[Bittersweet cookies. Some security and privacy considerations | How unique and traceable are usernames? | Re - Commercial data privacy and innovation in the internet economy - a dynamic policy framework | Reliably erasing data from flash-based solid state drives | The 2011 (ISC)2 Global information security workforce study | 2011 Web security report | Lost iPhone? Lost passwords! | W32.Stuxnet Dossier Version 1.4 (February 2011) | Digital signage privacy standards | Guidelines on security and privacy in public cloud computing | Inferring friendship network structure by using mobile phone data | The deidentification dilemma - A legislative and contractual proposal | A good decade for cybercrime | The next digital decade | Cybersecurity two years later | Corporate cyborgs and technology risks | European privacy and human rights | The true cost of compliance | Patterns of misconduct - FBI intelligence violations from 2001-2008 | Cisco 2010 annual security report | Cloud computing - A primer on legal issues, including privacy and data security | Relay attacks on passive keyless entry and start systems in modern cars | Privacy by design at Microsoft]
A position paper by ENISA.
ENISA: Bittersweet cookies. Some security and privacy considerations (PDF)
[Open link in this window | Open link in new window]
ENISA: Bittersweet cookies. Some security and privacy considerations
[Open link in this window | Open link in new window]
Out-law.com: Web users need more cookie control, says EU info security advisor
[Open link in this window | Open link in new window]
WebWereld: EU luidt noodklok over 'supercookies'
[Open link in this window | Open link in new window]
ENISA: 'Bittersweet cookies' - new types of 'cookies' raise online security & privacy concerns
[Open link in this window | Open link in new window]
An article by Daniele Perito, Claude Castelluccia, Mohamed Ali Kaafar, Pere Manils.
Daniele Perito, Claude Castelluccia, Mohamed Ali Kaafar, Pere Manils: How unique and traceable are usernames? (PDF)
[Open link in this window | Open link in new window]
Office of the Privacy Commissioner of Canada: Online profile linking using usernames
[Open link in this window | Open link in new window]
A response to the U.S. Department of Commerce by Facebook.
Facebook: Re - Commercial data privacy and innovation in the internet economy - a dynamic policy framework (SCRIBD)
[Open link in this window | Open link in new window]
FastCompany: Facebook vs. FTC round 2 - Facebook responds
[Open link in this window | Open link in new window]
Nu.nl: Facebook vreest privacybeleid toezichthouder
[Open link in this window | Open link in new window]
An article by Michael Wei, Laura M. Grupp, Frederick E. Spada, Steven Swanson.
Michael Wei, Laura M. Grupp, Frederick E. Spada, Steven Swanson: Reliably erasing data from flash-based solid state drives (PDF)
[Open link in this window | Open link in new window]
Naked Security: SSDs prove difficult to securely erase
[Open link in this window | Open link in new window]
A market survey by Robert Ayoub, CISSP.
Robert Ayoub, CISSP: The 2011 (ISC)2 Global information security workforce study (PDF)
[Open link in this window | Open link in new window]
AG: Beveiliger mist kennis om cloud goed te beveiligen
[Open link in this window | Open link in new window]
A whitepaper by BlueCoat.
BlueCoat: 2011 Web security report (PDF)
[Open link in this window | Open link in new window]
DarkReading: Report - Social networks are the new platform for communications - and malware
[Open link in this window | Open link in new window]
More at... [11/02/25 (NL/01)]
More at... [11/02/25 (NL/02)]
More at... [11/02/25 (NL/03)]
More at... [11/02/25 (NL/04)]
More at... [11/02/25 (NL/05)]
More at... [11/02/25 (NL/06)]
A report by Jens Heider and Matthias Boll.
Jens Heider and Matthias Boll: Lost iPhone? Lost passwords! (PDF)
[Open link in this window | Open link in new window]
Security.nl: Onderzoekers kraken iPhone-enryptie
[Open link in this window | Open link in new window]
AG: Wachtwoorden stelen van de iPhone blijkt een eitje
[Open link in this window | Open link in new window]
PCWorld: iPhone attack reveals passwords in six minutes
[Open link in this window | Open link in new window]
A report by Nicolas Falliere, Liam O Murchu, and Eric Chien.
Nicolas Falliere, Liam O Murchu, and Eric Chien: W32.Stuxnet Dossier Version 1.4 (February 2011) (PDF)
[Open link in this window | Open link in new window]
Wired Threat Level: Report - Stuxnet hit 5 gateway targets on its way to Iranian plant
[Open link in this window | Open link in new window]
A report by the Digital Signage Federation.
Digital Signage Federation: Digital signage privacy standards (PDF)
[Open link in this window | Open link in new window]
Digital Signage Expo: Viewpoint - What the Digital Signage Federation's adoption of privacy standards means to the industry
[Open link in this window | Open link in new window]
PrivacyLives: Opinion by CDT's Harley Geiger - what the Digital Signage Federation's adoption of privacy standards means to the industry
[Open link in this window | Open link in new window]
Documents by NIST.
NIST: Guidelines on security and privacy in public cloud computing (PDF)
[Open link in this window | Open link in new window]
NIST: The NIST definition of cloud computing (draft)
[Open link in this window | Open link in new window]
AG: Amerikanen leggen cloud aan banden
[Open link in this window | Open link in new window]
EPIC: NIST seeks comments on guidelines for cloud computing
[Open link in this window | Open link in new window]
An article by Nathan Eagle, Alex (Sandy) Pentland, and David Lazer.
Nathan Eagle, Alex (Sandy) Pentland, and David Lazer: Inferring friendship network structure by using mobile phone data (PDF)
[Open link in this window | Open link in new window]
BoF: Agent weet wat jij de komende twaalf uur doet
[Open link in this window | Open link in new window]
An article by Robert Gellman.
Robert Gellman: The deidentification dilemma - A legislative and contractual proposal (PDF)
[Open link in this window | Open link in new window]
PrivacyLives: Robert Gellman - The deidentification dilemma - a legislative and contractual proposal
[Open link in this window | Open link in new window]
A report by McAfee.
McAfee: A good decade for cybercrime (PDF)
[Open link in this window | Open link in new window]
McAfee: McAfee looks back on a decade of cybercrime
[Open link in this window | Open link in new window]
PCWorld: Cybercrime - A recession-proof growth industry
[Open link in this window | Open link in new window]
Roger Halbeer on Security: Cybercrime - A recession-proof growth industry
[Open link in this window | Open link in new window]
Essays on the future of the internet by Berin Szoka et al.
Berin Szoka et al.: The next digital decade
[Open link in this window | Open link in new window]
TLF: The problem of search engines as essential facilities
[Open link in this window | Open link in new window]
A report by CSIS.
CSIS: Cybersecurity two years later (PDF)
[Open link in this window | Open link in new window]
CSIS: Cybersecurity two years later
[Open link in this window | Open link in new window]
Policy@Intel: A busy time for privacy and security
[Open link in this window | Open link in new window]
An article by Andrea M. Matwyshyn.
Andrea M. Matwyshyn: Corporate cyborgs and technology risks (PDF)
[Open link in this window | Open link in new window]
Concurring Opinions: Matwyshyn on finance hackers
[Open link in this window | Open link in new window]
More at... [11/02/11 (NL/01)]
More at... [11/02/11 (NL/02)]
A report by Privacy International.
Privacy International: European privacy and human rights
[Open link in this window | Open link in new window]
De Naakte Mens: Tijd voor een donder- en bliksempolitie
[Open link in this window | Open link in new window]
Security.nl: Nederland en VK grootste politiestaten van Europa
[Open link in this window | Open link in new window]
EPIC: PI, EPIC, CMCS release EU privacy report
[Open link in this window | Open link in new window]
A report by Ponemon Institute LLC.
Ponemon Institute LLC: The true cost of compliance (PDF)
[Open link in this window | Open link in new window]
Tripwire: Ponemon Research - The true cost of compliance
[Open link in this window | Open link in new window]
AG: Investeren in compliance loont
[Open link in this window | Open link in new window]
A report by EFF.
EFF: Patterns of misconduct - FBI intelligence violations from 2001-2008
[Open link in this window | Open link in new window]
EFF: EFF uncovers widespread FBI intelligence violations
[Open link in this window | Open link in new window]
A report by Cisco.
Cisco: Cisco 2010 annual security report (PDF)
[Open link in this window | Open link in new window]
SANS: Digital forensics case leads - capturing Mac memory, the shifting threat landscape, forensics tool updates, and Zero Day - a novel
[Open link in this window | Open link in new window]
A primer by Hogan Lovells.
Hogan Lovells: Cloud computing - A primer on legal issues, including privacy and data security (PDF)
[Open link in this window | Open link in new window]
Cisco: Privacy and security compliance journey
[Open link in this window | Open link in new window]
HL: Cisco privacy site features Hogan Lovells cloud compliance primer
[Open link in this window | Open link in new window]
A report by Aurélien Francillon, Boris Danev and Srdjan Capkun.
Aurélien Francillon, Boris Danev and Srdjan Capkun: Relay attacks on passive keyless entry and start systems in modern cars (PDF)
[Open link in this window | Open link in new window]
Eric Diehl: Stealing cars without difficulty
[Open link in this window | Open link in new window]
A backgrounder by Microsoft.
Microsoft: Privacy by design at Microsoft (PDF)
[Open link in this window | Open link in new window]
Microsoft: Privacy by design
[Open link in this window | Open link in new window]
Microsoft Privacy & Safety: New backgrounder - Privacy by design at Microsoft
[Open link in this window | Open link in new window]
More at... [11/02/04 (NL/01)]
More at... [11/02/04 (NL/02)]
On this page Transitional HTML 4.01 and CSS 1 are used. If you're seeing this text you either have CSS switched off in your browser, or you're using a browser that can't handle CSS. If you're using an older browser version, you might want to consider upgrading.