The Rules of Contagion

(Greg DeLong) #1
JavaScript’, The Register, 23 March 2016; Tung L., ‘A row that
led a developer to delete a 17-line JavaScript module has
stopped countless applications working’, ZDNet, 23 March 2016;
Roberts M., ‘A discussion about the breaking of the Internet’,
Medium, 23 March 2016.


  1. Haney D., ‘NPM & left-pad: Have We Forgotten How To
    Program?’ 23 March 2016, https://www.davidhaney.io

  2. Rotabi R. et al., ‘Tracing the Use of Practices through Networks
    of Collaboration’, AAAI, 2017.

  3. Fox-Brewster T., ‘Hackers Sell $7,500 IoT Cannon To Bring
    Down The Web Again’, Forbes, 23 October 2016.

  4. Gallagher S., ‘New variants of Mirai botnet detected, targeting
    more IoT devices’, Ars Technica, 9 April 2019.

  5. Cohen F., ‘Computer Viruses – Theory and Experiments’, 1984.

  6. Cloonan J., ‘Advanced Malware Detection – Signatures
    vs. Behavior Analysis’, Infosecurity Magazine, 11 April 2017.

  7. Oldstone M.B.A., Viruses, Plagues, and History (Oxford
    University Press, 2010).

  8. Background on Beebone from: Goodin D., ‘US, European police
    take down highly elusive botnet known as Beebone’, Ars
    Technica, 9 April 2015; Samani R., ‘Update on the Beebone
    Botnet Takedown’, McAfee Blogs, 20 April 2015.

  9. Thompson C.P. et al., ‘A naturally protective epitope of limited
    variability as an influenza vaccine target’, Nature
    Communications, 2018.

  10. ‘McAfee Labs 2019 Threats Predictions Report’, McAfee Labs,
    29 November 2018; Seymour J. and Tully P., ‘Weaponizing data
    science for social engineering: Automated E2E spear phishing on
    Twitter’, Working paper, 2016.
    7. Tracking outbreaks

Free download pdf