The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Web-based advertising system has become a convenient and efficient channel for advertisers to deliver ads to targeted Internet users. Unfortunately, this system has been exploited by cybercriminals to disseminate malware to an enormous number of end-users and their vulnerable machines. To protect their malicious ads and malware from detection by the ad network, malvertisers apply a variety of evasion...
The availability of GPS in smartphones and other wireless devices has made location based services extremely popular. One of the most widely used location based services is finding nearby friends. Popular social networks like Facebook offer this service purely based on exact user locations. To subscribe to this feature, users are forced to let the service provider know their actual locations, compromising...
HTTP is becoming the most preferred channel for command and control (C&C) communication of botnets. One of the main reasons is that it is very easy to hide the C&C traffic in the massive amount of browser generated Web traffic. However, detecting these HTTP-based C&C packets which constitute only a minuscule portion of the overall everyday HTTP traffic is a formidable task. In this paper,...
Online advertising system has become a convenient and efficient channel to disseminate Web-based malware to the Internet users. Most of the free online services exist in exchange of the revenues generated through advertisements. Therefore, considerable efforts are made to deliver the ads to the appropriate audiences. Cyber criminals can easily exploit this online ad delivery system to deliver malware...
Location tracking applications are usually based on exact GPS location information and non-anonymized WiFi Access Point (AP) information. It has been assumed that anonymizing WiFi AP information is an effective way to preserve location privacy of the connected users. In this work, our goal is to show that the privacy of connected users' movement pattern can still be compromised by a determined attacker...
World Wide Web has become an integral part of our life and the bulk of Web usage involves user authentication. Technology available in this area does not offer much variation. Much research has been done to improve security and user experience of Web authentication, but still the schemes are far from being perfect. In this paper, we present a novel Web authentication scheme, Textact, which can meet...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.