Page 2 - index
P. 2







CONTENTS

CYBER WARNINGS
Follow the Yellow Brick Road to Automation and Best Practices2
Published monthly by Cyber Defense Magazine and
Approach To Improving Cybersecurity And Critical Infrastructure distributed electronically via opt-in Email, HTML, PDF and
Protection Must Include A Focus On The Basics .......................4 Online Flipbook formats. Wizard of Oz clip used under fair
use of the US Copyright Act.
Hut, Hut, Hike: Ramp up Your Defenses Against Cyber Attacks 8
PRESIDENT
How an Aggressive Chinese IP Highlights Attribution Issues ...12
Stevin Victor
The Top Ten Mobile Flashlight Applications Are Spying On You. [email protected]
Did You Know?........................................................................22 EDITOR

10 Architectural Principles that Prevent Code Modification or PierLuigi Paganini, CEH
Reverse-Engineering...............................................................25 [email protected]

Using Automated Threat Response to Mitigate Security Events ADVERTISING
................................................................................................28
Jessica Quinn
Your Server as the Last Line of Cyber Defense .......................31 [email protected]
KEY WRITERS AND CONTRIBUTORS
The CISOs struggle for respect in the enterprise .....................37
Pierluigi Paganini
The Comprehensive Approach To Securing Websites.............39 Bob Dix
Paula Skokowski
Tim O’Brien
Malwarebytes’ Growth Accelerates in Hot Anti-Malware Market Jonathan Carter
................................................................................................42 Paul Nguyen
Scott Schweitzer
Briefly about Cyber Security Metrics ........................................46 Julian Waits
Matthias Chin
Gary Good
Best Security Practices for Data Recovery...............................50 Milica Djekic
Michael Hall
Timothy Liu
Why the NGFW isn’t enough ...................................................52 Peter Davidson
Troy Gill
Your USB Device Can Contain Malware – How to Remain Safe Jeff Forristal
................................................................................................56 and many more…

Today’s Wolf of Wall Street: Electronic teeth and a bigger Interested in writing for us:
appetite ...................................................................................58 [email protected]
CONTACT US:
Does mobile increase security risk for EHRs?..........................60
Cyber Defense Magazine
Top 3 Myths About Antivirus Software .....................................62
Toll Free: +1-800-518-5248
Fax: +1-702-703-5505
NSA Spying Concerns? Learn Counterveillance......................63 SKYPE: cyber.defense
Magazine: http://www.cyberdefensemagazine.com
Top Twenty INFOSEC Open Sources......................................64
Copyright (C) 2014, Cyber Defense Magazine, a division of
STEVEN G. SAMUELS LLC
National Information Security Group Offers FREE Techtips .....65 848 N. Rainbow Blvd. #4496, Las Vegas, NV 89107. EIN: 454-18-
8465, DUNS# 078358935.
Job Opportunities ....................................................................66 All rights reserved worldwide. [email protected]
Executive Producer:
Free Monthly Cyber Warnings Via Email..................................66 Gary S. Miliefsky, CISSP®

Cyber Warnings Newsflash for September 2014......................69




I25B /1B>9>7C &171J9>5 M +5@D5=25B 49D9?>
?@IB978D K I25B 565>C5 &171J9>5 << B978DC B5C5BF54 G?B<4G945
   1   2   3   4   5   6   7