Bibliography for “About this book”

  • NOTEThe bibliographies on the chapter tabs are organized according to a somewhat revised layout of version 3 of the book which is not quite ready for release. I am making them available to readers in advance.

Why and How this book was written

No citations

Organization and overview of contents

No citations

How choice of technology affects your security and privacy

  1. Anon. “Apple of Discord.” Data Protection Center. 20 June 2013.  <http://www.dataprotectioncenter.com/antivirus/kaspersky/apple-of-discord/>.
  2. Anon. “Windows 8.1: High-performance Behaviour Monitoring for Defender.” The H Security. 27 June 2013. <http://www.h-online.com/security/news/item/Windows-8-1-High-performance-behaviour-monitoring-for-Defender-1897777.html>.
  3. Arsene, Liviu. “Malware Shifting from SMS Trojans to Ransomware and Banking.” HOTforSecurity. 26 July 2013. <http://www.hotforsecurity.com/blog/malware-shifting-from-sms-trojans-to-ransomware-and-banking-6651.html>.
  4. Bostic, Kevin. “IOS 7 Beta: Developers, Sen. McCain Applaud App Store Auto-updates.” Apple Insider. 11 June 2013. <http://appleinsider.com/articles/13/06/11/ios-7-beta-developers-sen-mccain-applaud-app-store-auto-updates>.
  5. Brown, Bob. “Android Antivirus Products a Big Flop, Researchers Say.” InfoWorld. 7 June 2013. <http://akamai.infoworld.com/d/security/android-antivirus-products-big-flop-researchers-say-220278>.
  6. Cluley, Graham. “Android Jellybean to Scan Apps for Malware, and Warn of Expensive SMS Scams.” Naked Security. 8 Nov. 2013. <http://nakedsecurity.sophos.com/2012/11/08/android-jellybean-malware/>.
  7. Eldridge, Andrea. “The Great Debate: Mac vs Windows.” Business 2 Community. 6 Aug. 2013. <http://www.business2community.com/tech-gadgets/the-great-debate-mac-vs-windows-0576574>.
  8. Etherington, Darrell. “Google Makes Android 4.3 Official, Offers Multi-User Restricted Profile Accounts And Bluetooth Smart.” TechCrunch. 24 July 2013. <http://techcrunch.com/2013/07/24/google-makes-android-4-3-official-offers-multi-user-accounts/>.
  9. Evans, Jon. “The Time Has Come For Chrome In The Home.” TechCrunch. 18 May 2013. <http://techcrunch.com/2013/05/18/the-time-has-come-for-chrome-os-in-the-home/>.
  10. Gannes, Liz. “More Than 1M US Android Users Downloaded Adware in the Past Year.” AllThingsD. 26 June 2013. <http://allthingsd.com/20130626/more-than-1m-u-s-android-users-downloaded-adware-in-the-past-year/>.
  11. Garfinkel, Simson. “The IPhone Has Passed a Key Security Threshold.” MIT Technology Review. 13 Aug. 2012. <http://www.technologyreview.com/news/428477/the-iphone-has-passed-a-key-security-threshold/>.
  12. Geier, Eric. “Windows 8.1 Steps up Security with Biometrics, Encryption, and More.” PCWorld. 16 July 2013. <http://www.pcworld.com/article/2044422/windows-8-1-steps-up-security-with-biometrics-encryption-and-more.html>.
  13. Goldman, David. “Samsung Targets BlackBerry with Knox.” CNNMoney. 12 Mar. 2013. <http://money.cnn.com/2013/03/12/technology/security/samsung-knox/index.html>.
  14. Goldman, Jeff. “10 Helpful IPhone Security Apps.” ESecurity Planet. 20 Mar. 2013. <http://www.esecurityplanet.com/mobile-security/10-helpful-iphone-security-apps.html>.
  15. Goldman, Jeff. “Microsoft Acknowledges Surge in Windows 7 Malware Infections.” ESecurity Planet. 9 Oct. 2012. <http://www.esecurityplanet.com/windows-security/microsoft-acknowledges-surge-in-windows-7-malware-infections.html>.
  16. Gonsalves, Antone. “ACLU Takes Wireless Carriers to Task for Poor Android Security.CSO. 4 Feb. 2013. <http://www.csoonline.com/article/728229/aclu-takes-wireless-carriers-to-task-for-poor-android-security>.
  17. Gonsalves, Antone. “Android Now ‘mobile World’s Equivalent’ of Windows for Hackers.CSO. 16 Aug. 2013. <http://www.csoonline.com/article/738200/android-now-mobile-world-s-equivalent-of-windows-for-hackers>.
  18. Gonsalves, Antone. “Mobile Malware Shifting to SMS Fraud.” CSO. 7 Sept. 2012. <http://www.csoonline.com/article/715700/mobile-malware-shifting-to-sms-fraud>.
  19. Gonsalves, Antone. “Start Isolating Critical XP Systems Now, Experts Warn.” CSO. 14 Aug. 2013. <http://www.csoonline.com/article/738085/start-isolating-critical-xp-systems-now-experts-warn>.
  20. Gonsalves, Antone. “Windows 8 Security Focuses on Early Malware Detection.” CSO. 29 Oct. 2012. <http://www.csoonline.com/article/719977/windows-8-security-focuses-on-early-malware-detection>.
  21. Goodnight, Eric Z. “Online Safety: Why You Should Give Up Windows XP For Good.” HowTo Geek. 24 Oct. 2011. <http://www.howtogeek.com/77788/online-safety-why-you-should-give-up-windows-xp-for-good-2/>.
  22. Hernandez, Pedro. “Windows 8.1: Microsoft Bakes In BYOD Security.” EWeek. 5 Aug. 2013. <http://www.eweek.com/security/windows-8.1-microsoft-bakes-in-byod-security>.
  23. Higgins, Kelly J. “96 Percent Of Androids Running Old OS Versions.” Dark Reading. 27 June 2013. <http://www.darkreading.com/vulnerability/96-percent-of-androids-running-old-os-ve/240157496>.
  24. Hoffman, Chris. “How a Chromebook Is Locked Down to Protect You.” HowTo Geek. 9 June 2013. <http://www.howtogeek.com/164788/how-a-chromebook-is-locked-down-to-protect-you/>.
  25. Holmes, Michael. “12 Ways to Protect Your Smartphone from Cyber Attacks.” Small Business Trends. 31 Jan. 2013. <http://smallbiztrends.com/2013/01/protect-smartphone-cyber-attack.html>.
  26. Horowitz, Michael. “SecurityWatch Summit on Mobile Device Security.” Computerworld. 3 Oct. 2012. <http://blogs.computerworld.com/mobile-security/21089/securitywatch-summit-mobile-device-security>.
  27. Kendrick, James. “Yes You Can Use the New Chromebook Offline.” ZDNet. 22 Oct. 2012. <http://www.zdnet.com/yes-you-can-use-the-new-chromebook-offline-7000006103/>.
  28. Kingsley-Hughes, Adrian. “IOS 7: Apple’s War against Jailbreaking Now Makes Perfect Sense.” ZDNet. 10 June 2013. <http://www.zdnet.com/ios-7-apples-war-against-jailbreaking-now-makes-perfect-sense-7000016623/>.
  29. Koetsier, John. “Apples IPad Market Share Chopped in Half as Android Takes over.” VentureBeat. 29 July 2013. <http://venturebeat.com/2013/07/29/apples-ipad-market-share-chopped-in-half-as-android-takes-over/>.
  30. Lee, Adriana. “IOS 7: Is There Any Reason to Jailbreak Anymore?ReadWrite. 2013. <http://readwrite.com/2013/08/21/does-ios-7-bypass-jailbreaks-now>.
  31. Lennon, Mike. “95 Percent of Mobile Threats in 2012 Targeted Android, Says NQ Mobile.” SecurityWeek. 16 Apr. 2013. <http://www.securityweek.com/95-percent-mobile-threats-2012-targeted-android-says-nq-mobile>.
  32. Messmer, Ellen. “BlackBerry Details Extensive Security Protection in BlackBerry 10 OS.” CSO. 4 Apr. 2013. <http://www.csoonline.com/article/731222/blackberry-details-extensive-security-protection-in-blackberry-10-os>.
  33. Mogull, Rich. “Apple’s Security Strategy: Make It Invisible.” Macworld. 14 June 2013. <http://www.macworld.com/article/2041724/apples-security-strategy-make-it-invisible.html>.
  34. Naraine, Ryan. “Apple Adds Data Security, MDM Configuration Goodies to IOS 7.” SecurityWeek. 28 June 2013. <https://www.securityweek.com/apple-adds-data-security-mdm-configuration-goodies-ios-7>.
  35. Olson, Parmy. “Tools To Hack Android Phones Are Getting Easier To Use.” Forbes. 08 Aug. 2013. <http://www.forbes.com/sites/parmyolson/2013/08/08/tools-to-hack-android-phones-are-getting-easier-to-use/>.
  36. Pachal, Pete. “How ICloud Keychain Is Better (and Worse) Than a Password Manager.” Mashable. 18 June 2013. <http://mashable.com/2013/06/18/icloud-keychain/>.
  37. Paczkowski, John. “Four Out of Five Malware Menaces Choose Android.” AllThingsD. 27 Aug. 2013. <http://allthingsd.com/20130827/four-out-of-five-malware-menaces-choose-android/>.
  38. Ragan, Steve. “Many Major Brand Mobile Apps Not Secure on Android, Says Study.” CSO. 29 Aug. 2013. <http://www.csoonline.com/article/738947/many-major-brand-mobile-apps-not-secure-on-android-says-study>.
  39. Rashid, Fahmida Y. “Android’s Biggest Security Threat: OS Fragmentation.” PCMAG. 8 Mar. 2013. <http://securitywatch.pcmag.com/none/308966-android-s-biggest-security-threat-os-fragmentation>.
  40. Rashid, Fahmida Y. “So You Think Macs Don’t Have Malware? Think Again.” PCMAG. 17 July 2013.  <http://securitywatch.pcmag.com/apple/313783-so-you-think-macs-don-t-have-malware-think-again>.
  41. Roberts, Paul. “If IOS Is Less Secure, Why Does Android Get Attacked?Veracode Blog. 18 Apr. 2013. <https://www.veracode.com/blog/2013/04/if-ios-is-less-secure-why-does-android-get-attacked/>.
  42. Roberts, Paul. “Our NFC Enabled Future: Outlook Not So Good.” Veracode Blog. 3 Jan. 2013. <https://www.veracode.com/blog/2013/01/our-nfc-enabled-future-outlook-not-so-good/>.
  43. Rubenking, Neil J. “Windows 8: Secure at the Deepest Level.” PCMAG. 3 Aug. 2012. <http://www.pcmag.com/article2/0,2817,2408016,00.asp>.
  44. Samson, Ted. “New Tools Let Cyber Criminals Easily Trojanize Legit Android Apps.” InfoWorld. 17 July 2013. <https://www.infoworld.com/t/mobile-security/new-tools-let-cyber-criminals-easily-trojanize-legit-android-apps-222942>.
  45. Schneier, Bruce. “When It Comes to Security, We’re Back to Feudalism.” Wired. 26 Nov. 2012. <http://www.wired.com/opinion/2012/11/feudal-security/>.
  46. Simonite, Tom. “New Chromebook: Getting Better, but Its Internet Dependence Is Limiting.” MIT Technology Review. 21 Dec. 2012. <http://www.technologyreview.com/news/508721/new-chromebook-getting-better-but-its-internet-dependence-is-limiting/>.
  47. Sims, Gary. “Google Adds Seven New Security Features to Android.” Android Authority. 6 Aug. 2013. <http://www.androidauthority.com/android-4-3-new-security-features-253244/>.
  48. Souppouris, Aaron. “Android 4.3 Code Reveals Granular App Controls and 4K Support Are Coming Soon.” The Verge. 26 July 2013. <http://www.theverge.com/2013/7/26/4558998/android-4-3-hidden-features-app-permissions-4k-support-konami-code>.
  49. Summers, Nick. “By Offering Its Stock Apps in the Play Store, Google Is Slowly Solving Android Fragmentation.” TheNextWeb. 22 Aug. 2013. <http://thenextweb.com/google/2013/08/22/googles-focus-on-in-house-apps-is-making-the-android-fragmentation-problem-irrelevant/>.