The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Some distributed denial-of-service defenses could in fact make a Web site more vulnerable. After WikiLeaks began publishing confidential communications of the U.S. State Department late last year, a spate of incidents put distributed denial-of-service attacks back in the news. These attacks can take many forms, the most straightforward of which is simply to overwhelm the targeted file server with...
Phishing is a kind of online security attack where the attacker creates a replica of an existing web page to fool users in order to hack their personal, financial, or password data. The statistics today reveal that the current Anti-Phishing system has failed to prevent Phishing completely. In this paper an Anti-Phishing algorithm is proposed which is termed as Phish-Secure. Phish-Secure use the concept...
Web applications are a fundamental pillar of today's globalized world. Society depends and relies on them for business and daily life. However, web applications are under constant attack by hackers that exploit their vulnerabilities to access valuable assets and disrupt business. Many studies and reports on web application security problems analyze the victim's perspective by detailing the vulnerabilities...
The latest survey data about China network security were shown in this article. They revealed that the network security problems were becoming more serious in China. Computers affected and damaged by virus were very serious. Hackers had become one of the most dangerous threat. The security of the infrastructure of information service was challenged. Most of the Chinese Internet users did not believe...
Recently, Lee et al. proposed a remote authentication model of information appliances (RAMIA). Unfortunately, RAMIA has a fatal error that opens the entire home network of information appliances to hackers. In this paper, we propose a new secure remote control model for information appliances (SRCMIA) to fix this error. Besides, our model can also achieve both message authentication and one-time secret...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.