2012 Third Cybercrime and Trustworthy Computing Workshop