The Week That Was – 8/6/2012

Here is a new experiment.  I’m going to share a list of articles I found interesting during the past week.  It’s a little different from the typical real time release of events you see elsewhere.  I’m doing it this way for a couple of reasons.  First, I’m much more likely to publish a weekly series than a daily one.  Second, I think sometimes it helps us interpret the news if we give it a little time to develop context.

Here are the articles:

[1]
C. Ericka, “Don’t Become Cats Chasing Mobile Security Laser Pointers,” Dark Reading, 03-Aug-2012. [Online]. Available: http://www.darkreading.com/risk-management/167901115/security/news/240004901/don-t-become-cats-chasing-mobile-security-laser-pointers.html. [Accessed: 03-Aug-2012].
[2]
G. Robert, “Errata Security: Myth: that secret coffee slush fund,” Errata Security, 18-Jul-2012. [Online]. Available: http://erratasec.blogspot.com/2012/07/myth-that-secret-coffee-slush-fund.html?m=1. [Accessed: 02-Aug-2012].
[3]
R. Lemos, “Hardware Backdoors Highlighted By Researcher,” Dark Reading, 31-Jul-2012. [Online]. Available: http://www.darkreading.com/advanced-threats/167901091/security/vulnerabilities/240004674/hardware-backdoors-highlighted-by-researcher.html. [Accessed: 01-Aug-2012].
[4]
A. Cummings, T. Lewellen, D. McIntire, M. P. Moore, and R. Trzeciak, “Insider Threat Study: Illicit Cyber Activity Involving Fraud in the U.S. Financial Services Sector.” Carnegie Mellon Software Engineering Institute, Jul-2012. [Online]. Available: http://www.sei.cmu.edu/reports/12sr004.pdf. [Accessed: 03-Aug-2012]
[5]
N. Shachtman, “Kaspersky Denies Kremlin Ties, Compares Himself to Indiana Jones,” Danger Room, 25-Jul-2012. [Online]. Available: http://www.wired.com/dangerroom/2012/07/kaspersky-indy/. [Accessed: 02-Aug-2012].
[6]
A. Stevenson, “Metropolitan Police ransomware pretender ensnares 1,100 computers,” v3.co.uk, 01-Aug-2012. [Online]. Available: http://www.v3.co.uk/v3-uk/news/2196036/metropolitan-police-ransomware-pretender-ensnares-1-100-computers. [Accessed: 02-Aug-2012].
[7]
K. Jackson-Higgins, “More Than Half Of Top 20 Fortune 500 Firms Infected With ‘Gameover’ Zeus Botnet,” Dark Reading, 31-Jul-2012. [Online]. Available: http://www.darkreading.com/vulnerability-management/167901026/security/attacks-breaches/240004672/more-than-half-of-top-20-fortune-500-firms-infected-with-gameover-zeus-botnet.html. [Accessed: 01-Aug-2012].
[8]
B. Schneier, “Overreaction and Overly Specific Reactions to Rare Risks,” Schneier on Security, 03-Aug-2012. [Online]. Available: http://www.schneier.com/blog/archives/2012/08/overreaction_an.html. [Accessed: 03-Aug-2012].
[9]
B. Schneier, “Profile on Eugene Kaspersky,” Schneier on Security, 02-Aug-2012. [Online]. Available: http://www.schneier.com/blog/archives/2012/08/profile_on_euge.html. [Accessed: 02-Aug-2012].
[10]
N. Shachtman, “Russia’s Top Cyber Sleuth Foils US Spies, Helps Kremlin Pals,” Danger Room, 23-Jul-2012. [Online]. Available: http://www.wired.com/dangerroom/2012/07/ff_kaspersky/. [Accessed: 02-Aug-2012].
[11]
E. Katz, “Social media plays a growing role in open source intelligence, experts say,” NextGov, 31-Jul-2012. [Online]. Available: http://www.nextgov.com/mobile/2012/07/social-media-plays-growing-role-open-source-intelligence-experts-say/57143/. [Accessed: 01-Aug-2012].
[12]
W. Nather, “The Most Expensive Part of the Monitoring System,” Dark Reading, 31-Jul-2012. [Online]. Available: http://www.darkreading.com/security-monitoring/167901086/security/encryption/240004643/the-most-expensive-part-of-the-monitoring-system.html. [Accessed: 01-Aug-2012].
[13]
R. Chirgwin, “Tracking Android Phones Is Easy, Says Researcher,” The Register, 31-Jul-2012. [Online]. Available: http://packetstormsecurity.org/news/view/21309/Tracking-Android-Phones-Is-Easy-Says-Researcher.html. [Accessed: 01-Aug-2012].
[14]
E. Kaspersky, “What Wired Is Not Telling You – a Response to Noah Shachtman’s Article in Wired Magazine,” Nota Bene, 25-Jul-2012. [Online]. Available: http://eugene.kaspersky.com/2012/07/25/what-wired-is-not-telling-you-a-response-to-noah-shachtmans-article-in-wired-magazine/. [Accessed: 02-Aug-2012].
[15]
T. Wilson, “White House, Cybersecurity Chiefs Back Proposed Legislation,” Dark Reading, 01-Aug-2012. [Online]. Available: http://www.darkreading.com/security/news/240004794/white-house-cybersecurity-chiefs-back-proposed-legislation.html. [Accessed: 02-Aug-2012].

Leave a Reply

%d bloggers like this: