Page 50 - index
P. 50
...some elements of IT security operational responsibility (including malware detection, event analysis and control operation)
increasingly being...
Five resolutions to help IT pros get ready for 2014
12/19/2013 02:45 (Help Net Security)
...some elements of IT security operational responsibility (including malware detection, event analysis and control operation)
increasingly being...
Commentary: If ‘password’ is your password, you’re toast
12/19/2013 02:21 (The Daily Record)
Of course, password vigilance will not save you from a malevolent keylogger, the keystroke-tracking program that enabled
the recent thefts. But...
Surveillance review board recommends U.S. shift to cyber defense
12/19/2013 00:52 (Yahoo! News)
...in encryption systems that "guard global commerce." Instead, the government should work to promote strong encryption,
and its use "should be...
Criminal gangs offer large scale Malware-as-a-Service: Websense
12/18/2013 22:08 (Computer World Singapore)
Criminal gangs offer large scale Malware-as-a-Service: Websense The arrest of masterhacker 'Paunch' has led to
cybercriminals to revert to less...
Cybercrims will use ransomware to target businesses: McAfee
12/18/2013 22:01 (Computerworld Malaysia)
...target businesses: McAfee Cybercriminals will increasingly use ransomware, malware and hacktivism over the next year
to move further into the...
New DDoS malware targets Linux and Windows systems
12/18/2013 21:56 (Computerworld Malaysia)
New DDoS malware targets Linux and Windows systems Attackers are compromising Linux and Windows systems to install
a new malware program designed...
50 Cyber Warnings E-Magazine – December 2013 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide