Page 95 - index
P. 95
http://www.forensicmag.com/articles/2015/02/possible-put-digital-forensic-practice-grier-
technology
Desert Falcon Group Swooped on One Million Files
http://www.forensicmag.com/news/2015/02/desert-falcon-group-swooped-one-million-files
AccessData Launches Free 20-Day Trial Program for Digital Forensics Products
http://globenewswire.com/news-release/2015/02/18/707503/10120624/en/AccessData-
Launches-Free-20-Day-Trial-Program-for-Digital-Forensics-Products.html
Android malware spies on you even after phone is shut down
http://mashable.com/2015/02/19/android-malware-spies-shut-down/
Digging Deeper: Inside the forensics laboratory of officer who leads child pornography
investigations
http://www.kttc.com/story/28144772/2015/02/18/digging-deeper-inside-the-forensics-laboratory-
of-officer-who-leads-child-pornography-investigations
It's time for a National Cybersecurity Safety Board (NCSB) - Opinion
http://www.csoonline.com/article/2886326/security-awareness/it-s-time-for-a-national-
cybersecurity-safety-board-ncsb.html
Privacy & Cybercrime Use The Same Tools
http://www.informationweek.com/partner-perspectives/bitdefender/privacy-and-cybercrime-use-
the-same-tools/a/d-id/1319163
Drones, cybercrime among topics at annual AG meeting
http://legalnewsline.com/news/255013-drones-cybercrime-among-topics-at-annual-ag-meeting
Babar the Elephant: Another malware plague with a cute name
http://www.theregister.co.uk/2015/02/19/babar_french_cyberespionage/
The Company Behind Lenovo's Dangerous Superfish Tech Claims It's Under Attack
http://www.forbes.com/sites/thomasbrewster/2015/02/20/komodia-lenovo-superfish-ddos/
This one weird script continually crashes Android email
http://www.theregister.co.uk/2015/02/19/this_script_will_continually_crash_email_in_samsung_
4_minis/
Managing technology in an unmanageable world
http://thehill.com/blogs/congress-blog/technology/233126-managing-technology-in-an-
unmanageable-world
Officials: Cyber heist didn't hit US
95 Cyber Warnings E-Magazine – February 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide