American Dreams: How Bush Shaped Our Reading of Roth’s ‘The Plot Against America’ - The Daily Beast
Target will ask judge to toss bank suits over breach - Dallas Business Journal
US man sentenced for hacking POS systems at Subway - PC World Australia
Hacking for nude pics on the rise, say experts | Ottawa & Region | News | Ottawa
Hope X - Prism Proof Email: Why Email Is Insecure And How We Are Fixing It
Thanksgiving tech support: Replace older browsers
What It Takes to Kill a Grizzly Bear - The Daily Beast
Everything your users ever need to know about BYOD • The Register
Adobe Flash Player 14 Delivers Users a Rich Web Experience | The Fuse Joplin
What you'll love and hate about Windows 10 | InfoWorld
Tips and Tricks On How To Secure Your E-mail Address | The Fuse Joplin
As Cyberthreats Increase, Big Money Chases Solutions - NBC News
Golis: Addicted to our devices | The Press Democrat
NSA Chief: Matter of Time Before Enemies Hack US Power Grid
Anonymous pledges more attacks in Canada | Chatham Daily News
Globes English - Treasury: Fitch outlook downgrade no surprise
Module 2: NOT Encoder
Hope X - Cultures Of Open Source: A Cross Cultural Analysis
Is Ransomware poised for growth? | Symantec Connect
Hackers to probe cybercrime defenses at British banks | The Japan Times
Anonymous targets Ku Klux Klan during latest operation | CSO Online
Basic Authentication and Form Bruteforcing (Intermediate)
City of Ottawa says confident no sensitive details leaked after website hacked | CityNews
Sun News : City of Ottawa website hacked, replaced with cryptic message to cop
Man gets 18 months for hacking into Subway registers Republican American
Ottawa police, Supreme Court websites down after possible hack - Ottawa - CBC News
Anonymous pledges more attacks in Canada | Sudbury Star
PCI Outlines Priorities for Fall NAIC National Meeting
Hope X - North Korea – Gathering Information In The World's Most Restrictive Nation
Hillstone Networks Certifies Next-Generation Firewall With Trend Micro Deep Discovery | Virtual-Strategy Magazine
Ex-Truman sailor gets 2 years in Navy hacking case | |
9 hottest technologies of 2015 »
How to balance freedom with anti-terrorism surveillance: Forum | Canada | News |
Updating Security Operations For The Cloud
Hackers claim responsibility for cyberattack on city of Ottawa website | CTV News
‘No one is safe’: Hacking threat
Hope X - Blinding The Surveillance State
Hacking, hitmen and high stakes in biggest ever cyberwar exercise | The Times
Presenting XKeyscore: What the N.S.A. Is Still Hiding - The New Yorker
Staying Safe from Online Threats This Thanksgiving - Security News - Trend Micro USA
TASS: World - British troops banned from using gadgets due to fear of Russian hackers — media
TECH BYTES: The U.S. Senate voted to oppose freedom - Your Houston News: Blogs
Series of data breaches put holiday shoppers at higher risk... |
City of Ottawa website back after almost 24 hours following apparent hacker attack | Ottawa Citizen
Security Conferences - Security Events - Trend Micro USA - Trend Micro USA
Anonymous Release New Video Warning Ferguson Police And KKK: ‘We Are The Law Now'
Series of data breaches put holiday shoppers at higher risk... |
Apple Pay Rival and Walmart-backed MCX Hacked, User Emails Snatched - Forbes
Challenge 34: XSS 15
The Multimillion ‘Clairvoyance by Mail’ Scam - The Daily Beast
Anonymous pledges more attacks in Canada | Timmins Press
The Savvy Security Leader: Using Guerrilla Tactics to ID Security Pro…
Home Depot Falls After Failing to Raise Forecasts - Bloomberg
Ottawa says no sensitive information leaked in hacking of city website
Update: Purported City of Ottawa website hacker returns to social media | Ottawa Citizen
Hope X - Privacy Friendly Hypertext? Do Not Track, Privacy Badger, And The Advertising Funded Web
F5 Networks' Product Refresh Will Be a Catalyst -
A Peek Inside a POS Scammer’s Toolbox | Security Intelligence Blog | Trend Micro
Fraud fighters offer tips to thwart ever-smarter thieves | The Wichita Eagle
Task 4: Modify Form Fields
TECH BYTES: The U.S. Senate voted to oppose freedom - Your Houston News: Opinion
Happy Holidays (for the bad guys, maybe not for you) -
Attackers Trading Malware for Privilege | CIO
Snowden: NSA collects mass data on New Zealanders - World - NZ Herald News
What you need to know about the Home Depot data breach | CSO Online
Task 17: CSRF Token Stealing
nogotofail- Blackbox network traffic security testing tool | SecTechno
Owasp Appsecusa 2014 - Project Monterey Or How I Learned To Stop Worrying And Love The Cloud
580 CFRA News Talk Radio :: City of Ottawa website hackers threaten to 'deface' Ottawa Police, Supreme Court websites :: News - Article
HP Helps Schools Fend Off Mounting Cyber Threats - Network Security on CIO Today
Kaspersky Lab Careers | Facebook
IDC Spotlight: PBBAs Tap into Key Data Protection Trends to Drive St…
RSA Conference sur Twitter : "If you're planning to attend #RSAC in San Francisco this year, where will you be coming from?"
Review: Cyberoam’s CR10iNG Unified Threat Management appliance | HumanIPO
Expired Antivirus Software No Better Than No Antivirus Software, Study Shows
Motley Fool: Bear case for 'Internet of things"
Can a hacker stop your car?
The US's gun laws are failing its children |
Getting to Know Docker for Distributing and Running Applications
Harry Chats With Ginger Spice Geri At F1 In Abu Dhabi - The Daily Beast
Hacking for nude pics on the rise: Experts | Timmins Press
The Internet of Things (IoT) will fail if security has no context - SC Magazine
The Home Depot Announces Third Quarter Results; Reaffirms Fiscal Year 2014 Guidance - MarketWatch
Hackers pledge more attacks | Ottawa & Region | News | Ottawa Sun
Owasp Appsecusa 2014 - Anatomy Of Memory Scraping Credit Card Stealing Pos Malware
“That’s not a hack…” – 60 Sec Security [VIDEO] | Naked Security
How Constantly Connected Cooks Get Ready for Thanksgiving – Think with Google
Juniper Networks Announces Virtual MX - J-Net Community
The Brazilian Underground: A Market for Cybercriminal Wannabes? - Security News - Trend Micro USA
Your webcam is being broadcast in Russia! Check this list of hacked cameras | SiliconANGLE
Big Data is the New Oil Sand
DoubleDirect MitM Attack Targets Android, iOS and OS X Users
Five Practical Ways to Reduce Your Branch Costs - Cisco Online Seminar - Cisco Systems
The Stacks: Pauline Kael's Talking Heads Obsession - The Daily Beast
Mac vs. PC: Answer is still ‘it depends’
Every Company Needs A Chief Digital Officer | TechCrunch
PLA set up 'PRISM' monitoring in HK: Kanwa - The China Post
What Does The NSA Think Of Cryptographers?
AVG Antivirus latest update now helps scan files faster – adds additional security layers - The REM
Cyber-Breach & NISPOM Conforming Change 2 – It’s What’s on the Inside That Counts (National Industrial Security Program Operating Manual) | The National Law Review
Citizenfour « The Boar The Boar
Ex-US Navy Administrator Sentenced for Hacking | Public Radio Tulsa
$120M in tech support scams shut down by FTC - Redding
Feminist Hacker Barbie Is Just What Our Little Girls Need ≈ Packet Storm
The 12 Scams Of Christmas ≈ Packet Storm
Hackers Leak Thousands Of Possible Gamer Passwords ≈ Packet Storm
Weekend news review: November 17-21
Metasploit: Weekly Metasploit Wrapup: Exploitin... | SecurityStreet
What To Do When Your Email Gets Hacked
Owasp Appsecusa 2014 - Ieee Computer Societys Center For Secure Design
The US's gun laws are failing its children
Watch Out! Your Webcam May Have Been Hacked by a Russian : PERSONAL TECH : Tech Times
Creating a Lasting Impact on STEM Education with Boys & Girls Clubs of America | Symantec Connect
Why is Microsoft updating Windows PCs for a security bug on the server? -
Hacking trees in security zones a mysterious crime - The Times of India
Feminist Hacker Barbie Is Just What Our Little Girls Need | WIRED
The Outrageous Celibacy Requirement for Gay Blood Donors - The Daily Beast
Valérie Trierweiler: hell hath no fury | The Times
Tracking Activity in the Chinese Mobile Underground | Security Intelligence Blog | Trend Micro
Wake County Schools To Ask Students To Bring Electronic Devices | WUNC
x86_64 Assembly Language and Shellcoding on Linux
Wireless Developer Network
Microsoft patches 19-year-old Windows bug - CNE
Florida colleges re-examine security - National/World
HTTP Basic Authentication Attack (Easy)
Owasp Appsecusa 2014 - Red Phish, Blue Phish: Improved Phishing Detection Using Perceptual Hashing
Hacking Highway is no joke in Pike Co. - News - - Stroudsburg, PA
Avast antivirus hangs and slows down computers after Windows 8.1 update |
9 hottest technologies of 2015- The Times of India
Woodstown-Pilesgrove BOE addresses parents' questions on armed security |
Footage from seven hacked Birmingham webcams posted online - can you help alert the owners? - Birmingham Mail
How to live for a month in virtual reality | The Verge
PCI Offers Insurance Tips and Advice to Avoid Roof Collapses as Western New York Digs Out from Major Snowstorms
Is CISSP certification worth the effort? | InfoWorld
Colleges review security after Florida State shooting
PSN, 2K, and Windows Live hack claims by DerpTrolling are reportedly a hoax | Latest Tech News, Video & Photo Reviews at BGR India
CipherCloud Closes $50 Million in Financing to Extend Cloud Security Leadership - Media Releases - CSO | The Resource for Data Security Executives
Icon Labs Announces the Internet of Secure Things Initiative
Usenix Security '14 - Phone Phreaks: What We Can Learn From The First Network Hackers?
Is there any hope against the hackers? - Telegraph
Ex-US Navy administrator sentenced for hacking -
Beth Israel to pay $100,000 fine over data breach - Business - The Boston Globe
POS malware: Potent threat remains for retailers | Symantec Connect
Lynx Introduces New PCI Express Cards
EPA with statins may reduce periprocedural MI in PCI | Cardiology
Man sentenced for role in hacking into financial institutions computers - Business -
CipherCloud Closes $50 Million in Financing to Extend Cloud Security Leadership -- SAN JOSE, Calif., Nov. 19, 2014 /PRNewswire/ --
Security breach reveals personal data on Prince George’s school employees - The Washington Post
Potential Data Breach for the PlayStation Network, Windows Live, and 2K Gaming - mxdwn Games | mxdwn Games News
Convicted ID Thief, Tax Fraudster Now Fugitive — Krebs on Security
Usenix Security '14 - Lightning Talks For The One-Track Mind
Holy Trinity tech director wins national education award
Dell Unveils a Slew of New Enterprise Systems - Communications on Top Tech News
Schools grapple with increased threats | Springfield, OH News |
MIS-Asia - Office 365 admins get spreadsheet search help
Hacking for nude pics on the rise, say experts | Canada | News | Calgary Sun
Hackers work to turn holiday shopping boom into boon for data thieves | KRQE News 13
Houston Dynamo riding "wave of the future" by embracing sports science, data analytics |
Hacking for nude pics on the rise, say experts | Canada | News | Toronto Sun
Google Sends Android to Work with Divide BYOD App - Datamation
Why is Microsoft updating Windows PCs for a security bug on the server? - Computerworld
California man sentenced to 18 months for hacking into cash registers at Subway sandwich shops - Winnipeg Free Press
Pro CS:GO players get caught hacking, handed VAC bans just before annual tournament - Neoseeker
Vallejo Disaster Recovery Center to Close November 25th
Survey Roundup: Optimistic Outlook on Cyberattacks - Risk & Compliance - WSJ
How to keep the world's eyes out of your webcam
Media Release: CipherCloud Closes $50 Million in Financing to Extend Cloud Security Leadership
WebApp Sec: Re: concurrent logins
Lois Lerner Email Messages Recovered, Investigators Say -- 30k Documents Backed Up On Disaster Recovery Tapes
Ex-US Navy administrator sentenced for hacking - Richmond Times-Dispatch: Ap
Ransom malware attacks underscore limitations of anti-virus software | CIO
Usenix Security '14 - Xray: Enhancing The Web’S Transparency With Differential Correlation
Hacked video of sleeping Aussie babies appears on Russian website -
Target Continues Push To Nix Consumer Data Breach Suits - Law360
Russian hackers hijacked webcams included Lexington home
Hackers Just Exposed Thousands Of Gamer Passwords From Sony, Microsoft, And 2K | Business Insider India
Catching up with Yahoo CISO Alex Stamos - SC Magazine
The Evolution of and Need for Secure Network Access
Taking A Bolder Approach To Protect Identities And Endpoints | Symantec Connect
Digital Transformation and IT: The CIO´s balancing act | ZDNet
Why is Microsoft updating Windows PCs for a security bug on the server? | PCWorld
THUNK! News - Awesome Holiday Gifts And Tips From A Pro
Budding Brazilian Hackers Get Online Training from $46 - Infosecurity Magazine
Mobile Data Protection Market Worth $3.54 Billion by 2019 -- DALLAS, November 21, 2014 /PR Newswire UK/ --
Protecting critical healthcare data in the era of 'big data'
Ex-US Navy administrator sentenced for hacking
Don't Worry, Your PSN Account Details Probably Haven't Been Leaked - Push Square
NSA Chief Warns Chinese Cyberattacks Could Shut U.S. Infrastructure - NBC News
Why is Microsoft updating Windows PCs for a security bug on the server? - Techworld
Kaspersky Lab sur Twitter : "Time to #TestYourBrain... do you know the answer?"
Coming soon: Slow, heavy, shrieking, autonomous robot rent-a-cops | Ars Technica
What We Mean by Maturity Models for Security - Dark Reading
ACCES I/O Products Releases Rugged Mini PCI Express Isolated RS232 Serial Communication Cards with Tru-Iso™ Isolation and Extended Temperature | Virtual-Strategy Magazine
Target Corporation (NYSE:TGT) News Analysis: How Target (TGT) Recovered From Last Year's Credit-Card Breach
Man gets 18 months for Subway cash register hacks | FOX10 News |
Swedish appeals court nixes Assange's plea - SC Magazine
Marcio Barbado, Jr. sur Twitter : "@2600 Can you tell potentially dangerous human beings from embodied in-course cataclysms?"
Switzerland May Give Every Citizen $2,600 a Month | Motherboard
Avoid becoming a victim to webcam hackers |
US man sentenced for hacking POS systems at Subway | Network World
Facing up to a water crisis – Global Public Square - Blogs
Protecting your home cameras from hackers
Holiday shoppers nervous about hacking
Court Sends Subway Restaurant Hacker to Jail for 18 Months | WHAV
Soonr Inks Distribution Deal With Nuvotera To Boost Workplace File Sync Product - Page: 1 | CRN
Researchers craft molecule that works as flash storage | Ars Technica
VIDEO: Hackers Snooping on Unsecure Webcams | Video |
PSN, Windows Live, 2K Games & Other Services Hacked By Hacker Group DerpTrolling, Customers Login Details Leaked
In a cloud outage, no one can hear you scream | InfoWorld
ifty sur Twitter : "Relaxing after a hard week including a most excellent CTF/conference @irisscert"
Usenix Security '14 - On The Feasibility Of Large-Scale Infections Of Ios Devices
Man gets 18 months for hacking into Subway and stealing more than $40,000 in gift cards |
USB Armory is the Swiss army knife of security devices | ITworld
Ex-Navy administrator sentenced for hacking
Anonymous proves: Take hacks seriously - Northern Star Online: Scene
Firefox maker remains 'utterly confident' as revenue growth sputters - CNE
Dell Unveils a Slew of New Enterprise Systems - Cloud Computing on Top Tech News
Why Do People Keep Getting Pushed onto Subway Tracks? | VICE | United States
Hundreds of baby monitors and CCTVs hacked: how to keep your cameras safe - News - Gadgets and Tech - The Independent
Ex-US Navy administrator sentenced for hacking - San Francisco Chronicle
Russian Website Hacks Nanny Cams and Baby Monitors | Video - ABC News
Study: Third of employees use company devices for social media and online shopping - SC Magazine
Critical XSS vulnerability addressed in WordPress - SC Magazine
3 Questions to Ask Vendors When Securing POS - BankInfoSecurity
'DoubleDirect' MitM attack affects iOS, Android and OS X users - SC Magazine
The Brazilian Underground Market -
Preventing Another Holiday Season Data Breach – Blog Post – RSA Conference
Experts Predict Retailers Will Face Holiday Hacking Surge - The CIO Report - WSJ
Man gets 18 months for Subway cash register hacks - San Francisco Chronicle
UCF Police increase campus security following FSU shooting
New Malware, NSA Director Statements Shine Spotlight on Mobile Security - The CIO Report - WSJ
IT Departments across EMEA Still Not Ready for the Internet of Things, Finds ISACA Survey | Business Wire
Ransom malware attacks underscore limitations of anti-virus software | CSO Online
Northeast Florida campus security plans in place, yet students likely to still feel unsafe |
FSU shooting prompts review of security in Florida colleges - Sun Sentinel
NSA director states China can shut down U.S. electric grids, report indicates - SC Magazine
Web Shell: PHP Meterpreter
Beth Israel fined $100,000 for patient data breach - Business - The Boston Globe
DerpTrolling Leaks Thousands of Logins for PSN, Windows Live, 2K | SegmentNext
California man sentenced to 18 months for hacking into cash registers at Subway shops
South Florida must lead on climate change - Sun Sentinel
Schneier on Security: Friday Squid Blogging: Cephalopod Cognition
Being Refused CABG a Sign of Extra Risk for PCI Patients With Left Main, Multivessel Disease - Journal News - TCTMD
Has the PlayStation Network really been hacked? Should you change your password? | Naked Security
What SMBs Need to Know About Disaster Recovery as a Service
The Elevation of Privilege (EOP) Card Game
A Quick Look at MS14-068 | BeyondTrust
How to Position IT Security as an Enterprise Profit Center
News Story - Silver Surfer Today
Andy Coulson Walks From Prison After Five Months
USB Armory is the Swiss army knife of security devices - PC World New Zealand
Former Subway Franchise Owner Sentenced to 18 Months in Prison for Gift Card Hacking Scheme at Subway Restaurants
Which Retailers will Profit the Most This Holiday Shopping Season? -
US man sentenced for hacking POS systems at Subway | PCWorld
Kaspersky Internet Security for Android Proves Most Effective in PC Security Labs Test | Kaspersky Lab US
3 Internet of Things Security Nuances You May Not Have Considered
Privacyware Privatefirewall 7.0 Privilege Escalation ≈ Packet Storm
Corporate Call for National Data Breach Standards | Legal Times
PCI-DSS 3.0's Focus on the Data Security Practices of Service Providers | Snell & Wilmer - JDSupra
WordPress SP Client Document Manager 2.4.1 SQL Injection ≈ Packet Storm
Supr Shopsystem 5.1.0 Cross Site Scripting ≈ Packet Storm
Mandriva Linux Security Advisory 2014-223 ≈ Packet Storm
AWS Partner Story: Trend Micro
Registration is Now OPEN for RSA Conference 2015! – Blog Post
PSN, Windows Live, 2K Games User Accounts Leaked By Hacking Group
Google Launches Chrome 39, the 64-Bit Version Mac's OSX : Trending News : Latinos Health
UK National Crime Agency Arrests Hackers Using Remote Access Trojans
Fitch Upgrades Picard BondCo's Senior Notes to 'BB', Affirms IDR at 'B+'| Reuters
Chrysler, Nissan minivans earn 'dire' crash test results, says IIHS [w/video] - Autoblog
Bugtraq: [security bulletin] HPSBUX03087 SSRT101413 rev.2 - HP-UX CIFS Server (Samba), Remote Denial of Service (DoS), Execution of Arbitrary Code, Unauthorized Access
Feds Laud UMaine System as Cyber-Security Education Leader | Maine Public Broadcasting
Just Released 2015 Information Security Policy Documents Available for Download from the Compliance Leaders at | Virtual-Strategy Magazine
Juniper Networks sur Twitter : "Love it when the network surprises us with haikus."
Preparing for the Social Internet of Things
Usenix Security '14 - Security Analysis Of A Full-Body Scanner
Fitch Revises Ibercaja Banco's Outlook to Positive; Affirms IDR at 'BB+'| Reuters
Corporate Call for National Data Breach Standards | Corporate Counsel
(ISC)²® Opens Call for Speakers for Third Annual CyberSecureGov Training Event | Virtual-Strategy Magazine
Dell, Intel Open Doors to New IoT Solutions Lab
TidBITS: Keeping Up with the Snoops 7: Too Many Snoops
TECHNICAL WHITE PAPER▶The Cyber Resilient Enterprise - Harnessing You…
Angus King touts Maine University System’s role in preventing cyber ‘Pearl Harbor’ — Education — Bangor Daily News — BDN Maine
Target to judge: Banks’ losses in our card breach aren’t our problem | Ars Technica
Extracting Insight from Unstructured Data
ENTER PASSWORD_: A supercut of ‘90s cinema hackers · Great Job, Internet! · The A.V. Club
RSA Cloud Identity and Access Management for All of Your Applications - YouTube
Press Release: Russian webcam hackers-authority available for comment
Webcam hacking website based in Cocos Islands prompts warning from privacy commissioner - ABC News (Australian Broadcasting Corporation)
Homeland Security Today: Destructive Malware Evades Detection to Cause Multi-million Dollar Losses
HACKERS can DELETE SURVEILLANCE DVRS remotely – report • The Register
Kent man held in international computer hacking raids | Meridian - ITV News
Car-hacked: Cyber-criminals could target driverless vehicles, cause chaos – expert — RT UK
What tops Target's holiday wish list? Bringing back 'Tarjay'
Tech Data Partners Get Cisco Cybersecurity Solutions
Surveillance Camera Flaw Leaves Hackers in Control - Infosecurity Magazine
Computer hackers arrested in international operation by police - Telegraph
Critical XSS flaws patched in WordPress and popular plug-in | CSO Online
Why Mozilla is scared of Google | The Verge
iX Pro Tip: Using the PR Search Database - J-Net Community
Security is a People Problem, Training is the Solution | SecurityWeek.Com
6 tips for protecting your Internet-connected devices
DoubleDirect: Hackers Redirect High-Traffic Sites Via New MITM Attack
Amazon's AppStream can now stream any Windows application | ZDNet
How a Russian Web site peers into your home, and your baby’s room, by hacking webcams - The Washington Post
Using a password manager on Android? It may be wide open to sniffing attacks | Ars Technica
Bugtraq: [ MDVSA-2014:223 ] wireshark
Bugtraq: [ MDVSA-2014:224 ] krb5
Bugtraq: [ MDVSA-2014:219 ] srtp
Bugtraq: [ MDVSA-2014:220 ] qemu
BillGuard And Experian Partner For Consumer Protection - Forbes
Advisory meeting has a melt-down | All Point Bulletin
Cyberwar is bullshit | The Verge
A bad year for cybersecurity, but a great one for business
Internet to Hit 3 Billion Users in 2015 - eMarketer
FTC shuts down operations of computer repair scammers - SC Magazine
Brigham Young University-Idaho student hacks transcript, earns $7k in scholarships - SC Magazine
DoubleDirect Hackers Snag Device Traffic ≈ Packet Storm
Computer Hijacking Arrests In UK And Across Europe ≈ Packet Storm
PayPal Takes 18 Months To Patch Critical Remote Code Execution Hole ≈ Packet Storm
The Emerging Moral Obligation You Have to People L... - J-Net Community
Executive Cyber Intelligence Report: November 21, 2014
Social Privacy - Online Reputation Protection – Don’t be that Guy
Privacy, rights groups support gov't spyware detection tool - SC Magazine
ACLU requests info on gov't spy program using 'dirtboxes' - SC Magazine
FTC Kills Tech Support Scam Firms That Raked In $120m ≈ Packet Storm
PlayStation Network and Windows Live hack could be a hoax, experts say | Technology | The Guardian
Pro tip: Fixes for common Active Directory connectivity issues on OS X - TechRepublic
Mobile Data Protection Market Worth $3.54 Billion by 2019 -- DALLAS, November 21, 2014 /PRNewswire/ --
Citadel variant targets master passwords, authentication solutions - SC Magazine
VirusBulletin tests 48 antivirus scanner for Windows 8.1 – Avast doesn’t pass |
Android Lollipop: Get All the Sweet Without the Sour -- What Enterprises Need to Know - Innovation Insights
Millions of WordPress websites in danger due to easily exploitable bug
IRISSCON 2014: Security Tales from the Emerald Isle - Infosecurity Magazine
The CRM Lottery
After Decent Quarter, Target's Strategy For The Next Carries Risk - Forbes
Three Wire Systems Buys Hardware Hosting Cage in San Diego | ExecutiveBiz
Incapsula estimates DDoS attacks cost $40,000 per hour | Network World
Family Internet Safety using a Secure Home Internet Gateway: How to Make Your Home Safe for Kids and from Malware | ওয়াশিংটন বাংলা রেডিও Washington Bangla Radio USA
Hackers leak logins from PSN, Windows Live, and 2K Games | SiliconANGLE
Kaspersky Lab sur Twitter : "@thisisdebasish There are a few reasons, which are explained in the article. More about privacy than being unsecure."
Number of cyber security jobs doubles as firms realise hacking threat
FACT SHEET: U.S. Assistance to Ukraine | The White House
Fitch Affirms Novartis AG at 'AA'; Outlook Stable| Reuters
A Forum to Spur America’s Return to Federalism
Ransom malware attacks underscore limitations of anti-virus software - CSO | The Resource for Data Security Executives
Hackers could pose the greatest threat to driverless cars | Concept - Car News Nov 2014 -
Linux Mint 17.1 finally makes MATE's fancy Compiz graphics easy to use | PCWorld
PSN, Windows Live and 2K Gaming networks ‘hacked’: experts recommend immediate password change, though release could be fake - News - Gadgets and Tech - The Independent
Fitch Downgrades AstraZenaca to 'A+'; Outlook Stable| Reuters
Computing Industry Pioneers Announce New Cybersecurity Venture | Business - Press Releases | | The Providence Journal
New Citadel Trojan Targets Your Password Managers
RSA TCO Calculator - EMC
Agenda – RSA Conference
Home Depot tops Street 3Q forecasts; breach costs hazy
The Pueblo Chieftain |Hackers breach webcam privacy
Will Black Friday Spawn Another Massive Data Breach? - Target (NYSE:TGT) - 24/7 Wall St.
Microsoft Azure Outage: What Went Wrong? | IaaS content from Talkin' Cloud
Video: Anonymous hacks Ku Klux Klan Twitter - Telegraph
CIA crypto-king offers new 'clock' clue to crack Kryptos code • The Register
Russians Hacking Webcams; FTC Ends Tech Scams; Tracking Comcast Techs | News & Opinion |
Is New Zealand Spying on Citizens? Greenwald vs Key | Top Secret Writers – Conspiracy Theory, Strange Stories and Truth
Apple Blocks Flash Player Over Security Issues - The Mac Observer
Driverless cars! They might get hacked! | BitterWallet
Russian webcam hacking website which shows feed apparently from Canterbury pub or bar
Homeland Security Today: Response Time is the Key to Mitigating Data Breaches, Survey Finds
Apple pushes Flash Player update to address security issues | 9to5Mac
What’s Missing from the Industrial Internet of Things Conversation? Software | WIRED
How to Protect From Webcam Hackers: Video - Bloomberg
Mark Fulford - Authors & Columnists - Dark Reading
Target customers and profits are back after hack | Money - WYFF Home
Top 8 enterprise network and security trends for 2015 - ITWeb Africa
Barracuda Offers Integrated Security; Boosts Portfolio with Consolidated Network and Content Security... -- CAMPBELL, Calif., Nov. 20, 2014 /PRNewswire/ --
Retail Security Not Getting Any Better, BitSight Study Finds
IBM Rolls Out Analytics-Based Security Solution - Big Data on CIO Today
Module 2: Class-Dump-Z
HP, Symantec team on Disaster Recovery as-a-Service offering based on Helion OpenStack
Norton Holiday Sale | Norton
3 Mobile Security Myths That Can Hurt You | FedTech Magazine
Usenix Security '14 - The Emperor’S New Password Manager: Security Analysis Of Web-Based Password Managers
Anonymous hackers to Ferguson police: 'We are the law now' - Washington Times
Facebook at Work: Here's what you need to know - TechRepublic
(ISC)²® Opens Call for Speakers for Third Annual CyberSecureGov Training Event
Four held in computer hacking probe | Daily Mail Online
Ventiv Technology's chief information security officer now reports to CEO - BWWGeeksWorld
RSA Security Analytics - EMC Store
Which Is It: Privacy vs. Security, or Privacy and Security? – Blog Post – RSA Conference
Distribution Watch: Accu-Tech, Synnex, Tech Data | Distribution Watch content from The VAR Guy
Four Held In UK Amid Crackdown On Hacking
Customers are over Target's 2013 holiday data breach - Albany Business Review
The Daily Tar Heel :: Tarheel Takeout data hacked
NSA Chief Concerned about Cyber Attacks on U.S Critical Infrastructure
Zero Day Weekly: WhatsApp, Blackphone, Citadel hits password managers | ZDNet
Britain urges Russia to shut down webcams
Australian baby monitors and webcams hacked as footage appears on a Russian website
Web Site Shows Feeds from Thousands of Private Webcams - Network Security on CIO Today
Experts: Home, baby cameras not secure worldwide - WTVQ
Hackers use webcams to spy on homes and businesses (From Daily Echo)
Man guilty in Hidalgo County attempted hacking - Houston Chronicle
Local news from Bellingham, Whatcom County, WA |
Hackers use webcams to spy inside homes of Middlesbrough families and broadcast video live to internet (From The Northern Echo)
Bugtraq: [ MDVSA-2014:218 ] asterisk
DoubleDirect hackers snaffle fandroid and iPhone-strokers' secrets • The Register
Video: How to protect yourselves from Russian webcam hackers - Telegraph
Target will ask judge to toss bank suits over breach - Minneapolis / St. Paul Business Journal
Want to beat auditors and adversaries? Think like an attacker | Government Health I
Website shows hacked private webcams, including several in Greensboro and High Point |
Britain urges Russia to shut down webcam spying site
Russians easily 'hack' webcams, like others have for YEARS | Computerworld
Australian baby monitors and webcams hacked |
Want to know how to shop safely on Black Friday and Cyber Monday? Join our Twitter chat! | Naked Security
Symantec Intelligence Report - October
Trend Micro Security Predictions | The Invisible Becomes Visible
Liverpool teen questioned by detectives as part of European-wide computer hacking investigation - Liverpool Echo
How to use an authenticator app to improve your online security | ZDNet
Barracuda Offers Integrated Security; Boosts Portfolio with Consolidated Network and Content Security Solution - MarketWatch
How hacking the sounds in your head could be the key to happiness - Telegraph
Examining 1 billion transactions for fraud
Hikvision DVRs sporting bugs that allow device hijacking
Raising awareness quickly: Holiday tips and tricks | CSO Online
Andy Coulson freed from prison after just five months | Daily Mail Online
Video: Three held in Leeds over international computer hacking UPDATED - Yorkshire Evening Post
Phone-hacking editor Andy Coulson out of prison after five months
Uber taken to task over anti-journalist privacy debacle | Naked Security
WebApp Sec: AW: concurrent logins
Technology News & Electronic Updates | Electronics Weekly
How to troubleshoot performance issues in SharePoint custom code on your own? Part 4 – Tools Summary - SharePoint Developer Support Team Blog - Site Home - TechNet Blogs
Three held in Leeds over international computer hacking - Yorkshire Post
Former News Of The World Editor Andy Coulson Released From Prison
You want driverless cars? We need to sort out hacking first | Irish Examiner
You want driverless cars? We need to sort out hacking first |
Hacking major threat to driverless vehicle adoption - E & T Magazine
Technology is still a distraction for drivers
WiDy: Motivation and Goal
Black Friday Themed Amazon Voucher Scam
FBI offers $1 million reward for anybody who can help catch online car scam fugitive | Naked Security
Paul Hearns sur Twitter : "Leon van der Eijk of the Honeynet Project demos user account hack at #irisscon"
Usenix Security '14 - Automatically Detecting Vulnerable Websites Before They Turn Malicious
Phone-hacking editor Andy Coulson released from open prison to serve home detention - Crime - UK - The Independent
Andy Coulson released from prison on electronic tag - Telegraph
Grocers, retailers gobble up Apple Pay in time for holidays | Computerworld
Techbytes: Russian Hackers Tap Into Nearly 5,000 US Web Cams | Video - ABC News
Microsoft Says Config. Change Caused Azure Outage | Data Center Knowledge
Four held in computer hacking probe -
Welcome back, Andy Coulson. Let me tell you about life after prison | Denis MacShane | Comment is free |
NDB Advisory Announces Expansion of Edmonton, Alberta PCI QSA Services for Canada Merchants and Service Providers
The 12 scams of Christmas | ZDNet
NotCompable sets new standards for mobile botnet sophistication | CSO Online
Governments act against webcam-snooping websites | CSO Online
Apple iOS Masque flaw dangers: Legitimate app infiltration discovered | ZDNet
Cyber PreCogs? What Do the Next 2-3 Years Hold For Us? -
Why CIOs Need to Embrace New Norms of the Hybrid Cloud | CIO
$120M in tech support scams shut down by FTC -
AVG Bloggers Brunch 2014
MIT, Stanford, Land Major Cyber-Security Funding Injection
WebApp Sec: RE: concurrent logins
Hackers Leak PSN, 2K, Windows Live Accounts, Reset Passwords Now
Android 5.0 Lollipop review - reviews for UK IT professionals -
$120M in tech support scams shut down by FTC -
DerpTrolling leaks PSN, 2K, Windows Live customer logins - CNE
BBC News - World Internet Conference: Has China overcome paranoia?
How to troubleshoot performance issues in SharePoint custom code on your own? Part 3- Slow - SharePoint Developer Support Team Blog - Site Home - TechNet Blogs
$120M in tech support scams shut down by FTC - 23ABC News
Hacking Group May Be Linked to Russian Government, Report Says - Businessweek
PSN and Windows LIVE passwords leaked, Twitter and Facebook may be next -
7 Questions About The President's Immigration Plan Answered | NCPR News
PSN, Windows Live and 2K accounts allegedly compromised – change your passwords | VG247
Users of Remote Access Trojans arrested in Europe
Detekt — Free Anti-Malware Tool To Detect Govt. Surveillance Malware West Africa: Testimony of Assistant Administrator Nancy Lindborg Before the Senate Committee On Homeland Security and Governmental Affairs
Business Continuity Institute publishes a ‘Working Paper’ about organizational resilience
Why Online Privacy Protection Is Not Just About the NSA | Sanjay Sanghoee Directory of Businesses Jobs Press Releases Products Services Articles - Find Companies
Sophos launches Cloud Server Protection - ARN
Russian hackers posting footage from hacked web cams - WWMT - News, Sports, Weather, Traffic
Hacking group leaks PSN, Windows Live customer data | Attack of the Fanboy
BBC News - Chinese authorities arrest three over iOS malware
Wake Co. Schools Asking Students to Bring Their Own Smart Device to School - Time Warner Cable News
Ebola, hackers drive word of the year: 'Exposure' - CNE
Researchers Shine Spotlight on OS X/iOS Masque Attack | Malware | TechNewsWorld
Using company devices for personal activities leads to data loss
ITIL and ISO 20000 problem management
Scenario Based Haccking - Powershell And Mimikatz And Meterpreter
ESG Lab Review: Protecting Virtual Environments with Symantec Backup Exec 2014 - ESG Research - Enterprise Strategy Group
Spy cable revealed: how telecoms firm worked with GCHQ - Channel 4 News
Russia Hacking Into Cameras Across the World
AM - Worldwide webcam hack by Russian site 21/11/2014
Android phones turned into slave armies by hackers - The Times of India
Thomas J. DeMayo, CISSP CIPP/US CPT CEH CHFI MCSE, Director, IT Audit and Consulting, O’Connor Davies, LLP to Speak at the Knowledge Group’s Cyber Security Plans Event -
WhatsApp adds end-to-end encryption using TextSecure | Technology | The Guardian
Financial services cyber trends for 2015
Wireless attacks against 'air gapped' targets are possible, Israeli team claims
MySQL Injection: Comments On Comments | Symantec Connect
Police probe local webcam hacking fears - Hartlepool Mail
House committee asks for details on State Dept breach - SC Magazine
Assembly Language and Shellcoding on Linux « SecurityTube Trainings
My Week | SumAll
Bugtraq: WordPress 3 persistent script injection
These hackers wear white hats | Albuquerque Journal News
British Watchdog Wants Russian Hacking Site Shut
Hackers Can Steal Data Wirelessly From PCs That Aren't Even Online - Bloomberg
Enable the Agile Data Center | Symantec
Driverless cars could be hacked by terrorists, warn transport experts - Telegraph
Driverless cars a 'terror risk' -
PayPal takes 18 months to patch critical remote code execution hole • The Register
Bugtraq: AST-2014-013: PJSIP ACLs are not loaded on startup
Bugtraq: AST-2014-012: Mixed IP address families in access control lists may permit unwanted traffic.
Driverless cars could face threat from hackers trying to cause road chaos | Technology | The Guardian
How to decide between a $199 Windows notebook and a Chromebook | ZDNet
Prioritize security efforts with a data-centric approach - The Business Journals
Hackers turning Android smartphones, tablets into slave armies - IBNLive
Windows 10 Technical Preview updated, boasts 7,000 changes and fixes - CNE
The moral mire of not patching Windows XP | pcpro
A cause for Internet hacking: Anonymous vs KKK - The Daily Athenaeum Online: Opinion
Baby monitors, CCTV cameras and webcams from UK homes and businesses hacked and uploaded onto Russian website - Gadgets and Tech - Life and Style - The Independent
Bugtraq: AST-2014-017: <font size="3" style="font-size: 12pt">Permission escalation through ConfBridge actions/dialplan functions</font>
Bugtraq: AST-2014-016: Remote Crash Vulnerability in PJSIP channel driver
Target Fights to End Bank Suits a Year After Data Breach - Bloomberg
Enterprise software vendors go freemium: It's all about the long tail | ZDNet
‘Citizenfour’ goes inside the mind, motives of Edward Snowden (B+) | Dallas Morning News
Russian Hacker Site Leaks Footage from 70000 Webcams Around the World - Saving Advice Articles
Mobile Cloud Security: What CXOs Need to Know
Remote Code Execution - Powerpoint - 2013 Exploit - Cve-2014-4114 Ms14-060
The Other Side of Masque Attacks: Data Encryption Not Found in iOS Apps
Target Fights to End Bank Suits a Year After Data Breach - Businessweek
Hackers can access personal security systems, post video online | Local News - WISN Home
Snowden’s story exudes agitation of political thriller
Tool launched to detect government surveillance spyware on your computer - Telegraph
Malware don't need Coffee: CVE-2014-8440 (Flash up to and Exploit Kits
Data Breach Developments in California (Part 1) | The National Law Review
Apple security checks may miss iWorm malware - CSO | The Resource for Data Security Executives
Avoiding the Bait: Tips to Protect Yourself Against Phishing Scams
Uber, facing public backlash, will rethink privacy | CSO Online
Consumers urged to protect themselves from data breaches | Special Reports - WMUR Home
Tor's feral fans are its own worst enemy | ZDNet
NSA director admits U.S. power grid is not safe from Chinese hackers | The State Column
A New Service Will Help You Wrest Your Online Identity From Google | WIRED
Critics storm Poland's electoral body over delays
Changing Default Passwords Prevents Hacking in Cameras -
$120M in tech support scams shut down by FTC - 7NEWS Denver
NATO's Cyber War Games Amid Surge In Attacks
Russian-based hackers stream videos from baby monitors, home security cameras and webcams online | Financial Post
Webcam hacking site back online
Self-Healing Virtual Machines Coming To Datacenter Near You? | CloudWedge
Malware’s new target: your password manager’s password | Ars Technica
Suit Filed Over Jimmy John's Data Breach | National Law Journal
Internet governance & cyber security highlighted - CCTV News - English
Critics storm Poland's electoral body over delays - World - NZ Herald News
Webcam owners beware of hackers and change your password, warns the UK's technology tsar - Mirror Online
World // Russian Hackers Compromising U.S. Security | Houghton Star
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER • The Register
Citadel Trojan snooped on password managers to snatch victims' logins • The Register
Owasp Appsecusa 2014 - Headless Browser Hide And Seek
Kaspersky Lab sur Twitter : "Hold on... the weekend is near!"
Cyber-security 'critical' to market - Yahoo News UK
Why you should add application virtualization and streaming to your c…
China arrests three over WireLurker iOS malware attack- The Inquirer
Tech Data Offering Cisco Next Generation Network Security Solutions Nasdaq:TECD
Cyber Arms Dealers Peddle 85 Worms a Day -
Opinion: Cyber arms control? Forget about it -
Chinese APT Campaigns May Be More Connected Than Previously Thought
'Masque Attack' Vulnerability Allows Malicious Third-Party iOS Apps to Masquerade as Legitimate Apps - Mac Rumors
Apple Responds to 'Masque Attack' Vulnerability, Not Aware of Customers Affected by Attack - Mac Rumors
Where Do Cyber-Weapons Come From? Try a Cyber Arms Dealer -
Tor Project responds to NSA’s Xkeyscore tracking of visitors | BetaBoston
RSA Conference 2014: Celebrating Milestones, (ISC)² also Revamps its CISSP Exam - Infosecurity Magazine
Should you lose sleep over losing sleep over the economy? | BetaBoston
How the NSA's XKeyscore program works - NBC News
Review: The CISSP Companion You Can’t Do Without - Infosecurity Magazine
Sweden's Intelligence Agency has Access to NSA's XKeyscore system - Infosecurity Magazine
FTC on PC malware security scams: How to avoid fake security programs | BGR
Finally, a New Clue to Solve the CIA's Mysterious Kryptos Sculpture | WIRED
Liferay Portal 6.2 EE SP8 Cross Site Scripting ≈ Packet Storm
Asterisk Project Security Advisory - AST-2014-012 ≈ Packet Storm
Asterisk Project Security Advisory - AST-2014-013 ≈ Packet Storm
4 Ways Your Competitors Are Stealing Your IT Talent | CIO
Microsoft Internet Explorer OLE Pre-IE11 Code Execution ≈ Packet Storm
libCryptoLog 0.1 ≈ Packet Storm
Red Hat Security Advisory 2014-1880-01 ≈ Packet Storm
Separating Hype from Reality SDN in the Financial Services Market | SevOne - Network Performance Management & Monitoring for Your Entire Infrastructure
Site Undergoing Maintenance
Privacy advocates release free 'Detekt' tool that finds surveillance malware | PCWorld
AWS re:Invent 2014 Wrap Up -
Thousands Of Facebook Users Fall For 'Free Audi R8' Scam
Russian 'Satellite Catcher' Test a Step Toward Advanced Cyber Attacks?
What Makes Washington 'Imperial'? | Tom Engelhardt
Cyberwar: Kaspersky identifiziert die ersten fünf Stuxnet-Opfer -
Obama Will Halt Deportation Of Up To 5 Million Immigrants | NCPR News
Human Rights Organizations Launch Free Tool to Detect Surveillance Software - Business & Technology - AllMediaNY
Hackers 'Spying On British Webcams And Baby Monitors'
Wie fand der Stuxnet-Computerwurm seinen Weg in iranische Urananreicherungsanlagen :: AD HOC NEWS
Cybersecurity Expert Peter Singer to Keynote Cyber-risk Conference at DePaul University on December 2
Challenge 35: XSS 16
We can't easily shut down Russian webcam hackers, admits Information Commissioner - News - Gadgets and Tech - The Independent
Closed Circuit Camera Hacking Finds Way To Western Mass - Western Massachusetts Breaking News and First Warning Weather with ABC 40
HTC Nexus 9 Tips And Tricks: Android 5.0 Features, Accessories, Speakers, User Accounts, Software Update - International Business Times
Inside The Hacker's Head: How Cyber-Criminals Look For Opportunities To Wreak Havoc | BCW
Do I need anything besides Windows Defender? | Cyber Trust Blog
AWS re:Invent Round Up -
$120M in tech support scams shut down by FTC - News Sentinel Story
Community news from Biloxi and Gulfport, MS | Sun Herald
Healthcare’s Big Data Opportunity | TechCrunch
Owasp Appsecusa 2014 - Hacking The Oracle Application Framework
Citadel malware attacking open source password managers | ZDNet
Russian hackers hijack webcams worldwide — including at least four in Ottawa | Ottawa Citizen
How To Catch A Cattle Thief | New Hampshire Public Radio
Foreign Governments Have Hacked U.S. Grid, NSA Head Says - Bloomberg
IBM Rolls Out Dedicated Bluemix, Cloud Foundry-Based PaaS
Sophos expands cloud-managed security portfolio with server protection - Media Releases - CSO | The Resource for Data Security Executives
BlackBerry Gets Ready for Internet of Things With BES12 and Project Ion (BBRY)
Australian baby monitors and webcams hacked as footage appears on a Russian website
12 recent data breaches
Report: Government Has Only 5 Years To Secure Internet of Things -
Facebook's privacy blunders may trip up potential enterprise push | Computerworld
Risk of Adverse Outcomes Increase With PCI In Adults With Diabetes
Poland opens probe into electoral hacking - Newsday
Bradenton Local News | Bradenton Herald & Lakewood Ranch Herald
$120M in tech support scams shut down by FTC -
Ukrainian, Western experts debate how to stop Putin
Polish election commission website hacked | World, News, The Philippine Star |
NSA Director: China can damage US power grid - Pacific - Stripes
Exploiting Echo Server v3 Part 1
FTC smackdown! More fake support scammers taken out… | Naked Security
Drupal addresses denial-of-service, session hijacking vulnerabilities - SC Magazine
Malicious banking apps in Google Play target Brazilian Android users - SC Magazine
NSA Director Says Chinese Cyber Hackers Can Shut Down U.S. Power Grid
iTWire - Website hosted in Russia shows global unsecured security cam feeds
We compare BitDefender Antivirus with Panda Global Protection 2014
How to Tame Your Mobile Security Dragon
Android malware 'NotCompatible' evolves, spawns resilient botnet - SC Magazine
Life in the Digital Crosshairs
Gaming Will Level Up The Network - Network Computing
Website live streaming unsecured webcams
Why Palo Alto Networks Rallied 87% in 2014 (PANW)
The Detekt government spyware detection tool, a speech recognition software competition, and Google acquires RelativeWave—SD Times news digest: Nov. 20, 2014 - SD Times
FTC shuts down two more tech-support scammers
The Android 5.0 Lollipop aam aadmi review: I think I’ve made a terrible mistake | The Indian Express
Webcast: Preparing for Big Data and the Internet of Things - Websense Insights
Uber tracking raises privacy concerns
Businesses Prepare as End-of-Life for Windows Server 2003 Nears — BizTech
NSA chief admits China could cripple U.S. power grid, financial networks | ZDNet
Nexus 9 vs Nokia N1: Buy now or wait a bit longer? | Christian News on Christian Today
Halifax homes spied on by camera hackers - Halifax Courier
Customers Aren't Worried About Data Breaches [Infographic]
Foreign Governments Have Hacked U.S. Grid, NSA Head Says - Businessweek
Firing Range — Open Source Web App Vulnerability Scanning Tool From Google
Activity Info
Schneier on Security: Pre-Snowden Debate About NSA Call-Records Collection Program
SC Congress Chicago 2014: Make FBI an ally after breach - SC Magazine
Survey: Breaches don’t change consumer behavior | Chain Store Age
Actiance Recognized in Gartner 2014 Magic Quadrant for Enterprise Information Archiving
Apple’s Mac computers can automatically collect your location information - The Washington Post
Federal Trade Commission busted two telemarketing schemes selling fake tech support, raking in $120 million.
Imperva Expands Big Data Protection with SecureSphere 11.0 - MarketWatch
Microsoft Patches Critical Windows Server Flaw - Microsoft/Windows on Top Tech News
AVG Protection PRO Review & Rating |
Antivirus Comparisons: Kapersky Antivirus vs. G Data Total Protection
How to protect yourself online - B
NSA director predicts major cyberattack by 2025 -- FCW
Avast Free AntiVirus vs AVG AntiVirus - Which Free Antivirus is best for you
Owasp Appsecusa 2014 - Your Password Complexity Requirements Are Worthless
Buffer overflow vulnerabilities identified in Hikvision DVR devices - SC Magazine
Open-source IaaS: OwnCloud 7 Enterprise Edition arrives | ZDNet
Forty-two Senators Block USA Freedom Act to Limit NSA Surveillance
Lawmaker: Delayed notification of postal hacking ‘doesn’t fly’ - The Washington Post
Google Online Security Blog: Ready, aim, fire: an open-source tool to test web security scanners
USPS draws ire of Congress over data breach response - SC Magazine
New Strategies and Features to Help Organizations Better Protect Against Pass-the-Hash Attacks | Cyber Trust Blog
Hackers use radio signals to steal private information from PCs OFFLINE | Daily Mail Online
NSA Director Worries Some Nations Hacking Into Computer Networks to Shut Down US Utilities - ABC News
Actiance Recognized in Gartner 2014 Magic Quadrant for Enterprise Information Archiving - Press Release - Digital Journal
Amazon promises to run entirely on renewable energy... finally | ZDNet
NSA director confirms China, other countries can hack into and shut down critical systems - 11/20/2014 10:24:02 AM | Newser
U.S. Cyber Commander Expects Attack Before 2025Talk Radio News Service
Brazil doubles down on cyber security

 | openDemocracy
More Scare Tactics From the Government Regarding Apple’s Super Secure iMessages | PadGadget
Viptela Partners With Zscaler in Industry-First Integration of SD-WAN and Cloud Security Infrastructure
Australian Government Data Breach Linked to Poor Security Training - eSecurity Planet
TalkRadio 790 KABC - How Russian Website Is Spying on Thousands of Private Moments [From ABC News]
IT needs to stop pretending it's not responsible for cloud security | Computerworld
Move Your Network to the Cloud - YouTube
Five Steps to PCI DSS Compliance
Security or Checking a Box?
Financial Times: NATO holds largest cyber war games
USPS delayed breach notification so as not to tip off hackers - FierceGovernmentI
Russian Webcam Hackers Spy on Bedrooms and Offices - NBC News
Azure vs. AWS | IT World Canada Syndicated
Russian hackers streaming video from thousands of private webcams |
Amazon Vows to Run on 100 Percent Renewable Energy | WIRED
New crash tests reveal which minivans are safe -
Risk of Adverse Outcomes Up With PCI In Adults With Diabetes --Doctors Lounge
Mobile Internet Faces Big Obstacles - Network Computing
Juniper Networks sur Twitter : "We’re thrilled to win the @TSIACommunity STAR Award for Innovation in Enabling Customer Success in Support Services!"
Access Governance 101: Job Changes and Elevated Permissions
Greek Hackers Breach Legal Database |
Gartner's cloud showdown: Amazon Web Services vs. Microsoft Azure - ARN
How to reduce your risk of a cyber security breach - The Business Journals
Poland Opens Probe Into Electoral Hacking - ABC News
Polish election commission website hacked
Owasp Appsecusa 2014 - Clientside Security With The Security Header Injection Module Shim
High volume DDoS attacks rise in Q3 2014 | ZDNet
PCI helps kids globally | Portage Daily Graphic
Verizon enhances cloud purchasing experience with new marketplace - FierceTelecom
Russian-backed website hacks into thousands of webcams in U.S. - CBS News
Hackers to probe cyber crime defences at British banks| Reuters
Cyberspace calls for better coordinated governance | Shanghai Daily
ESPN Student Reporter Makes Jameis Winston Joke During FSU Shooting, Claims Hacking
Hackers post webcam, security camera, baby monitor video online - Technology & Science - CBC News
Can Hackers Get Into Your Pacemaker? - The Atlantic
Enter The Digital Risk Officer
Russian Hackers Posting Baby Monitors, Web Cams Online
Exploiting Sudo's Grace Period ≈ Packet Storm
Paid Memberships Pro Path Traversal ≈ Packet Storm
CryptoPHP - Analysis Of A Hidden Threat Inside Popular Content Management Systems ≈ Packet Storm
RSA Conference sur Twitter : "The mantra of any good security engineer is: 'Security is a not a product, but a process.' -@Bruce_Schneier"
Detekt government surveillance spyware on your computer
Bugtraq: [SECURITY] [DSA 3075-1] drupal7 security update
Swedish Court Rejects Julian Assange's Appeal to Dismiss His Arrest | WIRED
Hackers blamed for unusual tweets from Jeremy Clarkson, Columbian FARC rebels | Naked Security
FireEye: A Next-Generation Cyber Security Play - FireEye, Inc. (NASDAQ:FEYE) | Seeking Alpha
Mandriva Linux Security Advisory 2014-217 ≈ Packet Storm
WordPress CM Download Manager 2.0.0 Code Injection ≈ Packet Storm
Advantech AdamView 4.3 Buffer Overflow ≈ Packet Storm
Spotlight Secure - Actionable threat intelligence - J-Net Community
Secure Apps & Mobile Devices – Don’t be that Guy – Trend Micro
Team heads to cyber war competition - News - Pekin Daily Times - Pekin, IL
Russian website allows webcam hackers to spy on British families in their own homes | UK | News | Daily Express
The Dridex Threat: How to Block the Latest Malware Aimed at Banks - American Banker Article
Review: Shane Harris' book '@War' details rising military-Internet link - LA Times
Imperva Expands Big Data Protection with SecureSphere 11.0 - Media Releases - CSO | The Resource for Data Security Executives
CSA Guide to Cloud Computing: Implementing Cloud Privacy and Security: Raj Samani, Jim Reavis, Brian Honan: 9780124201255: Books
Red Hat Security Advisory 2014-1876-01 ≈ Packet Storm
Red Hat Security Advisory 2014-1877-01 ≈ Packet Storm
Ubuntu Security Notice USN-2410-1 ≈ Packet Storm
Keeping the Bots at Bay: How to Detect Brute Force Attacks
Forrester's Best of the Best in Private, Public Cloud Space
There Will Be Surveillance Reform | Just Security
How to protect yourself from PC tech support scams | PCWorld
FireMon Extends Network Security Monitoring to Cloud Service Infrastructure
Schneier on Security: Citadel Malware Steals Password Manager Master Passwords
Amnesty / EFF Launch Detekt Tool To Spot Web Snooping ≈ Packet Storm
CAPTCHA Rapture As 'Thousands' Affected By 7 Year Old Bug ≈ Packet Storm
Russian Site Lists Breached Webcams ≈ Packet Storm
What will cybersecurity look like in 2025?, Part 3: How Microsoft is shaping the future of cybersecurity | Cyber Trust Blog
Local news from Rock Hill, SC | The Herald
SANS Securing The Human | American vs. European Reporting - Creating a Sense of Urgency
Russian hackers are turning your webcams without you knowing | Metro News
Critical infrastructure vulnerable to hackers | Russia Beyond The Headlines
Gartner mages: And the Enterprise Archiving Magic Quadrant top spot goes to... • The Register
Russians Hacking Into Home Webcams Sparks U.K. Warning - Businessweek
How to Protect Yourself From a Data Breach | TV - WMUR Home
Review: Snowden documentary ‘Citizenfour’ steeped in real-time anxiety - Go Knoxville Story
Charles Dance: 'I was a phone hacking victim' | Showbiz | News | Daily Express
Trend Micro Collaborates with Latin American Leaders on Cybercrime -
Webcam hack uncovered: how you can protect yourself| News | The Week UK
Hacking Cava Grill: How to order nachos - The Washington Post
Cyberdefender who cut his teeth in Worcester sounds alarm on hackers - Worcester Telegram & Gazette -
US strikes massive tech support scam - CSO | The Resource for Data Security Executives
Court shuts down tech support 'scams' targeted by FTC | PCWorld
Data breach at Triangle food-takeout shop unique because of its size - Triangle Business Journal
Ransom malware attacks underscore limitations of anti-virus software -
Yahoo Replaces Google as Mozilla Search Partner | Re/code
SANS Institute Brings Information Security Training Back to the Big Easy with SANS Security EAST 2015 | SANS Institute: Press
Russian website posting live video streams from hacked webcams
Russian webcam hackers spy on bedrooms and offices
Enterprise Mobile Dollars Pouring To iPhone |
Hacked footage from BABY MONITORS, webcams and CCTV systems in Britain being broadcast LIVE on Russian website - Mirror Online
Do you know who's watching you through your webcam and CCTV? | Irish Examiner
Minivans show major flaw in IIHS safety test
Got a webcam? You might want to pick a stronger password right about now | ZDNet
Tufin Adds Support For Amazon Web Services, Delivers Security Policy Orchestration For Public, Private And Hybrid Cloud Environments - BWWGeeksWorld
Warning as webcam hackers stream live footage from Manchester homes, businesses and gym on the internet - Manchester Evening News
Warning on webcam 'spying' site « Express & Star
BBC News - Breached webcam and baby monitor site flagged by watchdogs
Warning on webcam 'spying' site « Shropshire Star
Target says customers are over last year's data breach - Triangle Business Journal
Webcam hackers spy on Scots homes and post footage on Russian website | Glasgow & West | News
Russian website streams thousands of private webcams - Nov. 20, 2014
Warning on webcam 'spying' site -
Owasp Appsecusa 2014 - Ios App Integrity: Got Any?
Module 1: GDB TUI Mode
Digital Journal: A Global Digital Media Network
Idaho student busted for hacking himself straight-As: cops - NY Daily News
Webcam hackers 'spying inside British homes' - Channel 4 News
Staples Still Tallying Costs of Data Breach
Barracuda Offers Integrated Security; Boosts Portfolio with Consolidated Network and Content Security Solution
Information Security News: SMS pwnage on MEELLIONS of flawed SIM cards, popular 4G modems
Information Security News: Report: Government Has Only 5 Years To Secure Internet ofThings
Carnegie Mellon hosts expert panel on cyber security - Zawya
Ocoee High starts cyber-security team - West Orange Times & Observer - West Orange Times & Observer
RSA Conference APJ Day 1 Recap – Blog Post
How to delete your old, embarrassing, now-much-easier-to-find tweets | Naked Security
Selling disaster recovery -
Comprehensive FISMA and NIST SP 800-53 Information Security Policies and Procedures Now Available for Instant Download from the Experts at Flat Iron Technologies, LLC
ZDNet | Symantec
Lowe's scores big in earnings | The Journal Gazette
3 Reasons Why Lowe's (LOW) Will Outperform Home Depot (HD) Over The Next Few Days
Hackers turning smartphones into slave armies
Is Home Depot Still Hot After Earnings? - Home Depot, Inc. (NYSE:HD) | Seeking Alpha
HD: Buy Home Depot Despite Its Data Breach | InvestorPlace
The Morning Download: Post-PC CEO Reflects Starwood’s Deeper Mobile Shift - The CIO Report - WSJ
Hackers Streaming Brits' Private Webcams