February 8, 2013

  • AlFardan, N. J., & Paterson, K. G. (2013, Feb. 6). Lucky Thirteen: Breaking the TLS and DTLS Record Protocols [preprint]. [Read]
  • Alomair, B., Clark, A., Cuellar, J., & Poovendran, R. (2013). Toward a Statistical Framework for Source Anonymity in Sensor Networks. IEEE Transactions on Mobile Computing. [Read]
  • arXiv [preprints – full text]:
  • Computers & Security – new issue + preprints [full text]:
  • Higgins, K. J. (2013, Feb. 6). Researchers Demo Building Control Systems Hack. Security Dark Reading. [Read]
  • IEEE Communications Magazine – selected new articles [Abstracts / Request]:
  • IEEE Security & Privacy – new issue [full text]:
  • IEEE Transactions on Wireless Communications – selected new articles [Abstracts / Request]:
  • Inkster, N. (2013). Chinese Intelligence in the Cyber Age. Survival: Global Politics & Strategy. [Read]
  • IT Professional – selected new articles / preprints [full text]:
  • Journal of Computer Virology and Hacking Techniques – preprints [Abstracts / Request]:
  • Kleiner, A., Nicholas, P., & Sullivan K. (2013, Feb.). Linking Cybersecurity Policy and Performance [Microsoft Research]. [Read – PDF download from Microsoft / Summary]
  • Kravets, D. (2013, Feb. 7). Secret Surveillance Court Gets New Presiding Judge. Wired. [Read]
  • Krebs, B. (2013, Feb. 7). Microsoft, Symantec Hijack ‘Bamital’ Botnet. Krebs on Security. [Read]
  • Silver, V. (2013, Feb. 4). Rights Groups File OECD Complaint Against Surveillance Firms. Bloomberg. [Read]
  • Symantec / Ponemon Institute / (2013, Feb.). What’s Yours is Mine: How Employees are Putting Your Intellectual Property at Risk. [Read]
  • Timberg, C. (2013, Feb. 6). ‘Fragmentation’ Leaves Android Phones Vulnerable to Hackers, Scammers. Washington Post. [Read]
  • United States. Federal Trade Commission. (2013, Feb.). Mobile Privacy Disclosures: Building Trust Through Transparency. [Read / Summary]
  • United States. Government Accountability Office. (2013, Jan. 25 – newly released). Federal Communications Commission Needs to Strengthen Controls over Enhanced Secured Network Project. [Read]
  • United States. National Institute of Standards and Technology. (2013, Feb.). Security and Privacy Controls for Federal Information Systems and Organizations [Special Publication 800-53]. [Read]


Creative Commons License
Cybersecurity Update by UMUC / ILS is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: