Page 81 - index
P. 81
http://www.forensicmag.com/news/2015/03/politics-intrude-cybersecurity-firms-hunt-foreign-
spies
Another Reason To Upgrade To Latest iOS - A $300 Device Can Pop Open Old iPhone
PIN Locks
http://www.forbes.com/sites/thomasbrewster/2015/03/16/300-device-can-pop-open-old-iphones-
with-ease/
BlackBerry Uses IBM Software to Make Samsung Tablets Spy-Proof
http://www.bloomberg.com/news/articles/2015-03-14/blackberry-uses-ibm-software-to-make-
samsung-tablets-spy-proof-i796gj1e
Feds search for ways to impede 'cyber bazaar'
http://thehill.com/policy/cybersecurity/235726-feds-search-for-ways-to-impede-cyber-bazaar
Yahoo puts email encryption plugin source code up for review
http://www.computerworld.com/article/2896780/yahoo-puts-email-encryption-plugin-source-
code-up-for-review.html
'Google VPN' in-built Hidden Service spotted in Android 5.1
http://thehackernews.com/2015/03/google-vpn-connectivity-services.html
US at Odds With Google on Computer Search-Warrant Proposal
http://www.forensicmag.com/news/2015/03/us-odds-google-computer-search-warrant-proposal
MIT launches three-pronged effort to thwart cyber attacks
http://www.networkworld.com/article/2896324/security0/mit-launches-three-pronged-effort-to-
thwart-cyber-attacks.html
Grissom High 'CyberSloths' take 1st place in national cyber security finals
http://www.al.com/news/huntsville/index.ssf/2015/03/grissom_high_cybersloths_take.html
Piecing Together Digital Evidence In Boston Marathon Bombing Trial
http://radioboston.wbur.org/2015/03/13/digital-forensics
Gamers beware! - Malware attacks "save files"
http://newsfirst.lk/english/2015/03/hardcore-gamers-at-risk-malicious-software-demands-
ransoms/83732
FBI request to expand hacking power advances
http://thehill.com/policy/cybersecurity/235910-fbis-hacking-request-gets-initial-approval
North Korea accused of cyberattack on nuclear power operator
http://thehill.com/policy/cybersecurity/235906-north-korea-accused-of-cyberattack-on-nuclear-
81 Cyber Warnings E-Magazine – March 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide