-
2
-
-
85145528802
-
Hackers “aid” Amazon logging scam
-
15 December 2008
-
BBC (2008) ‘Hackers “aid” Amazon logging scam’, BBC News Online, 15 December 2008. http://news.bbc.co.uk/1/hi/technology/7783257.stm
-
(2008)
BBC News Online
-
-
-
3
-
-
85145546025
-
-
Press Release, Carnegie Mellon Software Engineering Institute, Framingham, MA, 11 September 2007
-
CERT (2007) ‘Over-confidence is pervasive amongst security professionals: 2007 ECrime Watch Survey shows security incidents, electronic crimes and their impact steady versus last year’, Press Release, Carnegie Mellon Software Engineering Institute, Framingham, MA, 11 September 2007.
-
(2007)
Over-confidence is pervasive amongst security professionals: 2007 ECrime Watch Survey shows security incidents, electronic crimes and their impact steady versus last year
-
-
-
4
-
-
84887839075
-
The Signs, Signifiers and Semiotics of the Successful Semantic Attack
-
St. Juliens/Valletta, Malta, 30 April-2 May 2005
-
Jordan, M. and Goudey, H. (2005) ‘The Signs, Signifiers and Semiotics of the Successful Semantic Attack’, Proceedings of 14th Annual EICAR Conference, St. Juliens/Valletta, Malta, 30 April-2 May 2005, pp. 344-64.
-
(2005)
Proceedings of 14th Annual EICAR Conference
, pp. 344-364
-
-
Jordan, M.1
Goudey, H.2
-
5
-
-
85145522736
-
Bush doesn’t confront China over alleged Pentagon hack
-
7 September 2007
-
Keizer, G. (2007) ‘Bush doesn’t confront China over alleged Pentagon hack’, Computerworld, 7 September 2007.
-
(2007)
Computerworld
-
-
Keizer, G.1
-
8
-
-
57349186134
-
The Conscience of a Hacker
-
25 September 1986
-
Mentor (1986) ‘The Conscience of a Hacker’, Phrack, volume 1, issue 7, 25 September 1986.
-
(1986)
Phrack
, vol.1
, Issue.7
-
-
-
9
-
-
52149092178
-
The evolution of commercial malware development kits and colour-by-numbers custom malware
-
September 2008
-
Ollmann, G. (2008) ‘The evolution of commercial malware development kits and colour-by-numbers custom malware’, Computer Fraud and Security, September 2008:4-7.
-
(2008)
Computer Fraud and Security
, pp. 4-7
-
-
Ollmann, G.1
-
10
-
-
84887288124
-
-
White Paper, European Network and Information Security Agency (ENISA), October 2008
-
Papadaki, M., Furnell, S.M. and Dodge, R.C. (2008) Social Engineering - Exploiting the Weakest Links. White Paper, European Network and Information Security Agency (ENISA), October 2008.
-
(2008)
Social Engineering - Exploiting the Weakest Links
-
-
Papadaki, M.1
Furnell, S.M.2
Dodge, R.C.3
-
12
-
-
85145532776
-
-
Press release, 30 January 2008
-
Sophos (2008) ‘Will you be spewing Storm spam at 10am tomorrow morning?', Press release, 30 January 2008. http://www.sophos.com/pressoffice/news/articles/2008/01/storm-timezone.html
-
(2008)
Will you be spewing Storm spam at 10am tomorrow morning?
-
-
-
13
-
-
85145530033
-
-
SANS Institute, GIAC, accessed 26 July 2008
-
Stevens, G. (2002) ‘Enhancing Defenses Against Social Engineering’, SANS Institute, GIAC, http://www.giac.org/certified_professionals/practicals/GSEC/570. php (accessed 26 July 2008).
-
(2002)
Enhancing Defenses Against Social Engineering
-
-
Stevens, G.1
-
14
-
-
84900195083
-
-
5 February 2005
-
Symantec (2005a) W32.Gaobot.CII. Symantec Security Response, 5 February 2005. http://securityresponse.symantec.com/avcenter/venc/data/w32.gaobot.cii.html
-
(2005)
W32.Gaobot.CII. Symantec Security Response
-
-
-
15
-
-
84900181467
-
-
15 April 2005
-
Symantec (2005b) W32.Beagle.BN@mm. Symantec Security Response, 15 April 2005. http://securityresponse.symantec.com/avcenter/venc/data/w32.beagle.bn@ mm.html.
-
(2005)
W32.Beagle.BN@mm. Symantec Security Response
-
-
|