UW Computer Security Research and Course Blog
Pages
-
Recent Posts
- Moving to a Forum
- Current Event – A Broader Look on Wireless Access Point Vulnerabilities
- Current Event : Keyboard hacking (from thin air!)
- Security Review: Urban Chicken Coops
- Google’s Online Library
- Security Review: New Weapons in the Fight Against Doping
- Security Review: Helios Online Voting
- Security Review: Online Taxes
- Security Review: Eye-Fi
- Security Review: Hollywood Awards Presentations
Recent Comments
- Mike on Current Event – A Broader Look on Wireless Access Point Vulnerabilities
- Evil Rocks on Current Event: California Politician Wants All Satellite Imagery of Schools, Churches, and Government Buildings to Be ‘Blurred’
- Evil Rocks on Security Review: Apartment Complex Rent Drop-boxes
- jap24 on Current Event: California Politician Wants All Satellite Imagery of Schools, Churches, and Government Buildings to Be ‘Blurred’
- UW Computer Security Research and Course Blog » Security Review: Google Voice on Security Review – Google Voice
- Matt on Current Event: Kremlin loyalist admits to launching DDoS attack on Estonia
- Claudel on Current Event: Telegraph website hacked
- alexmeng on Security Review: Portable Computing
- alexmeng on Current events: Adobe Reader Vulnerability
- Father_Of_1000000 on Facebook’s lax security
- Lisa P on Security Review: Automobiles
- Matt on Security Review: Portable Computing
- devynp on Security Review: Portable Computing
- liaowt on Current Event: The Elusive Tigger.A Trojan
- Josh Goodwin on Security Review: Automobiles
Archives
Categories
Course Staff
Security Blogs
UW CSE Resources
March 2026 M T W T F S S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Meta
Category Archives: Privacy
Storm worm cracked, but defenses may not fly
The Storm worm, noticed for the first time on January 17th, 2007, is one of the more notorious worms of the last few years. Targetted initially towards individual Windows machines, victims were often infected after receiving a bait e-mail with … Continue reading
Posted in Current Events, Ethics, Policy, Privacy, Research
Tagged Bonn University, RWTH Aachen University, Storm, Windows security, worm
3 Comments
Current Events – Undocumented Chip in Wii
“Update. This entry was updated on <January 9, 2009> to reflect a <re-interpretation of the original article>. After several years that Wii have been launch, hackers found flaws in Wii’s security aspect. According to an article from Nintendo World Report, … Continue reading
Posted in Current Events, Physical Security, Privacy
3 Comments
Security Review: Wireless Home Automation Systems
Summary:Home automation systems in general attempt to enable home owners to have a “smart” house. Instead of light switches you have integrated panels that control everything from your lights, to your shades, to your entertainment system, climate control, alarm system, … Continue reading
Posted in Physical Security, Privacy, Security Reviews
4 Comments
Current Events: British Police Want DNA of Children
From The Guardian, and on Slashdot. Police in the United Kingdom may soon be be able to collect DNA samples from children if they exhibit behaviors that suggest they may commit crimes later in life, at least if Scotland Yard … Continue reading
Posted in Current Events, Ethics, Physical Security, Policy, Privacy
Tagged children, civil rights, DNA, police
3 Comments
Security Review: Car GPS Navigation Systems
Summary Car GPS navigation systems are handy tool for finding one’s way on the road. With features like local points of interest, address book and SD card backup it would not be surprising if becomes a common everyday item soon. … Continue reading
Posted in Availability, Privacy, Security Reviews
8 Comments
Security Review – GSM Cellphones
I’ve seen a few people on this blog cover various aspects of cellphone security, including the new iphone 3rd party support and GPS tracking, however I haven’t seen anything covering the most basic of cellphone features, voice communication. It seems … Continue reading
Posted in Privacy, Security Reviews
3 Comments
Current Events: No need for jello, fingerprint USB sticks are easy to crack.
No need to go to great lengths to try to spoof finger print scanners on USB sticks. You can just tell the device that the data is public. Researches discovered this vulnerability in models from 9pay and A-Data fingerprint USB … Continue reading
Posted in Current Events, Privacy
Comments Off on Current Events: No need for jello, fingerprint USB sticks are easy to crack.
The House on Amending FISA Act
Today the House of Representatives voted on a bill that would amend the FISA Act of 1978, which deals with government wiretapping. The amendments would deny amnesty to telecommunication industries for complying with illegal warrant less wiretaps by the Bush … Continue reading
Posted in Current Events, Policy, Privacy
Comments Off on The House on Amending FISA Act
Security Vulnerability in Mac OS X – LoginWindow.app
A security vulnerability in loginwindow.app on Mac OS X was reported to bugtraq this week. The vulnerability is that the user password is still resident in memory after the system authenticates the user.
Posted in Current Events, Privacy
2 Comments
Facebook storing your information
While this may not be breaking news, it turns out that Facebook has taken just one more step in not respecting their user’s privacy. According to a semi-recent article in the New York Times, Facebook retains user profile information even after the … Continue reading
Posted in Current Events, Ethics, Policy, Privacy
5 Comments