Page 87 - index
P. 87







08/02/2013 15:49 (Isssource.com)

...of Control By Gregory Hale One of the many things Stuxnet taught the manufacturing automation
world was operators cannot always believe what...

Beijing hacking combine exposed

08/02/2013 06:23 (USA Today)


...that helps fingerprint the handy work of one of the top two cyber espionage gangs operating out of
China. Dell SecureWorks calls them the Beijing...




Cybergangs alter infrastructure abuse techniques

08/02/2013 05:00 (Help Net Security)

Cybergangs alter infrastructure abuse techniques Phishing attack frequency declined 20 percent from
Q4 2012 to Q1 2013, due to a precipitous...




Guest View: Profiling four types of hackers


08/02/2013 04:52 (Computerworld Malaysia)

Guest View: Profiling four types of hackers For the security industry, it is important to know the
different types of hackers Hacktivists, Cyber...




Researchers demo exploits that bypass Windows 8 Secure Boot

08/02/2013 03:02 (Computerworld Malaysia)


...during the boot sequence. It was designed specifically to prevent malware like bootkits from
compromising the boot process. According to the...




Understanding incident response: 5 tips to make IR work for you

08/02/2013 02:55 (Computer World Singapore)

...Hat will focus on trends and the latest technological advances for those who attack the network and
those who defend it, there isn't much on...



87 Cyber Warnings E-Magazine – August 2013 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide
   82   83   84   85   86   87   88   89   90   91   92