Page 65 - index
P. 65







which appeared late last month. It's one of an extensive family of malware programs that scramble a person's files until a
pricey ransom is paid,



NSA infiltrated RSA security more deeply than thought

03/31/2014 20:14 (New York Post)

...system the default in software used by a wide range of Internet and computer security programs. The system, called
Dual Elliptic Curve, was a...



Apple ID Phishing Scam Won't Take Fake Data

03/31/2014 18:46 (Yahoo! News)
Apple ID Phishing Scam Won't Take Fake Data At this point, the average Internet user has seen every quick-and-dirty
phishing scam in the book...


North Hollywood High wins national cyber-security competition

03/31/2014 18:26 (Los Angeles Times)

North Hollywood High wins national cyber-security competition A team of tech-savvy students from North Hollywood High
clinched the national championship...



Pentagon Aiding Allies on Cybersecurity in Gulf to Asia

03/31/2014 15:17 (Bloomberg)
...and Saudi Arabia have been among the victims of attacks on their computer networks. An attack on a vulnerable network
in an allied country could...


Untraceable $20 device can allow hacker to control a car 'from miles away'


03/31/2014 12:57 (Computerworld Blogs)
...access to a PC or an online account: brute-force, phishing and malware attacks as well as password leaks, social
engineering Tesla employees,



Cyberwars: Will The Pentagon's Plan For Defeating Insider Attacks Work?

03/31/2014 12:12 (Forbes.com)
...space, deny adversaries their objectives, and defend the nation from cyber attacks that threaten our national security.
However, in a curious...

65 Cyber Warnings E-Magazine – April 2014 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   60   61   62   63   64   65   66   67   68   69   70