TRUST Security and Privacy Blog

Security and Privacy news items

Monday, December 17, 2012

›
Please see the TRUST in the News blog Rather than having two blogs about TRUST, we've decided to focus on one blog. Please see TRUST i...
Thursday, May 03, 2012

"California Chosen as Home for Computing Institute"

›
The May 1, 2012 NY Times article " California Chosen as Home for Computing Institute " covers the $60 million theoretical computin...
Saturday, April 07, 2012

New Mac malware epidemic exploits weaknesses in Apple ecosystem

›
For Mac owners, the nightmare scenario finally arrived. A piece of malware called Flashback, which has been in existence and steadily evolvi...
Monday, January 31, 2011

DHS: $40M To Research Next Big Thing in Cyber Security

›
The U.S. Department of Homeland Security announced a call for proposals this week in a $40 million program to encourage research and develop...
Friday, May 07, 2010

Discarded Copiers Hold Sensitive Data on Hard Drives

›
SANS Newsbites tells of a CBS news investigation that had found that the hard drives of four digital copy machines purchased second-hand c...
Tuesday, April 13, 2010

Please do not change your password

›
Mark Pothier's Boston Globe article, Please do not change your password ," covers a paper by Microsoft Researcher Cormac Herley , ...
Friday, March 12, 2010

"Privacy Protection Needed as Smart Grid Arrives"

›
A press release from UC Berkeley's Law School, " Privacy Protection Needed as Smart Grid Arrives " points out privacy concerns...
Wednesday, February 24, 2010

Judge Hears Arguments on Google Book Settlement

›
Federal judge Denny Chin heard more than four hours of testimony in a packed courtroom this week about the hotly contested class-action la...
Friday, February 19, 2010

Adobe Download Manager Installing Software Without Consent

›
Slashdot is running an article about a problem in the Adobe Download Manager (ADM) found by Researcher Aviv Raff. The net effect of the pr...
Thursday, February 18, 2010

NY Times: "Critics Say Google Invades Privacy With New Service"

›
TRUST faculty member Deirdre Mulligan is quoted in the Feburary 12, 2010 NY Times article Critics Say Google Invades Privacy With New Servi...
Friday, January 15, 2010

US preps cyber outfit to protect national electric grid

›
The Department of Energy has said it would spend $8.5 million to create a National Energy Sector Cyber Organization that would help protec...
Tuesday, September 15, 2009

Nonprofit for collecting info on SCADA & PCS security incidents

›
The Risks Digest has an item that refers to Stephanie Neil's article in "Managing Automation", 12 Sep 2009 that discusses th...
Thursday, September 10, 2009

How much are you worth on the black market?

›
Slashdot reports a new tool being developed by Symantec intended to raise consumer awareness about cybercrime. By answering a few questio...
Sunday, August 16, 2009

NIST Releases Security Standards for Federal Systems

›
The National Institute of Standards and Technology (NIST) released Special Publication 800-53 , titled Recommended Security Controls for Fe...
Thursday, July 23, 2009

Adobe Vulnerability Targeted in Drive-by Attacks

›
eWEEK.COM is running a story about a new zero-day vulnerability affecting Adobe's Flash Player software that is being exploited by attac...
Tuesday, July 07, 2009

Google Book Search Settlement Inquiry Announced

›
ISEDB's article " Google Book Search Settlement Inquiry Announced " includes a link to Pam Samuelson's talk Reflections o...
Tuesday, May 26, 2009

Announcement: 2nd Annual Privacy Law Scholar Conference, June 4-5 2009

›
The 2nd Annual Privacy Law Scholars Conference (PLSC) will be held at the Claremont Resort in Berkeley, CA, on June 4-5. PLSC is an academi...
Thursday, May 14, 2009

Mathematical Advances Strengthen IT Security

›
ACM TechNews is running an article about a new cryptography approach based on the mathematical theory of elliptic curves, a leading candid...
Tuesday, April 28, 2009

Chinese Hackers Targeting NYPD Computers

›
Slashdot prints an article about a network of mystery hackers, mostly based in China, making 70,000 attempts a day to break into the NYPD...
Wednesday, April 22, 2009

Most electronic voting isn't secure, CIA expert says

›
The Risks Digest points to an article about a CIA agent testifying before the Election Assistance Commission. His position is that electr...
Monday, January 26, 2009

Obama Sides With Bush In Spy Case

›
Slashdot picked up a story in Wired about the Obama administration siding with the Bush administration when it urged a federal judge to s...
Wednesday, January 21, 2009

Privacy Groups Want Strong Security Measures for Electronic Health Records

›
SANS Institute summarizes an article about US privacy rights and civil liberties advocacy groups writing legislators and asking them to e...
Tuesday, January 13, 2009

CWE/SANS TOP 25 Most Dangerous Programming Errors

›
Yesterday, the SysAdmin, Audit, Network, Security ( SANS ) Institute announced that in Washington D.C., experts from more than 30 U.S. and i...
Thursday, January 08, 2009

State Secrets Defense Rejected in Wiretapping Case

›
Slashdot references a report in Ars Technica of a federal judge ruling that a lawsuit filed by an Islamic charity alleging illegal wiretap...
Wednesday, December 24, 2008

Congress in the Cyber-Crosshairs

›
ACM TechNews points out the cover story of National Journal about what it will take to keep the next invader out of Congressional computer...
Monday, December 08, 2008

U.S. Is Losing Global Cyberwar, Commission Says

›
ACM TechNews summarizes an article in Business Week about how ill prepared the United States is for the challenges of 21st century cyberse...
Friday, December 05, 2008

Who Protects the Internet?

›
Slashdot calls attention to an interview with General Kevin Chilton , U.S. STRATCOM commander and the head of all military cyberwarefare a...
Wednesday, December 03, 2008

You're Leaving a Digital Trail. What About Privacy?

›
ACM TechNews picked up an article published in The New York Times on how new technologies and the Internet's incursion into every aspe...
Monday, November 24, 2008

Obama Administration to Inherit Tough Cybersecurity Challenges

›
ACM TechNews remarks on the status of the initiatives launched in the current administration and what U.S. President-elect Barack Obama wil...
Friday, November 21, 2008

Minnesota Senate Race Could Hinge on Scanning Machine Mistakes

›
ACM TechNews notes that according to an article in cnet news , the U.S. Senate race in Minnesota is yet undecided and that a hand recount ...
›
Home
View web version
Powered by Blogger.