Page 49 - index
P. 49
...international government agencies trying to steal military intelligence. Spear phishing campaigns
include attachments infected with Poison Ivy meant...
The Counter-productive Effect of the Cost of Cybercrime
08/21/2013 12:56 (Infosecurity)
...those figures are wrong? Could it mean that industry, and government, gets its entire cybersecurity
strategy wrong? Last year, Ross Anderson...
Comment: Cybersecurity in a Post-prevention World
08/21/2013 11:33 (Infosecurity)
...its way into the digital age. From passwords and firewalls to anti-malware and intrusion prevention
systems (IPS), we ve focused much of our...
Security tips for the connected family
08/21/2013 10:54 (Help Net Security)
...remote access to backed up files when you're away from your computer. Virus protection: While
back-to-school virus protection generally consists...
Cybercrooks find ad networks and malware a profitable combo
08/21/2013 10:33 (Computerworld Blogs)
Cybercrooks find ad networks and malware a profitable combo Signing up with an ad network is often
the most profitable option for developers...
Hacker Reveals How Devastating A Cyberattack On The Stock Market Could Be
08/21/2013 09:24 (Yahoo! Canada Finance)
Analysis of Poison Ivy remote access tool
08/21/2013 05:21 (Help Net Security)
49 Cyber Warnings E-Magazine – August 2013 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide