- Braun, J., Buchmann, J., Mullan, C., & Wiesmaier, A. (2012, August 9). Long term confidentiality: A survey [preprint]. [Read – one of many new articles posted this week in the Cryptology ePrint Archive].
- Brook, C. (2012, August 9). Report: Stealthy new banking malware Tilon emergest. threatpost. [Read]
- Cummings, A., Lewellen, T., McIntire, D, Moore, A., & Trzeciak, R. (2012). Insider threat study: Illicit cyber activity involving fraud in the U.S. financial sector [Carnegie Mellon Software Engineering Institute]. [Read]
- Giuliani, G., & Sharf, E. (2012, August 8). Nepalese government websites compromised to serve Zegost RAT. websense. [Read]
- Goodin, D. (2012, August 9). Nation-sponsored malware with Stuxnet ties has mystery warhead. Ars Technica. [Read – also from Dan Goodin this week: Wikileaks, Demonoid felled by crude (but potent) attacks, 50K Microsoft defense bypassed in 2 weeks, Using biometrics to prevent medical device hacks]
- Honan, M. (2012, August 6). How Apple and Amazon security flaws led to my epic hacking. Wired. [Read – also: How not to become Mat Honan].
- Jianway, Z., Liang, G., & Haixin, D. (2012, July). Investigating China’s underground online economy [University of California Institute on Global Conflict and Collaboration]. [Read]
- Kaspersky Lab. (2012, August 9). Gauss: Nation-state cyber-surveillance meets banking trojan. Securelist. [Read – more on Gauss from Kaspersky]
- Kravets, D. (2012, August 7). Appeals court OKs warrantless wiretapping. Wired. [Read]
- Krebs, B. (2012, August 7). How to break into security, Miller edition. [Advice from Charlie Miller on how to become a computer security professional]. Krebs on Security. [Read]
- Muñoz, C. (2012, August 8). White House considers executive action to address cybersecurity. The Hill. [Read]
- Perlroth, N., & Rusli, E. M. (2012, August 5). Computer security start-ups catch fancy of investors. New York Times. [Read]
- 2nd USENIX Workshop on Free and Open Communications on the Internet (August 6, 2012). [Full text of selected papers]:
- How the great firewall of China is blocking Tor
- One-way indexing for plausible deniability in censorship resistant storage
- Bootstrapping communications into an anti-censorship system
- vpwns: Virtual pwned networks
- Protecting free and open communications on the internet against man-in-the-middle attacks on third-party software: We’re FOCI’d
- Inferring mechanics of Web censorship around the world
- OONI: Open observatory of network interference
- Whiskey, weed, and Wukan on the World Wide web: On measuring censors’ resources and motivations
- Internet filtering in liberal democracies
- Communications disruption & censorship under international law: History lessons
- Sorber, J., Shin, M., Peterson, R., Cornelius, C., Mare, S., Prasad, A. . . . Kotz, D. (2012). An Amulet for trustworthy wearable mhealth [preprint]. [Read]
- Tait, R. (2012, August 5). Iranian state goes offline to dodge cyber-attacks. Telegraph. [Read]
- United States. National Institute of Standards and Technology. (2012, August 8). Computer security incident handling guide (SP 800-61, revision 2). [Read]
Calls for Papers
- 8th China International Conference on Information Security and Cryptology [Beijing, Nov. 28 – Dec. 1, 2012 – submissions due Aug. 20].
- 3rd ACM Conference on Data and Application Security and Privacy [San Antonio, TX, Feb. 18-20, 2013 – submissions due Aug. 31].
- 3rd IFIP WG 11.6 Working Conference on Policies & Research in Identity Management [London, UK, April 8-9, 2013, submissions due Oct. 26]
- IEEE Internet Computing, issue on internet censorship and control [deadline Sept. 1, 2012].
- International Journal of Information Security, issue on security in cloud computing [deadline Nov. 10, 2012].