Ειδήσεις για την Ασφάλεια απ΄ όλο τον κόσμο....

Επιμέλεια: Δημήτρης Γκρίτζαλης

WorldWide Virus Map:

Secunia List of Advisories and Vulnerabilties

New Vulnerabilites list (NIST): 26/01/2008

Cyber Security Bulletins

Cyber Security Alerts

Threat Report (Symantec): April, 2008

Security Threat Report (Sophos): 2008

Threat Predictions for 2008 (McAfee)

Δελτίο 141- 12 Φλεβάρη 2009 j

  • With Economic Slump, Concerns Rise Over Data Theft, IDG News Service (01/29/09), R. McMillan
  • Obama Unveils Cyber-security Agenda, NextGov.com (01/23/09), G. Nagesh
  • Fighting Malware: An Interview With Paul Ferguson, InfoWorld (01/23/09), R. Grimes
  • Fighting Tomorrow's Hackers, American Friends of Tel Aviv University (02/05/09)
  • Wi-Fi Networks Offer Rich Environment for Spread of Worms, Government Computer News (01/30/09), W. Jackson
  • White House to Assume Key Role in Cybersecurity, Federal Times (02/02/09) Vol. 44, No. 45, P. 4; G. Carlstrom
  • The Cybercrime Wave, National Journal (02/07/09) Vol. 41, No. 6, P. 22; S. Harris
  • Google Makes it Easy to Spy on Kids, Workers, Associated Press (02/05/09), M. Liedtke
  • RFID's Security Problem, Technology Review (02/09) Vol. 112, No. 1, P. 72; E. Naone

Δελτίο 140- 30 Γενάρη 2009 j

  • Group Details 25 Most Dangerous Coding Errors Hackers Exploit, Computerworld (01/12/09), J. Vijayan
  • Voting Machine Audit Logs Raise More Questions About Lost Votes in CA Election, Wired News (01/13/09), K. Zetter
  • Government Spends Over $30 Million to Sharpen Cyber Security Saber, Network World (01/09/09)
  • DECT Cordless Phones No Longer Secure, Network World Canada (01/07/09), P. Judge; G. Meckbach
  • Keeping Information Safe From Digital Spies, Daily Bruin (01/08/09), S. Bui
  • US Plots Major Upgrade to Internet Router Security, Network World (01/15/09), C. D. Marsan
  • Low-Cost Strategy Developed for Curbing Computer Worms, UC Davis News & Information (01/14/09), L. Greensfelder
  • Let the Cracking Begin, Government Computer News (01/12/09), W. Jackson
  • Rice University Software Helps ID Terrorists Carrying Out Attacks, Rice University (01/12/09), F. Brotzen
  • Worm Infects Millions of Computers Worldwide, New York Times (01/23/09), J. Markoff
  • Building a Better Spam-Blocking CAPTCHA, Computerworld (01/23/09), S. Vaughan-Nichols
  • Advocates Worry Electronic Voting Allows Fraud, Medill Reports (01/21/09), J. Barker
  • A Tool to Verify Digital Records, Even as Technology Shifts, New York Times (01/27/09) P. D3; J. Markoff
  • ICANN Ponders Ways to Stop Scammy Web Sites, IDG News Service (01/27/09), J. Kirk

Δελτίο 139- 14 Γενάρη 2009 j

  • Experts Uncover Weakness in Internet Security, Ecole Polytechnique Federale de Lausanne (12/30/08), F. Luy
  • The 9 Hottest Skills for 2009, Computerworld (12/30/08), T. Hoffman
  • Researchers Aim to Fortify CAPTCHA Against Spammers, eWeek (01/06/09), Β. Prince
  • A New Web of Trust, Technology Review (01/06/09), Ε. Naone
  • US Security Experts Fear 'Cybergeddon', Agence France Presse (01/07/09)
  • How to Foil 'Phishing' Scams, Scientific American (12/08) Vol. 299, No. 6, P. 104; L. F. Cranor
  • A Joined-Up Bot-Fighting Strategy, Technology Review (01/09/09), D. Graham-Rowe

Δελτίο 138- 30 Δεκέμβρη 2008 j

  • Profs Stand Up to Secure Laptops, Pittsburgh Tribune-Review (12/01/08), M. Cronin
  • Estonia to Use Mobile Phones to Simplify E-Voting, IDG News Service (12/15/08), M. Ricknas
  • Plugging a Password Leak, Technology Review (12/19/08), R. Kremen
  • US Not Ready for Cyber Attack, Reuters (12/19/08), R. Mikkelsen
  • 'Smart' Surveillance System May Tag Suspicious or Lost People, Ohio State University Research News (12/16/08), P. F. Gorder

Δελτίο 137- 15 Δεκέμβρη 2008 j

  • Saying 'Cheese' for More Effective Border Security, National Institute of Standards and Technology (11/25/08), Β . Stein
  • Paper Ballots Touted as Most Secure, The Denver Post (12/02/08), J. Ingold
  • You're Leaving a Digital Trail. What About Privacy? The New York Times (11/30/08), J. Markoff
  • U.S. Is Losing Global Cyberwar, Commission Says, BusinessWeek (12/07/08), Κ . Epstein
  • Thieves Winning Online War, Maybe Even in Your Computer, New York Times (12/06/08) P. A1; Y. Markoff
  • New Tool to Audit the Use of Private Data, University of Southampton (ECS) (12/05/08), J. Lewis
  • Safer, Better, Faster: Addressing Cryptography's Big Challenges, ICT Results (12/04/08)
  • DHS Creates Privacy Principles for Scientific Research, CNet (12/09/08), S. Condon
  • Hackers, Others Seek DMCA Exemptions, Wired News (12/03/08), D. Kravets
  • 'Privacy Will End in 2013', Financial Times - Digital Business (12/03/08) P. 6; J. Shillingford
  • Carnegie Mellon CyLab Survey Unveils Major Gap in the Way U.S. Boards and CEOs Manage Cyber Risks, Carnegie Mellon News (12/02/08), C. Swaney

Δελτίο 136- 30 Νοέμβρη 2008 j

  • EPSRC Funds Cybersecurity Research, Engineering & Physical Sciences Research Council (11/19/08)
  • IT Security Education Continues to Evolve, CSO Online (11/17/08), G. Spafford; J. Goodchild
  • Obama Administration to Inherit Tough Cybersecurity Challenges, Computerworld (11/19/08), J. Vijayan

Δελτίο 135- 20 Νοέμβρη 2008 j

  • Cops Enlist HAL in Fight Against Crime, silicon.com (11/05/08), N. Heath
  • E-Voting Backers, Watchdogs Hope to Smooth Out Bumps Next Time, Computerworld (11/10/08), T. Weiss
  • North Carolina Uses Bar Codes to Match Voters With Ballots, Government Computer News (11/03/08), W. Jackson
  • Why Veins Could Replace Fingerprints and Retinas as Most Secure Form of ID, Times Online ( UK ) (11/11/08), M. Harvey
  • New Techniques Easier, More Secure, Columbian (WA) (11/09/08), T. Vogt
  • An Algorithm With No Secrets, Technology Review (11/18/08), E. Naone
  • The First Metropolitan Quantum Cryptography Network Will Be Available in Spain by 2010, Universidad Politecnica de Madrid (11/07/08)

Δελτίο 134- 10 Νοέμβρη 2008 j

  • A Picture Is Worth a Thousand Locksmiths, UCSD News (10/29/08), D. Kane
  • Ε-Voting Groups Are Watching a Handful of States, IDG News Service (11/02/08), G. Gross
  • Scientists Crack Possible Future Quantum Computer Age Encryption, TG Daily (11/03/08), W. Gruener
  • IBM Researchers Show Off New Weapon in Fight Against Online Fraud, eWeek (10/29/08), B. Prince
  • On Security, Microsoft Reports Progress and Alarm, New York Times (11/03/08) P. B9; J. Markoff
  • Optical Firewall Aims to Clear Internet Security Bottlenecks, ICT Results (10/29/08)
  • Board Urges Full Funding of Cybersecurity Initiative, NextGov.com (11/05/08), B. Brewin

Δελτίο 133- 31 Οκτώβρη 2008 j

  • Thousands Face Mix-Ups in Voter Registrations, Washington Post (10/18/08) P. A1; Μ. Flaherty
  • ACM Experts See Opportunities and Risks for E-Voting, AScribe Newswire (10/15/08)/
  • Researchers Expect Hackers to Prey on Cell Phones, Associated Press (10/15/08), J. Robertson
  • Users, Enterprises Pay for Poor Privacy Policies, Study Says, Dark Reading (10/07/08), T. Wilson
  • Increased Retail Security With Smart Items, Fraunhofer Institute (10/08), M. Briele
  • Newcastle Scientists Help Microsoft and Yahoo Improve Online Security, Newcastle University (10/21/08)
  • Keyboard Sniffers to Steal Data, BBC News (10/21/08)
  • Beware the Digital Zombies, New York Times (10/21/08) P. B1; J. Markoff
  • Rice Students Challenge Electronic Voting Machines, Converge (10/13/08)
  • National Cybersecurity Initiative R&D Effort Launched, Federal Computer Week (10/14/08), B. Bain
  • A Really Secret Ballot, Economist (10/22/08)
  • Photo Safeguards Confidential Information, University of Twente (10/27/08)
  • Princeton Report Rips N.J. E-Voting Machines as Easily Hackable, Computerworld (10/27/08), T. Weiss
  • ACM Experts Say Heavy Voter Turnout Will Test New Voter Registration Systems, AScribe Newswire (10/28/08)
  • Good Code, Bad Computations: A Computer Security Gray Area, UCSD News (10/27/08), D. Kane
  • New 3-D Image Systems to Provide Reliable Face Biometrics, University of Hertfordshire (10/28/08)

Δελτίο 132- 22 Οκτώβρη 2008 j

  • Cambridge Lab Sets Quantum Key World Record, Techworld (10/09/08), J. Dunn
  • Q&A: E-Voting Security Results 'Awful,' Says Ohio Secretary of State, Computerworld (10/08/08), B. Friedman
  • How Much Security Do You Expect From Your Pacemaker?, University of Massachusetts Amherst (10/03/08)
  • Researchers Show How to Crack Popular Smart Cards, InfoWorld (10/07/08), B. de Winter
  • Giant Database Plan 'Orwellian', BBC News (10/15/08)
  • Feds, Industry Announce Centre for Identity Management Research, GovExec.com (10/07/08), J. Aitoro
  • E-Voting Report: Several States Still Vulnerable, IDG News Service (10/16/08), G. Gross
  • Tools That Will Discreetly Tap a Shoulder to Offer Help, Financial Times Digital Business (10/08/08) P. 4; M. Branscombe

Δελτίο 130 - 30 Σεπτέμβρη 2008 j

  • Cyber Attack Data Sharing Is Lacking, Congress Told, Washington Post (09/19/08) P. D2; E. Nakashima
  • Electoral Apocalypse? e-Voting Woes Remain as Election Nears, Ars Technica (09/21/08), J. Sanchez
  • US Focusing Cybersecurity on Backdoors in Tech Products, IDG News Service (09/15/08) , G. Gross
  • reCAPTCHA: Human-Based Character Recognition via Web Security Measures, Science (09/12/08) Vol. 321, No. 5895, P. 1465; L. von Ahn; B. Maurer; C. McMillen
  • Eugene Spafford: Protecting the Internet From the Criminal Element, Science News (09/13/08) Vol. 174, No. 6, P. 32; S. Gaidos
  • US Urged to Go on Offense in Cyberwar, United Press International (09/29/08), S. Waterman
  • Conference Will Key on Improving Internet Security, New Brunswick Business Journal ( Canada ) (09/29/08), D. Shipley
  • Spoofing GPS Receivers, Cornell News (09/19/08), A. Ju

Δελτίο 129 - 20 Σεπτέμβρη 2008 j

  • Researchers Build Malicious Facebook Application, IDG News Service (09/05/08), J. Kirk
  • Safer Skies for the Flying Public, EurekAlert (09/03/08)
  • U.N. Agency Eyes Curbs on Internet Anonymity, CNet (09/12/08), D. McCullagh
  • Standards for Accreditation of Labs That Test Voting Machines Inconsistent, NextGov.com (09/10/08), J. Aitoro
  • D.C. Election Glitch Blamed on Equipment, Washington Post (09/11/08) P. A1; N. Stewart; E. Silverman ; P. Flaherty
  • US Sees Six 'Disruptive Technologies' By 2025, Computerworld (09/11/08), P. Thibodeau
  • Hackers Hit Large Hadron Collider Web Site, Computerworld (09/12/08) , G. Keizer
  • Putting a 'Korset' on the Spread of Computer Viruses, American Friends of Tel Aviv University (09/09/08)
  • Threat From DNS Bug Isn't Over, Experts Say, Dark Reading (09/08/08), T. Wilson
  • Critics: Homeland Security Unprepared for Cyber-threats, CNet (09/17/08), S. Condon
  • Voting Group Release Guidelines for E-Voting Checks, IDG News Service (09/15/08), G. Gross

Δελτίο 128 - 10 Σεπτέμβρη 2008 j

  • Internet Traffic Begins to Bypass the U.S., New York Times (08/30/08) P. B1; J. Markoff
  • Computer Viruses Make it to Orbit, BBC News (08/27/08)
  • Public, Private Sectors at Odds Over Cyber Security, Los Angeles Times (08/26/08), J. Menn
  • Terror Threat System Crippled by Technical Flaws, Says Congress, Computerworld (08/27/08), P. Thibodeau
  • Indian Researcher's Improved Anti-Hacking System for Wireless Networks, Asian News International (09/04/08)
  • MIT Lincoln Laboratory Software Aims to Thwart Cyber Hackers, MIT News (08/27/08)
  • Protecting Your Vote With Invisible Ink, Discover (09/04/08), M. Lafsky

Δελτίο 127 - 31 Αυγούστου 2008 j

  • Risk Assessment Planned for Voting Systems, Government Computer News (08/19/08), W. Jackson
  • Simple and Secure Networked Home, ICT Results (08/18/08)
  • Planning to E-Vote? Read This First, Scientific American (08/18/08), L. Greenemeier D. Caruso
  • E-Voting Vendor: Programming Errors Caused Dropped Votes, IDG News Service (08/22/08), G Gross
  • A New Breed of Hackers Tracks Online Acts of War, Washington Post (08/27/08) P. D1; K. Hart
  • Revealed: The Internet's Biggest Security Hole, Wired News (08/26/08), K. Zetter
  • Carnegie Mellon System Thwarts Internet Eavesdropping, Carnegie Mellon News (08/25/08), B. Spice

Δελτίο 126 - 25 Αυγούστου 2008 j

  • Judge Refuses to Lift Gag Order on MIT Students in Boston Subway-Hack Case Com­puter­world (08/14/08), J. Vijayan
  • Experts Accuse Bush Administration of Foot-Dragging on DNS Security Hole, Wired News (08/13/08), R. Singel
  • Can Avatars Stop Identity Theft?, Salon.com (08/05/08), D. Caruso
  • Patch for Web Security Hole Has Some Leaks of Its Own, New York Times (08/09/08) P. B1; J. Markoff
  • Web Privacy on the Radar in Congress, New York Times (08/11/08) P. C1; S. Clifford
  • Ohio Official Sues E-Voting Vendor for Lost Votes, IDG News Service (08/08/08), G. Gross
  • Researchers Develop Next-Generation Antivirus System, University of Michigan News Service (08/05/08), N. C. Moore
  • Indiana University Department of Computer Science Study Shows Popular Web Sites at Risk for Phishers , Indiana University (07/30/08)
  • Officials Say Flaws at Polls Will Remain in November, New York Times (08/16/08) P. A10; I. Urbina
  • Some Russian PCs Used to Cyberattack Georgia , USA Today (08/18/08) P. 1B; B. Acohido
  • Researchers Craft Multimedia Passwords, Techworld (08/14/08), J. Dunn
  • Before the Gunfire, Cyberattacks , New York Times (08/13/08) P. A1; J. Markoff
  • Web-Security Inventor Charts a Squigglier Course, Wall Street Journal (08/13/08) P. B5; E. Smith
  • US at Risk of Cyberattacks, Experts Say, CNN (08/18/08), B. Griggs

Δελτίο 125 - 12 Αυγούστου 2008 j

  • Attackers' Behavior Builds Better Blacklists, Security Focus (07/24/08), R . Lemos
  • A Photo That Can Steal Your Online Credentials, IDG News Service (08/01/08), R. McMillan
  • Cloud Computing's Perfect Storm?, Technology Review (08/07/08), J. Borland
  • Open-Source E-Voting Gets LinuxWorld Test Run, Computerworld (08/06/08), T. Weiss
  • Hacking Electronic Toll Systems, CNet (08/06/08), E. Mills
  • EFF Launches Coders' Rights Site at Black Hat Conference, Ars Technica (08/06/08), J. Timmer

Δελτίο 124 - 31 Ιουλίου 2008 j

  • When the Phone Goes With You, Everyone Else Can Tag Along,, Washington Post (07/12/08) P. A1; Ε . Nakashima
  • Printer Dots Concern Privacy Advocates, USA Today (07/14/08) P. 3A; Τ . Frank
  • Goodbye to Faulty Software?, ICT Results (07/15/08)
  • Enigma Variations, Economist (07/10/08) Vol. 388, No. 8588, P. 88
  • DNS Flaw Discoverer Says More Permanent Fixes Will Be Needed, Computerworld (07/17/08), J . Vijayan
  • Google Is Watching, Perhaps Soon in Your Home, InformationWeek (07/11/08), T. Claburn
  • Software Helps Developers Get Started With PIV Cards, National Institute of Standards and Technology (07/09/08), E. Brown
  • ReCaptcha: Reusing Your 'Wasted' Time Online, CNet (07/16/08), S. Olsen
  • Details of Major Internet Flaw Posted by Accident, IDG News Service (07/21/08), R. McMillan
  • CCTV Camera Identifies People by Race, IDG News Service (07/14/08), J. Kirk
  • Attack Code Released for New DNS Attack, New York Times (07/24/08), R. McMillan
  • Data Can Leak from Partially Encrypted Disks, IDG News Service (07/16/08), R. McMillan
  • Dartmouth Begins Network Security Project, Access Control & Security Systems (07/15/08)
  • Researcher to Demonstrate Attack Code for Intel Chips, IDG News Service (07/14/08), S. Lemon
  • Keeping Up With Your Peers, Securely, ICT Results (07/21/08)
  • RFID Unlocks Supply Chain Potential, ICT Results (07/17/08)

Δελτίο 123 - 13 Ιουλίου 2008 j

  • Flaws in Medical Coding Can Kill, Baltimore Sun (06/30/08) P. 1A; J. Rockoff
  • Cisco, IBM, Intel, Juniper and Microsoft Fight Cyber Terror Together, Network World (06/27/08), Τ . Greene
  • Q&A: E-Voting Activist More Optimistic About This Year's Voting Systems, Computerworld (07/03/08), T. Weiss
  • Spying Has Few Legal Checks, Baltimore Sun (07/07/08) P. 1A; B. Olson
  • UK Scientists Demo Graphic Passwords, CNet (07/01/08), C. Lombardi
  • A Tax on Buggy Software, Forbes (06/26/08), A. Greenberg
  • Major DNS Flaw Could Disrupt the Internet, Network World (07/08/08), Ε . Messmer
  • Electronic Path to Bridge Safety, The Australian ( Australia ) (07/01/08), J. Foreshew
  • Identity Problems, National Journal (07/05/08) Vol. 40, No. 27, P. 22; E. Carney
  • Study: Electronic Voting Increased Counting Errors in France, IDG News Service (07/09/08), P. Sayer
  • Senate Grapples With Web Privacy Issues, Washington Post (07/10/08) P. D3; P. Whoriskey

Δελτίο 122 - 29 Ιουνίου 2008 j

  • Compressed Web Phone Calls Are Easy to Bug, New Scientist (06/12/08), D. Robson
  • Beware, Your Computer May Betray You, New Scientist (06/07/08) Vol. 198, No. 2659, P. 26; C. Barras
  • Technology Leaders Favor Online ID Card Over Passwords, New York Times (06/24/08) P. C8; L. Flynn
  • University of Portsmouth Researchers Work on CCTV That Can Hear, Computer Business Review (06/25/08), Β. Navuluri
  • Rogue Code Could Seriously Skew US Presidential Election Results, IT Business Canada (06/25/08), B. Jackson

Δελτίο 121 - 23 Ιουνίου 2008 j

  • Call for Participation: 2008 ACM Workshop on Secure Web Services (SWS), XML Daily Newslink (06/10/08)
  • 'Herds' of Wary Cars Could Keep an Eye Out for Thieves, New Scientist (06/05/08), D. Robson
  • Researchers Say Notification Laws Not Lowering ID Theft, IDG News Service (06/05/08), R. McMillan
  • Space Station Could Beam Secret Quantum Codes by 2014, Scientific American (06/08), J. Minkel
  • Can Computer Scientist Dream Team Clean Up E-Voting?, Network World (06/10/08)
  • Information Accountability, Com. of the ACM (06/08) Vol. 51, No. 6, P. 82; D. Weitzner, H. Abelson, T. Berners-Lee
  • New Intrusion Tolerance Software Fortifies Server Security, George Mason University (06/16/08)

Δελτίο 120 - 12 Ιουνίου 2008 j

  • Call It Predictable: Cellphone Users Are Easy to Find, New York Times (06/05/08) P. A23; J. Schwartz
  • A New Way to Protect Computer Networks From Internet Worms, Ohio State University Research News (06/04/08)
  • Second Annual National Institute on CyberLaw: Expanding the Horizons, Association for Computing Machinery (06/06/08)
  • China's Cyber-Militia, National Journal (05/31/08) Vol. 40, No. 29, P. 16; S. Harris
  • Information at Thieves' Fingertips, Times Union (06/05/08), L. Rulison
  • Secret Messages Could Be Hidden in Net Phone Calls, New Scientist (06/02/08), P. Marks
  • To Fight Cyberwars, Air Force Recruits Part-Time Geeks, Christian Science Monitor (06/05/08) P. 3; J. Lasker
  • Researchers Look to Cut Quantum Cryptography Costs, eWeek (05/29/08), B. Prince
  • Tapping Computer Science for a More ACCURATE Vote, National Science Foundation (06/09/08), D. Cruikshank
  • Dartmouth Launches Network Security Study, Dartmouth News (06/10/08), S. Knapp
  • New Zealand Gov't Looks to Boost Confidence in E-voting, Computerworld New Zealand (06/06/08), S. Bell
  • 'Net Engineer Argues Firewalls Are a Security Distraction, Computerworld Australia (05/30/08), S. Bell

Δελτίο 119 - 5 Ιουνίου 2008 j

  • Web Vote Offered to Military Abroad, Miami Herald (05/26/08), G. Fineout
  • Managing Computer Fraud, EurekAlert (05/23/08)
  • Voting 2.0. Part 2: The Open Source Proposition, Linux Insider (05/30/08), Κ. Noyes
  • To Make a Security Point, Hackers Tweak an Implantable Pacemaker, Sacramento Bee (CA) (05/17/08) P. A4; P. Dahlberg
  • Exploiting Security Holes Automatically, Technology Review (06/03/08), Ε. Naone
  • Malicious Software Threatens Internet Economy, New Scientist (06/02/08), C. Barras; Τ. Simonite

Δελτίο 118 - 30 Μάη 2008 j

  • Alarming Open-Source Security Holes, Technology Review (05/20/08), S. Garfinkel
  • Proponents, Critics Give No Ground in Tussle Over E-voting, Computerworld (05/19/08) Vol. 42, No. 21, P. 12; T. Weiss; G. Gross; R. McMillan
  • Homeland Security Helps Reduce Open Source Flaws, InternetNews.com (05/20/08), S.M. Kerner
  • Researchers Find New Ways to Steal Data, IDG News Service (05/19/08), R. McMillan
  • Inside Lockheed Martin's Wireless Security Lab, Network World (05/19/08), B. Reed
  • Cryptography Expert Wins ACM Award for Advances in Protecting Privacy of Information Retrieval, AScribe Newswire (05/22/08)
  • E-Voting Banned by Dutch Government, InterGovWorld.com (05/21/08), A. Udo de Haes
  • Experts Warn of Cyber Terrorism Threat, Associated Press (05/20/08), J. Zappei; C. Vatvani
  • Army Aims to Take Guesswork Out of Cyber-defense, Government Computer News (05/20/08) W. Jackson
  • Senators: No Need for Paper E-Voting Trails, 'Electronic' Ones Are OK, CNet (05/23/08), Α. Broachel

Δελτίο 117 - 21 Μάη 2008 j

  • Information Tags Along Everywhere You Go, Baltimore Sun (05/11/08) P. 1A; L. Kay
  • NSA Attacks West Point! Relax, It's a Cyberwar Game, Wired News (05/10/08), D. Axe
  • Electronic Voting System Tested at University, Newcastle University (05/14/08
  • Linkoping University Researchers Break 'Unbreakable' Crypto, Linkoping University (04/21/08), L. Falklof
  • Swarming Spy Bots That Share Information Being Built for Military, Computerworld (05/09/08), S. Gaudin
  • CFP 08 Computer Security Experts Debate Political, Economic, Social Impacts of Tech-no¬logy Policy, AScribe Newswire (05/15/08)
  • Report: Government's Cyber Security Plan Is Riddled With New Spying Programs, Wired News (05/15/08), Ρ. Singel

Δελτίο 116 - 12 Μάη 2008 j

  • White House Plans Proactive Cyber-Security Role for Spy Agencies, Washington Post (05/02/08), B. Krebs
  • Electronic 'Pet' Could Replace Passwords and PIN, New Scientist (05/02/08), C. Barras
  • Ballot Box Blues, Government Computer News (04/28/08) Vol. 27, No. 9, Dizard III, P. Wilson
  • USACM Urges Congress to Build in Safeguards for Automated Employment Checks, AS¬cribe Newswire (05/06/08)
  • Pentagon Wants Cyberwar Range to 'Replicate Human Behavior and Frailties', Wired News (05/05/08), Ν. Shachtman
  • Huge Databases Offer a Research Gold Mine--and Privacy Worries, Chronicle of Higher Education (05/09/08) Vol. 54, No. 35, P. A10; D. Glenn
  • Botnet Beaten, But Now What?, eWeek (05/05/08) Vol. 25, No. 14, P. 13; R. Naraine
  • Careful With That Call, Government Computer News (05/05/08) Vol. 27, No. 10, W. Jackson

Δελτίο 115 - 5 Μάη 2008 j

  • FBI's Net Surveillance Proposal Raises Privacy, Legal Concerns, CNet (04/25/08), D. McCullagh
  • Few States Take Email Votes From Troops, Associated Press (04/27/08), L/ Baldor
  • Florida Alters Its Voting Laws, But New Disputes May Emerge, New York Times (04/28/08) P. A1; D. Cave
  • Patches Pose Significant Risk, Researchers Say, SecurityFocus (04/23/08), R. Lemos
  • Shibboleth Authentication Tool Upgraded, Government Computer News (04/22/08), W. Jackson
  • One Breach Is One Too Many in Cyber Warfare, Monterey County Herald (CA) (04/29/08), Κ. Howe
  • Information Security Set for Explosive Growth, Campus Technology (04/24/08), D. Nagel
  • Critical Infrastructure Central to Cyber Threat, Federal Computer Week (04/24/08), B. Bain
  • Experts Struggle With Cybersecurity Agenda, Government Computer News (04/28/08), W. Jackson
  • Digital Deception, Washington Post (05/01/08) P. D1; P. Whoriskey
  • Malicious Hardware May Be Next Hacker Tool, New Scientist (05/01/08), M. Inman
  • Phantom Obama Vote Appears on NJ Voting Machine, Wired News (04/30/08), K. Zetter
  • Beating the Codebreakers With Quantum Cryptography, ICT Results (04/28/08)
  • Social Networking Applications Can Pose Security Risks, Associated Press (04/28/08), M. Irvine

Δελτίο 114 - 30 Απρίλη 2008 j

  • Malicious Microprocessor Opens New Doors for Attack, IDG News Service (04/15/08), R. McMillanS
  • Security Experts Split on 'Cyberterrorism' Threat, Reuters (04/16/08), M. Trevelyan
  • Positioning Systems Used by iPhone and iPod Breached, ETH Life (04/17/08), R. Cosby
  • Robots, Games, Hackers: First IT-Olympics at Iowa State Celebrates Computer Smarts, Iowa State University News Service (04/16/08), D. Jacobson
  • FBI Organizes Defense Against Cyber-Attacks, United Press International (04/21/08), S. Waterman
  • Congressman to Press on With Paper-Ballot Emergency Voting Bill, Computerworld (04/18/08), T. Weiss
  • Researchers Tout 'Functional Encryption' That Knows Who's Who, Network World (04/21/08), E. Messmer
  • To Defeat a Malicious Botnet, Build a Friendly One, New Scientist (04/22/08), Μ. Inman

Δελτίο 113 - 22 Απρίλη 2008 j

  • US Presidential Election Can Be Hacked, IDG News Service (04/10/08), R. McMillan
  • US Cyber Readiness Lagging, Panel Says, Network World (04/09/08), N. Weinberg
  • NIST Shows On-Card Fingerprint Match Is Secure, Speedy, NIST Tech Beat (04/01/08), E. Brown
  • N.J. Voting Technology in Question After Discrepancies in February Vote, Daily Princetonian (04/14/08), J. Wolff
  • Cryptographers Speak of Threats, Voting and Blu-Ray Rumors, CNet (04/08/08), R. Vamosi
  • Needed: A 'Turing Machine' for Security, Government Computer News (04/11/08), W. Jackson
  • 'Big Brother' Buildings Offer Less Invasive Security, New Scientist (04/09/08), M. Iman
  • Programmers, DIY Types Embrace Soft, Hackable Chumby, Wired News (04/15/08), B. Gardiner
  • UW to Lead $6.25 Million Project Creating Electronic Sherlock Holmes, UW News (04/16/08), H. Hickey
  • Security From Chaos, US Department of Homeland Security (04/16/08), G. Cleere
  • Ensuring Security for Cognitive Radio Networks Goal of CAREER Award Research, EurekAlert (04/15/08), L. Crumbley
  • Cybersecurity Issues Misunderstood, Experts Tell Congress, Defense News (04/07/08) Vol. 23, No. 14, P. 53; W. Matthews

Δελτίο 112 - 12 Απρίλη 2008 j

  • ACM Committee on Women Honors Worldwide Leader in Cryptography Research, AScribe Newswire (04/01/08)
  • Centers Tap Into Personal Databases, Washington Post (04/02/08), P. A1; R. O'Harrow
  • Voters Trust Touch-Screen Machines, Studies Show, IDG News Service (03/26/08), R. Weiss; G. Gross
  • Cybercrime Is in a State of Flux, Guardian Unlimited (UK) (03/27/08), G. Knight
  • Canadian Voting Machine Enters American Political Machine, InterGovWorld.com (03/27/08), R. Lombardi
  • European Union, NATO to Tackle Cyber-crime, Associated Press (03/31/08)
  • US Reveals Plans to Hit Back at Cyber Threats, ZDNet (04/02/08)
  • Security Pros Launch Open-Source CERT, eWeek (04/03/08), R. Naraine
  • US Moots System for Data Sharing on Cyber Threats, Financial Times (04/09/08) P. 2; Κ. Allison
  • Vote Device May Get Push, Milwaukee Journal Sentinel (04/07/08), Α. Johnson

Δελτίο 111 - 2 Απριλίου 2008

  • Τechnology Policy in the Information Age: Computer Security Experts Debate Political, Social and Economic Impacts, AScribe Newswire (03/24/08)
  • Americans Still Wary of Voting Machines for 2008, Agence France Presse (03/23/08)
  • Professor: Computers Plus People Equals Risk, IDG News Service (03/27/08), J. Kirk
  • NIST Unveils Tool to Foil Attacks via DNS, Government Computer News (03/25/08), D. Campbell
  • UW Team Researches a Future Filled With RFID ChipsSeattle Times (03/31/08), Κ. Heim
  • Mashup Security, Technology Review (03/31/08), Ε. Naone
  • IBM Project Seeks Privacy Controls for Users, IDG News Service (03/28/08), J. Fontana
  • Researchers Secure the Browser, eWeek (03/24/08) Vol. 25, No. 10, P. 16; R. Naraine

Δελτίο 110 - 27 Μαρτίου 2008

  • Lecturer Criticizes Accuracy of the Voting Process, Oregon Daily Emerald (03/13/08), Τ. Davis
  • Bush Pushes Cybersecurity, USA Today (03/14/08) P. 6A; R. Wolf
  • Some Viruses Come Pre-Installed, Associated Press (03/13/08), J. Robertson
  • Researchers Create Next-Generation Software to Identify Complex Cyber Network At­tacks, George Mason University (03/17/08), J. Edgerly
  • Voting-Machine Maker to Princeton Researcher: 'Hands Off', Wall Street Journal (03/18/08), J. Kronholz
  • Voting for More Than Just Either-Or, MIT News (03/14/08), D. Chandler
  • The Future of Voting IT, Government Computer News (03/10/08), W. Jackson
  • Plan to Use Paper Ballots in November Is Reversed in Colorado, New York Times (03/21/08) P. A14; K., Johnson
  • Outsider to Run Cyber-Security Initiative, Wall Street Journal (03/20/08) P. A8; S. Gorman
  • After Threats, NJ Clerks Call for E-Voting Investigation, IDG News Service (03/20/08), R. McMillan
  • Defending Laptops from Zombie Attacks, Technology Review (03/21/08), K. Greene
  • Terror on the Internet: A Complex Issue, and Getting Harder, IEEE Distributed Systems Online (03/08) Vol. 9, No. 3, G. Goth
  • E-Voting Vendor's Web Site Hacked, IDG News Service (03/20/08) Montalbano, Elizabeth; R. McMillan

Δελτίο 109 - 14 Μαρτίου 2008

  • The New Art of War, Washington Post (03/03/08) P. A15; W. Pincus
  • Secure and Easy Internet Voting, Computer (02/08) Vol. 41, No. 2, P. 08; G. Beroggi
  • Online Vote Discussed for Florida, Miami Herald (03/08/08), M. Merzer
  • 'Gambling DNA' Helps Fight Online Fraud, New Scientist (03/05/08)
  • Unique Locks on Microchips Could Reduce Hardware Piracy, University of Michigan News Service (03/05/08)
  • Computer Security Team to Report Hacking Into Defibrillator-Pacemaker, New York Times (03/12/08) P. C4; J. Feder
  • Military Networks Increasingly Are Under Attack, Wall Street Journal (03/12/08) P. A7; Y. Dreazen
  • Cyber Preparedness Symposium Leaves Unanswered Questions, Dark Reading (03/07/08), T. Wilson

Δελτίο 108 - 6 Μαρτίου 2008

  • STOP Terrorism Software, University of Maryland (02/25/08), L. Tune
  • The E-Voting Paradox, Government Computer News (02/25/08), W. Jackson
  • Put Trust in Your Pocket: CSIRO's Trust Extension Device, CSIRO (02/19/08), J. Finlay
  • Sniffing Out Insider Threats, EurekAlert (02/19/08), A. Ang
  • House Lawmakers Question Privacy in Cyber-Security Plan, Washington Post (02/29/08) P. D3; Β. Krebs
  • Ohio 'Paper' Vote System to Debut With Flaws, University of Maryland (02/27/08), N. Tickner
  • Get Out Your Pencils: Paper Ballots Make a Return, USA Today (02/29/08) P. 2A; R. Wolf
  • US Seeks Terrorists in Web Worlds, BBC News (03/03/08), C. Vallance
  • Wireless Worms Will Follow Influenza's Example, New Scientist (02/26/08), W. Knight
  • Researchers Hack 'Tamper-Proof' PIN Terminals, ZDNet UK (02/26/08), T. Espiner

Δελτίο 107 - 27 Φεβρουαρίου 2008

  • Princeton Researchers Envision a More Secure Internet Princeton University (02/15/08), Τ. Riordan
  • Friendly 'Worms' Could Spread Software Fixes New Scientist (02/14/08), Τ. Simonite
  • With Improvements, E-Voting Could Be Good, Says Researcher CNet (02/16/08), R. Vamosi
  • Mistakes, Not Hackers, Are to Blame for Many Data-Security Glitches on Campuses, Report Says, Chronicle of Higher Education (02/12/08), J. Young
  • Replicating Virtual Servers Vulnerable to Attack, Network World (02/15/08), T. Greene
  • A Method for Stealing Critical Data New York Times (02/22/08) P. C1; J. Markoff
  • Securing Cyberspace Among Top Technological Challenges of 21st Century, Panel Says Network World (02/19/08)
  • Black Hat Conference: Experts Develop Cybersecurity Recommendations for Next President, InformationWeek (02/20/08), N. Hoover
  • Scientists Demand an Ethical Education in Computer Engineering Innovations Report (02/21/08), F. Flores
  • Researchers Say Sharing Is the Key to Privacy for EPC Tags RFID Journal (02/14/08), M. O'Connor
  • DNS Inventor Warns of Next Big Threat Dark Reading (02/11/08), K. Higgins

Δελτίο 106 - 20 Φεβρουαρίου 2008

  • States Prepare for Tests of Voting-System Changes New York Times (02/05/08) P. A14; Ι. Urbina
  • Auditor's Report Inconclusive on Florida Undervote Mishap Network World (02/08/08), G. Gross
  • Web Browsing, Search, and Online Ads Grow More Risky, Google Says InformationWeek (02/12/08), T. Claburn
  • Workplace Autopilot Threatens Security Risk Perception University of Leeds (02/08/08)
  • Wearable Tracking Tags Test Privacy Boundaries at the U. of Washington Chronicle of Higher Education (02/15/08) Vol. 54, No. 23, P. A15; R. Dotinga

Δελτίο 105 - 06 Φεβρουαρίου 2008

  • Digital Identification Plan Still Facing Many Hurdles Investor's Business Daily (01/29/08) P. A5; D. Howell
  • Voting With (Little) Confidence Technology Review (01/29/08), E. Naone
  • Face Recognition Made Possible AlphaGalileo (01/25/2008)
  • Cyberadvice Awaits the Next President Government Computer News (01/21/08) Vol. 27, No. 2, W. Jackson
  • University of Virginia Engineering School Student Probes Facebook's Vulnerabilities University of Virginia (01/30/08)
  • Getting CERIAS About Security Network World (01/31/08), Μ. Kabay
  • Paper Outlines Methods for Beating Anonymity Technology Dark Reading (01/30/08), Τ. Wilson
  • Prof. Aims to Improve Internet Security Wisconsin State Journal (01/26/08), Η. LaRoi
  • Q&A: For E-Voting, Holt Looks to Undo HAVA's Havoc Computerworld (02/04/08), D. Radcliff

Δελτίο 104 - 30 Γενάρη 2008

  • All-Mail Vote in Colorado Isn't Needed, Governor Says, New York Times (01/24/08) P. A18; K. Johnson
  • A 'Swift' Kick to the Secure Development Process, Dark Reading (01/18/08), N. Spande
  • Bush Looks to Beef Up Protection Against Cyberattacks, Wall Street Journal (01/28/08) P. A8; S. Gorman
  • At Florida Polls, Touch Screens and Crossed Fingers, Washington Post (01/27/08) P. A8; P. Whoriskey
  • 'Biometrics' Used to Identify Terrorists, Advertiser (AU) (01/22/08), S. Riches
  • Decertification Dilemma, Government Technology (12/07) Vol. 20, No. 12, M. Douglas

Δελτίο 103 - 24 Γενάρη 2008

  • Could Post-Ballot Audits Renew Faith in U.S. Elections? Computerworld (01/16/08), T. Weiss
  • Who Invented the Firewall? Dark Reading (01/15/08), K. Higgins
  • Voters Respond Favorably to Touch Screen Voting Equipment, University of Michigan News Service (01/14/08), J. Wadley
  • Q&A: Ohio Secretary of State Looks Anew at E-Voting, Computerworld (01/14/08), B. Friedman
  • USACM Fears Increased Risk to Identity Theft From Implementation Rules for National ID Plan, AScribe Newswire (01/16/08)
  • Penn State Researchers Help Identify Weaknesses in Ohio Voting Machines, Penn State Live (01/15/08), C. Chan
  • Weak Control System Security Threatens US, Government Computer News (01/16/08), J. Jackson
  • Touch Screen Voting a Hit; Critics Miss Mark on Security, Study Says, University of Maryland (01/22/08)
  • SC Voting Machines Prompt Calls for Federal Action, Cybercast News Service (01/22/08), Μ . Bansal
  • Researcher 'Cracks' Yahoo Anti-Scam Feature, Techworld (01/18/08), Μ . Broersma
  • Cyber Espionage Seen as Growing Threat to Business, Government, Network World (01/17/08), Ε . Messmer
  • IP Addresses Are Personal Data, EU Regulator Says, Associated Press (01/22/08), A. White
  • Student Develops Anti-Spam Program, Stanford Daily (01/16/08), A. Sy

Δελτίο 102 - 16 Γενάρη 2008

  • A Paper Trail for Voting Machines, New York Times (01/07/08) P. A25; W. Poundstone
  • German Activist Move to Block E-Voting, Computerworld (01/08/08) , J. Kirk
  • Fraudsters Beware: Iowa State Engineer Is Developing Cyber Technology to Find You, Iowa State University News Service (12/27/07), M. Krapfl
  • Malware Honeypots Wait for '08, InfoWorld (12/28/07), M. Hines
  • Individual Privacy Under Threat in Europe and US, Report Says, Associated Press (12/30/07)
  • As Primary Season Ramps Up, an E-Voting Snapshot, Computerworld (01/08/09), T. Weiss
  • Open Source Code Contains Security Holes, InformationWeek (01/08/08), C. Babcock
  • Big Brother Really Is Watching, Computerworld (01/14/08), R. Mitchell
  • New Predictive Approach Seeks to Stay Ahead of Hackers, EE Times (01/11/08), S. Riley
  • South Carolina Officials See No Problems With Touch-Screen Voting Machines, Anderson Independent-Mail (SC) (01/12/08), D. Williams
  • Bank Card Attack: Only Martians Are Safe, ZDNet Australia (01/11/08), L. Tung
  • Q&A: New Technologies Pose Online Privacy Uncertainties, Rotenberg Claims, Computerworld (01/02/08), P. Thibodeau

Δελτίο 101 - 8 Γενάρη 2008

  • FBI Prepares Vast Database of Biometrics, Washington Post (12/22/07) P. A1; E. Nakashima, R. Drezen
  • Computer Security Expert Martin Abadi Garners Outstanding Innovation Award, UC Santa Cruz (12/21/2007), K. Schmidt
  • Paper Ballots Go High Tech, St. Petersburg Times (FL) (12/26/07), B. Varian
  • Wi-Fi Routers Are Vulnerable to Viruses, New Scientist (12/22/07), Z. Merali
  • Tests in Ohio Point to E-Voting Insecurities, Computerworld (12/31/07), T. Weiss
  • Electronic Passports Raise Privacy Issues, Washington Post (01/01/08) P. A6; E. Nakashima
  • Human factors researchers test voting systems for seniors that can improve accuracy and speed for voters of all ages, Human Factors and Ergonomics Society (12/20/07)
  • Computer Terrorism Becomes a Concern Patriot-News (PA) (12/25/07), G. Lenton

Δελτίο 100 - 28 Δεκεμβρίου 2007

  • DNS Attack Could Signal Phishing 2.0 IDG News Service (12/11/07), R. McMillan
  • Gold Medalist Computer Scientist Boosts ID Security Frederick News-Post (MD) (12/10/07), S. Boin
  • We're All at Risk' of Attack, Cyber Chief Says Technology Daily (12/11/07), L. Viana
  • NIST Looks to Cook Up a New Hash Government Computer News (12/10/07) Vol. 26, No. 30, W. Jackson
  • ACM Group Honors Computer Security Experts for Innovation and Service AScribe Newswire (12/14/07)
  • Vote of No Confidence Columbus Dispatch (OH) (12/15/07), Μ. Niquette
  • Cyber Security Should Be Personal Priority for All Leaders Government Technology (12/13/07)
  • E-Voting Machines Rejected in Colorado Associated Press (12/19/07), G. Merritt
  • Malware Flood Driving New AV InfoWorld (12/14/07), M. Hines
  • Hackers Have Poor Nations' PCs in Their Sights New Scientist (12/15/07)No. 2634, P. 22; M. Reilly

Δελτίο 99 - 12 Δεκεμβρίου 2007

  • America Already Is in a Cyber War, Analyst Says National Journal's Technology Daily (11/27/07), M. Posner
  • Cheap Sensors Could Capture Your Every Move New Scientist (11/26/07), M. Inman
  • Hacker Threat to US Rising Sacramento Bee (CA) (11/26/07), D. Montgomery
  • Secretary of State Casts Doubt on Future of Electronic Voting San Francisco Chronicle (12/02/07) P. C7; J. Wildermuth
  • Government-Sponsored Cyberattacks on the Rise, McAfee Says Network World (11/29/07), J. Brodkin
  • Cryptic Messages Boost Data Security ICT Results (11/28/07)
  • The Next Generation of Security Threats CNet (12/05/07), I. Fried
  • Overseas Electronic Voting Pilot Project Announced Government Computer News (12/05/07), W. Jackson
  • Forget Sticky Notes, Microsoft Using Inkblots as Password Reminders Network World (12/04/07), J. Fontana
  • QUT Researcher Eyes Off a Biometric Future Queensland University of Technology (12/04/07), S. Hutchinson
  • EU Focuses R&D on Counterterrorism Federal Computer Week (12/03/07) Vol. 21, No. 39, P. 42; B. Robinson

Δελτίο 98 - 30 Νοεμβρίου 2007

  • Adding Math to List of Security Threats, New York Times (11/17/07) P. B4, J. Markoff
  • Synchronized Shaking Connects Gadgets Securely, New Scientist (11/13/07), T. Simonite
  • Google Meets Sherlock Holmes, Newswise (11/13/07)
  • Tracing Terrorists' Social Web, Associated Press (11/18/07), A. Rotstein
  • 12 Spam Research Projects That Might Make a Difference, Network World (11/20/07), C. Garretson
  • Internet Users Give Up Privacy in Exchange for Trust, Economic & Social Research Council (11/26/07)
  • Standards Suggested for Writing Secure Java, Network World (11/20/07), T. Greene
  • Researcher Lands Computer Security Grant From Air Force, University of Texas at Dallas (11/18/07)

Δελτίο 97 - 21 Νοεμβρίου 2007

  • FBI Director Targets the Internet's Top Dangers, Network World (11/07/07)

  • Programmed for Security, Government Computer News (11/05/07) Vol. 26, No. 28, W. Jackson
  • UN Approves Resolution Related to Cyber Attacks, eGov Monitor (11/05/07)
  • Anti-Social Bot Invades Second Lifers' Personal Space, New Scientist (10/02/07), T. Simonite

  • More Security Education Needed to Avoid a Cybersecurity Disaster, Experts WarnSearchSecurity.com (11/07/07), R. Westervelt
  • Human Error Puts Online Banking Security at Risk, Queensland University of Technology (11/07/07)
  • Election Fixes Stir Worries on Ballot Security, Houston Chronicle (11/14/07), Α. Bernstein
  • Cybercops: U.S. Targets Terrorists as Online Thieves Run Amok, Mercury News (11/13/07), R. Blitstein
  • Security Loophole Found in Microsoft Windows, University of Haifa (11/12/07)
  • Intelligence Community Developing Virtual World Analysis Tools, GovExec.com (11/07/07), B. Brewin
  • Panel Must Narrow Cybersecurity Scope, Federal Computer Week (11/05/07), J. Miller

Δελτίο 96 - 12 Νοεμβρίου 2007

  • Researchers Dig for Hidden Links in Spam, IDG News Service (10/31/07), J. Kirk

  • Germany Seeks Expansion of Computer Spying, Los Angeles Times (10/30/07), K. Murphy

  • Al Qaeda Hacker Attack Scheduled to Begin November 11th, InformationWeek (11/01/07), T. Claburn
  • Setting a Cybersecurity Agenda for the 110th Congress, Government Computer News (10/31/07), W. Jackson

  • Voting Out E-Voting Machines, Time (11/03/07), Τ. Padgett
  • The University's Role in Advancing Data Encryption, Part 2, TechNewsWorld (11/01/07), Α. Burger
  • UMass Researchers Describe New Approach to Tag Security, RFID Journal (11/01/07), Μ.-C. O'Connor
  • Targeting Internet Terror, Baltimore Sun (11/07/07) P. 4A; S. Gorman
  • 'Suicide Nodes' Defend Networks From Within, New Scientist (11/01/07), P. Marks
  • Computer Scientist Fights Threat of 'Botnets', University of Wisconsin-Madison (10/31/07), B. Mattmiller
  • Why VoIP Is the Next Target for Spammers, Guardian Unlimited (UK) (11/01/07), S. Hargrave

Δελτίο 95 - 04 Νοεμβρίου 2007

  • From Casinos to Counterterrorism, Washington Post (10/22/07) P. A1; E. Nakashima

  • What's Russian for 'Hacker'?, New York Times (10/21/07) P. WK1; C. Levy

  • To Maintain National Security, US Policies Should Continue to Promote Open Exchange of Research, National Academy of Sciences (10/18/07)
  • Research Shows Image-Based Threat on the Rise, Dark Reading (10/18/07), K. Higgins

  • Air Force's Future Lies in Cyberspace, Washington Times (10/19/07) P. A9; S. Waterman
  • House Panel Chief Demands Details of Cybersecurity Plan, Baltimore Sun (10/24/07) P. 1A; S. Gorman
  • UD Computer Security Campaigns Win Awards, University of Delaware (10/23/07), J. Rhodes
  • Scientists Draw on New Technology to Improve Password Protection, Newcastle University (10/24/07)

  • 'Half-Quantum' Cryptography Promises Total Security, New Scientist (10/21/07), P. Marks
  • Identity Theft: Costs More, Tech Less, Network Computing (10/23/07), Τ. Claburn
  • Password-Cracking Chip Causes Security Concerns, New Scientist (10/24/07), Α. Brandt
  • Workforce Issues Complicate Planning for Cyberattacks, GovExec.com (10/25/07), G. Nagesh
  • Space Station: Internal NASA Reports Explain Origins of June Computer Crisis, IEEE Spectrum (10/07), J. Oberg

  • New US Tack to Defend Power Grid, Christian Science Monitor (10/30/07) P. 1; M. Clayton
  • The Air Force's Cyber-Corps, National Journal (10/27/07) Vol. 39, No. 43, P. 56; N. Munro
  • Hacker Curriculum: How Hackers Learn Networking, IEEE Distributed Systems Online (10/07), S. Bratus

Δελτίο 94 - 26 Οκτωβρίου 2007

  • Hackers Could Skew US Elections, New Scientist (10/09/07), J. Marshall

  • Quantum Cryptography to Secure Ballots in Swiss Election, Network World (10/11/07), E. Messmer

  • Panelists Cite Threats to US Computer Networks,CongressDaily (10/10/07), O. Kreisher

  • Technology Would Help Detect Terrorists Before They Strike, University at Buffalo News (10/05/07), E. Goldbaum

  • ORNL's SensorPedia Targets National Security Mission, Oak Ridge National Laboratory (10/04/07)

  • 'Dark Web' Project Takes on Cyber-Terrorism, Fox News (10/11/07), S. Kotler

  • Data Sharing Threatens Privacy, Nature (10/11/07) Vol. 449, No. 7163, p. 644

  • Ohio Brings in Experts to Review Troubled E-Voting Systems, Computerworld (10/16/07), Τ. Weiss

  • Carnegie Mellon's A. Perrig Leads Research Team Dedicated to Analyzing and Dis¬rup¬t-ing Internet Attackers' Black Markets, Carnegie Mellon News (10/15/07), C. Swaney

  • Univ. of Virginia Computer Security Video Wins Award, University of Virginia (10/16/07)

  • Rebinding Attacks Unbound, Security Focus (10/17/07), F. Biancuzzi

  • Threats to Power Facilities on the Rise, Associated Press (10/17/07), J. Hebert

  • Cyber Wars, Government Executive (10/01/07) Vol. 39, No. 17, P. 16; B. Brewin

Δελτίο 93 - 14 Οκτωβρίου 2007

  • USC Student's Computer Program Enlisted in Security Efforts at LAX , Los Angeles Times (10/01/07), L. Gordon

  • Scientists Warn of 'Vocal Terror' , BBC News (09/14/07), L. Seward

  • Connecting the Dots , National Journal (09/29/07) Vol. 39, No. 39, P. 61; M. Perelman

  • Technology Could Enable Computers to 'Read the Minds' of Users , Tufts University (10/01/07) Thurler, Kim

  • Carnegie Mellon Researchers Fight Phishing Attacks With Phishing Tactics , Carnegie Mellon News (10/02/07) Spice, Byron

  • 'Dead Time' Limits Quantum Cryptography Speeds , NIST Tech Beat (09/27/07)

  • The Lesson of Estonia , Information Security (09/07) Vol. 10, No. 8, P. 12; D. Denning

  • Spam Weapon Helps Preserve Books , BBC News (10/02/07), P. Rubens

  • CERT Advances Secure Coding Standards , Dark Reading (10/02/07), K. Higgins

  • Privacy Threats Are No Longer 'Terra Incognita' , The Star Online (10/01/07), M. Geist

  • West Is Taking Fight Against Terrorism Online , International Herald Tribune (09/30/07), D. Carvajal

  • Dragonfly or Insect Spy? Scientists at Work on Robobugs , Washington Post (10/09/07) P. A3; R. Weiss

  • UMass Amherst Researchers Improve Security for Credit Cards and Other Devices , University of Massachusetts Amherst (10/03/07)

  • GTISC Releases Emerging Cyber Threats Forecast , Georgia Institute of Technology (10/02/07)

  • GPL Defenders Say: See You in Court , CNet (10/01/07), S. Shankland

Δελτίο 92 - 1 Οκτωβρίου 2007

  • NSA to Defend Against Hackers, Baltimore Sun (09/20/07) P. 1A; S. Gorman

  • Is the US at Risk From Cyberwarfare? , IDG News Service (09/20/07), R. McMillan

  • International Blue Ribbon Task Force to Address Critical Challenge of the Information Age, UCSD News (09/19/07), W. Froelich

  • Does Antivirus Have a Future? , London Guardian (09/20/07), W. Grossman

  • Collecting of Details on Travelers Documented , Washington Post (09/22/07) P. A1; E. Nakashima ,

  • Summit to Address Online Threats to Security , The Tartan (09/24/07), E. Kang

  • Online Game Helps People Recognize Internet Scams, Carnegie Mellon News (09/24/07), B. Spice; A. Watzman

  • Apple: 'Unlocking' Software Damages iPhone , USA Today (09/25/07) P. 4B; J. Graham
  • Not Much Anonymity for Unprotected File-Sharers, University of California, Riverside (09/25/07)

  • Using Spam Blockers to Target HIV, Too, BusinessWeek (10/01/07)No. 4052, P. 68; S. Baker; J. Greene

  • US Video Shows Simulated Hacker Attack, Associated Press (09/27/07), T. Bridis; E. Sullivan

  • MIT Launches Kerberos Consortium, MIT News (09/27/07), P. Richards

 Δελτίο 91 - 23 Σεπτεμβρίου 2007

  • UM Software Tools May Key Successful Antiterrorism, Military and Diplomatic Ac­tions, University of Maryland (09/13/07), L. Tune
  • Scientists Use the "Dark Web" to Snag Extremists and Terrorists Online, National Science Foundation (09/10/07)
  • Google Calls for International Standards on Internet Privacy, Washington Post (09/15/07) P. D1; C. Rampell
  • NSF Researchers Produce RFID Random Number Generator, Government Computer News (09/12/07), J. Jackson
  • University Program Targets Online Security, Augusta Chronicle (GA) (09/12/07), J. Few
  • Quantum Threat to Our Secret Data, New Scientist (09/13/07) Vol. 195, No. 2621, P. 30; D. Graham-Rowe
  • Group Says E-Voting Paper Trail Wouldn't Improve Security, IDG News Service (09/18/07), G. Gross
  • CS Profs and the DOD, Computing Research Association (09/18/07), P. Harsha
  • Clock to Tick Down US Privacy, Washington Times (09/18/07) P. A3; A. Hudson
  • New Research Seeks to Enhance Quality and Security of Wireless Telemedicine, Rochester Institute of Technology (09/17/07), W. Dube
  • If RSA Is Cracked, Here's Plan B, New Scientist (09/15/07) Vol. 195, No. 2621, P. 31; D. Graham-Rowe

Δελτίο 90 - 14 Σεπτεμβρίου 2007

  • ICANN's Whois Privacy Reforms Stalled Again, Computerworld (08/28/07), J. Vijayan
  • UTEP Awarded $5 Million to Create Cyberinfrastructure Center, University of Texas at El Paso (08/21/2007)
  • House to Consider E-Voting Reform Bill, Computerworld (09/05/07), G. Gross
  • DHS Head: Cybersecurity Remains a Concern, IDG News Service (09/05/07), G. Gross
  • Cyber Crime Tool Kits Go on Sale, BBC News (09/04/07)
  • House Puts Off Voting Bill, Most Other Business Next Week, CQPolitics.com (09/07/07), Κ. Hunter; Α. Ota
  • F.B.I. Data Mining Reached Beyond Initial Targets, New York Times (09/09/07) P. 1; Ε. Lichtblau
  • Storm Worm Botnet More Powerful Than Top Supercomputers, InformationWeek (09/06/07), S. Gaudin
  • Debate Rages Over German Government Spyware Plan, IDG News Service (09/05/07), J. Blau
  • Personal Data: Up Close and Impersonal, Federal Computer Week (08/27/07), A. Joch
  • Who Needs Hackers?, New York Times (09/12/07) P. H1; J. Schwartz
  • China's Eye on the Internet, University of California, Davis (09/11/07), A. Fell
  • EAC to Release Draft Voting-System Guidelines, Government Computer News (09/10/07), W. Jackson
  • Rogue Nodes Turn Tor Anonymizer Into Eavesdropper's Paradise, Wired News (09/10/07), K. Zetter
  • Louisiana Tech Researchers Work on Cyber-Attack Defense, Associated Press (08/26/07)
  • How Close Is World War 3.0?, Network World (08/22/07), C. D. Marsan
  • FBI Launches Cybersecurity Project, Government Computer News (08/20/07), W. Dizard

Δελτίο 89 - 04 Σεπτεμβρίου 2007

  • Official Threatens to Fine E-Vote Firm, Contra Costa Times (CA) (08/22/07), S. Harmon
  • Japan Working to Replace the Internet, Kyodo News (08/20/07)
  • Most Teen Computer Hackers More Curious Than Criminal, USA Today (08/20/07) P. 5D; M. Elias
  • Flight Plan for Security, Government Computer News (08/13/07) Vol. 26, No. 21, W. Jackson
  • Point, Click ... Eavesdrop: How the FBI Wiretap Net Operates, Wired News (08/29/07)
  • Research at K-State, Partner Institutions, to Help Homeland Security Make Sense of the Abundant Information in the Public Domain, Kansas State University News (08/27/07), E. Barcomb-Peterson
  • US Suspends Vast ADVISE Data-Sifting System, Christian Science Monitor (08/28/07) P. 1; M. Clayton
  • UM Study: Password Protecting Your Wireless Network Is Not Enough, University of Maryland (08/22/07), M. Corley; R. Copeland
  • America's Hackable Backbone, Forbes (08/22/07), A. Greenberg
  • A New Method to Detect Software Theft, Informationsdienst Wissenschaft (08/23/07)
  • Hacktivism Attacks May Rise, Homeland Security Official Warns, Network World (08/22/07), C. D. Marsan
  • Special Military Group Looks Ahead to Fight America's Future Wars, San Francisco Chronicle (08/26/07) P. E1; T. Abate
  • Digital Detectives Discern Photoshop Fakery, Christian Science Monitor (08/29/07) P. 13; C. Gaylord
  • Statistics Professor Says Databases Must Balance Privacy, Utility, Carnegie Mellon News (08/30/07), J. Potts
  • Louisiana Tech Researchers Work on Cyber-Attack Defense, Associated Press (08/26/07)
  • How Close Is World War 3.0?, Network World (08/22/07), C. D. Marsan
  • FBI Launches Cybersecurity Project, Government Computer News (08/20/07), W. Dizard

Δελτίο 88 - 31 Αυγούστου 2007

  • Computing Breakthrough Could Elevate Security to Unprecedented Levels, University of Michigan News Service (08/16/07), C. Rabuck; N. Moore
  • 'Virtual Sandboxing' Provides Safe Security Testing, Computerworld (08/09/07), M. Hines
  • Encrypting the Future, Government Computer News (08/06/07), K. Hickey
  • California: The Top to Bottom Review, VoteTrustUSA (08/13/07), B. Simons
  • Local Teen Works to Advance Encryption Technology, Henry Herald (08/13/07), J. Jackson
  • E-Voting Predicament: Not-So-Secret Ballots, CNet (08/20/07), Δ. McCullagh; Α. Broache
  • Voting Machine Hackers--UCSB Team Breaks Into Counting Device, Pacific Coast Business Times (08/16/07), S. Nellis
  • New URI Browser Flaws Worse Than First Thought, IDG News Service (08/15/07), R. McMillan
  • Phishing Researcher 'Targets' the Unsuspecting, Network World (08/13/07) Vol. 24, No. 31, P. 26; J. Brodkin
  • Can a Government Remotely Detect a Terrorist's Thoughts?, New Scientist (08/11/07) Vol. 195, No. 2616, P. 24; P. Marks

Δελτίο 87 - 21 Αυγούστου 2007

  • Action Plan to Beat Cyber-crime, Information Today (08/07) Vol. 24, No. 7, P. 24; J. Ashling
  • USU Lab Researching Cyberterrorism, The Herald Journal (Utah) (08/01/07), K. Burgess
  • Online Underworld, San Francisco Chronicle (07/30/07) P. C1; T. Abate
  • Teaching Hacking Helps Students, Professors Say, Register (UK) (08/07/07), J. Lemos
  • UC-San Diego Computer Scientists Shed Light on Internet Scams, University of California, San Diego (08/06/07), D. Kane
  • A Little Privacy, Please, Scientific American (07/07) Vol. 297, No. 1, P. 92; C. Walter
  • Worldwide Malware Study Set for Launch, Dark Reading (08/02/07), T. Wilson
  • California Moves to Lock Down E-Voting Systems, Computerworld (08/04/07), R. McMillan
  • Prototype Software Tools Plugs Security Leaks, LinuxElectrons (07/31/07)
  • Slicing Sensitive Corporate Data for Secure, Dispersed Storage, Computerworld (08/09/07), T. Weiss
  • Vote-Swapping Over the Internet Is Legal, Court Finds, Computerworld (08/07/07), L. Rosencrance

Δελτίο 86 - 10 Αυγούστου 2007

  • What the U.S. Is Doing Wrong With E-Voting, eWeek (07/30/07), L. Vaas
  • Florida Voting Chief Aims to Block Hackers, Miami Herald (08/01/07), M. Caputo
  • Scan this Guy's E-Passport and Watch Your System Crash, Wired News (08/01/07), K. Zetter
  • Securing Cell Phones, Technology Review (08/01/07), K. Greene
  • Senate to Hold Hearing on Security of Voting Machines, Wired News (07/31/07), K. Zetter
  • Picture Your Password, Dark Reading (07/23/07), K. Higgins
  • Security: A Business Enabler, Not Disabler, Baseline (07/07)No. 74, P. 41; McCormick, John
  • Scientists' Tests Hack Into Electronic Voting Machines in California and Elsewhere, New York Times (07/28/07) P. A11; C. Drew
  • Q&A: Security Top Concern for New IETF Chair, Network World (07/26/07), C. Marsan
  • E-Voting Systems Vulnerable to Viruses and Other Security Attacks, New Report Finds, UC Berkeley News (08/02/07), S. Yang
  • New Report Finds States Not Doing Enough to Ensure Accurate Count on Electronic Voting Machines, Brennan Center for Justice (NYU School of Law) (08/01/07), J. Rosen
  • Halt 'High Risk' E-Voting: British Watchdog, Reuters (08/02/07), P. Griffiths
  • Clarke Wants to Know, Where Did We Go Wrong?, Government Computer News (08/01/07), W. Jackson
  • Researchers Set to Spark Up New More Secure Network, Routers, SwitchesNetwork World (07/31/07)
  • The New Face of Identity Protection: You, University of Houston News (07/30/07), A. Holdsworth
  • How Far Could Cyber War Go?, Network World (07/26/07), M. Kabay

Δελτίο 85 - 31 Ιουλίου 2007

  • Senators to Abandon '08 E-Voting Paper Trail Mandate, CNet (07/25/07), A. Broache
  • NASA: Computer Bound for Space Station Sabotaged, USA Today (07/26/07), T. Halvorson
  • Future of HTTP at Center of Debate, Network World (07/25/07), C. Marsan
  • Congress: P2P Networks Harm National Security, CNet (07/24/07), A. Broache; D. McCullagh
  • Government Reports Cybercrime Poses National Risk, InformationWeek (07/24/07), S. Gaudin
  • What Can Be Done About Software Security?, SD Times (07/01/07)No. 177, P. 37; D. Worthington
  • Accessibility Isn't Only Hurdle in Voting System Overhaul, New York Times (07/21/07) P. A11; C. Drew
  • IPhone Flaw Lets Hackers Take Over, Security Firm Says, New York Times (07/23/07) P. C4; J. Schwartz
  • MIT Encryption Pioneer Rivest Wins Marconi Prize, MIT News (07/17/07)
  • E-Voting Systems 'Hacked' for Flaws, San Jose Mercury News (CA) (07/23/07), S. Harmon

Δελτίο 84 - 23 Ιουλίου 2007

  • Re-Vote Likely After E-Vote Error, IDG News Service (07/14/07), S. Lawson
  • Three Hamilton Students Examining Computer Security for Summer Research Project, Hamilton College (07/12/07)
  • Computer Science Prof Researches Program Safety, Regina Leader-Post (CAN) (07/10/07), J. Couture
  • Cyberterrorism: By Whatever Name, It's on the Increase, InformationWeek (07/09/07)No. 1145, P. 32; L. Greenemeier
  • Mounting Scrutiny for Google Security, InfoWorld (07/12/07)
  • Dan Wallach: Security Watchdog for the Industry, Computerworld (07/09/07) Vol. 41, No. 28, P. 58; S. Collett
  • Latest Weapon Against Spam Also Enlists Computer Users to Assist the Internet Archive, Pittsburgh Post-Gazette (07/18/07), L. Yao
  • New Public Surveillance Research, Scenta (07/12/07)
  • Old Flaw Threatens Web 2.0, Dark Reading (07/12/07), K.-J. Higgins
  • Salary Premiums for Security Certifications Increasing, Study Shows, Computerworld (07/09/07), J. Vijayan
  • Professor Denning Tapped by NSF, Naval Postgraduate School (07/13/07), B. Honegger
  • Zombie Nets, National Journal (07/14/07) Vol. 39, No. 28, P. 46; N. Munro

Δελτίο 83 - 16 Ιουλίου 2007

  • Data on Americans Mined for Terror Risk, Associated Press (07/10/07), L. J. Jordan
  • Happy Birthday, Dear Viruses, Science (07/13/07) Vol. 317, No. 5835, P. 210; R. Ford; E. Spafford
  • Security Paper Shows How Application Can Steal CPU Cycles, Ars Technica (07/11/07), J. Reimer
  • Bootable Disc Makes for Safer Banking, Researcher Claims, Computerworld Australia (07/10/07), S. Springell

Δελτίο 82 - 11 Ιουλίου 2007

  • Hackers Hired to Crack California Electronic Voting Machines, KABC-TV (Los Angeles) (07/02/07), Ν. Miranda
  • How Safe Are Wireless Networks?, Dalhousie University (07/04/07), D. Morrison
  • Is Securing Your Network Worth the Money?, Network World (07/03/07), B. Brown
  • Lawmakers to DHS: Spend More on Cybersecurity, Federal Computer Week (07/03/07), J. Miller
  • US Government Prepares for Cyber War Games, Ars Technica (07/05/07), J. Reimer
  • ISU Experts Weigh in on Identity Theft Through New Wireless Technologies, Iowa State University News Service (07/03/07)
  • Warning of Data Ticking Time Bomb, BBC News (07/03/07)

Δελτίο 81 - 04 Ιουλίου 2007

  • Cyber Security Report Released, Computing Research Association (06/28/07)
  • Solving the Web Security Challenge, CNet (06/28/07), M. Ricciuti; J. Evers
  • H-P's Emerging Task: Deter Forgeries, Wall Street Journal (06/28/07) P. B3; J. Range; V. Agarwal
  • Security Issues and Programming, ZDNet (06/25/07), P. Murphy
  • Handwritten Passwords, Technology Review (06/28/07), E. Naone

Δελτίο 80 - 27 Ιουνίου 2007

  • ISS Computer Woes Concern Europe, BBC News (06/18/07), I. Klotz
  • Watching Virus Behavior Could Keep PCs Healthy, New Scientist (06/15/07), T. Simonite
  • Army, Air Force Seek to Go on Offensive in Cyber War, GovExec.com (06/13/07), B. Brewin
  • FBI: Operation Bot Roast Finds Over 1 Million Botnet Victims, Network World (06/13/07), M. Cooney
  • Denial-of-Service Attacks: Street Crime on the Web, New Scientist (06/06/07) Vol. 194, No. 2607, P. 30; J. Giles
  • REAL Nightmare, Governing (06/07) Vol. 20, No. 9, P. 24; E. Perlman
  • Saving the Internet, Harvard Business Review (06/07), J. Zittrain
  • Court Prohibits Access to Touch-Screen Source Code, Computerworld (06/19/07), Μ. Songini
  • US Should Draw Warning From Estonian Web Site Attacks, Congressional Quarterly (06/18/07), Μ. Berger
  • Computer Privacy Expert Warns of Growing Risks to Social Security Numbers AScribe Newswire (06/21/07)
  • E-Vote 'Threat' to UK Democracy, BBC News (06/22/07)
  • Security Study Pokes Holes in Advanced Authentication Claims, Ars Technica (06/20/07), J. Hruska
  • Murky Trade in Bugs Plays Into the Hands of Hackers, New Scientist (06/16/07) Vol. 194, No. 2608, P. 30; C. Biever
  • Planned Worker ID Called Vulnerable, San Francisco Chronicle (06/25/07) P. A4; C. Lochhead
  • New York Legislators Keep E-Voting Software in Public Hands, Computerworld (06/25/07), M. Songini
  • When Computers Attack, New York Times (06/24/07) P. 4-1; S. Schwartz

Δελτίο 79 - 20 Ιουνίου 2007

  • A Dog or a Cat? New Tests to Fool Automated Spammers, New York Times (06/11/07) P. C1; B. Stone
  • AU Finds Success With Voting System, Opelika-Auburn News (06/11/07), A. Weaver
  • Antivirus Fix in Works by Security Researchers, Network World (06/07/07)
  • Casting Ballot From Abroad Is No Sure Bet, New York Times (06/13/07) P. A1; I. Urbina
  • Purdue Creates Scientifically Based Animation of 9/11 Attack, Purdue University News (06/12/07), S. Tally
  • Hardware Designed to Protect Data From Theft By Hackers, Chicago Tribune (06/11/07), J. Van
  • Laws Threaten Security Researchers, Dark Reading (06/08/07)

Δελτίο 78 - 11 Ιουνίου 2007

  • China Prepares for First Strike in Electronic War, eWeek (05/30/07), L. Vaas
  • IU Informatics Security Experts Draw New Weapon in War of Cyber CrimeIndiana University (06/04/07)
  • DHS Sets its Cyber R&D Goals, Federal Computer Week (06/04/07) Vol. 21, No. 16, P. 56; Β. Robinson
  • Internet2 Security Honcho: PCs Need Universal Healthcare, Ars Technica (06/05/07), Κ. Fisher
  • File-Sharing Sites Being Subverted for Web Attacks, New Scientist (05/30/07), Μ. Inman
  • Could U.S. Repel a Cyberattack?, Christian Science Monitor (06/07/07) P. 1; B. Arnoldy; G. Lubold
  • Computer Expert Urges Identity Verification Safeguards for Employee Eligibility Sys­tems, AScribe Newswire (06/07/07)
  • Designers Pitch 'Wild and Crazy' Ideas at DAC, EE Times (06/06/07), N. Mokhoff
  • Online Shoppers Will Pay Extra to Protect Privacy, Carnegie Mellon Study ShowsCarnegie Mellon News (06/06/07), B. Spice; A. Watzman
  • New Record for Quantum Cryptography, Technology Review (06/08/07), N. Savage
  • Net Attack, Wall Street Journal (06/05/07), A. Mannes; J. Hendler
  • Scientists Discuss Use of DNA and Information Technology, Memphis Commercial Appeal (TN) (06/08/07), D. Connolly

Δελτίο 77 - 04 Ιουνίου 2007

  • After Computer Siege in Estonia, War Fears Turn to Cyberspace, New York Times (05/29/07) P. A1; M. Lander; J. Markoff
  • Computer Scientists Set on Winning the Computer Virus 'Cold War', University of Wisconsin-Madison (05/24/07)
  • Noise Keeps Spooks Out of the Loop, New Scientist (05/23/07), J. Palmer
  • Researcher: RSA 1024-Bit Encryption Not Enough, IDG News Service (05/23/07), J. Kirk
  • Eyeing Unnoticed Security Researchers, SearchSecurity.com (05/23/07), D. Fisher
  • RAW Talent Tackles Risk Analysis, Information Sciences Institute (05/29/07)
  • Spammers' Use of AI Only Just Begun, InfoWorld (06/01/07), M. Hines
  • Better Face Recognition Software, Technology Review (05/30/07), M. Williams
  • New Agency IARPA Develops Spy Tools, Associated Press (05/31/07), K. Shrader
  • Internet Governance Forum in November to Address Access, Security Issues, UN Of­fi­ci­al Says, eGov Monitor (05/24/07)
  • Read ID, Real Debate, Washington Technology (05/28/07) Vol. 22, No. 9, P. 24; C. Lipowicz

Δελτίο 76 - 29 Μαΐου 2007

  • Proposed National Database Raises Privacy Concerns, eWeek (05/22/07), B. Prince
  • Promising Antispam Technique Gets Nod, CNet (05/23/07), D. McCullagh
  • Better Internet Security Means Technological Breakthroughs, Kansas City infoZine (05/21/07), A. Charbonnet
  • DHS Seeks Research on Nine Cybersecurity Areas, Federal Computer Week (05/21/07), A. Lipowicz
  • Phishers Can Use Social Web Sites as Bait to Net Victims: Informatics Study, Indiana University (05/24/07)
  • Can Cyborg Moths Bring Down Terrorists?, Times Online (UK) (05/24/07), D. Bebber
  • Computer Viruses Invade SSU Class--on Purpose, Press Democrat (Santa Rosa, Calif.) (05/22/07), N. Halverson
  • Globalization Has Made Software Development a National Security Issue, Computerworld Australia (05/23/07) Rossi, Sandra
  • DHS Publishes Sector-Specific Protection Plan for IT Infrastructure, Computerworld (05/22/07), J. Vijayan

Δελτίο 75 - 23 Μαΐου 2007

  • Worm Attacked Voter Database in Notorious Florida District, Computerworld (05/16/07), B. Friedman
  • Using 'Offensive Technologies' to Secure Networks, Network World (05/14/07), B. Brown
  • ACM Group Honors Research Team for Rare Finding in Computer Security, AScribe Newswire (05/16/07)
  • Cyber-War--the Way of the Future?, Times Online (UK) (05/17/07), J. Richards
  • Wary of Everyware, Chronicle of Higher Education (05/18/07) Vol. 53, No. 37, P. A26; A. Foster
  • Cyber Assaults on Estonia Typify a New Battle Tactic, Washington Post (05/19/07) P. A1; Finn, Peter
  • New Software Can Identify You from Your Online Habits, New Scientist (05/16/07) Marks, Paul

Δελτίο 74 - 16 Μαΐου 2007

  • Leahy, Others Speak Out Against New ID Standards, Washington Post (05/09/07) P. D3; E. Nakashima
  • USACM Urges Revisions to National Identification Policy, AScribe Newswire (05/08/07)
  • Electronic Voting May Be Ready by Fall '08, Official Says, New York Times (05/08/07), J. Hicks
  • U.S. Critical Infrastructure in Serious Jeopardy, CSO Online (05/04/07), A. Turner
  • The Disruptive Power of Networks, Forbes (05/07/07), V. Cerf
  • House Panel Approves E-Voting Paper Trails, CNet (05/09/07), A. Broache
  • Association for Computing Machinery Applauds Committee Vote on E-Voting Reform, Legislation, AScribe Newswire (05/09/07)
  • Hackers, Experts to Probe E-Voting, Inside Bay Area (CA) (05/10/07), I. Hoffman
  • Shredded East German Files Reassembled, Associated Press (05/09/07), D. Rising
  • Google Searches Web's Dark Side, BBC News (05/11/07)
  • Java Security Traps Getting Worse, eWeek (05/09/07), L. Vaas
  • Escaping the Data Panopticon: Prof Says Computers Must Learn to 'Forget', Ars Technica (05/09/07), N. Anderson
  • Cracks in the Air, Government Computer News (05/07/07) Vol. 26, No. 10, W. Jackson

Δελτίο 73 - 09 Μαΐου 2007

  • The ACM Conference on Computers, Freedom, and Privacy, Technology Review (05/03/07), S. Garfinkel
  • Florida Acts to Eliminate Touch-Screen Voting System, New York Times (05/04/07) P. A19; T. Sexton, C. Jordan
  • Hacking the Online Ballot Box, Guardian Unlimited (UK) (05/03/07), D. Bradbury
  • Network Warfare, Government Computer News (04/30/07) Vol. 26, No. 9, W. Jackson
  • Florida Ditches Problematic Touch-Screen Voting, and Now What?,
    CNet (05/04/07), D. McCullagh
  • Putting Coders' Security Chops to the Test, Application Development Trends (05/02/07), J. Waters
  • Web Browsers Are New Frontline in Internet War, New Scientist (05/05/07) Vol. 194, No. 2602, P. 28; J. Hecht
  • Document Shell-Code Attacks on the Rise, InfoWorld (05/02/07) Hines, Matt

Δελτίο 72 - 02 Μαΐου 2007

  • Paper-Trail Voting Gets Organized Opposition, USA Today (04/23/07) P. 2A; R. Wolf
  • Voting Machines a 'Catastrophe'--French Parties, Agence France Presse (04/23/07), M. Sailhan
  • Nation's Cyber Plan Outdated, Lawmakers Told, Washington Post (04/26/07), B. Krebs; S. Mcloone
  • Respectful Cameras, Technology Review (05/02/07), Β. Borrell
  • Researchers: Health Sensors Open New Doors for Hackers, ASU Insight (04/30/07), D. Evans

Δελτίο 71 - 26 Απριλίου 2007

  • Audit Finds Many Faults in Cleveland's '06 Voting, New York Times (04/20/07) P. A20; B. Driehaus
  • Lawmakers Call for E-Voting Paper Trails, IDG News Service (04/18/07), G. Gross
  • The Memory Hacker, Popular Science (04/07) Vol. 270, No. 4, P. 66; S. Handelman
  • Tragedy Spurs Renewed Interest in Mining Internet to Spot Killers, Star-Ledger (NJ) (04/23/07), Κ. Coughlin
  • Gov't Straining to Secure Computer Systems, Washington Post (04/19/07), Β. Krebs
  • Open Source, Transparency and Electronic Voting, Linux Insider (04/18/07), J. Mello
  • P2P Worms Get Their Turn, InfoWorld (04/16/07), M. Hines

Δελτίο 70 - 20 Απριλίου 2007

  • Protecting Electronic Information From Theft and Abuse Is the Goal of Virginia Tech CAREER Research, Virginia Tech News (04/09/07)
  • Biggest Threat to Internet Could Be a Massive Virtual Blackout, National Journal's Technology Daily (04/05/07), Α. Noyes
  • Don't Trust Voting on the 'Net, Speaker Says, Network World (04/12/07), T. Greene
  • Researchers Explore Scrapping Internet, Associated Press (04/15/07), A. Jesdanun, A. White
  • Expert: 'Flasher' Technology Digs Deeper for Digital Evidence, Purdue University News (04/12/07), K. Medaris
  • Analysis: Owning the Keys to the Internet, United Press International (04/12/07), S. Waterman
  • Open-Source Project Aims to Erase E-Voting Fog, IDG News Service (04/16/07), J. Kirk
  • Docs Point to E-Voting Bug in Contested Race, Wired News (04/17/07), K. Zetter
  • Dartmouth Gets Award for Cyber Security Studies, Dartmouth News (04/13/07), L. Burnham
  • Security Remains a Challenge for Browser Developers, eWeek (04/17/07), P. Galli
  • Feds: Accuracy of Face Recognition Software Skyrockets, LiveScience (04/13/07), L. Wood

Δελτίο 69 - 11 Απριλίου 2007

  • Association for Computing Machinery President's Award Honors Leading Proponent of Computer Security, Ethics, Safety, AScribe Newswire (04/03/07)
  • Opposition to Electronic Voting System Grows in France, New York Times (04/03/07) P. A3
  • Congress Finally Considers Aggressive E-Voting Overhaul, Ars Technica (04/01/07), Τ. Lee
  • Don't Use WEP, Say German Security Researchers, IDG News Service (04/04/07) Sayer, Peter
  • That Face! Those Eyes! How Recognizable?, Government Computer News (04/03/07) Dizard III, Wilson P.
  • Professor Lectures at U. Massachusetts on Electronic Voting, Massachusetts Daily Collegian (04/06/07) Trull, Andrew
  • How to Read Signs of Safe Software, Government Computer News (04/02/07) Vol. 26, No. 7, Buxbaum, Peter A.

Δελτίο 68 - 04 Απριλίου 2007

  • Security That Nets Malicious Websites, Queensland University of Technology (03/23/07)
  • UCF Researchers Work on Spy Drones, Orlando Sentinel (FL) (03/22/07), C. Cobbs
  • Tougher Standards Could End E-Voting, Inside Bay Area (CA) (03/28/07), I. Hoffman
  • World Scholar to Run New UTSA Cyber-Security Institute, University of Texas at San Antonio (03/27/07), D. Gabler
  • Researchers Talk Cyber Security at Conference, Dartmouth News (03/27/07), M. Coburn
  • Despite Upgrades, Security Experts Fear $100 Laptops, InfoWorld (03/25/07), M. Hines
  • U.S.-Based Servers Host Majority of Malicious Code, Study Finds, Computerworld (03/26/07), J. Vijayan
  • Hackers, Designers Talk Tech's Future at eTech, CNet (03/26/07), S. Olsen
  • Far Infrared Can Be Used for Anti-Terror Devices, Faster Wireless, University of Utah News (03/28/07)
  • Wright State Researchers Pioneer New Ground in Web Technology Affecting Health Care, Terrorism, Defense, Financial Services, Wright State University (03/28/07)
  • Q&A: New IAB Chair Mulls DNS Security, Unwanted Internet Traffic, Network World (03/28/07), C. D. Marsan
  • Are Your Software Programmers Coding Securely?, Computerworld (03/26/07), J. Vijayan

Δελτίο 67 - 26 Μαρτίου 2007

  • Florida Officials Warned of E-Voting Glitch Prior to Election, Computerworld (03/20/07), M. Songini
  • A Student-Hacker Rematch and the Second Annual Collegiate Cyber Defense Competition, InformIT (03/16/07), S. Fogie
  • Internet Research, Uncensored, Chronicle of Higher Education (03/23/07) Vol. 53, No. 29, P. A29; S. Kean
  • Certification on the Ballot, Government Computer News (03/19/07) Vol. 26, No. 6, W. Dizard
  • Son of TIA Will Mine Asian Data, Wired News (03/22/07), S. Weinberger
  • Tool Turns Unsuspecting Surfers Into Hacking Help, CNet (03/20/07), J. Evans
  • Privacy for Domain Owners Moves Forward, Associated Press (03/21/07), A. Jesdanun

Δελτίο 66 - 21 Μαρτίου 2007

  • Hackers Get a Bum Rap for Corporate America's Digital Delinquency, University of Washington News and Information (03/12/07), P. Lewis
  • File-Sharing Lawsuit Worries Techies, Investor's Business Daily (03/13/07) P. A4; B. Deagon
  • Chinese Hackers Seek U.S. Access, USA Today (03/12/07) P. 3B; J. Swartz
  • The E-voting Question: To Open or Not to Open?, National Journal's Technology Daily (03/15/07), Μ. Martinez
  • Can Computers Make Life-or Death Medical Decisions?, New Scientist (03/13/07), R. Khamsi
  • Researchers Track Down Plague of Fake Web Sites, New York Times (03/19/07) P. C4; J. Markoff
  • DIM 2007 Workshop: Usability Issues for Identity Management, Johannes Ernst's Blog (03/15/07), J. Ernst
  • Politicians Press for Antispyware Law Yet Again, CNet (03/16/07), A. Broache
  • How to Stop the Dilbertization of IT, eWeek (03/16/07), D. Perelman

Δελτίο 65 - 14 Μαρτίου 2007

  • E-Rescue Plans for Coping With Disasters, The Australian (03/06/07), J. Foreshaw
  • The Digital Building--Security Starts at the Door, Fraunhofer-Gesellschaft (03/07)
  • Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure, Honeyblog (03/05/07), V. Lam; S. Antonatos; P. Akritidis
  • Last Month's Root-Server Attack Revisited, Register (UK) (03/09/07) Goodin, Dan
  • Aussie Video Surveillance Technology Leaves Rivals for Dead, Computerworld Australia (03/06/07) Pauli, Darren

Δελτίο 64 - 07 Μαρτίου 2007

  • The Art of Identification, Technology Review (02/28/07), Μ. Erard
  • Berners-Lee Gets Technical on the Hill, InternetNews.com (03/01/07), R. Mark
  • Online Voting Clicks in Estonia, Wired News (03/02/07), J. Borland
  • Fighting Bugs: Remove, Retry, Replicate, and Rejuvenate, Computer (02/07) Vol. 40, No. 2, P. 107; M. Grottke; K. Trivedi
  • Software Vulnerability Index Making Progress, IDG News Service (03/01/07), M. Hines
  • Foolproof Quantum Cryptography, Technology Review (03/02/07), D. Graham-Rowe
  • Black Hat Demonstrations Shatter Hardware Hacking Myths, eWeek (03/01/07), L. Vaas

Δελτίο 63 - 28 Φεβρουαρίου 2007

  • Campaign Strengthens for a Voting Paper Trail, Washington Post (02/19/07) P. A17; Z. Goldfarb
  • Europe's Plan to Track Phone and Net Use, New York Times (02/20/07) P. C4; V. Shannon
  • World Leading Human Behaviour Experts Awarded Security Study Contract, Innovations Report (02/16/07), B. White
  • US Cybersecurity Czar Has His Marching Orders, CNet (02/20/07), J. Evers
  • Security Experts Draw Bead on How Malware Targets and Dupes Internet UsersIndiana University (02/19/07)
  • Panel Cites Voter Error, Not Software, in Loss of Votes, New York Times (02/24/07) P. A9; C. Drew
  • Surveillance Cameras Get Smarter, Associated Press (02/25/07), S. Manning
  • Homeland Security Cyber Czar Sees Challenges Ahead, National Journal's Technology Daily (02/22/07), H. Greenfield

Δελτίο 62 - 19 Φεβρουαρίου 2007

  • New US Cybersecurity Chief Lays Out Guidance, IDG News Service (02/09/07), R. McMillan
  • Split Decision, Government Technology (02/07) Vol. 20, No. 2, A. Opsahl
  • Groups Call for E-Voting Paper Trail Legislation, IDG News Service (2/12/07), G. Gross
  • US Government Readying Massive Cybersecurity Test, IDG News Service (02/12/07), R. McMillan
  • Blogs to the Rescue!, Nature (02/15/07), D. Butler
  • $82 for E-Voting Secrets, Wired News (02/16/07), K. Zetter
  • Senator Introduces 'Disappointing' E-Vote Reform Bill, InternetNews.com (02/14/07), M. Hickins
  • Making Operating Rooms Safer With Open Communication Among Equipment UNH Media Relations (02/13/07), B. Potier
  • IC Designers Need to Focus on Security, Panel Says, EE Times (02/14/07), N. Mokhoff

Δελτίο 61 - 12 Φεβρουαρίου 2007

  • Congressman Renews Push for E-Vote Paper Trails, Computerworld (02/06/07), Μ. Songini
  • Internet Servers Handle Major Global Attacks, Associated Press (02/07/07), Τ. Bridis
  • UM Study: Hackers Attack Every 39 Seconds, PRNewswire (02/06/07)
  • Bush Seeks Spending Increases in Research, Surveillance, CNet (02/05/07), Α. Broache
  • Fighting to Protect Copyright 'Orphans', CNet (01/31/07), D. Terdiman
  • Feinstein Will Pursue Paper Record at Polls, San Francisco Chronicle (02/08/07) P. A4; Z. Coile
  • Feds Defend Oversight of E-Voting Testing, CNet (02/09/07), A. Broache
  • U.S. Cyber Counterattack: Bomb 'Em One Way or the Other, Network World (02/08/07), E. Messmer
  • Researchers Invent System to Control and Quarantine Worms Attacking Computer Networks, Penn State Live (02/08/07)
  • Miklau Awarded CAREER Grant to Study Privacy, Accountability, University of Massachusetts Amherst (02/05/07)
  • High Security for $100 Laptop, Wired News (02/07/07), R. Singel
  • For Computer Scientists Exploring Face Recognition, the Question Is 'Who?', PhysOrg.com (02/07/07), L. Zyga

Δελτίο 60 - 08 Φεβρουαρίου 2007

  • Florida Shifting to Voting System With Paper Trail, New York Times (02/02/07) P. A1; A. Goodnough; C. Drew
  • UIC Team Ready to Get Medieval on Spammers, Chicago Sun-Times (01/31/07) P. 64; S. Guy
  • Project Analyzes Internet Security, The State News (01/29/07), K. Jourdan
  • 'A Sense of Security, The Engineer Online (01/30/07)
  • Demo '07 Conference Showcases Encrypted Messaging, Inkless Printing, InformationWeek (02/01/07), T. Claburn
  • Research Aims to Detect Online Terrorist Activity, CSO Online (01/07), D. Daniel
  • Study Finds Security Flaws on Web Sites of Major Banks, New York Times (02/05/07) P. C3; Β. Stone
  • Quantum Cryptography Offers Spy-Proof Code, IT World Canada (02/01/07), Ν. Arellano
  • Schneier: In Touch With Security's Sensitive Side, Dark Reading (02/01/07), Κ. Higgins

Δελτίο 59 - 01 Φεβρουαρίου 2007

  • NIST Announces Competition for New Cryptographic Hash Algorithm, Network World (01/23/07)
  • Cyberthreat Experts to Meet at Secretive Conference, CNet (01/22/07), J. Evers
  • The Secret to Secure Code - Stop Repeating Old Mistakes, Between the Lines (Blog) (01/16/07), D. Farber
  • 'Storm Worm' Trojan Horse Surges On, CNet (01/22/07), Τ. Espiner
  • UMass Scientist's Program Combats Hackers, Massachusetts Daily Collegian (01/29/07), Μ. Osorio
  • Olde Fashioned Legal Loopholes Allow Rigging of Hi-Tech Elections, VoteTrustUSA (01/30/07), H. Stanislevic; J. Washburn
  • A Lively Market, Legal and Not, for Software Bugs, New York Times (01/30/07) P. A1; B. Stone
  • New York Halts E-Voting Machine Testing, Computerworld (01/29/07), M. Songini
  • FBI Turns to Broad New Wiretap Method, CNet (01/30/07), D. McCullagh
  • New UNH Model Measures Cyber Threat, Foster's Daily Democrat (NH) (01/26/07), T. Kressler
  • Tech's Dark Potential Troubles Terror Expert, Mercury News (01/29/07), F. Davies

Δελτίο 58 - 25 Ιανουαρίου 2007

  • Ethics Dilemma in Killer Bots, The Australian (01/16/07) P. 29; P. Argy
  • Interview With Bill Cheswick, Security Focus (01/15/07), F. Biancuzzi
  • Computer Privacy in Distress, Wired News (01/17/07), J. Granick
  • Making Every E-Vote Count, IEEE Spectrum (01/07) Vol. 44, No. 1, P. 13; S. Cherry
  • Advisory Council Seeks Tighter Cyber Security Net, GovExec.com (01/16/07), J. Marino
  • Linux Guru Argues Against Security Liability, ZDNet Australia (01/19/07), T. Espiner
  • Congress Lights Fire Under Vote Systems Agency, InternetNews.com (01/19/07), M. Hickins
  • Nordic Researchers Aim for Multiprotocol Multisensor RFID Tag, RFID Journal (01/19/07), R. Wessel
  • Interview: Must-Know Security Insights for 2007, Business 2.0 (01/07) Fortt, Jon
  • Brain Activity Provides Novel Biometric Key, New Scientist (01/16/07), W. Knight

Δελτίο 57 - 18 Ιανουαρίου 2007

  • Daylight Sought for Data Mining, Washington Post (01/11/07) P. D3; E. Nakashima; A. Klein
  • Computer Security: Adapt or Die, Computerworld (01/08/07), G. Anthes
  • How to Leak a Secret and Not Get Caught, New Scientist (01/12/07), P. Marks
  • Of Cyber Wars and Turf Wars, National Journal (01/06/07) Vol. 39, No. 1, P. 38; B. Swindell
  • The Legal Tangles of Data Collection, Washington Post (01/16/07) P. A9; E. Nakashima
  • A DVD Copy Protection Is Overcome by Hackers, New York Times (01/17/07) P. C4; B. Stone
  • Officials Warm to Paper Trail to Verify Votes in Maryland, Washington Post (01/17/07) P. B1; L. Rein
  • Malware Creators Turn Code Protection Technique to Their Advantage, ITBusiness.ca (01/09/07), P. Khanna
  • Digital Fingerprints, Science News (01/13/07) Vol. 171, No. 2, P. 26; J. Rehmeyer

Δελτίο 56 - 12 Ιανουαρίου 2007

  • Citing Problems, US Bars Lab From Testing Electronic Voting, New York Times (01/04/07) P. A1; C. Drew; I. Urbina
  • Watch & Learn, Baltimore Sun (01/05/07) P. 1D; F. Roylance
  • Open-Source Personal Tracking System Gets First Test, IDG News Service (01/02/07), N. Gohring
  • Predicting the Top Security Threats for 2007, TechNewsWorld (12/30/06), J. LeClaire
  • Changes in e-Voting Likely Coming, Experts Say, IDG News Service (01/05/07), G. Gross
  • Attack of the Zombie Computers Is a Growing Threat, Experts Say, New York Times (01/07/07) P. 1; J. Markoff
  • The Logic of Privacy, Economist (01/04/07)
  • CMU Professor Investigates Vote, Pittsburgh Tribune-Review (01/09/07), R. Amen
  • Spafford Leads as Computer Advisor, Scholar, Purdue Exponent (01/10/07), A. Thomas
  • Researchers: Hack Will Help Kill HD DVD Copy Protection, IDG News Service (01/08/07), R. McMillan

Δελτίο 55 - 05 Ιανουαρίου 2007

  • Computer Warming a Privacy Risk, Wired News (12/29/06), Q. Norton
  • New Program by UMass Amherst Computer Scientist Prevents Crashes and Hacker Attacks, University of Massachusetts Amherst (12/26/06)
  • Cybercrooks Deliver Trouble, Washington Post (12/27/06) P. D1; B. Krebs
  • Lessons for the Mentor, CIO Australia (12/11/06), B. Kunkel
  • Q&A: E-Voting Issues Still There, IDG News Service (01/02/07), G. Gross
  • Privacy, Patents on Agenda for New Congress, IDG News Service (01/01/07), G. Gross

Δελτίο 54 - 28 Δεκεμβρίου 2006

  • Paper Jams a Problem for Electronic Voting, Associated Press (12/21/06), S. Manning
  • How Biometric Security Is Far From Foolproof, Wall Street Journal (12/21/06) P. B3; M. Bulkeley
  • Justice Dept. Database Stirs Privacy Fears, Washington Post (12/26/06) P. A7; D. Eggen
  • Congress in 2007: Privacy, Patents on Agenda, IDG News Service (12/22/06), G. Gross
  • Voter Paper Trail Not an Easy Path, Atlanta Journal-Constitution (12/22/06), C. Campos
  • PHP Security Under Scrutiny, Security Focus (12/18/06), R. Lemos

Δελτίο 53 - 21 Δεκεμβρίου 2006

  • Congress and Tech: Little to Show, CNet (12/11/06), D. McCullagh
  • New University of Maryland Technologies Could Move Video Surveillance to New Level, AScribe Newswire (12/11/06)
  • Report Blames Denver Election Woes on Flawed Software, Computerworld (12/13/06), Τ. Weiss
  • Engineering Professors Work to Secure Software-Defined Radio Technology, Virginia Tech News (12/14/06), L. Crumbley
  • E-Voting Requires Long-Term Strategy: IDC, Washington Technology (12/12/06), E. Butterfield
  • Project Aims to Bolster Java Open Source Security, Quality, Linux Insider (12/12/06), J. Lyman
  • An Ominous Milestone: 100 Million Data Leaks, New York Times (12/18/06) P. C3; Zeller, Tom Jr.
  • Configuration: The Forgotten Side of Security, Linux.com (12/12/06), B. Byfield

Δελτίο 52 - 15 Δεκεμβρίου 2006

  • Panel Backs Guideline Favoring Voting-Machine Verification,Washington Post (12/06/06) P. A9; C. Barr
  • Spam Doubles, Finding New Ways to Deliver Itself,New York Times (12/06/06) P. A1; B. Stone
  • Carnegie Mellon Researchers Uncover Online Auction Fraud, AScribe Newswire (12/05/06)
  • Civil Libertarians Protest Privacy Policy,Washington Post (12/06/06) P. A11; Nakashima, Ellen
  • Q&A: Responsible Disclosure of Vendor Flaws and What It Means, Computerworld (12/04/06), J. Vijayan
  • Health Hazard: Computers Spilling Your History, New York Times (12/03/06) P. 3-1; M. Freudenheim; R. Pear
  • Open-Source Spying, New York Times Magazine (12/03/06) P. 54; C. Thompson
  • Tomorrow's Security Today, InformationWeek (12/04/06)No. 1117, P. 45; L. Greenemeier
  • Big Shift Seen in Voting Methods With Turn Back to a Paper Trail, New York Times (12/08/06) P. A1; I. Urbina; C. Drew
  • Guest Lecturer Focuses on Cybersecurity Threats, UDaily (University of Delaware) (12/07/06), B. Hutchinson
  • DHS Passenger Scoring Illegal?, Wired News (12/07/06), R. Singel
  • The Privacy Klatch, National Journal (12/02/06) Vol. 38, No. 48, P. 52; S. Harris
  • Traveler Data Program Defied Ban, Critics Say, Washington Post (12/09/06) P. A2; S. Spencer; E. Nakashima
  • Researchers Crafting Intelligent, Scaleable WLAN Defense Through DARPA, Network World (12/07/06), J. Cox
  • Informatics Scientists' 'Active Cookies' Put Bite on Cyber Crooks, Indiana University (12/07/06)
  • Spam Choking the Internet Again, New Scientist (12/08/06)
  • Better, Faster, More Secure, Queue (01/07) Vol. 4, No. 10, B. Carpenter

Δελτίο 51 - 8 Δεκεμβρίου 2006

  • Security of Electronic Voting Is Condemned, Washington Post (12/01/06) P. A1; C. Barr
  • Touch Screens? Vote Yes or No, Wall Street Journal (11/30/06) P. A4; J. Krunholz
  • You're Not Alone, New York Times (11/23/06), W. Hamilton
  • ACLU Urges U.S. to Stop Collection of Traveler Data, Washington Post (12/02/06) P. A5; E Nakashima
  • Nike+iPod Sport Kit Raises Privacy Concerns, University of Washington News and Information (11/29/06), H. Hickey

Δελτίο 50 - 1 Δεκεμβρίου 2006

  • E-Voting Measures Sought to Avoid Disputes,San Jose Mercury News (CA) (11/29/06), F. Davies
  • Vote Disparity Still a Mystery in Fla. Election for Congress, Washington Post (11/29/06) P. A3; P. Whoriskey
  • DOD Report to Detail Dangers of Foreign Software, Computerworld (11/27/06), G. Anthes
  • Canada Experts Find Path Round Internet Firewalls, Reuters (11/28/06), W. Dabrowski
  • Smart Spaces: If These Walls Could Talk, Computerworld (11/27/06), G. Anthes

Δελτίο 49 - 27 Νοεμβρίου 2006

  • Democrats May Give Voting Machines More Scrutiny, National Journal's Technology Daily (11/14/06), M. Martinez
  • Election '08: Vote by TiVo Wired News (11/14/06), K. Axline
  • New Computer Software Enable Rapid Response to Time-Critical Emergencies Newswise (11/16/06)
  • Exterminating the Nuisance of Spam, CNet (11/15/06), D. McCullagh
  • Scholars Challenge the Infallibility of Fingerprints, Chronicle of Higher Education (11/17/07) Vol. 53, No. 13, P. A14; P. Monaghan
  • Attack of the Bots, Wired (11/06) Vol. 14, No. 11, P. 171; S. Berinato
  • Did Florida Foul Another Ballot?, Wired News (11/17/06), Κ. Zetter
  • Cracked It!, Guardian Unlimited (UK) (11/17/06), S. Boggan
  • Malware Goes Mobile, Scientific American (11/06) Vol. 295, No. 5, P. 70; M. Hypponen
  • A Conversation With Douglas W. Jones and Peter G. Neumann, Queue (11/06) Vol. 4, No. 9, D. Jones; P. Neumann
  • Electronic Voting Trend May Be Short-Circuiting, Sarasota Herald-Tribune (FL) (11/19/06), V. Hull
  • Phishing Toolbars: All as Hopeless as One Another, Techworld (11/20/06), J. Dunn
  • Hard-working Chips May Reveal Encryption Keys, New Scientist (11/20/06), W. Knight

Δελτίο 48 - 19 Νοεμβρίου 2006

  • Glitches in State Databases Could Turn Away Voters, Computerworld (11/06/06), M. Songini
  • E-Voting, As It Advances, Faces Big Risks, Baseline (11/03/06), R. Hertzberg
  • E-Voting: Dispatch From the Future, Washington Post (11/05/06) P. B1; W. Dreschler
  • Watchdog Groups Report E-Voting Problems, IDG News Service (11/07/06), G. Gross
  • 'Vote Flipping' Emerges as Continuing Problem in E-Voting, Computerworld (11/08/06), T. Weiss
  • Inside the Hacker's Profiling Project, NewsForge (11/03/06), F. Biancuzzi
  • 'Vote Flipping' Is Real, But Its Cause Is the Subject of Debate, Computerworld (11/13/06), T. Weiss
  • ACM Group Honors Computer Security Experts, AScribe Newswire (11/08/06)
  • Ballot Roulette, Science News (11/04/06) Vol. 170, No. 19, P. 298; Weiss, Peter
  • Sensor Networks Protect Containers, Navigate Robots, Washington University (St. Louis) (11/09/06), Τ. Fitzpatrick
  • Researcher Finds 'Trusted Computing' Chip in Apple Models, eWeek (11/10/06), D. D. Turner

Δελτίο 47 - 06 Νοεμβρίου 2006

  • US Investigates Voting Machines' Venezuela Ties, New York Times (10/29/06) P. 1; Τ. Golden
  • 'Gambits' Are a Risk to Internet Domain System, International Herald Tribune (10/29/06), V. Shannon
  • At 30, Crypto Still Lacks Usability, Experts Say, CNet (10/28/06), J. Evers
  • Rutkowska: Anti-Virus Software Is Ineffective, eWeek (10/26/06), R. Naraine
  • The Economics of Information Security, Science (10/27/06) Vol. 314, No. 5799, P. 610; R. Anderson; T. Moore
  • The Next Voting Debacle?, IEEE Spectrum (10/06) Vol. 43, No. 10, P. 12; S. Cherry
  • Voters in Fla., Texas Complain of E-Voting Glitches, Computerworld (11/01/06), M. Songini
  • GAO: Better Coordination of Cybersecurity R&D Needed, Government Computer News (10/31/06), P. Wait
  • Tech's Threat to National Security, Business Week (11/02/06), S. Hamm; D. Kopecki
  • Quantum Attacks Worry Computer Scientists, Security Focus (10/31/06), R. Lemos
  • Phishers Beware, CITRIS Newsletter (10/06), J. Shreve

Δελτίο 46 - 30 Οκτωβρίου 2006

  • Building a Better Voting Machine, Wired News (10/18/06), Κ. Zetter
  • IU Study: More Internet Users May Be Taking 'Phishing' Bait Than Thought, Indiana University (10/12/06)
  • Officials Probe Possible Theft of Voting Software in MD, Washington Post (10/20/06) P. B1; C. Barr
  • New Laws and Machines May Spell Voting Woes, New York Times (10/19/06) P. A1; I. Urbina
  • Picking Out Digital Image Forgeries, Network World (10/17/06), M. Kabay
  • W3C Launches Secure Browsing Initiative, Business Wire (10/17/06)
  • Analysis: 'Total Information' Lives Again, United Press International (10/26/06), S. Waterman
  • Internet Voting Revisited, VoteTrustUSA (10/25/06), B. Simons; A. Rubin; D. Jefferson
  • NIST to Certify Voting Machine Security, Standards, eWeek (10/26/06), W. Rash

Δελτίο 45 - 20 Οκτωβρίου 2006

  • Election Integrity Organizations, Leaders Urge States to Plan for Emergency Paper Bal­lots, Procedures for November Election, US Newswire (10/13/06)
  • Safe Internet Requires Total Network Security, Prof. Says, Wisconsin Technology Network (10/11/06) Plas, J. Vanden
  • Geek Speak Birdles Information Security, Computerworld Australia (10/12/06), R. Gedda
  • Sending Secret Messages Over Public Internet Lines Can Take Place With New Tech­ni­que, Newswise (10/10/06)
  • Tackling Highjacking With Technology, CNN.com (10/06/06), D. Rosenblatt
  • Computerized Voter Registration Databases Need a Major Overhaul, Technology Review (10/16/06), Κ. Bourzac
  • Brazil's Electronic Voting Has Safeguards Lacking in the US, Associated Press (10/14/06), S. Lehman
  • Electronic Voting Machines May Not Eliminate Election Problems, Ottumwa Courier (10/09/06), M. Milner

Δελτίο 44 - 14 Οκτωβρίου 2006

  • Lots of Processors Inside Everything, Electronic News (10/05/06), J. Davis
  • Pennsylvania Voters on E-Voting: Trust, But Verify, AScribe Newswire (10/04/06)
  • UTSA Awarded $3.1 Million for Cyber-Security Program Development, EurekAlert (10/04/06)
  • Online Elections Would Attract Younger Voters -- Someday, San Francisco Chronicle (09/30/06) P. A2; C. Nevius
  • Neither Safe Nor Secure on the Internet, CNet (10/04/06), J. Archer
  • Cut the Ties That Terrorize, InformationWeek (10/02/06)No. 1108, P. 56; E. Chabrow
  • Standards to Stimulate E-Voting?, CNet (10/06/06), C. Lombardi
  • Flaw Found in European Voting Machines, IDG News Service (10/06/06), R. McMillan
  • $100 Laptop May Be at Security Forefront, Associated Press (10/09/06), B. Bergstein
  • Tactile Passwords Could Stop ATM 'Shoulder Surfing', New Scientist (10/06/06), T. Simonite

Δελτίο 43 - 7 Οκτωβρίου 2006

  • ACM Security Experts Urge Paper Trails for Electronic Voting, Ascribe Newswire (09/28/06)
  • Study Shows Internet to Be Resilient Against Terror Attacks, Ohio State Research News (09/28/06)
  • Alliance Aims to Rethink Network Computing and Communications, Rensselaer News (09/27/06)
  • Penn State Joins International Effort to Secure Wireless, Sensor Networks, Penn State Live (09/28/06)
  • New Models to Improve the Reliability of Virtual Organizations, University of Southampton (ECS) (09/29/06), J. Lewis
  • Garcia Looks to Raise Cybersecurity's Profile, Government Computer News (09/25/06) Vol. 25, No. 29
  • Software Being Developed to Monitor Opinions of U.S., New York Times (10/04/06) P. A24; Ε. Lipton
  • E-Poll Results Undecided, Baltimore Sun (10/04/06) P. 1B; M. Harris
  • Rallies Protest Limits on Digital Copying, Reuters (10/04/06)
  • Computer Science Professor Argues for a Paper Trail With E-Voting, Washington Post (10/04/06) P. A23; Z. Goldfarb

Δελτίο 42 -  28 Σεπτεμβρίου 2006

  • Technology Lobbyist Named Top US Cyber-Security Official, Washington Post (09/19/06) P. A6; Β . Krebs
  • Personalization in Privacy-Aware Highly Dynamic Systems, Com. of the ACM (09/06), Vol. 49, No. 9, P. 32; S. Sackmann; J. Strucker; R. Accorsi
  • Q&A: Go Back to Paper Ballots, says e-Voting Expert, Computerworld (09/20/06), M. Songini
  • Electronic Voting Machines Are Making Officials Wary, New York Times (09/24/06) P. A19; Ι . Urbina
  • With Homeland Security Grant, Cornell Seeks to Sort Facts >From Opinions, Cornell News (09/18/06); B. Steele
  • Researchers Reveal Potential 'Click Fraud', Indiana Daily Student (09/22/06); K. Oloffson
  • Artificial Intelligentsia, Atlantic Monthly (10/06) Vol. 298, No. 3, P. 146; J. Fallows
  • ACM Security Experts to Urge Paper Trails for Electronic Voting, ACM (09/27/06); V. Gold
  • Vote Check-in Glitch Is Declared Fixed, Baltimore Sun (09/26/06) P. 1A; M. Harris, A. Green
  • Johns Hopkins Joins Effort to Boost 'Smart Tag' Security, Johns Hopkins Gazette (09/25/06) Vol. 36, No. 4, P. Sneiderman

Δελτίο 41 -  21 Σεπτεμβρίου 2006

  • Election Glitches 'Could Get Ugly', USA Today (09/14/06) P. 1A; R. Wolf
  • Simulated IT Attacks Reveal Response Flaws, eWeek (09/13/06), R. Hines
  • Researchers Reveal 'Extremely Serious' Vulnerabilities in E-Voting Machines, Princeton University (09/14/06), T. Riordan
  • UA Scientists Probe 'Dark Web' to Uncover Potential Terrorist Threats, KVOA 4 (Tucson, AZ) (09/12/06), T. McNamara
  • Techies Hot on Concept of 'Wisdom of Crowds,' But It Has Some Pitfalls, USA Today (09/13/06) P. 4B; K. Maney
  • Microsoft Building Security Language for Grids, eWeek (09/13/06), D. Taf
  • RFID Security Consortium Receives $1.1 Million NSF Grant, RFID Journal (09/08/06) M. O'Connor
  • Will Your Vote Count? CIO Insight (08/06)No. 71, P. 43; D. D'Agostino
  • Major Problems at Polls Feared, Washington Post (09/17/06), P. A1; D. Balz; Z. Goldfarb
  • Grant to Fund Fight Against Digital Crime, Pittsburgh Post-Gazette (09/17/06), J. Crompton
  • Lawmakers Question DHS Preparedness for Fighting Cyberattacks, IDG News Service (09/13/06), J. Vijayan

Δελτίο 40 -  16 Σεπτεμβρίου 2006

  • How Much Can State Trust Electronic Voting?, Baltimore Sun (09/10/06) P. 1C; Μ. Harris
  • Voice and Signature for the Identification of Persons, Basque Research (09/07/06)
  • IT Security Lags Five Years After Sept. 11, IDG News Service (09/07/06), G. Gross; B. Ames; R . McMillan
  • Modeling Terrorists, IEEE Spectrum (09/06) Vol. 43, No. 9, P. 26; H. Goldstein
  • Stemming Spam: Internet Routing and Spam Data Reveal Trends to Help Researchers Build Better E-mail Filters, Georgia Institute of Technology (09/12/06)
  • Sandia Fingerprinting Technique Demonstrates Wireless Device Driver Vulnerabilities, Sandia National Laboratories (09/12/06)
  • Will Airport of the Future Fly? CNet (09/13/06), S. Olsen
  • Personal Data Protection Vital to Future Civil Liberties, IST Results (09/13/06)

Δελτίο 39 -  11 Σεπτεμβρίου 2006

  • "Molecular Computers' Act as Tiny ID Tags", New Scientist (09/03/06); K. Kleiner
  • "University Research Aims at More Secure Wi-Fi", InformationWeek (09/01/06); J. Shandle
  • "Stealth Attack Drains Cell Phone Batteries", UC Davis News and Information (08/24/06)
  • "The Non-Denial of the Non-Self", Economist (08/31/06) Vol. 380, No. 8493, P. 72
  • A Report Card on Anti-Terror Technology, CNet (09/07/06), D. McCullagh
  • Researchers Challenge DOS Attack Data, Dark Reading (09/06/06), T. Wilson
  • U.S. Leadership on Cybersecurity 'AWOL', SD Times (09/01/06)No. 157, P. 1; deJong, Jennifer
  • Sandia's Red Teams: On the Hunt for Security Holes, eWeek (09/04/06) Vol. 23, No. 35, P. 22; C. Preimesberger
  • Spam+Blogs=Trouble, Wired (09/06) Vol. 14, No. 9, P. 104; C. Mann
  • When TCP Breaks: Delay- and Disruption-Tolerant Networking, Internet Computing (08/06) Vol. 10, No. 4, P. 72; S. Farrell; V. Vinny; D. Geraghty

Δελτίο 38 -  01 Σεπτεμβρίου 2006

  • This Is Only a Drill: In California, Testing Technology in a Disaster Response, New York Times (08/28/06) P. C1; J. Markoff
  • When TCP Breaks: Delay- and Disruption-Tolerant Networking, Internet Computing (08/06) Vol. 10, No. 4, P. 72; S. Farrell; V. Vinny; D. Geraghty

Δελτίο 37 -  27 Αυγούστου 2006

  • Military Research Aims to Develop Self-Configuring, Secure Wireless Nets,Network World (08/16/06), R. DeBeasi
  • Judge Rules Against Wiretaps, Washington Post (08/18/06), D. Linzer, E. Nakashima
  • Sober Warnings About e-Voting Systems, CNet (08/17/06), E. Sinrod
  • A Move to Secure Data by Scattering the Pieces, New York Times (08/21/06) P. C5; J. Markoff
  • Paper Trail Flawed in Ohio Election, Study Finds, Computerworld (08/21/06), M. Songini
  • Tempting Data, Privacy Concerns, New York Times (08/23/06) P. C1; K. Hafner, T. Zeller
  • The "Data Valdez" Versus the Privacy Ceiling, The Flowing Candy Bees (08/12/06)
  • Capturing Online Video Pirates, Technology Review (08/22/06), R. Roush

Δελτίο 36 -  18 Αυγούστου 2006

  • Scratch-and-Vote System Could Help Eliminate Election Fraud, Technology Review (08/09/06), D. Graham-Rowe
  • JitterBugs Could Turn Your Keyboard Against You, Steal Data, Penn News (08/07/06), G. Lester
  • $2.4 Million to Develop Computing Security Technology, University of Pittsburgh News Bureau (08/07/06)
  • Debate Over E-Voting Is Still Plaguing Elections, National Journal's Technology Daily (08/09/06) Casey, Winter
  • Intrusion-Tolerant Middleware: The Road to Automatic Security, IEEE Security & Privacy (08/06) Vol. 4, No. 4, P. 54; P. Verissimo; N. Neves; C. Cachin
  • IT Versus Terror, CIO (08/01/06) Vol. 19, No. 20, P. 34; B. Worthen

Δελτίο 35 -  5 Αυγούστου 2006

  • Introverted IT Students More Inclined to Cyber-Crime, New Scientist (07/26/06), P. Marks
  • Homeland Security Awards $3 Million to Rutgers-Led Research Consortium, Rutgers University (07/26/06)
  • Blind to Lead Way in E-Voting, Australian IT (07/25/06), C. Jenkins
  • Hack-Proof Design, EDN (07/20/06) P. 47; W. Webb
  • Grad Students in San Diego Build Biometric Vending Machine, Contactless News (07/31/06), A. Williams

Δελτίο 34 -  25 Ιουλίου 2006

  • Tech Researchers Creating Software to Protect Children, Roanoke Times (VA) (07/15/06), A. Manese-Lee
  • Voting Software, Embedded.com (07/17/06), J. Ganssle
  • Experts Tell Congress U.S. E-Voting Security Is Flawed, EE Times (07/19/06), G. Leopold
  • Feds Sharpen Secret Tools for Data Mining, USA Today (07/20/06) P. 5A; M. Kelley
  • Surveillance Bill Meets Resistance in Senate, Washington Post (07/21/06) P. A9; D. Eggen; C. Babington; J. Eilperin
  • Department of Homeland Security Establishes Center at Illinois, University of Illinois at Urbana-Champaign (07/19/06)
  • RFID Privacy Concerns Spark a Closer Look by a U.S. Senate Panel, Investor's Business Daily (07/18/06) P. A4; J. Bonasia

Δελτίο 33 -  14 Ιουλίου 2006

  • Software Tools Detect Bugs by Inferring Programmer's Intentions, University of Illinois at Urbana-Champaign (07/06/06), J. Kloeppel
  • DHS Outlines Plan to Protect Critical Telecommunications Infrastructure, RCR Wireless News (07/05/06), H. F. Weaver
  • Concerns About Fraud Continue to Plague Users of Electronic Voting Machines, Computerworld (07/03/06), Μ . Songini
  • FBI Plans New Net-Tapping Push, CNet (07/07/06), D. McCullagh
  • Seeking to Tighten the Net Against Attack, IST Results (07/10/06)
  • DHS Lags in Appointing Cybersecurity Czar, National Journal's Technology Daily (07/05/06), H. Greenfield
  • DOE's Federated Model Aims to Identify Security Threats, Network World (07/05/06) Garretson, Cara
  • Election Corrections, US News & World Report (07/09/06), S. Brush
  • Trust in Global Computing, IST Results (07/12/06)
  • WPI to Host Gathering of Indoor Personnel Location and Tracking Experts, Worcester Polytechnic Institute (07/07/06)
  • The Plot to Hijack Your Computer, BusinessWeek (07/17/06), No. 3993, P. 40; B. Elgin; B. Grow

Δελτίο 32 -  07 Ιουλίου 2006

  • New Method Better Predicts Software Vulnerabilities, Colorado State University (06/28/06)
  • Critic: Paper Vote Records Vital, Miami Herald (06/28/06), S. Benn
  • Human Trails in Cyberspace, Chronicle of Higher Education (06/30/06) Vol. 52, No. 43, P. A18; J. Young
  • Hacker Attacks Hitting Pentagon, Baltimore Sun (07/02/06) P. A1; S. Gorman
  • Securing Europe's Future Information Society, IST Results (07/05/06)
  • Researchers Claim Great Firewall Workaround, IDG News Service (07/05/06), S. Lemon; N. Gohring
  • Wariness of U.S. Tech Lag on the Rise, United Press International (06/26/06), A. Darm
  • Wider Authority Urged for IT Managers, Federal Times (06/26/06) Vol. 42, No. 21, P. 8; A. Curl
  • New Research Center to Combat Identity Theft, TechNewsWorld (06/29/06), E. Morphy
  • A Culture of 'No', InformationWeek (06/26/06)No. 1095, P. 23; T. Claburn; E. Whiting; E. Malykhina

Δελτίο 31 -  01 Ιουλίου 2006

  • Auditor's Report Criticizes Florida's Voter Database, Computerworld (06/26/06) Songini, Marc
  • Some Rights Reserved: Advancing Flexible Copies New York Times (06/26/06) P. B1; Rohter, Larry
  • Modern Relics, Government Computer News (06/19/06) Vol. 25, No. 16,Jackson, William
  • Analysis Finds e-Voting Machines Vulnerable, USA Today (06/27/06) P. 14A; Α . Stone
  • US Cybersecurity Chief Abruptly Resigns, Associated Press (06/28/06)
  • Securing America's Power Grid, Iowa State University News Service (06/26/06)
  • Net Defenses May Be in Danger, Dallas Morning News (06/22/06), C. Harrison
  • US Unprepared for Net Meltdown, Blue Chips Warn, CNet (06/23/06), A. Broache
  • Cyberprotection Takes Center Stage, Washington Technology (06/26/06) Vol. 21, No. 12, P. 48; A. Lipowicz

Δελτίο 30 -  24 Ιουνίου 2006

  • Ambient Networking Solutions for Anytime, Anywhere, Anyplace Communication, IST Results (06/20/06)
  • Groups Push Alternate Net Neutrality Proposals, IDG News Service (06/20/06), G. Gross
  • Interview: Why DNS Defences Need Bolstering, IT Week (06/19/06), P. Muncaster
  • Keeping the Trust While Under Attack, Government Technology (06/20/06), Κ. Asborno
  • ICANN Needs to Clamp Down on Domain Name Abuse, CNet (06/21/06), D. Isenberg
  • RFID Tags: Driving Toward 5 Cents, EDN (06/08/06) Vol. 51, No. 12, P. 69; C. Murray
  • Debugging ZigBee Applications, Sensors (06/06) Vol. 23, No. 6, P. 16; A. Wheeler

Δελτίο 29 -  15 Ιουνίου 2006

  • Pentagon Sets Its Sights on Social Networking Websites, New Scientist (06/10/06), P. Marks
  • Specter Offers Compromise on NSA Surveillance, Washington Post (06/09/06) P. A4; W. Pincus
  • Hacktivists Mount Counter-Offensive to Internet Censorship, IT World Canada (06/08/06), N. Arellano
  • Inside the Spyware Scandal, Technology Review (06/06) Vol. 109, No. 2, P. 48; W. Roush
  • Wiretap Rules Are Same for Web Calls, Washington Post (06/10/06) P. D1; K. Hart
  • Security Onus Is on Developers, eWeek (06/12/06), P. Coffee
  • Brainstorming Ways to Push Open Source, IST Results (06/09/06)
  • Google Researchers Propose TV Eavesdropping, InformationWeek (06/07/06), T. Claburn
  • Momentum for Global Internet Regulation Mounting, E-Commerce Times (06/08/06), J. Koprowski
  • Deploying a Sensor Network in an Extreme Environment, University of Southampton (ECS) (06/11/06), K. Martinez; P. Padhy; A. Elsaify
  • Trust Me, I'm a Robot, Economist Technology Quarterly (06/06) Vol. 379, No. 8481, P. 18

Δελτίο 28 -  7 Ιουνίου 2006

  • Debating the Bugs of High-Tech Voting, Washington Post (05/΄30/06) P. A15; Z. Goldfarb
  • Incidents Prompt New Scrutiny of Airplane Software Glitches, Wall Street Journal (05/30/06) P. A1; D. Michaels; A. Pasztor
  • Codes on Sites 'Captcha' Anger of Web Users, Wall Street Journal (05/31/06) P. B1; D. Kesmodel
  • Why the Democratic Ethic of the World Wide Web May be About to End, New York Times (05/28/06) P. 9; A. Cohen
  • Internet Firms Told to Keep Records on Customers Longer, Washington Post (06/02/06) P. D5; M. Sherman
  • Data Mining: The New Weapon in the War on Terrorism?, Federal Computer Week (05/29/06) Vol. 20, No. 17, P. 38; A. Sternstein
  • Code Warriors Battle On, Washington Technology (05/29/06) Vol. 21, No. 10, P. 20; D. Beizer
  • Several Lawsuits Target E-Voting, USA Today (06/05/06) P. 1A; P. O'Driscoll
  • Government, Internet Firms in Talks Over Browsing Data, Washington Post (06/03/06) P. D3; F. Ahrens
  • Security Researchers to Produce New Tools, Concordia Journal (06/01/06) Vol. 1, No. 15, B. Black
  • Online Throngs Impose a Stern Morality in China, New York Times (06/03/06) P. A1; H. French
  • The Code That Keeps Your Fingerprints Secure, New Scientist (06/03/06), C. Biever
  • The Enemy Within: Terror by Computer, New Zealand Herald (06/01/06), J.L. Shreeve

Δελτίο 27 -  1 Ιουνίου 2006

  • Privacy Worries Over Web's Future, BBC News (05/24/06), J. Fildes
  • Too Much for NSA to Mine?, Government Computer News (05/22/06) Vol. 25, No. 13, P. Wait
  • When It Comes to Privacy, Gender Matters, UW News (05/23/06)
  • 'Google Hacking' Attacks Rising, Massey News (05/19/06
  • Hacking Your Prius, CNet (05/22/06), D. Terdiman
  • Champion of Cyberspace Faces Its Biggest Case Yet, San Francisco Chronicle (05/23/06) P. A1; B. Egelko
  • The Fight Against V1@gra (and Other Spam), New York Times (05/21/06) P. 3-1; T. Zeller
  • Perils of Transitive Trust in the Domain Name System, Cornell University (05/06), V. Ramasubramanian; E. G. Sirer
  • Will Your Vote Count in 2006?, Newsweek (05/29/06) Vol. 147, No. 22, P. 14; S. Levy
  • Certified Reputation--How an Agent Can Trust a Stranger, University of Southampton (ECS) (05/16/06), T. D. Huynh; N. Jennings; N. Shadbolt
  • Creating and Operating National-Scale Cyberinfrastructure Services,CTWatch Quarterly (05/06) Vol. 2, No. 2, C. Catlett; P. Beckman; D. Skow
  • While You Were Reading This, Someone Ripped You Off, Wired (05/06) Vol. 14, No. 5, P. 166; A. Newitz
  • Europe: No Patents for Software, ZDNet UK (05/25/06), Ι. Marson
  • Finding Computer Files Hidden in Plain Sight, Ames Laboratory (05/24/06)
  • Invention IDs Computer Users by Typing Patterns, University of Alabama (05/24/06)
  • Security Expert Recommends Net Diversity, Network World (05/22/06) Vol. 23, No. 20, P. 19; C. Marsan
  • Meet the Hackers, BusinessWeek (05/29/06)No. 3986, P. 58; S. Ante; B. Grow; R. Olearchyk


Δελτίο 26 -  26 Μαΐου 2006

  • Congress May Make ISPs Snoop on You, CNet (05/16/06), D. McCullagh
  • More E-Voting Concerns Surface With State Primaries Underway, The NewStandard (05/17/06), C. Komp
  • Nominee Says N.S.A. Stayed Within Law on Wiretaps, New York Times (05/19/06) P. A20; E. Lichtblau
  • Academia Welcomes New Thinking on Foreign Researchers and National Security, ResearchResearch (05/17/06)
  • Cyber Threats to U.S. Business Grow More Dangerous, Reuters (05/14/06), J. Rothstein
  • 'Mashup' Websites Are a Hacker's Dream Come True, New Scientist (05/13/06) Vol. 190, No. 2551, P. 28; P. Marks
  • Voice Encryption May Draw U.S. Scrutiny, New York Times (05/22/06) P. C11; J. Markoff
  • Researchers: Spend to Protect Against One Attack, Not Many, IDG News Service (05/19/06), J. Kirk
  • Only in America? Copyright Law Key to Global Free Software Model, Linux Insider (05/16/06), H. Meeker
  • DHS Privacy Office Bashes RFID Technology to Track People, TechWeb (05/18/06), L. Sullivan

Δελτίο 25 -  18 Μαΐου 2006

  • Reversing Course on Electronic Voting, Wall Street Journal (05/12/06) P. A4; J. Cummings
  • French Digital Music Copyright Bill Advances, New York Times (05/12/06) P. C3; T. Crampton
  • As Tech Advances, Privacy Laws Lag, Los Angeles Times (05/12/06) P. A1; J. Menn; J. Granelli
  • Three States Mandate More Security for Diebold E-Voting Machines, Associated Press (05/11/06), D. Goodin
  • AJAX Experts Tackle Security, eWeek (05/11/06), D. Taft
  • Mining Data to Nab Terrorists: Fair? Christian Science Monitor (05/15/06) P. 1; Μ. Clayton
  • States Beef Up E-Voting Security After Reports on Weaknesses, E-Commerce Times (05/12/06), Κ. Regan
  • China Says One of Its Scientists Faked Computer Chip Research, New York Times (05/14/06) P. 10; D. Barboza
  • MS Researchers Tackle Automated Malware Classification, eWeek (05/11/06), R. Naraine
  • Password Security Is Her Game, California State University, Long Beach (05/06) Vol. 58, No. 5, R. Manly
  • Young Cyber-Sleuths, Government Technology (05/06) Vol. 18, No. 5, P. 30; J. McKay

Δελτίο 24 -  12 Μαΐου 2006

  • Data Breach Notification Law Unlikely This Year, IDG News Service (05/05/06), G. Gross
  • RFID: Beyond the Drive for Five, Design News (04/24/06) Vol. 61, No. 6, P. 48; C. Murray
  • Voting Glitch Said to Be 'Disastrous', Inside Bay Area (CA) (05/10/06), Ι. Hoffman
  • CFP 2006: Life, Liberty and Digital Rights, TidBITS (05/08/06), J. Porten
  • USC Hacker Case Pivotal to Future Web Security, InformationWeek (05/09/06), L. Greenemeier
  • Cell-Phone Tracking: Laws Needed, Wired News (05/08/06), R. Singel
  • DNS Security: Most Vulnerable and Valuable Assets, IT Observer (05/08/06)
  • Defining Trust, SC Magazine (04/06) P. 26; D. Kaplan

Δελτίο 23 -  07 Μαΐου 2006

  • Guidelines For Radio Tags Aim to Protect Buyer Privacy, New York Times (05/01/06) P. C6; B. Feder
  • New Weapons Needed for the War on Junk Email, University of Calgary (04/27/06)
  • RFID and Tracking Systems--The High-Tech Future of Old Age? silicon.com (04/27/06), S. Ranger
  • Better Organization, Focus Needed for Cybersecurity, Government Computer News (04/27/06), W. Jackson
  • Bugs Put Widely Used DNS Software at Risk, IDG News Service (04/26/06), R. McMillan
  • New Software Protects Confidentiality of Data While Enabling Access and Sharing, Penn State Live (05/01/06)
  • Big Holes in Net's Heart Revealed, BBC News (04/28/06), Μ. Ward
  • RFID Standards Released IT by Vendors, Privacy Groups, IDG News Service (05/01/06), G. Gross

Δελτίο 22 -  29 Απριλίου  2006

  • Congress Readies New Digital Copyright Bill, CNet (04/23/06) McCullagh, Declan
  • Linux Desktop Growth Could Spur New Malware Activity, Computerworld (04/20/06) Lai, Eric
  • Danger: Authenticating Email Can Break It, CNet (04/19/06), J. Evers
  • Council Releases Blueprint for Federal Cybersecurity Research, GovExec.com (04/25/06), D. Pulliam
  • Robo-Ethics, Albany Times Union (NY) (04/21/06), M. Lisi
  • Software Insecurity: Plenty of Blame to Go Around, Government Computer News (04/18/06), W. Jackson
  • Your Thoughts Are Your Password, Wired News (04/27/06), L. Sandhana
  • New Software Protects Confidentiality of Data While Enabling Access and Sharing, Penn State Live (04/27/06), M. Hopkins, C. DuBois
  • An Antiphishing Strategy Based on Visual Similarity Assessment, Internet Computing (04/06), Vol. 10, No. 2, P. 58, W. Liu, X. Deng, G. Huang

Δελτίο 21 -  20 Απριλίου  2006

  • Report Details DMCA Misuses, InternetNews.com (04/14/06), D. Miller
  • Does Every Vote Count?, San Antonio Express-News (TX) (04/09/06), R. Chapa
  • Big Brother Is Listening, Atlantic Monthly (04/06) Vol. 297, No. 3, P. 65; J. Bamford
  • New RFID Travel Cards Could Pose Privacy Threat, CNet (04/18/06), D. McCullagh
  • Code for 'Unbreakable' Quantum Encryption Generated at Record Speed Over Fiber, NIST News (04/18/06)
  • Bringing Free Software to the Masses, ZDNet UK (04/13/06), I. Marson
  • DHS Still Gearing Up Response to Cyberthreats, Government Computer News (04/17/06), W. Jackson
  • Does Open Source Encourage Rootkits?, Network World (04/17/06) Vol. 23, No. 15, P. 1; E. Messmer

Δελτίο 20 -  15 Απριλίου  2006

  • Why VOIP Needs Crypto, Wired News (04/06/06), Β. Schneier
  • Wireless Sensor Networks Offer High-Tech Assurance for a World Wary of Earthquakes, EurekAlert (04/06/06)
  • Cradle of Liberty Lags on E-Voting, IEEE Distributed Systems Online (04/06) Vol. 7, No. 4, G. Goth
  • New Database Rejects Eligible Calif. Voters, Computerworld (04/07/06), M. Songini
  • Researcher: Security Risks in Web Services Largely Ignored, IDG News Service (04/07/06), R. McMillan
  • Research Reveals Phishing Hooks, BBC News (04/05/06)
  • Collaboration Will Investigate Vulnerabilities of Rapidly Growing Internet Phone and Multimedia Systems, EurekAlert (04/04/06)
  • Forging a National Cyber Security Strategy, SC Magazine (03/01/06) P. 48; A. Purdy
  • Systems Let Families Monitor Loved Ones, Myrtle Beach Sun News (SC) (04/10/06), K. Scharnber
  • Beware the Smart Virus, Byte and Switch (04/07/06), J. Rogers
  • The Worried Executive's Guide: Disaster Recovery Planning for Mixed-Hardware Environments, InformIT (04/07/06), L. Wrobel
  • Pirates See Days of Yore, Washington Times (04/07/06) P. C10; J. Bacchus

Δελτίο 19 -  8 Απριλίου  2006

  • MIT Researchers Attack Wireless Shortcomings, Phishing, Network World (04/04/06), Β. Brown
  • The Lessons of the $100 Laptop, eWeek (04/04/06), J. Spooner
  • US Takes Interest in DDoS Attacks, Computer Business Review (04/03/06), K. Murphy
  • Your Secrets Are Safe with Quasar Encryption, New Scientist (03/29/06), W. Knight
  • Building Better Applications: Beyond Secure Coding, Enterprise Systems (03/28/06), M. Schwartz
  • An Image of the Future: Graphical Passwords, Information Today (03/06) Vol. 23, No. 3, P. 39; D. Poulson
  • To Packed Crowd, Speaker Discusses Cyber Security Crisis, The Spectrum (04/07/2006), Τ. Halleck
  • A Pretty Good Way to Foil the NSA, Wired News (04/03/06), R. Singel
  • Beat Cybercrime, Switch to a Virtual Wallet, New Scientist (04/01/06) Vol. 190, No. 2545, P. 28; C. Biever

Δελτίο 18 -  4 Απριλίου  2006

  • Touch-Screen Voting Isn't the Answer, Baltimore Sun (03/31/06) P. 11A; J. Schneider
  • Device Warns You if You're Boring or Irritating, New Scientist (03/29/06), C. Biever

  • Researchers Cooperate to Create Better Ways of Finding Reliable Information Online, Chronicle of Higher Education (03/29/06), V. Kiernan
  • Everything, Everywhere, Nature (03/23/06) Vol. 440, No. 7083, P. 402; D. Butler
  • The Spies Inside, InformationWeek (03/27/06)No. 1082, P. 34; E. Chabrow
  • Seeking Changes to the DMCA, CNet (03/31/06) Broache, Anne; D. McCullagh

Δελτίο 17 -  30 Μαρτίου 2006

  • Voter Group Sues to Ban Touch-Screen System, San Francisco Chronicle (03/22/06) p. B2, J. Wildermuth

  • DNS Servers Do Hackers' Dirty Work, CNet (03/24/06), J. Evers

  • A Quantum Leap for Cryptography, Government Computer News (03/20/06), Vol. 25, No. 6, W. Jackson

  • Unsafe at Any Airspeed? IEEE Spectrum (03/06) Vol. 43, No. 3, p. 44, B. Strauss, M. Morgan, J. Apt

  • Primary Voting-Machine Troubles Raise Concerns for General Election, USA Today (03/28/06) P. 1A; J. Drinkard

  • Professor to Try to Hack Voting Machines, Pittsburgh Post-Gazette (03/27/06), J. Sherman
  • Council to Draw Up Cyberattack Response, Washington Technology (03/27/06), Lipowicz, Alice

Δελτίο 16 -  24 Μαρτίου 2006

  • CFP 2006 Explores Computer Freedom and Privacy Issues, Association for Computing Machinery (03/17/06)

  • Internet Panel Mulls Defenses Against New, Potent Attacks, Associated Press (03/16/06), T. Bridis

  • Google Prevails in Copyright Fight, Wall Street Journal (03/17/06) P. B4; K. Delaney

  • Let Me Hear Your Body Talk: UH Scientists Mine Biomedical Data, University of Houston News (03/15/06)

  • Researchers: Impact of Censorship Significant on Google, Other Search Engine Results, Network World (03/15/06)

  • Calit2 Researchers Deploy Disaster Communications Network at San Diego Mardi Gras Festivities, UCSD News (03/13/06), M. Curran, D. Ramsey

  • Αssociation for Computing Machinery Honors Pioneers of Verification Tools for Safe, Secure Software, AScribe Newswire (03/16/06)

  • RFID World Still Reacting Strongly to Virus Research, TechWeb (03/16/06) Sullivan, Laurie

  • Judge Grants Google a Reprieve, Wall Street Journal (03/20/06) P. B4

  • DOD Seeks Army of Cyborg Bugs, Computerworld (03/15/06) Songini, Marc L.

  • Enigma Project Cracks Second Code, BBC News (03/15/06)

Δελτίο 15 -  17 Μαρτίου 2006

  • Md. House Approves Paper Ballots, Washington Post (03/10/06) P. A1; Α. Marimow, Υ. Woodlee

  • FCC Brief on Electronic Surveillance Calms Colleges' Fears About Costs, Chronicle of Higher Education (03/10/06) Vol. 52, No. 27, P. A30; A. Foster

  • Aggregated Information Threatens Privacy, Norristown Times Herald (PA) (03/13/06), K. Phucas

  • Research on the Road to Intelligent Cars, IST Results (03/09/06)

  • Open Source Software Capability Key to 'Technological Self-Determination', LinuxElectrons (03/08/06)

  • Scientists Band Together for TRUST-worthy Research, SearchSecurity.com (03/07/06), N. McKay

  • Study Says Chips in ID Tags Are Vulnerable to Viruses, New York Times (03/15/06) P. C3; J. Markoff

  • Judge Says Google Must Hand Over Search Records, Washington Post (03/15/06) P. D1; Y. Noguchi

  • Security Hole Found in Crypto Program GPG, IDG News Service (03/13/06), J. Niccolai

  • VM Rootkits: The Next Big Threat?, eWeek (03/10/06), R. Naraine

  • IETF Taking on 911 Problem Within VoIP, Network World (03/13/06) P. 32; C.D. Marsan

Δελτίο 14 -  11 Μαρτίου 2006

  • Online Amateurs Crack Nazi Codes, BBC News (03/02/06), Α. Blenford

  • Tech Groups Urge Congress to Keep Net Neutrality, IDG News Service (03/02/06), G. Gross

  • China Splits From the Internet? Probably Not, Computer Business Review (03/01/06), K. Murphy

  • TIA Lives On, National Journal (02/25/06) Vol. 38, No. 8, P. 66; S. Harris

  • Open-Source Bug Hunt Results Posted, Government Computer News (03/06/06), J. Jackson

  • UM Engineers Pioneer Digital Fingerprinting to Catch Cyber Thieves, Newswise (03/07/06)

  • Hey Neighbour, Stop Piggybacking on My Wireless, New York Times (03/05/06) P. 1; M. Marriott, A. Zarate, G. Ruethling

  • Future Disruptive Technologies: The Perspectives of MIT & Stanford, Always On (02/01/06) Vol. 1, No. 4, P. 26; T. Byers

Δελτίο 13 -  05 Μαρτίου 2006

  • Taking Snooping Further, New York Times (02/25/06) P. B1; J. Markoff, S. Shane

  • Activists Warn of Rerun of Euro Software Patent Fight, IDG News Service (02/27/06), S. Taylor

  • Cyberthieves Silently Copy as You Type, New York Times (02/27/06) P. A1, T. Zeller

Δελτίο 12 -  27 Φεβρουαρίου 2006

  • ITU Eyes Role in RFID Standards, RFID Journal (02/16/06), J. Collins

  • Calls Made Over Skype Internet Service Make Eavesdropping Tougher, USA Today (02/17/06) P. 2B; P. Svensson

  • Understanding Elliptic-Curve Cryptography, Embedded Systems Design (02/06) Vol. 19, No. 2, P. 16; R. Lambert

  • Rise From the Machines: Surveillance Software Gets Smart, National Geographic News (02/22/06), Β. Harder

  • Guarding the Wire: A Career in Computer Security, Science (02/24/06), Α. Fazekas

  • Fingerprint Advances Will Fight Cybercrime, University at Buffalo News (02/22/06)

  • Hackers Beware! New Technique Uses Photons, Physics to Foil Codebreakers, University of Toronto (02/22/06), Ν. Wahl

  • Buyer Beware: Online Shopping Hazards Exposed by Amherst Computer Scie¬n¬tist, University of Massachusetts Amherst (02/21/06

  • Invasion of the Computer Snatchers, Washington Post Magazine (02/19/06) P. 10; Β. Krebs

  • Beyond Bar Codes: Turning Up Plastic Radio Labels, Science News (02/11/06) Vol. 169, No. 6, P. 83; P. Weiss

Δελτίο 11 -  20 Φεβρουαρίου 2006

  • Panel Sees Progress Made in Cybersecurity, CNet (02/14/06), J. Evers

  • Flawed Election Machines Leave Maryland Voters Guessing, Baltimore Sun (02/15/06), P. 13A; A. Rubin

  • Internet Firms to Defend Policies, Washington Post (02/15/06), P. D1; Y. Noguchi

  • Virtual Reality Prepares Soldiers for Real War, Washington Post (02/14/06), P. A1; J. A. Vargas

  • Denial-of-Service Attack-Detection Techniques, Internet Computing (02/06), Vol. 10, No. 1, P. 82; G. Carl; G. Kesidis; R. Brooks

  • Voter Databases Must Be Secured, Report Says, CNet (02/17/06), D. McCullagh

  • Calling Cryptographers, Technology Review (02/16/06), K. Greene

  • UC Santa Cruz Computer Scientist Fights Spam on Two Fronts, AScribe Newswire (02/15/06)

  • Cellphone Could Crack RFID Tags, Says Cryptographer, EE Times (02/14/06), R. Merrittl

Δελτίο 10 -  15 Φεβρουαρίου 2006

  • A Plug for the Unplugged $100 Laptop Computer for Developing Nations, New York Times (02/09/06) P. C3; R. Hal

  • Locking Down Our Digital Future, BBC News (02/08/06), M. Geist

  • US Plans Massive Data Sweep, Christian Science Monitor (02/09/06) P. 1; M. Clayton

  • Broadband Law Rewrite Planned for 2006, CNet (02/08/06), A. Broache

  • Academics Warn of 'Significant Threat' of Spyware Epidemic, SC Magazine (02/07/06), W. Eazel

  • 'States' Challenge: E-Voting Interoperability, Governing.com (02/09/06), Z. Patton

  • Turning the Worm Secures the Computer, New Scientist (02/04/06) Vol. 189, No. 2537, P. 32; C. Biever

  • Chinese Sensors of Internet Face 'Hacktivists' in U.S., Wall Street Journal (02/13/06) P. A1; G. Fowler

  • Wireless to Organize--and Maybe Save--Lives, Reuters (02/11/06), S. Carew

  • Security Gurus Report on the State of Cybersecurity at Demo 2006, ZDNet (02/08/06), D. Farber

  • Chips That Really Get Under Your Skin, CNet (02/08/06), T. Krazit

  • They Saved the Internet's Soul, Wired News (02/08/06), R. Singel

Δελτίο 9 -  9 Φεβρουαρίου 2006

  • Torvalds Says DRM Isn't Necessarily Bad CNet (02/03/06) S. Shankland

  • Increasingly, Internet's Data Trail Leads to Court New York Times (02/04/06) P. A1; S. Hansell

  • Millions Required for RFID Research RFID Journal (02/03/06) M. Roberti

  • College Receives Training Grant for Cybersecurity Maryland Gazette (02/01/06) Sedam, R. Sean

  • Electronic Voting on Rise, Study Says Associated Press (02/07/06), R. Tanner

  • 'Net Neutrality' Debate Heats Up at Senate Hearing Wall Street Journal (02/08/06) P. B7; E. A. Brown

  • The Spy Who Didn't Shag Me Slate (02/06/06), A. Schaffer

  • Nuclear War Over Software Patents? Business Week (02/06/06). L. Woellert

  • Ιt's Time to Arrest Cyber Crime Business Week (02/02/06) P. Horn

Δελτίο 8 - 6 Φεβρουαρίου 2006

  • Spyware poses a significant threat on the Net, according to new study Rob Harrill, rharrill@u.washington.edu

  • Forum tackles Internet regulation ISN SECURITY WATCH (31/01/06), E. Lyman, Rome

Δελτίο 7 - 30 Ιανουαρίου 2006

  • "Clean Up Your Digital Dirt Before It Trashes Your Job Search" Computerworld (via CareerJournal.com), January 17

  • "NJIT's SmartCampus Project to Create Closer Connections Among People & Places" New Jersey Institute of Technology (01/23/06)

  • "Internet Coalition Sets Up Anti-'Badware' Site" Washington Post (01/25/06) P. D4; M. Arshad

  • "Encryption Using Chaos" Technology Review (01/24/06); K. Greene

  • "Privacy for People Who Don't Show Their Navels" New York Times (01/25/06) P. 7; J. D. Glater

  • SA Spy Program Hinges on State-of-the-Art Technology" National Journal (01/20/06) Vol. 38, No. 3, P. 47; S. Harris

  • Expert Calls for Increased E-Voting Security" Computerworld (01/23/06) P. 14; M. Songini

  • Torvalds: No GPL 3 for Linux" CNet (01/26/06); S. Shankland

  • In Case About Google's Secrets, Yours Are Safe" New York Times (01/26/06) P. A1; A. Liptak

  • Senate Committee Considers Broadcast Flags to Combat Piracy" Medill News Service (01/25/06); M. Bell

  • Sensors Detect Icy Bridges" United Press International (01/17/06); G. Koprowski

  • The Search Continues" Government Computer News (01/23/06) Vol. 25, No. 2; B. Grimes

Δελτίο 6 - 23 Ιανουαρίου 2006

  • "The OCSIG Security News Overview, Canada" Security News Letter, Vol. 3, No. 2068, January 1, 2006

  • "Google Resists US Subpoena of Search Data" New York Times (01/20/06) P. A1; Κ. Hafner; Μ. Richtel

  • "In Threat to Internet's Clout, Some Are Starting Alternatives" Wall Street Journal (01/19/06) P. A1; C. Rhoads

  • "Most of State's Vote Machines Not Ready for Primary Time" Los Angeles Times (01/19/06); J. Pasco

  • "Indo-U.S. Cooperation to Tackle Cyber Crime" Cyber India Online (01/18/06)

Δελτίο 5 - 20 Ιανουαρίου 2006

  • "Waging War Through the Internet" San Francisco Chronicle (01/15/06) P. E1; J. Arquilla

  • "New GPL Free at Last" Wired News (01/16/06); M. Baard

  • "Congress Takes Aim at 'Analog Hole" TechNewsWorld (01/17/08); Mello Jr., P. John

  • "Mass Spying Means Gross Errors" Wired News (01/18/06); J. Granick

Δελτίο 4 - 14 Ιανουαρίου 2006

  • "Recruiter Interview: The Outlook For High-Level Hiring in 2006" CareerJournal.com, January 3

  • "U.S. Call Centers Spawn Subculture in India" Seattle Times (via Washington Post), January 8

  • "Homeland Security Helps Secure Open-Source Code" CNet (01/10/06); J. Evers

  • "Microsoft Research India to Work on Cryptography" Infoworld Netherlands (01/10/06); J. Ribeiro

  • "Security Conference Focuses on Collaboration" Telephony Online (01/10/06); T. McElligott

  • "The Legal and Practical Implications of Recent Attacks on 128-bit Cryptographic Hash Functions" First Monday (01/02/06) Vol. 11, No. 1; P. Gauravaram, et al.

  • "Computer Security Graphical Passwords" Technology News Daily (01/10/06)

  • "FBI Says Attacks Succeeding Despite Security Investments" SearchSecurity.com (01/11/06); B. Brenner

  • "European Union Is 50 Years Behind the United States for Innovation" Financial Times (01/13/06) P. 2; T. Buck

Δελτίο 3 - 9 Ιανουαρίου 2006

  • "Security Flaws on the Rise, Questions Remain" Security Focus (05/01/06); R. Lemos

  • "Better Robots Could Help Save Disaster Victims" New Scientist (05/01/06); K. Kleiner

  • "Panel Urges Paper Record of Electronic Votes" Richmond Times-Dispatch (VA) (06/01/06); T. Whitley

  • "Quantum Cryptography: When Your Link Has to Be Really, Really Secure" EDN Magazine (16/12/05) Vol. 50, No. 26, P. 41; B. Schweber

  • "Networking Tomorrow's Battlefields" Military & Aerospace Electronics (12/05) Vol. 16, No. 12, P. 26; J. McHale

  • "Are the Bad Guys Winning?" Campus Technology (06/01/05) Vol. 19, No. 5, P. 20; D. Gale

Δελτίο 2 - 5 Ιανουαρίου 2006

  •  "RSA CEO Sees Lack of Leadership in U.S. Cybersecurity Efforts" Computerworld (01/03/06); J. Vijayan

  •   "Voting 2.0" Chronogram (01/06); C. Gerber

  •  "CSI: The Net" Australian PC World (12/05) P. 65; B. Sterling

  •   "Information, Please" Baltimore Sun (01/01/06) P. 1F; L. Williams

Δελτίο 1 - 28 Δεκεμβρίου 2005

  • "What Tech Skills Are Hot for 2006?" - Computerworld (27/12/05); Τ. Hoffman

  • "The Thinkers: Data Privacy Drives CMU Expert's Work" - Pittsburgh Post-Gazette (26/12/05); Μ. Roth

  • "New Breed of Cyber Attack Takes Aim at Sensitive Data"  - USA Today (27/12/05) P. 1B; J. Swartz