Information Technology Reference
In-Depth Information
[38]
Steve Sechrist. “State of Security: China's Trojan Horse.” Display Daily , March 18,
2008. displaydaily.com.
[39]
Webroot. “Spyware Infection Rates Return to Peak 2004 Levels According to Webroot
State of Spyware Report.” August 15, 2006. www.webroot.com.
[40]
Scott Berinato. “Attack of the Bots.” Wired , November 2006.
[41]
“Ecommerce Sales Topped $1 Trillion for First Time in 2012.” eMarketer , February 5,
2013. www.emarketer.com.
[42]
Greg Aaron and Rod Rasmussen. “Global Phishing Survey: Trends and Domain Name
Use in 2H2010.” APWG Internet Policy Committee, April 2011. www.apwg.org.
[43]
Edward Skoudis. “Evolutionary Trends in Cyberspace.” In Cyberpower and National
Security , pp. 163-164, edited by Franklin D. Kramer, Stuart H. Starr, and Larry K.
Wentz. Potomac Books, Dulles, Virginia, 2009,
[44]
CERT Coordination Center. “Denial of Service Attacks,” June 4, 2001. www.cert.org/
tech_tips/ denial_of_service.html.
[45]
Mike Toner. “Cyberterrorism Danger Lurking.” Atlanta Journal and Constitution ,
November 2, 2001.
[46]
Toni O'Loughlin. “Cyber Terrorism Reaches New Heights.” Australian Financial Re-
view , April 4, 2003.
[47]
“Zombie Master Jeanson Ancheta Pleads Guilty.” Spam Daily News , January 23, 2006.
www.spamdailynews.com.
[48]
“Zombie Master Jeanson Ancheta Sentenced to 5 Years in Prison.” Spam Daily News ,
May 9, 2006. www.spamdailynews.com.
[49]
Robert Lemos. “Blue Security Folds under Spammer's Wrath.” SecurityFocus , May 17,
2006. www.securityfocus.com.
[50]
Kim Zetter. “TJX Hacker Charged with Heartland, Hannaford Breaches.” Threat Level:
Privacy, Crime and Security Online, Wired , August 17, 2009. www.wired.com.
[51]
David Morrison. “Albert Gonzalez, Mastermind Heartland Hacker, Gets 20 Years.”
Credit Union Times , April 7, 2010. www.cutimes.com.
[52]
“Avalanche Botnet Moves from Distributing Spam to Zeus Lures.” SC Magazine , Oc-
tober 25, 2010. www.scmagazineuk.com.
[53]
Kevin O'Shea. “Cyber Attack Investigative Tools and Technologies.” Institute for Secu-
rity Technology Studies at Dartmouth College, May 7, 2003. www.ists.dartmouth.edu.
[54]
Joshua Davis. “Hackers Take Down the Most Wired Country in Europe.” Wired ,Au-
gust 21, 2007. www.wired.com.
[55]
Mark Lander and John Markoff. “Digital Fears Emerge after Data Siege in Estonia.”
New York Times , May 29, 2007. www.nytimes.com.
[56]
“A Look at Estonia's Cyber Attack in 2007.” Associated Press , July 8, 2009. www.msnbc
.msn.com.
[57]
John Markoff. “Before the Gunfire, Cyberattacks.” New York Times , August 12, 2008.
www.nytimes.com.
[58]
Kevin Coleman. “Cyber War 2.0—Russia v. Georgia.” Defense Tech , August 13, 2008.
defensetech.org.
[59]
“War, Redefined.” Los Angeles Times , August 17, 2008. articles.latimes.com.
[60]
Jared Newman. “Twitter Crippled by Denial-of-Service Attack.” PCWorld Blogs ,Au-
gust 6, 2009. www.pcworld.com.
 
Search WWH ::




Custom Search