News
- Hacking to Shadow China Summit
- OPM Underestimated Number of Fingerprints Stolen in Hack by Millions
- Apple Confirms Discovery of Malicious Code in Some App Store Products
- Apple Lists 25 Apps Affected by XcodeGhost
- Obama Administration Explored Backdoors for Bypassing Smartphone Crypto
- Global Cybercrime Costs $315bn – Report
- New Malware Infects ATMs, Dispenses Cash on Command
- Uber Users are Paying for Fraudsters to Take Rides in China
- President Xi’s Double Talk on Doing Business in China
- HealthCare.gov Faulted for Weak Cybersecurity
- “Snowden Treaty” Calls for End to Mass Surveillance, Protections for Whistleblowers
- GCHQ Tried to Track Web Visits of “Every Visible User on Internet”
- Edward Snowden Unveils Global Privacy Treaty To Ban Surveillance
- Postal Service Failed to Protect Personal Data in Mail Surveillance, Report Says
Law/Policy
- Cyber Crime Laws Showing Their Age
- Transnational Cyber Age: Private Law Cyber Solutions for Individuals and Corporations
- The Greening of Canadian Cyber Laws: What Environmental Law Can Teach and Cyber Law Can Learn
- Cybersecurity: What About U.S. Policy?
- Cyberwarfare: Law & Policy Proposals for U.S. & Global Governance
- US Senator Blocks Proposed Surveillance Law Opposed by Facebook and Google
- Court: Authorities Can’t Force Suspects to Reveal Phone Passwords
Technical
- Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation
- A Forensically Sound Adversary Model for Mobile Devices
- Analysis of Short Blocklength Codes for Secrecy
- Option Contracts for a Privacy-Aware Market
- Efficient Controlled Quantum Secure Direct Communication Protocols
- Bidding for Breaches, Redefining Targeted Attacks
- SYNful Knock Attack Against Cisco Routers
- NSA Plans to Transition to Quantum Resistant Algorithms
- Microsoft Word Intruder Gets Down to Business: Operation Pony Express
- The Windows 10 Privacy Debacle: Five Big Issues to Consider
- 4 IoT Cybersecurity Issues You Never Thought About
- New Attacks Recall Old Problems with Browser Cookies
- No One Technology is a Silver Bullet
- How Hackers Can Access iPhone Contacts and Photos without a Password
- Opportunities Exist for DOD to Share Cybersecurity Resources with Small Businesses