News
Journal articles
- Certified Computer-aided Cryptography: Efficient Provably Secure Machine Code from High-level Implementations [also new from Cryptology ePrint Archive]
Reports
- Android Malware in Pictures: A Blow-by-blow Account of Mobile Scareware [Sophos]
-
Anatomy of a Hack: How Crackers Ransack Passwords Like “qeadzcwrsfxv1331” [Ars Technica]
- Apple Two-Factor Authentication and the iCloud [ElcomSoft]
- Creating a Foundation for Mobile Security [US CIO Council]
- Cybersecurity: Authoritative Reports and Resources [Congressional Research Service]
- Flame One Year Later [Kaspersky]
- National Cloud Computing Strategy [Australian Government]
- Underweb Payments, Post-Liberty Reserve [Krebs on Security]
- ZeuS/ZBOT Malware Shapes Up in 2013 [TrendLabs]
DC-Area Events
- Mobile Security: Potential Threats & Solutions [Federal Trade Commission, 6/4/13 – open to public]