Search Results for "Royal Holloway Information Security seriesstart=30start=30start=10"
-
Proving ownership of IPv6 addresses
Sponsored by: TechTarget ComputerWeekly.comIn this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.
-
The Investigatory Powers Act 2016 and Internet Connections Records
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
-
Royal Holloway: Lessons on catastrophe - differences and similarities between cyber and other forms of risk
Sponsored by: TechTarget ComputerWeekly.comCyber insurance is still in its infancy but has shown significant growth, with evidence for further expansion. However, a lack of past information and some idiosyncrasies make pricing difficult, as well as potentially amplifying risk exposure. This article summarises findings from a practical model that could be used in lieu of actuarial data.
-
How long does it take to get owned?
Sponsored by: TechTarget ComputerWeekly.comA study to investigatethe amount of time that it takes for stolen credentials to be used by a hacker.
-
The exploitation of flaws in the HTTPS protocol
Sponsored by: TechTarget ComputerWeekly.comFor both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
-
Royal Holloway: An enhanced approach for USB security management
Sponsored by: TechTarget ComputerWeekly.comUSB flash drives and other USB-connected data storage devices offer a simple way of making data more portable and more easily transferrable. However, their use presents security risks that must be addressed. Apart from increasing the risk of data theft, they have often been used to transfer malware, sometimes with disastrous results.
-
Royal Holloway: Corporate under-reporting of cyber crime
Sponsored by: TechTarget ComputerWeekly.comWithout reporting, cyber crimes cannot be investigated, prosecutions cannot be pursued and effective prevention strategies cannot be developed. Yet despite this, most corporates fail to report cyber crimes. This article in our Royal Holloway security series explains why this is an increasing cause for concern.
-
Extracting actionable data from banking malware
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series demonstrates how actionable data can be extracted from banking malware and how it can be used to defend against highly damaging cyber attacks from organised criminal gangs.
-
BadUSB 2.0: Exploring USB man-in-the-middle attacks
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series explores the uses and capabilities of rogue USB hardware implants for use in cyber espionage activities.
-
Understanding behavioural detection of antivirus
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series analyses the effectiveness and behavior of 32-bit and 64-bit antivirus software in Windows 7.