Bibliography for Chapter 2 – Personal Information Risks

2.1 Introduction

  1. Mirani, Leo. “Advertisers Are Second Only to Hackers in Americans’ List of Online Baddies.” Quartz. 5 Sept. 2013.  <http://qz.com/121664/advertisers-are-second-only-to-hackers-in-americans-list-of-online-baddies/>.

2.2 Information you should protect

  1. Ellis, Blake. “Victim of Identity Theft? Expect a Long Wait for Your Tax Refund.” CNNMoney. 10 Jan. 2013. <http://money.cnn.com/2013/01/10/pf/taxes/identity-theft-tax-refund/index.html>.
  2. Tucker, Patrick. “Has Big Data Made Anonymity Impossible?MIT Technology Review. 7 May 2013. <http://www.technologyreview.com/news/514351/has-big-data-made-anonymity-impossible/>.

2.3 Dangers of the Internet

  1. Anon. “Did You Know Your Kid’s Identity Can Be Stolen? Here’s How to Stop It.KATU TV. 12 Sept. 2013. <http://www.katu.com/news/business/Did-you-know-your-kids-identify-can-be-stolen-Heres-how-to-stop-it-223521061.html>.
  2. Anon. “Experts Warn of Rise in Internet Blackmail.” Gulf-Times. 18 Aug. 2013. <http://www.gulf-times.com/uk-europe/183/details/363025/experts-warn-of-rise-in-internet-blackmail>.
  3. Anon. “Punished for Being a Parent of a Bully.” The Globe and Mail. 3 Aug. 2013. <http://www.theglobeandmail.com/commentary/editorials/punished-for-being-a-parent-of-a-bully/article13939363/>.
  4. Bleau, Heidi. “Workplace Security: Are You the Weakest Link?The RSA Blog. 22 Mar. 2013. <http://blogs.rsa.com/workplace-security-are-you-the-weakest-link/>.
  5. Brenner, Bill. “McAfee’s 12 Scams of Christmas and Holiday Shopping Survey.” CSO. 12 Nov. 2012. <http://blogs.csoonline.com/malwarecybercrime/2450/mcafees-12-scams-christmas-and-holiday-shopping-survey>.
  6. Cawley, Christian. “The Latest Internet Security Threats That You Should Be Aware Of.” MakeUseOf. 31 Jan. 2013. <http://www.makeuseof.com/tag/latest-internet-security-threats/>.
  7. Chickowski, Ericka. “10 Web-Based Attacks Targeting Your End Users.” Dark Reading. 7 Aug. 2013. <http://www.darkreading.com/applications/10-web-based-attacks-targeting-your-end/240159280>.
  8. Cooney, Michael. “IRS Uncorks Dirty Dozen Tax Scams for 2013.” Network World. 26 Mar. 2013. <https://www.networkworld.com/news/2013/032613-irs-tax-scams-268095.html>.
  9. Danchev, Dancho. “Research: 80% of Carberp Infected Computers Had Antivirus Software Installed.” ZDNet. 27 July 2012. <http://www.zdnet.com/research-80-of-carberp-infected-computers-had-antivirus-software-installed-7000001679/>.
  10. Ducklin, Paul. “Anatomy of a Browser Trick – You’ve Heard of “clickjacking”, Now Meet “keyjacking”Naked Security. 29 June 2013. <http://nakedsecurity.sophos.com/2013/06/29/anatomy-of-a-browser-trick-youve-heard-of-clickjacking-now-meet-keyjacking/>.
  11. Ducklin, Paul. “OpenX Ad Servers “pre-compromised” – Official Distro Contained Remote Code Backdoor.” Naked Security. <http://nakedsecurity.sophos.com/2013/08/07/openx-ad-servers-pre-compromised-official-distro-contained-remote-code-backdoor/>.
  12. Editor. “Fake Ad For Apparent Credit-Card Scam Was On Our Site.” MIT Technology Review. <http://www.technologyreview.com/view/517576/fake-ad-for-apparent-credit-card-scam-was-on-our-site/>.
  13. Fink, Erica, and Laurie Segall. “Pimps Hit Social Networks to Recruit Underage Sex Workers.” CNNMoney. 27 Feb. 2013. <http://money.cnn.com/2013/02/27/technology/social/pimps-social-networks/index.html>.
  14. Franceschi-Bicchierai, Lorenzo. “Inside the Syrian Electronic Army’s Attack on Outbrain.” Mashable. 16 Aug. 2013. <http://mashable.com/2013/08/16/syrian-electronic-attack-outbrain/>.
  15. Goddard, Ben. “Thieves Hacking into GPS Apps to Target High Value Bikes.” Staffordshire Newsletter. 24 Mar. 2013. <http://www.staffordshirenewsletter.co.uk/News/Thieves-hacking-into-GPS-apps-to-target-high-value-bikes-21032013.htm>.
  16. Goldberg, Eleanor. “Boston Marathon Victim Charity Scams Crop Up In Wake Of Tragedy.” The Huffington Post. 16 Apr. 2013. <http://www.huffingtonpost.com/2013/04/16/boston-marathon-charity-scams_n_3093734.html>.
  17. Goldman, Jeff. “41 Percent of Online Fraud Victims Get No Money Back.” ESecurity Planet. 23 Aug. 2013. <http://www.esecurityplanet.com/network-security/41-percent-of-online-fraud-victims-get-no-money-back.html>.
  18. Goldman, Jeff. “McAfee Reports Surge in Ransomware in Q2 2013.” ESecurity Planet. 23 Aug. 2013. <http://www.esecurityplanet.com/malware/mcafee-reports-surge-in-ransomware-in-q2-2013.html>.
  19. Hardaker, Claire. “Internet Trolls: A Guide to the Different Flavours.” The Guardian. 01 July 2013. <http://www.guardian.co.uk/commentisfree/2013/jul/01/internet-trolls-guide-to-different-flavours>.
  20. Higgins, Kelly J. “Botnet Business Booming.” Dark Reading. 19 Mar. 2013. <http://www.darkreading.com/insider-threat/167801100/security/attacks-breaches/240151192/botnet-business-booming.html>.
  21. Higgins, Kelly J. “Medical ID Theft Spreads.” Dark Reading. 12 Sept. 2013. <http://www.darkreading.com/attacks-breaches/medical-id-theft-spreads/240161234>.
  22. Kennedy, Kelly. “Medicare Won’t Issue New IDs to Identity-theft Victims.” USA Today. Gannett, 10 Oct. 2013. <http://www.usatoday.com/story/news/nation/2012/10/10/medicare-wont-reissue-numbers-after-id-thefts/1623489/>.
  23. Krebs, Brian. “Web Badness Knows No Bounds.” Krebs on Security. 13 June 2013. <http://krebsonsecurity.com/2013/06/web-badness-knows-no-bounds/>.
  24. Lee, Dave. “Top Porn Sites ‘pose Growing Malware Risk’ to Users.” BBC News. 12 Apr. 2013. <http://www.bbc.co.uk/news/technology-22093141>.
  25. Levin, Adam. “Identity Theft in 2013: The Battle for Your Data.” ABC News. 23 Dec. 2012. <http://abcnews.go.com/Business/identity-theft-2013-battle-data/story>.
  26. Leyden, John. “That Square QR Barcode on the Poster? Check It’s Not a Sticker.” The Register. 10 Dec. 2012. <http://www.theregister.co.uk/2012/12/10/qr_code_sticker_scam/>.
  27. Leyden, John. “Who’s Riddling Windows PCs with Gaping Holes? It’s Your CrApps.” The Register. 15 Mar. 2013. <http://www.theregister.co.uk/2013/03/15/secunia_vulnerability_research/>.
  28. Munson, Lee. “NSPCC: 1 In 5 Children Are Victims Of Cyber Bullying.” SecurityWatch. 12 Aug. 2013. <http://bhconsulting.ie/securitywatch/?p=1662>.
  29. Ragan, Steve. “Citadel Variant Targets International Users With Automatic Localization.” SecurityWeek. 27 June 2013. <https://www.securityweek.com/citadel-variant-targets-international-users-automatic-localization>.
  30. Ragan, Steve. “LA Times Subdomain Directed Readers to Malware.” SecurityWeek. 15 Feb. 2013. <https://www.securityweek.com/la-times-subdomain-directed-readers-malware>.
  31. Schneier, Bruce. “You Have No Control Over Security on the Feudal Internet.” Harvard Business Review. 6 June 2013. <http://blogs.hbr.org/cs/2013/06/you_have_no_control_over_s.html>.
  32. Stern, Aaron. “Adobe PDFs and Security.” Kaspersky Lab Official Blog. 24 Apr. 2013. <http://blog.kaspersky.com/adobe-pdfs-security/>.
  33. Talbot, David. “Dropbox and Similar Services Can Sync Malware.” MIT Technology Review. 21 Aug. 2013. <http://www.technologyreview.com/news/518506/dropbox-and-similar-services-can-sync-malware/>.
  34. Vaas, Lisa. “Stolen Webcam Video Listed at $1 per Female Victim, $1 per 100 Male Victims.” Naked Security. 21 June 2013. <http://nakedsecurity.sophos.com/2013/06/21/stolen-webcam-video-listed-at-1-per-female-victim-1-per-100-male-victims/>.
  35. Wilson, Tim. “Commercial DDoS Services Proliferate, Are Responsible For Many Recent Attacks.” Dark Reading. 10 July 2013. <http://www.darkreading.com/threat-intelligence/commercial-ddos-services-proliferate-are/240157965>.
  36. Zhou, Zhitao. “Can We Believe Our Eyes?DataProtectionCenter. 11 Aug. 2011. <http://www.dataprotectioncenter.com/antivirus/microsoft/can-we-believe-our-eyes/>.

2.4 Personal risk assessment

  1. Anon. “What Can We Learn from a Statistic That 1 in 4 Recipients of Breach Notification Letters Become Victims of ID Fraud?Office of Inadequate Security. 21 Feb. 2013. <http://www.databreaches.net/?p=26890>.
  2. Chickowski, Ericka. “Don’t Waste Your Money On Cyber Breach Insurance.Dark Reading. 26 Sept. 2012. <http://www.darkreading.com/database-security/167901020/security/security-management/240008014/don-t-waste-your-money-on-cyber-breach-insurance.html>.
  3. Gold, Jenny. “Scammers Find Fertile Ground In Health Law.” NPR. 22 Apr. 2013. <http://www.npr.org/blogs/health/2013/04/22/177771012/scammers-find-fertile-ground-in-health-law>.
  4. Goldman, Jeff. “Microsoft: PCs Without Anti-Virus Are 5.5 Times More Likely to Be Infected.” ESecurity Planet. 17 Apr. 2013. <http://www.esecurityplanet.com/windows-security/microsoft-pcs-without-anti-virus-are-5.5-times-more-likely-to-be-infected.html>.
  5. Hicken, Melanie. “‘Grandparent Scams’ Steal Thousands from Seniors.” CNNMoney. 22 May 2013. <http://money.cnn.com/2013/05/22/retirement/grandparent-scams/index.html>.
  6. Krebs, Brian. “ID Theft Service Tied to Payday Loan Sites.” Office of Inadequate Security. 17 Sept. 2012. <http://www.databreaches.net/?p=25332>.
  7. Rashid, Fahmida Y. “Watering Hole Attacks Scoop Up Everyone, Not Just Developers at Facebook, Twitter.” PCMAG. 13 Mar. 2013. <http://securitywatch.pcmag.com/none/309121-watering-hole-attacks-scoop-up-everyone-not-just-developers-at-facebook-twitter>.
  8. Salmi, Deborah. “Lost or Stolen Smartphone: The Consequences Are Bigger for Women Than for Men, Our Study Finds.” Avast! Blog. 28 Aug. 2013. <https://blog.avast.com/2013/08/28/lost-or-stolen-smartphone-the-consequences-are-bigger-for-women-than-for-men-our-study-finds/>.
  9. Wasserman, Todd. “Chilling Ad Shows How Easy It Is to Steal Your Online Identity.” Mashable. 9 July 2013. <http://mashable.com/2013/07/09/belgian-bank-ad-online-identity/>.