Page 76 - cdm-2014
P. 76










Heartbleed: Understanding When We Disclose Cyber Vulnerabilities

04/29/2014 02:36 (Technology News)
this case has re-ignited debate about whether the federal government should ever withhold knowledge of a computer
vulnerability from the public.




Whitepaper: Combating APTs through detection

04/29/2014 00:33 (Help Net Security)
...shows you how to implement a post-infection APT detection and malware analysis system that is cost effective, scalable,
automated, and designed...




Adobe patches actively exploited vulnerability in Flash Player

04/28/2014 09:51 (Network World)

...spy on their targets. It's not known what kind of malware the exploits delivered because the payload files that they were
designed to download...






What's The NSA Doing Now? Training More Cyber Warriors

04/30/2014 11:03 (Alaskapublic.org)
What's The NSA Doing Now? Training More Cyber Warriors The U.S. needs more cyber warriors, and it needs them fast,
according to Defense Secretary...




New Android Trojan spreads like a worm

04/30/2014 09:41 (Help Net Security)
...been spotted targeting Russian Android users. Dubbed "Samsapo," the malware can also extract information (phone
numbers, text messages) from the...




The Rise Of Medical Identity Theft In Healthcare

04/30/2014 08:56 (Student Doctor Network)
...efficiency and cut costs, comes amid intensifying concerns over the security of computer networks. Edward Snowden,
the former National Security...



! " $ !
! # ! "
   71   72   73   74   75   76   77   78   79   80   81