Security News
http://www.eweek.com/security/cyber-attackers-most-often-target-nine-business-apps-research-report/ By Robert Lemos eWEEK.com 2013-02-23
http://www.worldcrunch.com/tech-science/espionage-in-academia-how-to-stop-spies-and-thieves-from-swiping-top-research/copyright-university-spying-cnrs-technology/c4s9644/ By David Larousserie LE...
https://chronicle.com/jobs/0000716813-01/ Research Post-Graduate and Postdoctoral Program (RDPDPG) Institution: National Security Agency (NSA) Posted: February 17, 2012 Location: Maryland...
http://news.techworld.com/security/3299592/nations-with-low-malware-rates-have-better-isps-microsoft-research-finds/ By John E Dunn Techworld 26 August 11
http://www.news9.com/Global/story.asp?S=13833909 By Emily Wood News 9 Jan 13, 2011 OKLAHOMA CITY -- An Oklahoma couple is urging thieves to return a stolen computer they say has the power to save...
http://www.washingtonpost.com/wp-dyn/content/article/2009/11/20/AR2009112004093.html By Juliet Eilperin Washington Post Staff Writer November 21, 2009 Hackers broke into the electronic files of...
http://www.ioc.ornl.gov/csiirw/ ------------------------- Fourth Annual Cyber Security and Information Intelligence Research Workshop (CSIIRW-08) will be held at Oak Ridge National Laboratory in...
http://www.itnewsonline.com/showstory.php?storyid=9064 IT News Online Staff 2007-03-20 NASSCOM, the premier trade body and "voice" of the IT software and services industry, in association with...
Forwarded from: Adam Shostack This should be a fascinating get-together. ----- Forwarded message from Lauren Gelman ----- Cybersecurity, Research & Disclosure November 22, 2003 Stanford Law School...
http://www.securityfocus.com/news/4729 By Kevin Poulsen SecurityFocus May 13 2003 Computer security researchers would be allowed to hack through copy protection schemes in order to look for...