Blog Posts Tagged with "Research"

69dafe8b58066478aea48f3d0f384820

Researchers Crack RSA SecurID Tokens, Extract Keys

June 25, 2012 Added by:Headlines

"[These products are] designed specifically to deal with the case where somebody gets physical access to it or takes control of a computer that has access to it... Here, if the malware is very smart, it can actually extract the keys out of the token.That's why it's dangerous"...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

Dangers of Scanning QR Codes: Interview with Eric Mikulas

June 25, 2012 Added by:Fergal Glynn

Consumers make the mistake of trusting unreadable QR codes (unreadable by humans) that could really take a person anywhere. With all the vulnerabilities that are discovered on a regular basis with smart phones, it is only a matter of time until we see an explosion in malware for mobile platforms...

Comments  (0)

E376ca757c1ebdfbca96615bf71247bb

Medical Device Security: This Time It’s Personal

June 22, 2012 Added by:shawn merdinger

The work done by security researchers on their own devices is only the beginning of what we can expect will be a deluge of medical device related vulnerabilities, and it’s worthwhile to explore some of the reasons as to why the current situation is the way it is now...

Comments  (0)

4ff49873e3fed9a24adf0d37ae00b780

The Debate When it Comes to Monetizing Security Flaws

June 20, 2012 Added by:Lee Munson

Some people think that if you try to profit on your discovery, then no matter what your intentions are, the discovery could be used for non ethical goals. They think that it does not matter if it is a good guy or a bad guy who gets the information. They think that both parties have the potential for abuse...

Comments  (0)

F2792196079f2c16cd02be6e9ff5b3da

The Fear Factor in Information Security

June 13, 2012 Added by:DHANANJAY ROKDE

Vendors are increasingly using the fear factor and coarse tactics to pressure information security managers into deploying rather unnecessary technologies and products. Why have we never heard of a vendor pitch claiming responsibility of failure to protect a company’s infrastructure?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Researchers Developing Self-Defending Networks

May 15, 2012 Added by:Headlines

"This is a game-changing idea in cybersecurity.... we are currently losing against online attackers. In order to fundamentally change the cybersecurity landscape and reduce that high risk we need some big, fundamental changes to the way computers and networks are constructed..."

Comments  (0)

B9d9352326e5421a02e698a51d10ad2c

Cybercrime Does(n't?) Pay

May 14, 2012 Added by:Beau Woods

Although many studies fail at basic science, I'm hopeful that the information security industry will get better both at true academic research and at coming up with accurate metrics for the most important data. We'll get there as we mature as an industry, but it will take a while...

Comments  (0)

53692ae1a8e713373b8a487ce89ee3e2

Are We Reaching Security Conference Overload?

May 13, 2012 Added by:Tom Eston

We have more security and hacking conferences than ever, but now there is also more overlap. These choices can make it harder for researchers to present new and relevant content and also tough to decide which conferences to attend from a attendee perspective...

Comments  (0)

01ceb9281b3fb3dbb90c3efbe327717e

Law Of First Digits and How It Might Lead To More Trust

May 03, 2012 Added by:Alan Woodward

It might be as simple as whether an image has been altered to whether large data sets should be used to make a critical business decision. Benford's law and its generalized forms can help us decide whether or not we can trust some electronic data we may be about to rely upon...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

ENISA Seeks Experts for Permanent Stakeholders Group

April 26, 2012 Added by:Infosec Island Admin

The PSG will be composed of 30 leading experts in network and information security, and should represent the information and communications industry, consumer and user organizations, as well as academic and research institutions. Submit applications by April 30, 2012...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Russian Cybercrime: Not Just a Localized Threat

April 25, 2012 Added by:Pierluigi Paganini

The official estimates say that the global cyber crime market was worth $12.5 billion in 2011, and $4,5 billion of the market share is related to the Russian cybercrime market with $2.3 billion taking place in Russia alone. Compared to last year, the problem has doubled...

Comments  (0)

E973b16363b3de77b360563237df7e32

Observations on Lack of Research in Social Engineering

April 19, 2012 Added by:Bozidar Spirovski

The attack was performed by multiple phone calls which created contact with multiple targets. Each call was a probing attempt to collect as much information possible. The first and second stage of the attack was aimed at the same targets but with several days delay between stages...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Microsoft Dismisses Zeus Botnet Takedown Criticism

April 17, 2012 Added by:Headlines

"The chief criticism is that the Microsoft operation exposed sensitive information that a handful of researchers had shared in confidence, and that countless law enforcement investigations may have been delayed or derailed as a result..."

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Disagreement on Password Vault Software Findings

April 12, 2012 Added by:Brent Huston

Recently, some researchers have been working on comparing password vault software products and have found some issues. However, many of the vendors are quickly moving to remediate the identified issues, many of which were simply improper use of proprietary cryptography schemes...

Comments  (1)

B8db824b8b275afb1f4160f03cd3f733

Vendor Research: Look These Gift Horses in the Mouth

March 29, 2012 Added by:Jack Daniel

The problem is that a lot of the data leaves me wanting more. More details on the data we get, just plain “more data”, and more context. I also want more honesty about the shortcomings of the reports and data. Let’s not even talk about some of the bizarre conclusions...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

CIOs See Growth in IT Budgets and Staff for 2012

March 27, 2012 Added by:Bill Gerneglia

After several years of stagnant or negative growth, most companies are now projecting a 3-4 percent increase in IT budgets and staffing for this year, which can be seen as acknowledgement that IT is critical if companies are to execute on their aggressive growth plans...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »