Page 57 - index
P. 57
Google defends child porn tip-offs to police
08/05/2014 02:53 (Yahoo! News)
...caught," blogged John Hawes, chief of operations at Virus Bulletin, a cyber security consultancy. "However, there will of
course be some who see it...
How to recognise the cyber insider threat
08/05/2014 00:11 (Computerworld Malaysia)
How to recognise the cyber insider threat If people start accessing systems or the data in them more often, you may have a
problem. If people...
How Malware Writers Cheat AV Zero-Day Detection
08/04/2014 15:20 (Dark Reading)
How Malware Writers Cheat AV Zero-Day Detection A researcher reverse engineers AVG's code emulation engine after
easily bypassing other major...
Cyber Security Challenge UK competition seeks sleuths to crack encrypted hard drive
08/04/2014 14:51 (Sophos Blog)
Cyber Security Challenge UK competition seeks sleuths to crack encrypted hard drive Sophos is calling on members of the
UK public to turn cyber...
Stealthy malware 'Poweliks' resides only in system registry
08/04/2014 07:47 (Computerworld)
Stealthy malware 'Poweliks' resides only in system registry The malware is persistent across system reboots, despite not
having any files on...
Chrysler, Nissan looking into claims their cars 'most hackable'
08/06/2014 09:13 (CNBC)
Chrysler and Nissan said they are reviewing a report by well-known cyber security experts that rates their vehicles among
the three "most hackable"
Russian Gang ‘CyberVor’ Steals More than 1 Billion Passwords
08/06/2014 08:50 (CruxialCIO)
57 Cyber Warnings E-Magazine – August 2014 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide