Page 86 - cdm-2014
P. 86
Blinding users to URLs: Good or bad for security?
05/06/2014 18:55 (CITEworld)
...(or non-display) feature raises some interesting security questions regarding phishing. As PCWorld s Ian Paul explains,
phishing scams rely on...
Pentagon Smartphone Plan Is Off to a Slow Start
05/06/2014 17:51 (Nextgov)
...said. The management system also provides security functions such as malware detection, the ability to remotely delete
data from misplaced or...
UPS delivers parts for $350K NOAA drone to college kid: ‘I think I just got a drone in the mail’
05/06/2014 15:55 (The Washington Times)
...National Ocean and Atmospheric Administration. A package was mailed from MacDill Air Force Base in Tampa, Fla., to
the unidentified student with...
ISR training should use failure as a learning tool, intel chief says
05/06/2014 14:30 (Army Times)
...should use failure as a learning tool, intel chief says The Air Force needs to overhaul how it trains its intelligence,
surveillance and reconnaissance...
Sneaky Windows Folder Poisoning Attack Steals Access Rights
05/06/2014 13:15 (Dark Reading)
...who's able to hack into a corporate PC -- for example, via a malware infection -- to gain access to further network-
connected systems. "Most of...
The Role Of STEM Education In Shaping The Future Of Information Security
05/06/2014 09:00 (Forbes.com)
...Information Technology maintenance skills. APTs are activities, not simply malware. They are conducted over time in
stages, and are revealed...
Facebook chief complains Obama on NSA spying
05/08/2014 11:09 (Technology News)
! " $ !
! # ! "