Page 88 - index
P. 88
BLOG: Wolf in sheep's clothing at Black Hat: Getting pwn'd by innocent looking devices
08/02/2013 02:54 (Computer World Singapore)
...looking devices A trio of researchers presented "Mactans: Injecting Malware into iOS Devices via
Malicious Chargers" at Black Hat, demonstrating...
Military Bid for Next Stuxnet Confronts Hacker Resistance
08/02/2013 00:26 (Bloomberg)
Military Bid for Next Stuxnet Confronts Hacker Resistance U.S. military and intelligence officials make a
pilgrimage each year to Las Vegas,
FireEye introduces global partner program
08/02/2013 00:17 (Computer World Singapore)
...protect their customers' critical data, intellectual property, and networks against advanced malware,
zero-day, and targeted APT attacks," he said.
Black Hat: Compromising Wireless Devices
08/01/2013 20:25 (Isssource.com)
...by an attacker, said researcher Carlos Mario Penagos of IOActive, a computer security firm, who
teamed with Lucas Apa, who gave a talk entitled,
Black Hat: ICS SCADA Honeypot Finds Threats
08/01/2013 19:55 (Isssource.com)
...system One particular attack came from China, and it started with a spear phishing scheme, Wilhoit
said. He received a bogus email full of bad...
Phone carriers move quickly to fix SIM card hack
08/01/2013 18:07 (CBS 6 WTVR)
88 Cyber Warnings E-Magazine – August 2013 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide