September 21, 2012

  • Associated Press. (2012, September 20). U.S. Defense Secretary Leon Panetta talks computer hacking issues with the Chinese. [Read]
  • Behrens, S., Alberts, C. J., & Ruefle, R. (2012, September). Competency lifecycle roadmap: Toward performance readiness [Carnegie Mellon Software Engineering Institute / CERT]. [Read]
  • Cutler, S. (2012, September 18). The Mirage campaign [Dell SecureWorks]. [Read]
  • EU’s Clean IT is anything but clean in its intentions. (2012, September 21). Infosecurity. [Read]
  • Great Britain. Parliament. (2012, September 11). Draft Communications Data Bill: Written evidence [testimony]. [Read]
  • Greene, T. (2012, September 18). Kaspersky researcher cracks Flame malware password. Network World. [Read / More]
  • Harris, P. (2012, September 15). US data whistleblower: ‘It’s a violation of everybody’s constitutional rights’ [Bill Binney on the NSA]. Guardian. [Read]
  • IBM. (2012, September). IBM X-Force 2012 midyear trend and risk report. [Read]
  • I/S: A Journal of Law and Policy for the Information Society – new issue [full text]:
  • Jaeger, M. (2012, September 18). Germany proposes ban on surveillance software exports to totalitarian regimes. ZDNet. [Read]
  • Kravets, D. (2012, September 14). Twitter reluctantly coughs up Occupy protester’s data. Wired. [Read]
  • Krebs, B. (2012, September 19). Malware dragnet snags millions of infected PCs. Krebs on Security. [Read]
  • McArthur, K., & Parsons, C. A. (2012, September 17). Understanding the lawful access decryption requirement [RE: Canadian Parliament Bill C-30]. [Read]
  • McCullagh, D. (2012, September 20). Senate delays Netflix, e-mail privacy fix after cops protest. CNET. [Read – More]
  • Pauli, D. (2012, September 17). Phonetic attack commands crash bank phone lines. SC Magazine. [Read]
  • Soghoian, C. (2012, September 18). Keeping the government out of your smartphone [American Civil Liberties Union]. [Read]
  • United States. Government Accountability Office. (2012, September 18). Information security: Better implementation of controls for mobile devices should be encouraged. [Read]
  • United States. Department of Homeland Security. (2012, September 19). ORing Industrial Networking IDS-5042 / 5042+ hard-coded credential vulnerability. [Read / Analysis]
  • United States. Government Accountability Office. (2012, September 19). Human capital management: Effectively implementing reforms and closing critical skills gaps are key to addressing federal workforce challenges. [http://www.gao.gov/products/GAO-12-1023T]
  • Vijayan, J. (2012, September 19). Virgin Mobile subscribers found vulnerable to account hijacking. Computerworld. [Read]
  • York, J. C. (2012, September 18). Philippines’ new Cybercrime Prevention Act troubling for free expression [Electronic Frontier Foundation]. [Read]
Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: