Articles on CyberSecurity and related topics. The articles are transient and are periodically removed and replaced when they are no longer current. They reflect current thinking on interesting topics.

Magazines published periodically which are CyberSecurity relevant are listed under Magazines. Each magazine has one or more relevant articles, and the magazine home page often provides a means to get access to archival copies.

This is your site and the management appreciates your comments. If you see or write an article of interest that you would like to share, please forward it to us.

Classic Codes and Ciphers
History of Codes and Ciphers
History of Classical Ciphers
Introductory Information Protection
Lecture Notes on Cryptography
08/13/2016 NIST Digital Authentication Guideline
08/13/2016 Malicious Email Mitigation
08/13/2016 NIST SMS Two-Factor Authentication Issues
05/27/2016 Who’s Using Cyberthreat Intelligence and How?
05/27/2016 Threats From Within
05/24/2016 Someone Hacked the Hackers: 500K Accounts Leaked Online
05/24/2016 Firms Have 200+ Unencrypted ‘Password’ Files in OneDrive
05/24/2016 Security Remains Prime Barrier to Cloud Adoption
05/20/2016 Vulnerabilities Found in Siemens SIPROTEC Protection Relays
05/11/2016 IBM’s Watson takes on CyberSecurity
05/02/2016 Vulnerability Summary
04/29/2016 Password Cracking
04/28/2016 The Weekly Cybrarian
04/21/2016 Best Practices for Privileged Personal Identification Verification
04/13/2014 UDP-Based Amplification Attacks
04/04/2016 New NIST Security Standard Can Protect Credit Cards, Health Information
03/01/2016 PCI Penetration Test Guidlines
03/01/2016 NIST Cryptographic Standards and Guidelines Development Process
-7/00/2004 FBI An Overview of Steganography for the Computer Forensics Examiner

IEEE Publications

Computing Now
Security and Privacy

Ransomware articles, theses, and commercial products. This is a focused series of articles on a single topic.

The tags are:

  • Art: Technical Article
  • Def: Wikipedia Definition
  • News: News Article
  • Soft: Software Reference
  • Tech: In-depth Technical Article

News Happy Ending to Known Encryption Cases
Art How to Beat Ransomware
Art How to Protect Yourself from Ransomware
Art How to Rescue Your PC From Ransomware
News New Internet Scam
Art Two Ways to Stop Ransomware in it’s Tracks
Art Ransomware Posing as Windows Update
News Rise in Ransomware
Art Tips to Protect Against Ransomware
Art Ransomware Information and Prevention
Art What does Ransomware Do?
Def TeslaCrypt
Def CryptoLocker
Def TorrentLocker
Soft RansomWare Resource and Articles
Soft Ransomware Software Solutions
Tech A Critical Survey of Privacy Infrastructures
Tech Automated Detection and Classification of Cryptographic Algorithms
Tech Classifying Windows Malware with Static Analysis
Tech The Landscape of CyberSecurity
Tech UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware
Tech Using Software-Defined Networking for Ransomware Mitigation