DDoS Attack’, Kaspersky Lab, 23 March 2017.
492
Palmer D., ‘Ransomware is now big business on the dark web and malware developers are cashing in’, ZDNet, 11 October 2017.
493
Nakashima E. and Timberg C., ‘NSA officials worried about the day its potent hacking tool would get loose. Then it did’, Washington Post, 16 May 2017.
494
Orr A., ‘Zerodium Offers $2 Million for Remote iOS Exploits’, Mac Observer, 10 January 2019.
495
Kushner D., ‘The Real Story of Stuxnet’, IEEE Spectrum, 26 February 2013; Kopfstein J., ‘Stuxnet virus was planted by Israeli agents using USB sticks, according to new report’, The Verge, 12 April 2012.
496
Kaplan F., Dark Territory: The Secret History of Cyber War (Simon & Schuster, 2016).
497
Dark Trace. Global Threat Report 2017. http://www.darktrace.com.
498
Lomas A., ‘Screwdriving. Locating and exploiting smart adult toys’, Pen Test Partners Blog, 29 September 2017; Franceschi-Bicchierai L., ‘Hackers Can Easily Hijack This Dildo Camera and Livestream the Inside of Your Vagina (Or Butt)’, Motherboard, 3 April 2017.
499
DeMarinis N. et al., ‘Scanning the Internet for ROS: A View of Security in Robotics Research’, arXiv, 2018.
500
Об отключении серверов AWS: Hindi R., ‘Thanks for breaking our connected homes, Amazon’, Medium, 28 February, 2017; Hern A., ‘How did an Amazon glitch leave people literally in the dark?’, The Guardian, 1 March 2017.
501
Amazon Compute Service Level Agreement, https://aws.amazon.com, 12 February 2018; Poletti T., ‘The engine for Amazon earnings growth has nothing to do with e-commerce’, Market Watch, 29 April 2018.
502
Swift D., ‘“Mega Outage” Wreaks Havoc on Internet, is AWS too Big to Fail?’, Digit, 2017; Bobeldijk Y., ‘Is Amazon’s cloud service too big to fail?’, Financial News, 1 August 2017.
503
Barrett B. and Newman L.H., ‘The Facebook Security Meltdown Exposes Way More Sites Than Facebook’, Wired, 28 September 2018.
504
О «любовном вирусе»: Meek J., ‘Love bug virus creates worldwide chaos’, The Guardian, 5 May 2000; Barabási A.L., Linked: the New Science of Networks (Perseus Books, 2003).
505
White S.R., ‘Open Problems in Computer Virus Research’, Virus Bulletin Conference, 1998.
506
Barabási A.L. and Albert R., ‘Emergence of Scaling in Random Networks’, Science, 1999.
507
Pastor-Satorras R. and Vespignani A., ‘Epidemic Spreading in ScaleFree Networks’, Physical Review Letters, 2 April 2001.
508
Goel S. et al., ‘The Structural Virality of Online Diffusion’, Management Science, 2016.
509
О программном модуле left-pad: Williams C., ‘How one developer just broke Node, Babel and thousands of projects in 11 lines of JavaScript’, The Register, 23 March 2016; Tung L., ‘A row that led a developer to delete a 17-line JavaScript module has stopped countless applications working’, ZDNet, 23 March 2016; Roberts M., ‘A discussion about the breaking of the Internet’, Medium, 23 March 2016.
510
Haney D., ‘NPM & left-pad: Have We Forgotten How To Program?’, 23 March 2016, https://www.davidhaney.io.
511
Rotabi R. et al., ‘Tracing the Use of Practices through Networks of Collaboration’, AAAI, 2017.
512
Fox-Brewster T., ‘Hackers Sell $7,500 IoT Cannon To Bring Down The Web Again’, Forbes, 23 October 2016.
513
Gallagher S., ‘New variants of Mirai botnet detected, targeting more IoT devices’, Ars Technica, 9 April 2019.
514
Cohen F., ‘Computer Viruses – Theory and Experiments’, 1984.
515
Cloonan J., ‘Advanced Malware Detection – Signatures vs. Behavior Analysis’, Infosecurity Magazine, 11 April 2017.
516
Oldstone M.B.A., Viruses, Plagues, and History (Oxford University Press, 2010).
517
Goodin D., ‘US, European police take down highly elusive botnet known as Beebone’, Ars Technica, 9 April 2015; Samani R., ‘Update on the Beebone Botnet Takedown’, McAfee Blogs, 20 April 2015.
518
Thompson C.P. et al., ‘A naturally protective epitope of limited variability as an influenza vaccine target’, Nature Communications, 2018.
519
‘McAfee Labs 2019 Threats Predictions Report’, McAfee Labs, 29 November 2018; Seymour J. and Tully P., ‘Weaponizing data science for social engineering: Automated E2E spear phishing on Twitter’, Working paper, 2016.
520
Дело Шмидта: Court of Appeal of Louisiana, Third Circuit. STATE of Louisiana v. Richard J. SCHMIDT. No. 99–1412, 2000; Miller M., ‘A Deadly Attraction’, Newsweek, 18 August 1996.
521
Darwin C., Journal of researches into the natural history and geology of the countries visited during the voyage of H.M.S. Beagle round the world, under the command of Capt. Fitz Roy, R.N. (John Murray, 1860).
522
Другая аналогия – игра «дублеты», придуманная Льюисом Кэрроллом. В ней путем постепенной замены букв можно получить из одного слова другое, например: КОЗА – ПОЗА – ПОЛА – ПОЛК – ВОЛК. – Прим. ред.
523
Hon C.C. et al., ‘Evidence of the Recombinant Origin of a Bat Severe Acute Respiratory Syndrome (SARS)-Like Coronavirus and Its Implications on the Direct Ancestor of SARS Coronavirus’, Journal of Virology, 2008.
524
Forensic File Update on Janice Trahan Case, CNN, 14 March 2016.
525
González-Candelas F. et al., ‘Molecular evolution