Emerging Cyber Threats Report 2012

“With remote control of a CEO’s mobile phone, an advanced persistent adversary could activate the microphone to record private negotiations.” this excerpt from the Georgia Tech Information Security Center 2012 Cyber Threats report released today at GTISC’s Security Summit. To read the entire report, the threat vectors etc. click emerging_cyber_threats_report2012

Share and Enjoy:
  • Digg
  • del.icio.us
  • Facebook
  • Google Bookmarks
  • Blogplay
  • Slashdot
  • Twitter
This entry was posted in M.A.D. News and tagged , , , , , , . Bookmark the permalink.

Comments are closed.