Month: February 2014

Blue Shield Insurance Company Acknowledges Data Breach

<div class="at-above-post-arch-page addthis_tool" data-url="http://www.cyber-security-magazine.com/cyber-security/blue-shield-insurance-company-acknowledges-data-breach/"></div>Blue Shield Insurance Company Acknowledges Data Breach. According to Blue Shield of California Insurance agents’ Social Security numbers were mistakenly exposed. The company recently began notifying
Read More

Zero Day Adobe Flash Vulnerability

<div class="at-above-post-arch-page addthis_tool" data-url="http://www.cyber-security-magazine.com/cyber-security/cyber-security-news/zero-day-adobe-flash-vulnerability/"></div>Adobe has released an emergency update for its widely used Flash Player to combat with new Zero Day Adobe Flash Vulnerability discovered by Internet security
Read More

McAfee Threat Intelligence Exchange

<div class="at-above-post-arch-page addthis_tool" data-url="http://www.cyber-security-magazine.com/cyber-security/mcafee-threat-intelligence-exchange/"></div>McAfee plans enterprise security package for fast threat detection and response. McAfee Threat Intelligence Exchange delivers a cohesive framework where security products collectively pinpoint threats
Read More

The Secret History of Hacking

<div class="at-above-post-arch-page addthis_tool" data-url="http://www.cyber-security-magazine.com/cyber-security/hacking/the-secret-history-of-hacking/"></div>The Secret History of Hacking  This video shows how hacking came to be and the logic and what hacking really is. Hacking is not only
Read More

Can Hacking Be Ethical

<div class="at-above-post-arch-page addthis_tool" data-url="http://www.cyber-security-magazine.com/cyber-security/hacking/can-hacking-be-ethical/"></div>Can Hacking Be Ethical? Is it ethical for computer security expert to infiltrate into other company or person’s websites or accounts? Yes if it is
Read More

Indonesia slams reported Australian spying as mind-boggling

<div class="at-above-post-arch-page addthis_tool" data-url="http://www.cyber-security-magazine.com/cyber-security/indonesia-slams-reported-australian-spying-mind-boggling/"></div>Jakarta (AFP) – Indonesia slams reported Australian spying as mind boggling. Indonesia Monday described as “mind-boggling” a report that Australian spies targeted Jakarta during a
Read More

Google acquired password sounds startup SlickLogin

<div class="at-above-post-arch-page addthis_tool" data-url="http://www.cyber-security-magazine.com/cyber-security/cyber-security-news/google-acquired-password-sounds-startup-slicklogin/"></div>Google acquired password sounds startup SlickLogin, an Israeli security company that uses smartphones and high-frequency sounds for identity verification on Web sites. SlickLogin is startup with three-person
Read More