Page 65 - index
P. 65







...the application's request as it travels over an insecure wireless network or a compromised network gateway and serve
back a malicious JAR file,




Old was new again in security in 2013: Blue Coat

12/10/2013 21:04 (Computer World Singapore)

...sophisticated in 2014, particularly with the upsurge of ransomware, a type of malware holds a company's IT and corporate
data hostage. Andresen has seen...




Firms Average 9 Targeted Attacks a Year

12/10/2013 19:34 (Isssource.com)
...report said. Cyberespionage actors are getting stealthier, encrypting their malware to evade detection, for example, said
George Tubin, senior...



Botnet Steals 2 Million Logins

12/10/2013 19:03 (Isssource.com)

...and secure shell account details. It wasn t clear what kind of malware infected victims computers and sent the information
to the command-and-control...




Smarter, shadier and stealthier cyber crime forces industry to dramatic change

12/10/2013 18:31 (Computer World Australia)
...threat report highlights new security concerns ranging from stealthy malware tools that offer dynamic camouflage and
provide attackers with long-term...



EU Cyber Group Guide to Mitigate Attacks


12/10/2013 18:25 (Isssource.com)
...distribution, water treatment, transportation, as well as chemical, government, defense and food processes. Oftentimes,
ICS are easy targets...




Ransomware Survives Takedown

12/10/2013 17:30 (Isssource.com)
...to take down command and control nodes associated with the CryptoLocker malware was unsuccessful. An attempt to
take down command and control...

65 Cyber Warnings E-Magazine – December 2013 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide
   60   61   62   63   64   65   66   67   68   69   70