Page 106 - index
P. 106







NightHunter's preferred method of infecting target computers appears to be via phishing emails, Navaraj says. These
emails are sent to personnel in the...



U.S. malware share rising, Amazon service No.1 in hosting it

07/15/2014 12:11 (Network World)

U.S. malware share rising, Amazon service No.1 in hosting it Solutionary s Top 10 list also includes Google and Akamai. In
its quarterly report...



Fake Flash Player steals credit card information

07/18/2014 09:47 (Help Net Security)
...targeting Android users, warn antivirus experts from Dr. Web. The malware is currently targeting Russian users, but it can
easily be modified to...



Are endpoints the most vulnerable part of the network?
07/18/2014 03:43 (Help Net Security)

...protections in place even though 74% consider endpoints to be most vulnerable to a cyber-attack, and 76% say the
number of endpoints is rising. Only...



Russian espionage malware adapted for ransomware scams

07/17/2014 16:57 (SC Magazine)
...that researchers saw the malware being spread via drive-by download and phishing schemes. The firm has yet to link the
malware to a specific...



Civil service reform: Start with IT/cyber

07/17/2014 16:56 (Federal Times)
...to NSA, it leaves their Central Maryland neighbors, DISA and the Defense Cyber Crimes Center, on the outside looking
in. That s problematic.



Government-Grade Stealth Malware In Hands Of Criminals

07/17/2014 16:52 (Dark Reading)
...Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization,
identity management,

106 Cyber Warnings E-Magazine – July 2014 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   101   102   103   104   105   106   107   108   109   110   111