Page 60 - index
P. 60
08/15/2013 11:05 (CBS Atlanta 46)
...devices safe. These apps protect you against online threats like viruses and malware. They also help
you, if your phone is lost or stolen to...
Why it's so easy to hack your home
08/15/2013 10:07 (NewsGrio)
...both read the reports from a variety of testing agencies. Computer security has resisted these
mechanisms, both because the industry changes...
IBM to Acquire Financial Malware Defense Firm Trusteer
08/15/2013 09:48 (Infosecurity)
IBM to Acquire Financial Malware Defense Firm Trusteer IBM has announced a definitive agreement to
buy the Israeli firm Trusteer, which specializes...
Domains That Are Typos of Other Domains
08/15/2013 09:16 (CERT)
...distinguishes between a match due to malicious content or attempts at phishing. The following table
shows the results for Google Safe Browsing...
IBM acquires Trusteer
08/15/2013 05:02 (Help Net Security)
...and developers to focus on mobile and application security, advanced threat, malware, counter-fraud,
and financial crimes. This lab is an addition...
New York Post hit by pro-Assad hackers
08/15/2013 02:35 (Computerworld Malaysia)
...company told customers that an employee's email account was compromised "in a phishing attack."
"As a result, our Twitter and [Facebook] accounts...
60 Cyber Warnings E-Magazine – August 2013 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide