1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253 |
- @misc{anthony_2017, title={It might be time to stop using antivirus}, url={https://arstechnica.com/information-technology/2017/01/antivirus-is-bad/}, journal={Ars Technica}, author={Anthony, Sebastian}, year={2017}, month={Jan}}
- @misc{mahal_2016, title={Antivirus software is bad for you and your computer}, url={https://www.mahal.org/antivirus-software-is-bad-for-you-and-your-computer}, journal={Davinder Mahal}, author={Mahal, Davinder}, year={2016}, month={Aug}}
- @misc{selinux, title={SELinux – Addressing Access Control Security in LabVIEW RIO Devices}, url={http://www.ni.com/white-paper/52729/en/}, journal={SELinux – Addressing Access Control Security in LabVIEW RIO Devices - National Instruments}}
- @misc{androidpit, title={Android M permissions and what they mean to you}, url={https://www.androidpit.com/android-m-permissions-explained}, journal={AndroidPIT}}
- @misc{cobb_2016, title={Containers Don't Contain the Whole Future: VMs are still App-ropos}, url={https://yourdailytech.com/storage-architecture/containers-dont-contain-the-whole-future/}, journal={YourDailyTech}, publisher={YourDailyTech}, author={Cobb, Lindsey}, year={2016}, month={Aug}}
- @misc{flashpoint_2016, title={Analysis of "DirtyCow" Kernel Exploit}, url={https://www.flashpoint-intel.com/blog/cybercrime/analysis-dirtycow-kernel-exploit/}, journal={Flashpoint}, year={2016}, month={Oct}}
- @misc{infosec_resources_2015, title={Exploiting and Verifying Shellshock: CVE-2014-6271}, url={http://resources.infosecinstitute.com/bash-bug-cve-2014-6271-critical-vulnerability-scaring-internet/}, journal={InfoSec Resources}, year={2015}, month={Feb}}
- @misc{searchsecurity, title={'Heartbleed' OpenSSL vulnerability: A slow-motion train wreck}, url={http://searchsecurity.techtarget.com/news/2240217969/Heartbleed-OpenSSL-vulnerability-A-slow-motion-train-wreck}, journal={SearchSecurity}}
- @misc{xkcd, url={https://xkcd.com/1938/}, journal={xkcd: Meltdown and Spectre}}
- @misc{replicant, title={Replicant developers find and close Samsung Galaxy backdoor}, url={https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor}, journal={Replicant developers find and close Samsung Galaxy backdoor - Free Software Foundation - working together for free software}}
- @misc{vincent_2017, title={Inaudible ultrasound commands can be used to secretly control Siri, Alexa, and Google Now}, url={https://www.theverge.com/2017/9/7/16265906/ultrasound-hack-siri-alexa-google}, journal={The Verge}, publisher={The Verge}, author={Vincent, James}, year={2017}, month={Sep}}
- @misc{reddit, title={All Verizon Android phones now come with app that allows OEMs backdoor access to install other apps without permission • r/Android}, url={https://www.reddit.com/r/Android/comments/2nw54f/all_verizon_android_phones_now_come_with_app_that/}, journal={reddit}}
- @misc{android_police_2017, title={[Never Settle] OnePlus found to be collecting personally identifiable analytics data from phone owners}, url={https://www.androidpolice.com/2017/10/10/never-settle-oneplus-found-collecting-personally-identifiable-analytics-data-phone-owners/}, journal={Android Police}, year={2017}, month={Oct}}
- @misc{verma_2018, title={Backdoor In 30 Seconds: New Major AMT Security Flaw Is Here To Haunt Intel Laptops}, url={https://fossbytes.com/new-intel-amt-flaw-security/}, journal={Fossbytes}, author={Verma, Adarsh}, year={2018}, month={Jan}}
- @misc{ispcol, url={http://www.potaroo.net/ispcol/2014-03/ntpddos.html}, journal={ISP Column - March 2014}}
- @misc{khandelwal_2014, title={Largest Ever 400Gbps DDoS attack hits Europe uses NTP Amplification}, url={https://thehackernews.com/2014/02/NTP-Distributed-Denial-of-Service-DDoS-attack.html}, journal={The Hacker News}, author={Khandelwal, Swati}, year={2014}, month={Feb}}
- @misc{veracode_2017, title={Man in the Middle (MITM) Attack}, url={https://www.veracode.com/security/man-middle-attack}, journal={Veracode}, year={2017}, month={Aug}}
- @misc{postmark_dkim, title={DKIM: Protect your domain from email forging}, url={https://postmarkapp.com/guides/dkim}, journal={Postmark}}
- @misc{postmark_spf, title={How does SPF protect your domain from email spoofing?}, url={https://postmarkapp.com/guides/spf}, journal={Postmark}}
- @misc{postmark_dmarc, title={DMARC: Monitor \& secure your email delivery}, url={https://postmarkapp.com/guides/dmarc}, journal={Postmark}}
- @misc{verisign_blog_2017, title={Increasing the Strength of the Zone Signing Key for the Root Zone}, url={https://blog.verisign.com/security/increasing-the-strength-of-the-zone-signing-key-for-the-root-zone/}, journal={Verisign Blog}, year={2017}, month={Feb}}
- @misc{dan, url={https://www.makethenmakeinstall.com/2017/12/dnscrypt-proxy-as-a-forwarder-for-bind/}, journal={make then make install}, author={Dan}}
- @misc{slideplayer, title={DNS Privacy Overview Allison Mankin \& Shumon Huque, Verisign Labs DNS-OARC Fall Workshop October 3, 2015.}, url={http://slideplayer.com/slide/8356847/}, journal={SlidePlayer}}
- @misc{betterthanzero, title={Java Servlet to solve Origin not allowed by Access-Control-Allow-Origin issue}, url={http://www.mysamplecode.com/2012/02/access-control-origin-not-allowed.html}, journal={Programmers Sample Guide, help is on the way}, author={betterThanZero}}
- @misc{techglimpse, title={How to Delete HSTS Setting from Chrome for a domain}, url={https://techglimpse.com/chrome-https-website-hsts-failed/}, journal={Techglimpse}}
- @misc{valsorda_2017, title={An overview of TLS 1.3 and Q\&A}, url={https://blog.cloudflare.com/tls-1-3-overview-and-q-and-a/}, journal={Cloudflare Blog}, publisher={Cloudflare Blog}, author={Valsorda, Filippo}, year={2017}, month={Oct}}
- @misc{sullivan_2017, title={Introducing TLS 1.3}, url={https://blog.cloudflare.com/introducing-tls-1-3/}, journal={Cloudflare Blog}, publisher={Cloudflare Blog}, author={Sullivan, Nick}, year={2017}, month={Apr}}
|