December 14, 2012

  • arXiv [preprints – full text]:
  • Constantin, L. (2012, Dec . 7). Tor Network Used to Command Skynet Botnet. Computerworld. [Read]
  • Deibert, R. (2012). The Growing Dark Side of Cyberspace ( . . . and What To Do About It). Penn State Journal of Law & International Affairs. [Read]
  • Eddy, N. (2012, Dec. 10). Email Encryption a Major Challenge for Government IT. eweek. [Read]
  • Elsevier Editorial System Hacked, Reviews Faked, 11 Retractions Follow. (2012, Dec. 11). Retraction Watch. [Read]
  • Hill, K. (2012, Dec. 7). Dear Journalists at Vice and Elsewhere, Here Are Some Simple Ways Not To Get Your Source Arrested.  Forbes. [Read / Hint: Encrypt, and scrub your metadata]
  • Jiang, X. (2012, Dec. 7). An Evaluation of the Application (“App”) Verification Service in Android 4.2 [NC State University]. [Read – <15% of known malware detected at release]
  • Johnson, N. (2012, Dec. 11). Information Disclosure (Mouse Tracking) Vulnerability in Microsoft Internet Explorer Versions 6-10 [Microsoft Research]. [Read]
  • Nakashima, E. (2012, Dec. 8). Sharp Debate Expected on Electronic-intercept Law. Washington Post. [Read]
  • Schreiber, D. (2012. Dec. 10). San Francisco District Attorney Subpoenas Twitter Feeds in Columbus Day Riot Case. San Francisco Chronicle. [Read]
  • Security Hole in Samsung Smart TVs Could Allow Remote Spying. (2012, Dec. 12). Security Ledger. [Read]
  • Shane, S., & Savage, C. (2012, Dec. 7). In WikiLeaks Case, Defense Puts the Jailers on Trial. New York Times. [Read / Also: Ransomware: Pay or Else]
  • Silowash, G. et al. (2012, Dec.) Common Sense Guide to Mitigating Insider Threats (4th ed.). [Carnegie Mellon]. [Read / Also: GPS Software Attacks (download via CMU)
  • United States. National Intelligence Council. (2012, Dec.). Global Trends 2030: Alternative Worlds. [Read]

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: