Page 77 - index
P. 77
Edward Snowden's NSA leaks 'an important service', says Al Gore
06/10/2014 09:31 (The Guardian)
...crimes he committed." Snowden, the former CIA and National Security Agency computer specialist, leaked US and
British documents to the Guardian...
P.F. Chang’s Breach: Link to Target?
06/12/2014 08:47 (GovInfoSecurity)
Chang s Breach: Link to Target? Experts Debate Possible Connections in Apparent Cyber-Attack Restaurant chain P.F.
Chang's China Bistro continues...
NIST Guide Targets Supply Chain Risks
06/12/2014 08:17 (GovInfoSecurity)
...organizations. Boyens says NIST stakeholders identify malicious insertion of malware, counterfeit products, intellectual
property theft and poor technology...
Authentication innovation, identity and credential management
06/12/2014 07:52 (Help Net Security)
...IoT the emphasis over the next decade will shift from the basic cyber security argument to a more all-encompassing
view; revolving around how...
Tweetdeck vulnerability found by teen trying to code emoji heart
06/12/2014 07:41 (The Guardian)
...wild. Ninety minutes later, the first worm the name given to a computer attack which is self-replicating was created using
the flaw, by German...
DARPA's Plan X Uses New Technologies to 'See' Cyber Effects
06/12/2014 04:26 (Technology News)
...industry spinoffs of Plan X technologies are possible, as is true of all government programs. "Siri on your iPhone was a
DARPA program that spun off...
Don't be a World Cup loser online: give football cyber-scammers the boot
06/12/2014 03:29 (The Guardian)
! " $
! # ! "