Title: Deceptive Phishing Research: Moral Questions and Legal Issues
Abstract: Researchers are increasingly turning to live, “in the wild” phishing studies of users, who unknowingly participate without giving informed consent. Such studies can expose researchers to a number of unique, and fairly significant legal risks. This talk will introduce four case studies highlighting...
Abstract: While the press raves about the coming revolution of “personalized medicine”, it remains a challenge for an individual to obtain simply a usable copy of their complete medical record. Recently, Microsoft, Google, and the Dossia consortium each launched their own version of Personally Controlled Health Records (PCHRs), technology that...
Date: Wednesday, October 8, 2008 Time: 12:00pm-1:30 pm Place: Maxwell Dworkin 2nd Floor Lounge Area
Speaker: John Viega
Title: Why Anti-Virus sucks, and how to fix it
Abstract: Anti-virus software (AV) is found on most Windows desktops (well over 90%). Many people are amazed that it is so ubiquitous, because it is so widely reviled. Technical people will often claim that AV “doesn’t work”, and that it “causes stability problems”. And almost everyone will claim that it “slows your machine down”. While...
Title: An Empirical Analysis of Phishing Attack and Defense:
Abstract: A key way in which banks mitigate the effects of phishing attacks is to remove the fraudulent websites and abusive domain names hosting them. We have gathered and analyzed empirical data on phishing website removal times and the number of visitors that the websites attract. We find that website removal is part of the answer...
Abstract: In the old days, computer scientists tended to be of the opinion that the goal of computer scientists was to construct machines and the goal of social scientists was to get society to accept them. There is no doubt that traditional approaches to computer science research have revolutionized the world in which we live, but past success using...