Quantcast

Articles

Get all-in-one coverage of Internet security and online privacy issues brought up by the industry’s leading experts at security conferences and seminars.

Jihadist Use of the Internet 2008-2011 Overview 2: Cyber Jihad Methods and Tools

In here Jeff Bardin continues to highlight the Jihadist software, communication means, online guides, and dwells on the phases of radicalization process. Some of their early methods that used network security tools out there – obfuscation, denial and deception – included the distribution of Asrar...

Cyber Jihad: Jihadist Use of the Internet 2008-2011

Jeff Bardin from Treadstone 71 provides a detailed overview of the Jihadist activities on the Internet, including their software tools, online resources, etc. Good day and welcome to this cyber jihadist use of the Internet from 2008 to 2011 overview by Treadstone 71. This deck, over 60 slides, will cover...

Investigating and Preventing Cyberbullying 6: Trust and Parental Monitoring

As the panelists move towards the end of the discussion, they are raising the issue of parent approach to their kids’ activities online. David Kirkpatrick: You know, this is a room full of people whose business is solving problems that happen online, basically. It is very interesting, and I think it’s a...

Investigating and Preventing Cyberbullying 5: Insight into Social Reporting

This part is entirely dedicated to the unique and effective reporting mechanism adopted by Facebook to mitigate cyberbullying and abuse scenarios. David Kirkpatrick: So, I want to switch gears a little bit and show you guys something as a way of leading to my next questions for Joe. So, could we have the...

Investigating and Preventing Cyberbullying 4: The Role of Empathy

The RSA panelists are looking here into the importance of showing empathy in online bullying scenarios, in particular on the bystanders’ end. David Kirkpatrick: I want to ask other panelists too about this issue of empathy, because I think almost everyone of you mentioned it as we were prepping for this....

Investigating and Preventing Cyberbullying 3: Facebook’s Perspective

What you can learn from this section is the way Facebook is dealing with the phenomenon of cyberbullying as viewed by Joe Sullivan, the Company’s CSO. David Kirkpatrick: Ok, so, Joe, what is Facebook’s general perspective on this? I mean, you, I know, think about it a lot. So how should we view Facebook...

Investigating and Preventing Cyberbullying 2: Lessons Learned from the Megan Meier Case

In this part of the panel, the participants are focusing on offline to online bullying relation as well as the notorious Megan Meier case and its consequences. David Kirkpatrick: So, Jaana, I want to jump to the other end of the road here. As a social scientist who’s spent your career studying bullying in...

Pandora’s Box Meets the Sword of Damocles: Investigating and Preventing Cyberbullying

The increasingly disturbing issue of the cyberbullying phenomenon getting discussed and analyzed by InfoSec professionals David Kirkpatrick, Sameer Hinduja, Joe Sullivan, Jaana Juvonen and Mark Krause during RSA Conference US keynote. David Kirkpatrick: Welcome back from lunch and I’m told that you’re a...

A Study of Clickjacking 4: Summary and Q&A

Adding finishing strokes to his USENIX Security presentation, Lin-Shung Huang provides conclusions drawn from the study and answers questions from the audience. So, to sum up, we demonstrated new clickjacking variants that can evade current defenses. Our user studies show that our attacks are highly...

A Study of Clickjacking 3: Ensuring Visual and Temporal Integrity

This part of Lin-Shung Huang’s presentation covers new techniques that are effective for ensuring better defenses against different variants of clickjacking. Now, we know that current defenses are insufficient in one way or another. The question is: can we design a better defense? We set a few design...