[Towards street-level client-independent IP geolocation | Bridging the gap between physical location and online social networks | Tragedy of the data commons | SANS Seventh annual log management survey report | Shadow evaluation report on the Data Retention Directive (2006/24/EC) | Evaluation report [official version] on the Data Retention Directive (Directive 2006/24/EC) | Evaluation report [leaked version] on the Data Retention Directive (Directive 2006/24/EC) | Working document 01/2011 on the current EU personal data breach framework and recommendations for future policy developments | Freedom on the Net 2011 | 2011 Data breach investigations report | In the dark - Crucial industries confront attacks | Cyber Europe 2010 - Evaluation report | Cyber security - the road ahead | Cyber-Ark snooping survey, April 2011 | Social networking, age and privacy | Anonymity loves company - usability and the network effect | National strategy for trusted identities in cyberspace | Brief of amicus curiae Professor Michael Carrier in support of defendants-appellees and urging affirmance [Google/YouTube] | Opinion 12/2011 on smart metering | Software on the witness stand - what should it take for us to trust it? | Social norms and intellectual property - Online norms and the European legal development | The failure of online social network privacy settings | Resillience of the Internet interconnection ecosystem | How to shop for free online - Security analysis of cashier-as-a-service based web stores | Tweets and trades - the information content of stock microblogs | Brief of amici curiae in support of objections of real parties in interest Jacob Appelbaum, Birgitta Jonsdottir and Rop Gonggrijp to March 11, 2011 order denying motion to vacate | 2010 full year top cyber security risks report | Resilience metrics and measurements | The weak password problem - chaos, criticality, and encrypted p-CAPTCHAs | One bad apple spoils the bunch - exploiting P2P applications to trace and profile Tor users | Can we fix the security economics of federated authentication?]
A paper by Yong Wang et al..
Yong Wang et al.: Towards street-level client-independent IP geolocation (PDF)
[Open link in this window | Open link in new window]
Ars Technica: IP address can now pin down your location to within half a mile
[Open link in this window | Open link in new window]
A paper by Justin Cranshaw et al..
Justin Cranshaw et al.: Bridging the gap between physical location and online social networks (PDF)
[Open link in this window | Open link in new window]
Eran Toch et al.: Empirical models of privacy in location sharing (PDF)
[Open link in this window | Open link in new window]
MetaFilter: Comment 'jasonhong', April 20
[Open link in this window | Open link in new window]
An article by Jane Yakowitz.
Jane Yakowitz: Tragedy of the data commons (SSRN)
[Open link in this window | Open link in new window]
TLF: Jane Yakowitz on the tragedy of the data commons
[Open link in this window | Open link in new window]
A whitepaper by SANS.
SANS: SANS Seventh annual log management survey report (PDF)
[Open link in this window | Open link in new window]
DarkReading: Enterprises logging security data, but still struggle to use it
[Open link in this window | Open link in new window]
More at... [11/04/29 (NL/01)]
More at... [11/04/29 (NL/02)]
More at... [11/04/29 (NL/03)]
More at... [11/04/29 (NL/04)]
More at... [11/04/29 (NL/05)]
A report by EDRi.
EDRi: Shadow evaluation report on the Data Retention Directive (2006/24/EC) (PDF)
[Open link in this window | Open link in new window]
EDRi: EDRi evaluation of data retention shows it has significant costs but no benefits
[Open link in this window | Open link in new window]
A report (the official version) by European Commission.
European Commission: Evaluation report on the Data Retention Directive (Directive 2006/24/EC) (PDF)
[Open link in this window | Open link in new window]
EUROPA: Commission evaluates the Directive on retention of telecommunications data
[Open link in this window | Open link in new window]
EUROPA: Frequently asked questions - evaluation report of the Data Retention Directive
[Open link in this window | Open link in new window]
EuropaNu: EU verscherpt regels voor opgeslagen data
[Open link in this window | Open link in new window]
PrivacyNieuws: EU verscherpt regels voor opgeslagen data
[Open link in this window | Open link in new window]
Out-law.com: EU Commission wil revise data retention laws after critical report
[Open link in this window | Open link in new window]
BoF: European Commission - Top 10 misleading statements on data retention
[Open link in this window | Open link in new window]
SCOnline: Brussel wil gelijke vergoedingen bewaarplicht
[Open link in this window | Open link in new window]
Cecilia Malmström: Commission evaluates Data Retention Directive
[Open link in this window | Open link in new window]
(A leaked version of) a report by European Commission.
European Commission: Evaluation report on the Data Retention Directive (Directive 2006/24/EC)
[Open link in this window | Open link in new window]
Security.nl: Bewaarplicht schendt privacy 500 miljoen Europeanen
[Open link in this window | Open link in new window]
Tweakers.net: Europa - bewaarplicht helpt bij oplossen misdrijven
[Open link in this window | Open link in new window]
WebWereld: EC - bewaarplicht telecomgegevens faalt, maar blijft
[Open link in this window | Open link in new window]
The Register: EU Data retention directive 'flawed, unlawful'
[Open link in this window | Open link in new window]
Tweakers.net: GroenLinks - bewaarplicht moet verdwijnen
[Open link in this window | Open link in new window]
Nu.nl: EU-Commissie erkent privacyproblemen bewaarplicht
[Open link in this window | Open link in new window]
A working document by WP29.
WP29: Working document 01/2011 on the current EU personal data breach framework and recommendations for future policy developments (PDF)
[Open link in this window | Open link in new window]
Inside Privacy: The Article 29 Working Party and breach notification in the EU
[Open link in this window | Open link in new window]
Inside Privacy: EU Working Party 29 publishes new series of opinions
[Open link in this window | Open link in new window]
A report by Freedom House.
Freedom House: Freedom on the Net 2011
[Open link in this window | Open link in new window]
Freedom House: Freedom on the Net
[Open link in this window | Open link in new window]
Ars Technica: Report - government cyberattacks against own citizens intensfying
[Open link in this window | Open link in new window]
AG: Vrijheid op internet kalft steeds verder af
[Open link in this window | Open link in new window]
A report by Verizon.
Verizon: 2011 Data breach investigations report (PDF)
[Open link in this window | Open link in new window]
The Register: Lost records down even though breach incidents soared
[Open link in this window | Open link in new window]
AG: KLPD werkt samen met Verizon en US Secret Service
[Open link in this window | Open link in new window]
Security.nl: KLPD onderzocht 32 data-inbraken sinds 2006
[Open link in this window | Open link in new window]
Wired Threat Level: Report - Data breaches rise, but stolen data drops
[Open link in this window | Open link in new window]
A report by McAfee and CSIS.
McAfee and CSIS: In the dark - Crucial industries confront attacks (PDF)
[Open link in this window | Open link in new window]
McAfee: McAfee and CSIS report reveals dramatic increase in cyberattacks and sabotage on critical infrastructure yet organizations remain unpreparedi
[Open link in this window | Open link in new window]
DarkReading: Cyberattacks on critical infrastructure are increasing, study says
[Open link in this window | Open link in new window]
Security.nl: Staatshackers en DoS-aanvallen bedreigen infrastructuur
[Open link in this window | Open link in new window]
Tweakers.net: McAfee - Stuxnet regelmatig aangetroffen bij energiebedrijven
[Open link in this window | Open link in new window]
A report by ENISA.
ENISA: Cyber Europe 2010 - Evaluation report (PDF)
[Open link in this window | Open link in new window]
ENISA: EU Agency ENISA issues final report & video clip on 'Cyber Europe 2010': the 1st pan-European cyber security exercise
[Open link in this window | Open link in new window]
AG: Europa verrast door grote cyberaanval
[Open link in this window | Open link in new window]
A paper by Fred Schreier, Barbara Weekes and Theodor H. Winkler.
Fred Schreier, Barbara Weekes and Theodor H. Winkler: Cyber security - the road ahead
[Open link in this window | Open link in new window]
Roger Halbeer: Cyber security - the road ahead
[Open link in this window | Open link in new window]
A survey by Cyber-Ark.
Cyber-Ark: Cyber-Ark snooping survey, April 2011 (PDF)
[Open link in this window | Open link in new window]
Cyber-Ark: Cyber-Ark global survey shows external cyber-security risks will surpass insider threats
[Open link in this window | Open link in new window]
DarkReading: Separate reports from Cyber-Ark, BeyondTrust show the pitfalls of privileged user access
[Open link in this window | Open link in new window]
Security.nl: Helft IT-managers misbruikt rechten om te snuffelen
[Open link in this window | Open link in new window]
A report by Sonia Livingstone, Kjartan Olafsson and Elisabeth Staksrud.
Sonia Livingstone, Kjartan Olafsson and Elisabeth Staksrud: Social networking, age and privacy (PDF)
[Open link in this window | Open link in new window]
LSE: EU Kids online
[Open link in this window | Open link in new window]
Tweakers.net: EU onderzoekt bescherming kinderen op sociale-netwerksites
[Open link in this window | Open link in new window]
Out-law.com: Social networks must automatically restrict children's profiles, says EU Commission
[Open link in this window | Open link in new window]
The Register: Social networks must police kids' profiles, says EC
[Open link in this window | Open link in new window]
BBC News: Many under-13s 'using Facebook'
[Open link in this window | Open link in new window]
An article by Roger Dingledine and Nick Mathewson.
Roger Dingledine and Nick Mathewson: Anonymity loves company - usability and the network effect (PDF)
[Open link in this window | Open link in new window]
Eric Diehl: Anonymity loves company
[Open link in this window | Open link in new window]
A document by the White House.
The White House: National strategy for trusted identities in cyberspace (PDF)
[Open link in this window | Open link in new window]
NIST: National strategy for trusted identities in cyberspace
[Open link in this window | Open link in new window]
Out-law.com: The US government has published plans to create digital identities for Americans
[Open link in this window | Open link in new window]
The Register: US proposes online IDs for Americans
[Open link in this window | Open link in new window]
Inside Privacy: Obama administration unveils identity ecosystem vision
[Open link in this window | Open link in new window]
An amicus brief by Michael Carrier.
Michael Carrier: Brief of amicus curiae Professor Michael Carrier in support of defendants-appellees and urging affirmance [Google/YouTube] (PDF)
[Open link in this window | Open link in new window]
Techdirt: Why arguing that Google is in the best position to stop infringement is wrong
[Open link in this window | Open link in new window]
An opinion by WP29.
WP29: Opinion 12/2011 on smart metering (PDF)
[Open link in this window | Open link in new window]
HL: Europe's Article 29 Working Party issues smart meter guidelines
[Open link in this window | Open link in new window]
An article by Sergey Bratus, Ashlyn Lembree and Anna Shubina.
Sergey Bratus, Ashlyn Lembree and Anna Shubina: Software on the witness stand - what should it take for us to trust it? (PDF)
[Open link in this window | Open link in new window]
Schneier on Security: Software as evidence
[Open link in this window | Open link in new window]
A report by Mans Svensson and Stefan Larsson.
Mans Svensson and Stefan Larsson: Social norms and intellectual property - Online norms and the European legal development (PDF)
[Open link in this window | Open link in new window]
Cybernormer.se
[Open link in this window | Open link in new window]
Ars Technica: Pirate Bay becomes "research bay" to aid P2P researchers
[Open link in this window | Open link in new window]
More at... [11/04/22 (NL/01)]
More at... [11/04/22 (NL/02)]
More at... [11/04/22 (NL/03)]
More at... [11/04/22 (NL/04)]
More at... [11/04/22 (NL/05)]
More at... [11/04/22 (NL/06)]
More at... [11/04/22 (NL/07)]
An article by Michelle Madejski, Maritza Johnson and Steven M. Bellovin.
