September 14, 2012

  • BMW: Open to car theft [2006-present models vulnerable to blank key attacks]. BBC. [Read / Watch]
  • Blackhole Exploit Kit updates to 2.0. Websense Security Labs. [Read – More]
  • Bond, M., Choudary, O., Murdoch, S. J., Skorobogatov, S., & Anderson, R. (2012). Chip and skim: Cloning EMV cards with the pre-play attack [preprint]. [Read]
  • Global security spending to hit $86B in 2016. Infosecurity. [Read]
  • Goodin, D. (2012, September 14). Serial iPhone and Mac hacker Charlie Miller takes job at Twitter. Ars Technica. [Read]
  • Honan, M. (2012, September 11). Cosmo, the hacker ‘god’ who fell to Earth [RE: UGNazi arrests]. Wired. [Read]
  • Kravets, D. (2012, September 12). House approves sweeping, warrantless electonic spy powers. Wired. [Read]
  • Kumar, M. (2012, September 13). India ties up with US for cyber security. DNA India. [Read]
  • Liu, E. C. (2012, September 12). Reauthorization of the FISA Amendments Act [Congressional Research Service]. [Read]
  • Martinez, J. (2012, September 12). Markey introduces mobile privacy bill. The Hill. [Read]
  • Perlroth, N., & Bilton, N. (2012, September 11). GoDaddy says its troubles were not hacker-related. New York Times. [Read]
  • Pratap, K. (2012, September 11). Security research roundup for ISO 27001 compliance [Gartner]. [Read]
  • Sternstein, A. (2012, September 12). Pact sends highly sensitive spy agency data to the cloud. NextGov. [Read]
  • United States. Congress. House. Permanent Select Committee on Intelligence. (2012, September 13). Investigation of the security threat posed by Chinese telecommunications companies Huawei and ZTE. [Read]
  • United States. Department of Defense. (2012, September 11). Instruction: DoD internet services and internet-based capabilities. [Read]
  • United States. Government Accountability Office. (2012, September 12). Department of Homeland Security: Oversight and coordination of research and development should be strengthened. [Read]
  • Zetter, K. (2012, September 10). Apple device IDs leaked by Anonymous traced to app developer Blue Toad. Wired. [Read]

Proceedings

  • 13th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security. (2012, September 3-5)  – papers presented [Abstracts / Request]:
  • 14th International Workshop on Cryptographic Hardware and Embedded Systems. (2012, September 9-12) – papers presented [Abstracts / Request]:
  • 15th International Conference on Information Security. (2012, September 19-20) – papers presented [Abstracts / Request]:
  • 31st International Conference on Computer Safety, Reliability, and Security. (2012, September 25-28) – papers presented [Abstracts / Request]:
Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: