Page 120 - CDM-Cyber-Warnings-March-2014
P. 120
...described in the report, Libicki said. The tools that are good for cyber crime aren t necessarily good for taking down physical systems, he said. Flight MH370: Are airliners vulnerable to cyber-attack? 03/24/2014 22:19 (Yahoo! News) Flight MH370: Are airliners vulnerable to cyber-attack? Flight MH370, the Boeing 777 that Malaysia says went down in the Indian Ocean, likely... Three Things You Should Know About the Syrian Electronic Army 03/24/2014 18:49 (Bloomberg) ...About the Syrian Electronic Army For the past three years, cyber-security research firm IntelCrawler has studied the Syrian Electronic Army using... The NSA is burning down the web, but what if we rebuilt a spy-proof internet? 03/24/2014 09:55 (The Guardian) ...distant agendas. The three forms of data-gathering (if one includes cyber crime) are all connected and none of them make us happier or more secure. NIST Information Technology Professionals Recognized for Excellence 03/27/2014 08:29 (Technology News) ...via the National Strategy for Trusted Identities in Cyberspace. Computer Security Division Deputy Chief Matthew Scholl was named for his role... The 3 kinds of cybersecurity every utility needs (and a reference architecture you need to know about) 03/27/2014 08:01 (Smart Grid News) ...security logs to detect an event that has already happened or a system restart to reload an application. Next page: Improving cyber defense agility Hidden crypto currency-mining code spotted in apps on Google Play 03/27/2014 07:54 (Help Net Security) ...apps on Google Play You already know that cyber criminals are using malware to make victims' computers mine crypto currencies for them, but did... " # % " $ " # ! !