Search Results for "Royal Holloway Information Security seriesstart=10start=10start=20"
-
Demystifying the myths of public cloud computing
Sponsored by: TechTarget ComputerWeekly.comIn this article in our Royal Holloway security series, Chris Hodson asks whether public cloud is less secure than private datacentres, and assesses service models, deployment, threats and good practice.
-
Royal Holloway: Investigating the security vulnerabilities and solutions for connected and autonomous vehicle technologies
Sponsored by: TechTarget ComputerWeekly.comThis article introduces connected and autonomous vehicles, analysing the underlying technologies and considering their cyber security vulnerabilities and attacks. We identify and assess the existing and emerging countermeasures for such vulnerabilities, and propose high-level recommendations.
-
Extracting actionable data from banking malware
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series demonstrates how actionable data can be extracted from banking malware and how it can be used to defend against highly damaging cyber attacks from organised criminal gangs.
-
Are we trusting social networks too much?
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks
-
BadUSB 2.0: Exploring USB man-in-the-middle attacks
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series explores the uses and capabilities of rogue USB hardware implants for use in cyber espionage activities.
-
Royal Holloway: A novel approach to clustering malware behaviour to improve malware detection
Sponsored by: TechTarget ComputerWeekly.comClustering malware behaviour can be very useful, but it is unknown how accurate clustering algorithms are when dealing with malware
-
Sandnet++ – A framework for analysing and visualising network traffic from malware
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series looks at Sandnet++, a framework for analysing and visualising network traffic from malware
-
The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
-
Enterprise cloud applications – can we trust them?
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series examines the more significant risks involved when an enterprise uses line-of-business applications hosted in the cloud.
-
Managing Android devices in the enterprise
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway security series focuses on two approaches to securely managing Android mobile devices in the enterprise: mobile device management (MDM) and mobile application management (MAM).