Trendrapport 2012 - DK-Cert

cert.dk

Trendrapport 2012 - DK-Cert

Referencer64Panton, 2012; ”Rejsekortet: Sikkerhed som vi pensionerede i 90’erne”; christian.panton.org/post/16458741723/rejsekortPastebin, 2012; “Anonymous - #opeurope”; pastebin.com/aUuuhLyDPastebin,2012;”Dear citizens of Denmark”; pastebin.com/UZJGwHjpPastebin, 2012; “Untitled”; pastebin.com/A33r79pePolitiken, 2012; “Hackere stjæler flere hundrede danskeres passwords”;politiken.dk/erhverv/ECE1556987/hackere-stjaeler-flere-hundrede-danskerespasswords/Ponemon Institute, 2012; “The impact of cybercrime on business”; checkpoint.com/products/downloads/whitepapers/ponemon-cybercrime-2012.pdfRapid7, 2012; “New Metasploit module to exploit GE PLC SCADA devices”; www.rapid7.com/news-events/press-releases/2012/2012-new-metasploit-module-toexploit.jspRepræsentanternes Hus, 2011; “Stop Online Piracy Act”; judiciary.house.gov/hearings/pdf/112%20HR%203261.pdfRetsinformation, 2012;“Lov om ændring af lov om ændring af straffeloven,retsplejeloven, lov om konkurrence- og forbrugerforhold på telemarkedet,våbenloven, udleveringsloven samt lov om udlevering af lovovertrædere tilFinland, Island, Norge og Sverige”; www.retsinformation.dk/Forms/R0710.aspx?id=142399Seclists, 2012; “[SE-2012-01] New security issue affecting Java SE 7 Update 7”;seclists.org/bugtraq/2012/Aug/225Security Explorations, 2012; “Critical security issue affecting Java SE 5/6/7”;seclists.org/fulldisclosure/2012/Sep/170Secunia; “Secunia Personal Software Inspector (PSI)”; secunia.com/vulnerability_scanning/personal/Securityweek, 2012; “Following LulzSec arrests, AntiSec supporters attack PandaSecurity”; securityweek.com/following-lulzsec-arrests-antisec-supporters-attackpanda-securitySoftpedia, 2012; “BlackHole Exploit Kit 2.0 Made available, price remains thesame”; news.softpedia.com/news/BlackHole-Exploit-Kit-2-0-Made-Available-Price-Remains-Same-291881.shtmlSophos, 2012; “Exploring the Blackhole Exploit Kit”; sophosnews.files.wordpress.com/2012/03/blackhole_paper_mar2012.pdfSophos, 2012; “IE remote code execution vulnerability being actively exploitedin the wild”; nakedsecurity.sophos.com/2012/06/19/ie-remote-code-executionvulnerability-being-actively-exploited-in-the-wild/Sophos, 2013; “Security threat report 2013”; sophos.com/en-us/medialibrary/PDFs/other/sophossecuritythreatreport2013.pdfStatens it, 2012; “Erhvervs- og Vækstministeriet angrebet af hackere”; statens-it.dk/omstatensit/nyheder/916.htmlSydbank, 2012; “Angreb på Sydbanks NetBank”; sydbank.dk/privat/artikler/netbankindbrudSymantec; “Globale trusler”; symanteccloud.com/da/dk/globalthreats/Symantec; “Symantec intelligence reports”; symanteccloud.com/da/dk/globalthreats/overview/r_mli_reportsTeamghostshell, 2012; “#ProjectWestWind - Today’s education!”; pastebin.com/AQWhu8EkTeamShatter, 2012; “Sybase – Disclosed But Unpatched Vulnerabilities”; www.teamshatter.com/topics/general/team-shatter-exclusive/sybase-disclosed-butunpatched-vulnerabilities/The Huffington Post, 2012; “Anonymous and the war over the internet”;huffingtonpost.com/2012/01/30/anonymous-internet-war_n_1233977.htmlThe Huffington Post, 2012; “Anonymous and the war over the internet (Part II)”;huffingtonpost.com/2012/01/31/anonymous-war-over-internet_n_1237058.htmlThe Register, 2012; “Samsung’s smart TVs ‘wide open’ to exploits”; theregister.co.uk/2012/12/12/smart_tv_pwned/Thenextweb, 2012; “In one year, Android malware up 580%, 23 of the top 500apps on Google Play deemed ‘High Risk’”: thenextweb.com/google/2012/10/25/in-one-year-android-malware-up-580-23-of-the-top-500-on-google-play-deemedhigh-risk/Threatpost, 2012; “Team Ghost Shell claims to publish records from thousandsof universities”; threatpost.com/en_us/blogs/team-ghost-shell-claims-publisherecords-thousands-univerisities-100212Tofino Security, 2012; “Cyber security nightmare in the Netherlands”;tofinosecurity.com/blog/cyber-security-nightmare-netherlandsTofino Security, 2012; “S4 SCADA security symposium takeaway: Time for arevolution”; tofinosecurity.com/blog/s4-scada-security-symposium-takeaway-timerevolutionTrendmicro, 2012; ”Russian underground 101”; trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-russian-underground-101.pdfTV 2, 2012; “3F’s hjemmeside lagt ned af hackere”; nyhederne.tv2.dk/article.php/id-51969246TV 2, 2012; “Anonym hacker: Operationen er kørt af sporet”; nyhederne.tv2.dk/article.php/id-52040255TV 2, 2012; ”Bankrøvere får mindre i udbytte end før”; nyhederne.tv2.dk/article.php/id-54240364TV 2, 2012; ”Danmark klar til angreb på nettet”, nyhederne.tv2.dk/article.php/id-61100129Urlesque, 2010; “The Jessi Slaughter scandal - An unbalanced 11-year-old girl’songoing fight with internet trolls”; urlesque.com/2010/07/19/jessi-slaughter/Version 2, 2012; “Anonymous slår til i Danmark: Vi har hacket CPR.dk og Atea”;version2.dk/48716Version 2, 2012; ”Cyberangreb på Sverige: Statsbaner og nyhedsbureauDDoS’et”; version2.dk/48034Version 2, 2012; “Danske Bank: Vi har fortsat fuld tillid til NemID2"; version2.dk/43521

More magazines by this user
Similar magazines