Page 2 - index
P. 2



CYBER WARNINGS


CONTENTS Published monthly by Cyber Defense Magazine and
distributed electronically via opt-in Email, HTML, PDF and
Online Flipbook formats.
Welcome to Blackhat 2014! ............................................................. 3 PRESIDENT

How a Hacker can Attack a Mobile Application .................................... 5 Stevin Victor
[email protected]

The Many Faces of Insider Threats ....................................................... 8 EDITOR

1 Heartbleed vulnerability, 600 products, 100 vendors ..................... 12 PierLuigi Paganini, CEH
[email protected]

As Cyber Threats Increase, Good Hygiene Can Help ........................... 18
ADVERTISING
Customer Concerns about Mobile Payment Security ......................... 21
Jessica Quinn
Context-Based Authentication for the Enterprise .............................. 24 [email protected]


Protecting Files, Government Style .................................................... 28 KEY WRITERS AND CONTRIBUTORS

Pierluigi Paganini
Cognitive Biometrics: The Final Frontier of Authentication ................ 32 Patrick Kehoe
Tom Cross
Dynamic Cryptography and Why it Matters? ..................................... 34 Bob Dix
John Dancu
Reed Taussig
Why is password creation so hard? (Part 3) ....................................... 37 Paul Brubaker
Oren Kedem
Secure your code with analysis and scanning ..................................... 43 Milica Djekic
Josephine Rosenburgh
Art Dahnert
Email Threats: A thing of the past? .................................................... 46 Fred Touchette
Stephen Cobb
Tom Feige
Dodging disaster: Cybersecurity and business continuity .................. 49 Mike James
V Bala
Joe Ferrara
Consumers Need to Know About Corporate Data Breaches in a Timely Ivo Wiens
Fashion ............................................................................................... 52 Hitansh Kataria
Joan Pepin
Improve Your Computer’s Security in 5 Simple Steps......................... 56 Dan Virgillito
and many more…
Combat Advanced Cyberattacks with Shared Security Intelligence .... 59
Interested in writing for us:
[email protected]
Phishing Attacks aren’t a Passing Threat ............................................ 62

Why Security Incidents are different — and more dangerous — than IT CONTACT US:

Incidents ............................................................................................. 68 Cyber Defense Magazine

The cinch of Hacking: Social Engineering ............................................ 71 Toll Free: +1-800-518-5248
Fax: +1-702-703-5505
SKYPE: cyber.defense
Enterprise Security and the Machine Data Tsunami........................... 76 Magazine: http://www.cyberdefensemagazine.com

Copyright (C) 2014, Cyber Defense Magazine, a division of
Top 5 breaches in the financial sector ................................................ 78 STEVEN G. SAMUELS LLC
848 N. Rainbow Blvd. #4496, Las Vegas, NV 89107. EIN: 454-18-
Is It Time to Outsource Your Security Education? .............................. 81 8465, DUNS# 078358935.
All rights reserved worldwide. [email protected]


Executive Producer:
Gary S. Miliefsky, CISSP®






2 Cyber Warnings E-Magazine – July 2014 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   1   2   3   4   5   6   7