Quantcast

Articles

Get all-in-one coverage of Internet security and online privacy issues brought up by the industry’s leading experts at security conferences and seminars.

A Study of Clickjacking 2: Existing Defenses and New Attack Variants

Lin-Shung Huang now describes the current clickjacking defenses and outlines the new attack variants that were evaluated using the Amazon Mechanical Turk. Existing Defences So, I talked about the existing attacks. Now, what are the current defenses to protect visual integrity? One method is user...

Clickjacking: Attacks and Defenses

Lin-Shung Huang from Carnegie Mellon presents a study at USENIX Security about clickjacking attack vectors and the defenses to deploy for evading this issue. Hello, I am David Lin-Shung Huang from Carnegie Mellon. Today I will be talking about clickjacking attacks and defenses and will introduce three new...

Building a Higher Order of Security Intelligence 4: Moving Forward

The RSA Conference keynote by Francis deSouza ends with a listing of actions to implement for the security industry to advance in the right direction. So, what’s the answer? As we look forward, one part of the answer is absolutely making sure that organizations, that individuals, that countries have all...

Building a Higher Order of Security Intelligence 3: The Role of Situational Awareness

Francis deSouza now talks about issues associated with big intelligence and how those affect situational awareness that’s critical to enterprise cybersecrity. So, how do we deal with all those trends? Well, in this conference you’re going to hear a lot about big data and about security analytics, so...

Building a Higher Order of Security Intelligence 2: Cybercrime Trends

Francis deSouza enumerates here the new trends affecting the entire cyber threat landscape, including multi-flank attacks, “bulletproof” hosting providers, etc. So, what are the new trends we’re seeing across those stages? Multi-Flank Attacks Well, in the last year we’ve seen a growth in the...

Symantec’s Francis deSouza on Building a Higher Order of Security Intelligence

Francis deSouza, President of Products and Services at Symantec, gives a keynote at RSA Conference US 2013 about the role of big data and security intelligence for protection against advanced persistent threats, breaches and sophisticated cyber attacks. Good morning! A major international brand was recently...

An Analysis of the Online Identity Battleground 7: Dissecting the Legislation

Completing his Shmoocon presentation, aestetix singles out specific country-based legislation regarding name policies, and takes questions from the audience. Our last myth from Adam here: we are currently fixing this through legislation. South Korea did this back in 2003 (see image below). So, South Korea,...

An Analysis of the Online Identity Battleground 6: Names Policies of Google and Facebook

This section outlines the way services like Google and Facebook currently go about handling user names and pseudonyms. There’ve been some updates and changes to this policy of Google. The new policy: “You can change your name, but it’s limited to 3 times every two years,” I’m not sure why....

An Analysis of the Online Identity Battleground 5: Can We Trust “Identity Providers”?

Subjects covered in this part of aestetix’s presentation include trust in terms of online names specificity, and “identity providers” like Facebook and Google. Myth #3: we cannot trust anyone who does not use their legal name online. Trust – that’s such a tricky word, isn’t it? Here’s...

An Analysis of the Online Identity Battleground 4: Legal Names and Cyberbullying

aestetix makes herein an emphasis on the correlation between the use of real names and pseudonyms online with people’s behavior on the Internet. Number two for the myths, thanks Adam: “We can stop cyberbullying by forcing people to use their legal names. People who do not use their legal names do...