Blog Posts Tagged with "Research"

69dafe8b58066478aea48f3d0f384820

Researchers Develop No-Proxy Anonymity System

July 18, 2011 Added by:Headlines

"The client secretly marks the connection as a Telex request by inserting a cryptographic tag into the headers. We construct this tag using a mechanism called public-key steganography... only the Telex service (using a private key) can recognize that a connection has been tagged..."

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Seventy-Seven Percent of Organizations Lost Data

June 09, 2011 Added by:Headlines

“With hundreds of data loss incidents every year – both reported and unreported – it’s no surprise the issues with governance, risk and compliance are being magnified. Data security in a modern day world means more than deploying a set of technologies to overcome these challenges..."

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

On Gartner's SIEM Magic Quadrant 2011

May 29, 2011 Added by:Anton Chuvakin

I think the concept of Magic Quadrant is brilliant. However, many wrong SIEM purchase decisions I’ve seen made usually stem from the decision maker’s own ignorance and not from whatever document or market visualization he has in his possession. Keep this in mind…

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Researcher Nabs Details from 35 Million Google Profiles

May 26, 2011 Added by:Headlines

“I wrote a small bash script to download all the sitemap-NNN(N).txt files mentioned in that file, and attempted to download 10k, then 100k, than 1M and then, utterly surprised that my connection wasn't blocked or throttled or CAPTCHA'd, [downloaded] the rest of them..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Email Malware Increases 400% Since Rustock Takedown

April 13, 2011 Added by:Headlines

The first quarter of 2011 was also witness to a broad range of attempts to distribute malware, and increased malware levels overall. These attempts included malware sent through Facebook chat, or which used other wellknown brand-names such as T-Online and Xerox...

Comments  (0)

634ff692af43fd4dc5dab3b8590c77d6

Parallelized Data Mining Security

April 12, 2011 Added by:K S Abhiraj

Problems with protecting hosts from malicious code are understood. The problem posed by malicious hosts to entities and the environment is more complex. Since an entity is under the control of the executing host, the host can in principle do anything to the event and its code...

Comments  (2)

37d5f81e2277051bc17116221040d51c

Twenty Percent of Online Fraud is “Friendly”

April 08, 2011 Added by:Robert Siciliano

Friendly fraud accounted for twenty percent of fraud affecting merchants. Friendly fraud is when a consumer purchases an item online, receives it, but claims they did not, then requests a refund or chargeback from the merchant or delivery of a duplicate item...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Researchers Map IP Address Locations Within 700 Meters

April 08, 2011 Added by:Headlines

Computer scientist and researcher Yong Wang and his colleagues have developed a methodology to determine the physical location of Internet users. The researchers demonstrated they are able to pinpoint the location of an IP address on average to within about 690 meters...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Report Shows Energy Infrastructure Susceptible to Attack

April 07, 2011 Added by:Anthony M. Freed

In the case of defending critical infrastructure, translating security concerns for the CxO level needs to go beyond merely conveying network defense efforts in terms of mitigating enterprise risk, the conversation needs to touch on the issue of strengthening our national security...

Comments  (1)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

Building More Secure Passwords

April 07, 2011 Added by:Global Knowledge

As users have to create several passwords for different systems and change them every 60 or 90 days, it’s little wonder they default to the least complicated password their systems allow and make only minor variations when forced to change them. Unfortunately, such passwords are easy to guess...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Videos and Multimedia are Most Popular Malware Traps

April 01, 2011 Added by:Headlines

"Users continue to fall victim to malicious links offering to take them to an exciting video or the new episode of their favorite TV show. This technique has become a weapon of choice for hackers as it requires minimum investment and attracts a large number of victims..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Majority of Used Mobile Devices Contain Personal Data

March 23, 2011 Added by:Headlines

The researchers found that used mobile devices still contained passwords, bank account information, contact lists, credit and debit card PIN numbers, and login credentials for social networking sites, leaving previous owners susceptible to identity theft and fraud...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Social Security Numbers Easily Cracked

March 02, 2011 Added by:Robert Siciliano

Researchers at Carnegie Mellon have developed a reliable method for predicting Social Security numbers using information from social networking sites, data brokers, voter registration lists, online white pages, and the publicly available Social Security Administration’s Death Master File...

Comments  (0)

49afa3a1bba5280af6c4bf2fb5ea7669

Research Roundup: Rootin’ Through the Data

February 17, 2011 Added by:Mike Meikle

One of the biggest problems we face as security professionals is information overload. Our inboxes look like the warehouse from Raiders of the Lost Ark, Twitter releases a fire hose of information in our faces and then we have a stack of print publications teetering in the corner...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Senator Proposes New Cybersecurity Legislation

February 10, 2011 Added by:Headlines

"Cyber-threats are not on the horizon, they are upon us. Businesses and investors must trust that their investments are secure. We cannot allow security breaches to undermine our trust in the U.S. economy," said Senator Menendez...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Cyber Attacks Less Costly, More Common?

February 08, 2011 Added by:Bill Gerneglia

The average cost of cyber attack declined significantly last year, but survey sponsors said the finding might be misleading. A spokesman for the company that paid for the study said that could be due to organizations reclassifying losses as related to privacy and fraud rather than cyber security...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »