Joomla TemplatesWeb HostingFree Money

Felix Uribe's List of the Best Websites in Cybersecurity and Privacy

The classification of Internet of Things (IoT) devices Based on their impact on Living Things (Paper)

English
Spanish

Home Reports

Reports

Display # 
# Web Link Hits
1   Link   The Perpetual Line-Up Unregulated Police Face Recognition In America
240
2   Link   Artificial Intelligence and National Security
98
3   Link   NOT READY FOR TAKEOFF Face Scans at Airport Departure Gates
73
4   Link   Navigating the Future of Mobile Services
127
5   Link   Mobile Security Updates: Understanding the Issues
This Report summarizes the information provided in response to the Commission’s Orders, as well as responses to a parallel inquiry initiated by the Federal Communications Commission (“FCC”) into mobile carriers’ security updates practices.
262
6   Link   Hostile Drones: The Hostile Use Of Drones By Non-State Actors Against British Targets
814
7   Link   The Imperva Hacker Intelligence Initiative
2168
8   Link   Needle in a datastack: the rise of big security data
1762
9   Link   Report On Securing And Growing The Digital Economy
154
10   Link   NSA's Review of Emerging Technologies
1303
11   Link   HPE Security Research Cyber Risk Report 2016
395
12   Link   MANDIANT: APT1 Exposing One of China’s Cyber Espionage Units
1637
13   Link   The Elderwood Project
1791
14   Link   Latin American and Caribbean Cybersecurity Trends and Government Responses
1668
15   Link   The Impact of Password Meters on Password Selection
2219
16   Link   Child Identity Theft
2395
17   Link   Mcafee mobile security report
1461
18   Link   Dissecting Operation Troy: Cyberespionage in South Korea
1554
19   Link   Socially Engineered Malware Blocking
2207
20   Link   Microsoft Security Intelligence Report
1269
21   Link   Data Brokers: A call for transparency and accountability
1185
22   Link   A Primer on Metadata: Separating Fact from Fiction
1183
23   Link   Workplace Privacy, Data Management & Security Report
830
24   Link   Open Crypto Audit Project TrueCrypt
741
25   Link   The State of the "C" in CISO
814
26   Link   Regin: Top-tier espionage tool enables stealthy surveillance
939
27   Link   Hacking the Human Operating System
782
28   Link   Report on Cybersecurity and Critical Infrastructure in the Americas
842
29   Link   The Security Impact of Mobile Device Use by Employees
789
30   Link   Regulatin Cross Border Dependencies of Critical Information Infrastructure
819
31   Link   The Black Vine cyberespionage group
1042
32   Link   Insider Threats and the Need for Fast and Directed
1312
33   Link   APT30 AND THE MECHANICS OF A LONG-RUNNING CYBER ESPIONAGE OPERATION
638
34   Link   Cloud Security Spotlight Report
806
35   Link   Best Practices for Victim Response and Reporting of Cyber Incidents
620
36   Link   Privacy Laws in Latin America and the Caribbean
676
37   Link   Net Losses: Estimating the Global Cost of Cybercrime
470
38   Link   ATMIA Global Fraud and Security Survey 2015
423
39   Link   The BakerHostetler Data Security Incident Response Report 2015
682
40   Link   McAfee Labs Threats Report November 2015
461
41   Link   2015 Data Privacy Litigation Report
757
42   Link   Managing Insider Risk through Training & Culture
449
43   Link   Intel Securiyty Grand Theft Data Report
503
44   Link   2016 Dell Security Annual Threat Report
597
45   Link   SANS Top Cyber Security Risks
2116
46   Link   Rise of the Drones Managing the Unique Risks Associated with Unmanned Aircraft Systems
245
47   Link   Kingslayer– a supply Chain attack
273
48   Link   Dragnet Surveillance Nation: How Data Brokers Sold Out America
177
49   Link   The Ground Truth About Encryption And The Consequences of Extraordinary Access
172
50   Link   In 2017, The Insider Threat Epidemic Begins
310
51   Link   2017 Technology, Media and Telecommunications Predictions
115
52   Link   McAfee Labs Threats Report April 2017
84


Cibersecurity, Privacy and the Internet of Things (IoT) - Internet Society WEBINAR