Computer Security

Fetch Headings.ExtraData
Below are groups and resources (books, articles, websites, etc.) related to this topic. Click on an item’s title to go its resource page with author, publisher, description/abstract and other details, a link to the full text if available, as well as links to related topics in the Subject Index. You can also browse the Title, Author, Subject, Chronological, Dewey, LoC, and Format indexes, or use the Search box.
Particularly recommended items are flagged with a red logo:

Connexions Library

How to Leak to The Intercept
Lee, Micah
Article
2015
Leaking can serve the public interest, fueling revelatory and important journalism. Here are instructions for how to leak safely.
OptOut
Website
Steve Gibson's campaign against Internet spyware used by companies to extract information from Internet users' computers without their knowledge or consent.
Passphrases That You Can Memorize - But That Even the NSA Can't Guess
Lee, Micah
Article
2015
A passphrase is like a password, but longer and more secure. In essence, it's an encryption key that you memorize. Once you start caring more deeply about your privacy and improving your computer secu...
Popular Security Software Came Under Relentless NSA and GCHQ Attacks
Fishman, Andrew; Marquis-Boire, Morgan
Article
2015
The National Security Agency and its British counterpart, Government Communications Headquarters, have worked to subvert anti-virus and other security software in order to track users and infiltrate n...
Preparing for a Digital 9/11
Greenberg, Karen
Article
2012
In recent years, in one of the more dangerous, if largely undiscussed, developments of our time, the Bush and then Obama administrations have launched the first state-planned war in cyber space. First...
With Virtual Machines, Getting Hacked Doesn't Have To Be That Bad
Lee, Micah
Article
2015
Lee explains how to install and use a virtual machine, a fake computer running inside the real computer.

Sources Library

The Motherboard Guide to Not Getting Hacked
Motherboard Staff
2017
Do you want to stop criminals from getting into your Gmail or Facebook account? Are you worried about the cops spying on you? Motherboard Staff have answers on how to protect yourself. This is Motherb...
US was 'key player in cyber-attacks on Iran's nuclear programme'
Obama reported to have approved bid to target Tehran's nuclear efforts
Beaumont, Peter; Hopkins, Peter
2012
Fresh light is shed on the rapid development of US cyberwarfare capability and reveal its willingness to use cyber weapons offensively to achieve policies.
Watch your attachments: Microsoft Office bug lets hackers take over computers
2014
A dangerous new security vulnerability has been discovered in Microsoft's Office software, threatening to hijack users of virtually every existing version of Windows. The bug in question affects progr...
Why you shouldn't trust Geek Squad ever again
The government reportedly pays Geek Squad technicians to dig through your PC
Patrizio, Andy
2017
The Orange County Weekly reports that the company's repair technicians routinely search devices brought in for repair for files that could earn them $500 reward as FBI informants. That, ladies and gen...