Page 64 - index
P. 64
Dalai Lama’s Website Compromised and Serving Malware
08/14/2013 04:47 (Infosecurity)
...has been attacking Tibetan separatists and sites, through both waterhole and spear phishing, since at
least 2011. In this current attack, he...
GCHQ Launches Twin-Track Approach to Cyber Incident Response Scheme
08/14/2013 04:03 (Infosecurity)
...Response Scheme Following a pilot project aimed at providing UK government and business with an
effective cyber incident response capability,
Kaspersky updates its security solutions for home users
08/14/2013 03:55 (Help Net Security)
...scan of files and applications running on the computer to identify malware that may hide deep within
individual components of each program. Kaspersky...
Consumers still reluctant to spend on mobile security, says Gartner
08/14/2013 02:49 (Computerworld Malaysia)
...left off Windows as much for regulatory reasons as practicality. If mobile malware expands to become
a major issue on Android, say, Google will...
BLOG: Anonymous is not anonymous
08/14/2013 02:33 (Computer World Singapore)
...upstream logs, can be used to identify you. Ask nearly any computer security criminal charged with a
felony. Some clever folks think they can...
Cyber attack danger grows [Boston Herald]
64 Cyber Warnings E-Magazine – August 2013 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide