Cross Site Request Forgery Basics
Instant Anonymity: Are Ephemeral Apps Really Safe? - Security News - Trend Micro USA
PortEx- Java Library for Static Analysis of PE File | SecTechno
Be Aware of Your Privacy and Security When Shopping Online - Security News - Trend Micro USA
Bsides Augusta 2014 - Adventures In Asymmetric Warfare: Fighting The Av Vendors
Super Bowl XLIX: How wearable tech is changing the NFL
Crypto-Ransomware Spreads into New Territories - Security News - Trend Micro USA
Symantec sur Twitter : "We’ll be keeping a close eye on ball security today. #deflategate #SB49"
Registration Center: Subscription Required | Business Insurance
ThreatFinder | AlienVault
The Hacker News sur Twitter : "#GutFeeling #Security"
Data Privacy and Online Gaming: Why Gamers Make for Ideal Targets - Security News - Trend Micro USA
GHOST a 14 year old vulnerability in Linux | SecTechno
Bsides Augusta 2014 - When Zombies Take To The Airwaves
The Hacker News sur Twitter : "#Facebook for #iPhone to Show Location-Based Place & attractions Tips (users are visiting) in the News Feed."
Finding an Unknown Threat with RSA Security Analytics and RSA ECAT - YouTube
Chassis Cluster Interface Monitoring - YouTube
5 Critical Cloud Security Practices - InformationWeek
Superbowl XLIX Hype Deflated by Spam - Security News - Trend Micro USA
Bsides Augusta 2014 - Spying On Your Employees Using Memory
Android in the Enterprise Part 3 – Protecting Against Malicious and Risky Apps | Symantec Connect
Facebook, Instagram, and Tinder Were Down: What This Means for You - Security News - Trend Micro USA
Announcement of Winners - Best Bug Bounty Program, Best Upcoming Program & Best Issue in 2014 | VULNERABILITY MAGAZINE - Bug Bounties, Acknoweldgements & Security Research
HipChat Security Notice and Password Reset — HipChat Blog
Maligno Video Series - Multiple Server Setup
Tablets: Too Complex for NFL's 'Old' Folks - WSJ
Shmoocon Firetalks 2015 - Opening
Agni 5, India's Longest Range Ballistic Missile, Successfully Test-Fired
Zscaler Research: Exploit Kits: Anatomy of a Silverlight exploit
Symantec Intelligence Report: December 2014 | Symantec Connect
The Pirate Bay Returns From The Dead - Hacker News
Shmoocon Firetalks 2015 - Plaguescanner: An Open Source Multiple Av Scanner Framework
US military explores biometric replacement for passwords | ZDNet
Topface Facepalms As It Surrenders To Data Breach Hacker Blackmail - Forbes
Shmoocon Firetalks 2015 - I Hunt Sys Admins Will Schroeder
Introducing AWS Storage Gateway VTL support for Backup Exec 2014 | Symantec Connect
Shmoocon Firetalks 2015 - Collaborative Scanning With Minions: Sharing Is Caring
Anonymous vs Lizard Squad, Anonymous takes down Lizard Squad website, Twitter handle also suspended
How Vetting Mobile Apps Works for App Stores and Its Users - Security News - Trend Micro USA
GHOST Vulnerability Glibc CVE-2015-0235 | Ghost Updates | SANS
SANS Institute - Photos du journal | Facebook
The GHOST in the machine – 60 Sec Security [VIDEO] | Naked Security
Data Privacy Day: Why Data Privacy Awareness Is Important - Security News - Trend Micro USA
New solution from Experian and BillGuard helps retailers protect their customers against identity theft
Shmoocon Firetalks 2015 - Chronicles Of A Malware Hunter
How Endpoint Encryption Works
Kaspersky Lab Launches Secure QR Scanner | Kaspersky Lab US
Trend Micro at VMware Partner Exchange 2015 -
WhatsApp Starts Rolling out Voice Calling Feature - Hacker News
RSA Conference sur Twitter : "#RSAC keynote speaker Amit Mital of @Symantec holds 43 US & Int’l patents, and is an avid alpine skier."
ZeroAccess click fraud botnet coughs back to life | Naked Security
Hacked or Spoofed: Digging into the Malaysia Airlines Website Incident - Security News - Trend Micro USA
About – RSA Conference
Networking FAQ 3: Names and Addresses -
Shmoocon Firetalks 2015 - Ssh-Ranking
INFOGRAPHIC: The Evolution of Data Privacy
Snapchat jihadist-fearing peers return with LAST GASP Snoopers' Charter demand • The Register
Researchers observe databases being encrypted, websites held for ransom - SC Magazine
Data Security Policies Are Improving, but Risks Keep Rising
Weekend news review: January 26-30
CyberWar Games- Video 3 Title: Tools and Concepts - Dig, NetCat, and John the Ripper - YouTube
A single DDoS attack could cost over $400,000
Call for papers for Infosecurity Intelligent Defence 2015 - Infosecurity Magazine
Challenge 9: Session ID Analysis
Shmoocon Firetalks 2015 - Resource Public Key Infrastructure
Security Tube sur Twitter : "How would this be for our new logo? :)"
Data Protection Starts with Everyone - Infosecurity Magazine
Malware Poses as Flash Update Infects 110,000 Facebook Users within 2 Days - Hacker News
DzHack Event 2015
WAHCKon Perth 2015
Detection On Wep Arp Request Replay Attack
IBM Systems Magazine Publishes ASPG Cryptography Expertise – Press Release Rocket
IBM Systems Magazine Publishes ASPG Cryptography Expertise
Detection On Deauthentication
The ‘Smart’ way to enhance VMware virtual machine’s performance | Symantec Connect
Watch "Researcher hacks drove with Maldrone malware" Video at SCMagazine
USArmyResearchLab/Dshell · GitHub
Nextpert: 6 tips to help with cyber security
UMass Medical Center reports possible data breach | Local News - WCVB Home
Maligno Video Series - Multiple Clients
Is Your Small Business Prepared for These 4 Big Compliance Risks? |
Exploring Control Flow Guard in Windows 10
Cyber Defense | SANS Instructor Paul Henry Shares Tips On How to Secure Your Organization's Infrastructure Using a Multi-layered approach | SANS Institute
The Hack That Warmed the World | Foreign Policy
Who will pay for the Internet of Things? - Telegraph
Maligno Video Series - Client Exe Generation - Pyinstaller
Linux GHOST vulnerability (CVE-2015-0235) is not as scary as it looks | Symantec Connect
Improving Your Privacy on Social Networks - Security News - Trend Micro USA
Scapy: Deauthentication Attack - Pentester Academy
Security priorities shifting to preventing breaches, improving internal controls | CSO Online
Does your mate send smut vids on Facebook? 1. That's a bit weird. 2. It may be malware • The Register
Hack of the Day: Wireless SSID Sniffer in 10 Lines of Python - YouTube
D-Link routers vulnerable to DNS hijacking
Schneier on Security: Friday Squid Blogging: Large Squid Washes up on Greek Beach
It’s Baaacck: Ransomware Returns with a Vengeance -
Hello World in Assembly
Be warned: Google enlists Chrome in push for encrypted Web - CNE
Debian Security Advisory 3147-1 ≈ Packet Storm
Online Dating Site Topface Pays Hacker To Not Reveal Email Addresses ≈ Packet Storm
Debian Security Advisory 3146-1 ≈ Packet Storm
Lift Conference 2015 | Lift Conference
McAfee Data Loss Prevention Endpoint Privilege Escalation ≈ Packet Storm
WhatsApp Profile Pic Privacy Blunder Discovered ≈ Packet Storm
NPDS CMS Revolution-13 SQL Injection ≈ Packet Storm
Getting “Eyes on the Glass” for Critical Infrastructure – Blog Post – RSA Conference
Bsides Columbus 2015 - Breaking Bad
Google Forced To Make Data Privacy Changes | Enterprise Security Today
SymantecVoice: How To Secure Your Personal Data In The Internet Of Things - Forbes
Not So Spooky: Linux "Ghost" Vulnerability
ZeroAccess botnet reactivates, click fraud activity resumes - SC Magazine
Report: From Q3 to Q4, 90 percent increase in global DDoS attacks observed - SC Magazine
D-Link routers subject to backdoor hacking, again- The Inquirer
Business Associates: A Greater Security Threat Than Hackers
UMass Memorial Medical Group reports data breach - Worcester Telegram & Gazette -
BCBS of Tennessee shares personal data on 80K in marketing campaign - SC Magazine
Super-cookie crumbles: Verizon vows to FINALLY kill off hated zombie stalkers • The Register
New Research Shows Global DDoS Attacks Grew 90% in Q4 2014 | The State of Security
Big insurer groups push Senate on cyber security bill | Business Insurance
Hackers blackmailed Silk Road underground | ZDNet
Malware uses video and tags to infect 100,000 people on Facebook | CSO Online
Kaspersky notes increase in legitimate certificates used to sign malware - SC Magazine
Schneier on Security: Co3 Systems Is Expanding into Europe
Pirate Bay relaunch labelled corporate malware risk - Computer Business Review
WhatsApp Web has privacy holes that expose user photos | Naked Security
Phishing quiz: Can you spot a scam when you see one? Don't be so sure - CBS News
The "Unicorn" Budget: Can CIOs And CFOs Agree On IT Spending? (with images, tweets) · symantec · Storify - Storage Reviews
Russian dating site rewards hacker for amassing email database and 'discovering vulnerability' - SC Magazine
Strong Authentication and the Trusted Mobile Device - YouTube
Bsides Columbus 2015 - Cloud And Virtualization Theory
Backdoor.Winnti attackers have a skeleton in their closet? | Symantec Connect
Report Global Disaster Recovery-as-a-Service Market Will Grow At Dramatic Rate
Reddit's first transparency report shows user info provided for 58 percent of requests - SC Magazine
RSA Conference sur Twitter : "#RSAC keynote speaker Paul Kocher was inducted into the National #CyberSecurity Hall of Fame in November @rambusinc"
Kaspersky: DDoS Attack Can Cost a Company More Than $400K | Managed Security Services content from MSPmentor
Top 10 Internet Law Developments of 2014 (Forbes Cross-Post)
Bugtraq: [security bulletin] HPSBOV03226 rev.2 - HP TCP/IP Services for OpenVMS, BIND 9 Server Resolver, Multiple Remote Vulnerabilities
Cloud Insider Threat Survey
ZeroAccess botnet back in business | CSO Online
Activity Info
BBC News - Office puts chips under staff's skin
WolfPAC Launches Next Generation Online Risk Based Business Continuity Planning Solution -- BOSTON, Jan. 30, 2015 /PRNewswire/ --
Rambus Cryptography Research Division Enters Agreement with Microsemi to Resell Advanced Security Technologies to Penetrate Opportunities in Government and Military Markets
BackBox Linux 4.1 released! | BackBox Linux
Industry backing Obama's cybersecurity agenda
Networking FAQ 2: Certifications -
Bsides Columbus 2015 - User Behavior Analysis
Top 4 Leading Providers of Gigabit Internet in 2015
Phishing scam tricks users by acting as fake child sex offender alert - SC Magazine
xHamster malvertising campaign exploits Adobe zero-day - SC Magazine
Teenager exposes WhatsApp profile pic privacy bug • The Register
Data Privacy in the Era of Sharing – Blog Post – RSA Conference
Bugtraq: [SECURITY] [DSA 3146-1] requests security update
Bugtraq: [SECURITY] [DSA 3147-1] openjdk-6 security update
QR Scanner | Capacité de protection contre les codes QR malveillants | Kaspersky Lab
New DYRE Variant Hijacks Microsoft Outlook, Expands Targeted Banks
The Importance of Effective Information Sharing | Cyber Trust Blog
Outlook for iOS app "breaks" corporate security, developer says | ZDNet
Disaster recovery grants help flood survivors rebuild in Larimer County - Estes Park Trail-Gazette
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network …
Bugtraq: ESA-2015-006: EMC Avamar Missing Certificate Validation Vulnerability
ITEXPO Panel: Sidestepping Security Hacks in a Mobile World
Google wireless service could disrupt carriers
Air-Gapped Computers Can Be Compromised Using EM Side-Channel Attacks, Says Researchers
IsAnybodyDown’s Craig Brittain banned from the ‘revenge porn’ business | Naked Security
2600 won't settle with the distributor that screwed it and all the other indie mags - Boing Boing
Zeus variant targeting Canadian banks, U.S. banks may also be a target - SC Magazine
A Global Black Market for Stolen Personal Data
Radware’s DefenseFlow with Cisco 3850 and OpenDaylight Controller - Demo - YouTube
Security Partners | Find or Become a Partner | Kaspersky Lab Indonesia
Symantec sur Twitter : "@FrankOKelly wise words"
6 Biggest Business Security Risks and How You Can Fight Back | CIO
UK official LOSES Mark Duggan shooting discs IN THE POST • The Register
Bsides Columbus 2015 - Plunder, Pillage And Print - The Art Of Leverage Multifunction Printers During Penetration Testing
Android in the Enterprise Part 2: 4 Steps for Protecting Against Threats on the Device | Symantec Connect
Office Puts Chips Under Staff's Skin ≈ Packet Storm
Outlook For iOS Security Fail ≈ Packet Storm
Financial Firm Infiltrated for Six Months With Off The Shelf Malware ≈ Packet Storm
Bugtraq: [SECURITY] [DSA 3145-1] privoxy security update
InnoTech taps ‘Dr. Z’ as 2015 keynote speaker - San Antonio Business Journal
Researchers show how easy it is to de-anonymize shoppers
How three small credit card transactions could reveal your identity | CSO Online
Zero Day Weekly: D-Link router hijack, China demands backdoors, critical Linux Ghost | ZDNet
Schneier on Security: Operating a Fake Bank
Could your business survive a cyber attack? - Kansas City Business Journal
Does size matter? It does if you’re French, and a chess-loving hacker! | Naked Security
Facebook to fill with (more!) kittens in Wickr’s message-hiding scheme | Naked Security
Reddit released its first transparency report
HITBSecConf2015 Amsterdam
How to install Windows 10 in a virtual machine | ExtremeTech - News and information from the UK contact centre | News and information from the UK contact centre industry
Nike+ FuelBand SE BLE Protocol Reversed
Dating site Topface buys back 20 million hacked email addresses | Naked Security
Security Experts Unite to Rewrite Proposed Cyber Laws | SecurityWeek.Com
How to protect yourself from phishing attacks
Identity theft prevention tips and assistance
Is The Internet of Things IPv6 Ready? - Forbes
GHOST glibc Vulnerability Affects WordPress and PHP applications - Hacker News
Bsides Columbus 2015 - Common Sense Security Framework
UK watchdog grills big biz: So HOW do you use their 'consumer data'? • The Register
Cable’s next step: Offer “virtual” cellular service — Tech News and Analysis
Internet of Things: A security threat to business by the backdoor? | ZDNet
How to determine if insiders should be your primary concern
Nearly half of all DDoS attacks uses multiple attack vectors
Unvalidated Redirects: Security through Obscurity!
Generate Mozilla Security Recommended Web Server Configuration Files
Information Security News: 3 things CSOs can learn from CPOs
Information Security News: What every utility should know about the new physical security standard
Using Customer Data? Start With Clean Data
Super Bowl: costly spectacle amid heightened security and surveillance | Naked Security
Outlook for iOS does security STUPIDLY says dev • The Register
What IT workplace issues keep CIOs awake at night?
How people perceive online privacy
Positive Research Center: GHOST(dot)WEB: The First Blood
Malware don't need Coffee: CVE-2015-0311 (Flash up to integrating Exploit Kits
Bsides Columbus 2015 - Owasp Mobile Top Ten - Why They Matter And What We Can Do
New 'f0xy' malware is intelligent - employs cunning stealth & trickery
MSIL/Agent.PYO: Have botnet, will travel
GHOST gethostbyname() heap overflow in glibc (CVE-2015-0235) - SpiderLabs Anterior
Facebook patched flaw within 9hours - XML Cross Domain Vulnerability | VULNERABILITY MAGAZINE - Bug Bounties, Acknoweldgements & Security Research
Bugtraq: NEW VMSA-2015-0002 VMware vSphere Data Protection product update addresses a certificate validation vulnerability
Bugtraq: [SECURITY] [DSA 3144-1] openjdk-7 security update
Ghost Flaw Still Haunting Linux Despite Patching Efforts : PERSONAL TECH : Tech Times
A docket, tweet and selfie can reveal your identity, boffins find • The Register
Pentesting Windows Endpoints: Automatic Outbound Open Port Detection
Beware the Unwitting Insider Threat -
OAS hails Jamaica's cyber security efforts - News -
Clearing the Air with Gogo Inflight Internet
Bsides Columbus 2015 - Got Software? Need A Security Test Plan? Got You Covered.
Microsoft's decision to ditch Surface is a long-overdue mercy killing for Windows R
Threats and technologies of a shifting data security landscape
2015: Trends in network performance measurement and application virtualization - SC Magazine
Habits Are Formed By Repetition, Not Reminders
Security of Home Surveillance Cameras | Security Intelligence Blog | Trend Micro
Samsung's $100 Million Internet of Things Bet Is Even Crazier Than You Think | Fast Company | Business + Innovation
Sony hack serves as wake-up call, boosts interest in cyber security protocol | Business Insurance
We take bots down, but they get up again – you're never going to keep them down • The Register
Bsides Columbus 2015 - Corporate Wide Ssl Interception And Inspection
iTunes Connect does developer shuffle • The Register
Insider Threat Alert as Spokesman Allegedly Leaks Private Data - Infosecurity Magazine
Kaspersky Lab sur Twitter : "Time to #TestYourBrain! Do you know the answer?"
3 things CSOs can learn from CPOs | CSO Online
POS Terminals Rich Vein for Gold-Digging Hackers | Cybersecurity | TechNewsWorld
Cisco 2015 Annual Security Report: Top Takeaways - YouTube
Challenge 19: HTML Injection IV Solution
Luna smart mattress will turn off lights when you go to sleep, get coffee ready when you’re waking up - News - Gadgets and Tech - The Independent
Bsides Columbus 2015 - How To Rapidly Prototype Machine Learning Solutions To Solve Security Problems
Companies That Take Social Media Security Lightly Won't Be Able To Hack It In 2015 01/28/2015
Ransomware: Refusing to Negotiate with Attackers