Search   Feed   Browse   Add
Feed items 1 - 2 of 2 for March 2007

The Art Of Noh

The changing face of computer security.

Cryptovirology - March 18, 2007

The List of Dubious Research - 3 A copy and paste from: http:www.cryptovirology.com This chapter presents an experimental implementation of cryptoviral extortion, an attack that we devised and presented at the 1996 IEEE Symposium on Security & Privacy 16 and that was recently covered in Malicious Cryptography 17. The design is based on Microsoft's Cryptographic API and the salient aspects of the implementation were presented at ISC '05 and in the International Journal of Information Security.
http://www.noh.ro/blog/archives/2007/03/cryptovirology.html

Evolution of network attacks - March 2, 2007

"The developments of 2006 have highlighted two major trends in the evolution of attacks carried out via the Internet. The first trend is the apparition of the now constant background noise, which is caused by the Slammer worm and the bot armies which exploit relatively old vulnerabilities. ... The second trend is probably far more significant in terms of the evolution of the Internet" From my recent article: "Kaspersky Security Bulletin 2006: Internet Attacks"
http://www.noh.ro/blog/archives/2007/03/evolution_of_ne.html
Available Archives
- January (1 item)
- February (1 item)
- March (2 items)
- May (1 item)
- July (1 item)
- October (4 items)
Sponsored Links
© 2008 FeedCapsule.com  |  Contact