Arvutiteaduse instituut
  1. Kursused
  2. 2017/18 kevad
  3. Infoturve (MTAT.07.028)
EN
Logi sisse

Infoturve 2017/18 kevad

  • Pealeht
  • Loengud ja praktikumid
  • Ülesanded
  • Eksam
  • Uudised
  • Viited

Uudised

Siia kogume viiteid olulisematele infoturbe ja küberrünnakutega seotud uudistele. Erilist tähelepanu osutame Eestiga seotud sündmustele ja kirjutistele. Juhul kui te märkate mõnda sündmust või artiklit, mis peaks olema siin nimekirjas, siis kirjutage meile.

  • 30.05.2018: Overview of problems in SS7
    • How spies can use your cellphone to find you – and eavesdrop on your calls and texts too
    • A letter by Ron Wyden to US Senate about the problems of SS7
  • 24.05.2018: Firmware of multiple cheap Android devices contained malware
    • Avast Threat Labs analyzed malware that has affected thousands of users around the world
    • Malware Found in the Firmware of 141 Low-Cost Android Devices
  • 17.05.2018: ID-kaardi võtmeid genereeriti valesti
    • ID-kaartide tootja rikkus tähtsaimat turvapõhimõtet ja 12 500 kaarti tuleb inimestel välja vahetada
    • PPA vahetab välja ligi 12 500 turvanõuetele mittevastavat ID-kaarti
  • 15.05.2018: Vulnerabilities that break OpenPGP and S/MIME
    • EFAIL
    • Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels (technical paper)
    • Critical PGP and S/MIME bugs can reveal encrypted emails
    • Was the Efail disclosure horribly screwed up?
    • PGP and EFAIL: Frequently Asked Questions
  • 25.04.2018: RIA küberturvalisuse aastaraamat
    • RIA esitles küberturvalisuse aastaraamatut
    • Küberturvalisus 2018
    • RIA: küberründed päädivad varem või hiljem inimohvritega
    • Vaata, millised on eestlaste TOP12 salasõnad
  • 25.04.2018: Vulnerability in the hotel door locks
    • A faked master key gives hackers access to millions of hotel rooms
    • Hotel door locks worldwide were vulnerable to hack
  • 16.04.2018: Attacks by Russian State-Sponsored Cyber Actors
    • Joint US - UK statement on malicious cyber activity carried out by Russian government
    • Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices
    • Nobody is safe from Russia's colossal hacking operation
  • 12.04.2018: Some Android OEMs have lied about security patches
    • Mind the Gap – Uncovering the Android patch gap through binary-only patch analysis
    • Some Android OEMs have been caught lying about security patches
  • 11.04.2018: Zuckerberg's Congressional hearing
    • Mark Zuckerberg's Facebook hearing was an utter sham
    • The Questions Zuckerberg Should Have Answered About Russia
  • 11.04.2018: Are users willing to pay to get rid of ransomware?
    • Four out of Five Ransomware Victims Would Pay the Ransom Again
    • Telstra Security Report 2018
  • 03.04.2018: Fake cell towers in Washington
    • US Suspects Listening Devices in Washington
  • 29.03.2018: Example of steganography
    • Mysterious 'MuslimCrypt' App Helps Jihadists Send Covert Messages
  • 17.03.2018: Facebook's so called leak
    • How Cambridge Analytica turned Facebook ‘likes’ into a lucrative political tool
    • Android Users, Change This Setting to Stop Facebook's Collection of Your Call and Text Metadata
    • Facebook Exposed 87 Million Users to Cambridge Analytica
    • This is how Cambridge Analytica’s Facebook targeting model really worked — according to the person who built it
    • Roger McNamee: “I Think You Can Make a Legitimate Case that Facebook Has Become Parasitic”
    • Facebook sent a doctor on a secret mission to ask hospitals to share patient data
  • 19.03.2018: Study reveals illigal content in Bitcoin's blockchain
    • Bitcoin's blockchain: Potentially a hazardous waste dump of child abuse, malware, etc
    • A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin
  • 12.03.2018: New study shows how speakers & headphones can be used as a microphone
    • Air gapping PCs won't stop data sharing thanks to sneaky speakers
    • MOSQUITO: Covert Ultrasonic Transmissions between Two Air-Gapped Computers using Speaker-to-Speaker Communication
  • 09.03.2018: Government spyware found in Turkey
    • Sandvine’s PacketLogic Devices Used to Deploy Government Spyware in Turkey and Redirect Egyptian Users to Affiliate Ads?
  • 03.07.2018: Google ends support for Nexus & Pixel devices
    • Google ends major OS support for Nexus phones and Pixel tablet
  • 28.02.2018: German government may have been the target of APT28
    • German Government Computers Hacked; Reports Point To Russia
  • 27.02.2018: Blockchain vs EU's GDPR
    • Blockchain technology is on a collision course with EU privacy law
  • 26.02.2018: It might be possible to access locked iPhones
    • The Feds Can Now (Probably) Unlock Every iPhone Model In Existence
    • Cellebrite Unlocks iPhones for the US Government
  • 09.02.2018: How to leak info from an air-gapped computer in a Faraday-Cage
    • ODINI : Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields
  • 08.02.2018: Google Chrome will tag all HTTP pages as insecure
    • A secure web is here to stay
  • January 2018: Meltdown and Spectre
    • Meltdown and Spectre
    • An accessible overview of Meltdown and Spectre, Part 1
  • 29.01.2018: Strava released their global heatmap
    • Fitness app Strava lights up staff at military bases
    • Fit Leaking: When a fitbit blows your cover
  • 29.01.2018: UK could fine companies up to £17 million
    • UK to fine companies up to £17 million for cybersecurity lapses
  • 29.01.2018: New Privacy Standard in China
    • New China Data Privacy Standard Looks More Far-Reaching than GDPR
  • 25.01.2018: How AIVD hacked Cozy Bear (APT29)
    • Dutch agencies provide crucial intel about Russia's interference in US-elections
  • 22.01.2018: How tracking pixel got thousands of turks into jail
    • 'Terrifying': How a single line of computer code put thousands of innocent Turks in jail
    • A 1x1 tracking pixel was used as evidence of treason against 30,000 Turks, sent tens of thousands to jail
  • 12.01.2018: Aftermath of NotPetya
    • Russian military was behind ‘NotPetya’ cyberattack in Ukraine, CIA concludes
    • Maersk Reinstalled 45,000 PCs and 4,000 Servers to Recover From NotPetya Attack
    • Twitter thread about the aftermath of NotPetya

Eelmiste semestrite vältel toimunud olulised infoturbega seotud sündmused leiab siit:

  • 2017 aasta sügissemestri jooksul toimunud sündmused
  • 2017 aasta kevadsemestri jooksul toimunud sündmused
  • 2016 aasta sügissemestri jooksul toimunud sündmused
  • 2016 aasta kevadsemestri jooksul toimunud sündmused
  • 2015 aasta sügissemestri jooksul toimunud sündmused
  • 2015 aasta kevadsemestri jooksul toimunud sündmused
  • 2014 aasta sügissemestri jooksul toimunud sündmused
  • Arvutiteaduse instituut
  • Loodus- ja täppisteaduste valdkond
  • Tartu Ülikool
Tehniliste probleemide või küsimuste korral kirjuta:

Kursuse sisu ja korralduslike küsimustega pöörduge kursuse korraldajate poole.
Õppematerjalide varalised autoriõigused kuuluvad Tartu Ülikoolile. Õppematerjalide kasutamine on lubatud autoriõiguse seaduses ettenähtud teose vaba kasutamise eesmärkidel ja tingimustel. Õppematerjalide kasutamisel on kasutaja kohustatud viitama õppematerjalide autorile.
Õppematerjalide kasutamine muudel eesmärkidel on lubatud ainult Tartu Ülikooli eelneval kirjalikul nõusolekul.
Tartu Ülikooli arvutiteaduse instituudi kursuste läbiviimist toetavad järgmised programmid:
euroopa sotsiaalfondi logo