Page 78 - index
P. 78







Rowhammer Hardware Exploit Poses Threat to DRAM Memory in Many Laptops, PCs
http://threatpost.com/rowhammer-hardware-exploit-poses-threat-to-dram-memory-in-many-
laptops-pcs/111532#sthash.HMWHS9uL.dpuf


New Technique Complicates Mutex Malware Analysis
http://threatpost.com/new-technique-complicates-mutex-malware-analysis/111517

OTR.to - Secure 'Off-the-Record' p2p Encrypted Messaging Service
http://thehackernews.com/2015/03/otr-secure-off-record-p2p-chat.html

Researchers Get Trolled by Chinese, Pre-Malwartized Xiaomi Mi4 was Duplicate
http://thehackernews.com/2015/03/xiaomi-mobile-security.html

OVERNIGHT CYBERSECURITY: Cyber boom hits Wall Street
http://thehill.com/policy/cybersecurity/overnights/235118-overnight-cybersecurity-cyber-boom-
hits-wall-street


Kik Adds Tools to Prevent Child Exploitation on Messaging App
http://www.bloomberg.com/news/articles/2015-03-10/kik-adds-tools-to-prevent-child-
exploitation-on-messaging-app


Clinton: Private email had 'no breaches'
http://thehill.com/policy/cybersecurity/235229-clinton-private-email-had-no-breaches

Wikipedia, others suing NSA over mass-surveillance program
http://www.washingtontimes.com/news/2015/mar/10/wikipedia-suing-nsa-over-internet-spying/

Lawsuit seeks damages against automakers and their hackable cars
http://www.computerworld.com/article/2895057/lawsuit-seeks-damages-against-automakers-
and-their-hackable-cars.html

Tool allows account hijacking on sites that use Facebook Login
http://www.computerworld.com/article/2895035/tool-allows-account-hijacking-on-sites-that-use-
facebook-login.html

Yahoo Patches Critical eCommerce, Small Business Vulnerabilities
https://threatpost.com/yahoo-patches-critical-ecommerce-small-business-
vulnerabilities/111519#sthash.a8CVQnI5.dpuf


Equation APT Group Attack Platform A Study in Stealth
https://threatpost.com/equation-apt-group-attack-platform-a-study-in-
stealth/111550#sthash.LFEJi1Sn.dpuf

Microsoft Patches Old Stuxnet Bug, FREAK Vulnerability
78 Cyber Warnings E-Magazine – March 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   73   74   75   76   77   78   79   80   81   82   83