Page 65 - index
P. 65
...the application's request as it travels over an insecure wireless network or a compromised network gateway and serve
back a malicious JAR file,
Old was new again in security in 2013: Blue Coat
12/10/2013 21:04 (Computer World Singapore)
...sophisticated in 2014, particularly with the upsurge of ransomware, a type of malware holds a company's IT and corporate
data hostage. Andresen has seen...
Firms Average 9 Targeted Attacks a Year
12/10/2013 19:34 (Isssource.com)
...report said. Cyberespionage actors are getting stealthier, encrypting their malware to evade detection, for example, said
George Tubin, senior...
Botnet Steals 2 Million Logins
12/10/2013 19:03 (Isssource.com)
...and secure shell account details. It wasn t clear what kind of malware infected victims computers and sent the information
to the command-and-control...
Smarter, shadier and stealthier cyber crime forces industry to dramatic change
12/10/2013 18:31 (Computer World Australia)
...threat report highlights new security concerns ranging from stealthy malware tools that offer dynamic camouflage and
provide attackers with long-term...
EU Cyber Group Guide to Mitigate Attacks
12/10/2013 18:25 (Isssource.com)
...distribution, water treatment, transportation, as well as chemical, government, defense and food processes. Oftentimes,
ICS are easy targets...
Ransomware Survives Takedown
12/10/2013 17:30 (Isssource.com)
...to take down command and control nodes associated with the CryptoLocker malware was unsuccessful. An attempt to
take down command and control...
65 Cyber Warnings E-Magazine – December 2013 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide