XML Sitemap

This is a XML Sitemap which is supposed to be processed by search engines which follow the XML Sitemap standard like Ask.com, Bing, Google and Yahoo.
It was generated using the WordPress content management system and the Google Sitemap Generator Plugin by Arne Brachhold.
You can find more information about XML sitemaps on sitemaps.org and Google's list of sitemap programs.

URLPriorityChange frequencyLast modified (GMT)
https://dataprotectioncenter.com/vulnerabilities-2/more-than-40-of-attacks-abuse-ssl-encryption/20%Hourly2016-09-01 10:29
https://dataprotectioncenter.com/network-security-2/2016-ddos-attack-trends-by-the-numbers/20%Hourly2016-09-01 10:23
https://dataprotectioncenter.com/vulnerabilities-2/adobe-patches-critical-vulnerability-in-coldfusion-application-server/20%Hourly2016-09-01 10:32
https://dataprotectioncenter.com/malware/bittorrent-client-is-found-distributing-mac-based-malware/20%Hourly2016-09-01 10:19
https://dataprotectioncenter.com/hacker/68-million-exposed-in-old-dropbox-hack/20%Hourly2016-08-31 13:22
https://dataprotectioncenter.com/malware/how-to-keep-viral-memes-from-spreading-malware-in-your-enterprise/20%Hourly2016-08-31 13:27
https://dataprotectioncenter.com/vulnerabilities-2/vulnerabilities-found-in-cryptware-bitlocker-enhancement-tool/20%Hourly2016-08-31 13:34
https://dataprotectioncenter.com/virus-and-malware/how-small-and-midsize-businesses-can-stop-cyberattacks/20%Hourly2016-08-31 13:39
https://dataprotectioncenter.com/wireless-security-2/researchers-use-wifi-signals-to-read-keystrokes/20%Hourly2016-08-31 13:48
https://dataprotectioncenter.com/hacker/fbi-warns-of-attacks-on-state-election-systems/20%Hourly2016-08-30 09:25
https://dataprotectioncenter.com/vulnerabilities-2/identify-vulnerabilities-in-your-it-infrastructure-policies-and-procedures-before-the-bad-guys-do/20%Hourly2016-08-30 09:28
https://dataprotectioncenter.com/hacker/dod-taps-def-con-hacker-traits-for-cybersecurity-training-program/20%Hourly2016-08-30 09:34
https://dataprotectioncenter.com/malware/browser-based-fingerprinting-implications-and-mitigations/20%Hourly2016-08-30 09:37
https://dataprotectioncenter.com/virus-and-malware/kelihos-botnet-triples-in-size-overnight/20%Hourly2016-08-30 09:43
https://dataprotectioncenter.com/application-security-2/deception-technology-grows-and-evolves/20%Hourly2016-08-29 14:19
https://dataprotectioncenter.com/malware/the-increasing-dangers-of-code-hooking/20%Hourly2016-08-29 14:32
https://dataprotectioncenter.com/vulnerabilities-2/kaspersky-patches-vulnerabilities-in-consumer-products/20%Hourly2016-08-29 14:25
https://dataprotectioncenter.com/mobile-security-2/iphone-spyware-spotlights-israels-secretive-surveillance-industry/20%Hourly2016-08-29 14:35
https://dataprotectioncenter.com/vulnerabilities-2/medical-device-security-ignites-an-ethics-firestorm/20%Hourly2016-08-29 14:28
https://dataprotectioncenter.com/network-security-2/mozilla-launches-website-security-testing-tool/20%Hourly2016-08-26 15:15
https://dataprotectioncenter.com/access-control-2/dropbox-prompts-certain-users-to-change-their-passwords/20%Hourly2016-08-26 15:17
https://dataprotectioncenter.com/mobile-security-2/apple-issues-emergency-fix-for-ios-zero-days-what-you-need-to-know/20%Hourly2016-08-26 15:20
https://dataprotectioncenter.com/application-security-2/security-conferences-abound-which-should-you-attend/20%Hourly2016-08-26 15:23
https://dataprotectioncenter.com/vulnerabilities-2/critical-vulnerabilities-affect-open-source-base-transceiver-stations/20%Hourly2016-08-26 15:28
https://dataprotectioncenter.com/malware/this-android-botnet-relies-on-twitter-for-its-commands/20%Hourly2016-08-25 12:42
https://dataprotectioncenter.com/application-security-2/new-collision-attacks-against-triple-des-blowfish-break-https-sessions/20%Hourly2016-08-25 12:45
https://dataprotectioncenter.com/application-security-2/a-temperature-check-on-the-state-of-application-security/20%Hourly2016-08-25 12:49
https://dataprotectioncenter.com/hacker/10-ways-to-protect-against-dual-revenue-attacks/20%Hourly2016-08-25 12:55
https://dataprotectioncenter.com/data-loss/data-lakes-security-could-use-a-life-preserver/20%Hourly2016-08-25 12:59
https://dataprotectioncenter.com/data-loss/what-you-need-to-do-to-stop-data-from-leaving-with-exiting-employees/20%Hourly2016-08-24 16:23
https://dataprotectioncenter.com/application-security-2/how-to-secure-your-remote-workers/20%Hourly2016-08-24 16:14
https://dataprotectioncenter.com/application-security-2/when-securing-your-applications-seeing-is-believing/20%Hourly2016-08-24 16:17
https://dataprotectioncenter.com/malware/wildfire-ransomware-operators-made-80000-in-one-month/20%Hourly2016-08-24 16:10
https://dataprotectioncenter.com/identity-theft-2/chip-and-pin-fraud-the-new-face-of-credit-crime/20%Hourly2016-08-24 16:27
https://dataprotectioncenter.com/cyber-warfare-2/rise-in-state-sponsored-cyber-espionage-the-tipping-point-of-cyber-warfare/20%Hourly2016-08-23 15:59
https://dataprotectioncenter.com/application-security-2/attackers-exploit-flaw-in-software-used-by-us-ports/20%Hourly2016-08-23 15:40
https://dataprotectioncenter.com/application-security-2/anatomy-of-a-social-media-attack/20%Hourly2016-08-23 15:36
https://dataprotectioncenter.com/privacy-protection-2/many-hospitals-transmit-your-health-records-unencrypted/20%Hourly2016-08-23 15:42
https://dataprotectioncenter.com/application-security-2/imperva-application-layer-ddos-attacks-are-on-the-rise/20%Hourly2016-08-23 15:32
https://dataprotectioncenter.com/access-control-2/8-tips-for-keeping-your-data-safe-with-identity-and-access-management/20%Hourly2016-08-22 14:54
https://dataprotectioncenter.com/vulnerabilities-2/attackers-dont-need-vulnerabilities-when-the-basics-work-just-as-well/20%Hourly2016-08-22 14:49
https://dataprotectioncenter.com/access-control-2/security-mistakes-executives-make/20%Hourly2016-08-22 14:35
https://dataprotectioncenter.com/security/clinton-must-give-written-testimony-in-e-mail-case-us-judge/20%Hourly2016-08-22 14:31
https://dataprotectioncenter.com/privacy-protection-2/hackers-say-leaked-nsa-tools-came-from-contractor-at-redseal/20%Hourly2016-08-22 15:00
https://dataprotectioncenter.com/hacker/attackers-playbook-top-5-is-high-on-passwords-low-on-malware/20%Hourly2016-08-19 09:24
https://dataprotectioncenter.com/cyber-warfare-2/the-nsas-hoard-of-cyber-weapons-makes-some-experts-nervous/20%Hourly2016-08-19 09:34
https://dataprotectioncenter.com/spam/spam-and-phishing-in-q2-2016/20%Hourly2016-08-19 10:46
https://dataprotectioncenter.com/hacker/bitcoin-website-suspects-it-will-be-targeted-by-state-sponsored-hackers-warns-users/20%Hourly2016-08-19 10:53
https://dataprotectioncenter.com/vulnerabilities-2/flaws-in-smart-sockets-expose-networks-to-remote-attacks/20%Hourly2016-08-19 10:55
https://dataprotectioncenter.com/vulnerabilities-2/swift-did-not-monitor-weak-security-practices-of-its-users-report/20%Hourly2016-08-19 09:28
https://dataprotectioncenter.com/hacker/the-alleged-nsas-unit-the-equation-group-has-been-hacked-exploits-and-tools-leaked-online/20%Hourly2016-08-18 05:47
https://dataprotectioncenter.com/virus-and-malware/cisco-fortinet-issue-patches-against-nsa-malware/20%Hourly2016-08-18 06:18
https://dataprotectioncenter.com/hacker/attackers-can-hijack-unencrypted-web-traffic-of-80-of-android-users/20%Hourly2016-08-18 06:03
https://dataprotectioncenter.com/malware/shakti-trojan-technical-analysis/20%Hourly2016-08-18 06:24
https://dataprotectioncenter.com/access-control-2/cards-with-chips-are-still-vulnerable/20%Hourly2016-08-18 06:11
https://dataprotectioncenter.com/cyber-warfare-2/windows-7-and-8-1-updates-switching-to-cumulative-monthly-rollups-starting-in-october/20%Hourly2016-08-17 09:12
https://dataprotectioncenter.com/malware/shark-ransomware-as-a-service-a-real-threat-a-scam-or-both/20%Hourly2016-08-17 09:07
https://dataprotectioncenter.com/privacy-protection-2/eliminate-weak-passwords-with-regular-auditing/20%Hourly2016-08-17 09:01
https://dataprotectioncenter.com/privacy-protection-2/google-duo-simple-encrypted-video-calling-app/20%Hourly2016-08-17 09:06
https://dataprotectioncenter.com/phishing/the-real-reason-phishing-works-so-well/20%Hourly2016-08-17 09:16
https://dataprotectioncenter.com/malware/some-starwood-marriott-hyatt-intercontinental-hotels-hit-by-pos-attacks/20%Hourly2016-08-17 09:12
https://dataprotectioncenter.com/email-security-2/safe-browsing-gmail-will-warn-of-emails-from-unauthenticated-senders/20%Hourly2016-08-16 08:53
https://dataprotectioncenter.com/hacker/guccifer-2-0-leaks-personal-data-of-nearly-200-congressional-democrats/20%Hourly2016-08-16 08:51
https://dataprotectioncenter.com/malware/shakti-trojan-document-thief/20%Hourly2016-08-16 08:44
https://dataprotectioncenter.com/malware/pos-malware-strikes-again/20%Hourly2016-08-16 08:36
https://dataprotectioncenter.com/vulnerabilities-2/hack-the-vote/20%Hourly2016-08-16 08:47
https://dataprotectioncenter.com/data-loss/hackers-claim-to-auction-data-they-stole-from-nsa-linked-spies/20%Hourly2016-08-16 08:56
https://dataprotectioncenter.com/identity-theft-2/how-well-does-social-engineering-work-one-test-returned-150/20%Hourly2016-08-12 11:33
https://dataprotectioncenter.com/cyber-warfare-2/it-takes-a-planet-why-international-cyber-security-cooperation-is-more-important-than-ever/20%Hourly2016-08-12 11:39
https://dataprotectioncenter.com/wireless-security-2/millions-of-cars-vulnerable-to-remote-unlocking-hack/20%Hourly2016-08-12 11:35
https://dataprotectioncenter.com/cloud-security/cloud-iam-scenarios-in-retail-academia-and-finance-three-tips-from-an-idaas-expert/20%Hourly2016-08-12 11:31
https://dataprotectioncenter.com/vulnerabilities-2/the-economic-impact-of-security-incidents-on-critical-information-infrastructures/20%Hourly2016-08-12 11:41
https://dataprotectioncenter.com/spam/in-terms-of-spam-donald-trump-is-beating-hillary-clinton-hands-down/20%Hourly2016-08-12 11:23
https://dataprotectioncenter.com/tracking-2/tracking-online-fraud-check-your-mileage-against-endpoint-data/20%Hourly2016-08-11 09:54
https://dataprotectioncenter.com/access-control-2/using-iso-27001-to-improve-your-information-security-posture/20%Hourly2016-08-11 10:56
https://dataprotectioncenter.com/vulnerabilities-2/advanced-threat-hunting-are-you-the-hunter-or-the-hunted/20%Hourly2016-08-11 10:49
https://dataprotectioncenter.com/vulnerabilities-2/researchers-crack-microsoft-feature-say-encryption-backdoors-similarly-crackable/20%Hourly2016-08-11 10:47
https://dataprotectioncenter.com/cyber-warfare-2/a-new-500000-ios-bug-bounty-beats-apples-offer/20%Hourly2016-08-11 10:51
https://dataprotectioncenter.com/malware/unfinished-hitler-ransomware-variant-deletes-user-files/20%Hourly2016-08-10 09:25
https://dataprotectioncenter.com/network-security-2/carper-pushes-dhs-for-elections-to-be-classified-critical-infrastructure/20%Hourly2016-08-10 09:22
https://dataprotectioncenter.com/hacker/many-bluetooth-smart-locks-open-easily-for-attackers/20%Hourly2016-08-10 09:16
https://dataprotectioncenter.com/phishing/spearphishing-its-curiosity-that-makes-them-click/20%Hourly2016-08-10 09:20
https://dataprotectioncenter.com/cyber-warfare-2/using-feedback-loops-to-enhance-end-user-security/20%Hourly2016-08-10 09:13
https://dataprotectioncenter.com/access-control-2/fake-qr-code-app-gets-hacker-into-luxury-airport-lounges-for-free/20%Hourly2016-08-10 09:17
https://dataprotectioncenter.com/network-security-2/what-awareness-gamification-programs-can-learn-from-pokemon-go/20%Hourly2016-08-09 09:10
https://dataprotectioncenter.com/mobile-security-2/dont-be-a-deer-in-the-headlights-now-is-the-time-to-combat-mobile-related-fraud/20%Hourly2016-08-09 08:54
https://dataprotectioncenter.com/hacker/hackers-hit-oracles-micros-payment-systems-division/20%Hourly2016-08-09 09:01
https://dataprotectioncenter.com/vulnerabilities-2/new-android-security-vulnerabilities-affect-900-million-phones/20%Hourly2016-08-09 08:59
https://dataprotectioncenter.com/cyber-warfare-2/projectsauron-top-level-cyber-espionage-platform-covertly-extracts-encrypted-government-comms/20%Hourly2016-08-09 08:56
https://dataprotectioncenter.com/vulnerabilities-2/new-windows-attack-turns-evil-maid-into-malicious-butler/20%Hourly2016-08-05 09:43
https://dataprotectioncenter.com/hacker/china-suspected-of-hacking-south-china-sea-arbitration/20%Hourly2016-08-05 09:41
https://dataprotectioncenter.com/malware/pc-nuking-malware-sneakily-replaces-popular-free-software-on-fosshub/20%Hourly2016-08-05 09:14
https://dataprotectioncenter.com/network-security-2/containerized-security-the-next-evolution-of-virtualization/20%Hourly2016-08-05 09:11
https://dataprotectioncenter.com/cloud-security/why-voip-security-is-crucial-for-organizations/20%Hourly2016-08-05 09:20
https://dataprotectioncenter.com/malware/attackers-disguise-macro-malware-by-renaming-files/20%Hourly2016-08-04 07:50
https://dataprotectioncenter.com/vulnerabilities-2/one-third-of-ics-flaws-are-zero-days-when-disclosed-report/20%Hourly2016-08-04 07:36
https://dataprotectioncenter.com/malware/to-stop-ransomware-opt-for-app-graylisting-and-admin-rights-removal/20%Hourly2016-08-04 07:28
https://dataprotectioncenter.com/cloud-security/cloud-security-controls-time-to-ensure-added-perimeter-defense-for-your-public-cloud-deployments/20%Hourly2016-08-04 07:25
https://dataprotectioncenter.com/privacy-protection-2/how-to-protect-yourself-from-common-hotel-security-threats/20%Hourly2016-08-04 07:32
https://dataprotectioncenter.com/malware/firefox-adds-improved-download-protection/20%Hourly2016-08-03 12:01
https://dataprotectioncenter.com/hacker/this-tiny-device-can-infect-point-of-sale-systems-and-unlock-hotel-rooms/20%Hourly2016-08-03 11:59
https://dataprotectioncenter.com/hacker/kaspersky-lab-launches-public-bug-bounty-program/20%Hourly2016-08-03 11:55
https://dataprotectioncenter.com/spam/irs-warns-on-super-summer-scam-scourge/20%Hourly2016-08-03 11:54
https://dataprotectioncenter.com/data-loss/data-of-200-million-yahoo-users-offered-for-sale/20%Hourly2016-08-03 11:50
https://dataprotectioncenter.com/vulnerabilities-2/new-jeep-hack-allows-remote-steering-acceleration/20%Hourly2016-08-03 11:51
https://dataprotectioncenter.com/network-security-2/managed-siem-the-digital-detective-helping-to-fight-cybercrime/20%Hourly2016-08-02 09:35
https://dataprotectioncenter.com/phishing/salted-hash-phishing-study-reveals-frightening-password-habits/20%Hourly2016-08-02 09:44
https://dataprotectioncenter.com/malware/point-of-sale-hazards-skimming-the-surface-of-global-sporting-events/20%Hourly2016-08-02 09:35
https://dataprotectioncenter.com/mobile-security-2/intel-crosswalk-bug-invalidates-ssl-protection/20%Hourly2016-08-02 09:38
https://dataprotectioncenter.com/access-control-2/barclays-unveils-voice-authentication-for-phone-banking/20%Hourly2016-08-02 09:47
https://dataprotectioncenter.com/cyber-warfare-2/dhs-sets-guidelines-for-reporting-cyberattack-to-the-feds/20%Hourly2016-08-02 09:51
https://dataprotectioncenter.com/hacker/clinton-campaign-servers-were-accessed-as-part-of-dnc-hack/20%Hourly2016-08-01 12:13