-
Ziwei.Zhu commented on the post, Week 13 Materials Posted, on the site 10 years ago
http://www.securityweek.com/opendns-launches-partner-platform
OpenDNS Launches Partner Platform
OpenDNS is a company famous for its DNS service that adds a level of security by monitoring domain name requests. Recently it unveiled a new security platform and APIs(application programming interface) designed to enable security vendors to…[Read more] -
Ziwei.Zhu commented on the post, Week 12 Materials Posted, on the site 10 years, 1 month ago
http://www.washingtontimes.com/news/2014/nov/17/state-department-cyber-attack-prompts-shutdown-ema/
The State Department computer system fell victim to a cyber attack during recent weeks, according to U.S. officials who say the incident prompted a full shutdown of the department’s unclassified email system and occurred around the same time h…[Read more]
-
Ziwei.Zhu commented on the post, Week 11 Materials Posted, on the site 10 years, 1 month ago
Recently the Postal Service confirmed a data breach and leaked personal information includes employees’ names, dates of birth, Social Security numbers, addresses, emergency contacts and other information.
Customers at local post…[Read more] -
Ziwei.Zhu commented on the post, Progress Report for Week Ending, March 15, on the site 10 years, 1 month ago
http://threatpost.com/google-working-on-tool-to-gather-stats-while-preserving-privacy/109119
Google is working on a new system that enables the company to collect randomized information about the way that users are affected by unwanted software on their machines, without gathering identifying data about the users. That is to say, RAPPORs allow…[Read more]
-
Ziwei.Zhu commented on the post, Progress Report for Week Ending, March 15, on the site 10 years, 1 month ago
http://www.securityweek.com/airhopper-malware-uses-radio-signals-steal-data-isolated-computers
Malware Uses Radio Frequencies to Steal Data from Isolated Computers
A proof-of-concept malware developed by researchers shows that an attacker can transmit sensitive information from isolated computers to nearby mobile phones by using radio…[Read more] -
Ziwei.Zhu commented on the post, Progress Report for Week Ending, March 15, on the site 10 years, 1 month ago
LINK:http://www.securityweek.com/card-fraud-platform-mimics-human-behavior-avoid-detection
Cybercriminals have developed a piece of software called “Voxis Team that’s designed to help payment card fraudsters automate unauthorized charges to ensure that they make a profit before their activities are detected by fraud detection systems.
When t…[Read more] -
Ziwei.Zhu commented on the post, Progress Report for Week Ending, March 1, on the site 10 years, 2 months ago
link: http://www.securityweek.com/hackers-compromised-yahoo-servers-using-shellshock-bug
Two servers for Yahoo Games have recently been breached. A security flaw called Shellshock was then identified. However, when yahoo isolated impacted servers at this time and found user data wasn’t compromised. This breach jeopardizes every consumer that u…[Read more] -
Ziwei.Zhu commented on the post, Progress Report for Week Ending, February 9, on the site 10 years, 2 months ago
Keypoint: After terrorist attacks, Congress of US passed various new laws to make US secure and these laws call for deep organizational change to the executive branch of government.
Question: Is it secure enough to use VPN for communicating in a school like Temple University?
-
Ziwei.Zhu commented on the post, Progress Report for Week Ending, September 29, on the site 10 years, 2 months ago
issuer: Google Internet Authority G2
Valid from 10/8/2014 to 1/6/2015
thumbprint algorithm :sha 1
thumbprint: 41 58 38 eb ef 83 5f c8 84 7e 69 b9 7d 41 df 6c 6f dc 43 66 -
Ziwei.Zhu commented on the post, Progress Report for Week Ending, February 9, on the site 10 years, 2 months ago
Keypoint: Physical asset protection is essential in order to prevent damage to physical infrastructure and prevent misuse of them. Inappropriate protection of physical infrastructure would potentially cause a loss of information asset.
Question: There are several physical assets in an organization, including hardware, personnel, physical…[Read more]
-
Ziwei.Zhu commented on the post, Progress Report for Week Ending, September 22, on the site 10 years, 2 months ago
HMAC in Amazon web service
Hash-based message authentication code (HMAC) is a mechanism for calculating a message authentication code involving a hash function in combination with a secret key. This can be used to verify the integrity and authenticity of a message.
This is the main authentication method used by Amazon Web Services. To use this…[Read more] -
Ziwei.Zhu commented on the post, Happy Birthday SNL // the typists from the Carol Burnett show, on the site 10 years, 2 months ago
Link: http://www.technewsworld.com/story/81157.html
Recently report showed that For the first half of this year, 17.7 percent of all phishing attacks were aimed at Apple — a first for the brand — followed by PayPal (14.4 percent) and Chinese shopping site Taobao.com (13.2 percent).
Sometimes intruders that have penetrated a system can be…[Read more] -
Ziwei.Zhu commented on the post, Happy Birthday SNL // the typists from the Carol Burnett show, on the site 10 years, 3 months ago
Recently, researchers have created a new approach for authentication that requires the user to wear a bracelet with on his dominant wrist. When the user interacts with a computer terminal, the bracelet (breslɪt) records the wrist movement and your location, processes it, and sends it to the terminal. It authenticates users continuously while they…[Read more]
-
Ziwei.Zhu commented on the post, Week 4 Materials Posted, on the site 10 years, 3 months ago
News: http://arstechnica.com/tech-policy/2014/09/why-comcasts-javascript-ad-injections-threaten-security-net-neutrality/
My article is about that Comcast has begun serving Comcast ads to inject data into websites and raises security concern. When a user requests to view a page, Comcast injects its JavaScript into the packets being returned by the…[Read more] -
Ziwei.Zhu changed their profile picture 10 years, 3 months ago
-
Ziwei.Zhu changed their profile picture 10 years, 3 months ago
-
Ziwei.Zhu changed their profile picture 10 years, 3 months ago
-
Ziwei.Zhu changed their profile picture 10 years, 3 months ago
-
Ziwei.Zhu's profile was updated 10 years, 3 months ago
-
Ziwei.Zhu commented on the post, Progress Report for Week Ending, September 22, on the site 10 years, 3 months ago
News: Link: http://www.bankinfosecurity.com/apple-launches-payments-platform-a-7295
I chose a topic that talked about apply pay, a new payment feature of iphone6. . To secure payment on iphone6, Apple Pay utilizes Touch ID, a fingerprint identity sensor, and a Secure Element chip storage. When a user adds a credit or debit card with Apple Pay,…[Read more] - Load More