Page 50 - index
P. 50







...some elements of IT security operational responsibility (including malware detection, event analysis and control operation)
increasingly being...




Five resolutions to help IT pros get ready for 2014

12/19/2013 02:45 (Help Net Security)

...some elements of IT security operational responsibility (including malware detection, event analysis and control operation)
increasingly being...




Commentary: If ‘password’ is your password, you’re toast

12/19/2013 02:21 (The Daily Record)
Of course, password vigilance will not save you from a malevolent keylogger, the keystroke-tracking program that enabled
the recent thefts. But...



Surveillance review board recommends U.S. shift to cyber defense

12/19/2013 00:52 (Yahoo! News)

...in encryption systems that "guard global commerce." Instead, the government should work to promote strong encryption,
and its use "should be...




Criminal gangs offer large scale Malware-as-a-Service: Websense

12/18/2013 22:08 (Computer World Singapore)
Criminal gangs offer large scale Malware-as-a-Service: Websense The arrest of masterhacker 'Paunch' has led to
cybercriminals to revert to less...



Cybercrims will use ransomware to target businesses: McAfee


12/18/2013 22:01 (Computerworld Malaysia)
...target businesses: McAfee Cybercriminals will increasingly use ransomware, malware and hacktivism over the next year
to move further into the...




New DDoS malware targets Linux and Windows systems

12/18/2013 21:56 (Computerworld Malaysia)
New DDoS malware targets Linux and Windows systems Attackers are compromising Linux and Windows systems to install
a new malware program designed...

50 Cyber Warnings E-Magazine – December 2013 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide
   45   46   47   48   49   50   51   52   53   54   55