stop-phishing.blogspot.com
Stop-Phishing @ IU: 02.2007
http://stop-phishing.blogspot.com/2007_02_01_archive.html
Stop Phishing @ IU. And I have developed an attack called "Drive-by Pharming" to which many people with home broadband routers are vulnerable. In short: visiting a web page can cause malicious JavaScript to execute, changing the DNS settings on your broadband router. As a result, you cannot trust domain name resolution on a compromised router. The Solution. Is to set a hard-to-guess administrator password for your router. Link to my blog post. Link to Zully's Blog Post (Symantec). By Sid Stamm @ 9:53 AM.
civilwatchdoginjapan.blogspot.com
civilian watchdog in japan: 10月 2012
http://civilwatchdoginjapan.blogspot.com/2012_10_01_archive.html
Civilian watchdog in japan. Civilian Watchdog in Japan-IT security and privacy law-. IC3(Internet Crime Complaint Center). は、「モバイルフォン・ユーザーはモバイル端末機器を標的とする最近時に検出された2種を例にあげ『不正プログラム(malware)』およびそのセキュリティ侵害(compromise)を阻止すべく具体的な安全対策の理解を深めるべきである」と題するリリースを行った。 12288;この問題は従来から問題視されているインターネット詐欺の応用形であることには間違いなく、手口自体につき目新しさはない。(筆者注1)しかし、携帯インターネット端末であるモバイル端末の利用時に得られる個人情報をいとも簡単に入手する手口はさらに今後のリスク拡大から見て無視しえない問題と考える。 12288; なお、筆者は 10. セキュリティ・研究者である マーカス・ジェイコブスン. を読んだ。詳しい解説は省略するが、要するに従来の PC. 12288;このモバイル端末(プラットホーム)の点や面への攻撃...
kingsmountain.com
Jeff Hodges' Home Page: Protocol Architecture: SAML, LDAP, IETF, OASIS, W3C, Kantara, Web Services, etc.
http://kingsmountain.com/people/Jeff.Hodges
Photo credit: Bob Blakley. Senior Member Technical Staff - Ecosystem Security, PayPal, Inc. Perhaps not the 'Jeff Hodges' you were looking for? See the disambiguation page. Vocational blog: IdentityMeme.org. Avocational blog: EclecticReflections.com. This Internet Beachhead established 1994. This is my personal homepage. I'm not speaking here for any past or current employer or client. Also, various portions of these pages are woefully out-of-date. Eg, Kings Mountain Systems. And An LDAP Roadmap and FAQ.
csf2013.seas.harvard.edu
CSF 2013 - Call for Papers and Panels
http://www.csf2013.seas.harvard.edu/cfp.html
Call for papers and panels. Call for Papers and Panels. Cornell University), joint invited talk with LICS 2013. Benjamin C. Pierce. New theoretical results in computer security are welcome. Possible topics include, but are not limited to:. Data and system integrity. Formal methods for security. Game Theory and Decision Theory. Security for mobile computing. Trust and trust management. Challenges and Vision Papers:. Regular papers should be at most 12 pages long, not counting bibliography and well-marked ...
stop-phishing.blogspot.com
Stop-Phishing @ IU: Drive-by Pharming
http://stop-phishing.blogspot.com/2007/02/drive-by-pharming.html
Stop Phishing @ IU. And I have developed an attack called "Drive-by Pharming" to which many people with home broadband routers are vulnerable. In short: visiting a web page can cause malicious JavaScript to execute, changing the DNS settings on your broadband router. As a result, you cannot trust domain name resolution on a compromised router. The Solution. Is to set a hard-to-guess administrator password for your router. Link to my blog post. Link to Zully's Blog Post (Symantec). By Sid Stamm @ 9:53 AM.
blog.sidstamm.com
the wild web: June 2011
http://blog.sidstamm.com/2011_06_01_archive.html
Thoughts on web privacy and security ]. Monday, June 20, 2011. Markus Jakobsson: why we must ask "why" in designing secure systems. On Wednesday (June 22 @ 12pm PDT), Markus Jakobsson will talk about some of the security research he's been working on. Join us to hear some stories and learn how and why to build in security from the ground up! Details below. This will be streamed to the world on air mozilla. And hosted at the Mozilla HQ in Mountain View. The video is available here. Posted by Sid Stamm.
identitymeme.org
Uncategorized « IdentityMeme.org
http://identitymeme.org/categories/uncategorized
JeffH’s musings on identity, security, protocols, SDOs, and tussles thereof…. Archive for the ‘Uncategorized’ Category. Laquo; Older Entries. HTTP cookie processing algorithm in terms of Same Origin Policy and “effective Top Level Domains (eTLDs). Thursday, April 30th, 2015. This is a community-service posting: The purpose is to unambiguously state the specification of “cookie processing wrt public suffixes”. JeffH sez: it’s long — read it anyway. Where to get viagra. Generic viagra soft tabs. 8212;and i...
sidstamm.com
sidstamm.com | bio
http://www.sidstamm.com/bio.html
When I was 13, I took a summer job at a large telephone company and learned a little bit about IT infrastructure. I got an "in" with my local Telco technicians and learned how to wire POTS. Lines, and experimented with a brand new technology called "ISDN". New digital link would come out so soon. After all, weren't we supposed to get fiber lines? At this point in my life, I was interested in social deviants (ahem, Hackers and Phreaks) and how they came up with crazy stuff like blue boxes. I'm currently r...
manshaei.org
Publication
http://www.manshaei.org/publication.php
Assistant Professor, Isfahan University of Technology. My Google Scholar Profile. Click here for my Google scholar profile. N Vratonjic, M. H. Manshaei, and J.-P. Hubaux. Online Advertising Fraud," The Death of The Internet and What Can be Done to Stop It, Wiley, Markus Jakobsson. M H Manshaei, M. Felegyhazi. J Freudiger, J.-P. Hubaux. M A Rahman, M. H. Manshaei, E. Al-Shaer. M H Manshaei, Q. Zhu. And J-P. Hubaux. J Freudiger, M. H. Manshaei, J.-P. Hubaux. And D C. Parkes. ISPs and Ad Networks Against Bo...
csf2013.seas.harvard.edu
CSF 2013 - Program
http://www.csf2013.seas.harvard.edu/program.html
Call for papers and panels. Full LICS/MFPS/CSF program, and additional information. Cornell University), joint invited talk with LICS 2013. Benjamin C. Pierce. Panel on Emerging Science of Security, with panelists:. Workshop on Foundations of Computer Security. Saturday June 29, 2013. 3rd International Workshop on Socio-Technical Aspects in Security. Saturday June 29, 2013. 9th Workshop on Formal and Computational Cryptography. Saturday June 29, 2013. Mathematical Foundations of Programming Semantics.