NetSecu
NetSecu

www.yourhoustonnews.com
www.yourhoustonnews.com
Cyber-security expert offers 10 tips to safeguard your information - Your Houston News: Living
www.hindustantimes.com
www.hindustantimes.com
Sony case underlines cyber security needs for India - Hindustan Times
blog.trendmicro.com
blog.trendmicro.com
The Ultimate Goal of Digital Attacks -
us7.campaign-archive2.com
us7.campaign-archive2.com
NEW Infosec Pro Weekend Bootcamp – OH YOU GOTTA SEE THIS!!!!
www.securitytube.net
www.securitytube.net
Recon 2013 - Teridian Soc Exploitation: Exploration Of Harvard Architecture Smart Grid Systems
thatguy.trendmicro.com
thatguy.trendmicro.com
Phishing Scams & Identity Theft Protection – Don’t be that Guy – Trend Micro
www.rsaconference.com
www.rsaconference.com
Martin Roesch – Speaker – RSA Conference
www.trendmicro.com
www.trendmicro.com
You Better Watch Out, You Better Not Click: Holiday Movie Threats - Security News - Trend Micro USA
www.scmagazine.com
www.scmagazine.com
An epic ride: A look back at the ever-changing information security industry - Print Article - SC Magazine
www.darkreading.com
www.darkreading.com
2014's Top Malware: Less Money, Mo' Problems
www.usatoday.com
www.usatoday.com
Staples data breach unlikely to dampen holiday shopping
www.securitytube.net
www.securitytube.net
Recon 2013 - Hardware Reverse Engineering Tools
www.zawya.com
www.zawya.com
Mobily's Solutions for Business Continuity Enables the Business Sector to Recover from Technical Disasters within Few Minutes - Zawya
www.securitytube.net
www.securitytube.net
Pillarbox: Combating Next-Generation Malware With Fast Forward-Secure Logging
www.informationweek.com
www.informationweek.com
7 Tips: Work Fitness Into The Workday - InformationWeek
www.networksasia.net
www.networksasia.net
Ensuring business continuity and building opportunities | Networks Asia
imgur.com
imgur.com
Permission. File Permissions. - Imgur
www.upi.com
www.upi.com
Top News, Latest headlines, Latest News, World News & U.S News - UPI.com
www.securitytube.net
www.securitytube.net
Formal Analysis Of Security Procedures In Lte - A Feasibility Study Noomene Ben Henda; Karl Norrman
www.youtube.com
www.youtube.com
+The Backup of Destiny [Official Trailer] | Symantec - YouTube
www.securitytube.net
www.securitytube.net
Hackfest 2014: Renderman Aka Brad Haines Presented "They Are Doing What! With Air Traffic Control?"
www.theatlantic.com
www.theatlantic.com
The Problem With the Plan to Give Internet Access to the Whole World - The Atlantic
nknetobserver.github.io
nknetobserver.github.io
Your Friendly North Korean Network Observer by nknetobserver
www.securitytube.net
www.securitytube.net
Hackfest 2014: Jason Gillam Presented "Web Penetration Testing With Burp And Co2"
www.creditcards.com
www.creditcards.com
7 high-tech holiday scams
vine.co
vine.co
Watch Symantec's Vine "Symantec Mobility Solutions. Empower your employees. #GoEmpower"
outsidelens.scmagazine.com
outsidelens.scmagazine.com
Watch "Security firm Norton and clothing designer Betabrand join forces to create RFID-blocking clothes" Video at SCMagazine
www.trendmicro.com
www.trendmicro.com
Threats at Sea: A Security Evaluation of AIS - Security News - Trend Micro USA
www.securitytube.net
www.securitytube.net
Hackfest 2014: Ian Amit Presented "Red White And Blue. Making Sense Of Red Teaming For Good"
www.symantec.com
www.symantec.com
Did You Get the Security Memo? Symantec Endpoint Protection 11 EOSL | Symantec Connect
now.avg.com
now.avg.com
Boardroom or Baby? Why are there so few women in tech?
now.avg.com
now.avg.com
Here’s To Second Acts
www.trendmicro.com
www.trendmicro.com
Backdoors: What They Are and How to Defend Networks against Them - Security News - Trend Micro USA
www.news4jax.com
www.news4jax.com
Staples data breach bigger than expected | News - Home
krebsonsecurity.com
krebsonsecurity.com
Staples: 6-Month Breach, 1.16 Million Cards — Krebs on Security
www.ibtimes.com
www.ibtimes.com
Staples Inc. Data Breach: Company Says Over 1 Million Credit Cards Compromised
www.scmagazine.com
www.scmagazine.com
Weekend news review: December 15-19
www.theregister.co.uk
www.theregister.co.uk
NORKS: FBI's Sony Pictures' hacking allegations are 'groundless slander' • The Register
twitter.com
twitter.com
Cisco Security sur Twitter : "‘Tis the season to meet under the mistletoe! #HappyHolidays http://t.co/pgFgMhJNrv"
www.securitytube.net
www.securitytube.net
Hackfest 2014: Theo De Raadt Presented "Arc4random - Randomization For All Occasions"
www.gmanetwork.com
www.gmanetwork.com
US Homeland Security urges business, government cooperation on cyber security | SciTech | GMA News Online
www.deccanherald.com
www.deccanherald.com
Bank of Tokyo-Mitsubishi to set up disaster recovery centre
www.bbc.com
www.bbc.com
BBC - Future - Infographic: Ultimate limits of nature and humanity
www.scmagazine.com
www.scmagazine.com
Exploits, mobile and cloud storage threats will plague users in 2015 - SC Magazine
store.emc.com
store.emc.com
EMC Store Products - EMC Store
forums.juniper.net
forums.juniper.net
NE Universities Showcase Networking & Programming ... - J-Net Community
forums.juniper.net
forums.juniper.net
Law Number 1: Don’t Box Me In - J-Net Community
blog.trendmicro.com
blog.trendmicro.com
Comprehensive Analysis of the FBI Warnings and Sony Network Breach -
www.trendmicro.com
www.trendmicro.com
Best Buys That Could Lead to the Worst Shams - Security News - Trend Micro USA
www.rsaconference.com
www.rsaconference.com
Choose, but Choose Wisely: What Skills Does a CISO Really Need? – Blog Post – RSA Conference
cyber-defense.sans.org
cyber-defense.sans.org
Cyber Defense | Is the Offense #Winning? | SANS Institute
now.avg.com
now.avg.com
Technology is still a distraction for drivers
now.avg.com
now.avg.com
The Changing Landscape of BYOD
twitter.com
twitter.com
Geoff Collins sur Twitter : "My happy place http://t.co/FxYvm4Rusd"
www.cio.com
www.cio.com
Top Malware Families Turn Point-of-Sale Into Point-of-Theft | CIO
www.securitytube.net
www.securitytube.net
On Emulation-Based Network Intrusion Detection Systems
www.pcmag.com
www.pcmag.com
7 Ways to Prevent Holiday Shopping Identity Theft | PCMag.com
jobs.aol.com
jobs.aol.com
Consumers Can Sue Target Corp Over Data Breach: Judge
www.trendmicro.com
www.trendmicro.com
IoE 101: How to Explain All Things Smart, Wearable, and IoE - Security News - Trend Micro USA
www.11alive.com
www.11alive.com
2 stores in metro Atlanta tied to Staples data breach
now.avg.com
now.avg.com
How to Identify Yourself, Digitally
blog.torproject.org
blog.torproject.org
Possible upcoming attempts to disable the Tor network | The Tor Blog
www.securitytube.net
www.securitytube.net
A Lightweight Formal Approach For Analyzing Security Of Web Protocols; Apurva Kumar
2600.com
2600.com
AN OFFER TO SONY FROM 2600 | 2600
arstechnica.com
arstechnica.com
Making the Internet a utility—what’s the worst that could happen? | Ars Technica
www.latimes.com
www.latimes.com
UC Berkeley hack: Personal data on 1,600 people possibly compromised - LA Times
austin.twcnews.com
austin.twcnews.com
Cyber Security Risks During Online Holiday Shopping - Time Warner Cable News
now.avg.com
now.avg.com
What does the Future hold for Women in Tech
www.securitytube.net
www.securitytube.net
You Can't Be Me: Enabling Trusted Paths And User Sub-Origins In Web Browsers
now.avg.com
now.avg.com
Thoughts on Mobile Digital Parenting
www.thesunchronicle.com
www.thesunchronicle.com
Seekonk location among Staples stores exposed in data breach - The Sun Chronicle : Local News
www.securitytube.net
www.securitytube.net
Unsupervised Anomaly-Based Malware Detection Using Hardware Features
wtop.com
wtop.com
Sony facing 2 suits by ex-workers over data breach - WTOP
www.informationweek.com
www.informationweek.com
Crazy Tech CEO Quotes: 2014 Edition - InformationWeek
www.mcafee.com
www.mcafee.com
Downloader
www.securityweek.com
www.securityweek.com
Zen and the Art of Cloud Database Security (Part 2) | SecurityWeek.Com
www.wmtw.com
www.wmtw.com
Staples confirms data breach at 2 Maine stores | Local News - WMTW Home
www.securitytube.net
www.securitytube.net
Protecting Web-Based Single Sign-On Protocols Against Relying Party Impersonation Attacks Through A Dedicated Bi-Directional Authenticated Secure Channel
www.youtube.com
www.youtube.com
In 2013 Ransomware Attacks Grew by 500% - Symantec ISTR - YouTube
packetstormsecurity.com
packetstormsecurity.com
Ubuntu Security Notice USN-2447-2 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Ubuntu Security Notice USN-2448-2 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Apple Security Advisory 2014-12-18-1 ≈ Packet Storm
www.theregister.co.uk
www.theregister.co.uk
Heads up! If Tor VANISHES over the weekend, this is why • The Register
www.kirotv.com
www.kirotv.com
Cyber security expert warns U.S. response to North Korean... | www.kirotv.com
packetstormsecurity.com
packetstormsecurity.com
JCE-Tech 4.0 Cross Site Scripting ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
JasPer 1.900.1 Double-Free / Heap Overflow ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
GQ File Manager 0.2.5 Cross Site Scripting / SQL Injection ≈ Packet Storm
www.informationsecuritybuzz.com
www.informationsecuritybuzz.com
Disrupting the Internet in 2015
www.kolotv.com
www.kolotv.com
Cyber Security Experts Doubt FBI Conclusion On Sony Hack
bgr.com
bgr.com
Gmail Google Drive and security features: Google updates email service | BGR
www.govtech.com
www.govtech.com
Cities Adopt Cloud-Based Approaches to Disaster Recovery
devcentral.f5.com
devcentral.f5.com
The Top 10, Top 10 Predictions for 2014
www.slideshare.net
www.slideshare.net
November 2014 Threats Report - Statistics Infographic
blog.trendmicro.com
blog.trendmicro.com
Dr. Cleaner: Trend Micro’s Free Utility App Will Optimize Your Mac’s Disk and Memory -
www.fbi.gov
www.fbi.gov
FBI — Update on Sony Investigation
www.theregister.co.uk
www.theregister.co.uk
Staples comes clean: Hackers swiped 1.16 MILLION bank cards • The Register
www.cleveland.com
www.cleveland.com
Cleveland OH Local News, Breaking News, Sports & Weather - cleveland.com
midsizeinsider.com
midsizeinsider.com
Firms Leaving Low-Hanging Fruit in Business Data Security ::Security & Resiliency:: Midsize Insider
www.securitytube.net
www.securitytube.net
Run Away If You Can: Persistent Jamming Attacks Against Channel Hopping Wi-Fi Devices In Dense Networks
map.ipviking.com
map.ipviking.com
Norse - IPViking Live
www.schneier.com
www.schneier.com
Schneier on Security: Friday Squid Blogging: Squid Beard
technet.microsoft.com
technet.microsoft.com
Microsoft Security Bulletin MS14-082 - Important
technet.microsoft.com
technet.microsoft.com
Microsoft Security Bulletin MS14-076 - Important
www.businesswire.com
www.businesswire.com
NAFCU: 1 Year After Target Data Breach Confirmed, Consumers Vulnerable as Ever | Business Wire
www.wsj.com
www.wsj.com
Staples: 1.16 Million Cards Hit by Data Breach - WSJ
edition.cnn.com
edition.cnn.com
Pew survey: Privacy vs. online convenience - CNN.com
www.scmagazine.com
www.scmagazine.com
Roughly 1.16 million payment cards may have been affected in Staples breach - SC Magazine
www.scmagazine.com
www.scmagazine.com
Solo attacker likely responsible for phishing campaign, delivering Zeus variant - SC Magazine
twitter.com
twitter.com
Juniper Networks sur Twitter : "Did he miss anything? #HappyHolidays http://t.co/zpurejX4yw"
www.theregister.co.uk
www.theregister.co.uk
Sony Pictures hack is Hollywood's 'Snowden moment' say infosec bods • The Register
www.theregister.co.uk
www.theregister.co.uk
ICANN stresses critical internet systems not hacked • The Register
www.zdnet.com
www.zdnet.com
Staples: 1.16 million cards possibly vulnerable in data attack | ZDNet
www.cnbc.com
www.cnbc.com
Staples confirms data breach; up to 1.2M cards affected
www.marketwatch.com
www.marketwatch.com
Staples says data breach affected 1.16 million payment cards - MarketWatch
www.kb.cert.org
www.kb.cert.org
Vulnerability Note VU#561444 - Multiple broadband routers use vulnerable versions of Allegro RomPager
www.cio.com
www.cio.com
BYOD Brings Bah Humbug This Holiday Season | CIO
www.scmagazine.com
www.scmagazine.com
New ransomware named 'CryptoLocker' being spread via phishing emails - SC Magazine
www.healio.com
www.healio.com
PCI process measures may not correlate with 30-day mortality | Cardiology
www.bloomberg.com
www.bloomberg.com
This ETF Hacks Into Cyber-Security Spending - Bloomberg
www.bizjournals.com
www.bizjournals.com
The top trends in cyber security and data for 2014 - Birmingham Business Journal
www.scmagazine.com
www.scmagazine.com
Git client discloses critical security vulnerability - SC Magazine
www.emc.com
www.emc.com
RSA Adaptive Authentication - risk-based, fraud - EMC
twitter.com
twitter.com
Packet sur Twitter : "Racking @JuniperNetworks gear at @netaccesscorp for Packet's first production facility. Woot! http://t.co/XxARYcxAXb"
go.juniper.net
go.juniper.net
Juniper Networks
www.rsaconference.com
www.rsaconference.com
Register – RSA Conference
www.wired.com
www.wired.com
Obama's Bold Sony Statement: Canceling The Interview Was a 'Mistake' | WIRED
www.zdnet.com
www.zdnet.com
Sony debacle shows how not to handle a hack | ZDNet
www.scmagazine.com
www.scmagazine.com
Obama promises U.S. response to Sony attack, says company made mistake - SC Magazine
www.securitytube.net
www.securitytube.net
Synthetic Data Generation And Defense In Depth Measurement Of Web Applications
support.kaspersky.com
support.kaspersky.com
Kaspersky Internet Security 15 для Mac
www.csoonline.com
www.csoonline.com
Trojan program based on ZeuS targets 150 banks, can hijack webcams | CSO Online
www.tripwire.com
www.tripwire.com
FBI Officially Blames North Korea in Sony Pictures Hack - The State of Security
www.theregister.co.uk
www.theregister.co.uk
FBI fingers Norks in Sony hack, Obama asks: HOW DO YOU SOLVE A PROBLEM LIKE KOREA? • The Register
www.symantec.com
www.symantec.com
The Gift that Keeps on Giving: 12 Ways Everyone Can Help IT This Holiday Season | Symantec Connect
itunes.apple.com
itunes.apple.com
The Hacker on the App Store on iTunes
www.radware.com
www.radware.com
State of the Union: Ecommerce Page Speed & Web Performance [Fall 2014]
forums.juniper.net
forums.juniper.net
Pizza Hut Makeover, Mass Customization and Cloud A... - J-Net Community
www.reuters.com
www.reuters.com
U.S. Homeland Security urges business, government cooperation on cyber security| Reuters
krebsonsecurity.com
krebsonsecurity.com
FBI: North Korea to Blame for Sony Hack — Krebs on Security
www.csoonline.com
www.csoonline.com
Questions remain after FBI charges North Korea with attack on Sony Pictures | CSO Online
virtualizationreview.com
virtualizationreview.com
Defining 'Software-Defined' Environments -- Virtualization Review
www.scmagazine.com
www.scmagazine.com
Impact of Linux bug 'grinch' spans servers, workstations, Android devices and more - SC Magazine
www.schneier.com
www.schneier.com
Schneier on Security: Lessons from the Sony Hack
www.theguardian.com
www.theguardian.com
Judge gives customers go-ahead to sue Target over data breach | US news | theguardian.com
www.scmagazine.com
www.scmagazine.com
40,000 federal employees impacted by contractor breach - SC Magazine
www.jdsupra.com
www.jdsupra.com
Congress Passes The Federal Information Security Modernization Act of 2014: Bringing Federal Agency Information Security into the New Millennium | Davis Wright Tremaine LLP - JDSupra
www.scmagazine.com
www.scmagazine.com
Barrett Brown sentencing delayed until January - SC Magazine
www.scmagazine.com
www.scmagazine.com
Spearfishing campaign compromises ICANN systems - SC Magazine
packetstormsecurity.com
packetstormsecurity.com
FBI Believes North Korea Is Behind The Sony Attack ≈ Packet Storm
www.fiercemobilegovernment.com
www.fiercemobilegovernment.com
Survey: Consumers in emerging markets use mobile Internet for personal advancement, education - FierceMobileGovernment
www.infosecisland.com
www.infosecisland.com
FBI Says North Korea Was Behind Sony Hack
www.zdnet.com
www.zdnet.com
ZeuS variant strikes 150 banks worldwide | ZDNet
www.informationweek.com
www.informationweek.com
6 IT Career Resolutions - InformationWeek
www.scmagazine.com
www.scmagazine.com
Sony investigation reveals North Korea behind cyber attack, FBI says - SC Magazine
blog.trendmicro.com
blog.trendmicro.com
Comprehensive Analysis of the “Destructive” Malware Behind FBI Warnings and Sony Hack -
www.trendmicro.com
www.trendmicro.com
Using 8 Backdoor Techniques, Attackers Steal Company Data - Security News - Trend Micro USA
boston.cbslocal.com
boston.cbslocal.com
Boston Children’s Hospital To Pay $40,000 Fine Over Data Breach « CBS Boston
www.bloomberg.com
www.bloomberg.com
Hack Attacks: Are Cyber Breaches the New Normal?: Video - Bloomberg
www.securitytube.net
www.securitytube.net
Why Is Csp Failing? Trends And Challenges In Csp Adoption
www.slideshare.net
www.slideshare.net
The Real Cost of Slow Time vs Downtime
betanews.com
betanews.com
How your data will be at risk in 2015
www.slideshare.net
www.slideshare.net
Netbackup Versus EMC
redskyvision.wistia.com
redskyvision.wistia.com
Carl Leonard - Innovating Security in the Cloud - redskyvision
www.scpr.org
www.scpr.org
Cyber security: How to protect your data and what to do if your identity is compromised | Take Two | 89.3 KPCC
www.net-security.org
www.net-security.org
USBdriveby: Compromising computers with a $20 microcontroller
support.kaspersky.com
support.kaspersky.com
How to download Kaspersky Internet Security 2015
edition.cnn.com
edition.cnn.com
Government hacks and security breaches skyrocket - CNN.com
techcrunch.com
techcrunch.com
This Little USB Necklace Hacks Your Computer In No Time Flat | TechCrunch
forums.juniper.net
forums.juniper.net
Banking on automation and devops - J-Net Community
www.cbsnews.com
www.cbsnews.com
Phishing quiz: Can you spot a scam when you see one? Don't be so sure - CBS News
www.trendmicro.com
www.trendmicro.com
Virtualization Security - Server Virtualization - Deep Security - Trend Micro USA
www.youtube.com
www.youtube.com
U Force - Broderbund - Nes - Famicom - TV Game Commercial - Retro Gaming - 1988 - YouTube
www.databreachtoday.com
www.databreachtoday.com
Sony's Action Called Dangerous Precedent - DataBreachToday
www.fierceenterprisecommunications.com
www.fierceenterprisecommunications.com
Spotlight: Nearly half surveyed say SDN may be too immature to be secure - FierceEnterpriseCommunications
uk.businessinsider.com
uk.businessinsider.com
Retailers Look At The Mobile Web Opportunity - Business Insider
seclists.org
seclists.org
Bugtraq: TWiki Security Advisory - XSS Vulnerability - CVE-2014-9325
seclists.org
seclists.org
Bugtraq: TWiki Security Advisory - XSS Vulnerability - CVE-2014-9367
money.cnn.com
money.cnn.com
Why North Korea's attack should leave every company scared stiff - Dec. 19, 2014
support.kaspersky.com
support.kaspersky.com
Kaspersky Total Security Multi-Device
english.ahram.org.eg
english.ahram.org.eg
Founding of state cyber-security body worries digital rights activists - Politics - Egypt - Ahram Online
www.csoonline.com
www.csoonline.com
What we know about North Korea's cyberarmy | CSO Online
www.inc.com
www.inc.com
Why Killing the Password Is the Next Billion-Dollar Industry | Inc.com
blogs.cisco.com
blogs.cisco.com
Cloudy with a Chance of Scalable Malware Protection
www.scmagazine.com
www.scmagazine.com
2014 Industry Innovators: Access Control - SC Magazine
packetstormsecurity.com
packetstormsecurity.com
Linux GRINCH Vuln Does Not Sound Too Horrific ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Webcam-Snooping Spawn Of ZeuS Hits 150 Banks Worldwide ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Microsoft Takes On Tech Support Scammers ≈ Packet Storm
www.kb.cert.org
www.kb.cert.org
Vulnerability Note VU#1680209 - AppsGeyser generates Android applications that fail to properly validate SSL certificates
www.net-security.org
www.net-security.org
New Zeus variant targets users of 150 banks
seclists.org
seclists.org
Bugtraq: SEC Consult SA-20141219-0 :: XSS & Memory Disclosure vulnerabilities in NetIQ eDirectory NDS iMonitor
www.csoonline.com
www.csoonline.com
Critical vulnerability in Git clients puts developers at risk | CSO Online
www.csoonline.com
www.csoonline.com
Microsoft files suit against alleged tech support scammers | CSO Online
www.securitytube.net
www.securitytube.net
Evaluating The Effectiveness Of Current Anti-Rop Defenses
www.slideshare.net
www.slideshare.net
INFOGRAPHIC▶ Enable the Agile Data Center
www.telecompaper.com
www.telecompaper.com
Exponential-e improves disaster recovery service with Zerto - Telecompaper
www.standard-democrat.com
www.standard-democrat.com
Sikeston Standard Democrat: Local News: Extension approved for county's last disaster recovery project (12/19/14)
www.eweek.com
www.eweek.com
RSA Chairman on Security in 2014: 'Best of Times, Worst of Times'
www.rsaconference.com
www.rsaconference.com
Today's Challenge: Database Security in the Cloud – Blog Post – RSA Conference
www.net-security.org
www.net-security.org
Critical flaw on over 12M routers allows device hijacking, network compromise
www.tripwire.com
www.tripwire.com
Critical Git Vulnerability Allows for Remote Code Execution
minnesota.cbslocal.com
minnesota.cbslocal.com
Federal Judge Allows Lawsuits Over Target Data Breach « CBS Minnesota
www.zdnet.com
www.zdnet.com
Zero Day Weekly: ICANN hacked, critical GitHub vuln, too much Sony drama | ZDNet
thehackernews.com
thehackernews.com
Hackers Can Read Your Private SMS and Listen to Phone Calls - Hacker News
www.csoonline.com
www.csoonline.com
Major Chinese smartphone manufacturer installed backdoor on up to 10 million devices | CSO Online
thehackernews.com
thehackernews.com
Router Vulnerability Puts 12 Million Home and Business Routers at Risk - Hacker News
www.schneier.com
www.schneier.com
Schneier on Security: SS7 Vulnerabilities
www.tripwire.com
www.tripwire.com
Sony & North Korea: A Call to Cyber Arms or Better Defense? - The State of Security
thehackernews.com
thehackernews.com
Critical Git Client vulnerability Allows Malicious Remote Code Execution - Hacker News
www.npr.org
www.npr.org
Successful Tech Requires An Old-Fashioned Skill: Organizing People : All Tech Considered : NPR
www.net-security.org
www.net-security.org
Critical Git flaw allows attackers to compromise developers' machines
www.net-security.org
www.net-security.org
Cybercriminals won’t take a vacation this holiday season
www.theregister.co.uk
www.theregister.co.uk
Linux 'GRINCH' vuln is AWFUL. Except, er, maybe it isn't • The Register
seclists.org
seclists.org
Bugtraq: [oCERT-2014-012] JasPer input sanitization errors
seclists.org
seclists.org
Bugtraq: APPLE-SA-2014-12-18-1 Xcode 6.2 beta 3
www.enisa.europa.eu
www.enisa.europa.eu
ENISA CERT training programme now available online — ENISA
www.security-faqs.com
www.security-faqs.com
Philip Lieberman On The Sony Hack: “This Scenario Will Play Out Again And In Even Worse Forms”
www.patentlyapple.com
www.patentlyapple.com
Apple Invents New Touch ID Virtual Combination Unlock Feature - Patently Apple
www.security-faqs.com
www.security-faqs.com
Sony Hack: The ‘Finger We Are Pointing At North Korea Should Be Pointing At Ourselves’
www.securitytube.net
www.securitytube.net
Eyes Of A Human, Eyes Of A Program: Leveraging Different Views Of The Web For Analysis And Detection
www.theregister.co.uk
www.theregister.co.uk
Webcam-snooping spawn of ZeuS hits 150 banks worldwide • The Register
www.security-faqs.com
www.security-faqs.com
Consumers Dubious of Mobile Payment Security, Prefer Third Party Services Such As PayPal
www.net-security.org
www.net-security.org
Smart grid security certification in Europe
www.net-security.org
www.net-security.org
Top 5 social media security predictions for 2015
www.net-security.org
www.net-security.org
Your email, your data, your control
www.privacyandsecuritymatters.com
www.privacyandsecuritymatters.com
On The Eighth Day of Privacy, Health Care Systems (Over)Shared Data | Privacy & Security Matters
www.extremetech.com
www.extremetech.com
HP reveals more details about The Machine: Linux++ OS coming 2015, prototype in 2016 | ExtremeTech
miami.cbslocal.com
miami.cbslocal.com
Tips To Increase Your Holiday Cyber-Shopping Security « CBS Miami
www.theregister.co.uk
www.theregister.co.uk
Movie industry's evil plan to destroy the internet is going precisely nowhere • The Register
www.securitytube.net
www.securitytube.net
Some Vulnerabilities Are Di Erent Than Others Studying Vulnerabilities And Attack Surfaces In The Wild
www.theatlantic.com
www.theatlantic.com
Sneaky Impersonator Robots Are Taking Over the Web - The Atlantic
github.com
github.com
Vulnerability announced: update your Git clients · GitHub
www.theregister.co.uk
www.theregister.co.uk
Hack hijacks electric skateboards, dumps hipsters in the gutter • The Register
www.azcentral.com
www.azcentral.com
Arizona Local News - Phoenix Arizona News - Phoenix Breaking News - azcentral.com
www.networkworld.com
www.networkworld.com
Human error root cause of November Microsoft Azure outage | Network World
www.securitytube.net
www.securitytube.net
Quantitative Evaluation Of Dynamic Platform Techniques As A Defensive Mechanism
www.tripwire.com
www.tripwire.com
Security Slice: The Sony Pictures Breach – Part Two
www.tripwire.com
www.tripwire.com
The Syrian Electronic Army strikes again! International Business Times hacked
www.theregister.co.uk
www.theregister.co.uk
Kiwi hacker 'menace' pops home detention tracker cuffs • The Register
www.nevadaappeal.com
www.nevadaappeal.com
Good cyber security habits essential for holidays | NevadaAppeal.com
www.macworld.com
www.macworld.com
Forensic software gets around Apple's iCloud security features | Macworld
www.scmagazine.com
www.scmagazine.com
2014 Industry Innovators - SC Magazine
www.gulf-daily-news.com
www.gulf-daily-news.com
Gulf Daily News » Business News » Key training for Batelco's staff
blog.trendmicro.com
blog.trendmicro.com
How Cybercriminals Dodge Email Authentication
www.securityweek.com
www.securityweek.com
Zen and the Art of Cloud Database Security (Part 1) | SecurityWeek.Com
www.newindianexpress.com
www.newindianexpress.com
India Should Strive for Fool-proof Cyber Security -The New Indian Express
packetstormsecurity.com
packetstormsecurity.com
E-Journal CMS SQL Injection / Privilege Escalation ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Red Hat Security Advisory 2014-2021-01 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Red Hat Security Advisory 2014-2023-01 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Red Hat Security Advisory 2014-2010-01 ≈ Packet Storm
www.securitytube.net
www.securitytube.net
Dynamic Reconstruction Of Relocation Information For Stripped Binaries
www.linkedin.com
www.linkedin.com
Why every CIO needs a Kevin McCallister in 2015 | Scott Spiker | LinkedIn
www.wsj.com
www.wsj.com
McAfee: Cyberattacks Will Not Slow in 2015
arstechnica.com
arstechnica.com
Some 100,000 or more WordPress sites infected by mysterious malware | Ars Technica
www.itnews.com.au
www.itnews.com.au
Beyond ACORN: Cracking the infosec skills nut - Security - Blogs - iTnews.com.au
www.zdnet.com
www.zdnet.com
All aboard the internet of things infosec hype train | ZDNet
www.businesscomputingworld.co.uk
www.businesscomputingworld.co.uk
IT Force Field: Preventing The Risk Of Viruses In Business | BCW
www.theregister.co.uk
www.theregister.co.uk
Experts: ISIS loonies use 'digital AK-47' malware to hunt victims • The Register
blog.spiderlabs.com
blog.spiderlabs.com
Alina POS malware "sparks" off a new variant - SpiderLabs Anterior
www.welivesecurity.com
www.welivesecurity.com
Cybercrime predictions for 2015
www.law360.com
www.law360.com
Target Data Breach Suit Left Largely Intact - Law360
www.healthcareitnews.com
www.healthcareitnews.com
Medical records exposed in massive Sony hack | Healthcare IT News
blog.trendmicro.com
blog.trendmicro.com
Comprehensive Analysis of the “Destructive” Malware Behind FBI Warnings -
www.scmagazine.com
www.scmagazine.com
California nonprofit sues San Diego Police Department over stingray documents - SC Magazine
www.scmagazine.com
www.scmagazine.com
'Spark' shares traits with Alina, JackPOS, uses AutoIt differently - SC Magazine
twitter.com
twitter.com
Lauren Hasenhuttl sur Twitter : "Participating in @JuniperNetworks Hour of Code for kids. Future Junos coder! http://t.co/LSSeJoI2DY"
twitter.com
twitter.com
Lauren Hasenhuttl sur Twitter : "Thx @Beaker for teaching the kids about coding @JuniperNetworks @codeorg "hardware powered by software" http://t.co/rGKtVldHL4"
www.securitytube.net
www.securitytube.net
Measuring Drive-By Download Defense In Depth
www.itbusiness.ca
www.itbusiness.ca
Top 5 High-Profile Cyber Security Breaches | IT Business Blog
www.washingtonpost.com
www.washingtonpost.com
2014 is ending, but this wave of technology disruptions is just beginning - The Washington Post
www.scmagazine.com
www.scmagazine.com
White House calls Sony hack a "serious national security matter," gov't mulls proper response - SC Magazine
blog.trendmicro.com
blog.trendmicro.com
Four Steps To An Effective Targeted Attack Response | Security Intelligence Blog | Trend Micro
www.cbronline.com
www.cbronline.com
6 issues surrounding IoT Security in 2015 - Computer Business Review
www.pastemagazine.com
www.pastemagazine.com
Hacked in 2014: The Year of the Data Breach :: Tech :: Features :: Paste
www.zdnet.com
www.zdnet.com
Sony attack linked to North Korea, theaters bail over terrorism threat | ZDNet
now.avg.com
now.avg.com
What’s Booming In Small Business
www.bloomberg.com
www.bloomberg.com
Sony Asks Media to Destroy Hacked Data: Do They Have a Case?: Video - Bloomberg
www.scmagazine.com
www.scmagazine.com
RSA details new Boleto malware family - SC Magazine
www.scmagazine.com
www.scmagazine.com
Researchers find 'CoolReaper' backdoor in CoolPad devices - SC Magazine
www.theregister.co.uk
www.theregister.co.uk
Misfortune Cookie crumbles router security: '12 MILLION+' in hijack risk • The Register
blogs.cisco.com
blogs.cisco.com
My Internet of Everything Holiday Wish List
fcw.com
fcw.com
Managing a cyber crime scene -- FCW
www.scmagazine.com
www.scmagazine.com
Critical 'Misfortune Cookie' bug puts millions of internet-connected routers at risk - SC Magazine
twitter.com
twitter.com
McAfee sur Twitter : "Choose comfort and joy this holiday season. Watch out for bogus online offers. #12Scams. http://t.co/LQ9KWxng2l"
www.pcworld.com
www.pcworld.com
How to train your staff on cyber security (and make it stick) | PCWorld
clarion.circdata-solutions.co.uk
clarion.circdata-solutions.co.uk
Forensics Europe Expo 2015 - Visitor
www.youtube.com
www.youtube.com
A Decade of Fraud and Cybercrime - YouTube
motherboard.vice.com
motherboard.vice.com
Reaction to the Sony Hack Is 'Beyond the Realm of Stupid' | Motherboard
now.avg.com
now.avg.com
Thoughts on Workplace Privacy
www.slideshare.net
www.slideshare.net
2014 State of the Union for Mobile Performance
www.usatoday.com
www.usatoday.com
No 'Interview' ... on any platform
www.securitytube.net
www.securitytube.net
Goldeneye: Efficiently And Effectively Unveiling Malware’S Targeted Environment
www.kaspersky.com
www.kaspersky.com
Data Security Breach Prevention Guide Download | Kaspersky Lab
www.esecurityplanet.com
www.esecurityplanet.com
PCI Compliance: Preparing for Version 3.0 - eSecurity Planet
midsizeinsider.com
midsizeinsider.com
Do Employees Pose the Biggest Threat to Information Security? ::Security & Resiliency:: Midsize Insider
abcnews.go.com
abcnews.go.com
2 More Former Sony Workers Sue Over Data Breach - ABC News
www.symantec.com
www.symantec.com
Mobile spyware makers are on shaky ground as the law begins to catch up with them | Symantec Connect
cyber-defense.sans.org
cyber-defense.sans.org
Cybersecurity & Cyber Defense | Implementing the 20 Critical Controls on a Low-Cost Budget: Do It, Dont Worry About It! | SANS Institute
now.avg.com
now.avg.com
Mobile banking, the safe way
world.einnews.com
world.einnews.com
Business must support staff training, says IT Governance as UK Government announces new cyber skills projects - World News Report
magazine.vulnerability-db.com
magazine.vulnerability-db.com
IBackup v10.0.0.45 suffers from a local Privilege Escalation Vulnerability | VULNERABILITY MAGAZINE - Bug Bounties, Acknoweldgements & Security Research
www.utsandiego.com
www.utsandiego.com
2 more former Sony workers sue over data breach | UTSanDiego.com
www.scmagazine.com
www.scmagazine.com
Reboot 25: Thought leaders - SC Magazine
forums.juniper.net
forums.juniper.net
Does NFV and Virtualisation Herald the End of Blac... - J-Net Community
www.theatlantic.com
www.theatlantic.com
How to Fool a Computer With Optical Illusions - The Atlantic
blog.radware.com
blog.radware.com
The “Easy Button” for Cyber-Attack Mitigation: Introducing Radware’s Attack Mitigation Service | Radware Blog
www.scmagazine.com
www.scmagazine.com
Jeans and blazers will feature RFID blocking fabric - SC Magazine
www.csoonline.com
www.csoonline.com
Organized criminals targeting individual iPhone, Android users | CSO Online
www.csoonline.com
www.csoonline.com
Point-of-sale malware creators still in business with Spark, an Alina spinoff | CSO Online
www.cbronline.com
www.cbronline.com
6 facts about mobile connectivity in developing and developed countries - Computer Business Review