Page 48 - index
P. 48
Business booms for cloud encryption provider after PRISM revelations
08/21/2013 23:33 (Computer World Australia)
...key management, we also do Cloud DLP or data-loss prevention, malware detection and activity
monitoring. And you'll see us continue to grow along...
Malware Reuses Old Technique
08/21/2013 17:49 (Isssource.com)
Malware Reuses Old Technique The use of the right-to-left override (RLO) character in Unicode, a tactic
that enables malware authors to hide...
Hacking wireless networks, drones and the future of security
08/21/2013 16:49 (Forbes)
...Sophos HQ for the latest face to face competition in the UK Cyber Security Challenge. The UK Cyber
Security Challenge is a body consisting of...
Jigsaw Tool Used in Attacks
08/21/2013 16:47 (Isssource.com)
...in companies sometimes perform exercises like and internal phishing campaign. Security professionals
in companies sometimes perform exercises...
Malware Variant Branches Out
08/21/2013 15:16 (Isssource.com)
Malware Variant Branches Out A variant of the Ramnit financial malware is using local Web browser
injections in order to steal log-in credentials...
Poison Ivy RAT in Separate Attacks
08/21/2013 14:44 (Isssource.com)
48 Cyber Warnings E-Magazine – August 2013 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide