Malware bites
Antivirus software running on your computer has one big weak point - if a new virus is released before the antivirus provider knows about it or before the next scheduled antivirus software update, your system can be infected. ...
IJESDF aims to establish dialogue in an ideal and unique setting for researchers and practitioners to have a knowledge resource, report and publish scholarly articles and engage in debate on various security-related issues, new developments and latest proven methodologies in the field of electronic security and digital forensics. This includes the measures governments must take to protect the security of information on the Internet, the implications of cyber-crime in large corporations and for individuals, vulnerability research, zero day attacks, digital forensic investigation, ethical hacking, anti-forensics, identity fraud, phishing, pharming, relevant case studies, and "best practice" for tackling cyber crime.
Antivirus software running on your computer has one big weak point - if a new virus is released before the antivirus provider knows about it or before the next scheduled antivirus software update, your system can be infected. ...
Security
Aug 15, 2013
17
0
Research in the International Journal of Electronic Security and Digital Forensics highlights the need for urgency in tackling corruption crime and the need to recover stolen assets particularly those taken from developing ...
Economics & Business
Sep 11, 2023
0
4
Online behavioural targeting and device fingerprinting could be used to combat credit card fraud according to a team from Botswana International University of Science and Technology, in Palapye, Botswana. Writing in the International ...
Security
Jan 8, 2019
0
6
Computer scientists in Italy are working on a new concept for remote and distributed storage of documents that could have all the benefits of cloud computing but without the security issues of putting one's sensitive documents ...
Security
Mar 17, 2017
2
22
Web browsers might soon use fuzzy logic to spot redirection spam and save users from being scammed, phished or opening malicious sites unwittingly, according to researchers in India writing in the International Journal of ...
Security
Jun 16, 2016
0
7
A forensic analysis of the so-called "private" browsing modes of the most popular web browsers, Microsoft's Internet Explorer, Google Chrome, Mozilla Firefox, and Opera, reveals that the Microsoft product tested in this research ...
Security
Feb 18, 2016
1
24
An add-on for antivirus software that can scan across a computer network and trap malicious activity missed by the system firewall is being developed by an international team. Details are reported in the International Journal ...
Security
Dec 7, 2015
0
11
An automated thermal detection system that can discern wild elephants from background and other animals in infrared images could save lives in parts of the world where the animals roam free and often enter villages and other ...
Ecology
Jul 10, 2015
0
16
Cryptographers in China have have developed a new type of cryptography that can better resist so-called offline "dictionary attacks", denial of service (DoS) hacks, and cracks involving eavesdroppers. Their approach, reported ...
Computer Sciences
Aug 5, 2014
0
0
How do you detect a "botnet", a network of computers infected with malware -so-called zombies - that allow a third party to take control of those machines? The answer may lie in a statistical tool first published in 1966 ...
Internet
Feb 4, 2014
0
0