Quantcast

Archive: Mar 2012

“How safe is your browser?” – 3: unique browser fingerprints and trackability prevention

Read previous: “How safe is your browser?” – 2: Trackable browser fingerprints Peter Eckersley moves on with his instructive talk on browser uniqueness. The final part of his speech explicates the issue of browser fingerprints that are constant over time, lists the browsers best coping with this...

“How safe is your browser?” – 2: Trackable browser fingerprints

Read previous: “How safe is your browser?” – Peter Eckersley on personally identifiable information basics The second part of Peter Eckersley’s Defcon talk called “How unique is your browser?” is dedicated to describing the ‘Panopticlick’ experiment set up by the Electronic...

“How safe is your browser?” – Peter Eckersley on personally identifiable information basics

Technology Projects Director for EFF Peter Eckersley speaks at Defcon 18 on methods for identifying a person based on different sets of information, including data like one’s ZIP code, birthdate, age and gender, gradually shifting the focus onto some computer-based criteria such as cookies, IP address,...

Defending the Net: Mikko Hypponen on current privacy issues

Computer security analyst Mikko H. Hypponen presents his talk at TEDxBrussels event dedicated to the present-day privacy concerns, providing specific examples of such breaches and emphasizing the consequences. Mr. Hypponen also speaks on the three groups of online attackers and outlines the differences in...

“Who unleashed Stuxnet?” – Mikko Hypponen on the origin of the Stuxnet virus

The well-known malware researcher Mikko Hypponen (CRO at F-Secure) speaks on the probable origin and objectives of the notorious Stuxnet virus, outlines mobile malware issues and sheds some light on the mysteries around Conficker worm. When Stuxnet was originally found in summer of 2010, we didn’t really...

The History and the Evolution of Computer Viruses: 2009-2011

This is the final part of Mikko Hypponen’s Defcon 19 speech where he dwells on the latest cyber infections that appeared after 2009 and stay active up till now. It took virus writers years to create some of those, so they were made very sophisticated and barely comparable with the older threats in...

The History and the Evolution of Computer Viruses: 2003-2008

Continuing his talk at Defcon 19, F-Secure’s CRO Mikko Hypponen analyzes the shift that took place in the computer virus world around 2003. In this part, he is focusing on moneymaking techniques implemented through keyloggers, spam generating viruses, bots and rootkits. 2003 – 2005 But something even...

The History and the Evolution of Computer Viruses: 2001-2004

What were the main cyber challenges in 2001-2004? These and some other issues are thoroughly addressed in part 4 of Mikko Hypponen’s Defcon 19 speech called “The History and the Evolution of Computer Viruses”. 2001 – 2004 …But then things started changing. We entered the years of...

The History and the Evolution of Computer Viruses: 1996-2001

In the third part of his talk, Mikko Hypponen proceeds with the chronological analysis of digital threats, emphasizing the dominating tendencies on the arena of computer viruses during the period 1996-2001: the influx of email worms and Windows network share replicating viruses. 1996 – 2001 The early...

The History and the Evolution of Computer Viruses: 1991-1996

Second part of Mikko Hypponen’s speech “The History and Evolution of Computer Viruses” which encompasses the time frame 1991-1996 and reviews funny DOS viruses, some of the first Windows infections and quite a bit more stuff you should find interesting. 1991 – 1992 Now, many of you...

The History and the Evolution of Computer Viruses: 1986-1991

CRO at F-Secure Mikko Hypponen provides a captivating insight into the onset and advancement of computer infections in his talk at Defcon 19 called “The History and the Evolution of Computer Viruses”. This part of the speech is dedicated to a detailed description of the first viruses that came on...

Spam in social networks: Mikko Hypponen and Sean Sullivan on new spam issues

We are pleased to present a relevant discussion of the present-day social networking spam issues from a professional perspective. The experts participating in the talk are the famous ‘malware adventurer’ and F-Secure’s CRO Mikko Hypponen, and Sean Sullivan – Security Advisor at...

How to hack Facebook account 4: Geolocation via cross-site scripting

Read: How to hack Facebook account: Facebook profile hacking by PHP session hijacking Read: How to hack Facebook account 2: using LCG for Facebook profile hacking Read: How to hack Facebook account 3: applying Cross-Protocol Scripting to attack victim’s network In the final part of Samy’s talk...

How to hack Facebook account 3: applying Cross-Protocol Scripting to attack victim’s network

Read: How to hack Facebook account: Facebook profile hacking by PHP session hijacking Read: How to hack Facebook account 2: using LCG for Facebook profile hacking Having hacked the targeted Facebook account, which is outlined in the previous part of the speech, Samy Kamkar manages to get into the prey’s PC...

Avira Free Antivirus review

Free Avira Free Antivirus is able to keep you safe and sound in troubled waters of the modern Internet and other cyber areas. Usability:  Features:  Efficiency:  Support:  Overall:  Download Selecting an antivirus is a hard nut to crack, and it is hard to say what product will...

Evidence Eliminator 6 review

$99.95 Evidence Eliminator 6 is reliable old-school software for guaranteed removal of your private information. Corporate website is currently unavailable. Usability:  Features:  Efficiency:  Support:  Overall:  Download Privacy sounds like a mantra to those who are savvy...

How to hack Facebook account 2: using LCG for Facebook profile hacking

Read: How to hack Facebook account: Facebook profile hacking by PHP session hijacking Samy Kamkar continues his talk “How I Met Your Girlfriend” on hacking Facebook account, shedding some light on the use of LCG for reducing the amount of entropy So let’s take a little closer look. If...

How to hack Facebook account: Facebook profile hacking by PHP session hijacking

Security researcher and former hacker Samy Kamkar delivers a speech at Defcon called “How I Met Your Girlfriend” where he introduces a PHP-based method of compromising a Facebook account for strictly personal purposes. Below is the adapted text version of his talk. So this is a discovery and...

You will be billed $90,000 for this call 4: mobile malware distribution patterns and protection tips from F-Secure

Read: You will be billed $90,000 for this call: Mikko Hypponen (F-Secure) on Dialers, telephone fraud, mobile malware Read: You will be billed $90,000 for this call 2: F-Secure detects trojan malware in mobile game Read: You will be billed $90,000 for this call 3: F-Secure discloses mobile app virus...

F-Secure Mobile Security review

$27.53 F-Secure Mobile Security is a complete solution for your smartphones and tablet computers. Usability:  Features:  Efficiency:  Support:  Overall:  Download The inception of due mobile security is all about the measures taken for assuring it. Idle approach of doing...

You will be billed $90,000 for this call 3: F-Secure discloses mobile app virus attacks

Read: You will be billed $90,000 for this call: Mikko Hypponen (F-Secure) on Dialers, telephone fraud, mobile malware Read: You will be billed $90,000 for this call 2: F-Secure detects trojan malware in mobile game These fraud phone numbers are built so that they actually fund money back to the person...

You will be billed $90,000 for this call 2: F-Secure detects trojan malware in mobile game

Read: You will be billed $90,000 for this call: Mikko Hypponen (F-Secure) on Dialers, telephone fraud, mobile malware Alright, so let’s think from the bad part point of view. This doesn’t work if they wanna have premium rate numbers, wanna extract money automatically with malware. They have to do it...

You will be billed $90,000 for this call: Mikko Hypponen (F-Secure) on Dialers, telephone fraud, mobile malware

F-Secure’s Chief Research Officer Mikko Hypponen speaks on telephone fraud schemes leading to money theft. Hi everybody, my name is Mikko Hypponen, and we’ll be spending the next 30 minutes in this turbo talk, talking about ‘You will be billed 90,000 dollars for this call’ So, let me just...

Changing threats to privacy 4: Moxie Marlinspike on PGP, OTR encryption and mobile privacy.

Again, if I’m looking into the future, the first thing I wanna do is deal with the choices that aren’t really choices. The second thing I wanna do is worry a little bit less about information freedom. And the third thing is I wanna worry a lot more about forward security and this key disclosure problem....

Folder Lock 7 review

$39.95 Folder Lock is superb encryption software you can trust and rely on. Usability:  Features:  Efficiency:  Support:  Overall:  Download The need for reliable data encryption occurs when confidentiality and privacy acquire a special significance. Intactness of your...

Changing threats to privacy: Moxie Marlinspike on privacy threats at Defcon. Part 3.

So one project that I started working on is called ‘GoogleSharing’. The basic premise of ‘GoogleSharing’ is that this choice that we are given is a false choice, and that we shouldn’t accept it, we should just reject it. So what we should say is, you know, it’s not really possible for us to stop...