[Security, at what cost? | Online reputation in a connected world | Online behavioral advertising "icon" study | How unique - and trackable - is your browser? | Privacy and the use of geospatial information | Cyberwar | Security threat report: 2010 | How online card security fails | Most consumers reuse banking passwords on other sites | De-anonimyzing social network users | Making privacy policies not suck | Social media and young adults | 17 golden rules for mobile social networks | Online copyright enforcement and data protection | Ensuring consent and revocation | Chip and PIN is broken | 2010 UK security breach investigations report | 2010 CWE/SANS Top 25 most dangerous programming errors | Botnets blamed for junk mail and malicious spam | The promotion and protection of human rights and fundamental freedoms while countering terrorism | Behavioural biometrics]
An introduction by ENISA.
ENISA Briefing: Behavioural biometrics (PDF)
[Open link in this window | Open link in new window]
Tech and law: Behavioural biometrics / marketing - ENISA briefing
[Open link in this window | Open link in new window]
More at... [10/02/26 (1)]
A report by the Special Rapporteur to the UN.
UN Office of the High Commissioner for Human Rights: Promotion of all human rights, civil, political, economic, social and cultural rights, including the right to development - Report of the Special Rapporteur on the promotion and protection of human rights and fundamental freedoms while countering terrorism, Martin Scheinin (PDF)
[Open link in this window | Open link in new window]
Institute for Human Rights: Martin Scheinin
[Open link in this window | Open link in new window]
United Nations - Human Rights
[Open link in this window | Open link in new window]
More at... [10/02/25 (1)]
A report by M86 Security Labs.
M86: M86 Security Labs Report, Jul 2009-Dec 2009 Recap (PDF)
[Open link in this window | Open link in new window]
M86: M86 Security Labs Resources
[Open link in this window | Open link in new window]
The Register: Undead botnets blamed for big rise in email malware
[Open link in this window | Open link in new window]
[10/02/23]
A list of the most widespread and critical programming errors that can lead to serious software vulnerabilities.
CWE: 2010 CWE/SANS Top 25 most dangerous programming errors
[Open link in this window | Open link in new window]
The Register: Experts reboot list of 25 most dangerous coding errors
[Open link in this window | Open link in new window]
[10/02/22]
An analysis of data compromise cases by 7Safe and the University of Bedfordshire.
7Safe: UK Security breach investigations report, an analysis of data compromise cases, 2010 (PDF)
[Open link in this window | Open link in new window]
7Safe: UK security breach investigations report 2010
[Open link in this window | Open link in new window]
View from the bunker: SQL injection attacks rule... still...
[Open link in this window | Open link in new window]
More at... [10/02/21 (1)]
Research by the University of Cambridge.
Steven J.Murdoch, Saar Drimer, Ross Anderson, Mike Bond: Chip and PIN is broken (PDF)
[Open link in this window | Open link in new window]
University of Cambridge: EMV PIN verification "wedge" vulnerability
[Open link in this window | Open link in new window]
Light blue touchpaper: Chip and PIN is broken
[Open link in this window | Open link in new window]
More at... [10/02/20 (1)]
A collaborative research project into informational privacy, undertaken by UK industry and academia.
EnCoRe website
[Open link in this window | Open link in new window]
EnCoRe: Technical architecture for the first realized case study (PDF)
[Open link in this window | Open link in new window]
Tech and law: Consent & revocation - EnCoRe paper
[Open link in this window | Open link in new window]
[10/02/19]
A study by Hunton & Williams.
Hunton & Williams: Study on online copyright enforcement and data protection in selected member states (PDF)
[Open link in this window | Open link in new window]
Tech and law: Online copyright enforcement vs data protection
[Open link in this window | Open link in new window]
[10/02/18]
Recommendations by ENISA.
ENISA: Online as soon as it happens (PDF)
[Open link in this window | Open link in new window]
ENISA: Instantly online - 17 golden rules for mobile social networks
[Open link in this window | Open link in new window]
Tech and law: Mobile social networks - ENISA's 17 golden rules for privacy and security
[Open link in this window | Open link in new window]
More at... [10/02/17 (1)]
Research by the Pew Research Center.
PewResearchCenter: Social media & mobile internet use among teens and young adults (PDF)
[Open link in this window | Open link in new window]
PewResearchCenter: Social media and young adults
[Open link in this window | Open link in new window]
More at... [10/02/16 (1)]
An initiative by the Mozilla community.
Mozilla wiki: Drumbeat / Challenges / Privacy Icons
[Open link in this window | Open link in new window]
Aza's thoughts: Making privacy policies not suck
[Open link in this window | Open link in new window]
Cnet: Mozilla weighs privacy warnings for Web pages
[Open link in this window | Open link in new window]
More at... [10/02/15 (1)]
A publication by iSecLab.
Gilbert Wondracek, Thorsten Holz, Engin Kirda, Christopher Kruegel: A practical attack to de-anonymize social network users (PDF)
[Open link in this window | Open link in new window]
Publications @ iSecLab
[Open link in this window | Open link in new window]
Tech and Law: De-anonymizing social network users by using browser history to determine group membership
[Open link in this window | Open link in new window]
[10/02/14]
Research by Trusteer.
Trusteer: Reused login credentials (PDF)
[Open link in this window | Open link in new window]
The Register: Most consumers reuse banking passwords on other sites
[Open link in this window | Open link in new window]
[10/02/13]
Research by Steven J.Murdoch and Ross Anderson.
Steven J.Murdoch and Ross Anderson: Verified by Visa and MasterCard SecureCode - or, how not to design authentication (PDF)
[Open link in this window | Open link in new window]
Light blue touchpaper: How online card security fails
[Open link in this window | Open link in new window]
[10/02/12]
A report by Sophos.
Sophos: Security threat report - 2010 (PDF)
[Open link in this window | Open link in new window]
Sophos: Malware and spam rise 70% on social networks, security report reveals
[Open link in this window | Open link in new window]
Graham Cluley: Revealed - which social networks pose the biggest risk?
[Open link in this window | Open link in new window]
[10/02/11]
A report by McAfee.
Mcafee: In the crossfire - critical infrastructure in the age of cyber war (PDF)
[Open link in this window | Open link in new window]
CSIS: Significant cyber incidents since 2006 (PDF)
[Open link in this window | Open link in new window]
Ars technica: No rules - internet security a Hobbesian "state of nature"
[Open link in this window | Open link in new window]
[10/02/10]
Research by the Phase 5 Consulting Group.
Phase 5 Consulting Group: Research related to privacy and the use of geospatial information (PDF)
[Open link in this window | Open link in new window]
Office of the Privacy Commissioner of Canada: Geo what?? Canadians weigh in on location privacy
[Open link in this window | Open link in new window]
[10/02/09]
A research project by the Electronic Frontier Foundation.
EFF: Panopticlick
[Open link in this window | Open link in new window]
Tech and law: "Personal data" - browser fingerprint, not just IP addresses
[Open link in this window | Open link in new window]
[10/02/07]
A study released by the Future of Privacy Forum.
Future of Privacy Forum: Online behavioral advertising "icon" study, summary of key results (DOC)
[Open link in this window | Open link in new window]
Future of Privacy Forum: Future of Privacy Forum releases behavioral notices study
[Open link in this window | Open link in new window]
MediaPost: Industry coalition debuts friendly 'Hi, you are being targeted' logo
[Open link in this window | Open link in new window]
[10/02/06]
A report by Cross-tab / Microsoft.
Cross-tab: Online reputation in a connected world (PDF)
[Open link in this window | Open link in new window]
Microsoft Data Privacy Day: Reasearch shows online reputations matter - Read how your job prospects could be affected
[Open link in this window | Open link in new window]
[10/02/05]
Quantifying people's trade-offs across liberty, privacy and security - a study by RAND Europe.
RAND: Security, at what cost? (PDF)
[Open link in this window | Open link in new window]
RAND: Security, at what cost?
[Open link in this window | Open link in new window]
Privacy value networks: Quantifying people's trade-offs across liberty, privacy and security
[Open link in this window | Open link in new window]
[10/02/01]
On this page Transitional HTML 4.01 and CSS 1 are used. If you're seeing this text you either have CSS switched off in your browser, or you're using a browser that can't handle CSS. If you're using an older browser version, you might want to consider upgrading.