Cryptograms are an interesting activity (hobby?) for some which involves (simple) cryptography at the character substitution level.
Using this might avoid the condition which allowed me to elevate priveleges in my end-of-semester lab . Compile/use at your own risk.
NetSys.com has a pointer to a proposed taxonomy (a kind of RFC for a subset of the English language, think “a set of terms”) to describe distributed denial of service attacks and defenses.
This sort of thing is needed. “To name something is to know it” is a bit old-hat, but has some truth to it. We do it for malicious code (though agreement has yet to be reached in some cases), biological viruses, and war. Why not directed virtual attacks?
TaoSecurity pointed this out. Professor Orin Kerr uses a mailing list to write summaries of cybercrime cases. Even if you don’t join the list, some of the cases in the archives are interesting.
Compulsive.org has a pointer to CDC’s blog.
For anyone not knowing who the Cult of the Dead Cow is, they are the hacker group that brought the world Back Orifice, Camera/Shy, and Peekabooty.
The blog even has a RSS feed for those of us with aggregators.