Page 71 - index
P. 71









Cybercriminals use sophisticated PowerShell-based malware

04/08/2014 12:36 (Network World)
Cybercriminals use sophisticated PowerShell-based malware Two separate threats that use malicious Windows PowerShell
scripts were identified...



Hackers lurking in vents and soda machines

04/08/2014 10:09 (Telegram.com)
...that gave the attackers a foothold in the business's vast computer network. Security experts summoned to fix the
problem were not allowed to...




Bulletin (SB14-104)Vulnerability Summary for the Week of April 7, 2014
04/14/2014 06:54 (US-CERT)

...Summary for the Week of April 7, 2014 The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities
that have been recorded by...



As Windows XP support ends, are 'XPocalypse' reports overblown?

04/14/2014 04:11 (The Guardian)

...security inertia. While updating security hot fixes are a core component of cyber security protection today, they are not a
silver bullet. Cloud and...



Heartbleed bug can expose private server encryption keys

04/14/2014 02:07 (Computerworld)
...Layer/Transport Security Layer). The private key is part of a security certificate that verifies a client computer isn't
connecting with a fake website...


Heartbleed Fixes Taking Longer as Websites Plug Gaps

04/14/2014 00:01 (Bloomberg)

...to attack, according to Netcraft Ltd., a U.K.-based cyber-security firm. Large websites such as Google and Facebook Inc.
pounced on the issue...




71 Cyber Warnings E-Magazine – April 2014 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   66   67   68   69   70   71   72   73   74   75   76