Security News
http://www.wired.com/threatlevel/2012/09/adobe-digital-cert-hacked/ By Kim Zetter Threat Level Wired.com 09.27.12
Forwarded from: Wenyuan Xu ------------------------------------------------------------------------------------------------------------------------ Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â The Sixth ACM*...
http://www.computerworld.com/s/article/9231721/Wells_Fargo_recovers_after_site_outage By Jeremy Kirk IDG News Service September 26, 2012
http://www.washingtonpost.com/investigations/in-cyberattacks-hacking-humans-is-highly-effective-way-to-access-systems/2012/09/26/2da66866-ddab-11e1-8e43-4a3c4375504a_story.html By Robert...
http://www.worldcrunch.com/tech-science/espionage-in-academia-how-to-stop-spies-and-thieves-from-swiping-top-research/copyright-university-spying-cnrs-technology/c4s9644/ By David Larousserie LE...
http://news.cnet.com/8301-1009_3-57520112-83/researcher-says-100000-passwords-exposed-on-ieee-site/ By Elinor Mills Security & Privacy CNET News September 25, 2012
http://arstechnica.com/security/2012/09/rent-to-own-pcs-surreptitiously-captured-users-most-intimate-moments/ By Dan Goodin Ars Technica Sept 25, 2012
http://www.nextgov.com/defense/2012/09/disa-charged-securing-all-two-federal-networks/58354/ By Bob Brewin Nextgov Sept 25, 2012
http://www.csdecisions.com/2012/09/25/learning-from-wyndhams-data-breach/ By Erin Rigik Associate Editor csdecisions.com Sep 25, 2012 In todayâs high tech world, no one is immune to a breach.
Forwarded from: Francisco Moyano ** APOLOGIES FOR CROSS POSTINGS** IFIPTM 2013- Call for Papers  7th IFIP International Conference on Trust Management Málaga, Spain 3-5 June 2013...