Security News > 2014 > August

Meet MonsterMind, the NSA Bot That Could Wage Cyberwar Autonomously
2014-08-14 15:57

http://www.wired.com/2014/08/nsa-monstermind-cyberwarfare/ By Kim Zetter Threat Level Wired.com 08.13.14

Poorly trained IT workers are 'gateway for hackers'
2014-08-06 09:41

http://www.telegraph.co.uk/technology/internet-security/11011249/Poorly-trained-IT-workers-are-gateway-for-hackers.html By Matthew Sparkes Deputy Head of Technology The Telegraph 06 Aug 2014

Russian Gang Amasses Over a Billion Internet Passwords
2014-08-06 09:40

http://www.nytimes.com/2014/08/06/technology/russian-gang-said-to-amass-more-than-a-billion-stolen-internet-credentials.html By NICOLE PERLROTH and DAVID GELLES The New York Times AUG. 5, 2014

Black Hat, BSides Las Vegas and Def Con 2014 Coverage
2014-08-06 09:40

http://www.infosecnews.org/black-hat-bsides-las-vegas-and-def-con-2014-coverage/ By William Knowles @c4i Senior Editor InfoSec News August 6, 2014

Your fitness tracker is a SNITCH says Symantec
2014-08-04 10:15

http://www.theregister.co.uk/2014/08/04/your_fitness_tracker_is_a_snitch_says_symantec/ By Richard Chirgwin The Register 4 Aug 2014

‘Thought-out policy needed for gray-hat ha	ckers’
2014-08-04 10:15

http://www.koreaherald.com/view.php?ud=20140803000316 By Song Sang-ho Korea Herald 2014-08-03

Sandwich Chain Jimmy John’s Investigating 	Breach Claims
2014-08-01 11:59

http://krebsonsecurity.com/2014/07/sandwich-chain-jimmy-johns-investigating-breach-claims/ By Brian Krebs Krebs on Security July 31, 2014

Hacker group targets video game companies to steal source code
2014-08-01 11:59

http://news.techworld.com/security/3533895/hacker-group-targets-video-game-companies-to-steal-source-code/ By Lucian Constantin Techworld.com 31 July 2014

Mitigating cyber risk as healthcare data sharing accelerates
2014-08-01 11:59

http://healthitsecurity.com/2014/07/30/mitigating-cyber-risk-as-healthcare-data-sharing-accelerates/ By Greg Michaels HealthITSecurity.com July 30, 2014

Hackers Can Control Your Phone Using a Tool 	That’s Already Built Into It
2014-08-01 11:58

http://www.wired.com/2014/07/hackers-can-control-your-phone-using-a-tool-thats-already-built-into-it/ By Kim Zetter Threat Level Wired.com 07.31.14