Page 66 - index
P. 66









When the back door into Unix opened ...

03/31/2014 09:33 (Tech Channel MEA)
...out millions of spam emails. Its complex knot of sophisticated malware components are designed to hijack servers, infect
the computers that visit...



What Homeland Security wants utilities to know and do

04/03/2014 07:58 (Smart Grid News)
...lays out an enterprise approach to risk management that incorporates cyber and physical security and resilience
measures. It emphasizes the role...



New Windows Phone security necessary, but not groundbreaking
04/03/2014 06:06 (Network World)

...and other services. For businesses, the critical features revolved around security and mobile device management
(MDM). For MDM, Microsoft has...



Attack of the Tinder bots: 'malicious' download links found in dating app

04/03/2014 01:53 (The Guardian)

...you're chatting up an attractive human, but they could be a malware-toting algorithm. Called Alicia. Dating app Tinder is
hugely popular around...



Coinbase denies security breach, defends spamming-friendly features

04/03/2014 01:40 (Help Net Security)
Coinbase users have taken to Reddit to complain about the phishing emails posing as legitimate Coinbase notifications
they've been receiving,


Cybercrooks target IoT devices to mine Bitcoins

04/03/2014 01:33 (Help Net Security)

...Internet-of-Things devices and infecting them with Bitcoin-mining malware. The results of a recent investigation by SANS
ISC CTO Johannes Ullrich...




66 Cyber Warnings E-Magazine – April 2014 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   61   62   63   64   65   66   67   68   69   70   71