Page 2 - index
P. 2







CONTENTS CYBER WARNINGS

Published monthly by Cyber Defense Magazine and
distributed electronically via opt-in Email, HTML, PDF and
Data Breaches – a Common Theme? Spear Phishing & RATs .. 3 Online Flipbook formats.

The New 3D Secure – Too Little, Too Late? .............................. 5 PRESIDENT

Cybersecurity Q&A with Fran Howarth, senior analyst at Bloor .. 7 Stevin Victor
[email protected]

Why automated incident response should be on your next EDITOR
boardroom agenda .................................................................. 10
Pierluigi Paganini, CEH
As Data Proliferates in the Internet of Things, So Does Risk .... 13 [email protected]


Time is not on your side. .......................................................... 15 ADVERTISING

IT Pros Beware: The Security Risks of Shadow IPv6 ............... 19 Jessica Quinn
[email protected]
A Smart Configuration of Your Computer… How Good is That as
a Prevention from a Hacking? .................................................. 23 KEY WRITERS AND CONTRIBUTORS

The Power of UDADS in HIPAA Compliance ........................... 26 Nish Modi
Anna Wehberg
What NOT to do When You’ve Been Attacked ......................... 30 Todd Weller
Chris Rouland
Justin Rogers
IBM: Proven to withstand the tests of time. .............................. 32 Chris LaPoint
Milica Djekic
International Relations Theory and Cyber Security .................. 34 Kyle F. Kennedy
Mike Miranda
Artin Amirian
Is digital privacy an illusion? .................................................... 40 Robert Neivert
Scott Schweitzer
Stuart McCafferty
Mobile Device Security: Don't Be Naïve .................................. 43 Edwin Covert
Andrew Blaich
No, It Was Not Cyber Terrorism ............................................... 46 Gunjan Tripathi
Gary Miliefsky
Dean Wiech
CVE-2014-7911: Why the ObjectInputStream Serialization
Vulnerability Continues to Wreak Havoc .................................. 51 Interested in writing for us:
[email protected]
Privacy Alert – Phone Charging Kiosks .................................... 54
Role of Government in Cyber Security ..................................... 57 CONTACT US:

Cyber Defense Magazine
2015: Year of the RAT Threat Report Supplement ................... 60 Toll Free: +1-800-518-5248
Fax: +1-702-703-5505
The Security Balancing Act: People – Process – Technology .. 65 SKYPE: cyber.defense
Magazine: http://www.cyberdefensemagazine.com
Two-factor authentication with Security Key ............................. 68 Copyright (C) 2015, Cyber Defense Magazine, a division of
STEVEN G. SAMUELS LLC
NSA Spying Concerns? Learn Counterveillance ...................... 70 848 N. Rainbow Blvd. #4496, Las Vegas, NV 89107. EIN: 454-18-
8465, DUNS# 078358935.
All rights reserved worldwide. [email protected]
Top Twenty INFOSEC Open Sources ...................................... 73 Executive Producer:
National Information Security Group Offers FREE Techtips ..... 74 Gary S. Miliefsky, CISSP®

Job Opportunities .................................................................... 75

Free Monthly Cyber Warnings Via Email.................................. 75

Cyber Warnings Newsflash for February 2015 ......................... 78

2 Cyber Warnings E-Magazine – February 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   1   2   3   4   5   6   7