Page 48 - index
P. 48







Business booms for cloud encryption provider after PRISM revelations

08/21/2013 23:33 (Computer World Australia)

...key management, we also do Cloud DLP or data-loss prevention, malware detection and activity
monitoring. And you'll see us continue to grow along...





Malware Reuses Old Technique

08/21/2013 17:49 (Isssource.com)

Malware Reuses Old Technique The use of the right-to-left override (RLO) character in Unicode, a tactic
that enables malware authors to hide...




Hacking wireless networks, drones and the future of security


08/21/2013 16:49 (Forbes)

...Sophos HQ for the latest face to face competition in the UK Cyber Security Challenge. The UK Cyber
Security Challenge is a body consisting of...




Jigsaw Tool Used in Attacks

08/21/2013 16:47 (Isssource.com)

...in companies sometimes perform exercises like and internal phishing campaign. Security professionals
in companies sometimes perform exercises...





Malware Variant Branches Out

08/21/2013 15:16 (Isssource.com)

Malware Variant Branches Out A variant of the Ramnit financial malware is using local Web browser
injections in order to steal log-in credentials...




Poison Ivy RAT in Separate Attacks

08/21/2013 14:44 (Isssource.com)


48 Cyber Warnings E-Magazine – August 2013 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide
   43   44   45   46   47   48   49   50   51   52   53