Security: Difference between revisions

3,816 bytes added ,  9 years ago
no edit summary
No edit summary
No edit summary
Line 187:
 
HTTPS Everywhere. 2014. [https://www.eff.org/https-everywhere HTTPS Everywhere]. San Francisco, CA: eff.org/https-everywhere .
 
phantom. 2014. [https://code.google.com/p/phantom/ phantom: System for generic, decentralized, unstoppable internet anonymity]. Mountain View, CA: code.google.com/p/phantom/ .
 
TOR Vidalia project and Tor Browser Bundle.
Line 297 ⟶ 299:
 
Gibbs-Duhem. 2011. [http://ask.slashdot.org/story/11/07/28/2153248/Ask-Slashdot-How-Do-You-Protect-Data-On-Android Ask Slashdot: How Do You Protect Data On Android?]. July 28. ask.slashdot.org.
 
 
'''References to Add'''
 
https://apps.facebook.com/theguardian/commentisfree/2012/jul/10/nsa-warrantless-wiretapping-crime
 
http://apple.slashdot.org/story/12/07/15/1457223/when-art-apple-and-the-secret-service-collide
 
http://news.slashdot.org/story/12/07/14/2157233/former-pentagon-analyst-china-has-backdoors-to-80-of-telecoms
 
http://it.slashdot.org/story/12/07/17/1516220/security-camp-is-not-space-camp-just-based-on-it-video
 
http://it.slashdot.org/story/12/07/16/2310215/android-jelly-bean-much-harder-to-hack
 
http://hardware.slashdot.org/story/12/07/22/0335223/the-darpa-funded-power-strip-that-will-hack-your-network
 
http://www.wired.com/threatlevel/2012/07/binney-on-alexander-and-nsa/
 
http://yro.slashdot.org/story/12/08/02/1628204/federal-appeals-court-orders-tsa-to-explain-delay-in-body-scan-public-hearing
 
http://it.slashdot.org/story/12/08/03/0026201/yahoo-sued-for-password-breach
 
http://it.slashdot.org/story/12/08/07/006229/time-machines-computer-memory-and-brute-force-attacks-against-smartcards
 
http://it.slashdot.org/story/12/08/07/1349234/sensor-uses-bodys-electrical-signature-to-secure-devices
 
http://news.slashdot.org/story/12/08/10/1453237/poll-finds-americans-think-the-tsa-is-doing-a-good-job
 
http://it.slashdot.org/story/12/08/15/2033234/botnet-flaw-lets-researchers-disrupt-attacks
 
http://it.slashdot.org/story/12/09/03/0321205/calculating-the-cost-of-full-disk-encryption
 
http://yro.slashdot.org/story/12/09/08/2029245/white-house-circulating-draft-of-executive-order-on-cybersecurity
 
http://mobile.slashdot.org/story/12/09/20/1324228/android-hacked-via-nfc-on-the-samsung-galaxy-s-3
 
http://it.slashdot.org/story/12/09/25/1631236/samsung-smartphones-vulnerable-to-remote-wipe-hack
 
http://it.slashdot.org/story/12/09/25/1356211/data-breach-reveals-100k-ieeeorg-members-plaintext-passwords
 
http://www.proxy-server.at/
 
http://rendezvous.blogs.nytimes.com/2013/06/28/u-s-prism-meet-chinas-golden-shield/
 
http://www.washingtonpost.com/blogs/the-switch/wp/2013/09/06/the-feds-pays-for-60-percent-of-tors-development-can-users-trust-it/
 
http://yro.slashdot.org/story/13/09/09/1154209/google-speeding-up-new-encryption-project-after-latest-snowden-leaks
 
http://www.theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-surveillance
 
https://www.youtube.com/watch?v=3ijjHZHNIbU
 
http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption
 
http://yro.slashdot.org/story/13/10/06/0016208/us-intelligence-chief-defends-attempts-to-break-tor
 
http://gizmodo.com/darpa-will-give-you-2-million-to-build-hacker-proof-de-1451009416
 
https://www.eff.org/deeplinks/2013/10/ten-steps-against-surveillance
 
http://www.netfamilynews.org/top-takeaways-from-uss-top-net-safety-conference
 
https://www.eff.org/https-everywhere/faq
 
http://slashdot.org/topic/datacenter/home-routers-pose-biggest-consumer-cyberthreat/
 
http://krebsonsecurity.com/
 
http://news.slashdot.org/story/14/03/28/1132220/wal-mart-sues-visa-for-5-billion-for-rigging-card-swipe-fees
 
http://interviews.slashdot.org/story/14/04/06/2344201/interview-john-mcafee-answers-your-questions
 
http://thetrustadvisor.com/headlines/cyberthreats
 
http://politics.slashdot.org/story/14/07/10/1954258/after-nsa-spying-flap-germany-asks-cia-station-chief-to-depart
 
 
https://whispersystems.org/#encrypted_texts
 
https://crypto.cat/
 
https://guardianproject.info/apps/chatsecure
 
http://www.lelundin.se/
 
http://it.slashdot.org/story/14/11/07/1611257/website-peeps-into-73000-unsecured-security-cameras-via-default-passwords
 
http://open.blogs.nytimes.com/2014/11/13/embracing-https/?_r=3
 
https://code.google.com/p/phantom/
 
 
Line 439 ⟶ 531:
 
Surveillance: http://worlduniversity.wikia.com/wiki/Surveillance
 
 
 
 
Anonymous user