Page 97 - cdm-2014
P. 97







Why the FBI Wants to Procure Malware The FBI seeks a commercial supplier of malicious software to supply the
intelligence agency with a steady...




Cyberwarfare: Protecting 'soft underbelly' of USA

05/15/2014 12:52 (CNBC)

...the Hollywood style versus the much wider impact." The Next Cyber War Is Already in Progress: Security Expert Militaries
around the world are...



US Official: China cited in cyber-espionage case

05/19/2014 09:30 (Kotanow.com)

...not point fingers at each other without evidence but do more to safeguard cyber security." Earlier this year, China set up
an Internet security...




Record month for Linux Trojans

05/19/2014 09:27 (Help Net Security)
...month for Linux Trojans If you think that you are protected from malware if you use Linux, think again, warn researchers
from AV manufacturer...



Bulletin (SB14-139)Vulnerability Summary for the Week of May 12, 2014

05/19/2014 08:03 (US-CERT)

...Summary for the Week of May 12, 2014 The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities
that have been recorded by...




This Navy Admiral Will Lead The Post-Snowden NSA

05/19/2014 05:34 (Business Insider)
...Rogers, who is also commander of the U.S. military's Cyber Command. Arizona Republican Senator John McCain
welcomed Roger's call for greater transparency...




NIST to revise Industrial Control Systems security guide

05/19/2014 01:07 (Help Net Security)
...operations to malicious attacks, equipment failures, errors, inadequate malware protection and other software-related
threats. The new draft...


! " $ !
! # ! "
   92   93   94   95   96   97   98   99   100   101   102