Page 88 - index
P. 88







BLOG: Wolf in sheep's clothing at Black Hat: Getting pwn'd by innocent looking devices

08/02/2013 02:54 (Computer World Singapore)

...looking devices A trio of researchers presented "Mactans: Injecting Malware into iOS Devices via
Malicious Chargers" at Black Hat, demonstrating...





Military Bid for Next Stuxnet Confronts Hacker Resistance

08/02/2013 00:26 (Bloomberg)

Military Bid for Next Stuxnet Confronts Hacker Resistance U.S. military and intelligence officials make a
pilgrimage each year to Las Vegas,




FireEye introduces global partner program


08/02/2013 00:17 (Computer World Singapore)

...protect their customers' critical data, intellectual property, and networks against advanced malware,
zero-day, and targeted APT attacks," he said.




Black Hat: Compromising Wireless Devices

08/01/2013 20:25 (Isssource.com)

...by an attacker, said researcher Carlos Mario Penagos of IOActive, a computer security firm, who
teamed with Lucas Apa, who gave a talk entitled,





Black Hat: ICS SCADA Honeypot Finds Threats

08/01/2013 19:55 (Isssource.com)

...system One particular attack came from China, and it started with a spear phishing scheme, Wilhoit
said. He received a bogus email full of bad...




Phone carriers move quickly to fix SIM card hack

08/01/2013 18:07 (CBS 6 WTVR)


88 Cyber Warnings E-Magazine – August 2013 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide
   83   84   85   86   87   88   89   90   91   92   93