Archive

Monthly Archives: September 2012

  • Data breach at IEEE.org: 100k plaintext passwords. (2012, September 25). IEEE log. [Read – ” Among . . .  compromised users are Apple, Google, IBM, Oracle and Samsung employees, as well as researchers from NASA, Stanford and many other places.”]
  • Deloitte. (2012, September 11). 2012 DTTL global financial services industry security study. [Read]
  • Dorling, P. (2012, September 27). US calls Assange ‘enemy of the state’. Sydney Morning Herald. [Read / More: Bloomberg / NBC  / CNET / USAF document via Wikileaks]
  • Ducklin, P. (2012, September 26). Are Android phones facing a remote-wipe hacking pandemic? Naked Security. [Read]
  • Kravets, D. (2012, September 27). Justice Department’s warrantless spying increased 600 percent in decade. Wired. [Read / More]
  • Krebs, B. (2012, September 26). Chinese hackers blamed for intrusion at energy industry giant Telvent. Krebs on Security. [Read]
  • Love, J. (2012, September 18). USPTO blocks web access to “political / activist groups” including KEI, ACLU, EFF, Public Citizen, Redstate, Daily KOS. Knowledge Ecology International. [Read]
  • Nakashima, E. (2012, September 21). Iran blamed for cyberattacks on U.S. banks and companies. Washington Post. [Read – RE: Lieberman accusations / More / More]
  • Network Security– new issue [full text]:
  • Rashid, F. Y. (2012, September 27). Adobe revoking code signing certificate used to sign malware. SecurityWeek. [Read]
  • Rieger, F. , & Suarez, D. (2012, September 24). Swarming killing machines. Frankfurter Allgemeine Zeitung. [Read – Suarez: “I view drone warfare as the kinetic cousin of cyber warfare, in that they are both radically new, low-cost, low-risk methods of waging conflict.”]
  • Shane, S. (2012, September 26). Cyberwarfare emerges from the shadows for public discussion by U.S. officials. New York Times. [Read]
  • Tehan, R. (2012, September 11). Cybersecurity: Authoritative reports and resources [UPDATED – Congressional Research Service]. [Read]
  • United States. Federal Trade Commission. (2012, September 25). FTC halts computer spying. [Read – RE: spyware installed by rent-to-own firms].

Upcoming Largo Area Events

Advertisements
  • Associated Press. (2012, September 20). U.S. Defense Secretary Leon Panetta talks computer hacking issues with the Chinese. [Read]
  • Behrens, S., Alberts, C. J., & Ruefle, R. (2012, September). Competency lifecycle roadmap: Toward performance readiness [Carnegie Mellon Software Engineering Institute / CERT]. [Read]
  • Cutler, S. (2012, September 18). The Mirage campaign [Dell SecureWorks]. [Read]
  • EU’s Clean IT is anything but clean in its intentions. (2012, September 21). Infosecurity. [Read]
  • Great Britain. Parliament. (2012, September 11). Draft Communications Data Bill: Written evidence [testimony]. [Read]
  • Greene, T. (2012, September 18). Kaspersky researcher cracks Flame malware password. Network World. [Read / More]
  • Harris, P. (2012, September 15). US data whistleblower: ‘It’s a violation of everybody’s constitutional rights’ [Bill Binney on the NSA]. Guardian. [Read]
  • IBM. (2012, September). IBM X-Force 2012 midyear trend and risk report. [Read]
  • I/S: A Journal of Law and Policy for the Information Society – new issue [full text]:
  • Jaeger, M. (2012, September 18). Germany proposes ban on surveillance software exports to totalitarian regimes. ZDNet. [Read]
  • Kravets, D. (2012, September 14). Twitter reluctantly coughs up Occupy protester’s data. Wired. [Read]
  • Krebs, B. (2012, September 19). Malware dragnet snags millions of infected PCs. Krebs on Security. [Read]
  • McArthur, K., & Parsons, C. A. (2012, September 17). Understanding the lawful access decryption requirement [RE: Canadian Parliament Bill C-30]. [Read]
  • McCullagh, D. (2012, September 20). Senate delays Netflix, e-mail privacy fix after cops protest. CNET. [Read – More]
  • Pauli, D. (2012, September 17). Phonetic attack commands crash bank phone lines. SC Magazine. [Read]
  • Soghoian, C. (2012, September 18). Keeping the government out of your smartphone [American Civil Liberties Union]. [Read]
  • United States. Government Accountability Office. (2012, September 18). Information security: Better implementation of controls for mobile devices should be encouraged. [Read]
  • United States. Department of Homeland Security. (2012, September 19). ORing Industrial Networking IDS-5042 / 5042+ hard-coded credential vulnerability. [Read / Analysis]
  • United States. Government Accountability Office. (2012, September 19). Human capital management: Effectively implementing reforms and closing critical skills gaps are key to addressing federal workforce challenges. [http://www.gao.gov/products/GAO-12-1023T]
  • Vijayan, J. (2012, September 19). Virgin Mobile subscribers found vulnerable to account hijacking. Computerworld. [Read]
  • York, J. C. (2012, September 18). Philippines’ new Cybercrime Prevention Act troubling for free expression [Electronic Frontier Foundation]. [Read]
  • BMW: Open to car theft [2006-present models vulnerable to blank key attacks]. BBC. [Read / Watch]
  • Blackhole Exploit Kit updates to 2.0. Websense Security Labs. [Read – More]
  • Bond, M., Choudary, O., Murdoch, S. J., Skorobogatov, S., & Anderson, R. (2012). Chip and skim: Cloning EMV cards with the pre-play attack [preprint]. [Read]
  • Global security spending to hit $86B in 2016. Infosecurity. [Read]
  • Goodin, D. (2012, September 14). Serial iPhone and Mac hacker Charlie Miller takes job at Twitter. Ars Technica. [Read]
  • Honan, M. (2012, September 11). Cosmo, the hacker ‘god’ who fell to Earth [RE: UGNazi arrests]. Wired. [Read]
  • Kravets, D. (2012, September 12). House approves sweeping, warrantless electonic spy powers. Wired. [Read]
  • Kumar, M. (2012, September 13). India ties up with US for cyber security. DNA India. [Read]
  • Liu, E. C. (2012, September 12). Reauthorization of the FISA Amendments Act [Congressional Research Service]. [Read]
  • Martinez, J. (2012, September 12). Markey introduces mobile privacy bill. The Hill. [Read]
  • Perlroth, N., & Bilton, N. (2012, September 11). GoDaddy says its troubles were not hacker-related. New York Times. [Read]
  • Pratap, K. (2012, September 11). Security research roundup for ISO 27001 compliance [Gartner]. [Read]
  • Sternstein, A. (2012, September 12). Pact sends highly sensitive spy agency data to the cloud. NextGov. [Read]
  • United States. Congress. House. Permanent Select Committee on Intelligence. (2012, September 13). Investigation of the security threat posed by Chinese telecommunications companies Huawei and ZTE. [Read]
  • United States. Department of Defense. (2012, September 11). Instruction: DoD internet services and internet-based capabilities. [Read]
  • United States. Government Accountability Office. (2012, September 12). Department of Homeland Security: Oversight and coordination of research and development should be strengthened. [Read]
  • Zetter, K. (2012, September 10). Apple device IDs leaked by Anonymous traced to app developer Blue Toad. Wired. [Read]

Proceedings

  • 13th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security. (2012, September 3-5)  – papers presented [Abstracts / Request]:
  • 14th International Workshop on Cryptographic Hardware and Embedded Systems. (2012, September 9-12) – papers presented [Abstracts / Request]:
  • 15th International Conference on Information Security. (2012, September 19-20) – papers presented [Abstracts / Request]:
  • 31st International Conference on Computer Safety, Reliability, and Security. (2012, September 25-28) – papers presented [Abstracts / Request]:
  • Amerding, T. (2012, September 7). Vendor cybercrime report in the hotseat again. CSO. [Read]
  • Britain sets US extradition date for ‘UFO hacker’ McKinnon. (2012, September 6). Infosecurity. [Read]
  • Coldewey, D. (2012, September 2). Apple patent would disable phone based on location. MSN. [Read]
  • 8th International Conference on Security and Cryptography for Networks. (2012, September 5-7) – papers presented [Abstracts / Request]:
  • Finkle, J. (2012, September 7). Insiders suspected in Saudi cyber attack. Reuters. [Read]
  • Fisher, D., & Huger, A. (2012, September 7). [Interview with Sourcefire’s Al Huger on the challenges and importance of malware attribution]. threatpost. [Listen]
  • Han, J., Susilo, Mu, Y., & Yan, J. (2012). New constructions of OSBE schemes and their applications in oblivious access control. International Journal of Information Security. [Abstract / Request]
  • Householder, A. D., & Foote, J. M. (2012, August). Probability-based parameter selection for black-box fuzz testing [Carnegie Mellon Software Engineering Institute]. [Read]
  • Kerr, D. (2012, September 6). Hacker who infected 72,000 computers gets prison sentence. CNet. [Read]
  • Kravets, D. (2012, September 5). Feds say mobile-phone location data not constitutionally protected. Wired. [Read]
  • Marks, P. (2012, September 4). Honeypot reveals mass monitoring of downloaders. New Scientist. [Read]
  • Saita, A. (2012, September 5). BitFloor suspends service after virtual currency heist. threatpost. [Read]
  • Security and Communication Networks– new articles [Abstracts / Request]:
  • Zetter, K. (2012, September 7). Sleuths trace new zero-day attacks to hackers who hit Google. Wired. [Read]

Calls for Papers

Conferences