Login / Register
 Logout / Account
QESP Logo
  • Home
  • Membership
  • Events
  • Articles
  • Blog
  • Committee
  • Newsletters
  • About Us

Security Archives - QESP

First reputation-based blockchain guarantees security against 51 percent attacks

Blockchain Security

Researchers at the University of Luxembourg are part of an international team that has proposed the first blockchain system to guarantee proper performance even when more than 51% of the system’s computing power is controlled by an attacker.The system, RepuCoin, introduces the concept of “reputation” to blockchain, effectively making it thousands of times more expensive to attack than Bitcoin. It was developed at the University’s Interdisciplinary Centre for Security, Reliability and Trust, and has the potential to be applied in a number of global sectors including fintech, energy, food supply chains, health care and future 5G telecommunications networks.

Tags: Blockchain, IT Security, Security

Australia vulnerable to cyber attack and economic blackmail, report argues

Cyber Attack

Australia is vulnerable to emerging methods of interference by foreign states such as economic blackmail and the type of cyber attacks Russia has used against other countries, warns a new paper published by the Committee for the Economic Development of Australia.

While asylum seekers coming by boat, terrorism and a naval attack by China are the three most commonly named security problems named by members of the Australian public, they “are not the main security threats to national wellbeing that Australia and its regional partners now face,” writes Professor Greg Austin in a chapter on cyber security.

Tags: Cyber Crime, IT Security, Security

Security cameras vulnerable to attacks using infrared light

Security Camera

Researchers have demonstrated that security cameras infected with malware can receive covert signals and leak sensitive information from the very same surveillance devices used to protect facilities.

Tags: Security

Australian government password rules are insecure nonsense

The agencies dedicated to “protecting our secrets” are insisting on a password security method that even the Daily Mail knows is nonsense, writes John Quiggin.

I recently had to log in to the website of an Australian government agency with which I deal from to time. To my surprise, I was presented with a message saying that my password had expired and that, under a new security policy, password expire every 90 days, and they must contain a mixture of alphanumeric and special characters (this is called a composition rule)

Tags: IT Security, Security

Catching the IMSI-catchers: SeaGlass brings transparency to cell phone surveillance

Security researchers have developed a new system called SeaGlass to detect anomalies in the cellular landscape that can indicate where and when IMSI-catchers, cell-site simulators and other devices used in cell phone surveillance are present.

Tags: Security

The cost of launching a DDoS attack

ddos

(QESP Editor’s Note: The following is an extract from a March 23, 2017 Kaspersky Lab Securelist article by Denis Makrushin. The original, with examples , is available at    https://securelist.com/analysis/publications/77784/the-cost-of-launching-a-ddos-attack/) A distributed denial-of-service (DDoS) attack is one of the most popular tools in the cybercriminal arsenal. The motives behind such attacks can vary – from cyber-hooliganism […]

Tags: DDoS, IT Security, Security

Application Security: Disasters Waiting To Happen?

Application Security

Software quality and security specialists are struggling to apply conventional safeguards to new and rapidly changing technologies. Now, new research is showing that conventional software or network-based security measures can be undermined. A May 15, 2015 eSecurity Planet blog, Integrating Bulletproof Security into App Development  by SoftServe’s Nazar Tymoshyk gives some up to date advice […]

Tags: Security

Search QESP

QESP Newsletter

Subscribe to the QESP Newsletter to keep up to date with current technical articles and innovative practices on software quality, process and metrics

No spam ever. That's a promise.

Popular Topics

Big Data Artificial Intelligence Women in IT Stem Security Education Software Metrics IT Security Agile Software Testing Government Social Media Productivity Commission Donald Trump Software Quality digital transformation neoliberalism Robotics BYOD DDoS Brexit Cloud Computing Blockchain The Conversation

© QESP 2023