Page 112 - CDM-Cyber-Warnings-March-2014
P. 112
...nonsense, from a security point of view every local controller is also a computer, and vulnerable to attack, just as a printer or a telephone exchange... Full Disclosure mailing list closure elicits mixed reactions 03/19/2014 12:37 (Help Net Security) ...important role in the ecosystem that identifies and remediates computer security vulnerabilities. Having a forum where vulnerability details... Alexander: Congress should address cyberthreat information sharing 03/19/2014 12:06 (Federal Times) ...priority following a 2013 executive order that expanded the Homeland Security Department s Enhanced Cyber Services program. Intelligence-sharing... US officials don't expect terrorists to embrace Bitcoin. Here's why. 03/19/2014 10:31 (The Times Herald) ...holdings, shows the need for robust standards for consumer protection, cyber security and anti-money laundering compliance, Lawsky said. Federal... Researchers discover credential-stealing Unix-based server botnet 03/19/2014 06:37 (Network World) ...credential-stealing Unix-based server botnet Cybercriminals are using sophisticated malware in compromising thousands of Unix-based servers to spew spam... Hacker Diabl0 arrested in Thailand at the request of Swiss authorities 03/19/2014 06:21 (Network World) ...that the arrest in Thailand is related to a credit card phishing case opened against several individuals. Essebar is suspected to have compromised... 20% of all malware ever created appeared in 2013 03/19/2014 04:22 (Help Net Security) Besides offering an overview of the most significant events in the computer security field, the 2013 Annual Security Report also forecasts future... " # % " $ " # ! !