Page 56 - index
P. 56
Week in review: NSA privacy violations, key cloud computing trends, and building security culture
08/19/2013 00:54 (Help Net Security)
...one that definitely deserves some special attention. Exploring critical infrastructure security and
government cyber security Chris Folk is the...
"Jekyll" test attack sneaks through Apple App Store, wreaks havoc on iOS
08/18/2013 23:33 (Computerworld Malaysia)
...attacker. Acting like a software version of a Transformer robot, a malware test app sneaked through
Apple's review process disguised as a harmless...
XP Z: Microsoft scares Windows XP users straight with undead bug warning
08/18/2013 23:33 (Computerworld Malaysia)
...said. Reverse-engineering of patches is a common practice by both security researchers and cyber
criminals. Once a patch is released -- say for...
Blaster worm: Lessons learned a decade later
08/18/2013 23:29 (Computer World Singapore)
...2 huge problems: 2 Billion computers had been infected with a self-replicating virus (AKA 'worm') now
known as Blaster. The NE Power Outage was,
Zero day forever--move away from Windows XP, now
08/18/2013 23:10 (Computerworld Malaysia)
...Windows 8, Rains wrote. Windows XP was a prime target for malware, according to Microsoft. Rains
acknowledges that some protections in XP will...
Digital tools to help curb online eavesdropping
08/18/2013 15:31 (StarTribune.com)
56 Cyber Warnings E-Magazine – August 2013 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide