hhmx.de

Dieses Fediverse-Konto und seine Inhalte werden nicht von hhmx.de verwaltet. Die kontoführende Instanz ist xn--baw-joa.social - die originale Adresse ist https://xn--baw-joa.social/@SECUSO_Research.

SECUSO_Research@xn--baw-joa.social
SECUSO_Research@xn--baw-joa.social

SECUSO Research

(@SECUSO_Research@xn--baw-joa.social)

Di 01.02.2022

Beiträge: 266Folgt: 51Folgende: 1.081

The research group SECUSO @KITKarlsruhe investigates methods to enhance the usability of security mechanisms & security awareness/education measures. SECUSO stands for SECurity - Usability - SOciety
Our website: secuso.aifb.kit.edu/

GitHub

SecUSo

Bluesky

secusoresearch.bsky.social

xn--baw-joa.social · mastodon · 2025-04-17 09:48:40

Föderation DE Fr 09.05.2025 10:28:27

Anne Hennig, , supports the Poster Jury of the Twenty-First on Usable and ( 2025). SOUPS seeks posters and poster abstracts of recent or ongoing related to usable privacy and security. Submissions of preliminary findings from ongoing work, undergraduate/master research projects, or posters about work on usable privacy and security that were recently published at other venues (2024 to 2025) are welcomed. Submission deadline for posters is Thursday, May 22, 2025. SOUPS 2025 will take place August 10-12 and will be co-located with the 34th USENIX Security Symposium in Seattle, WA, USA.
The : usenix.org/conference/soups202
@usenixassociation

Föderation DE Do 08.05.2025 09:32:31

@mozilla.social and have fixed issues after report by : After disclosing security issues related to user deception through IDN homographic domains to Mozilla, these issues have been addressed in the latest versions of Mozilla Firefox and Thunderbird. We recommend keeping your email clients and browsers up to date to ensure the best possible protection. The full article by Maxime Veit et al. about the user deceptions that can be used by attackers was recently published in Computers & Security.
Read the paper: publikationen.bibliothek.kit.e

Föderation DE Mi 30.04.2025 08:53:30

Haben Sie genug von den ständigen Sicherheitswarnungen, die jeden Tag auftauchen, und ertappen Sie sich dabei, wie Sie sie durchklicken, ohne sie wirklich zu lesen? Da sind Sie nicht allein. Wir erforschen, wie wir diese Unterbrechungen reduzieren können, indem wir Sicherheitswarnungen nur dann anzeigen, wenn sie wirklich benötigt werden, und zwar auf der Grundlage des Nutzerverhaltens und auf eine datenschutzfreundliche Weise. Treffen Sie Maxime Veit am „Tag der offenen Tür“ des @KIT_Karlsruhe im KD²Lab (Fritz-Erler-Straße 1-3), um unsere Forschung aus erster Hand zu erfahren und mitzudiskutieren. Sie können auch STAR, unseren Security Teaching & Awareness Roboter, im KIT Ehrenhof (Kaiserstraße 10) besuchen, wo er unsere Arbeit zum Thema E-Mail-Phishing auf interaktive und ansprechende Weise präsentiert.
Zum gesamten Programm: kit.edu/kit/tag-der-offenen-tu

Föderation DE Mo 28.04.2025 09:21:51

In a recent article published in Computers & Security, Maxime Veit, Oliver Wiese, Fabian Lucas Ballreich, Melanie Volkamer, Douglas Engels, and Peter Mayer investigate how email clients fare against user techniques that have evolved over the past decade. Despite advances in email their systematic review and empirical analysis reveal that many clients—including , and Apple Mail—remain vulnerable to deceptive practices, especially those involving misleading links. Their evaluation of seven widely used email clients across desktop, mobile, and web platforms shows that most are still susceptible to several high-impact techniques. They also provide concrete recommendations, some of which have already prompted improvements, particularly in the handling of links in mobile mail apps.
You can read the article here: doi.org/10.1016/j.cose.2024.10

Föderation · Mo 21.04.2025 15:31:39

leitete weiter:

