Page 87 - index
P. 87
08/02/2013 15:49 (Isssource.com)
...of Control By Gregory Hale One of the many things Stuxnet taught the manufacturing automation
world was operators cannot always believe what...
Beijing hacking combine exposed
08/02/2013 06:23 (USA Today)
...that helps fingerprint the handy work of one of the top two cyber espionage gangs operating out of
China. Dell SecureWorks calls them the Beijing...
Cybergangs alter infrastructure abuse techniques
08/02/2013 05:00 (Help Net Security)
Cybergangs alter infrastructure abuse techniques Phishing attack frequency declined 20 percent from
Q4 2012 to Q1 2013, due to a precipitous...
Guest View: Profiling four types of hackers
08/02/2013 04:52 (Computerworld Malaysia)
Guest View: Profiling four types of hackers For the security industry, it is important to know the
different types of hackers Hacktivists, Cyber...
Researchers demo exploits that bypass Windows 8 Secure Boot
08/02/2013 03:02 (Computerworld Malaysia)
...during the boot sequence. It was designed specifically to prevent malware like bootkits from
compromising the boot process. According to the...
Understanding incident response: 5 tips to make IR work for you
08/02/2013 02:55 (Computer World Singapore)
...Hat will focus on trends and the latest technological advances for those who attack the network and
those who defend it, there isn't much on...
87 Cyber Warnings E-Magazine – August 2013 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide