Page 82 - index
P. 82










Comcast is turning your home router into a public Wi-Fi hotspot

06/16/2014 07:10 (KSPR 33)
...could be unnecessary exposure to potential harm. Craig Young, a computer security researcher at Tripwire, has tested
the top 50 routers on the...




Target Fixes Glitch That Caused Delays at Checkout

06/15/2014 19:40 (NBC Chicago)
...said. Last December, Target announced it was the victim of a cyber attack that resulted in the theft of at least 40 million
payment card numbers...




Researcher claims to have found rare new Trojan [ITP.net (United Arab Emirates)]

06/15/2014 12:29 (Technology News)

...dynamic encrypted communications and other methods to evade isolation by cyber security researchers. Marcus
believes the malware could become more...




The Covert Devaluation of US Businesses - Hackers Getting Their Hands on Intellectual Property
Proving Costly
06/14/2014 17:04 (WBCB)

...common entry vector for attackers is usually a successful phishing or spear phishing campaign. And with the magnitude
of information at hackers...




P.F. Chang's Breach: 6 Key Developments - BankInfoSecurity

06/17/2014 09:22 (Bankinfosecurity)

Chang's received a warning from the U.S. Secret Service that its network may have been compromised, and card data
stolen. Rescator is also where a...




Student provides Java program to reverse Android ransomware damage

06/17/2014 08:00 (Help Net Security)
...converted into an Android app to decrypt the files encrypted by the malware. University of Sussex student Simon Bell has
reverse-engineered -



! " $
! # ! "
   77   78   79   80   81   82   83   84   85   86   87