Information Technology Reference
In-Depth Information
[14]
Jason Fitzpatrick. “Firesheep Sniffs Out Facebook and Other User Credentials on Wi-
Fi Hotspots.”
Lifehacker
, October 25, 2010. lifehacker.com.
[15]
Gregg Keizer. “How to Protect against Firesheep Attacks.”
Computerworld
, October 26,
2010.
www.computerworld.com
.
[16]
Sharon Machlis. “How to Hijack Facebook Using Firesheep.”
PCWorld
, October 30,
2010.
www.pcworld.com.
[17]
Eric Butler. “Firesheep, a Week Later: Ethics and Legality.”
{codebutler}
(blog), Novem-
ber 1, 2011. codebutler.com.
[18]
Alex Rice. “A Continued Commitment to Security.”
The Facebook Blog
, January 26,
2011. blog.facebook.com.
[19]
Paul Ducklin. “Twitter Goes Secure—Say Goodbye to Firesheep with 'Always use
HTTPS' Option.”
nakedsecurity
(blog), March 16, 2011. nakedsecurity.sophos.com.
[20]
Jessica Goodman. “Firesheep, What Color Is Your Hat?”
FeelingElephant's Weblog
,
November 30, 2010. feelingelephants.wordpress.com.
[21]
David Ferbrache.
A Pathology of Computer Viruses
. Springer-Verlag, London, England,
1992.
[22]
Eurostat. “Nearly One Third of Internet Users in the EU27 Caught a Computer Virus;
84% of Internet Users Use IT Security Software for Protection.” News release, February
7, 2011. europa.eu.
[23]
“Google Warns TWO MILLION Users Their Computers Have Been Infected with a
Virus.”
Mail Online
, July 21, 2011.
www.dailymail.co.uk.
[24]
John Brunner.
The Shockwave Rider
. Harper & Row, New York, NY, 1975.
[25]
Katie Hafner and John Markoff.
Cyberpunk: Outlaws and Hackers on the Computer
Frontier
. Simon & Schuster, New York, NY, 1991.
[26]
Paul Graham. “The Submarine.” April 2005.
www.paulgraham.com.
[27]
“Worm Turns for Teenager Who Befuddled Microsoft.”
Times
(
London
)
, July 6, 2005.
[28]
“Hacker behind Sasser, Netsky Worms Gets Job with German Security Company.”
San
Jose
(
CA
)
Mercury News
, September 28, 2004.
[29]
John Leyden. “Sasser Suspect Walks Free.”
Register
, July 8, 2005.
www.theregister.do
[30]
Celeste Biever. “Instant Messaging Falls Prey to Worms.”
New Scientist
, May 14, 2005.
[31]
Hanleigh Daniels. “Palevo Is Worming Its Way via IM Spam.”
Tech Smart
, May 4, 2010.
[32]
Ben Nahorney, editor. “The Downadup Codex: A Comprehensive Guide to the
Threat's Mechanics.” Edition 1.0. Symantec Corporation, 2009.
www.symantec.com.
[33]
“Virus Strikes 15 Million PCs.”
UPI
, January 26, 2009.
www.upi.com.
[34]
John Markoff. “Defying Experts, Rogue Computer Code Still Lurks.”
New York Times
,
August 27, 2009.
[35]
Brian Prince. “Conficker Worm Deadline Passes Quietly—So Far.”
IT Security & Net-
work Security News
, April 1, 2009.
www.eweek.com.
[36]
John Leyden. “Drive-By Download Menace Spreading Fast.”
Register
, January 23,
2008.
www.theregister.co.uk.
[37]
Ryan Naraine. “Drive-By Downloads. The Web under Siege.”
Securelist
, April 15, 2009.
www.securelist.com.