Page 74 - index
P. 74







...by Gregg Keizer on Computerworld.com. Read more about malware and vulnerabilities in
Computerworld's Malware and Vulnerabilities Topic Center.




Go Phish: Swimming the Troubled Waters of Information Security Online

08/08/2013 14:59 (DashBurst)


...case, though. Often, cyber criminals use what's called spear-phishing attacks that contain information
that appears authentic, perhaps from an...




Latvia puts extradition of suspected hacker to U.S. on hold

08/08/2013 11:44 (Yahoo! News Canada)





Linux banking Trojan offered for sale

08/08/2013 10:53 (Help Net Security)

...Trojan offered for sale Windows users are by far the most targeted ones by malware-wielding
criminals, but that doesn't mean that OS X and Linux...




Tools To Hack Android Phones Are Getting Easier To Use

08/08/2013 08:20 (Forbes)

...Are Getting Easier To Use Security researchers have long maintained that malware is a problem on
Android, the Google operating system that s...





Patch Tuesday: Microsoft has critical fixes for Exchange Server

08/08/2013 07:49 (Computer World Australia)

...user doesn't interact with the attack. Self-propagating malware and code execution without warnings
or prompts are exploits that fit this category.




Google Android roundup: Why did JBQ leave AOSP?


74 Cyber Warnings E-Magazine – August 2013 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide
   69   70   71   72   73   74   75   76   77   78   79