Δελτίο 165 - 30 Δεκέμβρη 2009
- Scientists Promise an End to Web Attacks, V3.co.uk (12/07/09), D. Neal
- In Shift, US Talks to Russia on Internet Security, New York Times (12/13/09) P. A1; J. Markoff; A. Kramer
- Carnegie Mellon Researcher Says Privacy Concerns Could Limit Benefits From Real-Time Data Analysis, Carnegie Mellon News (12/17/09), Β. Spice
- As Attacks Increase, U.S. Struggles to Recruit Computer Security Experts, Washington Post (12/23/09) P. A1; Ε. Nakashima; Β. Krebs
- Obama Cyber Czar Choice Worries About Smartphones, Social Networking, Network World (12/22/09), Τ. Greene
- Securing the Information Highway, Foreign Affairs (12/09), Vol. 88, No. 6, P. 2, W. Clark, P. Levin
Δελτίο 164 - 5 Δεκέμβρη 2009
- Trust Linux! ICT Results (11/20/09)
- 'Fingerprinting' RFID Tags: Researchers Develop Anti-Counterfeiting Technology, University of Arkansas (11/19/09), Μ. McGowan
- Building Real Security With Virtual Worlds, University of Maryland (11/26/09), N. Tickner
- Proper Use of English Could Get a Virus Past Security, New Scientist (11/27/09), R. Blincoe
- University Unites Industry, Gov to Tighten Energy Sector Cybersecurity, NextGov.com (11/24/09), J. Aitoro
- Research Group to Tackle Cybersecurity, InfoWorld (12/01/09), G. Gross
Δελτίο 163 - 25 Νοέμβρη 2009
- Researchers Develop a Facial Biometrics System Capable of Creating a Facial DNI, Carlos III University of Madrid (Spain) (11/04/09)
- Is AES Encryption Crackable?, TechNewsWorld (11/03/09), J. Germain
- Rutgers Computer Scientists Work to Strengthen Online Security, Rutgers University (11/09/09), C. Blesch
- Web Security Tool Copies Apps' Moves, Technology Review (11/09/09), C. Mims
- Breaking the Botnet Code, Technology Review (11/11/09), R. Lemos
- NIST Test Proves 'the Eyes Have It' for ID Verification, National Institute of Standards and Technology (11/03/09), E. Brown
- How Secure Is Cloud Computing?, Technology Review (11/16/09), D. Talbot
- A New Tool for Real-Time Credit Card Fraud Prevention, Universidad Politecnica de Madrid (Spain) (11/12/09), Ε. Martinez
- Facebook Offers Poor Personal Data Protection, SINTEF (11/17/09)
- Hackers Create Tools for Disaster Relief, CNet (11/15/09), Ε. Mills
- Are Nations Paying Criminals for Botnet Attacks?, Network World (11/17/09), Ε. Messmer
Δελτίο 162 - 10 Νοέμβρη 2009
- Scan of Internet Uncovers Thousands of Vulnerable Embedded Devices, Wired News (10/23/09), Κ. Zetter
- In Industry First, Voting Machine Company to Publish Source Code, Wired News (10/27/09), Κ. Zetter
- Thwarting Cyber Criminal, Norwegian University of Science and Technology (10/30/09)
- US Cyber War Policy Needs New Focus, Experts Say, Computerworld (10/29/09), G. Gross
- NC State Research Shows Way to Block Stealthy Malware Attacks, NCSU News (11/03/09) Shipman, Matt
- First Test for Election Cryptography, Technology Review (11/02/09), E. Naone
- New Honeypot Mimics the Web Vulnerabilities Attackers Want to Exploit, Dark Reading (10/29/09), K. Higgins
- A New System Preserves the Right to Privacy in Internet Searches, Platforma SINC (11/05/09)
- Prototype Security Software Blocks DDoS Attacks, Network World (10/05/09), Τ. Greene
Δελτίο 161 - 30 Οκτώβρη 2009
- Prototype Security Software Blocks DDoS Attacks, Network World (10/05/09), Τ. Greene
- Household Robots Do Not Protect Users' Security and Privacy, Researchers Say, UW News (10/08/09), H. Hickey
- Seeking Privacy in the Clouds, Duke University News & Communications (10/13/09), Μ. Basgall
- Q&A: Defcon's J. Moss on Cybersecurity, Government's Role, CNet (10/16/09), E. Mills
- Tracking Devious Phishing Websites, Technology Review (10/16/09), E. Naone
- UAB International Conference Focuses on Preventing High-Capacity Computer Data Theft, University of Alabama at Birmingham (10/14/09), A. Hayenga
- Field Experiment on a Robust Hierarchical Metropolitan Quantum Cryptography Network, Science in China Press (10/16/09), H. ZhengFu
- NSF's Cyber-Network Now Expands Across the Northern Hemisphere and Connects Half the Globe, National Science Foundation (10/14/09), L.-J. Zgorski
- Vulnerability Seen in Amazon's Cloud-Computing, Technology Review (10/23/09), D. Talbot
- To Protect Your Privacy, Hand Over Your Data, New Scientist (10/22/09), V. Venkatraman
Δελτίο 160 - 10 Οκτώβρη 2009
- Code Breakthrough Delivers Safer Computing
- New Digital Security Program Doesn't Protect as Promised
- Researchers Hijack a Drive-By Botnet
Δελτίο 159 - 29 Σεπτεμβρίου 2009
- Machines Can't Replicate Human Image Recognition--Yet, Penn State Live (09/09/09), J. Spinelle
- AFOSR Funds Super-Fast, Secure Computing, Air Force Print News (DC) (09/08/09), M. Callier
- Surveillance Software Solves Security Snag, University of Adelaide (09/14/09), C. Gibson
- EU Funding 'Orwellian' Artificial Intelligence Plan to Monitor Public for 'Abnormal Behavior', Telegraph.co.uk (09/19/09), I. Johnston
- Controlling the Language of Security, Science Centric (09/19/09)
- UK's Centre for Cyber-Security Opens at Queen's, Queen's University Belfast (09/23/09), L. McElroy
- Ants vs. Worms: Computer Security Mimics Nature, Wake Forest University (09/21/09), E. Frazier
Δελτίο 158 - 15 Σεπτεμβρίου 2009
- Filtering Network Attacks With a 'Netflix' Method, Dark Reading (08/28/09), J. Higgins
- Still Trying to Crack Nazi Enigma Messages, Network World (08/31/09), B. Brown
- Privacy Plug-In Fakes Out Facebook,Technology Review (09/09/09), R. Lemos
- Researchers Find a New Way to Attack the Cloud, IDG News Service (09/03/09), R. McMillan
- ACM Statement Regarding British Prime Minister Gordon Brown's Apology on the Treatment of Alan Turing, ACM (09/11/09), W. Hall
- A Turing Test for Computer Game Bots, Technology Review (09/10/09), D. Kushner
- Stimulus Funds to Further Cyber Security Research, Penn State Live (09/08/09), J. Spinelle
Δελτίο 157 - 31 Αυγούστου 2009
- Hackers Stole IDs for Attacks, Wall Street Journal (08/17/09), S. Gorman
- Internet 'Immune System' Could Block Viruses, New Scientist (08/12/09)
- Web Tools Help Protect Human Rights Activists, Reuters (08/19/09), J. Finkle
- NSF Defers to Universities on Ethical Standards, Chronicle of Higher Education (08/20/09), P. Basken
- Online Social Networks Leak Personal Information to Third-Party Tracking Sites, Worcester Polytechnic Institute (08/24/09), Μ. Dorsey
- Defying Experts, Rogue Computer Code Still Lurks, New York Times (08/26/09), J. Markoff
- New Attack Cracks Common Wi-Fi Encryption in a Minute, IDG News Service (08/27/09), R. McMillan
Δελτίο 156 - 17 Αυγούστου 2009
- Halted '03 Iraq Plan Illustrates U.S. Fear of Cyberwar Risk, The New York Times (08/01/09), J. Markoff; T. Shanker
- A Police Woman Fights Quantum Hacking and Cracking, American Friends of Tel Aviv University (07/30/09)
- Τop Cybersecurity Aide at White House Resigns, The Washington Post (08/04/09) P. A3; Ε. Nakashima
- New Epidemic Fears: Hackers, The Wall Street Journal (08/04/09) P. A6; Β. Worthen
- Warning Issued on Web Programming Interfaces, Technology Review (08/05/09), Ε. Naone
- US Web-Tracking Plan Stirs Privacy Fears, Washington Post (08/11/09) P. A2; S. Hsu; C. Kang
- Napolitano: Cybersecurity Issues Remain Unresolved, CongressDaily (08/04/09), C. Strohm
- Microsoft Team Traces Malicious Users, Technology Review (08/13/09), R. Lemos
Δελτίο 155 - 30 Ιουλίου 2009
- Catching Spammers in the Act, Technology Review (07/15/09), R. Lemos
- Web's Anonymity Makes Cyberattack Hard to Trace, New York Times (07/17/09) P. A5; J. Markoff
- Argonne Develops Program for Cyber Security 'Neighborhood Watch, Argonne National Laboratory (07/16/09), B. Cooper
- Algorithms to Stop Net Threats, Australian IT (07/15/09), J. Foreshew
- Touch Typists Could Help Stop Spammers in Their Tracks, Newcastle University (07/14/09)
- New Technology to Make Digital Data Self-Destruct, New York Times (07/20/09), J. Markoff
- Trust But Verify: Security Risks Abound in the IT Supply Chain, Government Computer News (07/17/09)
- Government Is Falling Behind on Cybersecurity, Report Finds, Washington Post (07/23/09) P. A19; J. Davidson
- New Software Helps Us Understand How Viruses Evolve, University of Southampton (ECS) (07/23/09)
- A Contest to Train Cyber Combatants, Technology Review (07/24/09), R. Lemos
- DNS Security, Net Neutrality Up for Debate at IETF Meeting, Network World (07/22/09), C. Marsan
- Can Computers Decipher a 5,000-Year-Old Language? Smithsonian.com (07/20/09), D. Zax
- Researchers Try to Stalk Botnets Used by Hackers, New York Times (07/27/09), J. Markoff
- Clarkson Project Will Protect Cyberspace, Watertown Daily Times (NY) (07/22/09), A. Jacobs
Δελτίο 154 - 15 Ιουλίου 2009
- Chinese Delay Plan for Censor Software, Wall Street Journal (07/01/09) P. A1; L. Chao; J. Dean; B. Lin
- Cybersecurity Plan to Involve NSA, Telecoms, The Washington Post (07/03/09) P. A1; E. Nakashima; S. Hsu; C. Johnson
- US Takes Aim at Cyberwarfare, The Washington Times (07/02/09) P. B1; Waterman, Shaun
- Weakness in Social Security Numbers Is Found, The New York Times (07/06/09), J. Markoff
- Twente Researcher Develops Self-Learning Security System for Computer Networks, University of Twente (07/01/09), J. Bruysters
- Building a Crash-Proof Internet, New Scientist (06/29/09), B. Davis
- South Korean Web Sites Are Hobbled in New Round of Attacks, The Washington Post (07/10/09) P. A14; Β. Harden
- Researchers Help Set Security Standards for the Internet, Dartmouth News (07/07/09), S. Knapp
- The Next Hacking Frontier: Your Brain?, Wired News (07/09/09), H. Leggett
- IBM Security Software Masks Confidential Info, Network World (07/09/09), M. Cooney
Δελτίο 153 - 30 Ιουνίου 2009
- Iran's Web Spying Aided By Western Technology, Wall Street Journal (06/22/09) P. A1, C. Rhoads, L. Chao
- Cell Phones That Listen and Learn, Technology Review (06/22/09), K. Grifantini
- NTSB to Look at Possible Computer Role in D.C. Crash, Computerworld (06/23/09), P. Thibodeau
- House S&T Committee Discusses Cyberspace Policy Review Report With Federal, Agencies, Computing Research Association (06/19/09), N. Gandomi
- IBM Claims Privacy Breakthrough for Cloud, Data, InternetNews.com (06/25/09), A. Goldman
- Iranian Protesters Avoid Censorship With Navy Technology, Washington Times (06/26/09), E. Lake
- Community Colleges Mobilize to Train Cybersecurity Workers, Chronicle of Higher Education (06/26/09) Vol. 55, No. 40, P. A17, M. Parry
- Scars, Marks, and Tattoos: A Soft Biometric for Identifying Suspects and Victims, SPIE (06/15/09), A. Jain, J.-E. Lee
Δελτίο 152 - 21 Ιουνίου 2009
- China Dominates NSA-Backed Coding Contest, Computerworld (06/08/09), P. Thibodeau
- Is the Hacking Threat to National Security Overblown?, Wired News (06/03/09), R. Singel
- China Faces Criticism Over New Software Censor, New York Times (06/10/09), Α. Jacobs; Χ. Yang
- Social Networks Keep Privacy in the Closet, Technology Review (06/11/09), Ε. Naone
- Experts Urge Federal Efforts on Cybersecurity, Federal Computer Week (06/10/09), Β. Bain
- Privacy May Be a Victim in Cyberdefense Plan, New York Times (06/13/09) P. A1; T. Shanker, D. Sanger
- Secret War on Web Crooks Revealed, Financial Times (06/15/09) P. 18, M. Palmer
- Experts Say Chinese Filter Would Make PCs Vulnerable, New York Times (06/13/09) P. A6, A. Jacobs
- E-Mail Surveillance Renews Concerns in Congress, New York Times (06/16/09), J. Risen, Ε. Lichtblau
- Navy Wants Proposals on Cyber Research, Federal Computer Week (06/15/09), Β. Bain
- China Intent on Requiring Internet Censor Software, New York Times (06/19/09) P. A8, E. Wong, A. Vance
Δελτίο 151 - 10 Ιουνίου 2009
- Obama Outlines Coordinated Cyber-Security Plan, New York Times (05/29/09), D. Sanger; J. Markoff
- EU Security Agency Warns on European Network Resilience, VNUNet (05/28/09), D. Bailey
- When the Country Called: How a Team of Academic Experts Contributed to the President's Cyberspace Review, National Science Foundation (05/29/09), M. Zacharias
- The Obama Administration's Silence on Privacy, New York Times (06/02/09), S. Hansell
- NIST Delivers Updated Draft Standards for Electronic Voting Machines, NIST Tech Beat (06/02/09), C. Boutin
- Is Internet Voting Safe? Vote Here, Wired News (06/04/09), Κ. Poulsen
- Study: Web Trackers Systematically Compromise Users' Privacy, Dark Reading (06/03/09), T. Wilson
- Obama Administration Begins Work on Cybersecurity R&D, NextGov.com (06/03/09), A. Noyes
Δελτίο 150 - 30 Μάη 2009
- EC Wants Software Makers Held Liable for Code, ZDNet UK (05/08/09), Τ. Espiner
- Cadets Trade the Trenches for Firewalls, New York Times (05/11/09) P. A1, C. Kilgannon, Ν. Cohen
- Does Anti-Piracy Software on Video Games Open Security Risks on Users' Computers, University of Michigan News Service (05/04/09), N. C. Moore
- Mathematical Advances Strengthen IT Security, European Science Foundation (05/11/09), S. Valleley
- Tracking Cyberspies Through the Web Wilderness, New York Times (05/12/09) P. D3, J. Markoff
- World's First Quantum Cryptography Network Developed in China, Chinese Academy of Sciences (05/07/2009)
- A Blueprint to Stop Browser Attacks, Technology Review (05/14/09), E. Naone
- Is the U.S. Ready for Government-Sponsored Cyberattacks?, Network World (05/12/09), E. Messmer
- Are Your 'Secret Questions' Too Easily Answered?, Technology Review (05/18/09), R. Lemos
- ICANN: Apply Public Health Response Model to E-Security, IDG News Service (05/18/09), J. Gliddon
- Viral Epidemics Poised to Go Mobile, National Science Foundation (05/21/09), L. van Pay; D. Cruikshank
- Pentagon Plans New Arm to Wage Computer Wars, New York Times (05/29/09) P. A1, D. Sanger, T. Shanker
Δελτίο 149 - 24 Μάη 2009
- Cadets Trade the Trenches for Firewalls, New York Times (05/11/09), P. A1, C. Kilgannon, N. Cohen
- Does Anti-Piracy Software on Video Games Open Security Risk on Users' Computer, University of Michigan News Service (05/04/09), N. C Moore
- Mathematical Advances Strengthen IT Security, European Science Foundation (05/11/09), S. Valleley
- Tracking Cyberspies Through the Web Wilderness, New York Times (05/12/09) P. D3, J. Markoff
- World's First Quantum Cryptography Network Developed in China, Chinese Academy of Sciences (05/07/2009)
- A Blueprint to Stop Browser Attacks, Technology Review (05/14/09), E. Naone
- Is the U.S. Ready for Government - Sponsored Cyberattacks?, Network World (05/12/09), E. Messmer
- Are Your 'Secret Question' Too Easily Answered?, Technology Review (05/18/09), R. Lemos
- ICANN: Apply Public Health Response Model to E-Security, IDG News Service (05/18/09), J. Gliddon
Δελτίο 148 - 10 Μάη 2009
- Panel Advises Clarifying US Plans on Cyberwar, New York Times (04/30/09) P. A18; J. Markoff; T. Shanker
- Software: The Eternal Battlefield in the Unending Cyberwars, Computerworld (04/27/09), G. Anthes
- Computer Hackers R.I.P. - Making Quantum Cryptography Practical, Institute of Physics (30/04/09)
- Cyber-Command May Help Protect Civilian Networks, Washington Post (05/06/09) P. A4; E. Nakashima
- Unmasking Social-Network Users, Technology Review (05/06/09), E. Naone
- How Hackers Can Steal Secrets From Reflections, Scientific American (04/27/09), W. Gibbs
- Examining Social Networking for Terrorists to Find People Behind Terrorist Attacks, Inderscience Publishers (05/05/09)
- Researchers Take Over Dangerous Botnet, Dark Reading (05/04/09), K. Jackson-Higgins
Δελτίο 147 - 30 Απρίλη 2009
- Hathaway Advocates for Direct White House Role on Cybersecurity,Computerworld (04/23/09), J. Vijayan
- Carnegie Mellon Computer Scientists Develop Method for Verifying Safety of Computer-Controlled Devices, Carnegie Mellon News (04/20/09), B. Spice
- US Steps Up Effort on Digital Defenses, New York Times (04/27/09), D. Sanger; J. Markoff; Τ. Shanker
- Europe Funds Secure Operating System Research, IDG News Service (04/27/09), J. Kirk
- Clandestine Defense Hub Prepares to Open at UM, Baltimore Sun (04/28/09), D. Wood
Δελτίο 146 - 23 Απρίλη 2009
- Our Ears May Have Built-In Passwords, New Scientist (04/13/09), P. Marks
- Implementation Plan for Voting System Requirements Set,Government Computer News (04/07/09), W. Jackson
- UCL Study: Natural 'Barcodes' Help Us Recognise Faces, UCL News (04/04/09)
- Control of Cybersecurity Becomes Divisive Issue,New York Times (04/17/09) P. A16; J. Risen; E. Lichtblau
- Eyeball Spy Turns the Tables on Big Brother, New Scientist (04/14/09), P. Marks
- Innovation: Harnessing Spammers to Advance AI, New Scientist (04/17/09), C.Barras
- Software Improves P2P Privacy By Hiding in the Crowd, Northwestern University News Center (04/08/09)
- Study: People Manage Their Privacy on Facebook Naturally, Helsinki Institute for Information Technology (04/20/09) Noronen, Visa
- Dialect Detectives, MIT News (04/16/09), D. Ryan
- Once Smartphones Become Truly Common, So Will the Viruses That Attack Them, Northeastern University News (04/14/09), R. Nyul
Δελτίο 145 - 15 Απρίλη 2009
- Vast Spy System Loots Computers in 103 Countries, New York Times (03/29/09), J. Markoff
- Experts See Early Activity From the Conficker Worm, New York Times (04/01/09) P. A14; J. Markoff
- Intruder Alert: TAU's 'Smart Dew' Will Find You! American Friends of Tel Aviv University (03/26/09)
- Advances in Data Safety Drawing Wider Attention, University of Texas at Dallas (03/25/09), D. Moore
- Senate Legislation Would Federalize Cybersecurity, The Washington Post (04/01/09), J. Warrick; W. Pincus
- Purdue, Rutgers Will Lead $30 Million U.S. Homeland Security Research Center, Purdue University News (04/02/09), F. Fiorini
- French Lawmakers Reject Internet Piracy Bill, Associated Press (04/09/09), S. Sayare
- Researchers Enhance Spam Call Filtering, Helsinki University of Technology (04/02/09)
- Should Online Scofflaws Be Denied Web Access? New York Times (04/13/09) P. B4; Ε. Pfanner
- Cyber Spying a Threat, and Everyone Is in on It, Associated Press (04/09/09), P. Haven
- A New Technology to Secure Integrated Systems and Circuits, Centre National de la Recherche Scientifique (04/02/09), L. Louis
Δελτίο 144 - 30 Μάρτη 2009
- Noise Could Mask Web Searchers' IDs, New Scientist (03/07/09), P. Marks
- NIST Suggests Areas for Further Security Metrics Research, Government Computer News (03/09/09), W. Jackson
- Berners-Lee: Semantic Web Will Have Privacy Built-In, ZDNet UK (03/12/09), T. Espiner
- Many See Privacy on Web as Big Issue, Survey Says, New York Times (03/16/09) P. B5; S. Clifford
- Researchers: Cheap Scanners Can 'Fingerprint' Paper, IDG News Service (03/09/09), R. McMillan
- Sending Out Internet Warnings for Outages, Viruses, Science Daily (03/16/09)
- Cyberattack Mapping Could Alter Security Defense Strategy, SearchSecurity.com (03/10/09), Α. Howard
- White House Cyber Adviser--More Questions Than Answers, CNet (03/26/09), S. Condon
- Survey Suggests Economy Could Lead to Cybercrime Increase, Purdue University News (03/18/09), J. Bush
- Scholarship Program Targets Need for Cybersecurity Skills, Government Computer News (03/23/09), R. Walker
- Improving the Security of Internet Exchanges, National Center for Scientific Research (France) (03/13/09), C. Le Poulennec
- Experts See Shortfall in Cybersecurity Research, InternetNews.com (03/19/09), K. Corbin
- Diebold Admits Systemic Audit Log Failure; State Vows Inquiry, Wired News (03/17/09), Z. Zetter
- Safer Net Surfing Is Goal of NIST Domain Name Security Experts, NIST Tech Beat (03/10/09), E. Brown
Δελτίο 143 - 15 Μάρτη 2009
- Computer Scientists Deploy First Practical Web-Based Secure, Verifiable Voting System, Harvard University (03/05/09), M. Rutter
- Fight Over Internet Filtering Has a Test Run in Europe New York Times (03/09/09) P. B7; K. O'Brien
- A Struggle Over US Cybersecurity Washington Post (03/10/09) P. A11; B. Krebs
Δελτίο 142 - 5 Μάρτη 2009
- Obama Taps Bush Aide Melissa Hathaway to Review Federal Cybersecurity Efforts Computerworld (02/09/09), J. Vijayan
- P2P Networks Rife With Sensitive Health Care Data, Researcher Warns Computerworld (01/30/09), J. Vijayan
- Sensors Help Keep the Elderly Safe, and at Home New York Times (02/13/09) P. A1; J. Leland
- Microsoft Announces $250,000 Conficker Worm Bounty Network World (02/12/09), H. Messmer
- Sniffing Out Illicit BitTorrent Files Technology Review (02/12/09), D. Graham-Rowe
- Proposed Law Might Make Wi-Fi Users Help CopsIDG News Service (02/20/09), S. Lawson
- Does Better Security Depend on a Better Internet?Computing Community Consortium (02/21/09), P. Lee
- For a Poisoned Internet, No Quick Fix Forbes (02/19/09), A. Greenberg
- Improved Sensor Technology Could Someday Keep Tabs on Terrorists by Remote Control, Rochester Institute of Technology (02/12/09), S. Gawlowicz
- Researchers Say Gazelle Browser Offers Better Security Campus Technology (02/26/09), K. Mackie
- Report From Dartmouth's Institute for Information Infrastructure Protection (I3P) Makes Cyber Security Research Recommendations, Dartmouth News (02/19/09), S. Knapp
- US Spy Agency May Get More Cybersecurity Duties Reuters (02/26/09), R. Mikkelsen
- Aussie Govt Considers Quantum Leap in Secure Comms Computerworld Australia (03/03/09), D. Pauli
- Report: Diebold Voting System Has 'Delete' Button for Erasing Audit Logs Wired News (03/03/09), K. Zetter
- Cards on the Table: Low-Cost Tool Spots Software Security Flaws During Development Process, NCSU News (02/25/09), M. Shipman
- This Internet Fix Is No Pipe Dream InfoWorld (02/27/09), R. Grimes
Δελτίο 141 - 12 Φλεβάρη 2009 
- With Economic Slump, Concerns Rise Over Data Theft, IDG News Service (01/29/09), R. McMillan
- Obama Unveils Cyber-security Agenda, NextGov.com (01/23/09), G. Nagesh
- Fighting Malware: An Interview With Paul Ferguson, InfoWorld (01/23/09), R. Grimes
- Fighting Tomorrow's Hackers, American Friends of Tel Aviv University (02/05/09)
- Wi-Fi Networks Offer Rich Environment for Spread of Worms, Government Computer News (01/30/09), W. Jackson
- White House to Assume Key Role in Cybersecurity, Federal Times (02/02/09) Vol. 44, No. 45, P. 4; G. Carlstrom
- The Cybercrime Wave, National Journal (02/07/09) Vol. 41, No. 6, P. 22; S. Harris
- Google Makes it Easy to Spy on Kids, Workers, Associated Press (02/05/09), M. Liedtke
- RFID's Security Problem, Technology Review (02/09) Vol. 112, No. 1, P. 72; E. Naone
Δελτίο 140 - 30 Γενάρη 2009 
- Group Details 25 Most Dangerous Coding Errors Hackers Exploit, Computerworld (01/12/09), J. Vijayan
- Voting Machine Audit Logs Raise More Questions About Lost Votes in CA Election, Wired News (01/13/09), K. Zetter
- Government Spends Over $30 Million to Sharpen Cyber Security Saber, Network World (01/09/09)
- DECT Cordless Phones No Longer Secure, Network World Canada (01/07/09), P. Judge; G. Meckbach
- Keeping Information Safe From Digital Spies, Daily Bruin (01/08/09), S. Bui
- US Plots Major Upgrade to Internet Router Security, Network World (01/15/09), C. D. Marsan
- Low-Cost Strategy Developed for Curbing Computer Worms, UC Davis News & Information (01/14/09), L. Greensfelder
- Let the Cracking Begin, Government Computer News (01/12/09), W. Jackson
- Rice University Software Helps ID Terrorists Carrying Out Attacks, Rice University (01/12/09), F. Brotzen
- Worm Infects Millions of Computers Worldwide, New York Times (01/23/09), J. Markoff
- Building a Better Spam-Blocking CAPTCHA, Computerworld (01/23/09), S. Vaughan-Nichols
- Advocates Worry Electronic Voting Allows Fraud, Medill Reports (01/21/09), J. Barker
- A Tool to Verify Digital Records, Even as Technology Shifts, New York Times (01/27/09) P. D3; J. Markoff
- ICANN Ponders Ways to Stop Scammy Web Sites, IDG News Service (01/27/09), J. Kirk
Δελτίο 139 - 14 Γενάρη 2009 
- Experts Uncover Weakness in Internet Security, Ecole Polytechnique Federale de Lausanne (12/30/08), F. Luy
- The 9 Hottest Skills for 2009, Computerworld (12/30/08), T. Hoffman
- Researchers Aim to Fortify CAPTCHA Against Spammers, eWeek (01/06/09), Β. Prince
- A New Web of Trust, Technology Review (01/06/09), Ε. Naone
- US Security Experts Fear 'Cybergeddon', Agence France Presse (01/07/09)
- How to Foil 'Phishing' Scams, Scientific American (12/08) Vol. 299, No. 6, P. 104; L. F. Cranor
- A Joined-Up Bot-Fighting Strategy, Technology Review (01/09/09), D. Graham-Rowe