text
stringlengths 4
429
|
---|
John Arquilla. Retrieved June 13, 2011, from Cyber War! | Frontline | PBS:
|
http://www.pbs.org/wgbh/pages/frontline/shows/cyberwar/interviews/arquilla.html
|
Benson, S. (2011, March 29). Hackers log in to federal MPs' emails. Retrieved June 13, 2011, from The Daily
|
Telegraph: http://www.dailytelegraph.com.au/news/national/hackers
|
federal
|
emails/story
|
e6freuzr
|
1226029677394
|
Borders, K. (2007, July 19). Building a Threat Model: Hackenomics (Part 2
|
The Cost of Hacking). Retrieved June
|
13, 2011, from StraightSecTalk: http://www.straightsectalk.com/?p=16
|
Central Intelligence Agency. (2007, May 02). Annual Report 1999 Counterintelligence. Retrieved June 13, 2011,
|
from Central Intellgence Agency: https://www.cia.gov/library/reports/archived
|
reports
|
1/ann_rpt_1999/dci_annual_report_99_16.html
|
Comodo. (2011, March 31). Comodo Report of Incident. Retrieved June 13, 2011, from Comodo Group Inc.:
|
http://www.comodo.com/Comodo
|
Fraud
|
Incident
|
2011
|
23.html
|
Coviello, A. (2011, March 17). Open Letter to RSA Customers. Retrieved June 13, 2011, from RSA:
|
http://www.rsa.com/node.aspx?id=3872
|
Coviello, A. (2011, June). Open Letter to RSA SecurID Customers. Retrieved June 13, 2011, from RSA:
|
http://www.rsa.com/node.aspx?id=3891
|
Drummond, D. (2010, January 01). A new approach to China. Retrieved June 13, 2011, from The Official Google
|
Blog: http://googleblog.blogspot.com/2010/01/new
|
approach
|
china.html
|
Farlliere, N., O Muchu, L., & Chien, E. (2011, February). W32.Stuxnet Dossier. Retrieved June 13, 2011, from
|
Symantec:
|
http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stux
|
net_dossier.pdf
|
gHale. (2011, June 03). Second Defense Contractor Targeted. Retrieved June 13, 2011, from Industrial Safety and
|
Security Source: htp://www.isssource.com/second
|
defense
|
contractor
|
targeted/
|
Goodin, D. (2007, December 07). Top
|
secret US labs penetrated by phishers. Retrieved June 13, 2011, from The
|
Register: http://www.channelregister.co.uk/2007/12/07/national_labs_breached/
|
Kaplan, J. (2011, June 01). Exclusive: Northrop Grumman May Have Been Hit by Cyberattack, Source says. Retrieved
|
June 13, 2011, from Fox News Network: http://www.foxnews.com/scitech/2011/05/31/northrop
|
grumman
|
cyber
|
attack
|
source
|
says/
|
PAGE 10 OF 13
|
COPYRIGHT
|
COMMAND FIVE PTY LTD. ALL RIGHTS RESERVED.
|
Kobie, N. (2011, March 29). Lone Iranian claims credit for Comodo certificate hack. Retrieved June 13, 2011, from
|
PC & Tech Authority: http://www.pcauthority.com.au/News/252662,lone
|
iranian
|
claims
|
credit
|
comodo
|
certificate
|
hack.aspx
|
Lockheed Martin Corporation. (2011, May 28). Lockheed Martin Customer, Program and Employee Data Secure.
|
Retrieved June 13, 2011, from Lockheed Martin:
|
http://www.lockheedmartin.com/news/press_releases/2011/0528hq
|
secuirty.html [sic]
|
Lynn III, W. J. (2010, October 04). Defending a New Domain: The Pentagon's Cyberstrategy. Retrieved June 13,
|
2011, from U.S. Department of Defense: http://defense.gov/home/features/2010/0410_cybersec/lynn
|
article1.aspx
|
McAfee Foundation Professional Services and McAfee Labs. (2011, February 10). Global Energy Cyberattacks:
|
"Night Dragon". Retrieved June 13, 2011, from McAfee: http://www.mcafee.com/us/resources/white
|
papers/wp
|
global
|
energy
|
cyberattacks
|
night
|
dragon.pdf
|
Mehnle, J. (2010, April 17). Sender Policy Framework: Introduction. Retrieved June 13, 2011, from The Sender
|
Policy Framework Project: http://www.openspf.org/Introduction
|
Moyanhan, M. (2011, February 14). The Price of a Zero Day Exploit. Retrieved June 15, 2011, from Veracode, Inc.
|
The State of Software Security: http://www.veracode.com/ceo
|
blog/2011/02/the
|
price
|
zero
|
exploit/
|
Munger, F. (2011, April 19). Lab halts Web access after cyber attack. Retrieved June 13, 2011, from Knoxville News
|
Sentinel Co.: http://www.knoxnews.com/news/2011/apr/19/lab
|
halts
|
access
|
after
|
cyber
|
attack
|
Nagaraja, S., & Anderson, R. (2009, March). The snooping dragon:social
|
malware surveillance of the Tibetan
|
movement. Retrieved June 13, 2011, from University of Cambridge:
|
http://www.cl.cam.ac.uk/techreports/UCAM
|
746.html Shishir Nagaraja, Ross Anderson March
|
2009
|
Oak Ridge National Laboratory. (2007). Potential Identity Theft. Retrieved June 13, 2011, from Oak Ridge National
|
Laboratory: http://www.ornl.gov/identitytheft/
|
Postmedia News. (2011, June 03). Classified infromation accessed during cyber attacks on federal departments:
|
Report. Retrieved June 13, 2011, from Postmedia Network Inc:
|
http://www.canada.com/news/Classified+information+accessed+during+cyber+attacks+federal+depart
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.