Trending Security News
Security news stories this week covered a failed attempt by Anonymous to bring down the Internet; latest malware stats for Macs; new government investments in understanding big data trends and building new cybercrime defenses; and eight UK universities who recognize excellence in the field of security science. Here’s our top story and blog picks this week. Let us know what security stories interest you.

In the News

· Damage Mitigation As The New Defense – Dark Reading

· Widespread Virus Proves Macs Are No Longer Safe From Hackers – New York Times

· Anonymous Vs. DNS System: Lessons For Enterprise IT – InformationWeek Security

· Pastebin to tackle Anonymous and LulzSec hackers' sensitive data dumps – V3.co.uk

Security Research & Intelligence

· White House to Spend $200 Million on ‘Big Data’ – Time

· Universities recruited to battle rising cybercrime – ZDNet

· Eight UK universities awarded excellence in cyber security research status – Computer Weekly

Cyber Threat

· Global Payments Says Fewer Than 1.5M Cards Affected in Data Theft – PC World

· Hardware imported from China could leave U.S. open to cyber-threats – ZDNet

· Global Payments Security Breach: Firm Dropped By Visa After 1.5 Million Credit Card Numbers Possibly Exposed – Reuters

Government, Legislation & Policy

· CDT: Cybersecurity bills raise major civil liberties concerns – Computer World

· UK Internet group: Surveillance program in works –Associated Press

· Judge rejects copyright trolls' BitTorrent conspiracy theory – ars technica

Blog Picks

· Watch Out, White Hats! European Union Moves to Criminalize ‘Hacking Tools’ – Wired

· How to Control What Facebook Apps See – Wall Street Journal blog


Microsoft Research, Papers and Media

Trustworthy Computing Next (paper)

Cybersecurity/Internet Health

· Rethinking the Cyber Threat (paper)

· Collective Defense: Applying Public Health Models to the Internet (paper)

· Video: Collective Defense: Enabling Healthy Devices (video)

Security Intelligence

· Lessons from Least Malware Infected Countries (series)

· Battling the ZBot Threat (paper)

Trustworthy Computing

· Imagine Video: Microsoft Trustworthy Computing (video)

Cybersecurity/Trusted Supply Chain:

· Supply Chain Risk Management keynote at the East-West Institute’s Second Worldwide Cybersecurity Summit (video)

· Cyber Supply Chain Risk Management: Toward a Global Vision of Transparency and Trust (paper)

· Toward a Trusted Supply Chain: A Risk Based Approach To Managing Software Integrity (paper)

· Microsoft at RSA Conference 2012

· Microsoft Sessions at RSA Conference 2012

· Trust in Computing Research

· TwC Next Poster