This page collects links to media
coverage of papers in the 2010 IEEE
Symposium on Security and Privacy.
US Cybersecurity Research Event
Agencies Woo Security Researchers, Technology Review (Erica
Naone), 20 May 2010.
Healthcare Data Hemorrhages: Inadvertent Disclosure
and HITECH (Short Talk)
networks a treasure trove of leaked health care data, study
finds, ComputerWorld, 17 May 2010.
ConScript: Specifying and Enforcing
Websites from Shared Code, Technology Review (Erica Naone), 20
Experimental Security Analysis of a Modern
iskivät auton tietojärjestelmiin, Keskisuomalainen,
21 May 2010.
estão vulneraveis a ataques de hackers, Technologica, 17
Hack attacks mounted on car control systems, BBC News, 17 May
Hijack a Car's Brakes and Engines, Technology Review, 14 May
Computer Systems Called at Risk to Hackers, The New York Times
(John Markoff), 13 May 2010.
car, cnet (Elinor Mills), 14 May 2010.
cars vulnerable to malicious hacks, NewScientist (Jim Giles), 14 May 2010.
Hijack a Car's Brakes and Engines, Technology Review (Erica
Naone), 14 May 2010.
Boffins warn on car computer security risk, The Register (John
Leyden), 14 May 2010.
Tamper Evident Microprocessors
evident' CPU warns of malicious backdoors, The Register (Dan
Goodin), 12 May 2010.
A Practical Attack to De-Anonymize Social Network
of social network use reveals your identity, NewScientist (Jim
Giles), 18 May 2010.
Social Network Users, Schneier on Security, 8 March 2010.
hijack + social networks = lost anonymity, Ars Technica, 24
Unmasks User Behind The Browser, DarkReading, 23 February 2010.
web browsers assist de-anonymisation, H-Online, 1 February
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor
propose 'guaranteed' hypervisor security, IT News, 15 May 2010.
to Cure Blue Pill Virtualization Attacks, PCWorld, 7 May 2010.
Lock Down The Hypervisor, Dark Reading, 29 April 2010.
Offers Security For Virtualization, Cloud Computing, Physorg,
27 April 2010.
Side-Channel Leaks in Web Applications: a Reality Today, a
health, tax, and search data siphoned: Software-as-a-service springs SSL
leak, The Register, 23 March 2010.
sound alarm on Web app "side channel" data leaks, Network World, 25 March 2010.
Apps May Leak Data Even When Encrypted, Study Says,
DarkReading, 26 March 2010
Chip and PIN is Broken
researchers show Chip and PIN system vulnerable to fraud,
PhysOrg.com, 11 February 2010.
in chip and PIN 'means thieves can use cards without needing security
code', Daily Mail, 12 February 2010.
and pin card readers fundamentally flawed, Telegraph, 11 February 2010.
the Cambridge chip and PIN attack works, ZDNet UK, 11 February 2010.
issues new anti-fraud advice,
Banking Times, 15 February 2010.
If you know of other articles that should
be linked here, e-mail them to David Evans (firstname.lastname@example.org).