Trending Security News

Security news stories this week focused on smartphone security and GPS tracking; our Security Development Conference in DC; and a report on security technology trends with a few stories also covering malware stats and cyber-attacks. Here are the security news stories and two blog picks we read this week.

In the News

What a DDoS Can Cost – Dark Reading
Your laptop could come under attack at NATO, experts warn – Chicago Sun-Times
Smartphone security is heading for 'apocalypse' – Network World
Smartphone Security – MSNBC
Forrester Outlines 5 Rising, 5 Declining Security Technologies – CIO

Security Research & Intelligence

Steve Lipner on the Microsoft SDL, critical infrastructure protection – TechTarget
Microsoft's SDL Expands Beyond Redmond – Threatpost
Reminder to Congress: Cops’ Cellphone Tracking Can Be Even More Precise Than GPS – Forbes

Cyber Threat

Cyberspies Target Victims Via ‘Strategic’ Drive-by Website Attacks – Dark Reading
Can better software make cyberattacks a losing proposition? – Government Computer News
Android Malware Quadruples Between 2011 And 2012  – Forbes

Government, Legislation & Policy

Pentagon expands cybersecurity exchange – Washington Post
Cybersecurity bill hits snag – Politico
Tackle cyber security with ad campaign, says Labour defence spokesman Jim Murphy – Computer Weekly
Insider tells why Anonymous ‘might well be the most powerful organization on Earth’ – National Post

Blog Picks

IT Security Hack – CIO
Call of Duty Trojan horse creator ends up in jail, after drunken college raid – Naked Security

Microsoft Research, Papers and Media

Trustworthy Computing Next (paper)

Cybersecurity/Internet Health

Rethinking the Cyber Threat (paper)
Collective Defense: Applying Public Health Models to the Internet (paper)

Video: Collective Defense: Enabling Healthy Devices (video)

Security Intelligence

Lessons from Least Malware Infected Countries (series)
Battling the ZBot Threat (paper)

Trustworthy Computing

Imagine Video: Microsoft Trustworthy Computing (video)

Cybersecurity/Trusted Supply Chain

Supply Chain Risk Management keynote at the East-West Institute’s Second Worldwide Cybersecurity Summit (video)
Cyber Supply Chain Risk Management: Toward a Global Vision of Transparency and Trust (paper)
Toward a Trusted Supply Chain: A Risk Based Approach To Managing Software Integrity (paper)

 Microsoft at RSA Conference 2012

· Microsoft Sessions at RSA Conference 2012

· Trust in Computing Research

· TwC Next Poster