Search Results for "Royal Holloway Information Security seriesstart=10start=10start=10"
-
How long does it take to get owned?
Sponsored by: TechTarget ComputerWeekly.comA study to investigatethe amount of time that it takes for stolen credentials to be used by a hacker.
-
Sandnet++ – A framework for analysing and visualising network traffic from malware
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series looks at Sandnet++, a framework for analysing and visualising network traffic from malware
-
Royal Holloway: The Computer Misuse Act and the characteristics of convicted hackers
Sponsored by: TechTarget ComputerWeekly.comIn this Royal Holloway article, the authors go beyond the perpetuated stereotypes often found in media surrounding hackers by analysing the characteristics of real-life convicted hackers in the UK, who were charged under the Computer Misuse Act
-
The exploitation of flaws in the HTTPS protocol
Sponsored by: TechTarget ComputerWeekly.comFor both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
-
Royal Holloway: An enhanced approach for USB security management
Sponsored by: TechTarget ComputerWeekly.comUSB flash drives and other USB-connected data storage devices offer a simple way of making data more portable and more easily transferrable. However, their use presents security risks that must be addressed. Apart from increasing the risk of data theft, they have often been used to transfer malware, sometimes with disastrous results.
-
Royal Holloway: A novel approach to clustering malware behaviour to improve malware detection
Sponsored by: TechTarget ComputerWeekly.comClustering malware behaviour can be very useful, but it is unknown how accurate clustering algorithms are when dealing with malware
-
Royal Holloway: Driverless vehicle security for military applications
Sponsored by: TechTarget ComputerWeekly.comExisting attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.
-
BadUSB 2.0: Exploring USB man-in-the-middle attacks
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series explores the uses and capabilities of rogue USB hardware implants for use in cyber espionage activities.
-
Extracting actionable data from banking malware
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series demonstrates how actionable data can be extracted from banking malware and how it can be used to defend against highly damaging cyber attacks from organised criminal gangs.
-
Towards an Autonomous Vehicle Enabled Society: Cyber Attacks and Countermeasures
Sponsored by: TechTarget ComputerWeekly.comCyber-attacks against autonomous vehicles could have grave implications for safety, privacy, reputation of manufacturers, and public perception.