Lessons from financially motivated cybercrimes
Operation get rich or die trying : how the TJX breach set the stage for a decade of payment card conflict
"What they aren't telling you is their rules are archaic" : the South Carolina Department of Revenue breach, IRS fraud & identity theft
The most wanted cybercriminal in the world : gameover zeus, cryptolocker, and the rise of ransomware
Lessons from cyber espionage
Certificates gone rogue : the diginotar compromise and the fragile trust infrastructure of the online world
No doubt to hack you, writed by uglygorilla : China's PLA unit 61398 and economic espionage
"Decades in the making" : the office of personnel management breach and political espionage
Lessons from online acts of vengeance
Operation Stophaus : the Spamhaus denial-of-service attacks
"An epic nightmare" : the Sony breach and ex-post mitigation
Imperfect affair : Ashley Madison and the economics of embarrassment
Who should safeguard our data? : shared responsibility and liability
"Email the way it should be" : the role of application designers and software developers
Reasonable security : the role of organizations in protecting their data and networks
"Happy talk about good ideas" : the role of policy makers in defending computer systems
Conclusion: it will take all of us