Page 108 - index
P. 108
07/16/2014 12:35 (Computerworld)
...cost of the awareness program. So for example, as every successful phishing attack has a cost associated with it, if you
are reducing phishing...
Can New York’s BitLicense Prevent Another Mt. Gox Catastrophe?
07/21/2014 09:35 (BayPay Members Blogs)
...outlines: Each Licensee shall establish and maintain an effective cyber security program to ensure the availability and
functionality of the...
Significant Deficiencies Found in Treasury’s Computer Security
07/21/2014 09:13 (Nextgov)
Significant Deficiencies Found in Treasury s Computer Security Weaknesses in Treasury Department computer systems
that track federal debt are...
Funny Facebook video scam leaves unamusing Trojan
07/21/2014 07:29 (Help Net Security)
...wake on users computers, according to research by Bitdefender. The malware, believed to originate from Albania, can
access a large amount of...
Wanted: hackers to help the EFF make Wi-Fi routers more secure
07/21/2014 07:03 (The Guardian)
...firewall is switched on as this will prevent users visiting any untrusted, dangerous websites. How to protect yourself
from phishing Tom Brewster
News: The dangers of social media
07/20/2014 21:18 (DVIDS)
...want their information (made public), said Cureton, the cyber security chief for Marine Corps Installations Pacific-Marine
Corps Base Camp Butler.
Indentifying cyber-criminals is No. 1 challenge, high-profile lawyer says
07/19/2014 21:00 (Tribune-Review (AP))
108 Cyber Warnings E-Magazine – July 2014 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide