Researchers at the University of Luxembourg are part of an international team that has proposed the first blockchain system to guarantee proper performance even when more than 51% of the system’s computing power is controlled by an attacker.The system, RepuCoin, introduces the concept of “reputation” to blockchain, effectively making it thousands of times more expensive to attack than Bitcoin. It was developed at the University’s Interdisciplinary Centre for Security, Reliability and Trust, and has the potential to be applied in a number of global sectors including fintech, energy, food supply chains, health care and future 5G telecommunications networks.
Tags: Blockchain, IT Security, Security
Australia is vulnerable to emerging methods of interference by foreign states such as economic blackmail and the type of cyber attacks Russia has used against other countries, warns a new paper published by the Committee for the Economic Development of Australia.
While asylum seekers coming by boat, terrorism and a naval attack by China are the three most commonly named security problems named by members of the Australian public, they “are not the main security threats to national wellbeing that Australia and its regional partners now face,” writes Professor Greg Austin in a chapter on cyber security.
Tags: Cyber Crime, IT Security, Security
Researchers have demonstrated that security cameras infected with malware can receive covert signals and leak sensitive information from the very same surveillance devices used to protect facilities.
Tags: Security
The agencies dedicated to “protecting our secrets” are insisting on a password security method that even the Daily Mail knows is nonsense, writes John Quiggin.
I recently had to log in to the website of an Australian government agency with which I deal from to time. To my surprise, I was presented with a message saying that my password had expired and that, under a new security policy, password expire every 90 days, and they must contain a mixture of alphanumeric and special characters (this is called a composition rule)
Tags: IT Security, Security
Security researchers have developed a new system called SeaGlass to detect anomalies in the cellular landscape that can indicate where and when IMSI-catchers, cell-site simulators and other devices used in cell phone surveillance are present.
Tags: Security
(QESP Editor’s Note: The following is an extract from a March 23, 2017 Kaspersky Lab Securelist article by Denis Makrushin. The original, with examples , is available at https://securelist.com/analysis/publications/77784/the-cost-of-launching-a-ddos-attack/) A distributed denial-of-service (DDoS) attack is one of the most popular tools in the cybercriminal arsenal. The motives behind such attacks can vary – from cyber-hooliganism […]
Tags: DDoS, IT Security, Security
Software quality and security specialists are struggling to apply conventional safeguards to new and rapidly changing technologies. Now, new research is showing that conventional software or network-based security measures can be undermined. A May 15, 2015 eSecurity Planet blog, Integrating Bulletproof Security into App Development by SoftServe’s Nazar Tymoshyk gives some up to date advice […]
Tags: Security