Δελτίο 138 - 30 Δεκέμβρη 2008

  • Profs Stand Up to Secure Laptops, Pittsburgh Tribune-Review (12/01/08), M. Cronin
  • Estonia to Use Mobile Phones to Simplify E-Voting, IDG News Service (12/15/08), M. Ricknas
  • Plugging a Password Leak, Technology Review (12/19/08), R. Kremen
  • US Not Ready for Cyber Attack, Reuters (12/19/08), R. Mikkelsen
  • 'Smart' Surveillance System May Tag Suspicious or Lost People, Ohio State University Research News (12/16/08), P. F. Gorder

Δελτίο 137 - 15 Δεκέμβρη 2008

  • Saying 'Cheese' for More Effective Border Security, National Institute of Standards and Technology (11/25/08), Β . Stein
  • Paper Ballots Touted as Most Secure, The Denver Post (12/02/08), J. Ingold
  • You're Leaving a Digital Trail. What About Privacy? The New York Times (11/30/08), J. Markoff
  • U.S. Is Losing Global Cyberwar, Commission Says, BusinessWeek (12/07/08), Κ . Epstein
  • Thieves Winning Online War, Maybe Even in Your Computer, New York Times (12/06/08) P. A1; Y. Markoff
  • New Tool to Audit the Use of Private Data, University of Southampton (ECS) (12/05/08), J. Lewis
  • Safer, Better, Faster: Addressing Cryptography's Big Challenges, ICT Results (12/04/08)
  • DHS Creates Privacy Principles for Scientific Research, CNet (12/09/08), S. Condon
  • Hackers, Others Seek DMCA Exemptions, Wired News (12/03/08), D. Kravets
  • 'Privacy Will End in 2013', Financial Times - Digital Business (12/03/08) P. 6; J. Shillingford
  • Carnegie Mellon CyLab Survey Unveils Major Gap in the Way U.S. Boards and CEOs Manage Cyber Risks, Carnegie Mellon News (12/02/08), C. Swaney

Δελτίο 136 - 30 Νοέμβρη 2008

  • EPSRC Funds Cybersecurity Research, Engineering & Physical Sciences Research Council (11/19/08)
  • IT Security Education Continues to Evolve, CSO Online (11/17/08), G. Spafford; J. Goodchild
  • Obama Administration to Inherit Tough Cybersecurity Challenges, Computerworld (11/19/08), J. Vijayan

Δελτίο 135 - 20 Νοέμβρη 2008

  • Cops Enlist HAL in Fight Against Crime, silicon.com (11/05/08), N. Heath
  • E-Voting Backers, Watchdogs Hope to Smooth Out Bumps Next Time, Computerworld (11/10/08), T. Weiss
  • North Carolina Uses Bar Codes to Match Voters With Ballots, Government Computer News (11/03/08), W. Jackson
  • Why Veins Could Replace Fingerprints and Retinas as Most Secure Form of ID, Times Online ( UK ) (11/11/08), M. Harvey
  • New Techniques Easier, More Secure, Columbian (WA) (11/09/08), T. Vogt
  • An Algorithm With No Secrets, Technology Review (11/18/08), E. Naone
  • The First Metropolitan Quantum Cryptography Network Will Be Available in Spain by 2010, Universidad Politecnica de Madrid (11/07/08)

Δελτίο 134 - 10 Νοέμβρη 2008

  • A Picture Is Worth a Thousand Locksmiths, UCSD News (10/29/08), D. Kane
  • Ε-Voting Groups Are Watching a Handful of States, IDG News Service (11/02/08), G. Gross
  • Scientists Crack Possible Future Quantum Computer Age Encryption, TG Daily (11/03/08), W. Gruener
  • IBM Researchers Show Off New Weapon in Fight Against Online Fraud, eWeek (10/29/08), B. Prince
  • On Security, Microsoft Reports Progress and Alarm, New York Times (11/03/08) P. B9; J. Markoff
  • Optical Firewall Aims to Clear Internet Security Bottlenecks, ICT Results (10/29/08)
  • Board Urges Full Funding of Cybersecurity Initiative, NextGov.com (11/05/08), B. Brewin

Δελτίο 133 - 31 Οκτώβρη 2008

  • Thousands Face Mix-Ups in Voter Registrations, Washington Post (10/18/08) P. A1; Μ. Flaherty
  • ACM Experts See Opportunities and Risks for E-Voting, AScribe Newswire (10/15/08)/
  • Researchers Expect Hackers to Prey on Cell Phones, Associated Press (10/15/08), J. Robertson
  • Users, Enterprises Pay for Poor Privacy Policies, Study Says, Dark Reading (10/07/08), T. Wilson
  • Increased Retail Security With Smart Items, Fraunhofer Institute (10/08), M. Briele
  • Newcastle Scientists Help Microsoft and Yahoo Improve Online Security, Newcastle University (10/21/08)
  • Keyboard Sniffers to Steal Data, BBC News (10/21/08)
  • Beware the Digital Zombies, New York Times (10/21/08) P. B1; J. Markoff
  • Rice Students Challenge Electronic Voting Machines, Converge (10/13/08)
  • National Cybersecurity Initiative R&D Effort Launched, Federal Computer Week (10/14/08), B. Bain
  • A Really Secret Ballot, Economist (10/22/08)
  • Photo Safeguards Confidential Information, University of Twente (10/27/08)
  • Princeton Report Rips N.J. E-Voting Machines as Easily Hackable, Computerworld (10/27/08), T. Weiss
  • ACM Experts Say Heavy Voter Turnout Will Test New Voter Registration Systems, AScribe Newswire (10/28/08)
  • Good Code, Bad Computations: A Computer Security Gray Area, UCSD News (10/27/08), D. Kane
  • New 3-D Image Systems to Provide Reliable Face Biometrics, University of Hertfordshire (10/28/08)

Δελτίο 132 - 22 Οκτώβρη 2008

  • Cambridge Lab Sets Quantum Key World Record, Techworld (10/09/08), J. Dunn
  • Q&A: E-Voting Security Results 'Awful,' Says Ohio Secretary of State, Computerworld (10/08/08), B. Friedman
  • How Much Security Do You Expect From Your Pacemaker?, University of Massachusetts Amherst (10/03/08)
  • Researchers Show How to Crack Popular Smart Cards, InfoWorld (10/07/08), B. de Winter
  • Giant Database Plan 'Orwellian', BBC News (10/15/08)
  • Feds, Industry Announce Centre for Identity Management Research, GovExec.com (10/07/08), J. Aitoro
  • E-Voting Report: Several States Still Vulnerable, IDG News Service (10/16/08), G. Gross
  • Tools That Will Discreetly Tap a Shoulder to Offer Help, Financial Times Digital Business (10/08/08) P. 4; M. Branscombe

Δελτίο 130 - 30 Σεπτέμβρη 2008

  • Cyber Attack Data Sharing Is Lacking, Congress Told, Washington Post (09/19/08) P. D2; E. Nakashima
  • Electoral Apocalypse? e-Voting Woes Remain as Election Nears, Ars Technica (09/21/08), J. Sanchez
  • US Focusing Cybersecurity on Backdoors in Tech Products, IDG News Service (09/15/08) , G. Gross
  • reCAPTCHA: Human-Based Character Recognition via Web Security Measures, Science (09/12/08) Vol. 321, No. 5895, P. 1465; L. von Ahn; B. Maurer; C. McMillen
  • Eugene Spafford: Protecting the Internet From the Criminal Element, Science News (09/13/08) Vol. 174, No. 6, P. 32; S. Gaidos
  • US Urged to Go on Offense in Cyberwar, United Press International (09/29/08), S. Waterman
  • Conference Will Key on Improving Internet Security, New Brunswick Business Journal ( Canada ) (09/29/08), D. Shipley
  • Spoofing GPS Receivers, Cornell News (09/19/08), A. Ju

Δελτίο 129 - 20 Σεπτέμβρη 2008

  • Researchers Build Malicious Facebook Application, IDG News Service (09/05/08), J. Kirk
  • Safer Skies for the Flying Public, EurekAlert (09/03/08)
  • U.N. Agency Eyes Curbs on Internet Anonymity, CNet (09/12/08), D. McCullagh
  • Standards for Accreditation of Labs That Test Voting Machines Inconsistent, NextGov.com (09/10/08), J. Aitoro
  • D.C. Election Glitch Blamed on Equipment, Washington Post (09/11/08) P. A1; N. Stewart; E. Silverman ; P. Flaherty
  • US Sees Six 'Disruptive Technologies' By 2025, Computerworld (09/11/08), P. Thibodeau
  • Hackers Hit Large Hadron Collider Web Site, Computerworld (09/12/08) , G. Keizer
  • Putting a 'Korset' on the Spread of Computer Viruses, American Friends of Tel Aviv University (09/09/08)
  • Threat From DNS Bug Isn't Over, Experts Say, Dark Reading (09/08/08), T. Wilson
  • Critics: Homeland Security Unprepared for Cyber-threats, CNet (09/17/08), S. Condon
  • Voting Group Release Guidelines for E-Voting Checks, IDG News Service (09/15/08), G. Gross

Δελτίο 128 - 10 Σεπτέμβρη 2008

  • Internet Traffic Begins to Bypass the U.S., New York Times (08/30/08) P. B1; J. Markoff
  • Computer Viruses Make it to Orbit, BBC News (08/27/08)
  • Public, Private Sectors at Odds Over Cyber Security, Los Angeles Times (08/26/08), J. Menn
  • Terror Threat System Crippled by Technical Flaws, Says Congress, Computerworld (08/27/08), P. Thibodeau
  • Indian Researcher's Improved Anti-Hacking System for Wireless Networks, Asian News International (09/04/08)
  • MIT Lincoln Laboratory Software Aims to Thwart Cyber Hackers, MIT News (08/27/08)
  • Protecting Your Vote With Invisible Ink, Discover (09/04/08), M. Lafsky

Δελτίο 127 - 31 Αυγούστου 2008

  • Risk Assessment Planned for Voting Systems, Government Computer News (08/19/08), W. Jackson
  • Simple and Secure Networked Home, ICT Results (08/18/08)
  • Planning to E-Vote? Read This First, Scientific American (08/18/08), L. Greenemeier D. Caruso
  • E-Voting Vendor: Programming Errors Caused Dropped Votes, IDG News Service (08/22/08), G Gross
  • A New Breed of Hackers Tracks Online Acts of War, Washington Post (08/27/08) P. D1; K. Hart
  • Revealed: The Internet's Biggest Security Hole, Wired News (08/26/08), K. Zetter
  • Carnegie Mellon System Thwarts Internet Eavesdropping, Carnegie Mellon News (08/25/08), B. Spice

Δελτίο 126 - 25 Αυγούστου 2008

  • Judge Refuses to Lift Gag Order on MIT Students in Boston Subway-Hack Case Com­puter­world (08/14/08), J. Vijayan
  • Experts Accuse Bush Administration of Foot-Dragging on DNS Security Hole, Wired News (08/13/08), R. Singel
  • Can Avatars Stop Identity Theft?, Salon.com (08/05/08), D. Caruso
  • Patch for Web Security Hole Has Some Leaks of Its Own, New York Times (08/09/08) P. B1; J. Markoff
  • Web Privacy on the Radar in Congress, New York Times (08/11/08) P. C1; S. Clifford
  • Ohio Official Sues E-Voting Vendor for Lost Votes, IDG News Service (08/08/08), G. Gross
  • Researchers Develop Next-Generation Antivirus System, University of Michigan News Service (08/05/08), N. C. Moore
  • Indiana University Department of Computer Science Study Shows Popular Web Sites at Risk for Phishers , Indiana University (07/30/08)
  • Officials Say Flaws at Polls Will Remain in November, New York Times (08/16/08) P. A10; I. Urbina
  • Some Russian PCs Used to Cyberattack Georgia , USA Today (08/18/08) P. 1B; B. Acohido
  • Researchers Craft Multimedia Passwords, Techworld (08/14/08), J. Dunn
  • Before the Gunfire, Cyberattacks , New York Times (08/13/08) P. A1; J. Markoff
  • Web-Security Inventor Charts a Squigglier Course, Wall Street Journal (08/13/08) P. B5; E. Smith
  • US at Risk of Cyberattacks, Experts Say, CNN (08/18/08), B. Griggs

Δελτίο 125 - 12 Αυγούστου 2008 j

  • Attackers' Behavior Builds Better Blacklists, Security Focus (07/24/08), R . Lemos
  • A Photo That Can Steal Your Online Credentials, IDG News Service (08/01/08), R. McMillan
  • Cloud Computing's Perfect Storm?, Technology Review (08/07/08), J. Borland
  • Open-Source E-Voting Gets LinuxWorld Test Run, Computerworld (08/06/08), T. Weiss
  • Hacking Electronic Toll Systems, CNet (08/06/08), E. Mills
  • EFF Launches Coders' Rights Site at Black Hat Conference, Ars Technica (08/06/08), J. Timmer

Δελτίο 124 - 31 Ιουλίου 2008

  • When the Phone Goes With You, Everyone Else Can Tag Along,, Washington Post (07/12/08) P. A1; Ε . Nakashima
  • Printer Dots Concern Privacy Advocates, USA Today (07/14/08) P. 3A; Τ . Frank
  • Goodbye to Faulty Software?, ICT Results (07/15/08)
  • Enigma Variations, Economist (07/10/08) Vol. 388, No. 8588, P. 88
  • DNS Flaw Discoverer Says More Permanent Fixes Will Be Needed, Computerworld (07/17/08), J . Vijayan
  • Google Is Watching, Perhaps Soon in Your Home, InformationWeek (07/11/08), T. Claburn
  • Software Helps Developers Get Started With PIV Cards, National Institute of Standards and Technology (07/09/08), E. Brown
  • ReCaptcha: Reusing Your 'Wasted' Time Online, CNet (07/16/08), S. Olsen
  • Details of Major Internet Flaw Posted by Accident, IDG News Service (07/21/08), R. McMillan
  • CCTV Camera Identifies People by Race, IDG News Service (07/14/08), J. Kirk
  • Attack Code Released for New DNS Attack, New York Times (07/24/08), R. McMillan
  • Data Can Leak from Partially Encrypted Disks, IDG News Service (07/16/08), R. McMillan
  • Dartmouth Begins Network Security Project, Access Control & Security Systems (07/15/08)
  • Researcher to Demonstrate Attack Code for Intel Chips, IDG News Service (07/14/08), S. Lemon
  • Keeping Up With Your Peers, Securely, ICT Results (07/21/08)
  • RFID Unlocks Supply Chain Potential, ICT Results (07/17/08)

Δελτίο 123 - 13 Ιουλίου 2008

  • Flaws in Medical Coding Can Kill, Baltimore Sun (06/30/08) P. 1A; J. Rockoff
  • Cisco, IBM, Intel, Juniper and Microsoft Fight Cyber Terror Together, Network World (06/27/08), Τ . Greene
  • Q&A: E-Voting Activist More Optimistic About This Year's Voting Systems, Computerworld (07/03/08), T. Weiss
  • Spying Has Few Legal Checks, Baltimore Sun (07/07/08) P. 1A; B. Olson
  • UK Scientists Demo Graphic Passwords, CNet (07/01/08), C. Lombardi
  • A Tax on Buggy Software, Forbes (06/26/08), A. Greenberg
  • Major DNS Flaw Could Disrupt the Internet, Network World (07/08/08), Ε . Messmer
  • Electronic Path to Bridge Safety, The Australian ( Australia ) (07/01/08), J. Foreshew
  • Identity Problems, National Journal (07/05/08) Vol. 40, No. 27, P. 22; E. Carney
  • Study: Electronic Voting Increased Counting Errors in France, IDG News Service (07/09/08), P. Sayer
  • Senate Grapples With Web Privacy Issues, Washington Post (07/10/08) P. D3; P. Whoriskey

Δελτίο 122 - 29 Ιουνίου 2008

  • Compressed Web Phone Calls Are Easy to Bug, New Scientist (06/12/08), D. Robson
  • Beware, Your Computer May Betray You, New Scientist (06/07/08) Vol. 198, No. 2659, P. 26; C. Barras
  • Technology Leaders Favor Online ID Card Over Passwords, New York Times (06/24/08) P. C8; L. Flynn
  • University of Portsmouth Researchers Work on CCTV That Can Hear, Computer Business Review (06/25/08), Β. Navuluri
  • Rogue Code Could Seriously Skew US Presidential Election Results, IT Business Canada (06/25/08), B. Jackson

Δελτίο 121 - 23 Ιουνίου 2008

  • Call for Participation: 2008 ACM Workshop on Secure Web Services (SWS), XML Daily Newslink (06/10/08)
  • 'Herds' of Wary Cars Could Keep an Eye Out for Thieves, New Scientist (06/05/08), D. Robson
  • Researchers Say Notification Laws Not Lowering ID Theft, IDG News Service (06/05/08), R. McMillan
  • Space Station Could Beam Secret Quantum Codes by 2014, Scientific American (06/08), J. Minkel
  • Can Computer Scientist Dream Team Clean Up E-Voting?, Network World (06/10/08)
  • Information Accountability, Com. of the ACM (06/08) Vol. 51, No. 6, P. 82; D. Weitzner, H. Abelson, T. Berners-Lee
  • New Intrusion Tolerance Software Fortifies Server Security, George Mason University (06/16/08)

Δελτίο 120 - 12 Ιουνίου 2008

  • Call It Predictable: Cellphone Users Are Easy to Find, New York Times (06/05/08) P. A23; J. Schwartz
  • A New Way to Protect Computer Networks From Internet Worms, Ohio State University Research News (06/04/08)
  • Second Annual National Institute on CyberLaw: Expanding the Horizons, Association for Computing Machinery (06/06/08)
  • China's Cyber-Militia, National Journal (05/31/08) Vol. 40, No. 29, P. 16; S. Harris
  • Information at Thieves' Fingertips, Times Union (06/05/08), L. Rulison
  • Secret Messages Could Be Hidden in Net Phone Calls, New Scientist (06/02/08), P. Marks
  • To Fight Cyberwars, Air Force Recruits Part-Time Geeks, Christian Science Monitor (06/05/08) P. 3; J. Lasker
  • Researchers Look to Cut Quantum Cryptography Costs, eWeek (05/29/08), B. Prince
  • Tapping Computer Science for a More ACCURATE Vote, National Science Foundation (06/09/08), D. Cruikshank
  • Dartmouth Launches Network Security Study, Dartmouth News (06/10/08), S. Knapp
  • New Zealand Gov't Looks to Boost Confidence in E-voting, Computerworld New Zealand (06/06/08), S. Bell
  • 'Net Engineer Argues Firewalls Are a Security Distraction, Computerworld Australia (05/30/08), S. Bell

Δελτίο 119 - 5 Ιουνίου 2008

  • Web Vote Offered to Military Abroad, Miami Herald (05/26/08), G. Fineout
  • Managing Computer Fraud, EurekAlert (05/23/08)
  • Voting 2.0. Part 2: The Open Source Proposition, Linux Insider (05/30/08), Κ. Noyes
  • To Make a Security Point, Hackers Tweak an Implantable Pacemaker, Sacramento Bee (CA) (05/17/08) P. A4; P. Dahlberg
  • Exploiting Security Holes Automatically, Technology Review (06/03/08), Ε. Naone
  • Malicious Software Threatens Internet Economy, New Scientist (06/02/08), C. Barras; Τ. Simonite

Δελτίο 118 - 30 Μάη 2008

  • Alarming Open-Source Security Holes, Technology Review (05/20/08), S. Garfinkel
  • Proponents, Critics Give No Ground in Tussle Over E-voting, Computerworld (05/19/08) Vol. 42, No. 21, P. 12; T. Weiss; G. Gross; R. McMillan
  • Homeland Security Helps Reduce Open Source Flaws, InternetNews.com (05/20/08), S.M. Kerner
  • Researchers Find New Ways to Steal Data, IDG News Service (05/19/08), R. McMillan
  • Inside Lockheed Martin's Wireless Security Lab, Network World (05/19/08), B. Reed
  • Cryptography Expert Wins ACM Award for Advances in Protecting Privacy of Information Retrieval, AScribe Newswire (05/22/08)
  • E-Voting Banned by Dutch Government, InterGovWorld.com (05/21/08), A. Udo de Haes
  • Experts Warn of Cyber Terrorism Threat, Associated Press (05/20/08), J. Zappei; C. Vatvani
  • Army Aims to Take Guesswork Out of Cyber-defense, Government Computer News (05/20/08) W. Jackson
  • Senators: No Need for Paper E-Voting Trails, 'Electronic' Ones Are OK, CNet (05/23/08), Α. Broachel

Δελτίο 117 - 21 Μάη 2008

  • Information Tags Along Everywhere You Go, Baltimore Sun (05/11/08) P. 1A; L. Kay
  • NSA Attacks West Point! Relax, It's a Cyberwar Game, Wired News (05/10/08), D. Axe
  • Electronic Voting System Tested at University, Newcastle University (05/14/08
  • Linkoping University Researchers Break 'Unbreakable' Crypto, Linkoping University (04/21/08), L. Falklof
  • Swarming Spy Bots That Share Information Being Built for Military, Computerworld (05/09/08), S. Gaudin
  • CFP 08 Computer Security Experts Debate Political, Economic, Social Impacts of Tech-no¬logy Policy, AScribe Newswire (05/15/08)
  • Report: Government's Cyber Security Plan Is Riddled With New Spying Programs, Wired News (05/15/08), Ρ. Singel

Δελτίο 116 - 12 Μάη 2008

  • White House Plans Proactive Cyber-Security Role for Spy Agencies, Washington Post (05/02/08), B. Krebs
  • Electronic 'Pet' Could Replace Passwords and PIN, New Scientist (05/02/08), C. Barras
  • Ballot Box Blues, Government Computer News (04/28/08) Vol. 27, No. 9, Dizard III, P. Wilson
  • USACM Urges Congress to Build in Safeguards for Automated Employment Checks, AS¬cribe Newswire (05/06/08)
  • Pentagon Wants Cyberwar Range to 'Replicate Human Behavior and Frailties', Wired News (05/05/08), Ν. Shachtman
  • Huge Databases Offer a Research Gold Mine--and Privacy Worries, Chronicle of Higher Education (05/09/08) Vol. 54, No. 35, P. A10; D. Glenn
  • Botnet Beaten, But Now What?, eWeek (05/05/08) Vol. 25, No. 14, P. 13; R. Naraine
  • Careful With That Call, Government Computer News (05/05/08) Vol. 27, No. 10, W. Jackson

Δελτίο 115 - 5 Μάη 2008

  • FBI's Net Surveillance Proposal Raises Privacy, Legal Concerns, CNet (04/25/08), D. McCullagh
  • Few States Take Email Votes From Troops, Associated Press (04/27/08), L/ Baldor
  • Florida Alters Its Voting Laws, But New Disputes May Emerge, New York Times (04/28/08) P. A1; D. Cave
  • Patches Pose Significant Risk, Researchers Say, SecurityFocus (04/23/08), R. Lemos
  • Shibboleth Authentication Tool Upgraded, Government Computer News (04/22/08), W. Jackson
  • One Breach Is One Too Many in Cyber Warfare, Monterey County Herald (CA) (04/29/08), Κ. Howe
  • Information Security Set for Explosive Growth, Campus Technology (04/24/08), D. Nagel
  • Critical Infrastructure Central to Cyber Threat, Federal Computer Week (04/24/08), B. Bain
  • Experts Struggle With Cybersecurity Agenda, Government Computer News (04/28/08), W. Jackson
  • Digital Deception, Washington Post (05/01/08) P. D1; P. Whoriskey
  • Malicious Hardware May Be Next Hacker Tool, New Scientist (05/01/08), M. Inman
  • Phantom Obama Vote Appears on NJ Voting Machine, Wired News (04/30/08), K. Zetter
  • Beating the Codebreakers With Quantum Cryptography, ICT Results (04/28/08)
  • Social Networking Applications Can Pose Security Risks, Associated Press (04/28/08), M. Irvine

Δελτίο 114 - 30 Απρίλη 2008

  • Malicious Microprocessor Opens New Doors for Attack, IDG News Service (04/15/08), R. McMillanS
  • Security Experts Split on 'Cyberterrorism' Threat, Reuters (04/16/08), M. Trevelyan
  • Positioning Systems Used by iPhone and iPod Breached, ETH Life (04/17/08), R. Cosby
  • Robots, Games, Hackers: First IT-Olympics at Iowa State Celebrates Computer Smarts, Iowa State University News Service (04/16/08), D. Jacobson
  • FBI Organizes Defense Against Cyber-Attacks, United Press International (04/21/08), S. Waterman
  • Congressman to Press on With Paper-Ballot Emergency Voting Bill, Computerworld (04/18/08), T. Weiss
  • Researchers Tout 'Functional Encryption' That Knows Who's Who, Network World (04/21/08), E. Messmer
  • To Defeat a Malicious Botnet, Build a Friendly One, New Scientist (04/22/08), Μ. Inman

Δελτίο 113 - 22 Απρίλη 2008

  • US Presidential Election Can Be Hacked, IDG News Service (04/10/08), R. McMillan
  • US Cyber Readiness Lagging, Panel Says, Network World (04/09/08), N. Weinberg
  • NIST Shows On-Card Fingerprint Match Is Secure, Speedy, NIST Tech Beat (04/01/08), E. Brown
  • N.J. Voting Technology in Question After Discrepancies in February Vote, Daily Princetonian (04/14/08), J. Wolff
  • Cryptographers Speak of Threats, Voting and Blu-Ray Rumors, CNet (04/08/08), R. Vamosi
  • Needed: A 'Turing Machine' for Security, Government Computer News (04/11/08), W. Jackson
  • 'Big Brother' Buildings Offer Less Invasive Security, New Scientist (04/09/08), M. Iman
  • Programmers, DIY Types Embrace Soft, Hackable Chumby, Wired News (04/15/08), B. Gardiner
  • UW to Lead $6.25 Million Project Creating Electronic Sherlock Holmes, UW News (04/16/08), H. Hickey
  • Security From Chaos, US Department of Homeland Security (04/16/08), G. Cleere
  • Ensuring Security for Cognitive Radio Networks Goal of CAREER Award Research, EurekAlert (04/15/08), L. Crumbley
  • Cybersecurity Issues Misunderstood, Experts Tell Congress, Defense News (04/07/08) Vol. 23, No. 14, P. 53; W. Matthews

Δελτίο 112 - 12 Απρίλη 2008

  • ACM Committee on Women Honors Worldwide Leader in Cryptography Research, AScribe Newswire (04/01/08)
  • Centers Tap Into Personal Databases, Washington Post (04/02/08), P. A1; R. O'Harrow
  • Voters Trust Touch-Screen Machines, Studies Show, IDG News Service (03/26/08), R. Weiss; G. Gross
  • Cybercrime Is in a State of Flux, Guardian Unlimited (UK) (03/27/08), G. Knight
  • Canadian Voting Machine Enters American Political Machine, InterGovWorld.com (03/27/08), R. Lombardi
  • European Union, NATO to Tackle Cyber-crime, Associated Press (03/31/08)
  • US Reveals Plans to Hit Back at Cyber Threats, ZDNet (04/02/08)
  • Security Pros Launch Open-Source CERT, eWeek (04/03/08), R. Naraine
  • US Moots System for Data Sharing on Cyber Threats, Financial Times (04/09/08) P. 2; Κ. Allison
  • Vote Device May Get Push, Milwaukee Journal Sentinel (04/07/08), Α. Johnson

Δελτίο 111 - 2 Απριλίου 2008

  • Τechnology Policy in the Information Age: Computer Security Experts Debate Political, Social and Economic Impacts, AScribe Newswire (03/24/08)
  • Americans Still Wary of Voting Machines for 2008, Agence France Presse (03/23/08)
  • Professor: Computers Plus People Equals Risk, IDG News Service (03/27/08), J. Kirk
  • NIST Unveils Tool to Foil Attacks via DNS, Government Computer News (03/25/08), D. Campbell
  • UW Team Researches a Future Filled With RFID ChipsSeattle Times (03/31/08), Κ. Heim
  • Mashup Security, Technology Review (03/31/08), Ε. Naone
  • IBM Project Seeks Privacy Controls for Users, IDG News Service (03/28/08), J. Fontana
  • Researchers Secure the Browser, eWeek (03/24/08) Vol. 25, No. 10, P. 16; R. Naraine

Δελτίο 110 - 27 Μαρτίου 2008

  • Lecturer Criticizes Accuracy of the Voting Process, Oregon Daily Emerald (03/13/08), Τ. Davis
  • Bush Pushes Cybersecurity, USA Today (03/14/08) P. 6A; R. Wolf
  • Some Viruses Come Pre-Installed, Associated Press (03/13/08), J. Robertson
  • Researchers Create Next-Generation Software to Identify Complex Cyber Network At­tacks, George Mason University (03/17/08), J. Edgerly
  • Voting-Machine Maker to Princeton Researcher: 'Hands Off', Wall Street Journal (03/18/08), J. Kronholz
  • Voting for More Than Just Either-Or, MIT News (03/14/08), D. Chandler
  • The Future of Voting IT, Government Computer News (03/10/08), W. Jackson
  • Plan to Use Paper Ballots in November Is Reversed in Colorado, New York Times (03/21/08) P. A14; K., Johnson
  • Outsider to Run Cyber-Security Initiative, Wall Street Journal (03/20/08) P. A8; S. Gorman
  • After Threats, NJ Clerks Call for E-Voting Investigation, IDG News Service (03/20/08), R. McMillan
  • Defending Laptops from Zombie Attacks, Technology Review (03/21/08), K. Greene
  • Terror on the Internet: A Complex Issue, and Getting Harder, IEEE Distributed Systems Online (03/08) Vol. 9, No. 3, G. Goth
  • E-Voting Vendor's Web Site Hacked, IDG News Service (03/20/08) Montalbano, Elizabeth; R. McMillan

Δελτίο 109 - 14 Μαρτίου 2008

  • The New Art of War, Washington Post (03/03/08) P. A15; W. Pincus
  • Secure and Easy Internet Voting, Computer (02/08) Vol. 41, No. 2, P. 08; G. Beroggi
  • Online Vote Discussed for Florida, Miami Herald (03/08/08), M. Merzer
  • 'Gambling DNA' Helps Fight Online Fraud, New Scientist (03/05/08)
  • Unique Locks on Microchips Could Reduce Hardware Piracy, University of Michigan News Service (03/05/08)
  • Computer Security Team to Report Hacking Into Defibrillator-Pacemaker, New York Times (03/12/08) P. C4; J. Feder
  • Military Networks Increasingly Are Under Attack, Wall Street Journal (03/12/08) P. A7; Y. Dreazen
  • Cyber Preparedness Symposium Leaves Unanswered Questions, Dark Reading (03/07/08), T. Wilson

Δελτίο 108 - 06 Μαρτίου 2008

  • STOP Terrorism Software, University of Maryland (02/25/08), L. Tune
  • The E-Voting Paradox, Government Computer News (02/25/08), W. Jackson
  • Put Trust in Your Pocket: CSIRO's Trust Extension Device, CSIRO (02/19/08), J. Finlay
  • Sniffing Out Insider Threats, EurekAlert (02/19/08), A. Ang
  • House Lawmakers Question Privacy in Cyber-Security Plan, Washington Post (02/29/08) P. D3; Β. Krebs
  • Ohio 'Paper' Vote System to Debut With Flaws, University of Maryland (02/27/08), N. Tickner
  • Get Out Your Pencils: Paper Ballots Make a Return, USA Today (02/29/08) P. 2A; R. Wolf
  • US Seeks Terrorists in Web Worlds, BBC News (03/03/08), C. Vallance
  • Wireless Worms Will Follow Influenza's Example, New Scientist (02/26/08), W. Knight
  • Researchers Hack 'Tamper-Proof' PIN Terminals, ZDNet UK (02/26/08), T. Espiner

Δελτίο 107 - 27 Φεβρουαρίου 2008

  • Princeton Researchers Envision a More Secure Internet Princeton University (02/15/08), Τ. Riordan
  • Friendly 'Worms' Could Spread Software Fixes New Scientist (02/14/08), Τ. Simonite
  • With Improvements, E-Voting Could Be Good, Says Researcher CNet (02/16/08), R. Vamosi
  • Mistakes, Not Hackers, Are to Blame for Many Data-Security Glitches on Campuses, Report Says, Chronicle of Higher Education (02/12/08), J. Young
  • Replicating Virtual Servers Vulnerable to Attack, Network World (02/15/08), T. Greene
  • A Method for Stealing Critical Data New York Times (02/22/08) P. C1; J. Markoff
  • Securing Cyberspace Among Top Technological Challenges of 21st Century, Panel Says Network World (02/19/08)
  • Black Hat Conference: Experts Develop Cybersecurity Recommendations for Next President, InformationWeek (02/20/08), N. Hoover
  • Scientists Demand an Ethical Education in Computer Engineering Innovations Report (02/21/08), F. Flores
  • Researchers Say Sharing Is the Key to Privacy for EPC Tags RFID Journal (02/14/08), M. O'Connor
  • DNS Inventor Warns of Next Big Threat Dark Reading (02/11/08), K. Higgins

Δελτίο 106 - 20 Φεβρουαρίου 2008

  • States Prepare for Tests of Voting-System Changes New York Times (02/05/08) P. A14; Ι. Urbina
  • Auditor's Report Inconclusive on Florida Undervote Mishap Network World (02/08/08), G. Gross
  • Web Browsing, Search, and Online Ads Grow More Risky, Google Says InformationWeek (02/12/08), T. Claburn
  • Workplace Autopilot Threatens Security Risk Perception University of Leeds (02/08/08)
  • Wearable Tracking Tags Test Privacy Boundaries at the U. of Washington Chronicle of Higher Education (02/15/08) Vol. 54, No. 23, P. A15; R. Dotinga

Δελτίο 105 - 06 Φεβρουαρίου 2008

  • Digital Identification Plan Still Facing Many Hurdles Investor's Business Daily (01/29/08) P. A5; D. Howell
  • Voting With (Little) Confidence Technology Review (01/29/08), E. Naone
  • Face Recognition Made Possible AlphaGalileo (01/25/2008)
  • Cyberadvice Awaits the Next President Government Computer News (01/21/08) Vol. 27, No. 2, W. Jackson
  • University of Virginia Engineering School Student Probes Facebook's Vulnerabilities University of Virginia (01/30/08)
  • Getting CERIAS About Security Network World (01/31/08), Μ. Kabay
  • Paper Outlines Methods for Beating Anonymity Technology Dark Reading (01/30/08), Τ. Wilson
  • Prof. Aims to Improve Internet Security Wisconsin State Journal (01/26/08), Η. LaRoi
  • Q&A: For E-Voting, Holt Looks to Undo HAVA's Havoc Computerworld (02/04/08), D. Radcliff

Δελτίο 104 - 30 Γενάρη 2008

  • All-Mail Vote in Colorado Isn't Needed, Governor Says, New York Times (01/24/08) P. A18; K. Johnson
  • A 'Swift' Kick to the Secure Development Process, Dark Reading (01/18/08), N. Spande
  • Bush Looks to Beef Up Protection Against Cyberattacks, Wall Street Journal (01/28/08) P. A8; S. Gorman
  • At Florida Polls, Touch Screens and Crossed Fingers, Washington Post (01/27/08) P. A8; P. Whoriskey
  • 'Biometrics' Used to Identify Terrorists, Advertiser (AU) (01/22/08), S. Riches
  • Decertification Dilemma, Government Technology (12/07) Vol. 20, No. 12, M. Douglas

Δελτίο 103 - 24 Γενάρη 2008

  • Could Post-Ballot Audits Renew Faith in U.S. Elections? Computerworld (01/16/08), T. Weiss
  • Who Invented the Firewall? Dark Reading (01/15/08), K. Higgins
  • Voters Respond Favorably to Touch Screen Voting Equipment, University of Michigan News Service (01/14/08), J. Wadley
  • Q&A: Ohio Secretary of State Looks Anew at E-Voting, Computerworld (01/14/08), B. Friedman
  • USACM Fears Increased Risk to Identity Theft From Implementation Rules for National ID Plan, AScribe Newswire (01/16/08)
  • Penn State Researchers Help Identify Weaknesses in Ohio Voting Machines, Penn State Live (01/15/08), C. Chan
  • Weak Control System Security Threatens US, Government Computer News (01/16/08), J. Jackson
  • Touch Screen Voting a Hit; Critics Miss Mark on Security, Study Says, University of Maryland (01/22/08)
  • SC Voting Machines Prompt Calls for Federal Action, Cybercast News Service (01/22/08), Μ . Bansal
  • Researcher 'Cracks' Yahoo Anti-Scam Feature, Techworld (01/18/08), Μ . Broersma
  • Cyber Espionage Seen as Growing Threat to Business, Government, Network World (01/17/08), Ε . Messmer
  • IP Addresses Are Personal Data, EU Regulator Says, Associated Press (01/22/08), A. White
  • Student Develops Anti-Spam Program, Stanford Daily (01/16/08), A. Sy

Δελτίο 102 - 16 Γενάρη 2008

  • A Paper Trail for Voting Machines, New York Times (01/07/08) P. A25; W. Poundstone
  • German Activist Move to Block E-Voting, Computerworld (01/08/08) , J. Kirk
  • Fraudsters Beware: Iowa State Engineer Is Developing Cyber Technology to Find You, Iowa State University News Service (12/27/07), M. Krapfl
  • Malware Honeypots Wait for '08, InfoWorld (12/28/07), M. Hines
  • Individual Privacy Under Threat in Europe and US, Report Says, Associated Press (12/30/07)
  • As Primary Season Ramps Up, an E-Voting Snapshot, Computerworld (01/08/09), T. Weiss
  • Open Source Code Contains Security Holes, InformationWeek (01/08/08), C. Babcock
  • Big Brother Really Is Watching, Computerworld (01/14/08), R. Mitchell
  • New Predictive Approach Seeks to Stay Ahead of Hackers, EE Times (01/11/08), S. Riley
  • South Carolina Officials See No Problems With Touch-Screen Voting Machines, Anderson Independent-Mail (SC) (01/12/08), D. Williams
  • Bank Card Attack: Only Martians Are Safe, ZDNet Australia (01/11/08), L. Tung
  • Q&A: New Technologies Pose Online Privacy Uncertainties, Rotenberg Claims, Computerworld (01/02/08), P. Thibodeau

Δελτίο 101 - 8 Γενάρη 2008

  • FBI Prepares Vast Database of Biometrics, Washington Post (12/22/07) P. A1; E. Nakashima, R. Drezen
  • Computer Security Expert Martin Abadi Garners Outstanding Innovation Award, UC Santa Cruz (12/21/2007), K. Schmidt
  • Paper Ballots Go High Tech, St. Petersburg Times (FL) (12/26/07), B. Varian
  • Wi-Fi Routers Are Vulnerable to Viruses, New Scientist (12/22/07), Z. Merali
  • Tests in Ohio Point to E-Voting Insecurities, Computerworld (12/31/07), T. Weiss
  • Electronic Passports Raise Privacy Issues, Washington Post (01/01/08) P. A6; E. Nakashima
  • Human factors researchers test voting systems for seniors that can improve accuracy and speed for voters of all ages, Human Factors and Ergonomics Society (12/20/07)
  • Computer Terrorism Becomes a Concern Patriot-News (PA) (12/25/07), G. Lenton