Page 62 - index
P. 62







...certificates and improve RDP authentication Microsoft released two optional security updates
Tuesday to block digital certificates that use the...




USENIX: Researchers propose security that adapts to combat malware that morphs

08/14/2013 23:14 (Computerworld Malaysia)


USENIX: Researchers propose security that adapts to combat malware that morphs Software seeks and
blocks bot calls to command-and-control servers.




Corporate data: the target for mobile malware

08/14/2013 21:52 (Computer World Australia)

Corporate data: the target for mobile malware If you were ever in any doubt about the need for a
comprehensive and sophisticated mobile device...




Hacking the Lightbulb: Malware Can Produce a Sustained Blackout


08/14/2013 17:49 (Infosecurity)

Hacking the Lightbulb: Malware Can Produce a Sustained Blackout Considering the hyper-connected
world that we live in, a good security mantra...




Accused Hacker Pleads Not Guilty

08/14/2013 17:17 (Isssource.com)


...trading platform and the hackers weren t able to get any money from the attack. The cyber attacks
began in 2005 and lasted until the summer of 2012,




Malware Redirects to Exploit Kit Site

08/14/2013 17:17 (Isssource.com)

Malware Redirects to Exploit Kit Site The Counter.php strain of malware is now redirecting users to
websites serving up the Styx exploit kit.



62 Cyber Warnings E-Magazine – August 2013 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide
   57   58   59   60   61   62   63   64   65   66   67