Page 64 - index
P. 64










Dalai Lama’s Website Compromised and Serving Malware

08/14/2013 04:47 (Infosecurity)

...has been attacking Tibetan separatists and sites, through both waterhole and spear phishing, since at
least 2011. In this current attack, he...





GCHQ Launches Twin-Track Approach to Cyber Incident Response Scheme

08/14/2013 04:03 (Infosecurity)

...Response Scheme Following a pilot project aimed at providing UK government and business with an
effective cyber incident response capability,





Kaspersky updates its security solutions for home users

08/14/2013 03:55 (Help Net Security)

...scan of files and applications running on the computer to identify malware that may hide deep within
individual components of each program. Kaspersky...




Consumers still reluctant to spend on mobile security, says Gartner

08/14/2013 02:49 (Computerworld Malaysia)

...left off Windows as much for regulatory reasons as practicality. If mobile malware expands to become
a major issue on Android, say, Google will...





BLOG: Anonymous is not anonymous

08/14/2013 02:33 (Computer World Singapore)

...upstream logs, can be used to identify you. Ask nearly any computer security criminal charged with a
felony. Some clever folks think they can...




Cyber attack danger grows [Boston Herald]


64 Cyber Warnings E-Magazine – August 2013 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide
   59   60   61   62   63   64   65   66   67   68   69