So from now on I will include academic publications to my news updates. I screen the stuff anyway so why keep it only for me.
(7) A Methodology for Empirical Analysis of the Permission-Based Security Models and its Application to Android David Barrera, H. Gunes Kayacik, Paul C. van Oorschot, Anil Somayaji
(8) Mobile Location Tracking in Metropolitan Areas: malnets and others Nathanial Husted, Steve Myers
(9) On Pairing Constrained Wireless Devices Based on Secrecy of Auxiliary Channels: The Case of Acoustic Eavesdropping Tzipora Halevi, Nitesh Saxena
(10) PinDr0p: Using Single-Ended Audio Features to Determine Call Provenance Vijay A. Balasubramaniyan, Aamir Poonawalla, Mustaque Ahamad, Michael T. Hunter, Patrick Traynor
A funny bug in the Nokia E72: Nokia E72 Keyboard Password bypass
Conferences: Upcoming is the 27C3 it's CFP runs until October 9th. I will try to also do a talk this year again.