Michelle Madejski, Maritza Johnson and Steven M. Bellovin: The failure of online social network privacy settings (Google docs)
[Open link in this window | Open link in new window]
PDF version of the article (I got several error messages trying to open this version)
[Open link in this window | Open link in new window]
PDF version hosted on Privacy Lives
[Open link in this window | Open link in new window]
Privacy Lives: Columbia University report - the failure of online social network privacy settings
[Open link in this window | Open link in new window]
Concurring Opinions: Aligning privacy expectations with technical tools
[Open link in this window | Open link in new window]
A report by ENISA.
ENISA: Resillience of the Internet interconnection ecosystem
[Open link in this window | Open link in new window]
Light Blue Touchpaper: Resilience of the Internet interconnection ecosystem
[Open link in this window | Open link in new window]
An article by Rui Wang, Shuo Chen, XiaoFeng Wang and Shaz Qadeer.
Rui Wang, Shuo Chen, XiaoFeng Wang and Shaz Qadeer: How to shop for free online - Security analysis of cashier-as-a-service based web stores (PDF)
[Open link in this window | Open link in new window]
Ms. Smith: Security researchers exploit logic flaws to shop for free online
[Open link in this window | Open link in new window]
An article by Timm O. Sprenger and Isabell M. Welpe.
Timm O. Sprenger and Isabell M. Welpe: Tweets and trades - the information content of stock microblogs (SSRN)
[Open link in this window | Open link in new window]
FrankWatching: Sociale media maken manipulatie beurskoersen mogelijk
[Open link in this window | Open link in new window]
More at... [11/04/15 (NL/01)]
An amicus brief by Steven M. Bellovin, PhD, Matt Blaze, PhD., Jim Gettys, Susan Landau, PhD., Anthony G. Lauck, Peter G. Neuman, PhD., David P. Reed, PhD., Bruce Schneier and Barbara Simons, PhD..
Steven M. Bellovin, PhD, Matt Blaze, PhD., Jim Gettys, Susan Landau, PhD., Anthony G. Lauck, Peter G. Neuman, PhD., David P. Reed, PhD., Bruce Schneier and Barbara Simons, PhD.: Brief of amici curiae in support of objections of real parties in interest Jacob Appelbaum, Birgitta Jonsdottir and Rop Gonggrijp to March 11, 2011 order denying motion to vacate (PDF)
[Open link in this window | Open link in new window]
Wired Threat Level: Top computer scientists back WikiLeaks associates in Twitter case
[Open link in this window | Open link in new window]
A report by HP.
HP: 2010 full year top cyber security risks report (PDF)
[Open link in this window | Open link in new window]
WebWereld; Joomla- en Drupal-installaties onveilig
[Open link in this window | Open link in new window]
Reports by ENISA.
ENISA: Resilience metrics and measurements
[Open link in this window | Open link in new window]
ENISA: EU agency presents 1st report ever on how to measure IT resilience
[Open link in this window | Open link in new window]
An article by T.V. Laptyeva, S. Flach and K. Kladko.
T.V. Laptyeva, S. Flach and K. Kladko: The weak password problem - chaos, criticality, and encrypted p-CAPTCHAs
[Open link in this window | Open link in new window]
The Register: Net boffins plot password alternatives
[Open link in this window | Open link in new window]
More at... [11/04/08 (NL/01)]
More at... [11/04/08 (NL/02)]
An article by Stevens Le Blond et al.
Stevens Le Blond et al: One bad apple spoils the bunch - exploiting P2P applications to trace and profile Tor users (INRIA)
[Open link in this window | Open link in new window]
Schneier on Security: Identifying Tor users through insecure applications
[Open link in this window | Open link in new window]
An article by Ross Anderson.
Ross Anderson: Can we fix the security economics of federated authentication? (PDF)
[Open link in this window | Open link in new window]
Light Blue Touchpaper: Can we fix federated authentication?
[Open link in this window | Open link in new window]
More at... [11/04/01 (NL/01)]
More at... [11/04/01 (NL/02)]
On this page Transitional HTML 4.01 and CSS 1 are used. If you're seeing this text you either have CSS switched off in your browser, or you're using a browser that can't handle CSS. If you're using an older browser version, you might want to consider upgrading.