GitHub Search Makes Easy Discovery of Encryption Keys, Passwords in Source Code. What is a specific example of how the Shellshock Bash bug could be exploited?. Why everyone is left less secure when the NSA doesn’t help fix security flaws. The RNC Files: Inside the Largest US Voter Data Leak. Dark Cloud: Inside The Pentagon’s Leaked Internet Surveillance Archive. Encrypted Email – The History and Technology of Message Privacy, Springer, Cham. The National Academies Press, Washington, D.C. Economic Espionage and Industrial Spying. Stuxnet Attackers Used 4 Windows Zero-Day Exploits. Microsoft security intelligence report (msir). Defending America Against Cyber Espionage Through the Use of Active Defenses. Microsoft Press, Redmond, Washington, 2 edition. Code Complete: A Practical Handbook of Software Construction. Defender’s Dilemma: Charting a Course Toward Cybersecurity. To kill a centrifuge: A technical analysis of what stuxnet’s creators tried to achieve. In Proceedings of the 6th International Conference on Security of Information and Networks (SIN ‘13). Social Engineering Attacks on the Knowledge Worker. Krombholz, K., Hobel, H., Huber, M., and Weippl, E. Revised Selected Papers, volume 6561 of Lecture Notes in Computer Science, pages 80–95. D., editors, Formal Aspects of Security and Trust - 7 th International Workshop, FAST 2010, Pisa, Italy, September 16-17, 2010. In Degano, P., Etalle, S., and Guttman, J. Kordy, B., Mauw, S., Radomirovic, S., and Schweitzer, P. Journal des sciences militaires, IX:5–83. WannaCry, Petya, NotPetya: how ransomware hit the big time in 2017. A Taxonomy of Attacks and a Survey of Defense Mechanisms for Semantic Social Engineering Attacks. Spear-Phishing in the Wild: A Real-World Study of Personality, Phishing Self-Efficacy and Vulnerability to Spear-Phishing Attacks. In major goof, Uber stored sensitive database key on public GitHub page. Researchers confirm backdoor password in juniper firewall code. Google China cyberattack part of vast espionage campaign, experts say. From challenges to recommendations.Įunjung Cha, A. Good Practice Guide on Vulnerability Disclosure. In Ray, I., Li, N., and Kruegel, C., editors, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015, pages 542–553. A search engine backed by internet-wide scanning. 186–196.ĭurumeric, Z., Adrian, D., Mirian, A., Bailey, M., and Halderman, J. Human factors in information security: The insider threat – Who can you trust these days? Information Security Technical Report, Volume 14, Issue 4, 2009, p. Cyber Espionage Targets Sensitive Data.Ĭolwill, C. Ten Years of Patch Tuesdays: Why It’s Time to Move On.Ĭoleman, K. Nobody but us: The rise and fall of the golden age of signals intelligence. 1989 IEEE Symposium on Security and Privacy, Oakland, CA, USA, 1989, pp. IEEE Security & Privacy, 12:35–41.īrewer, D. The operational role of security information and event management systems. The memory-hard Argon2 password hash and proof-of-work function. Springer-Verlag.īiryukov, A., Dinu, D., and Khovratovich, D. In LNCS Essays on The New Codebreakers - Volume 9100, pages 256–281, Berlin, Heidelberg. The CCleaner malware targeted tech firms like Microsoft and Google.īernstein, D. In Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security, CCS’15, pages 5–17, New York, NY, USA. Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice. A., Heninger, N., Springall, D., Thomé, E., Valenta, L., VanderSloot, B., Wustrow, E., Zanella-Béguelin, S., and Zimmermann, P. Īdrian, D., Bhargavan, K., Durumeric, Z., Gaudry, P., Green, M., Halderman, J. Zero-days, Thousands of Nights: The Life and Times of Zero-Day Vulnerabilities and Their Exploits. The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage. Attributing Cyber-attacks, Journal of Strategic Studies, 38:1-2, 4-37. Zúquete (eds.): 15th IFIP International Conference on Communications and Multimedia Security (CMS), LNCS 8735, pp. CERIAS Tech Report 13, 2013.Ĭhen, P., Desmet, L., and Huygens, C. Center for Education and Research Information Assurance and Security, Purdue University, Tech.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |