Blog Posts Tagged with "Research"
Researchers Develop No-Proxy Anonymity System
July 18, 2011 Added by:Headlines
"The client secretly marks the connection as a Telex request by inserting a cryptographic tag into the headers. We construct this tag using a mechanism called public-key steganography... only the Telex service (using a private key) can recognize that a connection has been tagged..."
Comments (2)
Seventy-Seven Percent of Organizations Lost Data
June 09, 2011 Added by:Headlines
“With hundreds of data loss incidents every year – both reported and unreported – it’s no surprise the issues with governance, risk and compliance are being magnified. Data security in a modern day world means more than deploying a set of technologies to overcome these challenges..."
Comments (0)
On Gartner's SIEM Magic Quadrant 2011
May 29, 2011 Added by:Anton Chuvakin
I think the concept of Magic Quadrant is brilliant. However, many wrong SIEM purchase decisions I’ve seen made usually stem from the decision maker’s own ignorance and not from whatever document or market visualization he has in his possession. Keep this in mind…
Comments (1)
Researcher Nabs Details from 35 Million Google Profiles
May 26, 2011 Added by:Headlines
“I wrote a small bash script to download all the sitemap-NNN(N).txt files mentioned in that file, and attempted to download 10k, then 100k, than 1M and then, utterly surprised that my connection wasn't blocked or throttled or CAPTCHA'd, [downloaded] the rest of them..."
Comments (0)
Email Malware Increases 400% Since Rustock Takedown
April 13, 2011 Added by:Headlines
The first quarter of 2011 was also witness to a broad range of attempts to distribute malware, and increased malware levels overall. These attempts included malware sent through Facebook chat, or which used other wellknown brand-names such as T-Online and Xerox...
Comments (0)
Parallelized Data Mining Security
April 12, 2011 Added by:K S Abhiraj
Problems with protecting hosts from malicious code are understood. The problem posed by malicious hosts to entities and the environment is more complex. Since an entity is under the control of the executing host, the host can in principle do anything to the event and its code...
Comments (2)
Twenty Percent of Online Fraud is “Friendly”
April 08, 2011 Added by:Robert Siciliano
Friendly fraud accounted for twenty percent of fraud affecting merchants. Friendly fraud is when a consumer purchases an item online, receives it, but claims they did not, then requests a refund or chargeback from the merchant or delivery of a duplicate item...
Comments (0)
Researchers Map IP Address Locations Within 700 Meters
April 08, 2011 Added by:Headlines
Computer scientist and researcher Yong Wang and his colleagues have developed a methodology to determine the physical location of Internet users. The researchers demonstrated they are able to pinpoint the location of an IP address on average to within about 690 meters...
Comments (0)
Report Shows Energy Infrastructure Susceptible to Attack
April 07, 2011 Added by:Anthony M. Freed
In the case of defending critical infrastructure, translating security concerns for the CxO level needs to go beyond merely conveying network defense efforts in terms of mitigating enterprise risk, the conversation needs to touch on the issue of strengthening our national security...
Comments (1)
Building More Secure Passwords
April 07, 2011 Added by:Global Knowledge
As users have to create several passwords for different systems and change them every 60 or 90 days, it’s little wonder they default to the least complicated password their systems allow and make only minor variations when forced to change them. Unfortunately, such passwords are easy to guess...
Comments (1)
Videos and Multimedia are Most Popular Malware Traps
April 01, 2011 Added by:Headlines
"Users continue to fall victim to malicious links offering to take them to an exciting video or the new episode of their favorite TV show. This technique has become a weapon of choice for hackers as it requires minimum investment and attracts a large number of victims..."
Comments (0)
Majority of Used Mobile Devices Contain Personal Data
March 23, 2011 Added by:Headlines
The researchers found that used mobile devices still contained passwords, bank account information, contact lists, credit and debit card PIN numbers, and login credentials for social networking sites, leaving previous owners susceptible to identity theft and fraud...
Comments (0)
Social Security Numbers Easily Cracked
March 02, 2011 Added by:Robert Siciliano
Researchers at Carnegie Mellon have developed a reliable method for predicting Social Security numbers using information from social networking sites, data brokers, voter registration lists, online white pages, and the publicly available Social Security Administration’s Death Master File...
Comments (0)
Research Roundup: Rootin’ Through the Data
February 17, 2011 Added by:Mike Meikle
One of the biggest problems we face as security professionals is information overload. Our inboxes look like the warehouse from Raiders of the Lost Ark, Twitter releases a fire hose of information in our faces and then we have a stack of print publications teetering in the corner...
Comments (0)
Senator Proposes New Cybersecurity Legislation
February 10, 2011 Added by:Headlines
"Cyber-threats are not on the horizon, they are upon us. Businesses and investors must trust that their investments are secure. We cannot allow security breaches to undermine our trust in the U.S. economy," said Senator Menendez...
Comments (0)
Cyber Attacks Less Costly, More Common?
February 08, 2011 Added by:Bill Gerneglia
The average cost of cyber attack declined significantly last year, but survey sponsors said the finding might be misleading. A spokesman for the company that paid for the study said that could be due to organizations reclassifying losses as related to privacy and fraud rather than cyber security...
Comments (0)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps
- A New Strategy for DDoS Protection: Log Analysis on Steroids
- COVID-19 Aside, Data Protection Regulations March Ahead: What To Consider