Bibilography for Chapter 1 – The Internet New Normal

1.1   Introduction

  1. Keller, Joy. “7 Internet Security Lies.” 7 Internet Security Lies. 2013. < http://www.webroot.com/us/en/home/resources/articles/mobile-security/mobile-7-internet-security-lies>.
  2. Silver, James. “The 20 Commandments of Online Safety.” Gulfnews.com. 20 May 2013. <http://gulfnews.com/business/technology/the-20-commandmants-of-online-safety-1.1185853>.
  3. Wilson, Tim. “Consumer Reports: 58 Million U.S. PCs Infected With Malware.” Dark Reading. 2 May 2013. <http://www.darkreading.com/privacy/consumer-reports-58-million-us-pcs-infec/240154081>.

1.2 Organized crime discovers the Internet

  1. Elisan, Christopher. “The Assembly Line Approach to Creating Malware.” Speaking of Security The RSA Blog and Podcast. 21 June 2013. <https://blogs.rsa.com/the-assembly-line-approach-to-creating-malware/>.
  2. Rashid, Fahmida Y. “Europol Warns Organized Cybercrime Is Booming.” Security Week. 19 Mar. 2013. <https://www.securityweek.com/europol-warns-organized-cybercrime-booming>.

1.3 Hackers out of the open and into the shadows

  1. Bernstein, Peter. “Impermium Study Looks at Consumer Attitudes on Internet Security.” TechZone360. 27 June 2013. <http://www.techzone360.com/topics/techzone/articles/2013/06/27/343832-impermium-study-looks-consumer-attitudes-internet-security.htm>.
  2. Carbonnel, Alissa De. “Ex-Soviet Hackers Play Outsized Role in Cyber Crime World.” Reuters. Thomson Reuters, 22 Aug. 2013.  <http://www.reuters.com/article/2013/08/22/net-us-russia-cybercrime-idUSBRE97L0TP20130822>.
  3. Cheng, Rob. “(Global) – Malware Storm.” IDG Connect –. 7 Feb. 2013. <http://www.idgconnect.com/blog-abstract/742/rob-cheng-global-malware-storm>.
  4. Cifuentes, Jamie. “Rent, Buy, or Lease? Exploit Toolkits A La Carte.” PCMAG. 19 Mar. 2013. <http://securitywatch.pcmag.com/none/309324-rent-buy-or-lease-exploit-toolkits-a-la-carte>.
  5. Clarke, Elizabeth. “Hackers Sell Health Insurance Credentials, Bank Accounts, SSNs and Counterfeit Documents, for over $1,000 Per Dossier.” Dell SecureWorks Blog. 15 July 2013. <http://www.secureworks.com/resources/blog/general-hackers-sell-health-insurance-credentials-bank-accounts-ssns-and-counterfeit-documents/>.
  6. Constantin, Lucian. “New Whitehole Exploit Toolkit Emerges on the Underground Market.” CSO. 7 Feb. 2013. <http://www.csoonline.com/article/728509/new-whitehole-exploit-toolkit-emerges-on-the-underground-market>.
  7. Gijzemijter, Martin. “Dutch DNS Server ‘hack’: Thousands of Sites Serve up Malware.” ZDNet. 9 Aug. 2013. <http://www.zdnet.com/dutch-dns-server-hack-thousands-of-sites-serve-up-malware-7000019196/>.
  8. Goldman, Jeff. “Security Flaws Found in 20 Percent of Popular WordPress Plugins.ESecurity Planet. 20 June 2013. <http://www.esecurityplanet.com/network-security/security-flaws-found-in-20-percent-of-popular-wordpress-plugins.html>.
  9. Gonsalves, Antone. “Prices Fall, Services Rise in Malware-as-a-service Market.” CSO. 1 Mar. 2013. <http://www.csoonline.com/article/729655/prices-fall-services-rise-in-malware-as-a-service-market>.
  10. Gonsalves, Antone. “Security Firms Warn of Spreading Windows AutoRun Malware.” CSO. 30 Nov. 2012. <http://www.csoonline.com/article/722724/security-firms-warn-of-spreading-windows-autorun-malware>.
  11. Gonsalves, Antone. “The Shadowy World Of Selling Software Bugs – And How It Makes Us All Less Safe.ReadWrite Web. 12 Oct. 2012. <http://www.readwriteweb.com/hack/2012/10/the-shadowy-world-of-selling-software-bugs-and-how-it-makes-us-all-less-safe.php>.
  12. Ingersoll, Geoffrey. “Mercenary Hackers Will Turn The Internet Into Afghanistan-Like ‘Warzone‘” Business Insider. 19 July 2013. <http://www.businessinsider.com/hackers-will-turn-internet-into-warzone-2013-7>.
  13. Lobosco, Katie. “Cyberattacks Are the Bank Robberies of the Future.” CNNMoney. 09 July 2013. <http://money.cnn.com/2013/07/09/technology/security/cybercrime-bank-robberies/index.html>.
  14. Ragan, Steve. “Crime Kits Becoming More Accessible, Says Symantec.” SecurityWeek. 19 Dec. 2012. <https://www.securityweek.com/crime-kits-becoming-more-accessible-says-symantec>.
  15. Ries, Uli. “CMSs Mostly Vulnerable through Addons Says German Security Agency.” The H Security. 21 June 2013. <http://www.h-online.com/security/news/item/CMSs-mostly-vulnerable-through-addons-says-German-security-agency-1894431.html>.
  16. Waterson, Dave. “Dave Waterson on Security.” Dave Waterson on Security. 25 Feb. 2013. <http://dwaterson.com/2013/02/25/exploit-kits-the-silent-assassin/>.

1.4 Information leaks you can’t control

  1. Frost, Peter, and Julie Wernau. “Personal Data for 4 Million Patients at Risk after Burglary.” Chicago Tribune. 24 Aug. 2013. <http://www.chicagotribune.com/business/ct-biz-0824-advocate-20130824%2C0%2C1314049.story>.
  2. Green, Sarah. “The Companies and Countries Losing Their Data.” Harvard Business Review. 12 Mar. 2013. <http://blogs.hbr.org/hbr/hbreditors/2013/03/the_companies_and_countries_lo.html>.
  3. Singer, Natasha. “A Data Broker Offers a Peek Behind the Curtain.” New York Times. 31 Aug. 2013.  <http://www.nytimes.com/2013/09/01/business/a-data-broker-offers-a-peek-behind-the-curtain.html>.
  4. Wang, Abigail. “Infographic: Is Your Information Safe from Data Breaches?PCMAG. 13 July 2013.  <http://securitywatch.pcmag.com/security/313585-infographic-is-your-information-safe-from-data-breaches>.

1.5 Summary