Page 108 - index
P. 108







07/16/2014 12:35 (Computerworld)
...cost of the awareness program. So for example, as every successful phishing attack has a cost associated with it, if you
are reducing phishing...



Can New York’s BitLicense Prevent Another Mt. Gox Catastrophe?

07/21/2014 09:35 (BayPay Members Blogs)
...outlines: Each Licensee shall establish and maintain an effective cyber security program to ensure the availability and
functionality of the...



Significant Deficiencies Found in Treasury’s Computer Security

07/21/2014 09:13 (Nextgov)
Significant Deficiencies Found in Treasury s Computer Security Weaknesses in Treasury Department computer systems
that track federal debt are...



Funny Facebook video scam leaves unamusing Trojan

07/21/2014 07:29 (Help Net Security)
...wake on users computers, according to research by Bitdefender. The malware, believed to originate from Albania, can
access a large amount of...



Wanted: hackers to help the EFF make Wi-Fi routers more secure

07/21/2014 07:03 (The Guardian)

...firewall is switched on as this will prevent users visiting any untrusted, dangerous websites. How to protect yourself
from phishing Tom Brewster



News: The dangers of social media

07/20/2014 21:18 (DVIDS)
...want their information (made public), said Cureton, the cyber security chief for Marine Corps Installations Pacific-Marine
Corps Base Camp Butler.



Indentifying cyber-criminals is No. 1 challenge, high-profile lawyer says
07/19/2014 21:00 (Tribune-Review (AP))



108 Cyber Warnings E-Magazine – July 2014 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   103   104   105   106   107   108   109   110   111   112   113