Page 64 - index
P. 64
Shellshock Exploits Targeting SMTP Servers at Webhosts
http://threatpost.com/shellshock-exploits-targeting-smtp-servers-at-webhosts/109034
Insurers fight to bar cyber coverage under commercial general liability policies
http://www.businessinsurance.com/article/20141026/NEWS07/141029850?tags=|299|329|76|30
3
NSA surveillance limits: Focus turns to courts
http://www.theherald-news.com/2014/10/28/nsa-surveillance-limits-focus-turns-to-
courts/ar0sj44/
Researchers identify sophisticated Chinese cyberespionage group
http://www.washingtonpost.com/world/national-security/researchers-identify-sophisticated-
chinese-cyberespionage-group/2014/10/27/de30bc9a-5e00-11e4-8b9e-
2ccdac31a031_story.html
Crooks use stolen magnetic payment card info to make fraudulent chip-enabled transactions
http://net-security.org/secworld.php?id=17543
Hackers breach some White House computers
http://www.washingtonpost.com/world/national-security/hackers-breach-some-white-house-
computers/2014/10/28/2ddf2fa0-5ef7-11e4-91f7-5d89b5e8c251_story.html
In cybersecurity battle, government-business cooperation necessary: Justice official
http://www.washingtontimes.com/news/2014/oct/28/in-cybersecurity-battle-government-
business-cooper/
Hackers Are Using Gmail Drafts to Update Their Malware and Steal Data
http://www.wired.com/2014/10/hackers-using-gmail-drafts-update-malware-steal-data/
Security vendor coalition cleans 43,000 malware infections used for cyberespionage
http://www.pcworld.com/article/2839912/security-vendor-coalition-cleans-43000-malware-
infections-used-for-cyberespionage.html
Cyberespionage: 'This Isn't a Problem That Can Be Solved'
http://threatpost.com/cyberespionage-this-isnt-a-problem-that-can-be-solved/109063
Cybersecurity: Why It's Not Just About Technology
http://www.governing.com/columns/smart-mgmt/col-cybersecurity-organizational-culture-risk-
management.html
IT is losing the battle on security in the cloud
http://net-security.org/secworld.php?id=17546
64 Cyber Warnings E-Magazine – November 2014 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide