and from submerged submarines. As of now, submarines have to be no deeper than 60 feet and towing a floating … Continue reading
Security Review: Mac OS X Dashboard Widgets
The Mac OS X Dashboard is a platform for developing small applications, or Widgets, that can be accessed and hidden quickly at any time within the OS. Common widgets tasks include simple calendars, calculators, games, weather tracking, and system monitoring. … Continue reading
Diebold/Premier Voting Machine Key Copied
Adding to the current furor of news surrounding the issue of electronic voting machines, an egregious mistake by American voting machine producer Diebold (now known as Premier Election Systems) has lead to heightened doubts concerning the integrity of electronic voting. … Continue reading
Maryland abandons e-voting machines for paper ballots
The state of Maryland has decided, after spending $65 million on electronic voting machines made by Premier (formerly known as Diebold) Election Systems, to spend another $20 million on optical-scan machines that read paper ballots. The reason for this incredible … Continue reading