SUCHE
-
IDC Security Roadshow
Erkenntnisse und Interaktionen zu den wichtigsten Themen durch Keynotes, Podiumsdiskussionen und Peer-to-Peer-Networking. Mehr über die IDC Security Roadshow in Wien. AIT-Kontakt: Christina Hochleitner
-
VCSW19 - Video Galerie
- /ueber-das-ait/center/center-for-digital-safety-security/fairs-events/vienna-cyber-security-week-2019/vcsw19-video-galerie
Vienna Cyber Security Week took place from 11th to 15th March 2019. Consisting of multiple tracks over the course of five days, the conference seeks to enhance understanding of current approaches for cyber [...] Stakeholder Voices @ VCSW19 (Part 1/2) Everything is going to be connected and the more we are connected the more vulnerable we are - listen to some interesting thoughts at the #VCSW19 Minister's keynote [...] VCSW19 (Part 2/2) Listen to some interesting thoughts at the #VCSW19 Austrian Exhibitors about VCSW19 The biggest challenge for sure is the dramatic rise of complexity - listen to some voices of exhibitors
-
Presented AIT AAL projects at the AAL Forum 2019
- /loesungen/care-solutions/presented-ait-aal-projects-at-the-aal-forum-2019
provides a solution to help people with dementia to live with a decline of memory. It will provide a tool to create own sets of memories in everyday life. The developed solution will help to remember daily [...] tangible interaction possibilities following the criteria easy to understand, easy to handle and fun to use Kith&Kin enables older adults to use the functionalities communicating, gaming , and sharing. At [...] as well as to develop go-to market strategies. http://waalter.wien/ SUCCESS The SUCCESS project provides an innovative mobile training application to support formal and informal caregivers to appropriately
-
AIT Workshop @ AAL Forum 2019
Wednesday 25 September 16:00-17:30 Room: Nortvegia The decision whether to implement an AAL solution should ideally be based on scientifically validated evidence and proof of the effectiveness of AAL [...] benefits for the social and the health care system and economic profitability and cost-effectiveness have to be considered. The complexity of implementation decisions contrasts with the fact that so far only [...] evaluation results are hardly comparable since there is often no common understanding of the constructs to be measured. This results in the need for a mutual understanding regarding striven impacts for imp
-
BSidesVienna 2019
have less of a commercial/academic conference - then a meetup - atmosphere, many people just come to talk to old friends, get new perspectives and chat with people they’ve never met before. Of course, there [...] as submitted abstracts) is English to ensure our foreign friends don't feel all sad panda about missing things. Topics of interest include (but are in no way limited to) the following: Information technology
-
Biometrics Institute Congress 2019
control solutions, ranging from low to high security applications and requirements. The experts are implementing contactless biometric solutions in mobile devices to ease the work of Law Enforcement Agencies [...] We live in an era where laws and regulations are often unable to stay abreast of technology change and the business models based on that change. The Biometrics Institute Congress has established itself [...] itself as the meeting place for the international biometrics community to gather annually in London. It provides an independent platform for off-the-record discussion among the institute’s global multi-stakeholder
-
Simone Kriglstein auf der CHI Play mit einem Honourable Mention Award ausgezeichnet
navigate through virtual worlds can offer useful guidance for map and level design of video games. One way to handle large-scale movement data obtained within games is by modelling movement as a sequence of visited [...] concept, the visualization offers an aggregated view of movement patterns together with the possibility to view individual paths for detailed inspection. We report on a user study with six experts from the [...] successful in localizing problematic areas and that semantic trajectories can be a valuable addition to existing approaches for player movement analysis. Außerdem stellte sie zwei Poster mit Mitbeteiligung
-
European Utility Week 2019: AIT präsentiert Innovationen für die Energiebranche
Hardware-in- the-loop bis hin zu Labortests. Das spart der Industrie und den Unternehmen kostbare Time-to-Market für die Integration neuer Technologien und trägt damit wesentlich zur Effizienzsteigerung bei
-
NGI Talk #5: The decentralized economy
computers to PCs in the ninetieth of the last century, followed by the rise of the clouds and mobile devices in the early 2000s, we are now facing a shift from traditional network structures to dynamic and [...] and flexible connections that enable players to cooperate without the need for central intermediates. Given these developments, traditional organization patterns and processes are no longer applicable [...] . This is specifically true for the financial sector where crypto currencies enable to transfer money without the need for any intermediates (banks). In this session of the NGI-Talks we will discuss how
-
AIT gewinnt Best Paper Award auf internationaler Konferenz für Ambient Intelligence
persists for design based on an everyday home context and the social and emotional nature of the home. To address this, we identify specific leverage points and functionalities for energy-efficiency and smart [...] requirements, employing cultural probing, participatory design fiction and focus groups allowed us to progress from the home context “as-is” towards a blending of requirements with technological solutions [...] that allow design for a heterogeneity of users and situations. Second, we derive specific design goals to highlight directions of smart home system design: design for control, low effort, integration, evolvability
-
Wie kann Technologie für Fussballfans sinnvoll eingesetzt werden?
amüsant zu gestalten. Die Umfrage dauert in etwa eine Halbzeitpause: https://gensation.typeform.com/to/LXMtEI Wir bedanken uns recht herzlich für die Teilnahme! Zum Projekt: Im Rahmen eines Forschungsprojekts
-
AIT-SA-20190930-01
- /themen/cyber-security/pentesting/security-advisories/ait-sa-20190930-01
postrotate endscript } Due to logrotate is prone to a race-condition it is possible for user "git" to replace the directory /var/log/gitlab/gitlab-workhorse/ with a symbolic link to any directory( for example [...] user “git” could elevate the privileges to “root”. The fact that another exploit is needed to get a shell lowers the severity from high to low. Solution Update to GitLab Security Release: 12.2.3, 12.1.8 [...] Hotwagner (AIT Austrian Institute of Technology ) Summary Omnibus GitLab is a way to package different services and tools required to run GitLab, so that most users can install it without laborious configuration
-
AIT-SA-20191112-01
- /themen/cyber-security/pentesting/security-advisories/ait-sa-20191112-01
could elevate the privileges to “root”. The fact that another exploit is needed to get a shell lowers the severity from high to low. Mitigation Add “su radiusd:radiusd” to all log sections in /etc/logrotate [...] ity Description The ownership of the logdirectory “radacct” belongs to user "radiusd". User “radiusd” can elevate the privileges to “root” because of an unsafe interaction with logrotate. User “radiusd” [...] compress } Since logrotate is prone to a race-condition(see https://tech.feedyourhead.at/content/details-of-a-logrotate-race-condition ) it is possible for user "radiusd" to replace the directory /var/log/
-
AIT-SA-20191129-01
- /themen/cyber-security/pentesting/security-advisories/ait-sa-20191129-01
could upload a webshell to the server and execute commands remotely. Mitigation At the moment of this publication the vendor has only patched the paid version of the CMS, so a change to other free software [...] or in “ api/Comparison.php ” via the cookie "comparison". Both cookies will pass untrusted values to a unserialize()-function. The following code shows the vulnerability in “ api/Comparison.php ”: $items [...] E['price_filter']); Proof of Concept The following code utilizes an object of the smarty-component to delete arbitrary files from the webhost: <?php if($argc != 3) { print "usage: $argv[0] <url> <file>\n";
-
China and the Power of Information
"China and the Power of Information" - on 23.01.2020 Helmut Leopold, cyber security expert and head of center for Digital Safety & Security at the AIT, will discuss current challenges arising in the [...] in Vienna (Amerika Haus). How relevant are new technologies such as AI, Big Data or 5G with respect to our privacy? And why is a responsible handling of technologies so important? The discussion partners
-
Gaming and eSports Workshop (virtual)
The workshop aims to address these challenges by considering how technology has the potential to empower viewers, to make games more accessible for the audience, to spark interest, and to stimulate a feeling [...] independent from each other. The workshop aims to bring researchers and practitioners from different disciplines together to promote interdisciplinary exchange, to increase awareness, and establish a community [...] the subject matter. It aims to foster discussion on how technology and HCI can help to transform the act of spectating games and particularly esports from a passive (watching) to a more active – and engaging
-
Abgesagt: CHI 2020
across the world to discuss the latest in interactive technology. The multicultural community with highly diverse backgrounds, together investigate and design new and creative ways for people to interact using
-
QoMEX 2020 - Online Konferenz
The primary goal of the conference is to bring together leading professionals and scientists in multimedia quality and user experience from around the world. QoMEX is a conference taking place annually
-
ERCIM News 119 "Smart Things Everywhere"
Theme Autoren dieser Ausgabe, den Artikel finden Sie hier: Theme Smart Things Everywhere - Introduction to the Special Theme Die gesamte Ausgabe finden Sie hier: ERCIM News 119 "Smart Things Everywhere" ERCIM
-
CAESAIR
- /themen/cyber-security/unser-angebot/caesair
intelligence solution designed to provide analytical support for security experts carrying out IT incident handling tasks on a local, national or international level. Thanks to its powerful correlation capability [...] capability, CÆSAIR provides analysts with the necessary support to handle reported incident information. It aggregates and examines intelligence acquired from numerous Open Source INTelligence (OSINT) feeds; [...] feeds; it quickly identifies related threats and existing mitigation procedures; it allows to establish cyber situational awareness by keeping track of security incidents and threats affecting the monitored