Page 55 - index
P. 55
08/19/2013 11:02 (Help Net Security)
...RSA researchers, this new variant is able to download additional downloader malware onto the
target's computer. After that, it performs search...
Lucrative business: cybercrime-as-a-service
08/19/2013 04:51 (Help Net Security)
...act, criminals offer services that alert hackers as soon as a computer application becomes vulnerable
to an attack. This is called the zero-day...
Internet of Things expands security threat landscape: Gartner
08/19/2013 04:24 (Computer World Singapore)
...vulnerabilities with such systems. Another barrier has been outdated government regulations that
make it more difficult to make security changes,
US Dept. of Energy reports second security breach
08/19/2013 04:04 (ComputerworldUK.com)
...because they can use that information to impersonate those employees in spear phishing attacks or
compromise their access credentials," Tom Cross,
In the cloud, an often hazy grasp of security risks
08/19/2013 02:33 (Kentucky.com)
...data. But few let potential or current clients test physical or digital security. The clients are left feeling
insecure, although they may be...
Winning the War on Cybercrime: The Four Keys to Holistic Fraud Prevention
08/19/2013 02:19 (BankDirector.com)
In the latest real-time account takeover scheme, cybercriminals use malware to steal user credentials at
login, block users from logging into...
55 Cyber Warnings E-Magazine – August 2013 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide