Page 54 - index
P. 54
How effective are Android AV solutions?
12/17/2013 10:49 (Help Net Security)
...effective are Android AV solutions? As the onslaught of Android malware continues, the recently released testing results
by independent IT-security...
Prison Time for Hacker
12/17/2013 10:46 (Isssource.com)
...Computerworld. Miller, previously convicted in 2004 of involvement in writing malware, pled guilty to conspiracy and
computer fraud on August 26,
Patched Hole could be a Perfect Cyber Crime
12/17/2013 09:44 (Isssource.com)
...be the perfect cyber crime. The attack doesn t involve any malware payload security professionals can reverse engineer,
no file hash to trace,
Mozilla blocks rogue add-on that made computers scan sites for flaws
12/17/2013 08:53 (Help Net Security)
...use the rogue add-on. It's possible that the malware came bundled with other downloaded software, or that users were
tricked into downloading...
Report: FEC system hacked during shutdown
12/17/2013 08:16 (The Hill - Blog)
...an independent audit last year that warned of a vulnerable information technology system. Without adopting and
implementing National Institute...
How human behaviour affects malware and defense measures
12/17/2013 05:25 (Help Net Security)
How human behaviour affects malware and defense measures Installing computer security software, updating applications
regularly and making sure...
Attackers exploited ColdFusion vulnerability to install Microsoft IIS malware
12/17/2013 03:55 (ComputerworldUK.com)
54 Cyber Warnings E-Magazine – December 2013 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide