Page 115 - CDM-Cyber-Warnings-March-2014
P. 115
Metadata Poses Both Risks And Rewards 03/19/2014 09:37 (Dark Reading) ...be revealed. "A persistent attacker can create a piece of malware for a specific target and use information taken from documents to create a... IBM launches new software and consulting services 03/21/2014 07:20 (Help Net Security) ...detect cross-channel mobile fraud and prevent cybercrime enablers like phishing scams. They can enable an insurance company to review thousands... NSA says tech giants knew about its spying efforts 03/21/2014 03:45 (Yahoo! News) ...a month NSA denies report that it has infected millions of computers with malware NSA's plan to inject malware into 'millions' of computers revealed... Google toughens security with Gmail encryption 03/20/2014 21:35 (Yahoo! News) ...or documents, but that a persistent effort can gain access through malware or other methods that trick a person into revealing passwords. - NSA-proof? Report: IRS phone scam sweeping nation 03/20/2014 21:15 (Politico.com) ...t seen anything like this since the 2006 filing season when phishing websites snagged taxpayers searching for how to contact the IRS and pull... Impact of EA Games hack on Apple shows ripple effect of attacks 03/20/2014 16:51 (Network World) ...ripple effect of attacks EA Games server hacked to redirect users to phishing page requesting Apple ID and password The recent hacking of an EA... " # % " $ " # ! !