Page 74 - index
P. 74
...by Gregg Keizer on Computerworld.com. Read more about malware and vulnerabilities in
Computerworld's Malware and Vulnerabilities Topic Center.
Go Phish: Swimming the Troubled Waters of Information Security Online
08/08/2013 14:59 (DashBurst)
...case, though. Often, cyber criminals use what's called spear-phishing attacks that contain information
that appears authentic, perhaps from an...
Latvia puts extradition of suspected hacker to U.S. on hold
08/08/2013 11:44 (Yahoo! News Canada)
Linux banking Trojan offered for sale
08/08/2013 10:53 (Help Net Security)
...Trojan offered for sale Windows users are by far the most targeted ones by malware-wielding
criminals, but that doesn't mean that OS X and Linux...
Tools To Hack Android Phones Are Getting Easier To Use
08/08/2013 08:20 (Forbes)
...Are Getting Easier To Use Security researchers have long maintained that malware is a problem on
Android, the Google operating system that s...
Patch Tuesday: Microsoft has critical fixes for Exchange Server
08/08/2013 07:49 (Computer World Australia)
...user doesn't interact with the attack. Self-propagating malware and code execution without warnings
or prompts are exploits that fit this category.
Google Android roundup: Why did JBQ leave AOSP?
74 Cyber Warnings E-Magazine – August 2013 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide