Page 91 - index
P. 91







Trainee cyber-criminals wanted to help solve skills shortage
http://phys.org/news/2014-12-trainee-cyber-criminals-skills-shortage.html

Likely DOD pick helped drive Cyber Command buildup
http://thehill.com/policy/cybersecurity/225780-likely-dod-pick-helped-drive-cyber-command-
expansion

Cyber Threats to Increase in Scope and Complexity in the New Year as Black Hat Hackers
Become More Sophisticated, According to Fortinet 2015 Threat Predictions
http://www.broadwayworld.com/bwwgeeks/article/Cyber-Threats-to-Increase-in-Scope-and-
Complexity-in-the-New-Year-as-Black-Hat-Hackers-Become-More-Sophisticated-According-to-
Fortinet-2015-Threat-Predictions-20141203

Making the business case for cybersecurity
http://www.federaltimes.com/article/20141201/CYBER/312010020/Making-business-case-
cybersecurity

For China, Cybersecurity Is Part of Strategy for Protecting the Communist Party
http://sinosphere.blogs.nytimes.com/2014/12/03/for-china-cybersecurity-is-part-of-strategy-for-
protecting-the-communist-party/?_r=0


This Guy's Hacked Hearing Aids Let Him Listen to Wi-Fi Networks
http://www.wired.com/2014/12/guys-hacked-hearing-aids-let-listen-wi-fi-networks/


Justice Department Plans New Cybercrime Team
http://www.npr.org/2014/12/04/368351872/justice-department-plans-new-cybercrime-team

Digital Forensics Can Use Facebook to Solve Cases

http://www.baselinemag.com/security/digital-forensics-can-use-facebook-to-solve-cases.html

Did North Korea Really Hack Sony?
https://www.bloomberg.com/politics/features/2014-12-04/did-north-korea-hack-sony-theories-
on-sony-hacking

Inside the "wiper" malware that brought Sony Pictures to its knees

http://arstechnica.com/security/2014/12/inside-the-wiper-malware-that-brought-sony-pictures-to-
its-knees/

The Real Cost of Cyber Incidents, According To Insurers
http://www.darkreading.com/the-real-cost-of-cyber-incidents-according-to-insurers/d/d-
id/1317851

Bank-funded cyber info sharing software released

91 Cyber Warnings E-Magazine – December 2014 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   86   87   88   89   90   91   92   93   94   95   96