What do would you do if you misplaced your credit card? You are pretty sure it is in your other jacket, locked in the office for the weekend but you aren’t absolutely certain. Would you call the bank and cancel it immediately? The option of cancelling a security token when it is potentially jeopardized …
Apple Pay was launched more than 3 years ago to provide a “fast and secure” method of payment and quickly became very popular in the US. It was shortly followed by Android Pay which is also becoming popular. However, not everyone uses these systems despite their claimed security, convenience and speed. Jun Ho Huh, Saurabh …
Differential privacy (DP) provides a way to quantify privacy. A privacy budget quantitatively measures by how much the risk to an individual’s privacy may increase due to the inclusion of certain data. The higher the value, the less privacy protection is provided. This paper by Jun Tang, Aleksandra Korolova, Xiaolong Bai, Xueqiang Wang, and Xiaofeng Wang identifies the components …
Ben Buchanan looks at American Exceptionalism in the form of the NOBUS approach to signals intelligence in his contribution to the Hoover Institution’s Aegis Paper Series. There is a tension between the needs of nations in the information age to both secure and steal communications. The United States has traditionally met this by exploiting a …
Telecommunications fraud groups, the ones running scams over the telephone are a problem around the world. Taiwan is no exception with a number of related arrests in the past decade. Telecom fraud group. Yi-Chun Chang, Kuan-Ting Lai, Seng-Cho T. Chou and Ming-Syan Chen wanted to learn more about how these fraud groups operate through Social …
The sharing of intimate images by digital means is something that has created new issues for Canadians. This is reflected in the creation of laws for non-consensual intimate image sharing or ‘revenge porn’ laws. The issues get murkier when it comes to intimate images and youth as child pornography laws often also apply to the …
Never mind sophisticated and persistent threats, what about simple and opportunistic ones? Have we closed the door on attacks that require little investment on the part of attackers? In particular, are we still shipping software without the most basic of security policies ? B. Knieriem, X. Zhang, P. Levine, F. Breitinger & I. Baggili surveyed …
There is a considerable amount of evidence on the control and censorship of social media in China. On top of this there has long been suspected that there is a system of astroturfing, or the posting of large numbers of comments from fake accounts to direct online conversation. In China people hired to make these …
Jonathon Lusthaus and Federico Varese provide more insight into the phenomena of online crime groups. To provide more of an understanding of the offline nature of online groups they took two field trips to Romania to investigate the region around Râmnicu Vâlcea, a local known for cybercrime. The Region of Ca Piteşti, which contains this …
A group from Northwest University, China, and the University of Bath and Lancaster University in the UK have come up with a method for determining android unlock patterns. The method uses video footage captured by a smartphone and an algorithm that can determine likely codes that match the movement of the finger or hand across …