August 17, 2012

  • AT&T DDoS’d by unknown attackers. (2012, August 17). Infosecurity. [Read]
  • Goodin, D. (2012 August 16). Mystery malware wreaks havoc on energy sector computers. Ars Technica. [Read]
  • Journal of Conflict and Security Law – issue on cyberwarfare [Abstracts / Request]:
  • Kaspersky Lab. (2012, August 14). The mystery of the encrypted Gauss payload. Securelist. [Read]
  • Kerr, D. (2012, August 15). Syrian dissidents besieged by malware attacks. CNET. [Read]
  • Kravets, D. (2012, August 14). Appeals court OKs warrantless, real-time mobile phone tracking. Wired. [Read]
  • Mackinnon, R. (2012). Consent of the networked: The worldwide struggle for internet freedom [ebook – Read]
  • Pauli, D. (2012, August 16). Half a million credit cards stolen from Aussie businesses. CRN. [Read]
  • Perlroth, N. (2012, August 13). Elusive FinSpy spyware pops up in ten countries. New York Times. [Read]
  • Schactman, N. (2012, August 14). TrapWire: It’s not the surveillance, it’s the sleaze. Wired. [Read]
  • Security and Communications Networks – new articles [Abstracts / Request]:
  • Syal, R., Davies, L., & Caselli, I. (2012, August 16). Julian Assange asylum offer leads Ecuador and UK into diplomatic row. Guardian. [Read]
  • 32nd Annual Cryptology Conference (2012, August 19-23) – papers to be presented [Abstracts / Request]:
  • United States. National Institute of Standards and Technology. (2012, August). Security of Bluetooth systems and devices. [Read]

Calls for Papers

Conferences

Journals

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: