The Week That Was - 8/6/2012

Here is a new experiment.  I'm going to share a list of articles I found interesting during the past week.  It's a little different from the typical real time release of events you see elsewhere.  I'm doing it this way for a couple of reasons.  First, I'm much more likely to publish a weekly series than a daily one.  Second, I think sometimes it helps us interpret the news if we give it a little time to develop context. Here are the articles:

C. Ericka, “Don’t Become Cats Chasing Mobile Security Laser Pointers,” Dark Reading, 03-Aug-2012. [Online]. Available: [Accessed: 03-Aug-2012].
G. Robert, “Errata Security: Myth: that secret coffee slush fund,” Errata Security, 18-Jul-2012. [Online]. Available: [Accessed: 02-Aug-2012].
R. Lemos, “Hardware Backdoors Highlighted By Researcher,” Dark Reading, 31-Jul-2012. [Online]. Available: [Accessed: 01-Aug-2012].
A. Cummings, T. Lewellen, D. McIntire, M. P. Moore, and R. Trzeciak, “Insider Threat Study: Illicit Cyber Activity Involving Fraud in the U.S. Financial Services Sector.” Carnegie Mellon Software Engineering Institute, Jul-2012. [Online]. Available: [Accessed: 03-Aug-2012]
N. Shachtman, “Kaspersky Denies Kremlin Ties, Compares Himself to Indiana Jones,” Danger Room, 25-Jul-2012. [Online]. Available: [Accessed: 02-Aug-2012].
A. Stevenson, “Metropolitan Police ransomware pretender ensnares 1,100 computers,”, 01-Aug-2012. [Online]. Available: [Accessed: 02-Aug-2012].
K. Jackson-Higgins, “More Than Half Of Top 20 Fortune 500 Firms Infected With ‘Gameover’ Zeus Botnet,” Dark Reading, 31-Jul-2012. [Online]. Available: [Accessed: 01-Aug-2012].
B. Schneier, “Overreaction and Overly Specific Reactions to Rare Risks,” Schneier on Security, 03-Aug-2012. [Online]. Available: [Accessed: 03-Aug-2012].
B. Schneier, “Profile on Eugene Kaspersky,” Schneier on Security, 02-Aug-2012. [Online]. Available: [Accessed: 02-Aug-2012].
N. Shachtman, “Russia’s Top Cyber Sleuth Foils US Spies, Helps Kremlin Pals,” Danger Room, 23-Jul-2012. [Online]. Available: [Accessed: 02-Aug-2012].
E. Katz, “Social media plays a growing role in open source intelligence, experts say,” NextGov, 31-Jul-2012. [Online]. Available: [Accessed: 01-Aug-2012].
W. Nather, “The Most Expensive Part of the Monitoring System,” Dark Reading, 31-Jul-2012. [Online]. Available: [Accessed: 01-Aug-2012].
R. Chirgwin, “Tracking Android Phones Is Easy, Says Researcher,” The Register, 31-Jul-2012. [Online]. Available: [Accessed: 01-Aug-2012].
E. Kaspersky, “What Wired Is Not Telling You – a Response to Noah Shachtman’s Article in Wired Magazine,” Nota Bene, 25-Jul-2012. [Online]. Available: [Accessed: 02-Aug-2012].
T. Wilson, “White House, Cybersecurity Chiefs Back Proposed Legislation,” Dark Reading, 01-Aug-2012. [Online]. Available: [Accessed: 02-Aug-2012].