Page 94 - index
P. 94
No perfect way to protect data, NSA chief says
06/30/2014 06:36 (PilotOnline.com)
...contractor, can t be stolen again. But the Defense Department, of which the security agency and Cyber Command are a
part, made the same vow in 2010, after...
Bug in WordPress plugin allows unauthorized file upload
07/02/2014 07:29 (Help Net Security)
...website." The bug can be exploited to use vulnerable websites for phishing lures, sending spam, host malware, infecting
other customers (on a...
The 5 Biggest Cybersecurity Myths, Debunked
07/02/2014 06:47 (Wired)
...still fictionalized dangers on the cyber side. Myth #4: The Best (Cyber) Defense Is a Good (Cyber) Offense Senior
Pentagon leaders talk about how...
US privacy board says NSA Internet spying program is effective but worrying
07/02/2014 06:27 (Bangor Daily News)
...collection program has been an effective tool to enhance the country s security but some elements of the cyber-spying
raises privacy concerns,
Hackers Find Open Back Door to Power Grid With Renewables: Tech
07/02/2014 05:23 (Washington Post - Bloomberg)
...distribution system opens additional portals through which hackers can attack the grid, according
to computer security experts advising governments...
Legitimate No-IP users still affected by Microsoft's domain takeover
07/02/2014 05:13 (Help Net Security)
...by dynamic DNS service No-IP on Monday, it disrupted malware networks used by cybercriminals to infect victims with
NJrat and NJw0rm backdoors,
Hackers hit more businesses through remote access accounts
07/02/2014 03:48 (Computerworld)
94 Cyber Warnings E-Magazine – July 2014 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide