Page 81 - index
P. 81







...Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization,
identity management,




DHS readies next CDM task orders

06/12/2014 12:02 (Federal Times)

...said. The CDM Program is comprehensive, adhering to the cyber security framework and security controls detailed in
The National Institute of...




Monitor DNS Traffic & You Just Might Catch A RAT

06/12/2014 12:00 (Dark Reading)
...botnet administration, and they use compromised domains to host phishing or malware downloads. They inject malicious
queries to exploit name...



Is full disclosure always a good idea?

06/16/2014 09:48 (GFI Software)

...wear (or don t wear) to bed and yes, what security vulnerabilities have been discovered in computer software. Perhaps
this penchant for more...




Financial ransomware now targeting U.S. users

06/16/2014 09:39 (Help Net Security)
...languages. "It is impossible to repel an attack of American Svpeng if a mobile device doesn't have a security solution -
the malware will block the device...



Federal Agencies Invested $1.6B in Mobile Workforce Since Digital Government Strategy; Security
Focus Remains Top Concern and IT Priority

06/16/2014 08:51 (Fort Mill Times)

Federal Agencies Invested $1.6B in Mobile Workforce Since Digital Government Strategy; Security Focus Remains Top
Concern and IT Priority Agencies...




600,000 customer details compromised at Domino’s

06/16/2014 08:16 (Help Net Security)
...least. As a result of this attack there s an additional risk of phishing attacks. Consumers should be aware that the value of
that data to criminals...
! " $
! # ! "
   76   77   78   79   80   81   82   83   84   85   86