General security

Wi-Fi Security: Securing Yourself against Practical Wireless Attacks

While the access points in organizations are usually under the protection of organization-wide security policies, home routers are less likely to be appropri

Introduction to GSM security

The Global System for Mobile Communication or GSM is a wireless communication that uses digital technology and is widely deployed across the globe for mobile

Understanding Web Caching

Quite often we see Web pages that include images and other files loading faster than we expect. If you are wondering how that happens, Web caching could be o

Digital footprints and privacy concerns

"It is too difficult to give exact statistics on the amount of data people leave, but confirmed every time we perform an online action, we are contributing

DDoS on UPNP Devices

Denial of service (DOS) attack is an attempt to make a machine or a network resource unavailable to its users. It basically consists of methods to temporaril

Biometrics: Today’s Choice for the Future of Authentication

The options currently available for user authentication fall within three categories: authentication through something that the user knows, such as a PIN or

Legality of Electronic Signatures in the EU and the US

1. Introduction Electronic signatures were used for the first time in 1861 when agreements were signed by telegraphy using Morse code. In 1869, the New Hamps

Introduction to Smartcard Security

Introduction In 1968 and 1969, the smartcard was patented in German by Helmut Gröttrup and Jürgen Dethloff. The smartcard is simply a card with an Integrated

Flash Fades, Adobe Crumbles

Oh, Adobe Flash. I knew you well, starting from when you were known as Macromedia Flash in the late 1990s. The dynamic web content you provided me was

Snowden's New Revelations on Dominance in Cyberspace

Edward Snowden is continuing to release the documents he collected during his service at the NSA. His revelations on the mass surveillance operated by US int