Archive

Monthly Archives: December 2012

[next update 1/4/13]

  • Arthur, C. (2012, Dec. 14). China Tightens ‘Great Firewall’ Internet Control With New Technology. Guardian. [Read]
  • arXiv [preprints – full text]:
  • Caruson, K., MacManus, S. A., & McPhee, B. D. (2012). Cybersecurity Policy-Making at the Local Government Level: An Analysis of Threats, Preparedness, and Bureaucratic Roadblocks to Success. Journal of Homeland Security and Emergency Management. [Read]
  • Computer Fraud & Security – new issue [full text]:
  • Computers & Security – preprints [full text]:
  • European Network and Information Security Agency. (2012, Dec. 19). Appropriate Security Measures for Smart Grids. [Read]
  • Feng, J., & Chen, Y. (2012). A Fair Non-repudiation Framework for Data Integrity in Cloud Storage Services. International Journal of Cloud Computing. [Abstract / Request]
  • Fowler, G. A. (2012, Dec. 17). Tor: An Anonymous, And Controversial, Way to Web-Surf. Wall Street Journal. [Read]
  • Gilbert, K. (2012, Dec. 14). Dexter: More of the Same or Hidden Links? [Verizon Business]. [Read]
  • IEEE Transactions on Dependable & Secure Computing – preprints [full text]:
  • Information Security Journal – new articles [Abstracts / Request]:
  • Journal of Computer Security – new issue [abstracts / request]:
  • Levinson-Waldman, R. (2012, Dec. 18). Americans’ Privacy Under Debate in FISA Reauthorization [NYU Brennan Center for Justice]. [Read]
  • Mann, C. (2012, Dec. 19). Look Out – He’s Got a Phone! [RE: attacks on medical devices]. Vanity Fair. [Read]
  • Roston, A. (2012, Dec. 18). DOJ Plans To Indict State-Sponsored Cyber Attackers. DefenseNews. [Read]
  • Shachtman, N. (2012, Dec. 17). How Joe Biden Accidentally Helped Us All E-Mail in Private [Brookings]. [Read]
  • Schwartz, M.J. (2012, Dec. 14). S.C. Security Blunders Show Why States Get Hacked. InformationWeek. [Read]
  • Security & Communication Networks – preprints [abstracts / request]:
  • United States. Executive Office of the President. (2012, Dec.). National Strategy for Information Sharing and Safeguarding. [Read]

Calls for Papers

Conferences

  • arXiv [preprints – full text]:
  • Constantin, L. (2012, Dec . 7). Tor Network Used to Command Skynet Botnet. Computerworld. [Read]
  • Deibert, R. (2012). The Growing Dark Side of Cyberspace ( . . . and What To Do About It). Penn State Journal of Law & International Affairs. [Read]
  • Eddy, N. (2012, Dec. 10). Email Encryption a Major Challenge for Government IT. eweek. [Read]
  • Elsevier Editorial System Hacked, Reviews Faked, 11 Retractions Follow. (2012, Dec. 11). Retraction Watch. [Read]
  • Hill, K. (2012, Dec. 7). Dear Journalists at Vice and Elsewhere, Here Are Some Simple Ways Not To Get Your Source Arrested.  Forbes. [Read / Hint: Encrypt, and scrub your metadata]
  • Jiang, X. (2012, Dec. 7). An Evaluation of the Application (“App”) Verification Service in Android 4.2 [NC State University]. [Read – <15% of known malware detected at release]
  • Johnson, N. (2012, Dec. 11). Information Disclosure (Mouse Tracking) Vulnerability in Microsoft Internet Explorer Versions 6-10 [Microsoft Research]. [Read]
  • Nakashima, E. (2012, Dec. 8). Sharp Debate Expected on Electronic-intercept Law. Washington Post. [Read]
  • Schreiber, D. (2012. Dec. 10). San Francisco District Attorney Subpoenas Twitter Feeds in Columbus Day Riot Case. San Francisco Chronicle. [Read]
  • Security Hole in Samsung Smart TVs Could Allow Remote Spying. (2012, Dec. 12). Security Ledger. [Read]
  • Shane, S., & Savage, C. (2012, Dec. 7). In WikiLeaks Case, Defense Puts the Jailers on Trial. New York Times. [Read / Also: Ransomware: Pay or Else]
  • Silowash, G. et al. (2012, Dec.) Common Sense Guide to Mitigating Insider Threats (4th ed.). [Carnegie Mellon]. [Read / Also: GPS Software Attacks (download via CMU)
  • United States. National Intelligence Council. (2012, Dec.). Global Trends 2030: Alternative Worlds. [Read]
  • arXiv [preprints – full text]:
  • Brewster, T. (2012, Dec. 5). EU Resists ‘Extreme’ US Lobbying As Data Privacy War Brews.  TechWeek Europe. [Read]
  • Clickjacking Threatens Two-thirds of Top 20 Banking Sites. (2012, Nov. 30). Infosecurity. [Read]
  • European Network and Information Security Agency. (2012, Dec. 5). EU Cyber Cooperation – The Digital Frontline. [Read]
  • Gartner – new reports [abstracts / for full text – search for title in box at upper right]:
  • Fleming, M. H., & Goldstein, E. (2012, Nov. 29). An Analysis of the Primary Authorities Governing and Supporting the Efforts of the Department of Homeland Security to Secure the Cyberspace of the United States [preprint]. [Read]
  • General Dynamics. (2012, Nov. 28). [Job posting, Information Security Analyst – ability to write mobile exploits required]. [Read]
  • Health Information Trust Alliance. (2012, Dec. 5). U.S. Healthcare Breach Data Trends. [Read]
  • IT Professional – selected new articles [full text]:
  • Kalige, E. (2012, Dec.). A Case Study of Eurograbber: How 36 Million Euros was Stolen via Malware. [Read – PDF download via Check Point]
  • Katsuki, T. (2012, Dec. 3). Crisis: The Advanced Malware [Symantec]. [Read]
  • Lynch, J. (2012, Dec. 5). Newly Released Drone Records Reveal Extensive Military Flights in US [Electronic Frontier Foundation]. [Read]
  • Meyer, T., & Maass, P. (2012, Dec. 5). No Warrant, No Problem: How The Government Can Still Get Your Digital Data. ProPublica. [Read]
  • Moody, G. (2012, Dec. 5). ITU Approves Deep Packet Inspection Standard Behind Closed Doors, Ignores Huge Privacy Implications. techdirt. [Read]
  • Network Security – new issue [full text]:
  • Sophos. (2012, Dec. 5). Security Threat Report 2013. [Read]
  • Stecklow, S. (2012, Dec. 5). How Foreign Firms Tried to Sell Spy Gear to Iran. Reuters. [Read]
  • United Kingdom. Cabinet Office. (2012, Dec. 3). UK Cyber Security Strategy: One Year On. [Read]
  • United Kingdom. Leveson Inquiry. (2012, Dec. 6). [Detailed report RE: Murdoch / News Corporation phone hacking]. [Read]
  • United States. Federal Trade Commission. (2012, Dec. 5).  FTC Settlement Puts an End to “History Sniffing” by Online Advertising Network Charged With Deceptively Gathering Data on Consumers. [Read]
  • Whittaker, Z. (2012, Dec. 4). Patriot Act Can ‘Obtain’ Data in Europe, Researchers Say. CBS News. [Read / RE: this article, posted here last week]
  • Zeus Malware Throws €36+ Million Lightning Bolt Across Europe. Infosecurity. [Read]

Proceedings

20th International Workshop on Security Protocols (2012, April 12-13) – papers presented [abstracts / request]: