Good help is hard to find. The Internet is full of advice but it can be difficult to know what is good advice, and what is dangerous. This is true for advice around programming computer code as well. A group of researchers from Germany wanted to find out how much of an impact bad advice could …
RAND obtained a dataset of information about zero-day software exploits through a research connection. It is a rich dataset, as some of these exploits have been found by others and some have not. The dataset spans 14 years (2002–2016) and contains information about more than 200 zero-day exploits and the vulnerabilities that they take advantage …
A grand jury Northern District of California has indicted four defendants, including two officers of the Russian Federal Security Service (FSB), for computer hacking, economic espionage and other criminal offenses in connection with a conspiracy, beginning in January 2014, to access Yahoo’s network and the contents of webmail accounts. The defendants are Dmitry Aleksandrovich Dokuchaev, 33, …
Entrevue avec Sébastien Gambs dans le cadre de la conférence « La cybersécurité est-elle possible? » au Cœur des sciences de l’Université du Québec à Montréal (UQAM). Sébastien Gambs est professeur d’informatique à l’UQAM. Ses travaux de recherche portent principalement sur la protection de la vie privée et la sécurité informatique, en particulier pour les …
Euvgeny Naumov Delve Labs presented at the SERENE-RISC Workshop in 2017 The rapid rise in the number and ubiquity of internet services and internet-facing devices has increased pressure to automate cybersecurity monitoring. However, vulnerabilities discovered by automated solutions per scan can number in the thousands and beyond, still placing a considerable burden on security teams …
Consumer fraud costs Australians $1.4b every year with the advances in technology allowing the victimization of an increasing number of people. Penny Joyna from the Australian Institute of Criminology looks into the relationship between Age and the risk of consumer fraud. Age has long been seen as a factor in the risk of becoming a …
In this video, Prof. Jeremy Clark defines what bitcoin is, how it is used and its relation to cybercrime. This talk was presented in Toronto on May 31, 2016, at the SERENE-RISC Tutorial “Examining Cybercrime 2: Financial Edition”. Jeremy takes something mystical and clearly explains it. There’s this data structure which you may have heard …
DARPA held their cyber grand challenge in Las Vegas last week. The challenge pitted 7 autonomous security systems against each other in a Capture The Flag Competition. The winning system then went on to compete in DEFcon’s regular CTF against human competition and did as well as was expected (dead last). The job of commentating 7 …
With support from the William and Flora Hewlett Foundation, the Berkman Center for Internet Society at Harvard University a diverse group of security and policy experts from academia, civil society, and the U.S. intelligence community convened to discuss some of the difficult problems of surveillance and cybersecurity. This occurred at the time of public about …
Through this collection of articles, we aim to share our different perspectives and insights, the latest developments and achievements in the field of cyber security, cybercrime investigations and cyber resilience. The work is multi-diciplinary in that it combines perspectives from Jaya Baloo the CISO of KPN, Henk Geveke Managing director defence safey and security at …