Page 49 - index
P. 49







...international government agencies trying to steal military intelligence. Spear phishing campaigns
include attachments infected with Poison Ivy meant...




The Counter-productive Effect of the Cost of Cybercrime

08/21/2013 12:56 (Infosecurity)


...those figures are wrong? Could it mean that industry, and government, gets its entire cybersecurity
strategy wrong? Last year, Ross Anderson...




Comment: Cybersecurity in a Post-prevention World

08/21/2013 11:33 (Infosecurity)

...its way into the digital age. From passwords and firewalls to anti-malware and intrusion prevention
systems (IPS), we ve focused much of our...




Security tips for the connected family


08/21/2013 10:54 (Help Net Security)

...remote access to backed up files when you're away from your computer. Virus protection: While
back-to-school virus protection generally consists...




Cybercrooks find ad networks and malware a profitable combo

08/21/2013 10:33 (Computerworld Blogs)


Cybercrooks find ad networks and malware a profitable combo Signing up with an ad network is often
the most profitable option for developers...




Hacker Reveals How Devastating A Cyberattack On The Stock Market Could Be

08/21/2013 09:24 (Yahoo! Canada Finance)

Analysis of Poison Ivy remote access tool

08/21/2013 05:21 (Help Net Security)


49 Cyber Warnings E-Magazine – August 2013 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide
   44   45   46   47   48   49   50   51   52   53   54