Page 82 - cdm-2014
P. 82
05/05/2014 02:53 (The Daily Journal (AP))
...products and services for large enterprises. While many don't realize it, computer security is actually a key part of IBM's
business. If the company...
11 reasons encryption is (almost) dead
05/05/2014 02:03 (Computerworld)
...yourself in the 7 sneak attacks used by today's most devious hackers, 14 dirty IT security consultant tricks, 9 popular IT
security practices...
Enterprises are not monitoring access to sensitive data
05/04/2014 22:43 (Computer World Singapore)
...emotional response? Because data exfiltration is a worst-case outcome of a cyber-attack - think Target, the NY Times,
Google Aurora, Titan Rain,
OAuth weakness threatens users of social media sites
05/04/2014 21:58 (Computer World Singapore)
...as a trusted site, experts say. This is typically done through a phishing email with a link to the malicious site. In logging
into the bogus...
How federal bill C-13 could give CSIS agents — or even Rob Ford — access to your personal
online data
05/04/2014 19:42 (National Post)
Cyber contractors ramp up new tools for NSA
05/04/2014 03:01 (HeraldNet.com)
...company may have done with the U.S. government. Most defense contractors have launched cyber-weapons programs;
many have grown through acquisitions...
Is the NSA Hiding Another Heartbleed?
05/03/2014 01:09 (Yahoo! News)
...Directorate, the part of the NSA responsible for protecting national computer networks by discovering and patching
security holes. On the other,
! " $ !
! # ! "