August 10, 2012

  • Braun, J., Buchmann, J., Mullan, C., & Wiesmaier, A. (2012, August 9). Long term confidentiality: A survey [preprint]. [Read – one of many new articles posted this week in the Cryptology ePrint Archive].
  • Brook, C. (2012, August 9). Report: Stealthy new banking malware Tilon emergest. threatpost. [Read]
  • Cummings, A., Lewellen, T., McIntire, D, Moore, A., & Trzeciak, R. (2012). Insider threat study: Illicit cyber activity involving fraud in the U.S. financial sector [Carnegie Mellon Software Engineering Institute]. [Read]
  • Giuliani, G., & Sharf, E. (2012, August 8). Nepalese government websites compromised to serve Zegost RAT. websense. [Read]
  • Jianway, Z., Liang, G., & Haixin, D. (2012, July). Investigating China’s underground online economy [University of California Institute on Global Conflict and Collaboration]. [Read]
  • Kaspersky Lab. (2012, August 9). Gauss: Nation-state cyber-surveillance meets banking trojan. Securelist. [Read – more on Gauss from Kaspersky]
  • Kravets, D. (2012, August 7). Appeals court OKs warrantless wiretapping. Wired. [Read]
  • Krebs, B. (2012, August 7). How to break into security, Miller edition. [Advice from Charlie Miller on how to become a computer security professional]. Krebs on Security. [Read]
  • Muñoz, C. (2012, August 8). White House considers executive action to address cybersecurity. The Hill. [Read]
  • Perlroth, N., & Rusli, E. M. (2012, August 5). Computer security start-ups catch fancy of investors. New York Times. [Read]
  • 2nd USENIX Workshop on Free and Open Communications on the Internet (August 6, 2012). [Full text of selected papers]:
  • Sorber, J., Shin, M., Peterson, R., Cornelius, C., Mare, S., Prasad, A. . . . Kotz, D. (2012). An Amulet for trustworthy wearable mhealth [preprint]. [Read]
  • Tait, R. (2012, August 5). Iranian state goes offline to dodge cyber-attacks. Telegraph. [Read]
  • United States. National Institute of Standards and Technology. (2012, August 8). Computer security incident handling guide (SP 800-61, revision 2). [Read]

Calls for Papers




Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: