Quantcast

Articles

Get all-in-one coverage of Internet security and online privacy issues brought up by the industry’s leading experts at security conferences and seminars.

Investigating and Preventing Cyberbullying 2: Lessons Learned from the Megan Meier Case

In this part of the panel, the participants are focusing on offline to online bullying relation as well as the notorious Megan Meier case and its consequences. David Kirkpatrick: So, Jaana, I want to jump to the other end of the road here. As a social scientist who’s spent your career studying bullying in...

Pandora’s Box Meets the Sword of Damocles: Investigating and Preventing Cyberbullying

The increasingly disturbing issue of the cyberbullying phenomenon getting discussed and analyzed by InfoSec professionals David Kirkpatrick, Sameer Hinduja, Joe Sullivan, Jaana Juvonen and Mark Krause during RSA Conference US keynote. David Kirkpatrick: Welcome back from lunch and I’m told that you’re a...

A Study of Clickjacking 4: Summary and Q&A

Adding finishing strokes to his USENIX Security presentation, Lin-Shung Huang provides conclusions drawn from the study and answers questions from the audience. So, to sum up, we demonstrated new clickjacking variants that can evade current defenses. Our user studies show that our attacks are highly...

A Study of Clickjacking 3: Ensuring Visual and Temporal Integrity

This part of Lin-Shung Huang’s presentation covers new techniques that are effective for ensuring better defenses against different variants of clickjacking. Now, we know that current defenses are insufficient in one way or another. The question is: can we design a better defense? We set a few design...

A Study of Clickjacking 2: Existing Defenses and New Attack Variants

Lin-Shung Huang now describes the current clickjacking defenses and outlines the new attack variants that were evaluated using the Amazon Mechanical Turk. Existing Defences So, I talked about the existing attacks. Now, what are the current defenses to protect visual integrity? One method is user...

Clickjacking: Attacks and Defenses

Lin-Shung Huang from Carnegie Mellon presents a study at USENIX Security about clickjacking attack vectors and the defenses to deploy for evading this issue. Hello, I am David Lin-Shung Huang from Carnegie Mellon. Today I will be talking about clickjacking attacks and defenses and will introduce three new...

Building a Higher Order of Security Intelligence 4: Moving Forward

The RSA Conference keynote by Francis deSouza ends with a listing of actions to implement for the security industry to advance in the right direction. So, what’s the answer? As we look forward, one part of the answer is absolutely making sure that organizations, that individuals, that countries have all...

Building a Higher Order of Security Intelligence 3: The Role of Situational Awareness

Francis deSouza now talks about issues associated with big intelligence and how those affect situational awareness that’s critical to enterprise cybersecrity. So, how do we deal with all those trends? Well, in this conference you’re going to hear a lot about big data and about security analytics, so...

Building a Higher Order of Security Intelligence 2: Cybercrime Trends

Francis deSouza enumerates here the new trends affecting the entire cyber threat landscape, including multi-flank attacks, “bulletproof” hosting providers, etc. So, what are the new trends we’re seeing across those stages? Multi-Flank Attacks Well, in the last year we’ve seen a growth in the...

Symantec’s Francis deSouza on Building a Higher Order of Security Intelligence

Francis deSouza, President of Products and Services at Symantec, gives a keynote at RSA Conference US 2013 about the role of big data and security intelligence for protection against advanced persistent threats, breaches and sophisticated cyber attacks. Good morning! A major international brand was recently...