Security News

http://news.techworld.com/security/3504470/china-ramps-up-cybersecurity-efforts-strives-to-become-internet-power/ By Michael Kan Techworld 28 February 2014

http://arstechnica.com/information-technology/2014/01/internet-users-ditch-password-as-password-upgrade-to-123456/ By Jon Brodkin Ars Technica Jan 20 2014

http://arstechnica.com/security/2013/11/new-linux-worm-targets-routers-cameras-internet-of-things-devices/ By Dan Goodin Ars Technica Nov 27 2013

http://arstechnica.com/security/2013/11/repeated-attacks-hijack-huge-chunks-of-internet-traffic-researchers-warn/ By Dan Goodin Ars Technica Nov 20 2013

http://arstechnica.com/security/2013/11/now-theres-a-bug-bounty-program-for-the-whole-internet/ By Dan Goodin Ars Technica Nov 6 2013

http://www.washingtonpost.com/blogs/the-switch/wp/2013/11/01/how-a-grad-student-trying-to-build-the-first-botnet-brought-the-internet-to-its-knees/ BY TIMOTHY B. LEE The Switch Washington Post...


Forwarded from: d.lin (at) icitst.org Apologies for cross-postings! Kindly email this Call for Papers to your colleagues, faculty members and postgraduate students. CALL FOR PAPERS...

http://observers.france24.com/content/20130624-tunisia-internet-censorship-hackers-servers By Moez Chakchouk France 24 24/06/2013

http://arstechnica.com/security/2013/05/internet-explorer-zero-day-exploit-targets-nuclear-weapons-researchers/ By Dan Goodin Ars Technica May 3 2013