Page 84 - index
P. 84
...we can." The javascript exploit seems designed to download further malware. Chatter on Reddit
suggests that a primary motive might be to find...
Social Media Alerts Increasing
08/05/2013 11:12 (Examiner.com - Texas)
...Masters in CyberSecurity Management program that teaches skills needed to deter cyber crime within
organizations. When we can finally say that we...
Tor users targeted with spyware following anonymous Web-host shutdown
08/05/2013 07:34 (Help Net Security)
...Tor, the more anonymous it is. Researchers that have analyzed the malware delivered to the users are
pretty sure that it has been created by...
Apple fixing phone-charger hacking
08/05/2013 05:35 (The Columbus Dispatch)
...iPhone into a custom-built charger they equipped with a tiny Linux computer that was programmed to
attack iOS devices. They said it cost about...
The rise and rise of BYOD
08/05/2013 05:15 (Computer World Singapore)
...danger is when staff-owned devices are mislaid or affected by malware, potentially exposing any
confidential data that is stored on the device...
Android one-click Google authentication poses corporate risk
08/05/2013 04:40 (ComputerworldUK.com)
...antivirus products from well known vendors didn't detect the app as malware either, but one privacy
advisor application did list the rogue app as...
Insurers still challenged to combat fraud: Ovum
84 Cyber Warnings E-Magazine – August 2013 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide