Cyber-security expert offers 10 tips to safeguard your information - Your Houston News: Living
Sony case underlines cyber security needs for India - Hindustan Times
The Ultimate Goal of Digital Attacks -
NEW Infosec Pro Weekend Bootcamp – OH YOU GOTTA SEE THIS!!!!
Recon 2013 - Teridian Soc Exploitation: Exploration Of Harvard Architecture Smart Grid Systems
Phishing Scams & Identity Theft Protection – Don’t be that Guy – Trend Micro
Martin Roesch – Speaker – RSA Conference
You Better Watch Out, You Better Not Click: Holiday Movie Threats - Security News - Trend Micro USA
An epic ride: A look back at the ever-changing information security industry - Print Article - SC Magazine
2014's Top Malware: Less Money, Mo' Problems
Staples data breach unlikely to dampen holiday shopping
Recon 2013 - Hardware Reverse Engineering Tools
Mobily's Solutions for Business Continuity Enables the Business Sector to Recover from Technical Disasters within Few Minutes - Zawya
Pillarbox: Combating Next-Generation Malware With Fast Forward-Secure Logging
7 Tips: Work Fitness Into The Workday - InformationWeek
Ensuring business continuity and building opportunities | Networks Asia
Permission. File Permissions. - Imgur
Top News, Latest headlines, Latest News, World News & U.S News -
Formal Analysis Of Security Procedures In Lte - A Feasibility Study Noomene Ben Henda; Karl Norrman
+The Backup of Destiny [Official Trailer] | Symantec - YouTube
Hackfest 2014: Renderman Aka Brad Haines Presented "They Are Doing What! With Air Traffic Control?"
The Problem With the Plan to Give Internet Access to the Whole World - The Atlantic
Your Friendly North Korean Network Observer by nknetobserver
Hackfest 2014: Jason Gillam Presented "Web Penetration Testing With Burp And Co2"
7 high-tech holiday scams
Watch Symantec's Vine "Symantec Mobility Solutions. Empower your employees. #GoEmpower"
Watch "Security firm Norton and clothing designer Betabrand join forces to create RFID-blocking clothes" Video at SCMagazine
Threats at Sea: A Security Evaluation of AIS - Security News - Trend Micro USA
Hackfest 2014: Ian Amit Presented "Red White And Blue. Making Sense Of Red Teaming For Good"
Did You Get the Security Memo? Symantec Endpoint Protection 11 EOSL | Symantec Connect
Boardroom or Baby? Why are there so few women in tech?
Here’s To Second Acts
Backdoors: What They Are and How to Defend Networks against Them - Security News - Trend Micro USA
Staples data breach bigger than expected | News - Home
Staples: 6-Month Breach, 1.16 Million Cards — Krebs on Security
Staples Inc. Data Breach: Company Says Over 1 Million Credit Cards Compromised
Weekend news review: December 15-19
NORKS: FBI's Sony Pictures' hacking allegations are 'groundless slander' • The Register
Cisco Security sur Twitter : "‘Tis the season to meet under the mistletoe! #HappyHolidays"
Hackfest 2014: Theo De Raadt Presented "Arc4random - Randomization For All Occasions"
US Homeland Security urges business, government cooperation on cyber security | SciTech | GMA News Online
Bank of Tokyo-Mitsubishi to set up disaster recovery centre
BBC - Future - Infographic: Ultimate limits of nature and humanity
Exploits, mobile and cloud storage threats will plague users in 2015 - SC Magazine
EMC Store Products - EMC Store
NE Universities Showcase Networking & Programming ... - J-Net Community
Law Number 1: Don’t Box Me In - J-Net Community
Comprehensive Analysis of the FBI Warnings and Sony Network Breach -
Best Buys That Could Lead to the Worst Shams - Security News - Trend Micro USA
Choose, but Choose Wisely: What Skills Does a CISO Really Need? – Blog Post – RSA Conference
Cyber Defense | Is the Offense #Winning? | SANS Institute
Technology is still a distraction for drivers
The Changing Landscape of BYOD
Geoff Collins sur Twitter : "My happy place"
Top Malware Families Turn Point-of-Sale Into Point-of-Theft | CIO
On Emulation-Based Network Intrusion Detection Systems
7 Ways to Prevent Holiday Shopping Identity Theft |
Consumers Can Sue Target Corp Over Data Breach: Judge
IoE 101: How to Explain All Things Smart, Wearable, and IoE - Security News - Trend Micro USA
2 stores in metro Atlanta tied to Staples data breach
How to Identify Yourself, Digitally
Possible upcoming attempts to disable the Tor network | The Tor Blog
A Lightweight Formal Approach For Analyzing Security Of Web Protocols; Apurva Kumar
Making the Internet a utility—what’s the worst that could happen? | Ars Technica
UC Berkeley hack: Personal data on 1,600 people possibly compromised - LA Times
Cyber Security Risks During Online Holiday Shopping - Time Warner Cable News
What does the Future hold for Women in Tech
You Can't Be Me: Enabling Trusted Paths And User Sub-Origins In Web Browsers
Thoughts on Mobile Digital Parenting
Seekonk location among Staples stores exposed in data breach - The Sun Chronicle : Local News
Unsupervised Anomaly-Based Malware Detection Using Hardware Features
Sony facing 2 suits by ex-workers over data breach - WTOP
Crazy Tech CEO Quotes: 2014 Edition - InformationWeek
Zen and the Art of Cloud Database Security (Part 2) | SecurityWeek.Com
Staples confirms data breach at 2 Maine stores | Local News - WMTW Home
Protecting Web-Based Single Sign-On Protocols Against Relying Party Impersonation Attacks Through A Dedicated Bi-Directional Authenticated Secure Channel
In 2013 Ransomware Attacks Grew by 500% - Symantec ISTR - YouTube
Ubuntu Security Notice USN-2447-2 ≈ Packet Storm
Ubuntu Security Notice USN-2448-2 ≈ Packet Storm
Apple Security Advisory 2014-12-18-1 ≈ Packet Storm
Heads up! If Tor VANISHES over the weekend, this is why • The Register
Cyber security expert warns U.S. response to North Korean... |
JCE-Tech 4.0 Cross Site Scripting ≈ Packet Storm
JasPer 1.900.1 Double-Free / Heap Overflow ≈ Packet Storm
GQ File Manager 0.2.5 Cross Site Scripting / SQL Injection ≈ Packet Storm
Disrupting the Internet in 2015
Cyber Security Experts Doubt FBI Conclusion On Sony Hack
Gmail Google Drive and security features: Google updates email service | BGR
Cities Adopt Cloud-Based Approaches to Disaster Recovery
The Top 10, Top 10 Predictions for 2014
November 2014 Threats Report - Statistics Infographic
Dr. Cleaner: Trend Micro’s Free Utility App Will Optimize Your Mac’s Disk and Memory -
FBI — Update on Sony Investigation
Staples comes clean: Hackers swiped 1.16 MILLION bank cards • The Register
Cleveland OH Local News, Breaking News, Sports & Weather -
Firms Leaving Low-Hanging Fruit in Business Data Security ::Security & Resiliency:: Midsize Insider
Run Away If You Can: Persistent Jamming Attacks Against Channel Hopping Wi-Fi Devices In Dense Networks
Norse - IPViking Live
Schneier on Security: Friday Squid Blogging: Squid Beard
Microsoft Security Bulletin MS14-082 - Important
Microsoft Security Bulletin MS14-076 - Important
NAFCU: 1 Year After Target Data Breach Confirmed, Consumers Vulnerable as Ever | Business Wire
Staples: 1.16 Million Cards Hit by Data Breach - WSJ
Pew survey: Privacy vs. online convenience -
Roughly 1.16 million payment cards may have been affected in Staples breach - SC Magazine
Solo attacker likely responsible for phishing campaign, delivering Zeus variant - SC Magazine
Juniper Networks sur Twitter : "Did he miss anything? #HappyHolidays"
Sony Pictures hack is Hollywood's 'Snowden moment' say infosec bods • The Register
ICANN stresses critical internet systems not hacked • The Register
Staples: 1.16 million cards possibly vulnerable in data attack | ZDNet
Staples confirms data breach; up to 1.2M cards affected
Staples says data breach affected 1.16 million payment cards - MarketWatch
Vulnerability Note VU#561444 - Multiple broadband routers use vulnerable versions of Allegro RomPager
BYOD Brings Bah Humbug This Holiday Season | CIO
New ransomware named 'CryptoLocker' being spread via phishing emails - SC Magazine
PCI process measures may not correlate with 30-day mortality | Cardiology
This ETF Hacks Into Cyber-Security Spending - Bloomberg
The top trends in cyber security and data for 2014 - Birmingham Business Journal
Git client discloses critical security vulnerability - SC Magazine
RSA Adaptive Authentication - risk-based, fraud - EMC
Packet sur Twitter : "Racking @JuniperNetworks gear at @netaccesscorp for Packet's first production facility. Woot!"
Juniper Networks
Register – RSA Conference
Obama's Bold Sony Statement: Canceling The Interview Was a 'Mistake' | WIRED
Sony debacle shows how not to handle a hack | ZDNet
Obama promises U.S. response to Sony attack, says company made mistake - SC Magazine
Synthetic Data Generation And Defense In Depth Measurement Of Web Applications
Kaspersky Internet Security 15 для Mac
Trojan program based on ZeuS targets 150 banks, can hijack webcams | CSO Online
FBI Officially Blames North Korea in Sony Pictures Hack - The State of Security
FBI fingers Norks in Sony hack, Obama asks: HOW DO YOU SOLVE A PROBLEM LIKE KOREA? • The Register
The Gift that Keeps on Giving: 12 Ways Everyone Can Help IT This Holiday Season | Symantec Connect
The Hacker on the App Store on iTunes
State of the Union: Ecommerce Page Speed & Web Performance [Fall 2014]
Pizza Hut Makeover, Mass Customization and Cloud A... - J-Net Community
U.S. Homeland Security urges business, government cooperation on cyber security| Reuters
FBI: North Korea to Blame for Sony Hack — Krebs on Security
Questions remain after FBI charges North Korea with attack on Sony Pictures | CSO Online
Defining 'Software-Defined' Environments -- Virtualization Review
Impact of Linux bug 'grinch' spans servers, workstations, Android devices and more - SC Magazine
Schneier on Security: Lessons from the Sony Hack
Judge gives customers go-ahead to sue Target over data breach | US news |
40,000 federal employees impacted by contractor breach - SC Magazine
Congress Passes The Federal Information Security Modernization Act of 2014: Bringing Federal Agency Information Security into the New Millennium | Davis Wright Tremaine LLP - JDSupra
Barrett Brown sentencing delayed until January - SC Magazine
Spearfishing campaign compromises ICANN systems - SC Magazine
FBI Believes North Korea Is Behind The Sony Attack ≈ Packet Storm
Survey: Consumers in emerging markets use mobile Internet for personal advancement, education - FierceMobileGovernment
FBI Says North Korea Was Behind Sony Hack
ZeuS variant strikes 150 banks worldwide | ZDNet
6 IT Career Resolutions - InformationWeek
Sony investigation reveals North Korea behind cyber attack, FBI says - SC Magazine
Comprehensive Analysis of the “Destructive” Malware Behind FBI Warnings and Sony Hack -
Using 8 Backdoor Techniques, Attackers Steal Company Data - Security News - Trend Micro USA
Boston Children’s Hospital To Pay $40,000 Fine Over Data Breach « CBS Boston
Hack Attacks: Are Cyber Breaches the New Normal?: Video - Bloomberg
Why Is Csp Failing? Trends And Challenges In Csp Adoption
The Real Cost of Slow Time vs Downtime
How your data will be at risk in 2015
Netbackup Versus EMC
Carl Leonard - Innovating Security in the Cloud - redskyvision
Cyber security: How to protect your data and what to do if your identity is compromised | Take Two | 89.3 KPCC
USBdriveby: Compromising computers with a $20 microcontroller
How to download Kaspersky Internet Security 2015
Government hacks and security breaches skyrocket -
This Little USB Necklace Hacks Your Computer In No Time Flat | TechCrunch
Banking on automation and devops - J-Net Community
Phishing quiz: Can you spot a scam when you see one? Don't be so sure - CBS News
Virtualization Security - Server Virtualization - Deep Security - Trend Micro USA
U Force - Broderbund - Nes - Famicom - TV Game Commercial - Retro Gaming - 1988 - YouTube
Sony's Action Called Dangerous Precedent - DataBreachToday
Spotlight: Nearly half surveyed say SDN may be too immature to be secure - FierceEnterpriseCommunications
Retailers Look At The Mobile Web Opportunity - Business Insider
Bugtraq: TWiki Security Advisory - XSS Vulnerability - CVE-2014-9325
Bugtraq: TWiki Security Advisory - XSS Vulnerability - CVE-2014-9367
Why North Korea's attack should leave every company scared stiff - Dec. 19, 2014
Kaspersky Total Security Multi-Device
Founding of state cyber-security body worries digital rights activists - Politics - Egypt - Ahram Online
What we know about North Korea's cyberarmy | CSO Online
Why Killing the Password Is the Next Billion-Dollar Industry |
Cloudy with a Chance of Scalable Malware Protection
2014 Industry Innovators: Access Control - SC Magazine
Linux GRINCH Vuln Does Not Sound Too Horrific ≈ Packet Storm
Webcam-Snooping Spawn Of ZeuS Hits 150 Banks Worldwide ≈ Packet Storm
Microsoft Takes On Tech Support Scammers ≈ Packet Storm
Vulnerability Note VU#1680209 - AppsGeyser generates Android applications that fail to properly validate SSL certificates
New Zeus variant targets users of 150 banks
Bugtraq: SEC Consult SA-20141219-0 :: XSS & Memory Disclosure vulnerabilities in NetIQ eDirectory NDS iMonitor
Critical vulnerability in Git clients puts developers at risk | CSO Online
Microsoft files suit against alleged tech support scammers | CSO Online
Evaluating The Effectiveness Of Current Anti-Rop Defenses
INFOGRAPHIC▶ Enable the Agile Data Center
Exponential-e improves disaster recovery service with Zerto - Telecompaper
Sikeston Standard Democrat: Local News: Extension approved for county's last disaster recovery project (12/19/14)
RSA Chairman on Security in 2014: 'Best of Times, Worst of Times'
Today's Challenge: Database Security in the Cloud – Blog Post – RSA Conference
Critical flaw on over 12M routers allows device hijacking, network compromise
Critical Git Vulnerability Allows for Remote Code Execution
Federal Judge Allows Lawsuits Over Target Data Breach « CBS Minnesota
Zero Day Weekly: ICANN hacked, critical GitHub vuln, too much Sony drama | ZDNet
Hackers Can Read Your Private SMS and Listen to Phone Calls - Hacker News
Major Chinese smartphone manufacturer installed backdoor on up to 10 million devices | CSO Online
Router Vulnerability Puts 12 Million Home and Business Routers at Risk - Hacker News
Schneier on Security: SS7 Vulnerabilities
Sony & North Korea: A Call to Cyber Arms or Better Defense? - The State of Security
Critical Git Client vulnerability Allows Malicious Remote Code Execution - Hacker News
Successful Tech Requires An Old-Fashioned Skill: Organizing People : All Tech Considered : NPR
Critical Git flaw allows attackers to compromise developers' machines
Cybercriminals won’t take a vacation this holiday season
Linux 'GRINCH' vuln is AWFUL. Except, er, maybe it isn't • The Register
Bugtraq: [oCERT-2014-012] JasPer input sanitization errors
Bugtraq: APPLE-SA-2014-12-18-1 Xcode 6.2 beta 3
ENISA CERT training programme now available online — ENISA
Philip Lieberman On The Sony Hack: “This Scenario Will Play Out Again And In Even Worse Forms”
Apple Invents New Touch ID Virtual Combination Unlock Feature - Patently Apple
Sony Hack: The ‘Finger We Are Pointing At North Korea Should Be Pointing At Ourselves’
Eyes Of A Human, Eyes Of A Program: Leveraging Different Views Of The Web For Analysis And Detection
Webcam-snooping spawn of ZeuS hits 150 banks worldwide • The Register
Consumers Dubious of Mobile Payment Security, Prefer Third Party Services Such As PayPal
Smart grid security certification in Europe
Top 5 social media security predictions for 2015
Your email, your data, your control
On The Eighth Day of Privacy, Health Care Systems (Over)Shared Data | Privacy & Security Matters
HP reveals more details about The Machine: Linux++ OS coming 2015, prototype in 2016 | ExtremeTech
Tips To Increase Your Holiday Cyber-Shopping Security « CBS Miami
Movie industry's evil plan to destroy the internet is going precisely nowhere • The Register
Some Vulnerabilities Are Di Erent Than Others Studying Vulnerabilities And Attack Surfaces In The Wild
Sneaky Impersonator Robots Are Taking Over the Web - The Atlantic
Vulnerability announced: update your Git clients · GitHub
Hack hijacks electric skateboards, dumps hipsters in the gutter • The Register
Arizona Local News - Phoenix Arizona News - Phoenix Breaking News -
Human error root cause of November Microsoft Azure outage | Network World
Quantitative Evaluation Of Dynamic Platform Techniques As A Defensive Mechanism
Security Slice: The Sony Pictures Breach – Part Two
The Syrian Electronic Army strikes again! International Business Times hacked
Kiwi hacker 'menace' pops home detention tracker cuffs • The Register
Good cyber security habits essential for holidays |
Forensic software gets around Apple's iCloud security features | Macworld
2014 Industry Innovators - SC Magazine
Gulf Daily News » Business News » Key training for Batelco's staff
How Cybercriminals Dodge Email Authentication
Zen and the Art of Cloud Database Security (Part 1) | SecurityWeek.Com
India Should Strive for Fool-proof Cyber Security -The New Indian Express
E-Journal CMS SQL Injection / Privilege Escalation ≈ Packet Storm
Red Hat Security Advisory 2014-2021-01 ≈ Packet Storm
Red Hat Security Advisory 2014-2023-01 ≈ Packet Storm
Red Hat Security Advisory 2014-2010-01 ≈ Packet Storm
Dynamic Reconstruction Of Relocation Information For Stripped Binaries
Why every CIO needs a Kevin McCallister in 2015 | Scott Spiker | LinkedIn
McAfee: Cyberattacks Will Not Slow in 2015
Some 100,000 or more WordPress sites infected by mysterious malware | Ars Technica
Beyond ACORN: Cracking the infosec skills nut - Security - Blogs -
All aboard the internet of things infosec hype train | ZDNet
IT Force Field: Preventing The Risk Of Viruses In Business | BCW
Experts: ISIS loonies use 'digital AK-47' malware to hunt victims • The Register
Alina POS malware "sparks" off a new variant - SpiderLabs Anterior
Cybercrime predictions for 2015
Target Data Breach Suit Left Largely Intact - Law360
Medical records exposed in massive Sony hack | Healthcare IT News
Comprehensive Analysis of the “Destructive” Malware Behind FBI Warnings -
California nonprofit sues San Diego Police Department over stingray documents - SC Magazine
'Spark' shares traits with Alina, JackPOS, uses AutoIt differently - SC Magazine
Lauren Hasenhuttl sur Twitter : "Participating in @JuniperNetworks Hour of Code for kids. Future Junos coder!"
Lauren Hasenhuttl sur Twitter : "Thx @Beaker for teaching the kids about coding @JuniperNetworks @codeorg "hardware powered by software""
Measuring Drive-By Download Defense In Depth
Top 5 High-Profile Cyber Security Breaches | IT Business Blog
2014 is ending, but this wave of technology disruptions is just beginning - The Washington Post
White House calls Sony hack a "serious national security matter," gov't mulls proper response - SC Magazine
Four Steps To An Effective Targeted Attack Response | Security Intelligence Blog | Trend Micro
6 issues surrounding IoT Security in 2015 - Computer Business Review
Hacked in 2014: The Year of the Data Breach :: Tech :: Features :: Paste
Sony attack linked to North Korea, theaters bail over terrorism threat | ZDNet
What’s Booming In Small Business
Sony Asks Media to Destroy Hacked Data: Do They Have a Case?: Video - Bloomberg
RSA details new Boleto malware family - SC Magazine
Researchers find 'CoolReaper' backdoor in CoolPad devices - SC Magazine
Misfortune Cookie crumbles router security: '12 MILLION+' in hijack risk • The Register
My Internet of Everything Holiday Wish List
Managing a cyber crime scene -- FCW
Critical 'Misfortune Cookie' bug puts millions of internet-connected routers at risk - SC Magazine
McAfee sur Twitter : "Choose comfort and joy this holiday season. Watch out for bogus online offers. #12Scams."
How to train your staff on cyber security (and make it stick) | PCWorld
Forensics Europe Expo 2015 - Visitor
A Decade of Fraud and Cybercrime - YouTube
Reaction to the Sony Hack Is 'Beyond the Realm of Stupid' | Motherboard
Thoughts on Workplace Privacy
2014 State of the Union for Mobile Performance
No 'Interview' ... on any platform
Goldeneye: Efficiently And Effectively Unveiling Malware’S Targeted Environment
Data Security Breach Prevention Guide Download | Kaspersky Lab
PCI Compliance: Preparing for Version 3.0 - eSecurity Planet
Do Employees Pose the Biggest Threat to Information Security? ::Security & Resiliency:: Midsize Insider
2 More Former Sony Workers Sue Over Data Breach - ABC News
Mobile spyware makers are on shaky ground as the law begins to catch up with them | Symantec Connect
Cybersecurity & Cyber Defense | Implementing the 20 Critical Controls on a Low-Cost Budget: Do It, Dont Worry About It! | SANS Institute
Mobile banking, the safe way
Business must support staff training, says IT Governance as UK Government announces new cyber skills projects - World News Report
IBackup v10.0.0.45 suffers from a local Privilege Escalation Vulnerability | VULNERABILITY MAGAZINE - Bug Bounties, Acknoweldgements & Security Research
2 more former Sony workers sue over data breach |
Reboot 25: Thought leaders - SC Magazine
Does NFV and Virtualisation Herald the End of Blac... - J-Net Community
How to Fool a Computer With Optical Illusions - The Atlantic
The “Easy Button” for Cyber-Attack Mitigation: Introducing Radware’s Attack Mitigation Service | Radware Blog
Jeans and blazers will feature RFID blocking fabric - SC Magazine
Organized criminals targeting individual iPhone, Android users | CSO Online
Point-of-sale malware creators still in business with Spark, an Alina spinoff | CSO Online
6 facts about mobile connectivity in developing and developed countries - Computer Business Review