Page 64 - index
P. 64







Hackers learn some new tricks at Def Con on avoiding surveillance

08/11/2014 20:37 (Tech Times)
...year's conference, Philip Polstra, associate professor of digital forensics at Bloomsburg University of Pennsylvania,
discussed low-tech solutions...



Two new Gameover Zeus variants in the wild
08/11/2014 16:27 (SC Magazine)

...closely on the Gameover Zeus code, which was being delivered through phishing emails claiming to be from legitimate
banks. That variant also used...



Android backdoor lurking inside legitimate apps

08/13/2014 04:33 (Help Net Security)
...applications from dubious sources and to stick to the official Google Play store. Malware does show up from time to time
there, but it is much better...



Magnitude exploit kit changes tack to make money from CryptoWall ransomware

08/13/2014 03:38 (Computerworld Malaysia)
...Blackhole demise signal end of exploit kit era? The Russian Magnitude malware exploit kit has moved on to the territory
vacated by the defunct...



Malware is less concerned about virtual machines

08/12/2014 19:55 (ComputerWorld)

Malware is less concerned about virtual machines Symantec finds most malware doesn't quit if it runs on VM, which used to
be a sign it was being...



Standardizing complaints, sharing cyber info and tracking Ebola

08/12/2014 17:14 (Federal Computer Week)
...communication. One participant was quoted in the report on DHS' Enhanced Cybersecurity Services program as saying
that "the threat indicators provided were...



Silicon Valley is becoming bigger player in Washington
08/12/2014 16:53 (Centre Daily Times)
64 Cyber Warnings E-Magazine – August 2014 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   59   60   61   62   63   64   65   66   67   68   69