D9D1E2
Weblog
2014
March
The latest in information security (in English and Dutch)
2014-03-05
2014-03-04
2014-03-03
2014-02-27
2014-02-25
2014-02-24
2014-02-23
2014-02-22
2014-02-21
Earlier / undated
- ENISA: Cloud Computing Certification Schemes List - CCSL
- ENISA: National cyber security strategies in the world | Via
- F-Secure Labs: Threat report H2 2013 [PDF] | Via
- G Data SecurityLabs: Uroburos - Highly complex espionage software with Russian roots [PDF] | Via
- Insight Intelligence: 2013/2014 Data recovery project for National Association for Information Destruction - Data recovery & security report [PDF] | Via
- Brad Miller, Ling Huang, A.D. Joseph, and J.D. Tygar: I know why you went to the clinic - Risks and realization of HTTPS traffic analysis [PDF] | Via
- Ajaya Neupane, Nitesh Saxena, Keya Kuruvilla, Michael Georgescu, and Rajesh Kana: Neural signatures of user-centered security - An fMRI study of phishing, and malware warnings [PDF linked from this page] | Via
- Bernold Nieuwesteeg: The legal position and societal effects of security breach notification laws [PDF] | Website Internet Scriptieprijs
- NIST: NIST cryptographic standards and guidelines development process (draft) [PDF] | Via
- ECLI:NL:GHSHE:2014:399 [phishing, fraude bij internetbankieren] | Via
- Staatscourant: Regeling afgedankte elektrische en elektronische apparatuur | Overzicht regelgeving op website Producenten-verantwoordelijkheid Nederland | Via
- Vanja Svajcer (SophosLabs): Sophos mobile security threat report [PDF and related information linked from this page] | PDF | Via
- Venafi, Inc. / Ponemon Institute: Ponemon 2014 SSH security vulnerability report - Information technology's dirty secret and open backdoors [PDF] | Infographic | Via
[Permalink]
Menu |
Weblog |
March |
2014 |
Earlier |
Later |
Meta |
Contact |
English