CERIAS Hotlist
Page Content
- 2600: The Hacker Quarterly
The Hacker Quarterly.
http://www.2600.com/ - Added Sep 26, 2000
- CERIAS: Center for Education and Research in Information Assurance and Security
The worlds foremost university center for multidisciplinary
research and education in areas of information security and information assurance.
http://www.cerias.purdue.edu/ - Added Dec 10, 1999
- Wired! story on
E-mail this article of cryptography to a friend!
http://www.wired.com/news/news/email/other/technology/story/... - Added Dec 10, 1999
- A Distributed Authorization Model for WWW
The capability-based authorization model simplifies the security administration of clients as only the authorization server
needs to know its clients.
http://www.isoc.org/HMP/PAPER/107/abst.html - Added Dec 10, 1999
- ACSA Information Security Bookshelf
A collection of links to various sorts of info. sec. resources.
http://www.acsac.org/secshelf/secshelf.html - Added Nov 17, 2004
- Attack Prevention
Information Security Articles, Documents, and Sample Policies. Home of the Security Managers Mailing List.
http://www.attackprevention.com/ - Added Jul 25, 2003
- Bangkok Robot Security Guard
An armed robot as a security guard. The robot is armed with a pistol that \\"can be programmed to shoot automatically or wait for a fire order delivered witha password from anywhere through the internet.\\" I hope the password is very secret.
http://catless.ncl.ac.uk/Risks/21.02.html#subj8 - Added Sep 26, 2000
- Best Security Tips
Best Security Tips offers daily news, information, advices, books and tips that helps regular computer users to protect themselves from spyware,adware, viruses, trojans, web vulnerabilities, hackers and other threats.
http://www.bestsecuritytips.com/ - Added Dec 03, 2006
- Blackmail letter over Enigma machine
Police disclosed a letter offering to return the device for a five-figure sum.
http://www.guardian.co.uk/Archive/Article/0,4273,4063014,00.... - Added Sep 26, 2000
- Communications Security for the Twenty-first Century: The Advanced Encryption Standard
Int the early 1970s the National Security Agency and the National Bureau of Standards realized that noncombatant adults needed to protect their sensitive, but unclassified, information.
http://www.ams.org/notices/200004/fea-landau.pdf - Added Sep 26, 2000
- Computer, PDA and Mobile Phone Security
Security software and guidelines to protect your computer, PDA, pocketpc and mobile phone.
http://www.precisesecurity.com - Added Oct 16, 2005
- Court-ordered Surveillance
http://www.tscm.com/wiretap.html - Added Dec 10, 1999
- Cyber-Extortion: When Data is Held Hostage
Here is an issue facing more and more e-businesses--malicious hackers who demand a payoff to keep their security breaches secret.
http://www.businessweek.com/bwdaily/dnflash/aug2000/nf200008... - Added Sep 26, 2000
- Cyber-Security Called Dismal
Vital national interests are increasingly vulnerable to computer attack by hackers and cyber-terrorists, a House panel warned yesterday as it gave federal departments and agencies a dismal average D-minus grade for poor computer security.
http://www.washingtonpost.com/ac2/wp-dyn?pagename=article&am... - Added Sep 26, 2000
- Data Fellows Discovers New Internet-Enabled Virus
http://www.DataFellows.com/news/1998/19980618.htm - Added Dec 10, 1999
- Department of Defense's Defence Security Service 1975-1999
Since its first publication in 1985, Recent Espionage Cases has offered the security educator
easy-to-find factual information about cases for use in briefings, newsletters, and other
http://www.dss.mil/training/espionage/ - Added Jun 25, 2001
- Digital Watermarks: New Tools for Copyright Owners and Webmasters
New technology providing authors with valuable weapons in their battle to enforce the law in the on-line world and protect their copy-rights.
http://www.webreference.com/content/watermarks/ - Added Dec 10, 1999
- Directory of Information Security White Papers
Organized and Categorized directory of InfoSec White Papers, no registration or account creation needed.
http://www.securestandard.com/ - Added Dec 31, 2003
- Do Security Holes Demand Full Disclosure?
Weld Pond's response to Marcus Ranum's keynote on full disclosure at the Black Hat Briefings.
http://cma.zdnet.com/texis/techinfobase/techinfobase/+kmseV6... - Added Sep 25, 2000
- Domain Name System (DNS) Security
Overview of DNS and DNS Security (DNSS) by Diane Davidowicz
http://www.geocities.com/compsec101/papers/dnssec/index.html - Added Apr 03, 2000
- DoubleClick: We've Been Hit
DoubleClick confirms news reports that its computers have been hit by hackers.
http://techupdate.zdnet.com/techupdate/stories/main/0,14179,... - Added Apr 03, 2001
- DVD Pirates Face Watery Foe
Technology companies are working once again to protect the digital content
of DVD movies -- and may have an answer, if they can just stop squabbling over
who has the better solution.
http://www.wired.com/news/technology/0,1282,38279,00.html - Added Sep 26, 2000
- e-CFO Conference and Expo
Information about e-CFO
http://www.e-cfoexpo.com/ - Added Sep 26, 2000
- E-Commerce Sites Top Hacker Hit List
High-visibility eCommerce Websites experience as many as five serious security attacks per month.
http://content.techweb.com/wire/news/1997/11/1120hack.html - Added Dec 10, 1999
- Electronic Surveillance in a Digital Age
http://www.wws.princeton.edu/~ota/disk1/1995/9513_n.html - Added Dec 10, 1999
- Glitch at Amazon.com exposes Associates e-mail addresses
An apparent glitch in Amazon.com Inc.
computer system has released the e-mail addresses of some
Amazon customers to another customer who participates in the
company As
http://computerworld.com/cwi/story/0,1199,NAV47_STO49648,00.... - Added Sep 26, 2000
- Got Cyber Insurance?
An article on hacking insurance
http://www.computerworld.com/cwi/story/0,1199,NAV47_STO48721... - Added Sep 26, 2000
- Hackers: Friends or Foes?
http://content.techweb.com/wire/news/1997/09/0915hackers1.ht... - Added Dec 10, 1999
- Hitchhiker's World
The Hitchhiker's World is an e-zine which features mostly network-security articles & programs along with a touch of personal expression.
http://www.infosecwriters.com/hhworld/ - Added Apr 23, 2003
- IDSs Bolster Network Defense
Intrusion detection systems from companies such as Internet
Security Systems and NFR can give you real-time security
protection. But IDS complexity may make or break your buying
decision.
http://techupdate.zdnet.com/techupdate/stories/main/0,14179,... - Added Oct 23, 2001
- IE feature can track Web surfers without warning
People surfing the Web incognito may want to think twice before using Internet
Explorer.
http://news.com.com/2100-1023-245556.html?legacy=cnet - Added Sep 26, 2000
- Information Assurance Technology Analysis Center (IATAC)
Information Assurance Technology Analysis Center (IATAC)is a Department of Defense (DoD) sponsored service available to all government and industrial base users to provide studies, analyses, data gathering and other R&D activities to meet research, acquisition, test, demonstration, operation, and logistics requirements related to IA, DIO, and IW technologies.
http://iac.dtic.mil/iatac/ - Added Aug 25, 2004
- Information Security Writers
Papers submitted by security professionals are published on the site and archived for readers. Monthly book prizes are awarded to writers. Categories include cryptography, email security, exploitation, firewalls, forensics, honeypots, IDS, malware & wireless security.
http://www.infosecwriters.com - Added Dec 05, 2003
- Information Systems Security Association (ISSA)
The Information Systems Security Association (ISSA) is a not-for-profit international organization of information security professionals and practitioners. It provides education forums, publications and peer interaction opportunities.
http://www.issa.org/ - Added Nov 15, 2000
- Infosecwriters
An open-source community focused on publishing quality papers and developing original & creative projects in an effort to promote IT security.
http://www.infosecwriters.com - Added Apr 06, 2003
- InfoSysSec Secuirty News
Latest Security Related Headlines from the Internet
http://www.infosyssec.com/infosyssec/infosecnews.html - Added Nov 06, 2000
- Internet Explorer Security Hole Launches E-mail Attachments
A security hole in Microsoft's Internet Explorer Web browser can cause the browser to automatically open e-mail attachments that could be used by an attacker to execute malicious code, the company has warned.
http://techupdate.zdnet.com/techupdate/stories/main/0,14179,... - Added Apr 03, 2001
- invulnerableit.com
An open informational community for information technology enthusiasts to access resources and interact with one another about the most crucial aspect of the field today: security.
http://www.invulnerableit.com - Added Oct 05, 2005
- It's HIP To Hack, Euros Say
http://content.techweb.com/wire/news/aug/0812hip.html - Added Dec 10, 1999
- Java Security Risk
Researchers at Princeton's Computer Science Department and elsewhere have announced a major security exposure for all users
running Java-enabled versions of Netscape's Navigator Web browser, Sun's HotJava Web Browser, and various
implementations of
http://www.princeton.edu/Announce/secbug.html - Added Dec 10, 1999
- JavaScript Problems I've Reported
John LoVerso\'s web page about his discoveries of Javascript Problems.
http://www.schooner.com/~loverso/javascript/ - Added Dec 10, 1999
- KeyNote: a trust-management system
http://www.cis.upenn.edu/~angelos/keynote.html - Added Dec 10, 1999
- Linux Not Ready for DOD Prime Time
A site about why Linux is not ready for the comand and control market.
http://www.linuxsecurity.com/articles/government_article-142... - Added Sep 14, 2000
- Love Bug Strikes Again...VSB_COLOMBIO
"VSB_COLOMBIO is very similar [to the ILOVEYOU worm]. We've received more reports of this than any other variant," Trend Micro Australian spokesperson told ZDNet.
http://techupdate.zdnet.com/techupdate/stories/main/0,14179,... - Added Dec 15, 2000
- Mac Security News
Providing daily security updates for Apple Mac OS X and related applications and technologies
http://www.macsecuritynews.com - Added Apr 30, 2006
- Matt's Unix Security Page
What is hosted here is what I personally find useful and/or interesting. Hyperlinks to other sites are provided at
the bottom of this page for those seeking something not listed here.
http://www.deter.com/unix/index.html - Added Dec 10, 1999
- Medical Privacy Coalition's draft bill
http://www.epic.org/privacy/medical/ - Added Dec 10, 1999
- Microsoft Lacks Motivation to Change Security
Every week, some headline seems to call attention to a
security vulnerability in a Microsoft product. Because
Microsoft products are so widely used, they will be the targets of more attacks, so more vulnerabilities will come to light.
http://news.com.com/2100-1023-244498.html?legacy=cnet - Added Sep 25, 2000
- Microsoft To Post NT Security Fixes
Article concerning changes being made in Microsoft WindowsNT
http://content.techweb.com/wire/news/apr/0424nt.html - Added Dec 10, 1999
- Minnesota online privacy bill
No Description Available
http://www.revisor.leg.state.mn.us/cgi-bin/bldbill.pl?bill=H... - Added Dec 10, 1999
- Mountain Wave, Inc.
Computer Security News Daily.
http://www.mountainwave.com/ - Added Nov 06, 2000
- MS Confirms New Security Breach
Microsoft gets hacked into again....The latest hack was not as serious as the one late last month in which an intruder gained access to Microsoft's source codes
http://techupdate.zdnet.com/techupdate/stories/main/0,14179,... - Added Dec 15, 2000
- MSN Cookie Data Crosses Domains
When visiting this link today: http://www.linkexchange.com ... I found that the connection results in a fascinating series of
events.
http://www.pc-help.org/privacy/ms_guid.htm - Added Sep 26, 2000
- Netscape - Verisign Integration white paper
PDF file on Verisign Integration
http://www.verisign.com/library/nswhitepaper.pdf - Added Dec 10, 1999
- Netscape Security
Netscapes Security page with links to current articles pertaining to security
http://wp.netscape.com/security/index.html - Added Dec 10, 1999
- Network access control systems bypassing
The main theme of the web site is firewalls bypassing and tunneling tools.
http://gray-world.net/ - Added May 28, 2003
- New Denial-of-Service Attack Tool uses Relay Chat
Security experts this week say an even more
dangerous tool than the past DoS tools, called Trinity, has just been discovered.
http://www.nwfusion.com/news/2000/0906ddos.html - Added Sep 26, 2000
- New IE 4.0 Security Hole Discovered
An article describing an IE 4.0 security hole found in Nov. 1997.
http://www.wired.com/news/news/technology/story/8429.html - Added Dec 10, 1999
- NIST Computer Security Publications
These publications present the results of NIST studies, investigations, and research on information technology security issues.
http://csrc.ncsl.nist.gov/publications/ - Added Mar 28, 2001
- NIST Computer Security Special Publications
A list of NIST publications in downloadable format.
http://csrc.nist.gov/publications/nistpubs/index.html - Added Feb 18, 2002
- Now is the Time for Two-Factor Security
Solutions exist for tamper-proof digital credentials, but
they're not compatible with each other. The problem, David
Berlind notes, is a lack of standards.
http://techupdate.zdnet.com/techupdate/stories/main/0,14179,... - Added Oct 30, 2001
- NRC report: Cryptography's Role in Securing the Information Society
When used in conjunction with other approaches to
information security, cryptography is a very powerful tool
for protecting information.
http://www.nap.edu/readingroom/books/crisis/ - Added Dec 10, 1999
- Open Directory of Technology Papers
A large directory of IT publications. Users can submit new publications.
http://www.paperdir.com/Security - Added Apr 07, 2006
- Pentagon 'Hacker' Speaks Out
One of the two teenagers rousted last week by the FBI for hacking government
servers said that he still has high-level access to hundreds of government and military
networks.
http://www.wired.com/news/news/technology/story/10666.html - Added Dec 10, 1999
- Personnel Security Standards Psychological Questionnaire (PSSPQ)
The PSSPQ is a psychometric procedure (i.e., psychological test)that was developed using sound scientific technology that accurately predicts whether an individual will or will not be successfulif that individual is processed for high-level security clearance status. Costs for using the PSSPQ are reasonable.
http://www.home.earthlink.net/~lastone2/psspq.html - Added Mar 17, 2004
- POCKET Virus Targets Kids
Children everywhere beware -- Pikachu is not as cuddly as he seems.
http://www.wired.com/news/technology/0,1282,38412,00.html - Added Sep 26, 2000
- Pokemon virus targets kids
Children have become the latest target for virus writers with the appearance of a worm
that exploits the Pokemon character Pikachu.
http://www.indianchild.com/pokeman_virus.htm - Added Sep 26, 2000
- Publications on Distributed Communications
A list of publications in the "On Distributed Communications" Series.
http://www.rand.org/publications/RM/baran.list.html - Added Dec 10, 1999
- Putting the Heat on Firewalls
An article about tests performed on some firewalls
http://www.lantimes.com/mediakit98/testing/testing3.html - Added Dec 10, 1999
- Rating of Application Layer Proxies
This document defines a rating system for application layer proxies. The purpose of these definitions is inject some sanity into the proxy debate by defining 5 levels of proxies.
http://www.sandelman.ottawa.on.ca/SSW/proxyrating/proxyratin... - Added Dec 10, 1999
- RFC 1948: Defending Against Sequence Number Attacks
While
ubiquitous crypgraphic authentication is the right answer, we propose
a simple modification to TCP implementations that should be a very
substantial block to the current wave of attacks.
http://rfc.sunsite.dk/rfc/rfc1948.html - Added Dec 10, 1999
- RFP: VPNs Across Mutiple Sites
VPNs are
marketed as the next big technology that will push
your network backbone out to the Internet, where
connectivity costs are lower than leased lines and
multiple pathways between sites provide some fault
tolerance
http://www.networkcomputing.com/912/912f1.html - Added Dec 10, 1999
- Secure Sockets Layer
Good techical and practical information on Secure Sockets Layer (SSL)
http://wp.netscape.com/security/techbriefs/ssl.html - Added Apr 10, 2001
- Secure Wireless Doesn't Have to be an Oxymoron
Wireless networking ignored security for so long that most people think it still doesn't have any. In many cases, they're right. But it doesn't need to be that way.
http://techupdate.zdnet.com/techupdate/stories/main/0,14179,... - Added Oct 26, 2001
- Securely Speaking
Communication and information sharing are our best defense against the onslaught of people attempting to breach our networks. The information found here is for raising awareness and sharing information about network security and related issues. Secu
http://www.SecurelySpeaking.com - Added Dec 01, 2002
- SecureStandard Security Directory
Directory of free information security articles, white papers, and documents to assist security professionals. Our information is your security. Submit your own recent papers for publishing.
http://www.securestandard.com/ - Added Jul 03, 2005
- Securing Internet information servers
An article sponsered by the government concerning Securing Internet Information Servers.
http://ciac.llnl.gov//ciac/documents/ciac2308.html - Added Dec 10, 1999
- Security Clipper
Free searchable archives of Internet security eZines and mailing lists. Set up free, personalized search agents to proactively search all new messages for just those topics or products in which you are specifically interested.
http://www.securityclipper.com - Added Feb 07, 2003
- Security in Cyberspace
The following case study is a good illustration of the type of threat facing our Department of Defense information infrastructure.
Although the incident has been fully investigated by the Air Force Office of Special Investigations (OSI) numerous que
http://www.fas.org/irp/congress/1996_hr/s960605b.htm - Added Dec 10, 1999
- Security Limists Linux in Government
An article from Federal Computer Week that explains what security limits keep Linux from becoming the software of choice in government circles.
http://www.fcw.com/fcw/articles/2000/0731/web-linux-08-02-00... - Added Sep 14, 2000
- Security Wizards
The SecWiz Guide to Network Security is a web collection of documents helping to solve your network security problems in system-specific detail. This website is filled a wide variety of firewall-related information, including: technical articles, firewall rulesets, news, links to white papers, and listings of new tools and products.
http://www.secwiz.com - Added Jul 01, 2003
- SecurityDocs.com
Free directory of information security articles, white papers, and documents.
http://www.SecurityDocs.com/ - Added Feb 26, 2004
- ShareFun.
http://www.europe.f-secure.com/v-descs/sharefun.shtml - Added Dec 10, 1999
- Simple Key-Management for Internet Protocol (SKIP)
A discussion of an implementation in an automated, secure IP tunnelling packet screening device will be presented, along with
analysis of the approach and results of field trials.
http://www.isoc.org/HMP/PAPER/244/abst.html - Added Dec 10, 1999
- Smesecure.com
Practical Web Security advice for SMEs
http://www.smesecure.com - Added Mar 20, 2006
- Standing the Test of Time: The Data Encryption Standard
The workhorse private key is the data encryption standard (DES), which relies on cryptographic design principles that predate public key.
http://www.ams.org/notices/200003/fea-landau.pdf - Added Sep 26, 2000
- Study: Insiders Pose Main Hacking Threat
While chief executives worry about external foes hacking into corporate networks, their real concerns should be the Trojan Horses--disgruntled employees with the inside knowledge to easily steal sensitive secrets--according to a recent study released
http://techupdate.zdnet.com/techupdate/stories/main/0,14179,... - Added Apr 03, 2001
- SunWorld: Forensics - Getting to the Bottom of a Security Breach
An article in Linux Today which talks about tracking down breaches and the use of BNC and other IP-masking devices.
http://linuxtoday.com/news_story.php3?ltsn=2000-08-06-001-04... - Added Sep 14, 2000
- Supreme Court to consider Internet Indecency Law
http://www.cnn.com/US/9612/06/internet.indecency/index.html - Added Dec 10, 1999
- Tapping, Tapping On My Network Door
Readers of this column are familiar with the risks of illegal monitoring of Internet traffic. Less familiar, but perhaps just as serious,
are the risks introduced when law enforcement taps that same traffic legally. A site about the risks of CARNIVO
http://www.crypto.com/papers/carnivore-risks.html - Added Sep 26, 2000
- TCP Loopback DoS Attack (land) and Cisco Devices
Somebody has released a program, known as land.c, which can be used to launch denial of service attacks against various TCP
implementations.
http://www.cisco.com/warp/public/770/land-pub.shtml - Added Dec 10, 1999
- Tech-Unity
Tech-Unity is a website dedicated to the support and education of Information Technology professionals and students alike.
http://www.tech-unity.com/ - Added Apr 09, 2005
- Technical Analysis by the UC Berkeley Firewall Task Force
A comprehensive security solution includes policy, authentication, access control, end-to-end encryption and intrusion detection among others. Good host security or system hardening (removing unneeded services, applying patches) is always required. Following the strategy of defense-in-depth, whereby multiple barriers are placed between attackers and system, firewalls can be a valuable tool. Further, their use is sometimes mandated by law or policy protecting student or medical records for example.
http://fwtf.berkeley.edu/fwtf_report/Technical.htm - Added Jan 10, 2003
- The Applied Cryptography Case
In January 14, 2000, new US crypto export regulations went into effect. Publicly available encryption source code, such as that at
issue in my lawsuit, is now effectively freely exportable.
http://people.qualcomm.com/karn/export/ - Added Dec 10, 1999
- The Case for Electronic Voting
An article for electronic and internet voting
http://www.wired.com/news/politics/0,1283,40141,00.html - Added Jan 09, 2001
- The FBI's FOI listing of declassified espionage cases
http://foia.fbi.gov/spies.htm - Added Jun 25, 2001
- The Info Security News Service
This on-line news service is backed by SC Magazine. The news service gathers information globally through a network of correspondents and over 200 news services. Key links associated with the news direct you to further sources of information releva
http://www.infosecnews.com/sgold/main.htm - Added Nov 06, 2000
- The Kerberos Network Authentication Service
http://www.isi.edu/gost/info/Kerberos/ - Added Dec 10, 1999
- The Prehistory of Public Key Cryptography
In the open literature, Diffie, Hellman, and Merkle are credited with being the inventors of public key cryptography. But there is
evidence that assorted intelligence agencies knew of the technique years earlier. (Some discussion of this question ca
http://www.research.att.com/~smb/nsam-160/ - Added Dec 10, 1999
- The Privacy Foundation
Lists bugs, advisories, top privacy stories, etc.
http://www.privacyfoundation.org/ - Added Sep 26, 2000
- The Revolutionaries
Articles about "High-Tech Overachievers"
http://www.thetech.org/revolutionaries/ - Added Dec 10, 1999
- The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption
This report examines the fundamental properties of these requirements
and attempts to outline the technical risks, costs, and implications of deploying systems
that provide government access to encryption keys.
http://www.cdt.org/crypto/risks98/ - Added Dec 10, 1999
- The Software Risk Management Conference
Learn how to guarantee your success by attending ISACC 2000.
http://www.isacc.com/ - Added Sep 25, 2000
- The Ultimate Techie Resource
A comprehensive collection of technical knowledge bases, aimed at providing you with complete, updated and exhaustive information on all leading technologies. Categorized into specific technology bases, it includes sections on
http://www.techieindex.com - Added Jan 21, 2003
- TRUSTe Accused of violating its own Privacy Policy
Security consulting firm Interhack Corp. has accused
Truste of violating
its own privacy policy by tracking the personal information of visitors
to its Web site and shar
http://www.computerworld.com/cwi/story/0,1199,NAV47_STO49059... - Added Sep 26, 2000
- UK Group Slams Sophos Linus Virus Threat Claims
Linux response to claim by Sophos that viruses targeting Linux systems already exist
http://www.linuxsecurity.com/articles/general_article-1332.h... - Added Sep 14, 2000
- W3C Security Resources
This page contains links to various aspects of Web and internet security.
http://www.w3.org/Security/Overview.html - Added Dec 10, 1999
- Windows 2000 magazine
Provides articles on help issues and a variety of other issues dealing with Windows 2000.
http://www.winntmag.com/ - Added Dec 10, 1999
- Windows NetBIOS Unsolicited Cache Corruption
Remote attackers either on the local subnet or
across the Internet may subvert the NetBIOS Name to IP address
resolution process by redirecting any NetBIOS Name to any arbitrary IP
http://www.pgp.com/research/covert/advisories/045.asp - Added Sep 26, 2000
- Word documents susceptible to Word Bug
Microsoft is weathering complaints that documents created with Microsoft Word and
some of its other popular desktop applications can be embedded with electronic
surveillance tags allowing document authors to track their use.
http://news.com.com/2100-1023-245160.html?legacy=cnet - Added Sep 26, 2000
- World Wide Web (in)Security
An article talking security issues for the world wide web.
http://www.swcp.com/~mccurley/danger/danger.html - Added Dec 10, 1999
- Z3R0
Computer security portal with news, forum, gallery and growing file archive.
http://www.z3r0.co.uk - Added Feb 18, 2006