Föderation DE Mo 21.04.2025 01:57:36

From All Europeans 🇪🇺 (@ueeu)

social.vivaldi.net/@ueeu/11437

The research group SECUSO (@SECUSO_Research) at Karlsruhe Institute of Technology 🇩🇪 (@KIT_Karlsruhe) has an account in the Play Store and F-Droid where you can download lots of privacy-friendly apps like:

- QR Scanner - Games - Finance - Todo list, notes, shopping list - Health and sport - Password Generator - Tools - etc

PlayStore: play.google.com/store/apps/dev

F-Droid: search.f-droid.org/?q=secuso

Their github: github.com/SecUSo

Medien: 1

Föderation · Mo 21.04.2025 15:31:13

leitete weiter:

Föderation EN So 20.04.2025 22:23:48

The research group SECUSO (@SECUSO_Research) at Karlsruhe Institute of Technology 🇩🇪 (@KIT_Karlsruhe) has an account in the Play Store and F-Droid where you can download lots of privacy-friendly apps like: 😀

- QR Scanner
- Games
- Finance
- Todo list, notes, shopping list
- Health and sport
- Password Generator
- Tools
- etc

PlayStore: play.google.com/store/apps/dev
F-Droid: search.f-droid.org/?q=secuso&l

Their github: github.com/SecUSo

Medien: 1

Föderation · Mo 14.04.2025 08:41:19

leitete weiter:

· Föderation DE So 13.04.2025 17:23:17

@Sven @david_zwei @digitalcourage

Danke.

Für Alle da draußen ein Sicherheitshinweis. Unbewachte QR-Codes immer vor Anwendung prüfen, z.B. mit der App der Forschungsgruppe SECUSO im KIT <secuso.aifb.kit.edu/downloads/>. Die werden schonmal mit Schadcode überklebt. verbraucherzentrale.de/wissen/

Föderation DE Fr 28.03.2025 09:43:22

The call for papers for this year’s European Symposium on Usable Security () is published. Current contributions from the area of usable security have to be registered until Monday May 05, 2024. Submission deadline is Firday May, 09, 2025. As in previous years, EuroUSEC will be an independent event without affiliation to any conference. Accepted contributions will be published as part of the International Conference Proceeding Series (ICPS) by ACM. EuroUSEC 2025 will take place September 10 & 11, 2025 in Manchester, UK. Again, Anne Hennig supports the conference as member of the program commitee.

Submit to EuroUSEC: eurousec2025.cis.strath.ac.uk

Föderation DE Mo 24.03.2025 07:02:55

The technical project report "Project Report HSF Research Area 4 -Graphical Authentication on Augmented Reality" by Melanie Volkamer, Reyhan Duzgun, Tobias Hilt, Philipp Matheis and Peter Mayer has been published. In a between-subjects lab study with 126 participants, three different combinations of grid size and secret length for the “Things” authentication scheme were examined. While a two-row layout with a total of 10 images showed slight advantages over the other variants, the qualitative feedback indicates that the optimal user experience can be achieved by allowing users to adjust the grid size individually. This technical project report was written as part of the subtopic ‘Methods for Engineering Secure Systems’ of the Helmholtz Topic ‘Engineering Secure Systems (ESS)’.

You can read the report here: publikationen.bibliothek.kit.e

Föderation DE Fr 21.03.2025 09:29:53

unterstützt den Day an der TU Freiberg am Mittwoch, 2. April, mit Materialien zu . Unsere NoPhish-Materialien wurden entwickelt, damit Nutzerinnen und Nutzer Angriffe in Form von betrügerischen Nachrichten besser verstehen und lernen, wie sie sich schützen können. NoPhish führt in das Thema Phishing ein und zeigt, wie man unplausible, betrügerische Nachrichten, Nachrichten mit gefährlichen Links und Nachrichten mit gefährlichen Anhängen erkennen kann.
Zu den Materialien und mehr Informationen zu NoPhish: secuso.aifb.kit.edu/betruegeri
@tu_freiberg