Page 65 - index
P. 65
which appeared late last month. It's one of an extensive family of malware programs that scramble a person's files until a
pricey ransom is paid,
NSA infiltrated RSA security more deeply than thought
03/31/2014 20:14 (New York Post)
...system the default in software used by a wide range of Internet and computer security programs. The system, called
Dual Elliptic Curve, was a...
Apple ID Phishing Scam Won't Take Fake Data
03/31/2014 18:46 (Yahoo! News)
Apple ID Phishing Scam Won't Take Fake Data At this point, the average Internet user has seen every quick-and-dirty
phishing scam in the book...
North Hollywood High wins national cyber-security competition
03/31/2014 18:26 (Los Angeles Times)
North Hollywood High wins national cyber-security competition A team of tech-savvy students from North Hollywood High
clinched the national championship...
Pentagon Aiding Allies on Cybersecurity in Gulf to Asia
03/31/2014 15:17 (Bloomberg)
...and Saudi Arabia have been among the victims of attacks on their computer networks. An attack on a vulnerable network
in an allied country could...
Untraceable $20 device can allow hacker to control a car 'from miles away'
03/31/2014 12:57 (Computerworld Blogs)
...access to a PC or an online account: brute-force, phishing and malware attacks as well as password leaks, social
engineering Tesla employees,
Cyberwars: Will The Pentagon's Plan For Defeating Insider Attacks Work?
03/31/2014 12:12 (Forbes.com)
...space, deny adversaries their objectives, and defend the nation from cyber attacks that threaten our national security.
However, in a curious...
65 Cyber Warnings E-Magazine – April 2014 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide