USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
USENIX in the News
Jump to: 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008
2019
28th USENIX Security Symposium
- How Language Shapes Password Security
IEEE Spectrum, 9.25.19 - Facebook Awards $100K Prize for Code Isolation Using MPKs
i-programmer.info, 8.29.19 - New Bluetooth Vulnerability, KNOB Attack Can Manipulate the Data Transferred between Two Paired Devices
Security Boulevard, 8.20.19 - KNOB Turns Up the Heat on Bluetooth Encryption
The Register, 8.19.19 - A 'Serious Vulnerability' Is Discovered in Bluetooth That Exposes Devices to Possible Attacks
Loop21, 8.18.19 - Researchers Reveal "KNOB" Flaw That Affects Almost Every Bluetooth Device
TechSpot, 8.17.19 - New Attack Exploiting Serious Bluetooth Weakness Can Intercept Sensitive Data
Ars Technica, 8.17.19 - Privacy Researchers Devise a Noise-Exploitation Attack That Defeats Dynamic Anonymity
TechCrunch, 8.17.19 - New Tech Methods to Combat Online Domestic Abuse
Psych Central, 8.17.19 - Bluetooth Vulnerability Could Expose Device Data to Hackers
The Verge, 8.16.19 - A Bluetooth Encryption Flaw Could Let Hackers Spy on Your Connections
Fast Company, 8.16.19 - Google Study Says People Are Still Using Old Passwords after Being Compromised
The Next Web, 8.16.19 - Hundreds of Thousands of People Are Using Passwords That Have Already Been Hacked, Google Says
VICE, 8.15.19 - Researchers Offer Tool to Vet Possible Insecure Mobile Backends
ADTMag.com, 8.15.19 - NYC Has Hired Hackers to Hit Back at Stalkerware
MIT Technology Review, 8.14.19 - Weak Consumer IoT Security Threatens Enterprise Systems
VentureBeat, 8.14.19 - Meet Bluetana, the Scourge of Pump Skimmers
Krebs on Security, 8.14.19 - Researchers: Cloud Services Compromise Mobile Apps
Infosecurity Magazine, 8.14.19 - Be Cautious When Installing Free Apps from Google Play Store; Over 1,600 bugs Found in Backend Systems
ETCIO.com, 8.13.13 - Lateral Phishing: The Latest in Email Account Takeover
SecurityBrief Asia, 7.19.19 - Freaking Out about Fiendish IoT Exploits? Maybe Disable Telnet, FTP and Change that Default Password First?
The Register, 6.18.19 - Researchers: Aircraft Landing Systems Vulnerable
BankInfoSecurity, 5.17.19 - The Plane, It's 'Splained, Falls Mainly without the Brain: We Chat to Boffins Who've Found a Way to Disrupt Landings Using Off-the-Shelf Radio Kit
The Register, 5.16.19
- ICYMI: Advice for Aspiring Site Reliability Engineers
SearchITOperations.com, 4.29.19 - Monitoring Distributed Systems Means First, Do No Harm
SearchITOperations.com, 3.27.19 - Site Reliability Engineer Shift Creates IT Ops Dilemma
SearchITOperations.com, 3.26.19
- Fire (and Lots of IT): Berkeley Researcher on the Only Way to Fix Cryptocurrency
Ars Technica, 2.4.19 - Google to Help Users Spot ‘Dodgy Websites’
Digital Journal, 2.2.19 - Google Works on Spotting Dodgy 'Evil Domains'
BBC, 2.1.19 - Google Chrome May Warn Users of Dangerous Lookalike URLs
SlashGear, 1.31.19 - As Security Flaws Explode, Consumers Lose Trust in the Tech Industry
SiliconANGLE, 1.31.19 - Google Chrome is Testing a Feature to Warn Users About Suspicious URLs
Gizmodo, 1.30.19 - Google Chrome Will Soon Warn You about Look-Alike URLs
TechSpot, 1.30.19 - Head of Android Security Says Locking Out Law Enforcement Is an 'Unintended Side Effect'
Motherboard, 1.30.19 - Google Will Call Out Impostor URLs with New Chrome Warning
Silicon Republic, 1.30.19 - Google Takes Its First Steps toward Killing the URL
Wired, 1.29.19 - Google Takes Aim at Potential Imposter Websites with New Chrome
Warning
CNET, 1.29.19 - Q. What Do You Call an IT Admin for 20-plus Young Children? A. A Teacher
The Register, 1.29.19 - Security Isn't Enough. Silicon Valley Needs 'Abusability' Testing
Wired, 1.28.19 - Fight against Child Sex Abuse Images Requires Smart Tech, Google Expert Says
CNET, 1.28.19
2018
27th USENIX Security Symposium
- Why Scepticism Is Important in Computer Security
Packt, 11.21.18 - More Rules for the Intelligent Household
Phys.org, 10.24.18 - When Fridges Attack: Why Hackers Could Target the Grid
Financial Times, 10.16.18 - How to Defend Enterprise Apps with Threat Modeling: 4 Lessons Learned
TechBeacon, 10.2.18 - Why do I Always Forget My Password? Science Says There's a Method to the Madness
Elite Daily, 9.10.18 - Forgetting Passwords too Often? Blame Your Brain
Economic Times, 9.8.18 - Do you Know why and how you Forget Passwords?
EurekAlert, 9.6.18 - Here's why you may Keep Forgetting Passwords
India TV News, 9.6.18 - Could Home Appliances Knock Down Power Grids?
We Live Security, 9.6.18 - Android Smartphones can be Hacked With AT Commands Attacks
Techworm, 8.31.18 - Researchers Show Alexa "Skill Squatting" Could Hijack Voice Commands
Ars Technica, 8.30.18 - IoT Devices, They're Smart, Stylish but not Secure! Now They can Melt Down the Power Grid.
Lexology, 8.30.18 - Android Phones From 11 Vendors Vulnerable To AT Commands Attacks
Latest Hacking News, 8.29.18 - Researchers Find Power Grid, IoT Device Security a Dangerous Mix
Security Boulevard, 8.29.18 - New Security Risk for Smartphones Brings You a "Ghost User"
Android Community, 8.27.18 - Attention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem
BleepingComputer, 8.25.18 - Improved Security for Cloud-Based Machine Learning
Digital Journal, 8.24.18 - New Attack Revers RSA Encryption Keys From EM Waves Within Seconds
BleepingComputer, 8.22.18 - Serious Security: How to Stop Dodgy HTP Headers Clogging Your Website
Naked Security, 8.21.18 - How Often are Users' DNS Queries Intercepted?
Helpnet Security, 8.21.18 - Here's the Funniest, Most Scathing, Most Informative and Most Useful Talk on AI and Security
Boing Boing, 8.20.18 - MIT Researchers Create Encryption Method for Cloud-Based Machine Learning
SDTimes, 8.20.18 - These Tracking Tricks can Bypass Your Anti-Tracking Tools
Tom's Hardware, 8.20.18 - JavaScript Web Apps and Servers Vulnerable to ReDoS Attacks
BleepingComputer, 8.20.18 - IPsec VPN Connections Broken Using 20 Year Old Flaw
Latest Hacking News, 8.20.18 - MIT Announces New Encryption Method for Private Data in Online Neural Networks
ReaditQuik, 8.20.18 - Researchers Reveal New Online User Tracking Techniques
HelpNetSecurity, 8.20.18 - How's That Encryption Coming, Buddy?
The Register, 8.20.18 - The New Encryption Method for Computer Systems
My Broadband, 8.19.18 - IoT Botnet of Heaters & Ovens Can Cause Massive Widespread Power Outages
Hack Read, 8.18.18 - Botnet of Smart Air Conditioners and Water Heaters Could Bring Down the Power Grid
CSO Online, 8.18.18 - Facebook Awards BYU Researchers $60K for Internet Defense Prize
Utah Business, 8.17.18 - I Wish I Could Quit You, but Cookies Find a Way
The Register, 8.17.18 - Browser Cookie Jar: The Pilferage
Security Boulevard, 8.17.18 - Researchers Find New Fast-Acting Side-Channel Vulnerability
Dark Reading, 8.17.18 - Ad Blocking: Anti-Tracking Browser Extensions can be Bypassed
Computer Business Review, 8.17.18 - Potential BlackIoT Botnet Attacks Can Bring Down IoT Devices
Security Boulevard, 8.17.18 - Just Say No: Wi-Fi-Enabled Botnet Could Bring Power Grid to its Knees
ArsTechnica, 8.17.18 - New Gazelle System That Provide Security to Cloud-Based Machine Learning
Tech Explorist, 8.17.18 - Facebook Issues $1M in Cyber-Security Defense Awards
eWeek, 8.16.18 - Facebook Awards $1M for Defense-Based Research
Dark Reading, 8.16.18 - Facebook Awards $200K to Internet Defense Prize Winners
TechCrunch, 8.16.18 - Award-Winning Security Research Reveals a Host of Never Seen, Currently Unblockable Web-Tracking Techniques
Boing Boing, 8.16.18 - Guess What: Ad Blockers Don't Block Ads That Well
Tom's Guide, 8.16.18 - University of Florida Researchers Develop Device to Detect Skimmers
PYMNTS, 8.16.18 - Skim Reaper Device Detects Wide Range of Skimmer Devices
BleepingComputer, 8.16.18 - Academics Discover New Bypasses for Browser Tracking Protections and Ad Blockers
BleepingComputer, 8.16.18 - Credit Card Skimmers now need to Fear the Reaper
Ars Technica, 8.15.18 - Your smart air conditioner could contribute to mass power outages
Naked Security, 8.15.18 - BlackIoT: Can Water Heaters, Washers Bring Down the Power Grid?
