Page 62 - index
P. 62
...certificates and improve RDP authentication Microsoft released two optional security updates
Tuesday to block digital certificates that use the...
USENIX: Researchers propose security that adapts to combat malware that morphs
08/14/2013 23:14 (Computerworld Malaysia)
USENIX: Researchers propose security that adapts to combat malware that morphs Software seeks and
blocks bot calls to command-and-control servers.
Corporate data: the target for mobile malware
08/14/2013 21:52 (Computer World Australia)
Corporate data: the target for mobile malware If you were ever in any doubt about the need for a
comprehensive and sophisticated mobile device...
Hacking the Lightbulb: Malware Can Produce a Sustained Blackout
08/14/2013 17:49 (Infosecurity)
Hacking the Lightbulb: Malware Can Produce a Sustained Blackout Considering the hyper-connected
world that we live in, a good security mantra...
Accused Hacker Pleads Not Guilty
08/14/2013 17:17 (Isssource.com)
...trading platform and the hackers weren t able to get any money from the attack. The cyber attacks
began in 2005 and lasted until the summer of 2012,
Malware Redirects to Exploit Kit Site
08/14/2013 17:17 (Isssource.com)
Malware Redirects to Exploit Kit Site The Counter.php strain of malware is now redirecting users to
websites serving up the Styx exploit kit.
62 Cyber Warnings E-Magazine – August 2013 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide