June 15, 2012

  • Blasco, J. (2012, June 12). Unveiling a spearphising campaign and possible ramifications   Alien Vault. [Read – analysis of the DigitalBond attack].
  • Budapest University of Technology and Economics. Laboratory of Cryptography and System Security. (2012, May 31 – updates ongoing.) sKyWIper (a.k.a. Flame a.k.a. Flamer): A complex malware for targeted attacks. [Read]
  • Donohue, B. (2012, June 11). Attorney General Holder announces probe into cyberwar leaks. threatpost. [Read]
  • Goodin, D. (2012, June 11). Flame’s crypto attack may have needed $200,000 worth of compute power. Ars Technica. [Read]
  • 5th International Conference on Trust and Trustworthy Computing (2012, June 13-15) – papers presented [Request / Abstracts]:
  • Kaspersky Lab. (2012, June 11). Kaspersky Lab research proves that Stuxnet and Flame developers are connected. [Read]
  • Keogh, M., Cody, C. (2012, June). Cybersecurity for state regulators, with sample questions for regulators to ask utilities [National Association of Regulatory Utility Commissioners]. [Read]
  • Kravets, D. (2012, June 11). Feds tell Megaupload users to forget about their data. Wired. [Read]
  • Lee, A. (2012, June). Guidance on cybersecurity for the electricity sector. Power. [Read]
  • LulzSec: US indicts Ryan Cleary over hacking of Sony and Fox. (2012, June 14). Guardian. [Read]
  • McCullagh, D. (2012, June 14). Disaster awaits U.S. power grid as cybersecurity lags. C-NET.[Read]
  • Overly, S. (2012, June 11). Cyber-partnership for U-Md., Northrup. Washington Post. [Read]
  • Perlroth, N. (2012, June 11). Lax security at LinkedIn is laid bare. New York Times. [Read]
  • Ragan, S. (2012, June 11). Iran says U.S. attacked oil ministry. SecurityWeek. [Read]
  • Roberts, P. (2012, June 14). Software update site for hospital respirators found riddled with malware. threatpost. [Read]
  • Shalal-Esa, A. (2012, June 13). Scores of US firms keep quiet about cyber attacks. Reuters. [Read]
  • United Kingdom. Secretary of State for the Home. (2012, June). Draft communications data bill. [Read / Analysis]
  • United States. Department of Defense. (2012, May). Military and security developments involving the People’s Republic of China, 2012. [Read]
  • Unveillance. (2012, June 11). Visualizing botnets. [Watch -“A one minute slice of geolocated hosts that are infected with malware and unwittingly participating in a botnet”.]
  • Weiss, J. (2012, June). Ensuring the cybersecurity of plant industrial control systems. Power. [Read]
  • Wyden, R. (2012, June 11). Hold statement for Congressional Record on FISA Amendments Act. [Read / Analysis]

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: