Information Technology Reference
In-Depth Information
[14]
Jason Fitzpatrick. “Firesheep Sniffs Out Facebook and Other User Credentials on Wi-
Fi Hotspots.” Lifehacker , October 25, 2010. lifehacker.com.
[15]
Gregg Keizer. “How to Protect against Firesheep Attacks.” Computerworld , October 26,
2010. www.computerworld.com .
[16]
Sharon Machlis. “How to Hijack Facebook Using Firesheep.” PCWorld , October 30,
2010. www.pcworld.com.
[17]
Eric Butler. “Firesheep, a Week Later: Ethics and Legality.” {codebutler} (blog), Novem-
ber 1, 2011. codebutler.com.
[18]
Alex Rice. “A Continued Commitment to Security.” The Facebook Blog , January 26,
2011. blog.facebook.com.
[19]
Paul Ducklin. “Twitter Goes Secure—Say Goodbye to Firesheep with 'Always use
HTTPS' Option.” nakedsecurity (blog), March 16, 2011. nakedsecurity.sophos.com.
[20]
Jessica Goodman. “Firesheep, What Color Is Your Hat?” FeelingElephant's Weblog ,
November 30, 2010. feelingelephants.wordpress.com.
[21]
David Ferbrache. A Pathology of Computer Viruses . Springer-Verlag, London, England,
1992.
[22]
Eurostat. “Nearly One Third of Internet Users in the EU27 Caught a Computer Virus;
84% of Internet Users Use IT Security Software for Protection.” News release, February
7, 2011. europa.eu.
[23]
“Google Warns TWO MILLION Users Their Computers Have Been Infected with a
Virus.” Mail Online , July 21, 2011. www.dailymail.co.uk.
[24]
John Brunner. The Shockwave Rider . Harper & Row, New York, NY, 1975.
[25]
Katie Hafner and John Markoff. Cyberpunk: Outlaws and Hackers on the Computer
Frontier . Simon & Schuster, New York, NY, 1991.
[26]
Paul Graham. “The Submarine.” April 2005. www.paulgraham.com.
[27]
“Worm Turns for Teenager Who Befuddled Microsoft.” Times
(
London
)
, July 6, 2005.
[28]
“Hacker behind Sasser, Netsky Worms Gets Job with German Security Company.” San
Jose
(
CA
)
Mercury News , September 28, 2004.
[29]
John Leyden. “Sasser Suspect Walks Free.” Register , July 8, 2005. www.theregister.do
.uk.
[30]
Celeste Biever. “Instant Messaging Falls Prey to Worms.” New Scientist , May 14, 2005.
[31]
Hanleigh Daniels. “Palevo Is Worming Its Way via IM Spam.” Tech Smart , May 4, 2010.
www.techsmart.co.za.
[32]
Ben Nahorney, editor. “The Downadup Codex: A Comprehensive Guide to the
Threat's Mechanics.” Edition 1.0. Symantec Corporation, 2009. www.symantec.com.
[33]
“Virus Strikes 15 Million PCs.” UPI , January 26, 2009. www.upi.com.
[34]
John Markoff. “Defying Experts, Rogue Computer Code Still Lurks.” New York Times ,
August 27, 2009.
[35]
Brian Prince. “Conficker Worm Deadline Passes Quietly—So Far.” IT Security & Net-
work Security News , April 1, 2009. www.eweek.com.
[36]
John Leyden. “Drive-By Download Menace Spreading Fast.” Register , January 23,
2008. www.theregister.co.uk.
[37]
Ryan Naraine. “Drive-By Downloads. The Web under Siege.” Securelist , April 15, 2009.
www.securelist.com.
 
Search WWH ::




Custom Search