Terrorist Use of the Internet by the Numbers: Quantifying Behaviors, Patterns, and Processes

Terrorism and the Internet is a hot button topic with the dangers posed by online groups being the subject of near constant debate and news headlines.  A question that bears closer examination is the effect that the Internet has on would be terrorists. Does content or contact online cause a change in behaviour or does …

Zero Days, Thousands of Nights: The Life and Times of Zero-Day Vulnerabilities and Their Exploits

RAND obtained a dataset of information about zero-day software exploits through a research connection. It is a rich dataset, as some of these exploits have been found by others and some have not. The dataset spans 14 years (2002–2016) and contains information about more than 200 zero-day exploits and the vulnerabilities that they take advantage …

U.S. Charges Russian FSB Officers and Their Criminal Conspirators for Hacking Yahoo and Millions of Email Accounts

A grand jury Northern District of California has indicted four defendants, including two officers of the Russian Federal Security Service (FSB), for computer hacking, economic espionage and other criminal offenses in connection with a conspiracy, beginning in January 2014, to access Yahoo’s network and the contents of webmail accounts. The defendants are Dmitry Aleksandrovich Dokuchaev, 33, …

La cybersécurité est-elle possible?

Entrevue avec Sébastien Gambs dans le cadre de la conférence « La cybersécurité est-elle possible? » au Cœur des sciences de l’Université du Québec à Montréal (UQAM). Sébastien Gambs est professeur d’informatique à l’UQAM. Ses travaux de recherche portent principalement sur la protection de la vie privée et la sécurité informatique, en particulier pour les …

Security and AI: A Bayesian Approach

Euvgeny Naumov Delve Labs presented at the SERENE-RISC Workshop in 2017 The rapid rise in the number and ubiquity of internet services and internet-facing devices has increased pressure to automate cybersecurity monitoring. However, vulnerabilities discovered by automated solutions per scan can number in the thousands and beyond, still placing a considerable burden on security teams …

Bitcoin: An impartial assessment of its use and potential for cybercrime

In this video, Prof. Jeremy Clark defines what bitcoin is, how it is used and its relation to cybercrime. This talk was presented in Toronto on May 31, 2016, at the SERENE-RISC Tutorial “Examining Cybercrime 2: Financial Edition”. Jeremy takes something mystical and clearly explains it. There’s this data structure which you may have heard …

Autonomous Hacking ?

DARPA held their cyber grand challenge in Las Vegas last week.  The challenge pitted 7 autonomous security systems against each other in a Capture The Flag Competition.  The winning system then went on to compete in DEFcon’s regular CTF against human competition and did as well as was expected (dead last). The job of commentating 7 …