See more security news from 2011...

 

Articles from 2011:

FBI To Get More Cyber Crime Agents ( InformationWeek 12/20/2011 )
Iowa Caucus Polling System Threatened By Hackers ( Fox News 12/19/2011 )
What's really going on with Carrier IQ on your phone ( Network World 12/07/2011 )
RSA security lapse led to March hack, says researcher ( Computerworld 12/5/2011 )
Carrier IQ: What it is, what it isn't, and what you need to know ( engadget.com 12/01/2011 )
Hackers Blow Up Illinois Water Utility…or Not ( Techland 11/28/2011 )
Red Tape - Exclusive: Millions of printers open to devastating hack attack, researchers say ( MSNBC 11/29/2011 )
Fighting Crime With Digital DNA (FOX News Network, LLC 11/18/2011)
Cyber Intrusion Blamed for Hardware Failure at Water Utility (Krebs on Security)
'Son of Stuxnet' Virus Could Be Used to Attack Critical Computers Worldwide (MSNBC 10/18/2011)
Secure Android Kernel Could Make for 'Classified' Smart Phones (Government Computer News 10/13/2011)
National Cyber Security Awareness Month (Homeland Security 10/2011)
Georgia Tech Releases Cyber Threats Forecast for 2012 (Georgia Tech News 10/11/2011)
Founding Father Wants Secure 'Internet 2' (Financial Times 10/11/2011)
Obama Establishes Insider Threat Task Force (Government Information Security Articles 10/11/2011 )
Computer virus hits US Predator and Reaper drone fleet (arstechnica.com 10/7/2011)
Internet Risks Will Drive Users Offline, Researcher Predicts (Government Computer News 10/3/2011)
Authenticity of Web Pages Under Attack By Hackers ( USA Today 9/28/2011 )
7 Lessons: Surviving A Zero-Day Attack (InformationWeek 9/19/2001)
Malware burrows deep into computer BIOS to escape AV: Mebromi rootkit also targets master boot record (The Register 9/14/2011)
Hacking Targets Multiply ( Wall Street Journal 9/9/2011 )
Ten Years After 9/11, Cyber Attacks Pose National Threat, Committee Says ( Computerworld 9/7/2011 )
The Next Wave of Botnets Could Descend From the Skies ( Technology Review 9/7/2011 )
Researchers Identify First Flaws in the Advanced Encryption Standard ( Katholieke Universiteit Leuven 8/17/2011 )
Android users hit by lethal Trojan root hack ( Techworld.com 8/11/2011 )
Mediocre Hackers Can Cause Major Damage (Washington Times 8/16/2011)
It's All About the Team for Research in Ubiquitous Secure Technology (National Science Foundation 8/11/2011)
Creating Ag Extension Agent for Cyber (GovInfoSecurity.com 8/10/2011)
The Science of Cyber Security (National Science Foundation 8/04/2011)
DARPA Funds Hackers to Innovate Military Tech (InformationWeek 8/04/2011)
Threat of destructive coding on foreign-manufactured technology is real (nextgov.com 7/6/2011)
Former CIA Director: Build a new Internet to improve cybersecurity (nextgov.com 7/6/2011)
Lessons from Estonia: Preparing for a major cyberattack(nextgov.com 7/6/2011)

 

2011 Second Quarter Articles:

U.S. to Provide Guidelines to Bolster Computer Security (New York Times 6/26/2011)
Software Cracks: A Great Way to Infect Your PC (Krebs on Security 6/20/2011)
Microsoft Patches Fix 34 Security Flaws (Krebs on Security 6/15/2011)
Experts: Few cyberattacks are cause for major retaliation (Network World, Inc 6/8/2011)
Most Malware Tied to 'Pay-Per-Install' Market (Technology Review 6/9/2011)
CYBERSECURITY, INNOVATION AND THE INTERNET ECONOMY (The Department of Commerce Internet Policy Task Force 6/2011)
Pay-Per-Install a Major Source of Badness (Krebs On Security 6/2011)
Analysis: The hidden cost of cybercrime (CNN 6/7/2011)
Pentagon to Consider Cyberattacks Acts of War (New York Times 5/31/2011)
Pentagon: Cyber Attacks Can Count as Act of War (The Wall Street Journal 5/31/2011)
Stanford Computer Scientists Find Internet Security Flaw (Stanford Report 5/23/2011)
Homemade Cyberweapon Worries Federal Officials (Washington Times 5/24/2011)
Researchers show Android devices susceptible to eavesdropping (PhysOrg.com 5/18/2011)
Launching the U.S. International Strategy for Cyberspace (The White House Blog 5/16/2011)
Microsoft: One in 14 downloads is malicious (Computerworld 5/17/2011)
Scary Android security hole in 99% of phones: PANIC! (Computerworld 5/18/2011)
White House Wants Tougher Penalties for Computer Breaches (New York Times 5/11/2011)
Sony Brings In Forensic Experts On Data Breaches (InformationWeek 5/5/2011)
Cyber-Security System Mimics Human Immune Response (Discovery News 4/21/2011)
The Botnets That Won't Die (Technology Review 4/21/2011)
Highway Robbery: Car Computer Controls Could Be Vulnerable to Hackers (Scientific American 4/20/2011)
Simple Arithmetic for Faster, More Secure Websites (AlphaGalileo 4/7/2011)
DARPA Will Spend $20 Million to Search for Crypto's Holy Grail (Forbes 4/6/2011)
An Attack Sheds Light on Internet Security Holes (New York Times 4/6/2011)
Net Boffins Plot Password Alternatives (The Register 4/4/2011)
Cyber attackers have the edge, experts admit (NextGov.com 4/1/2011)

 

2011 First Quarter Results:

Amazon, Others Make Fixes After IU Informaticists Uncover Online Security Flaws, Receive Free Products (Indiana University 3/30/2011)
Finding Spammers' Vulnerabilities (National Science Foundation 3/29/2011)
Virtual War a Real Threat (Los Angeles Times 3/28/2011)
Researchers Devise New Method of Detecting Botnets (Texas A&M Engineering News 3/24/2011)
Cyber Security Summit Signs UK-US University Deal (BBC News 3/24/2011)
Get SMART in Cyberspace: Protect Your Data (Newcastle University 3/15/2011)
Warning on GPS Jamming Threats (University of New South Wales 3/11/2011)
Spotting Virtual Intruders (Technology Review 3/9/2011)
The New Cyber Arms Race (Christian Science Monitor 3/7/2011)
Security and Privacy Issues in the PDF Document Format (Universidad Politecnica de Madrid Spain 2/17/2011)
Cryptographers Debate Role in 'Post-Security' Era (EE Times 2/16/2011)
The Cyberweapon That Could Take Down the Internet (New Schientist 2/11/2011)
Intel Chief Warns of Threat From Iran, Cybercrime at House Hearing (FoxNews.com 2/10/2011)
What Is the Best Way to Protect U.S. Critical Infrastructure From a Cyber Attack? (Scientific American 2/4/2011)
DARPA Seeks Security Expertise From a Nontraditional Source: the Hacker Community (NextGov.com 2/4/2011)
Cloud Services Could Bolster National Cyber Security (Network World 2/2/2011)
New IU Malware Records Data From Cell Phone (Indiana Daily Student 2/1/2011)
National Competition Puts High Schoolers to the Cyber Warrior Test (Government Computer News 1/31/2011)
Hardware, Software Advances Help Protect Operating Systems From Attack (NCSU News 1/26/2011)
Giving Hackers a Printed Invitation (Technology Review 1/21/2011)
Securing the Cloud (University of Texas at Austin 1/20/2011)
Converting 2-D Photo Into 3-D Face for Security Applications and Forensics (PhysOrg.com 1/19/2011)
Researchers Turn USB Cable Into Attack Tool (CNet 1/19/2011)
Unhackable Data in a Box of Bacteria: Future of InfoSec? (Computerworld 1/18/2011)
Internet 'Kill Switch' Could Cause Chaos, OECD Report Warns (Techworld 1/17/2011)
Leahy Sets Cyber Privacy Agenda (NextGov.com 1/11/2011)
International Cybersecurity Treaty Might Not Be Achievable, Report Says (NextGov.com 1/11/2011)
Obama Eyeing Internet ID for Americans (cbsnews.com 1/7/2011)
And Then There Were Five: Finalists Advance in NIST's SHA-3 Cryptography Competition (NIST News 1/5/2011)
Cybersecurity Civil Servants: OPM to Create Cyber Career Track (executivegov.com 1/3/2011)

 

2010 Fourth Quarter Articals:

Rules of Engagement for Cyberwars See Slow Progress (Financial Times 12/29/2010)
DARPA Goal for Cybersecurity: Change the Game (DVIDS 12/20/2010)
New corps' mission to parry cyberthreat (Star Advertiser 12/16/2010)
Physical Protection for the Internet (AlphaGalileo 12/14/2010)
Cryptographers Chosen to Duke It Out in Final Fight (New Scientist 12/13/2010)
Senator Proposes Cybersecurity Standards (InformationWeek 12/13/2010)
Privacy Project Uses Cryptography to Reduce Shared Info (BBC News 12/9/2010)
Mystery Surrounds Cyber Missile That Crippled Iran's Nuclear Weapons Ambitions (FoxNews.com 11/26/2010)
Spaf on Security Education in 2011 (GovInfoSecurity.com 11/23/2010)
A New Take on Computer Security (EUREKA 11/23/2010)
EU, US and NATO to Work Together on Cyber Defense (IDG News Service 11/22/2010)
European Union Funds Cloud Security Project (IDG News Service 11/22/2010)
Virus Could Ruin Many Industries' Control Systems (Associated Press 11/18/2010)
Cyber-Security Job Development Challenges Highlighted in Survey (eweek.com 11/17/2010)
Report Looks at How China Meddled With the Internet (New York Times 11/17/2010)
U.S. Sees 'Huge' Cyber Threat in the Future (Reuters 11/16/2010)
Effort Seeks to Diversify Cyber-Security Field (Missouri S&T News 11/16/2010)
Forecast for Cybersecurity Bills Looks Cloudy in Reconvened Congress (Nextgov.com 11/15/2010)
What's ahead for DOD's cyber forces (Government Computer News 11/15/2010)
European Cyber Defenses 'Must Improve,' Tests Show (BBC News 11/10/2010)
Cyber Storm Drill to Yield New Lessons, Feds Say (Government Technology 11/5/2010)
Internet Privacy Could Be Priority in Next Congress (Washington Post 11/4/2010)
‘Evilgrade’ Gets an Upgrade (Krebs on Security 11/3/2010)
The Online Threat: Should we be worried about a cyber war? (Seymour M. Hersh in the New Yorker 11/1/2010)
New Help on Testing for Common Cause of Software Bugs (Government Computer News 11/1/2010)
Google Extends Security Bug Bounty to Gmail, YouTube, Blogger (Krebs on Security 11/1/2010)
Study Finds Support for Presidential Net 'Kill Switch' (CNet 10/27/2010)
DHS Urged to Bolster Cyber Infrastructure Security (Information Week 10/27/2010)
Report: ‘Spear-Phishing’ Attacks Keep on Giving (wired 10/26/2010)
Iranian cyber army moves into botnets (CSO online 10/25/2010)
D.C. Hacking Raises Questions About Future of Online Voting (Stateline.org 10/22/2010)
Agencies Hard Hit By Shortage of Cybersecurity Pros (Government Computer News 10/21/2010)
Pentagon Will Help Homeland Security Department Fight Domestic Cyberattacks (NY Times 10/20/2010)
Stopping the Next Stuxnet (The Patriot Post 10/20/2010)
Tests show consumer antivirus programs falling behind (computerworld.com 10/19/2010)
SpamBot Wants to be Your Friend (Vienna University of Technology 10/18/2010)
Internet security plan under review would alert users to hacker takeover (washingtonpost.com 10/18/2010)
Google to alert admins of phishing attempts and malware (The H Security 10/15/2010)
Progress is slow on cybersecurity goals, GAO reports (NextGov.com 10/7/2010)
Cybersecurity as a Catalyst for Economic Growth (Gov Info Security 10/6/2010)
Stopping Malware: BLADE Software Eliminates "Drive-By Downloads" from Malicious Websites (Georgia Tech Research News 10/6/2010)

 

2010 Third Quarter Articles:

EU Seeks to Boost Defenses Against Cyber Attacks (Reuters 9/30/2010)
In a Computer Worm, a Possible Biblical Clue (New York Times online 9/29/2010)
FBI drive for encryption backdoors is déjà vu for security experts (ars technica 9/28/2010)
Vulnerability allows ZeuS botnets to be taken over (The H Security 9/27/2010)
Cyber Attacks Test Pentagon, Allies and Foes (Wall Street Journal online 9/25/2010)
An army of tech-savvy warriors has been fighting its battles in cyberspace (WashingtonPost.com 9/23/2010)
Is a Cyber Attack Targeting Iran's Nuclear Plant? (Foxnews.com 9/23/2010)
U.S. competitive position has further declined in past five years, report says; nation needs sustained commitment to investment in innovation (KrebsOnSecurity 9/14/2010)
‘Stuxnet’ Worm Far More Sophisticated Than Previously Thought (nationalacademies.org 9/23/2010)
Secure App Development Can Lead To Cost Savings, Study Says (darkreading.com 9/13/2010)
Security firm warns of commercial, on-demand DDoS botnet (ComputerWorld 9/13/2010)
Google Confronts China's "Three Warfares" (Timothy L. Thomas 9/13/2010)
Pentagon considers preemptive strikes as part of cyber-defense strategy (Washington Post 8/28/2010)
DARPA Takes Aim at Insider Threats (Network World 08/27/10)
Malware implicated in fatal Spanair plane crash: Computer monitoring system was infected with Trojan horse, authorities say (MSNBC 8/20/2010)
Interview with Ernest McDuffie: NIST's leader for the National Initiative for Cybersecurity Education -- Back to school (Government Computer News 8/16/2010)
Microsoft to Issue Emergency Patch for Critical Windows Bug (krebsonsecurity 7/30/2010)
Air Force moves to fill nearly 700 cybersecurity vacancies (Defense Systems 7/21/2010)
Prepublication: A Human Capital Crisis in Cybersecurity (CSIS 7/16/2010)

 

2010 Second Quarter Articles:

Better cybersecurity depends on better information management (Government Computer News 6/22/2010)
The unreadiness team (Washingtonpost.com 6/20/2010)
Sophisticated ATM Skimmer Transmits Stolen Data Via Text Message (krebsonsecurity.com 6/18/2010)
NASA security chief orders bold change to secure networks (nextgov 5/19/2010)
Cyber Challenge: 10,000 security warriors wanted (Government Computer News 5/17/2010)
Government Reveals Cybersecurity Research Agenda (InformationWeek 5/13/2010)
UPDATE 1-U.S. struggles to ward off evolving cyber threat (Reuters 5/12/2010)
'Cyber War' author: U.S. needs radical changes to protect against attacks (NetworkWorld 4/7/2010)

 

2010 First Quarter Articles:

Military To Tighten Vendor Cybersecurity Policies (InformationWeek 2/16/2010)
Companies Fight Endless War Against Computer Attacks (New York Times online 1/17/2010)
Threats in Cyberspace (abanet.org September 2009)

 

Tuesday the 21st. QualityJoomlaTemplates
Copyright © 2014
USA School of Computing

150 Jaguar Drive
Shelby Hall, Suite 2101
Mobile, Alabama 36688-0002

1 (251) 460-6390
University of South Alabama Homepage
ACM
USA Online
Paws
Discovering Web.com
Give to USA
Jag Mail
SOC RSS Feed