article thumbnail

Malicious file analysis – Example 01

Security Affairs

Cyber Security Specialist Zoziel Pinto Freire shows an example of malicious file analysis presented during his lecture on BSides-Vitória 2022. My objective with this series of articles is to show examples of malicious file analysis that I presented during my lecture on BSides-Vitória 2022. Example: python2.7

Libraries 102
article thumbnail

Security Analysis of Threema

Schneier on Security

A group of Swiss researchers have published an impressive security analysis of Threema. We provide an extensive cryptographic analysis of Threema, a Swiss-based encrypted messaging application with more than 10 million users and 7000 corporate customers.

Security 115
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Examples and uses of GIS

IBM Big Data Hub

GIS perform spatial analysis of geospatial datasets—consisting of vector data (points, lines and polygons) and raster data (cells with spatial information)—to produce connected visualizations. The data from this soil and water analysis helps farmers improve yields while reducing costs and pollution runoff.

article thumbnail

Security Analysis of a Thirteenth-Century Venetian Election Protocol

Schneier on Security

Interesting analysis : This paper discusses the protocol used for electing the Doge of Venice between 1268 and the end of the Republic in 1797. For example, it gives some opportunities to minorities while ensuring that more popular candidates are more likely to win, and offers some resistance to corruption of voters.

Security 100
article thumbnail

How to Package and Price Embedded Analytics

Just by embedding analytics, application owners can charge 24% more for their product. How much value could you add? This framework explains how application enhancements can extend your product offerings. Brought to you by Logi Analytics.

article thumbnail

Climate change examples

IBM Big Data Hub

Here are a few examples: Sea ice loss and melting ice sheets: Declining levels of Arctic sea ice threaten the habitats of species such as polar bears and walruses. Poor air quality from wildfire smoke can exacerbate asthma and heart disease, for example, while heat waves can cause heat exhaustion.

article thumbnail

What Is a Firewall Policy? Steps, Examples & Free Template

eSecurity Planet

It aims to prevent unauthorized access, manage data movement, and guard against potential security threats. When creating the firewall policy draft, these elements make up a detailed set of rules and guidelines controlling the use, management, and security configurations of a firewall inside an organization.