Page 77 - index
P. 77







Edward Snowden's NSA leaks 'an important service', says Al Gore

06/10/2014 09:31 (The Guardian)
...crimes he committed." Snowden, the former CIA and National Security Agency computer specialist, leaked US and
British documents to the Guardian...




P.F. Chang’s Breach: Link to Target?
06/12/2014 08:47 (GovInfoSecurity)

Chang s Breach: Link to Target? Experts Debate Possible Connections in Apparent Cyber-Attack Restaurant chain P.F.
Chang's China Bistro continues...




NIST Guide Targets Supply Chain Risks

06/12/2014 08:17 (GovInfoSecurity)
...organizations. Boyens says NIST stakeholders identify malicious insertion of malware, counterfeit products, intellectual
property theft and poor technology...




Authentication innovation, identity and credential management

06/12/2014 07:52 (Help Net Security)
...IoT the emphasis over the next decade will shift from the basic cyber security argument to a more all-encompassing
view; revolving around how...




Tweetdeck vulnerability found by teen trying to code emoji heart

06/12/2014 07:41 (The Guardian)

...wild. Ninety minutes later, the first worm the name given to a computer attack which is self-replicating was created using
the flaw, by German...




DARPA's Plan X Uses New Technologies to 'See' Cyber Effects

06/12/2014 04:26 (Technology News)
...industry spinoffs of Plan X technologies are possible, as is true of all government programs. "Siri on your iPhone was a
DARPA program that spun off...



Don't be a World Cup loser online: give football cyber-scammers the boot

06/12/2014 03:29 (The Guardian)
! " $
! # ! "
   72   73   74   75   76   77   78   79   80   81   82