Page 45 - index
P. 45







Pentagon’s cyber arm poised to expand role

12/23/2013 15:30 (Politico)
Pentagon s cyber arm poised to expand role The U.S. military s Cyber Command is about to receive the digital equivalent
of faster ships and stronger...




Our nation's growing cyber crisis
12/23/2013 15:00 (The Hill - Blog)

...credit card fraud, Trojans, zero-day attacks, worms, viruses, malware, and an assortment of other online threats. Such a
growing list of unseen...




Is DHS growing into cyber mission?

12/23/2013 13:08 (Federal Times)
Is DHS growing into cyber mission? From the beginning of the Homeland Security Department, there has been vigorous
debate about its cybersecurity...




Could a $150,000 enforced bug bounty put zero-day exploit brokers out of business?

12/23/2013 12:40 (Computerworld Blogs)
...by exploit vendors to governments and are also available in the cybercrime underground. A half dozen exploit brokers
have the capacity to offer...




After Takeover, Botnet Abandoned

12/23/2013 10:43 (Isssource.com)

...their investigation. Those who fear their computers have ZeroAccess malware should review the instructions provided by
Microsoft on how to clean...




The top 10 tech stories of 2013

12/23/2013 09:48 (IT Manager Daily)
...top 10 in our year in review. 10. 3 ways malware is bypassing companies antivirus software Most companies are using
antivirus software, firewalls...



Lessons learned in password security 2013

12/23/2013 03:15 (Help Net Security)
45 Cyber Warnings E-Magazine – December 2013 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide
   40   41   42   43   44   45   46   47   48   49   50