Threatpost, 8.15.18 - Hacked Appliances Could Shut Down the Power Grid, Researchers Say
Nextgov, 8.15.18 - Support for Ageing Key Exchange Crypto Leaves VPNs Open to Attack
The Register, 8.15.18 - Security Gaps Identified in Internet Protocol IPsec
Phys.Org, 8.15.18 - Networking Vendors Patch Against New Cryptographic Attack
HelpNetSecurity, 8.15.18 - Your PC Might Need An Update To Fight 'Foreshadow'
Futurity, 8.15.18 - Intel Has a New Speculative Execution Issue: Foreshadow
BankInfoSecurity.com, 8.15.18 - Spectre-NG: "Foreshadow" gefährdet Intel-Prozessoren
Heise, 8.14.18 - Intel Processor Vulnerability Could Put Millions of PCs at Risk
TechXplore, 8.14.18 - Researchers Break IPsec VPN Connections with 20-Year-Old Protocol Flaw
Threatpost, 8.14.18 - CVE-2018-0131 in Cisco IOS and IOS XE Switch, Router Software Patched
Security Boulevard, 8.14.18 - Cisco Patches Router OS Against New Crypto Attack on Business VPNs
ZDNet, 8.14.18 - Your Smart Air Conditioner Could Help Bring Down the Power Grid
CNET, 8.14.18 - How Hacked Water Heaters Could Trigger Mass Blackouts
Wired, 8.13.18 - Cisco Patches Its Operating Systems against New IKE Crypto Attack
BleepingComputer, 8.13.18 - Internet Security, Encrypted Messaging and Privacy Projects Win Facebook Grants
ZDNet, 8.10.18 - ‘Side-Channel’ Cyber Attacks Rare, But Chilling
Geek.com, 8.10.18 - A $225 GPS Spoofer Can Send Sat-Nav-Guided Vehicles into Oncoming Traffic
Ars Technica, 7.18.18 - Why Businesses Need Extra Vigilance to Combat Phishing Attacks
Digital Journal, 6.18.18 - The Most Shocking Thing About Encrypted Email Being Vulnerable Is That Anyone Still Uses Encrypted Email
Slate, 5.15.18
8th USENIX Workshop on Free and Open Communications on the Internet (FOCI '18)
12th USENIX Workshop on Offensive Technologies (WOOT '18)
- If for Some Reason You're Still Using TKIP Crypto on Your Wi-Fi, Ditch It
The Register, 8.9.18
Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018)
- Here's a Fab Idea: Get Crypto Libs to Warn Devs When They Screw Up
The Register, 8.14.18
2018 USENIX Annual Technical Conference
- Pick a serverless fight: A comparative research of AWS Lambda, Azure Functions & Google Cloud Functions
JAXenter.com, 8.7.18
16th USENIX Conference on File and Storage Technologies (FAST '18)
- Fail-Slow at Scale: When the Cloud Stops Working
ZDNet, 2.26.18
- Security Experts Wonder If Privacy Is Going Extinct—And at What Cost
SiliconANGLE, 1.18.18 - Most Google Accounts Don't Use Two-Factor Authentication
PCMag, 1.18.18 - Who's Using 2FA? Sweet FA. Less Than 10% of Gmail Users Enable Two-Factor Authentication
The Register, 1.17.18 - HTML5 May As Well Stand for Hey, Track Me Longtime 5. Ads Can Use It to Fingerprint Netizens
The Register, 1.17.18 - Who's Using 2FA? Sweet FA. Less than 10% of Gmail Users Enable Two-Factor Authentication
The Register, 1.17.18 - Shafted by Bosses, Disdained by Punters, Loved by Hackers—Yes, It's Freelance Workers
The Register, 1.17.18 - Wanna Motivate Staff to Be More Secure? Don't Bother Bribing 'Em
The Register, 1.17.18 - How Google Fights Password Thieves
Gizmodo, 1.17.18 - How the Gig Economy Exposes Workers to Cybersecurity Risks
Gizmodo, 1.17.18
2017
26th USENIX Security Symposium
- Your Phone Is Like a Spy in Your Pocket
ScienceNews, 1.23.18 - Scientists Encode Malware with Synthesized DNA That Targets DNA Analysis Software...
DarkDaily, 10.25.17
9th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud '17)
- Old Phones Get New Life in High-Powered Computer Servers
Princeton University, 10.24.17
2016
25th USENIX Security Symposium
- No, Apple's Face ID Is Not a 'Secure Password'
Forbes, 9.8.17 - Old or New, Your Car May Be Ripe for Hacking
boston.com, 9.4.16 - Computer Scientists Reveal History of Third-Party Web Tracking
Top Tech News, 9.4.16 - Forget Software-Now Hackers Are Exploiting Physics
Wired, 8.31.16 - New Cloud Attack Takes Full Control of Virtual Machines with Little Effort
Ars Technica, 8.31.16 - Hackers Can Now Unlock Phones with a VR Headset and Facebook Photos
Motherboard, 8.27.16 - This New Tool Can Sniff Out Who (or What) Is Following You Online
Inc., 8.26.16 - The New 'Tracking Excavator' Proves How Your Privacy Is Violated Online
The Fiscal Times, 8.24.16 - Facial Recognition Can Be Tricked with Facebook Photos
Newsweek, 8.22.16 - Here's Why Facial Recognition Tech is Far From Flawless
TechRadar, 8.22.16 - VR Faces Made from Facebook Photos Fool Biometric Logins
Tom's Guide, 8.22.16 - Researchers Crack Facial Security Systems Using 3D Faces Based On Facebook Photos
International Business Times, 8.22.16 - Facebook Photos Lead to Hacking of Facial Recognition System
HackRead, 8.22.16 - Facebook Photos Could Be Used to Dupe Facial Recognition
Biometric Update, 8.22.16 - UNC Researchers Suggest That Certain Facial Recognition Technology Can Be Easily Traversed
French Tribune, 8.22.16 - Four in Five Android Devices Inherit Linux Snooping Flaw
The Register, 8.22.16 - Hackers Have Apparently Already Tricked Facial Recognition Technology Using Your Facebook Photos
Uproxx, 8.21.16 - Your Facebook Photos Could Be Betraying Important Biometric Data
Digital Trends, 8.21.16 - Hackers Fool Facial Recognition System Using Your Facebook Images
TechWorm, 8.21.16 - 3D Faces Based on Facebook Photos Can Fool Security Systems
Engadget, 8.21.16 - Hackers Trick Facial-Recognition Logins with Photos From Facebook (What Else?)
Wired, 8.19.16 - They Really Are Watching You: Web Tracking Surges With Online Ads
USA Today, 8.17.16 - Yes, That Website You're Visiting Is Probably Tracking You
Fortune, 8.17.16 - Purdue Research Team Details New Smart Phone Forensic Data Strategy
Homeland Preparedness News, 8.17.16 - 1.4 Billion Android Devices Vulnerable to Hijacking Thanks to Linux TCP Bug
Computerworld, 8.17.16 - 1.4 Billion Androids Open to Spying via New TCP Flaw
Dark Reading, 8.16.16 - Forensics Tool Nabs Data from Signal, Telegram, WhatsApp
The Register, 8.15.16 - Millions of Volkswagens Can Be Unlocked by Hackers
IEEE Spectrum, 8.15.16 - Forensics Tool Nabs Data From Signal, Telegram, WhatsApp
The Register, 8.15.16 - New Cryptocurrency DDoSCoin Incentivizes Users For Participating In
EconoTimes, 8.15.16 - Researchers Track the Trackers Through 20 Years of the Archived Web
TechCrunch, 8.15.16 - ARMageddon Cache Attack on Android Devices Can Monitor Keystrokes, ARM TrustZone
Softpedia News, 8.15.16 - Microsoft Already Preparing Next Windows 10 Update
eWeek, 8.15.16 - Linux Traffic Hijack Flaw Also Affects Most Android Phones, Tablets
ZDNet, 8.15.16 - Linux Has a TCP Flaw, Researchers Find
Security Intelligence, 8.15.16 - ARMageddon Cache Attack on Android Devices Can Monitor Keystrokes, ARM TrustZone
Softpedia, 8.14.16 - Cryptography Experts Recommend Apple Replace its iMessage
Mac Rumors, 8.14.16 - New Forensic Tool Will Never Recover Data From Smartphone RAM, Encrypted Or Not
TechWorm, 8.13.16 - Facebook Awards $100K for 2016 Internet Defense Prize
InfoSecurity Magazine, 8.12.16 - iMessage's 'End-To-End' Encryption Hardly Any Better Than TLS, Say Cryptography Researchers
Tom's Hardware, 8.12.16 - Your Car's Keyless Entry System Might Help Hackers Unlock It
Washington Post, 8.12.16 - Researchers Create Cryptocoin With DDoS Puzzle For Miners
ITNews, 8.12.16 - 'Millions' of Volkswagen Cars Can Be Unlocked via Hack
BBC News, 8.12.16 - Should Drivers Trust Keyless Security Systems?
Christian Science Monitor, 8.12.16 - Bugs in the Bug: 100 Million Cars, Especially VW, May Be at Risk For Unlock Hacks
Extreme Tech, 8.12.16 - Remote Door Controls Are Car Security Flaw
Scientific American, 8.12.16 - Car Fob Hack Gets Thieves Rolling
InfoSecurity, 8.12.16 - Millions of Volkswagens Can Be Broken into with a Wireless Hack
PCWorld, 8.12.16 - Researchers Reveal Flaw in Volkswagens with Keyless Entry
UPI.com, 8.12.16 - 100 Million Vehicles Are Vulnerable to Hack That Unlocks Doors
FedScoop, 8.12.16 - Another Worry for Volkswagen Owners: Wireless Hack Can Unlock Millions of Audis, Porsches, VWs
Christian Science Monitor, 8.12.16 - Security Experts Say Remotes for Cars Are Hackable
Associated Press/US News & World Report, Charlotte Observer, Miami Herald, 8.12.16 - Key Fob Hack Allows Attackers to Unlock Millions of Cars
Threatpost, 8.12.16 - Study: Key Fobs of 100 Million Cars Vulnerable to Easy Hacks
Car and Driver, 8.12.16 - Millions of Cars at Risk as Keyless Entry Systems Can Be Hacked, Report Says
The Guardian, 8.12.16 - Millions of Volkswagen Cars Are at Risk from a New Security Hack
Wired UK, 8.12.16 - VW's Keyless Entry Systems Vulnerable to Hacking: European Researchers
Insurance Journal, 8.12.16 - Wireless Hack Can Unlock and Start 100M Volkswagen Vehicles
SiliconRepublic, 8.12.16 - Volkswagen Misfortunes Continue: 100 Million Cars Since 1995 Vulnerable to Wireless Key Hack
Tech Times, 8.12.16 - A Remote Unlocking Hack Threatens Millions of Vehicles Worldwide
Virus Guides, 8.12.16 - 100 Million Volkswagens From 1995 Onwards Are Vulnerable to an "Unlock" Hack
AutoEvolution, 8.12.16 - Researchers Claim They Can Hack Most Volkswagens
Consumer Affairs, 8.12.16 - Hack of Keyless Entry Systems Put 100M VWs at Risk
eWeek, 8.12.16 - Hackers Could Easily Break into Your Car
US News, 8.12.16 - Wireless Hack Can Unlock 100 Million Volkswagens
PoliticalLore.com, 8.12.16 - Wireless Hack Can Unlock 100 Million Volkswagens
PoliticalLore.com, 8.12.16 - Security Experts Find a Way to Hack Keyless Entry Systems Used in Cars
Times of India, 8.12.16 - A Remote Unlocking Hack Threatens Millions of Vehicles Worldwide
Virus Guides, 8.12.16 - 100M Volkswagens Could Be Hacked Wirelessly
Nextgov, 8.12.16 - RetroScope Opens Doors to the Past in Smart Phone Investigations
Science Daily, 8.12.16 - Purdue's RetroScope 'New Frontier' in Smartphone Forensics For Law Enforcement
Journal and Courier, 8.11.16 - New Attacks Can Monitor Keystrokes, Steal Sensitive Data from Android Phones
On the Wire, 8.11.16 - Better Ransomware Detection
Bank Security News, 8.11.16 - 100 Million VWs Can Be Unlocked with a $40 Cracker (and Other Cars Aren't Much Better)
Boing Boing, 8.11.16 - Cryptographers from the Netherlands Win 2016 Internet Defense Prize
CWI, 8.11.16 - Volkswagen Keyless Entry Systems Can Be Bypassed
IT News, 8.11.16 - Wireless Hack Unlocks Volkswagens, Fords and Chevys
Tom's Guide, 8.11.16 - Keyless Sytems of Many VW Group Cars Can Be Hacked: Researchers
Reuters, NBC News, 8.11.16 - Millions of Volkswagens Can Be Broken into with a Wireless Hack
PCWorld/IDG News Service, 8.11.16 - This Wireless Flaw Leaves Millions of Volkswagens Cars Vulnerable
Engadget, 8.11.16 - Researchers Discover Hack Capable of Unlocking 100M Volkswagens
New York Daily News, 8.11.16 - 100 Million Volkswagen Vehicles Can Be Unlocked Wirelessly by Hacker Thieves
Digital Trends, 8.11.16 - Millions of VW Cars at Risk: Wireless Hack Lets Crooks Clone Volkswagen Keys
ZDNet, 8.11.16 - New Remote Unlock Hack Compounds VW's Problems
Digital Trends, 8.11.16 - Thieves Can Wirelessly Unlock Up to 100 Million Volkswagens, Each at the Press of a Button
The Register, 8.11.16 - Volkswagen Bug: 100M Vehicles Vulnerable to Door Unlocking Hack
SC Magazine, 8.11.16 - Hackers Can Clone Volkswagen Keys, Millions of VW Cars at Risk
Techworm, 8.11.16 - Millions of Keyless Volkswagen Cars Are at Risk of Wireless Hacks
14U News, 8.11.16 - Latest Worry for Volkswagen Owners: Wireless Hack Can Unlock Millions of Audis, Porsches, VWs
The Car Connection, 8.11.16 - New Wireless Hack Can Unlock Almost Every VW Made Since 1995
MyBroadband, 8.11.16 - Millions of Vehicles Sold By VW Over Past 20 Yrs Are Vulnerable to Theft
ETAuto, 8.11.16 - 100 Million Volkswagens Could Be Unlocked By a Simple Key Fob Hack
RoadandTrack.com, 8.11.16 - Millions of Volkswagen Cars Vulnerable to a Simple Keyless Entry Hack
MarketBusinessNews, 8.11.16 - More Than 100 Million VWs Vulnerable to New Wireless Hack
AutoBlog, 8.11.16 - Study: VW Cars Vulnerable to Keyless Entry Hack
KVUE.com, 8.11.16 - Linux Operating Systems Vulnerable to Cyber Attacks
Zee News, 8.11.16 - Internet Bug Lets Hackers Intercept Your Browsing to Send Malware
Zee News, 8.11.16 - Linux Operating Systems Vulnerable to Cyber Attacks
Zee News, 8.11.16 - ITCP Flaw Opens Linux Systems to Hijackers
Linux Insider, 8.11.16 - Use the Internet? This Linux Flaw Could Open You Up to Attack
Computerworld Australia, Computerworld, Network World, IT World, PCWorld New Zealand, CIO, CIO New Zealand, PCWorld, CSO, 8.11.16 - Linux Operating Systems Vulnerable to Cyber Attacks: Study
BGR India, 8.11.16 - A New Wireless Hack Can Unlock 100 Million Volkswagens
Wired, 8.10.16 - Linux Bug Leaves USA Today, Other Top Sites Vulnerable to Serious Hijacking Attacks
Ars Technica, 8.10.16 - Serious TCP Bug in Linux Systems Allows Traffic Hijacking
Threatpost, 8.10.16 - Linux Security Backfires: Flaw Lets Hackers Inject Malware into Downloads, Disrupt Tor Users, Etc
The Register, 8.10.16 - Linux Systems Vulnerable to Cyber Attacks: Report
14U News, 8.10.16 - Widespread Linux Flaw Allows TCP Session Hijacking, Termination
On the Wire, 8.10.16 - Linux Operating Systems Vulnerable to Cyber Attacks: Report
Gizbot, NDTV, Zee News, Financial Express, Avenue Mail, CanIndiaNews, IANS, Business Standard, 8.10.16 - Hackers Say Trucking Industry Needs to Step Up Computer Security
Trucks.com, 8.10.16 - Can Big Trucks Be Hacked?
Heavy Duty Trucking, 8.8.16 - Adware Turns a Tidy Profit for Those Who Sneak It into Downloads
CIO/IDG News Service, 8.8.16 - Pay-Per-Install Software Affects 3 Times More Users Than Malware
eWeek, 8.8.16 - Google Research Finds Nuisance Software Deluge
TechWeekEurope, 8.8.16 - Truck Hacking Experiment Proves Pathway Exists Says Researchers
Australiasian Transport News, 8.8.16 - There's a Windows PC Helping Control Fleet Trucks -- Any Idiot Can Start Hacking It in 30 Seconds
Forbes, 8.6.16 - Hacking the Business Model of Adware, Scareware, Other Unwanted Software
Science Daily, 8.6.16 - How Annoying Adware Makes Companies Money
Vocativ, 8.5.16 - Michigan Researchers Show How Easy It is to Hack Trucks
ITS International, 8.5.16 - Bypassing ECU Safeguards
CAN Newsletter online, 8.5.16 - Researchers Use Trojan Horse to Hack into Software
ETCIO.com, 8.5.16 - As Era of Autonomous Trucking Arrives, Michigan Researchers Prove How Easy It is to Hack Trucks
Salon, 8.4.16 - Researchers Prove How Disturbingly Easy It Can Be to Hack a Truck or Bus
Yahoo, 8.4.16 - US Truck Hacking Report Due For Release
Australasian Transport News, 8.3.16 - Hackers Hijack a Big Rig Truck's Accelerator and Brakes
Wired, 8.2.16 - RetroScope Opens Doors to the Past in Smart Phone Investigations
Purdue Newsroom, 8.2.16 - Clever Tool Shields Your Car From Hacks by Watching Its Internal Clocks
Wired, 7.15.16 - Hidden Voice Commands Could Hijack Smartphones
SC Magazine, 7.13.16
10th USENIX Workshop on Offensive Technologies (WOOT '16)
- Researchers Uncover Car Infotainment Vulnerability
Dark Reading, 9.2.16 - Research Reveals Vulnerabilities in Cars Connected to Smartphones
Engineering.com, 9.2.16 - Researchers Find Vulnerabilities in MirrorLink System Connecting Cars to Smartphones
Gadgets Now, 9.2.16 - Cars Connected to Smartphones Have Vulnerabilities: Researchers
IANS Live, 9.2.16 - Smartphone Connecting MirrorLink Hack
Auto Connected Car News, 8.31.16
2015
29th Large Installation System Administration Conference (LISA '15)
- 50 Useful Docker Tutorials for IT Professionals (from Beginner to Advanced)
ThreatStack, 9.28.18
24th USENIX Security Symposium
2015 Journal of Election Technology and Systems Workshop (JETS '15)
9th USENIX Symposium on Offensive Technologies (WOOT '15)
- Alexa and Siri Can Hear This Hidden Command. You Can't.
The New York Times, 5.10.18 - New BitTorrent DRDos Attacks Amp Up Risk, Researchers Warn
Security Intelligence, 8.18.15 - BitTorrent: Theoretical Boosted DoS Attack Threat Has Been Mitigated
The Inquirer, 8.18.15 - BitTorrent Programs Can Be Abused to Amplify Distributed Denial-of-Service Attacks
TechWorld Australia, 8.18.15 - BitTorrent Programs Can Be Abused to Amplify Distributed Denial-of-Service Attacks
TechWorld New Zealand, 8.18.15 - Your Torrent Client Could Help Hackers Hijack Your Computer
ExtremeTech, 8.17.15 - Using BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks
Threatpost, 8.17.15 - BitTorrent Programs Can Be Abused to Supercharge Denial-of-Service Attacks
PCWorld, 8.17.15 - BitTorrent Programs Can Be Abused to Amplify Distributed Denial-of-Service Attacks
PC Advisor, 8.17.15 - BitTorrent Programs Can Be Abused to Amplify Distributed Denial-of-Service Attacks
Network World, 8.17.15 - BitTorrent Programs Can Be Abused to Amplify Distributed Denial-of-Service Attacks
IT World, 8.17.15 - BitTorrent Programs Can Be Abused to Amplify Distributed Denial-of-Service Attacks
CSO Australia, 8.17.15 - BitTorrent Programs Can Be Abused to Amplify Distributed Denial-of-Service Attacks
ComputerWorld India, 8.17.15 - BitTorrent Programs Can Be Abused to Amplify Distributed Denial-of-Service Attacks
ComputerWorld, 8.17.15 - BitTorrent Family Susceptible to DRDoS Attacks
We Live Security, 8.17.15 - BitTorrent Exploits Allow Lone Hackers to Launch Large DDoS Attacks
ZDNet, 8.17.15 - BitTorrent Can Be Exploited for Large-Scale DoS Attacks
ITNews, 8.17.15 - BitTorrent Applications Left Vulnerable to DDoS Attacks
ITProPortal, 8.17.15 - Torrent Network Could Let Single Hacker Bring Down Major Websites
Digital Journal, 8.16.15 - How BitTorrent Could Let Lone DDoS Attackers Bring Down Big Sites
ArsTechnica, 8.16.15 - Hackers Infiltrate Telematics Technology
Insurance Business, 8.14.15 - Hackers Hijack Corvette's Brakes Through Insurance Black Box
TechTimes, 8.14.15 - Luxury Car Hacking Risk Widespread; Evidence Suppressed: Researchers
Insurance Journal, 8.14.15 - Government Email Security Woes Widen with Pentagon Breach and More
TechTarget, 8.14.15 - The Summer of Car Hacks Continues
Dark Reading, 8.13.15 - Security Researchers Hack a Corvette Using Text Message
IT Pro, 8.13.15 - How to Hack a Corvette with a Text Message
ZDNet, 8.13.15 - Hackers Use Insurance Gadget to Remotely Control Corvette
Fox News, 8.13.15 - Hackers Control Car Using a Mobile Phone in Eye-Opening Footage Claiming to Expose Security Flaws
Mirror.co.uk, 8.13.15 - Cars Can Be Hacked by Their Tiny, Plug-In Insurance Discount Trackers
CNN Money, 8.13.15 - Security Researchers Hack a Car and Apply the Brakes via Text
The Guardian, 8.12.15 - New Research Shows That Hackers Can Control Connected Cars Using Text Messages
Uncover Michigan, 8.12.15 - Hackers Cut Corvette's Brakes After Infiltrating Its Dashboard
Newsmax, 8.12.15 - Corvette's Brakes Hacked Using an Insurance Dongle Common in US Cars
Silicon Republic, 8.12.15 - Updates are Coming for a Telematics Unit That Hacked a Corvette
PCWorld, 8.12.15 - UCSD Researchers Hacked a Corvette and Disabled its Brakes with a Text Message
iDigitalTimes, 8.12.15 - TXT Message Leaves Corvette Wrecked
The Register UK, 8.12.15 - Small Wireless Car Devices Allow Hackers to Take Control of a Vehicle's Brakes
Gizmodo, 8.12.15 - Potentially Fatal Auto Risk Traced to UBI Devices
Insurance Business, 8.12.15 - How Texting a Corvette Could Stop It in Its Tracks
Computerworld, 8.12.15 - Hackers Show How Easily a PHONE can be Used to Take Control of a Corvette
Daily Mail, 8.12.15 - Hackers Disable Corvette Brakes by Texting Dongle Meant to Lower Insurance Risk
International Business Times, 8.12.15 - Hackers Cut Corvette's Brakes After Infiltrating Its Dashboard
Newsmax, 8.12.15 - Corvette Hack is One More Reason to Be Wary of Connected Cars
CIO, 8.12.15 - Cars Can Now Be Hacked with a Text Message
Metro Weekly, 8.12.15 - Dying Cipher Suites Are Stinking Up TLS with Man-In-The-Middle Vulns
The Register UK, 8.11.15 - Patched Android 'Serialization' Vulnerability Affects 55 Percent of Devices
Threatpost, 8.11.15 - IBM Finds App Lookalike Flaw in Android
Computer Business Review, 8.11.15 - Android Flaw Lets Rogue Apps Hijack Phones
Tom's Guide, 8.11.15 - Small Wireless Car Devices Allow Hackers to Take Control of a Vehicle's Brakes
Gizmodo, 8.11.15 - Researchers Wirelessly Hack a Corvette's Brakes Using an Insurance Dongle
The Verge, 8.11.15 - Researchers Hacked the Brakes of a Corvette with Text Messages
Fast Company, 8.11.15 - Researchers Hack Corvette's Brake System
Clapway, 8.11.15 - Insurance Monitoring Dashboard Devices Used by Uber let Hackers "Cut Your Brakes" Over Wireless
boingboing, 8.11.15 - Hackers Remotely Engage Corvette's Brakes Through Insurance Dongle
übergizmo, 8.11.15 - Hackers Cut a Corvette's Brakes via a Common Car Gadget
Wired, 8.11.15 - Chevy Corvette Is Latest Car Breached by Hackers
autoblog, 8.11.15 - Corvette Hijacked by Hacking its Insurance Dongle
Geek, 8.11.15 - Car Dongles Let You Hack the Brakes
Wired UK, 8.11.15 - Apparently All Cars Can Be Hacked Now: Insurance Dongle Edition
The Truth About Cars, 8.11.15 - Another Day, Another Stunning Security Flaw in Android - This Time Hitting 55% of Mobes
The Register UK, 8.10.15
12th USENIX Symposium on Networked Systems Design and Implementation (NSDI '15)
2014
11th USENIX Symposium on Operating Systems Design and Implementation (OSDI '14)
23rd USENIX Security Symposium
- New Facebook Internet Defense Prize Pays Out $50000 Award
Threatpost, 8.21.14 - Facebook Awards 'Internet Defense Prize'
New Vision, 8.20.14 - Facebook Awards $50K for Inaugural Internet Defense Prize
InfoSecurity, 8.22.14 - Facebook Slings $50k Internet Defense Prize™ at Bug Hunter Duo
Register, 8.21.14 - German Researchers First to Get Facebook's Internet Defense Prize
IT World Canada, 8.22.14 - Facebook Gives Out $50000 for Inaugural Internet Defense Prize
PC Tech Magazine, 8.22.14 - Facebook Awards $50000 Internet Defense Prize for Security Research
ITProPortal, 8.21.14 - Facebook awards 'Internet Defence Prize' to German Researchers
CTV News, 8.21.14 - Facebook Awards 'Internet Defence Prize' to German Researchers
ABC News, 8.20.14 - $50K Awarded for System That Sniffs Out Web App Vulnerabilities
Network World, 8.22.14 - Don't Think You're SAFE From Windows Zombies Just 'Cos You Have ...
The Register, 8.15.14 - iPhones, iPads Ripe for the Picking
Network World, 8.25.14 - iPhones, iPads Linked to Windows PC's Are Vulnerable to Hacking ...
GMA News, 8.27.14 - The Gyroscopes in Your Phone Could Let Apps Eavesdrop on ...
Wired, 8.14.15 - Your Phone Can Be Snooped on Via Gyroscope
Computer Business Review, 8.22.14 - The biggest iPhone Security Risk Could Be Connecting to a Computer
PCWorld, 8.13.14 - Hackers Could Use Your Smartphone's Gyroscope As a Microphone to Listen in
Slate, 8.16.14 - Your Smartphone's Gyroscope Can Be Turned Into an Eavesdropping Hacker's ...
Digital Trends, 8.17.14 - New App Reveals How Your Smartphone Can Spy on You Without Permission ...
RT Blog, 8.17.14 - Snoops Could Hack Smartphone Gyros to Record Ambient Conversation
The New American, 8.16.14 - Researchers Figure Out How to Spy on Your Smartphone in a Way You'll Never See Coming
Yahoo News, 8.15.14 - How Spies Could Use Your Phone to Eavesdrop on You
Tech Times, 8.15.14 - Gyroscopes in Mobile Devices Can Act As Microphones: Censor That Sensor
Technabob, 8.18.14 - Smartphones Could Be Used to Spy on You
Angle Chronicle, 8.18.14 - Motion Sensors in Your Phone Could Eavesdrop on Your Conversations
Yahoo Tech, 8.15.14 - Gyroscopes in Android Phones Can Be Turned into Always-On Microphones
Geek, 8.15.14 - Researchers Show How to Turn a Phone's Gyroscope into a Crude Microphone for Eavesdropping
FierceWireless, 8.15.14 - Hackers Transform a Smartphone Gyroscope into an Always-On Microphone
Engadget, 8.15.14 - Your Phone's Gyroscope Can Listen to You with a Hack
SlashGear, 8.15.14 - Researchers Figure Out How to Spy on Your Smartphone in a Way You'll Never See Coming
BGR, 8.15.14 - Gyroscope in Your Phone Acts As a Microphone
Crazy Engineers, 8.15.14 - Researchers Hack Smartphone Gyroscope to Become a Microphone (video)
Geeky Gadgets, 8.15.14 - Smartphone Gyroscopes Could Allow Phone Spying
Mobiletor.com, 8.19.14 - The Gyroscope In Your Smartphone Can Be Easily Used to Spy on You
Gizmodo, 8.14.14 - XRay: A New Tool for Tracking the Use of Personal Data on the Web
New York Times, 8.18.14 - Just How Creepy Can Targeted Ads Get? New Tool Promises To ...
Readwrite, 8.19.14 - TSA Scanners That Saw You Naked Can Be Tricked to Miss Guns, Bombs
BusinessWeek, 8.20.14 - Report: Researchers Spoof TSA Airport Scanners
PC Magazine, 8.22.14 - Researchers: Tests Show TSA 'Naked' Body Scanners Can Be Easily Fooled
RT Blog, 8.22.14 - TSA Scanners Can See You Naked, but Can't Spot Bombs and Guns
Tech Times, 8.21.14 - Researchers Find Security Flaws in Body X-ray Scanners Now Used in Some Gov't ...
Fierce Homeland Security, 8.22.14 - Body Scanner's Problem: Fails to Detect Guns
CNN Money, 8.21.14 - Study: Body Scanner Detects Private Parts, not Guns
NBC2 News, 8.21.14 - Vindication for TSA Body-Scanning Crusader?
PC Magazine, 8.22.14 - Retired US Airport Body Scanners Fail to Spot Guns, Knives
Computerworld, 8.21.14 - Naked Full-Body Scanners Failed to Detect Weapons: Study
New York Daily News, 8.20.14 - Researchers Can Easily Fool Former TSA X-ray Scanners and Sneak in Dangerous ...
BGR, 8.20.14 - Researchers Uncover 'Glaring Vulnerabilities' in Full Body X-Ray Scanners
International Business Times, 8.21.14 - Security Researchers Lay Bare TSA Body Scanner Flaws
TechNewsWorld, 8.22.14 - Study: TSA Full-Body Scanners Failed to Detect Guns, Explosives
The Hill, 8.20.14 - Study: TSA Full-Body X-Ray Scanners Miss Guns, Explosives, Knives
CBS Local, 8.20.14 - Security Researchers Buy Pornoscanner, Demonstrate How to Sneak in Guns ...
Boing Boing, 8.21.14 - Researchers Easily Slipped Weapons Past TSA's X-Ray Body Scanners
Wired, 8.20.14 - Got Weapons? Nude Body Scanners Easily Defeated
Ars Technica, 8.21.14 - TSA Body Scanners Can Be Easily Breached for Contraband
WallStreet OTC, 8.2.14 - Those TSA Scanners Were Literally Only Good for Seeing You Naked
SlashGear, 8.21.14 - Retired US Airport Body Scanners Fail to Spot Guns, Knives
CSO Online, 8.21.14 - Airport Body Scanner Bought On EBay Raises Security Alarm
RedOrbit, 8.22.14 - New Tool Makes Online Personal Data More Transparent
Phys.org, 8.18.14 - Gmail Smartphone App Vulnerable to Hackers, Researchers Say
Fortune, 8.22.14 - Cyber Security Experts Find 92 Percent Successful Gmail Hack
The Inquirer, 8.22.14 - Malicious Android Apps Can Hack Gmail
PC Magazine, 8.22.14 - Sneak Attack: Android Apps Can Ambush Each Other
Tom's Guide, 8.21.14 - Security Researchers Expose Gmail Smartphone Hack
Digital Trends, 8.24.14 - How to Hack Gmail 92 Percent of the Time
ZDNET, 8.22.14 - User Beware: Researchers Have 92% Success Rate Hacking into Gmail App
RT, 8.22.14 - Researchers Hack into Mobile Apps, Find Gmail Most Vulnerable While Amazon ...
Headlines & Global News, 8.22.14 - Researchers Find Android Apps Have the Ability to Attack Each Other
Techaeris, 8.22.14 - A Closer Look at the Gmail Smartphone App Hack and Its Wider Implications
ITProPortal, 8.23.14 - Memory Troubling You, Android? Surprise! Another Data Slurp Vuln Uncovered
Register, 8.22.14 - Android, Windows and iOS Vulnerability Allows 92 Percent Hack Success Rate ...
HotHardware, 8.21.14 - Novel Method Can Hack Popular Apps with up to a 92 Percent Success Rate
RedOrbit, 8.22.14 - Bug Claimed to Leave Android Apps Hackable 90% of the Time
Computer Business Review, 8.22.14 - Researchers Hack Into Gmail and Other Apps With 92 Percent Accuracy
NDTV, 8.22.14 - Researchers Hack Gmail App with 92% Success Rate
CNBC, 8.22.14 - Gmail App Hacked with 92 Percent Success Rate
BetaNews, 8.22.14 - Gmail Hacked: Researchers Prove Infiltrating Popular Mobile Apps Is Easy [VIDEO]
International Business Times, 8.22.14 - Android App Ambush: Researchers Successfully Hack Gmail 9 Times Out of 10
Greenbot, 8.22.14 - New Hack: Your Personal Info from Gmail, Other Apps at Risk
WFMY, 8.23.14 - Sneak Attack: Android Apps Can Spy on Each Other
NBCNews, 8.21.14 - Side-Channel Android Weakness Likely on Other Platforms
Threatpost, 8.25.14 - Android Attack Improves Timing, Allows Data Theft
Ars Technica, 8.24.14 - Researchers Demo 92% Success Rate in Hacking Smartphone Apps
FierceWireless, 8.24.14 - Researchers Find Malicious Android Apps Can Hack Gmail
Top Tech News, 8.24.14 - Android Flaw Might Also Affect iOS, Windows
InformationWeek, 8.25.14 - Researchers Find Malicious Android Apps Can Hack Gmail
Newsfactor Network, 8.26.14 - Android Gmail App Found Vulnerable to Exploit
Latin Post, 8.26.14 - Researchers' Malware Steals Gmail Password, Online Banking Data
CSO Online, 8.22.14 - Gmail Can Be Hacked with 92 Per Cent Success Rate, Says University of California
Computing, 8.26.14 - Is Your Gmail Smartphone App Safe?
Computer Business Review, 8.25.14 - New Study: Activitists Post Easy Target for Nation State Attackers
Ars Technica, 8.12.14 - Rogers: CIA Overstepped Bounds but Did Not Hack Congress Israel ...
Politico, 8.4.14 - Many Chrome Browser Extensions Do Sneaky Things
InfoWorld, 8.20.14 - Inside the Sneaky, Surprisingly Large World of Rogue Chrome ...
PCWorld, 8.20.14 - Study Finds Firmware Plagued by Poor Encryption and Backdoors
CSO Online, 8.12.14 - Arab Monarchies Use Malware to Track Journalists
Politico, 7.31.14 - 5 Cool New Security Research Breakthroughs
Network World, 8.21.14
2014 USENIX Annual Technical Conference
- Overeager Compilers Can Open Security Holes in Your Code
Slashdot, 6.20.14 - USENIX: Unstable Code Can Lead to Security Vulnerabilities
Computerworld, 6.19.14 - USENIX: Unstable Code Can Lead to Security Vulnerabilities
CIO Australia, 6.20.14 - USENIX: Unstable Code Can Lead to Security Vulnerabilities
ITWorld, 6.19.14 - USENIX: Unstable Code Can Lead to Security Vulnerabilities
CIO, 6.19.14 - USENIX: Unstable Code Can Lead to Security Vulnerabilities
PCWorld, 6.19.14 - USENIX: Unstable Code Can Lead to Security Vulnerabilities
Computerworld Singapore, 6.20.14 - USENIX: Unstable Code Can Lead to Security Vulnerabilities
Computerworld UK, 6.19.14 - USENIX: Unstable Code Can Lead to Security Vulnerabilities
ARNnet Australia, 6.20.14 - USENIX Researchers Get a Grip on Hadoop Performance
CIO, 6.21.14 - USENIX Researchers Get a Grip on Hadoop Performance
Techworld, 6.21.14 - USENIX Researchers Get a Grip on Hadoop Performance
ITWorld, 6.20.14 - USENIX Researchers Get a Grip on Hadoop Performance
PCWorld Australia, 6.21.14 - USENIX Researchers Get a Grip on Hadoop Performance
Computerworld UK, 6.20.14 - USENIX Researchers Get a Grip on Hadoop Performance
ARNnet Australia, 6.21.14 - USENIX Researchers Get a Grip on Hadoop Performance
TodayNewsTime, 6.22.14
12th USENIX Conference on File and Storage Technologies (FAST '14)
- Access-Control Tool for Personal Stuff Knows ‘Private’ Can Mean It’s Complicated
Network World, 2.22.14 - The Surprise Power Hog for Mobile Storage: Software
Computerworld, 2.19.14 - Why Cloud Data Isn’t As Safe As You Think
ZDNET, 2.17.14 - Micron Test Next-Gen SSD
ZDNET, 2.13.14 - StorageMojo’s Best Papers of FAST ‘14
Storage Mojo, 2.14.14 - Where Does ReRAM Fit?
Storage Mojo, 2.13.14 - 2014: The Year for Data Storage – Important Conferences to Check Out
Scaling Data Insights, 1.21.14
Jump to: 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008
2013
27th Large Installation System Administration Conference (LISA '13)
- USENIX: Flame Graph Shows System Performance in a New light
ITWorld.com, 11.08.13 - USENIX: Red Hat Prepares for 64-Bit ARM Servers
NetworkWorld.com, 11.08.13 - Security expert seeks to make surveillance costly again
ComputerWorld.com, 11.07.13 - Is There a Link Between the Low Cost of Storage and Government Surveillance?
ITWorldCanada.com, 11.07.13 - Vigilância tem de ser cara outra vez
ComputerWorld Portugal, 11.08.13 - Bruce Schneier: Überwachung ist Geschäftsmodell des Internet
Silicon.de, 11.08.13 - 'Dataverzameling kost te weinig'
AutomatiseringGids.nl, 11.07.13 - Red Hat si prepara per i server ARM a 64-bit
ComputerWorld Italia, 11.11.13 - Red Hat prépare l'arrivée de serveurs ARM 64 bits
LeMondeInformatique.fr, 11.12.13 - De kracht van kleintjes: Linux op ARM-servers
Webwereld.nl, 11.11.13 - Schneier: «Verteuert die Überwachung»
Computer World Switzerland, 11.11.13
22nd USENIX Security Symposium (USENIX Security '13)
- ZMap: Scanning the Entire Internet in an Hour
WashingtonPost.com, 8.18.13 - AOL's New Video Audience May Consist Largely of Robots
BusinessWeek.com, 8.16.13 - How Pay-Per-View Networks Cost Advertisers $180 Million a Year in Impression Fraud
MarketingLand.com, 8.13.13 - Advertisers Waste Over 180 Million a Year to Reach Robots
Examiner.com, 8.11.13 - Bloodsucking Leech Puts 100,000 Servers at Risk of Potent Attacks
ArsTechnica.com, 8.16.13 - Researchers Figure Out How to Hack Tens of Thousands of Servers
WashingtonPost.com, 8.14.13 - Fooling the Appstore One Code-chuck at a Time
TheRegister.co.uk, 8.19.13 - Researchers Demo How Apps, Chargers Can Circumvent Security
NetworkWorld.com, 7.31.13 - Researchers Show How to Slip Malware into Apple's App Store
GigaOm.com, 8.16.13 - Apple iOS Security Defeated by Sneaky App
InformationWeek.com, 8.16.13 - Researchers Snuck Malware onto the App Store by Making It a Transformer
Gizmodo.com, 8.16.13 - Researchers Successfully Sneak Malware Through Apple's App Review Process
redOrbit.com, 8.18.13 - Remotely Assembled Malware Blows Past Apple's Screening Process
TechnologyReview.com, 8.16.13 - Researchers Slip Malware onto Apple's App Store Again
News.CNET.com, 8.16.13 - Apple Store's Malware Problem Exposed by Researchers
TGDaily.com, 8.16.13 - Researchers Put a Dent in the Twitter Underground
ThreatPost.com, 8.16.13 - Buying Battles in the War on Twitter Spam
KrebsonSecurity.com, 8.16.13 - The Underground Market for Spam Twitter Accounts
FastCompany.com, 8.14.13 - Twitter Scammers Earned Upwards of $459,000 in 10 Month Period
SocialNewsDaily.com, 8.15.13 - Researchers Explore Underground Market of Twitter Spam and Abuse
CSOonline.com, 8.14.13 - Twitter Accounts Created to Spread Spam Malware Are Easy to Create and Sell
SCMagazine.com, 8.16.13 - Expect a Unicorn with Cybersecurity Standards, Ozment Says
MainJustice.com, 8.15.13 - Researchers Seek Better Ways to Track Malware's Family Tree
DarkReading.com, 8.15.13 - Here's How Iran Censors the Internet
WashingtonPost.com, 8.15.13 - DNS Poisoning and Spoofing Made Simpler with BIND Vulnerability
Infosecurity-Magazine.com, 8.14.13 - USENIX: Researchers Propose Security That Adapts to Combat Malware That Morphs
NetworkWorld.com, 8.14.13 - USENIX: Gamers Use DDOS As a Service to Cheat - a lot
NetworkWorld.com, 8.14.13 - New Technology Spots Malware Through Power Consumption
FierceHealthIT.com, 8.9.13 - Admins Warned: Drill SSL Knowledge into Your Chrome Users
TheRegister.co.uk, 8.10.13 - Chrome SSL Clickthrough Report
TheRegister.co.uk, 8.9.13 - New Security Scheme Whacks Test Spammers in Hours
NetworkWorld.com, 8.8.13 - Speculation Trumps Academic Freedom
EFF.org, 8.6.13 - White Hat Luxury Car Hacker to Speak at USENIX Security Event Despite Injunction
NetworkWorld.com, 8.2.13 - Car Hacking Scientists Agree to Delay Paper That Could Unlock Porsches
TheGuardian.com, 7.30.13 - Volkswagen Sues UK University After It Hacked Sports Cars
Telegraphy.co.uk, 7.30.13
Jump to: 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008
2012
21st USENIX Security Symposium (USENIX Security '12)
- Neuroscience Joins Cryptography
Phys.Org, 7.19.12 - TARDIS: Time and Remanence Decay in SRAM
spectrum.ieee.org, 8.6.12
2012 USENIX Federated Conferences Week
- 2012 USENIX Federated Conferences Week
Journal of a Programmer, 8.3.12 - USENIX ATC '12
Jagged Thoughts, 6.21.12 - Solving Performance Problems at USENIX 2012
Research with Results, 6.18.12
2012 USENIX Annual Technical Conference ATC '12
- MIT Researchers Chart a New Approach for Mobile Internet Protocols
Network World, 7.6.12 - MIT Researchers Chart a New Approach for Mobile Internet Protocols
CIO, 7.6.12 - Making it Easier to Build Secure Web Applications
Phys.Org, 6.19.12 - Making It Easier to Build Secure Web Applications
R&D, 6.18.12 - Data Series: USENIX Best Paper Award - Erasure Coding in Windows Azure Storage
Windows Azure, 6.13.12
2012 Women in Advanced Computing Summit (WiAC '12)
- 2012 USENIX Women in Advanced Computing Summit Report from Lin Crampton
LOPSA, 7.25.12 - Gmail engineer: Women in Tech Must Overcome the Impostor Syndrome
Network World, 6.14.12 - Gmail engineer: Women in Tech Must Overcome the Impostor Syndrome
Computerworld UK, 6.14.12 - Gmail Engineer: Women in Tech Must Overcome the Impostor Syndrome
Tech World AU, 6.14.12
4th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud '12)
- Resource-As-a-Service an Up-and-Coming Cloud Platform?
Midsize Insider, 6.19.12 - Researcher: Interdependencies Could Lead to Cloud 'Meltdowns'
Network World, 6.07.12 - Researchers Predict Advent of 'Resource-As-a-Service' Clouds
Network World, 6.5.12
2012 USENIX Workshop on Hot Topics in Cyberlaw
- Berkeley Law Professors Propose 'Tactical Disarmament' Agreement for Patent Suits
The Verge, 6.13.12 - “Defensive Patent License” Created to Protect Innovators from Trolls
Ars Technica, 6.12.12 - FTC Chief Technologist Felten Urges Techies to Enter, Influence Government
IDG News Service, 6.12.12 - FTC Chief Technologist Felten Urges Techies to Enter, Influence Government
PCWorld, 6.12.12
5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '12)
- Busted in 60 Seconds: Malware Reveals Itself in First Minute
Dark Reading, 4.27.12 - USENIX LEET 2012: Observations and Emerging Threats
TrendMicro Malware Blog, 4.25.12
10th USENIX Conference on File and Storage Technologies (FAST '12)
- Sync Your Data Without the Cloud
Technology Review, 2.22.12 - Flash Memory DOOMED to Drive Itself Off a Cliff - boffins
The Register, 2.21.12 - How Data Storage Cripples Mobile Apps
Technology Review, 2.20.12 - SSD Drives Drop Performance for Capacity
TechCentral.ie, 2.20.12 - Crappy Flash Memory Could Be Responsible For Poor Performance
Gizmodo Australia, 2.18.12 - Study: Flash Storage to Blame For Sluggish Smartphone Performance
Phandroid , 2.17.12 - Current Flash Memory Technologies Won't Scale Beyond 2024, Researchers Say
The Verge, 2.17.12 - Slow Smartphone? It’s Not the Network, It’s NAND Flash
Computerworld, 2.17.12 - Poor Flash Storage Could Be Slowing Down Your Smartphone
The Verge, 2.17.12 - SSDs Have a ‘Bleak’ Future, Researchers Say
Computerworld, 2.16.12 - The Dismal Science of Flash
ZDNet, 2.16.12 - Researchers Say SSDs Could Be Doomed to Failure
Legit Review, 2.16.12
Jump to: 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008
2011
25th Large Installation System Administration Conference (LISA '11)
- Naval Researchers Pioneer TCP-based Spam Detection
pcworld.com, 12.23.11 - Some Big Thoughts on Big Data and Cloud for 2012
GigaOm.com, 12.21.11 - DevOps Set to Change Development/Operations Equation: Outlook 2012
SearchSOA, 12.12.11 - Usenix: Google Deploys IPv6 for Internal Network
pcworld.com, 12.9.11 - USENIX's LISA Still for System Administrators
O'Reilly's Radar, 12.9.11 - LISA '11 Boston: Women in Tech Panel
blog.linuxgrrl.com, 12.8.11 - Usenix: Dartmouth Expanding Diff, Grep Unix Tools
world.com, 12.8.11 - Move to Cloud Makes DevOps Even More Important
GigaOm.com, 12.7.11 - This Sort of Cloud Hot Air Could Actually Be Useful
InfoWorld.com, 11.30.11 - Data Center As Furnace? Microsoft Researchers Explore Idea
ZDNet.com, 11.29.11 - Worried About Being Cold this Winter? How About Installing a Data Furnace?
IEEE Spectrum, 11.28.11 - USENIX LISA Conference Will Focus on Devops
DevX.com, 11.28.11 - Turn On the Server. It’s Cold Inside.
NYT, 11.26.11 - DevOps Speeds Application Development
pcworld.com, 11.23.11
20th USENIX Security Symposium (USENIX Security '11)
- Mobile Security's Future: 4 Expert Predictions
InformationWeek, 9.28.11 - Penn Researchers Work to Make Federal Agents' Radios More Secure
Philly.com, 9.19.11 - 5 Essential Mobile Security Tips
InformationWeek, 9.9.11 - Car Systems Reminiscent of Early PCs
Dark Reading, 9.8.11 - The Next Wave of Botnets Could Descend from the Skies
MIT Technology Review, 9.7.11 - Security Flaws Found in Project 25 Mobile Radios
PoliceOne.com, 8.25.11 - MIT Researchers Craft Defense against Wireless Man-in-Middle Attacks
Computer World, 8.24.11 - Better ATM Skimming Through Thermal Imaging
The Register, 8.18.11 - Dropbox Cloud Was a Haven for Data Thieves, Researchers Say
Network World, 8.17.11 - Thermal Cameras Can Steal ATM PINs
msnbc.com, 8.17.11 - Could a Crypto-Computer in Your Pocket Replace All Passwords?
Forbes.com, 8.17.11 - Web Searches for Drug Data Often Redirect to Illicit Online Pharmacies
iHealthBeat, 8.15.11 - US and UK Zombies Demand Top Dollar
Network World, 8.15.11 - Hackers Hijack Websites in Online Pharmacy Scam
NPR, 8.12.11 - Study Finds Android App-makers Careless with Some Data
PCWorld, 8.12.11 - How the West is Arming the Anti-Censorship Movement
The Globe and Mail, 8.12.11 - Government Censoring of Web Could End
Montreal Gazette, 8.12.11 - USENIX Security 2011: CyLab Researchers Release Study on Illicit Online Drug Trade and Attacks on Pharma Industry
CyLab, 8.12.11 - Damballa Principal Scientist to Present at USENIX Security Symposium
BusinessWire, 8.12.11 - Anti-Censorship Scheme Could Make Site Blocking a Thing of the Past
TG Daily, 8.11.11 - P25 Radios Vulnerable to Eavesdropping, Can Be Jammed by Child's Toy
Government Computer News, 8.11.11 - Q: Why Do Defenders Keep Losing to Smaller Cyberwarriors?
The Register, 8.11.11 - New Software May End Internet Censorship Once and for All
SmartPlanet, 8.11.11 - Can Somebody Steal Your Car by Calling It on the Phone?
The Truth About Cars, 8.10.11 - Feds' Radios Have Significant Security Flaws
Slashdot, 8.10.11 - USENIX: Forensic Analysis, Refereed Papers
www.bubbva.blogspot.com, 8.10.11 - Eavesdropping on the Fed's Radios is Drop Dead Simple
The Inquisitr, 8.10.11 - Measuring Search-Redirection Attacks in the Illicit Online Prescription Drug Trade
Light Blue Touchpaper, 8.10.11 - Security Flaws in Feds' Radios Make for Easy Eavesdropping
The Wall Street Journal, 8.10.11 - New Anticensorship Scheme Could Make It Impossible to Block Individual Sites
Newswise, 8.10.11 - One Year Ago, I Got Grilled by the Secret Service
CSO, 8.9.11 - Security Flaw Found in Feds' Digital Radios
CNET, 8.9.11 - Telex Software Circumvents Internet Censorship
Tom's Guide, 8.4.11 - Seeking Tomorrow's Security Solutions Today, Part 2
TechNewsWorld, 7.28.11 - Telex to Help Defeat Web Censors
BBC News, 7.19.11 - Metricon 6: Be There
CSO, 7.11.11
2011 USENIX Federated Conferences Week
- 2011 USENIX Annual Technical Conference
Journal of a Programmer, 6.20.11 - Cloud Storage Providers Need Sharper Billing Metrics
PCWorld, 6.17.11 - Microsoft, Google, and Twitter Debate Whether HTML5 is "Holy Grail"
Network World, 6.17.11 - 'Dead Media' Never Really Die
Network World, 6.16.11 - Research Tackles Powering the Virtual Data Center
Network World, 6.16.11 - Want to Stop Cybercrime? Follow the Money
Network World, 6.15.11 - TidyFS: Microsoft's Simpler Distributed File System
ZDNet, 6.15.11 - Cloud Economics Favor the Small Workload
CIO, 6.15.11 - Get More from the Cloud
The Data Center Journal, 6.15.11 - Building a More Resourceful Cloud
IDG News Service, 6.14.11
4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '11)
- Files Uploaded to File Hosting Services Accessed by Malicious Individuals
Help Net Security, 5.9.11 - Think File-Hosting Sites Guard Your Private Data? Think Again
The Register, 5.8.11 - Not Anonymous: Attack Reveals BitTorrent Users on Tor Network
Ars Technica, 4.13.11 - Want to Stay Anonymous Online? Don't Share Files
New Scientist, 4.13.11 - Behind the Curtain of a Botnet Business
CSO, 3.29.11 - Attacking and Defending the Tor Network
threatpost.com, 3.29.11 - Attacking and Defending the Tor Network
Slashdot, 3.29.11 - Identifying Tor Users Through Insecure Applications
Schneier on Security, 3.25.11
8th USENIX Symposium on Networked Systems Design and Implementation (NSDI '11)
- Software for Fast, Low-Cost SSL Proxy Servers under Development
FierceCIO:TechWatch, 1.28.11 - Low-Cost SSL Proxy Could Bring Cheaper, Faster Security; Defeat Threats Like Firesheep
Network World, 1.25.11
9th USENIX Conference on File and Storage Technologies (FAST '11)
- SSDs Harder to Securely Purge of Data than HDDs
eWeek.com, 2.18.11 - Cleversafe to Co-Present on New Dispersed Storage Scheme at FAST 2011
PR Newswire, 2.10.11 - Flash Memory for Dull Devices
IEEE Spectrum Online, 1.25.11
USENIX Mention
- Google's Niels Provos Battles Malware on the Web
CNET News.com, 1.19.11
Jump to: 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008
2010
24th Large Installation System Administration Conference (LISA '10)
- The USENIX-LISA Conference Report
Steven's LiveJournal, 11.30.10 - Large Installation System Administration (LISA) 2010
Raytheon Trusted Computer Solutions, 11.15.10 - CERN Battling Severe Case of Data Indigestion
TechNewsWorld , 11.10.10 - USENIX LISA 2010: Special Coverage
SearchNetworking.com, 11.5.10
9th USENIX Symposium on Operating Systems Design and Implementation (OSDI '10)
- Google Android Apps Found to be Sharing Data
BBC News, 9.30.10
19th USENIX Security Symposium (USENIX Security '10)
- Attack Reads Smudges to Retrieve Android Password Patterns
The Register, 8.11.10 - Security Blunders 'Dumber than Dog Snot'
CSO, 8.11.10 - Researchers: Car Safety Feature Vulnerable to Hack
CNET News.com, 8.10.10 - Wireless Car Sensors Vulnerable to Hackers
Technology Review, 8.10.10 - How an Ancient Printer Can Spill Your Most Intimate Secrets
The Register, 8.10.10 - Private Browsing is Not as Secure as Users Think, Says Study
OUT-LAW.com, 8.10.10 - Private Web Browser Modes Not as Anonymous as You Might Think
Infosecurity Magazine, 8.9.10 - 'Porn Mode' Not Necessarily Anonymous
CNET News.com, 8.7.10 - Private Browsing Modes in Four Biggest Browsers Often Fail
The Register, 8.6.10 - Chatroulette Calls Upon the Power of Napster
WebProNews, 8.6.10 - Web Add-ons Compromise 'Private Browsing'
Network World, 8.6.10 - Experts Uncover Flaws in 'Private Browsing'
V3.co.uk, 8.6.10 - Researchers Find Leaks in Private Browsing Modes
PC Pro, 8.6.10 - Private Browsing Modes Leak Data
BBC News, 8.6.10 - Is Ubiquitous Encryption Technology on the Horizon?
Network World, 7.19.10
1st USENIX Workshop on Health Security and Privacy (HealthSec '10)
- End of Google Wave Leads to Questions on Its Use as EHR System
iHealthBeat, 8.6.10
2010 USENIX Federated Conferences Week
- Faster Servers, Services with FlashStore
R&D Mag, 2.14.11 - Google: 129 Million Different Books Have Been Published
PCWorld, 8.6.10 - Google Keeps Riding the HTML5 Train—Adds Support for Safari
WebWorkerDaily, 7.13.10 - Enterprise PCs Work While They Sleep, Saving Energy and Money
redOrbit, 6.24.10 - A 'fat-free' Programming Framework for the Cloud
GoodGearGuide, 6.23.10 - Facebook Engineer: Going Large Requires Thinking Small
PCWorld, 6.23.10 - Enterprise PCs Work While They Sleep - Saving Energy and Money - with New Software
Physorg.com, 6.23.10 - Microsoft Research Has Its Head in the Clouds, Too
ZDNet, 6.18.10 - Microsoft Mulls Improving Hypervisor Security for the Cloud with Bunker-V
ZDNet, 6.15.10 - IBM Analysis of Amazon Finds Cloud Support Forums Lacking
Network World, 6.11.10 - Microsoft's Sleep Proxy Lowers PC Energy Use
Network World, 6.10.10
3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '10)
- Google Warns: 15% of All Malware Coming From Fake Antivirus Sites
Before It's News, 5.2.10 - Researchers Spy on BitTorrent Users in Real-time
The Register, 4.30.10 - Google Warns Fake Antivirus Software Spreads Through SEO, Ads
MediaPostNews, 4.29.10 - Google Warning on Fake Anti-virus Software
BBC News, 4.28.10 - Anyone Can Play Big Brother With BitTorrent
Slashdot.org, 4.28.10 - Google: Fake AV Operations Grow on Back of SEO, Malicious Ads
eWeek.com, 4.28.10 - Fake Anti-Virus Software a Growing Online Threat, Google Warns
FOXNews.com, 4.28.10 - Google Warns: Attention to Fake Anti-virus
Reality News, 4.28.10 - Google: Fake Antivirus Is 15 percent of All Malware
CNET News.com, 4.27.10 - Google Says 11,000 Domains Distributing Rogue Anti-virus
SC Magazine, 4.16.10 - Scareware: Nocebo Instead of Placebo
The H Security, 4.16.10
Jump to: 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008
2009
23rd Large Installation System Administration Conference (LISA '09)
- IBM Building Zero-Emission Data Centers
eWeek and eWeek Europe UK, 11.6.09 - IPv4 Addresses Almost Gone
Government Computer News, 11.6.09 - Amazon Girds for Cloud Battle with Microsoft
eWeek, 11.4.09
2009 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE '09)
- Voting Machine Hack Costs Less than $100000
ITworld.com, 8.12.09 - Voting Machine Attacks Proven to Be Practical
Slashdot, 8.11.09
18th USENIX Security Symposium (USENIX Security '09)
- Nozzle: Counteracting Memory Exploits
Dr. Dobb's, 11.24.09 - Android Security, Naked Keystrokes, Selling Viagra, Crying Wolf & More! — A Report from the 18th USENIX Security Symposium (Montreal, 2009)
CyBlog, 8.16.09 - RFID Tags Get an Intelligence Upgrade
New Scientist, 8.14.09 - Self-Destructing Digital Data
P2PNET.net, 8.13.09 - Gazelle Closer to Shutting Down Browser Security Weaknesses
IT Business Edge, 8.13.09 - Head of Android Security Sees Smartphones as Hacker Targets
SmarTrend News & Market Analysis, 8.13.09 - Android Security Chief: Mobile-phone Attacks Coming
PCWorld, 8.12.09 - SNARE, Gazelle, Vanish, Nemesis and Nozzle: Sounds Like Quite the Wild Security Conference
Network World, 8.7.09 - UW-Developed Software Helps Erase Personal Information from Databases
The Daily of the University of Washington, 8.5.09 - This Message Will Self-Destruct
Economist.com, 8.4.09 - Crying Wolf: Do Security Warnings Help?
ABC News, 7.30.09 - Good Morning, Mr. Phelps. This Data Will Self-Destruct
DaniWeb, 7.28.09 - Browser SSL Warnings Shown to be Ineffective
SC Magazine, 7.28.09 - Research: Security Certificate Warnings are Not Working
The Tech Herald, 7.28.09 - Mission Possible: Self-Destructing E-mail
GovInfoSecurity.com, 7.23.09 - US Scientists Find Ways to Make Electronic Data Self-Destruct
The Hindu, 7.23.09 - This Blogpost Will Vanish...
Lab Rats, 7.22.09 - Researchers Build Auto-Destruct Code for Personal Data
V3.co.uk, 7.22.09 - Self-Destructing Code Developed by Researchers that Automatically Deletes Files
SC Magazine, 7.22.09 - Emails Can Resurface After Deletion—in the Wrong Hands
Thaindian News, 7.22.09 - Now, a Novel Tool to Make Online Personal Data Automatically 'Vanish'
Sindh Today, 7.22.09 - How to Make Your E-mails "Vanish"
Network World, 7.22.09 - This Message Will Self-Destruct
Watching the Watchers, 7.21.09 - Internet Vagabonds to Be Foiled by Gazelle
Security Watch, 7.15.09 - Microsoft's Gazelle Project Tackles Browser Security
InformationWeek, 7.13.09 - Microsoft Plots Big News to Take on Google
StrategyEye, 7.10.09 - Browser as Operating System Microsoft-Style
search.SYS-CON.com, 7.9.09 - Microsoft Set to Respond to Google OS Next Monday?
Neowin.net, 7.9.09 - Inside Microsoft's Radical, New Web Browser
ZDNet.com, 7.7.09 - Gazelle: Applying Operating System Concepts to the Browser
OSNews.com, 7.7.09 - Microsoft Gazelle Présenté au Sommet USENIX Security
Clubic.com, 7.7.09 - Microsoft's "Gazelle" Browser Concept Going on Tour
Redmond Developer News, 7.2.09
2009 USENIX Annual Technical Conference (USENIX '09)
- Amazon Data Center Facility Engineer Touts Radical Cooling Tactics
SearchDataCenter.com , 7.27.09 - Traveling the Web Together
Technology Review, 6.23.09
Workshop on Hot Topics in Cloud Computing (HotCloud '09
- A New Definition of Infrastructure
Network World, 6.19.09
6th USENIX Symposium on Networked Systems Design and Implementation (NSDI '09)
- Somniloquy Lets PCs Talk in Their Sleep
TG Daily, 5.1.09 - Energy Saving Downloads with the Somniloquy
bit-tech.net, 4.27.09 - PCs to Get New Sleep Talking State
geek.com, 4.27.09 - Botlab Keeping an Eye on Spamming Botnets
Network World, 4.13.09 - Viva ViAggre: Cornell and AT&T Labs Researchers' Attempt to Make Router Scalability Sexy
Network World, 4.13.09
2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '09)
- The Legal Risks of Ethical Hacking
Network World, 4.24.09
Jump to: 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008
2008
8th USENIX Symposium on Operating Systems Design and Implementation (OSDI '08)
- Customers Get Dryad, DryadLINQ
R&D Mag, 1.26.11 - Research Tool Cuts Multi-threaded Embedded Freeze-ups
ElectronicsWeekly.com, 12.5.08
17th USENIX Security Symposium (USENIX Security '08)
- New Track-and-snap Anti-theft Software Roams Freely...and Privately
BetaNews, 9.26.08 - Plug-in Opens Door for Self-signed SSL Certs in Firefox 3
SearchSecurity.com, 8.22.08 - Russia and Georgia Continue Attacks—Online
CNET News.com, 8.12.08 - No More Need for an Antivirus Software?
ZDNet.com, 8.12.08 - Next-generation Computer Antivirus System Developed
ScienceDaily, 8.7.08 - Now, Network Cloud for Next-generation Antivirus System
Thaindian News, 8.7.08 - Firewall Pioneer Wanted a 'Super-secure' Blogging Service... So He's Built His Own
Network World, 8.5.08 - Disk Encryption 'No Silver Bullet'
ZDNet.co.uk, 7.31.08 - Phishing Kits Steal from Customers
The Tech Herald, 7.31.08 - Researchers Reveal New Blacklisting Method
SearchSecurity.com, 7.31.08 - Phishing Kits Widely Compromised to Steal from Phishers
InformationWeek, 7.31.08 - Tech Chronicles: A New, Free Way to Track Your Lost Laptop
SFGate, 7.31.08 - 'Hacktivism' Threatens World of Nations
The Register, 7.31.08 - Lost Laptops Get Open-Source Rescue Service
ZDNet, 7.30.08 - Calif. Official Votes for Optical Scans, Hand Tallies
CNET, 7.31.08 - Most Drive-by Malware Comes from China, Google Says
CNET, 7.30.08 - Dr. Strangevote Saves Mankind with Luddite Voting Recipe
The Register, 7.30.08 - One Way to Keep Track of Your Lost Laptop
SFGate, 7.30.08 - PageRank-like Algorithm Creates Predictive Malware Blacklist
Ars Technica, 7.25.08 - Researchers Redefine the Internet Blacklist
ZDNet, 7.25.08 - Attackers' Behavior Builds Better Blacklists
SecurityFocus, 7.24.08 - Researchers Borrow from Google PageRank for Network Defense Service
ZDNet, 7.23.08 - Data Can Leak from Partially Encrypted Disks
ComputerWorld, 7.16.08 - New Service Tracks Missing Laptops for Free
ComputerWorld, 7.14.08
3rd USENIX Workshop on Hot Topics in Security (HotSec '08)
- Let Your Theme Song Be Your Password
Slashdot, 7.17.08 - Researchers Show Up Deniable File System Crypto Leaks
The Register, 7.21.08 - Schneier, UW Team Show Flaw In TrueCrypt Deniability
Slashdot, 7.17.08 - Vista, Word, and Google Desktop Circumvent TrueCrypt Function
heise online UK, 7.17.08
2008 USENIX/ACCURATE Electronic Voting Technology Workshop (EVT '08)
- Protecting Your Vote With Invisible Ink
Discover Magazine, 9.4.08
2008 USENIX Annual Technical Conference (USENIX '08)
- VMware Engineer Praises AMD's Nested Page Tables
SearchServerVirtualization.com, 7.21.08 - Most Network Data Sits Untouched
GCN, 7.1.08 - Serial Computing Is Dead; The Future Is Parallelism
TechTarget, 6.30.08 - The Data Center; A Sysadmin's Playground
TechTarget, 6.27.08 - The JavaScript Worm Turns at USENIX 2008
TechTarget, 6.27.08 - VMware Pioneers Decoupled Dynamic Analysis
GCN, 6.26.08 - Microsoft Exchange on Linux?!?
GCN, 6.26.08 - Soon: A Laptop in Your Pocket?
PCWorld, 6.25.08 - At USENIX '08, Worker Productivity Focus a Bone of Contention
TechTarget, 6.25.08
5th USENIX Symposium on Networked Systems Design and Implementation (NSDI '08)
Slashdot, 4.18.08
Virtualization.com, 4.16.08
PCWorld, 4.16.08
FOX News, 4.11.08
Network World, 4.10.08
First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '08)
- The Advent of Malicious Circuits
Wired, 5.1.08 - Researchers "Poison" Storm Botnet
InfoWorld, 4.25.08 - Researchers Infiltrate and "Pollute" Storm Botnet
Dark Reading, 4.23.08 - Storm Dismantled at USENIX LEET Workshop
Slashdot, 4.17.08 - Hacking Microprocessors Is the Next Step
The Inquirer, 4.16.08
Usability, Psychology, and Security 2008 (UPSEC '08)
- OLPC's Bitfrost: Privacy Disaster, or Security Haven?
ZDNet.com.au, 6.10.08 - How Laptops in Education Can Help Dictators, Hurt Learning
Slashdot, 6.5.08 - Researcher: Misunderstandings Surround RFID in Use Today
CNET, 4.14.08
Jump to: 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008