Authentication using visual codes: what can go wrong
Posted on 18 December 2013.
Several password replacement schemes have been suggested that use a visual code to log in. However the visual code can often be relayed, which opens up a major vulnerability. Can anything be done, and what compromises need to be made to protect users?
Learn more in this PasswordsCon Bergen 2013 presentation by Chris Warrington, Pico project, University of Cambridge.
Posted on 18 August 2014. | In this podcast recorded at Black Hat USA 2014, Silvio Cesare, Director of Anti-Malware Engineering at Qualys, discusses the security measures of a number of household devices and things.
Posted on 18 August 2014. | In this interview, Morris Altman, the Director of Network Services and Internet Security Officer at Queens College, talks about his job, the biggest challenges and threats his team faces, exchanging knowledge, and more.
Posted on 15 August 2014. | The Gameover Zeus gang, whose activity has been temporarily foiled by a successful multi-national law enforcement takedown in June, is trying to regain lost ground. The new malware variant - dubbed newGOZ - has been modified to know when particular C&C domains will be online.