Page 75 - index
P. 75
12/03/2013 21:22 (Computer World Singapore)
That way, a malicious app on the phone won't have the opportunity to compromise the corporate network. "It's not likely (to
happen), but there...
Worm may create an Internet of Harmful Things, says Symantec (Take note, Amazon)
12/03/2013 21:11 (Computerworld Malaysia)
...will increase, by multitudes, the number of things that can be hacked and attacked. Security firm Symantec says it has
found a Linux worm aimed...
A taste of the horrible things to come for Windows XP
12/03/2013 19:33 (Yahoo! News)
...even warned users of the imminent tsunami of viruses and other malware that will inevitably wash over XP stragglers
once it stops issuing updates...
JPEGs on the Attack
12/03/2013 17:55 (Isssource.com)
...itself. These files also contain details about hostnames in the compromised network and the process names of several
antivirus products. Some...
Ransomware Uses Webcam in Scam
12/03/2013 17:38 (Isssource.com)
...people by secretly taking their picture with their webcam. The malware disables your computer then claims to have
detected viruses and demands...
Cyber-security puzzle: Who is sending Internet traffic on long, strange trips?
12/03/2013 13:20 (Yahoo! News)
In each case, the intentional diversion sent the company or government data stream cascading overseas to a distant
location then quickly on to...
Software vulnerabilities are the top cause of internal data security issues for business
12/03/2013 09:31 (Technology News)
75 Cyber Warnings E-Magazine – December 2013 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide