http://news.yahoo.com/hackers-may-used-pa-company-hit-target-195942337.html. 7 February 2014. 11 February 2014. Hendler, James. http://www.scientificamerican.com/article/its-times-reform-computer-fraud-abuse-act/.
Hubertus Knabe: The dark secrets of a surveillance state. TED. Retrieved from http://www.ted.com/talks/hubertus_knabe_the_dark_secrets_of_a_surveillance_state? on 11/17/2014. Weber, P. (2013, June 12).
As a user of the World Wide Web, it is one’s responsibility to learn more about Heartbleed, in order to help protect one’s online identity and to make sure it is protected both now and in the future. “A widespread vulnerability in OpenSSL, the software library used to secure communications on the web, has undermined the security on hundreds of thousands of web servers, and has left online companies scrambling to close the security hole,” states a bold headline written by Robert L. of Eweek Magazine Issue 1. (2014). Heartbleed allows a hacker to extract what was previously thought to be secure information using several rudimentary princip... ... middle of paper ... ...eved April 22, 2014, from EBSCO Janssen, C. (2014, April 14). What is the Heartbleed Bug?
(2009).Crime Online: Cybercrime and illegal innovation. UK: Nesta. • Shaw E., (2013) How To Avoid Falling Victim To Online ID Fraudsters. The Independent [online]. Available at: [Accessed 21 May 2014].
Software makers, on the other hand, say they aren't given enough time to deal with a problem, and that publicizing it simply alerts malicious hackers to an opportunity. There are super hackers out there who find security vulnerabilities, then write a script up on the internet, with one or two l... ... middle of paper ... ...on't publish code, 17 Oct. 2001, CNet News.com, 11 Mar. 2004, <http://news.com.com/2100-1001_3-274577.html?tag=st_rn> 6. Lemos, Robert, Microsoft developers feel Windows pain, 7 Feb 2002, CNet News.com, 12 Mar. 2004, < http://news.com.com/2100-1001_3-832048.html> 7.
(n.d.). Retrieved April 21, 2014, from http://en.wikipedia.org/wiki/Spam_(electronic) Top 5 Cyber Security Threats. (2014, February 25). Atom. Retrieved April 21, 2014, from http://blog.devry.edu/2014/02/top-5-cyber-security-threats-that-could-affect-your-life.html Spam.
NSA snooping violates our founding principles: Marc A. Scaringi. . Retrieved May 27, 2014, from http://www.pennlive.com/opinion/index.ssf/2013/10/nsa_snooping_violates_our_founding_principles_marc_scaringi.html Vespa, M. (2013, December 19). NSA Official: 'We Are Now a Police State'. CNS News.
19 Feb. 2014. International Business, Times. "Snowden Leaks: NSA Storing Internet Cookies, Location Data for Spying." International Business Times 16 Feb. 2014: Regional Business News. Web. 18 Feb. 2014.
Wall Street Journal, 8th May 2014. Web: Messmer, Ellen. "'Decoy Nets' Gain Backers in Battle Against Hackers." vol.18, no.10 (2001) 1-66. Network World 8th May 2014.