Page 96 - index
P. 96
Sony uses hacker techniques to fight back over stolen data
http://www.theguardian.com/technology/2014/dec/11/sony-uses-hacker-techniques-to-fight-
back-over-stolen-data
Senate's torture report will provoke hacktivist reprisals
http://www.computerworld.com/article/2857784/senates-torture-report-will-provoke-hacktivist-
reprisals.html
Big Data analytics to the rescue
http://www.net-security.org/article.php?id=2181
Streamlining the Digital Forensic Workflow: Part 3
http://www.dfinews.com/articles/2014/12/streamlining-digital-forensic-workflow-part-3
Young hacker trains cops in tackling cyber-crime cases in Punjab
http://zeenews.india.com/news/punjab/young-hacker-trains-cops-in-tackling-cyber-crime-cases-
in-punjab_1514558.html
FBI: Iran Hackers May Target U.S. Energy, Defense Firms
http://recode.net/2014/12/13/iran-hackers-may-target-u-s-energy-defense-firms-fbi-warns/
Ransomware criminals turn to virus technique to spread infection
http://news.techworld.com/security/3590984/ransomware-criminals-turn-to-virus-technique-to-
spread-infection/
Voice Biometrics Improve Transaction Monitoring Fraud Detection
http://www.banktech.com/security/voice-biometrics-improve-transaction-monitoring-fraud-
detection/a/d-id/1318145
Cyber breakthrough eludes lawmakers
http://thehill.com/policy/cybersecurity/227017-cyber-breakthrough-eludes-lawmakers
Agencies Mold Regulations around 'Voluntary' Cyber Standards
http://www.nextgov.com/cybersecurity/2014/12/agencies-mold-regulations-around-voluntary-
cyber-standards/101217/
Sony hacked in February, knew about security flaws before data leak
http://www.networkworld.com/article/2859473/microsoft-subnet/sony-hacked-in-feb-knew-about-
huge-security-flaws-before-cybersecurity-train-wreck.html
AP source: US probe links NKorea to Sony hacking
http://www.mysanantonio.com/business/technology/article/AP-source-US-probe-links-NKorea-
to-Sony-hacking-5964004.php
96 Cyber Warnings E-Magazine – December 2014 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide