Page 91 - index
P. 91







07/31/2013 19:49 (Forbes)

Researchers Demonstrate How To Install iPhone Malware With A Malicious Charger Apple takes great
pains to protect its air-tight iOS app store...




The five hidden risks faced by technology companies


07/31/2013 14:28 (SecurityInfoWatch.com)

...programming. Likewise, E&O policies often exclude information security breaches and copyright
infringement on computer code. Companies should make...




What is the Syrian Electronic Army?

07/31/2013 14:17 (Infosecurity)


Onion, Reuters and many more. Largely these have been effected by spear-phishing and are designed to
disseminate pro-Assad propaganda to as wide...





Chrome, Firefox users targeted with account-hijacking plugins

07/31/2013 11:38 (Help Net Security)

...it, chat with friends, and so on. Interestingly enough, the offered malware is digitally signed. "It is not
yet clear if this signature was fraudulently...




New Warning on Citadel and Reveton Issued


07/31/2013 09:53 (Infosecurity)

...Reveton ransomware campaign. Reveton is the ransomware, and Citadel is the malware platform
used to deliver it. "Ransomware," said this week's...




Hackers steal identity info of 72,000 at U of Delaware

07/31/2013 08:37 (USA Today)

...steal identity info of 72,000 at U of Delaware Dealing with the computer security problem could cost
as much as $19 million, experts say. SHARECONNECTTWEETCOMMENTEMAILMORE...
91 Cyber Warnings E-Magazine – August 2013 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide
   86   87   88   89   90   91   92   93   94   95   96