User Tools

Site Tools


security_articles

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
security_articles [2011/03/02 02:22] – Just adding more links! djfsecurity_articles [2014/08/01 22:56] (current) – Updated and removed previoius links djf
Line 1: Line 1:
 ====== Recent computer security articles ====== ====== Recent computer security articles ======
  
-  * [[http://infoworld.com/d/security/20-years-innovative-windows-malware-021|20 years of innovative Windows malware]] +  * [[http://www.zdnet.com/internet-of-things-big-security-worry-says-hp-7000031982/|Internet of things big security worrysays HP]] 
-  * [[http://www.tuaw.com/2011/02/28/new-trojan-musminim-a-written-for-mac-os-x/|New trojan MusMinim-A written for Mac OS X]] +  * [[http://www.osnews.com/story/27868/Another_day_another_sensationalist_unfounded_security_story|Another dayanother sensationalistunfounded security story]] 
-  * [[http://www.symantec.com/connect/blogs/exploiting-jnanabot-fun-and-profit|Exploiting Jnanabot for Fun and Profit]]\\ As of early December16% of computers infected by Jnanabot Trojan are Macs. (Source: Symantec) +  * [[http://arstechnica.com/security/2014/07/this-thumbdrive-hacks-computers-badusb-exploit-makes-devices-turn-evil/|This thumbdrive hacks computers“BadUSB” exploit makes devices turn “evil”]]
-  * [[https://www.eff.org/deeplinks/2010/12/what-traitorware|What is Traitorware?]]\\ "[S]oftware that hides itself from you while it gives your personal data away to a third party is dangerous and dishonest." +
-  * [[http://www.spamhaus.org/news.lasso?article=665|Wikileaks Mirror Malware Warning]] +
-  * [[http://online.wsj.com/article/SB10001424052748704694004576020083703574602.html?mod=googlenews_wsj|Your Apps Are Watching You]] +
-  * [[http://www.bbc.co.uk/news/world-us-canada-11457611|More than 100 arrestsas FBI uncovers cyber crime ring]] +
-  * [[http://www.wired.com/geekdad/2010/09/one-geekdads-internet-filtering/|5 Steps to a Family-Safe Internet]]\\ No. 1: watch what your children are doing. +
-  * [[http://online.wsj.com/article/SB10001424052748703904304575497903523187146.html?mod=WSJ_hpp_MIDDLENexttoWhatsNewsThird|On the WebChildren Face Intensive Tracking]]\\ The article makes little attempt to distinguish simple website functionality (saving one's place in a game) from aggregated browsing data (teens listen to music and spend hours on Facebook) from something more sinister. +
-  * [[http://www.readwriteweb.com/enterprise/2010/09/what-you-need-to-know-about-ma.php|What You Need to Know About Malvertising]]\\ The ads are out to hijack your computer and your bank account, and they appear on mainline websites. +
-  * [[http://www.fastcompany.com/1680744/hackers-hijack-gmail-in-china|Hackers Hijack Gmail in China]]\\ If the reports are correct, it's more than just a standard phishing attack. +
-  * [[http://arstechnica.com/security/news/2010/08/cars-hacked-through-wireless-tyre-sensors.ars|Cars hacked through wireless tire sensors]] +
-  * [[http://www.technologyreview.com/computing/25921/?a=f|Your Apps Could Be Leaking Private Info]] +
-  * [[http://www.bbc.co.uk/news/technology-10850875|Web attack knows where you live]] +
-  * [[http://blogs.computerworld.com/16579/horrible_safari_privacy_bug_take_action_now|Horrible Safari privacy bug: take action now]] +
-  * [[http://thenextweb.com/apple/2010/07/04/appstore-hack-itunes/|iTunes accounts hacking more widespread than initially thought. The facts, and what you should do.]] +
-  * [[http://www.computerworld.com/s/article/9178394/Apple_leaves_iPad_vulnerable_after_monster_iPhone_patch_job/|Apple leaves iPad vulnerable after monster iPhone patch job]] +
- +
  
security_articles.1299032564.txt.gz · Last modified: 2011/08/09 01:00 (external edit)