Page 83 - index
P. 83







McCaul to Unveil Threat Info-Sharing Bill
http://www.govinfosecurity.com/mccaul-to-unveil-threat-info-sharing-bill-a-8022

North Korea web outage response to Sony hack, lawmaker says
http://www.stripes.com/news/pacific/north-korea-web-outage-response-to-sony-hack-lawmaker-
says-1.335165

Microsoft Warns Fraudulent Certificate Could Lead to MiTM Attacks
https://threatpost.com/microsoft-warns-fraudulent-certificate-could-lead-to-mitm-
attacks/111670#sthash.D3myKIPd.dpuf

How to perform Forensic Analysis using Log Data
http://thehackernews.com/2015/03/network-forensic-analysis.html

Deanonymizing Tor Users With Raptor Attacks
http://www.forensicmag.com/news/2015/03/deanonymizing-tor-users-raptor-attacks


'Voodoo' Hackers: Stealing Secrets From Snowden's Favorite OS Is Easier Than You'd Think
http://www.forbes.com/sites/thomasbrewster/2015/03/18/hacking-tails-with-rootkits/


Victims of Target breach eligible for $10K payout
http://thehill.com/policy/cybersecurity/236244-target-to-settle-data-breach-for-10-million

FFIEC to Prepare New Cyber-Risk Policy
http://www.govinfosecurity.com/ffiec-to-prepare-new-cyber-risk-policy-a-8030

New BIOS Implant, Vulnerability Discovery Tool to Debut at CanSecWest
https://threatpost.com/new-bios-implant-vulnerability-discovery-tool-to-debut-at-
cansecwest/111710#sthash.u8SPjP2T.dpuf

The Bot Threat For the Rest of Us: Application-Layer Attacks
http://www.darkreading.com/attacks-breaches/the-bot-threat-for-the-rest-of-us-application-layer-
attacks-/a/d-id/1319510?

French Surveillance Bill Would Legalize Data Monitoring
http://www.forensicmag.com/news/2015/03/french-surveillance-bill-would-legalize-data-
monitoring

DeepCode Tool Detects Software Flaws Before Release
http://www.forensicmag.com/blogs/2015/03/deepcode-tool-detects-software-flaws-release

'Black Box' Brouhaha Breaks Out Over Brute Forcing iPhone PIN Lock
http://www.forensicmag.com/blogs/2015/03/black-box-brouhaha-breaks-out-over-brute-forcing-
83 Cyber Warnings E-Magazine – March 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   78   79   80   81   82   83   84   85   86   87   88