Why Palo Alto Networks Rallied 87% in 2014 (PANW)
The Detekt government spyware detection tool, a speech recognition software competition, and Google acquires RelativeWave—SD Times news digest: Nov. 20, 2014 - SD Times
FTC shuts down two more tech-support scammers
The Android 5.0 Lollipop aam aadmi review: I think I’ve made a terrible mistake | The Indian Express
Webcast: Preparing for Big Data and the Internet of Things - Websense Insights
Uber tracking raises privacy concerns
Businesses Prepare as End-of-Life for Windows Server 2003 Nears — BizTech
NSA chief admits China could cripple U.S. power grid, financial networks | ZDNet
Nexus 9 vs Nokia N1: Buy now or wait a bit longer? | Christian News on Christian Today
Halifax homes spied on by camera hackers - Halifax Courier
Customers Aren't Worried About Data Breaches [Infographic]
Foreign Governments Have Hacked U.S. Grid, NSA Head Says - Businessweek
Hacking, hitmen and high stakes in biggest ever cyberwar exercise | The Times
Firing Range — Open Source Web App Vulnerability Scanning Tool From Google
Activity Info
Schneier on Security: Pre-Snowden Debate About NSA Call-Records Collection Program
SC Congress Chicago 2014: Make FBI an ally after breach - SC Magazine
Survey: Breaches don’t change consumer behavior | Chain Store Age
Tracking Activity in the Chinese Mobile Underground | Security Intelligence Blog | Trend Micro
Actiance Recognized in Gartner 2014 Magic Quadrant for Enterprise Information Archiving
Apple’s Mac computers can automatically collect your location information - The Washington Post
Federal Trade Commission busted two telemarketing schemes selling fake tech support, raking in $120 million.
Imperva Expands Big Data Protection with SecureSphere 11.0 - MarketWatch
Microsoft Patches Critical Windows Server Flaw - Microsoft/Windows on Top Tech News
AVG Protection PRO Review & Rating |
Antivirus Comparisons: Kapersky Antivirus vs. G Data Total Protection
How to protect yourself online - B
NSA director predicts major cyberattack by 2025 -- FCW
Avast Free AntiVirus vs AVG AntiVirus - Which Free Antivirus is best for you
Owasp Appsecusa 2014 - Your Password Complexity Requirements Are Worthless
Buffer overflow vulnerabilities identified in Hikvision DVR devices - SC Magazine
Open-source IaaS: OwnCloud 7 Enterprise Edition arrives | ZDNet
Forty-two Senators Block USA Freedom Act to Limit NSA Surveillance
British Watchdog Wants Russian Hacking Site Shut
Lawmaker: Delayed notification of postal hacking ‘doesn’t fly’ - The Washington Post
Android malware 'NotCompatible' evolves, spawns resilient botnet - SC Magazine
Google Online Security Blog: Ready, aim, fire: an open-source tool to test web security scanners
USPS draws ire of Congress over data breach response - SC Magazine
New Strategies and Features to Help Organizations Better Protect Against Pass-the-Hash Attacks | Cyber Trust Blog
Hackers use radio signals to steal private information from PCs OFFLINE | Daily Mail Online
NSA Director Worries Some Nations Hacking Into Computer Networks to Shut Down US Utilities - ABC News
Actiance Recognized in Gartner 2014 Magic Quadrant for Enterprise Information Archiving - Press Release - Digital Journal
Amazon promises to run entirely on renewable energy... finally | ZDNet
NSA director confirms China, other countries can hack into and shut down critical systems - 11/20/2014 10:24:02 AM | Newser
U.S. Cyber Commander Expects Attack Before 2025Talk Radio News Service
Brazil doubles down on cyber security

 | openDemocracy
More Scare Tactics From the Government Regarding Apple’s Super Secure iMessages | PadGadget
Viptela Partners With Zscaler in Industry-First Integration of SD-WAN and Cloud Security Infrastructure
Australian Government Data Breach Linked to Poor Security Training - eSecurity Planet
TalkRadio 790 KABC - How Russian Website Is Spying on Thousands of Private Moments [From ABC News]
IT needs to stop pretending it's not responsible for cloud security | Computerworld
Move Your Network to the Cloud - YouTube
Five Steps to PCI DSS Compliance
Security or Checking a Box?
Tech Data Partners Get Cisco Cybersecurity Solutions
Financial Times: NATO holds largest cyber war games
USPS delayed breach notification so as not to tip off hackers - FierceGovernmentI
Russian Webcam Hackers Spy on Bedrooms and Offices - NBC News
Azure vs. AWS | IT World Canada Syndicated
Russian hackers streaming video from thousands of private webcams |
Amazon Vows to Run on 100 Percent Renewable Energy | WIRED
New crash tests reveal which minivans are safe -
Risk of Adverse Outcomes Up With PCI In Adults With Diabetes --Doctors Lounge
Mobile Internet Faces Big Obstacles - Network Computing
Juniper Networks sur Twitter : "We’re thrilled to win the @TSIACommunity STAR Award for Innovation in Enabling Customer Success in Support Services!"
Access Governance 101: Job Changes and Elevated Permissions
Greek Hackers Breach Legal Database |
Gartner's cloud showdown: Amazon Web Services vs. Microsoft Azure - ARN
Homeland Security Today: Destructive Malware Evades Detection to Cause Multi-million Dollar Losses
How to reduce your risk of a cyber security breach - The Business Journals
Poland Opens Probe Into Electoral Hacking - ABC News
Polish election commission website hacked
Owasp Appsecusa 2014 - Clientside Security With The Security Header Injection Module Shim
High volume DDoS attacks rise in Q3 2014 | ZDNet
PCI helps kids globally | Portage Daily Graphic
Verizon enhances cloud purchasing experience with new marketplace - FierceTelecom
Russian-backed website hacks into thousands of webcams in U.S. - CBS News
Hackers to probe cyber crime defences at British banks| Reuters
Cyberspace calls for better coordinated governance | Shanghai Daily
ESPN Student Reporter Makes Jameis Winston Joke During FSU Shooting, Claims Hacking
Hackers post webcam, security camera, baby monitor video online - Technology & Science - CBC News
Can Hackers Get Into Your Pacemaker? - The Atlantic
Enter The Digital Risk Officer
Russian Hackers Posting Baby Monitors, Web Cams Online
Exploiting Sudo's Grace Period ≈ Packet Storm
Paid Memberships Pro Path Traversal ≈ Packet Storm
CryptoPHP - Analysis Of A Hidden Threat Inside Popular Content Management Systems ≈ Packet Storm
RSA Conference sur Twitter : "The mantra of any good security engineer is: 'Security is a not a product, but a process.' -@Bruce_Schneier"
Detekt government surveillance spyware on your computer
Bugtraq: [SECURITY] [DSA 3075-1] drupal7 security update
Swedish Court Rejects Julian Assange's Appeal to Dismiss His Arrest | WIRED
Hackers blamed for unusual tweets from Jeremy Clarkson, Columbian FARC rebels | Naked Security
FireEye: A Next-Generation Cyber Security Play - FireEye, Inc. (NASDAQ:FEYE) | Seeking Alpha
Mandriva Linux Security Advisory 2014-217 ≈ Packet Storm
WordPress CM Download Manager 2.0.0 Code Injection ≈ Packet Storm
Advantech AdamView 4.3 Buffer Overflow ≈ Packet Storm
Spotlight Secure - Actionable threat intelligence - J-Net Community
Secure Apps & Mobile Devices – Don’t be that Guy – Trend Micro
Team heads to cyber war competition - News - Pekin Daily Times - Pekin, IL
Russian website allows webcam hackers to spy on British families in their own homes | UK | News | Daily Express
The Dridex Threat: How to Block the Latest Malware Aimed at Banks - American Banker Article
Review: Shane Harris' book '@War' details rising military-Internet link - LA Times
Imperva Expands Big Data Protection with SecureSphere 11.0 - Media Releases - CSO | The Resource for Data Security Executives
CSA Guide to Cloud Computing: Implementing Cloud Privacy and Security: Raj Samani, Jim Reavis, Brian Honan: 9780124201255: Books
Red Hat Security Advisory 2014-1876-01 ≈ Packet Storm
Red Hat Security Advisory 2014-1877-01 ≈ Packet Storm
Ubuntu Security Notice USN-2410-1 ≈ Packet Storm
Keeping the Bots at Bay: How to Detect Brute Force Attacks
Forrester's Best of the Best in Private, Public Cloud Space
There Will Be Surveillance Reform | Just Security
How to protect yourself from PC tech support scams | PCWorld
FireMon Extends Network Security Monitoring to Cloud Service Infrastructure
Schneier on Security: Citadel Malware Steals Password Manager Master Passwords
Malware’s new target: your password manager’s password | Ars Technica
Amnesty / EFF Launch Detekt Tool To Spot Web Snooping ≈ Packet Storm
CAPTCHA Rapture As 'Thousands' Affected By 7 Year Old Bug ≈ Packet Storm
Russian Site Lists Breached Webcams ≈ Packet Storm
What will cybersecurity look like in 2025?, Part 3: How Microsoft is shaping the future of cybersecurity | Cyber Trust Blog
Local news from Rock Hill, SC | The Herald
A Peek Inside a POS Scammer’s Toolbox | Security Intelligence Blog | Trend Micro
SANS Securing The Human | American vs. European Reporting - Creating a Sense of Urgency
Russian hackers are turning your webcams without you knowing | Metro News
Critical infrastructure vulnerable to hackers | Russia Beyond The Headlines
Gartner mages: And the Enterprise Archiving Magic Quadrant top spot goes to... • The Register
Russians Hacking Into Home Webcams Sparks U.K. Warning - Businessweek
How to Protect Yourself From a Data Breach | TV - WMUR Home
Review: Snowden documentary ‘Citizenfour’ steeped in real-time anxiety - Go Knoxville Story
Charles Dance: 'I was a phone hacking victim' | Showbiz | News | Daily Express
Trend Micro Collaborates with Latin American Leaders on Cybercrime -
Webcam hack uncovered: how you can protect yourself| News | The Week UK
Hacking Cava Grill: How to order nachos - The Washington Post
Cyberdefender who cut his teeth in Worcester sounds alarm on hackers - Worcester Telegram & Gazette -
US strikes massive tech support scam - CSO | The Resource for Data Security Executives
Court shuts down tech support 'scams' targeted by FTC | PCWorld
Data breach at Triangle food-takeout shop unique because of its size - Triangle Business Journal
Ransom malware attacks underscore limitations of anti-virus software -
Yahoo Replaces Google as Mozilla Search Partner | Re/code
SANS Institute Brings Information Security Training Back to the Big Easy with SANS Security EAST 2015 | SANS Institute: Press
Trend Micro Security Predictions | The Invisible Becomes Visible
Russian website posting live video streams from hacked webcams
Russian webcam hackers spy on bedrooms and offices
Hackers use webcams to spy inside homes of Middlesbrough families and broadcast video live to internet (From The Northern Echo)
Enterprise Mobile Dollars Pouring To iPhone |
Hacked footage from BABY MONITORS, webcams and CCTV systems in Britain being broadcast LIVE on Russian website - Mirror Online
Do you know who's watching you through your webcam and CCTV? | Irish Examiner
Minivans show major flaw in IIHS safety test
Got a webcam? You might want to pick a stronger password right about now | ZDNet
Tufin Adds Support For Amazon Web Services, Delivers Security Policy Orchestration For Public, Private And Hybrid Cloud Environments - BWWGeeksWorld
Warning as webcam hackers stream live footage from Manchester homes, businesses and gym on the internet - Manchester Evening News
Warning on webcam 'spying' site « Express & Star
BBC News - Breached webcam and baby monitor site flagged by watchdogs
Warning on webcam 'spying' site « Shropshire Star
Target says customers are over last year's data breach - Triangle Business Journal
Webcam hackers spy on Scots homes and post footage on Russian website | Glasgow & West | News
Russian website streams thousands of private webcams - Nov. 20, 2014
Warning on webcam 'spying' site -
Owasp Appsecusa 2014 - Ios App Integrity: Got Any?
Module 1: GDB TUI Mode
Digital Journal: A Global Digital Media Network
Idaho student busted for hacking himself straight-As: cops - NY Daily News
Webcam hackers 'spying inside British homes' - Channel 4 News
Staples Still Tallying Costs of Data Breach
Fitch Affirms Novartis AG at 'AA'; Outlook Stable| Reuters
Barracuda Offers Integrated Security; Boosts Portfolio with Consolidated Network and Content Security Solution
Information Security News: SMS pwnage on MEELLIONS of flawed SIM cards, popular 4G modems
Information Security News: Report: Government Has Only 5 Years To Secure Internet ofThings
Carnegie Mellon hosts expert panel on cyber security - Zawya
Ocoee High starts cyber-security team - West Orange Times & Observer - West Orange Times & Observer
RSA Conference APJ Day 1 Recap – Blog Post
How to delete your old, embarrassing, now-much-easier-to-find tweets | Naked Security
Selling disaster recovery -
Comprehensive FISMA and NIST SP 800-53 Information Security Policies and Procedures Now Available for Instant Download from the Experts at Flat Iron Technologies, LLC
ZDNet | Symantec
Lowe's scores big in earnings | The Journal Gazette
3 Reasons Why Lowe's (LOW) Will Outperform Home Depot (HD) Over The Next Few Days
Hackers turning smartphones into slave armies
Is Home Depot Still Hot After Earnings? - Home Depot, Inc. (NYSE:HD) | Seeking Alpha
HD: Buy Home Depot Despite Its Data Breach | InvestorPlace
The Morning Download: Post-PC CEO Reflects Starwood’s Deeper Mobile Shift - The CIO Report - WSJ
Hackers Streaming Brits' Private Webcams
Windows Kerberos bug: How to detect signs of exploitation before the update?
Meet Jasminder Singh - Indian Security Researcher ~ Pentesting and Ethical Hacking Blog
OpenDNS and IRISSCERT partner to fight security threats
8 ways Lollipop 5.0 reinvents Android - Computerworld
(ISC)²® Opens Call for Speakers for Third Annual CyberSecureGov Training Event - Press Release - Digital Journal
AVG Extends Global Partnership with ALCATEL ONETOUCH | Virtual-Strategy Magazine
How Splitting A Computer Into Multiple Realities Can Protect You From Hackers | WIRED
Webcam Hacking: Five Previous Attacks
U.K. to Shut Down Russian Webcam Hackers - The Daily Beast
Gartner Names Proofpoint a Leader in 2014 Magic Quadrant for Enterprise Information Archiving for Third Consecutive Year - BWWGeeksWorld
How the Dark Web's New Favorite Drug Market Is Profiting From Silk Road 2's Demise | WIRED
Free tool detects 'government surveillance spyware'
Activists release Detekt tool that finds surveillance malware | CSO Online
Intel to work with Europol on fighting cybercrime | CSO Online
The Brazilian Underground: A Market for Cybercriminal Wannabes? - Security News - Trend Micro USA
Russians Hacking Into Home Webcams Sparks U.K. Warning - Bloomberg
Residents in the Bristol area could be spied on by Russian hackers, via baby monitors and webcams | Bristol Post
Intronis Receives 2014 Cloud Computing Backup and Disaster Recovery Award
NetJapan, backup and disaster recovery solution provider, hires Richard Zinner as European Technical... -
A life of cybercrime, a caipirinha and a tan: Fraudsters love a Brazilian • The Register
Information Security News: Hackers seized database from City of Detroit, demanded $800k in bitcoin
Information Security News: Long-running Android botnet evolves, could pose threat to corporate networks
Paul O’Grady settles News of the World phone hacking claim ·
Cyberspace calls for better coordinated governance - People's Daily Online
FTC on PC malware security scams: How to avoid fake security programs | BGR
How to troubleshoot performance issues in SharePoint custom code on your own? Part 2 – High CPU Utilization - SharePoint Developer Support Team Blog - Site Home - TechNet Blogs
Spam Nation: Meet the Russian cybercrooks behind the digital threats in your inbox.
Bugtraq: [ MDVSA-2014:217 ] clamav
Bugtraq: CVE-2014-8877 - Code Injection in Wordpress CM Download Manager plugin
Cyber Security: Protect Yourself And Profit | Seeking Alpha
Amnesty's Detekt tool wants to help you thwart government spying | ZDNet
South Koreans defend their rights in cyberspace | East Asia Forum
Target Sees First Profit Boost Since Data Breach |
Thousands fall for Free Audi R8 Facebook scam
Boot Russian website Peeping Toms from your house ... secure your FRIKKIN' webcam • The Register
HTTP Verb Tampering Demo | What's next in payments
New Citadel variant is after your master password
Owasp Appsecusa 2014 - Modern Web Application Defense With Owasp Tools
8 ways Lollipop 5.0 reinvents Android | InfoWorld
Gartner’s cloud showdown: Amazon Web Services vs. Microsoft Azure | Network World
Local & North Carolina state news from Raleigh, NC |
Russia hacking site spying webcams worldwide: Britain
Change Your Password Now!
Security breaches: protecting your company by supporting your people
“Rotten stinking hovel” hotel charges couple £100 for bad Trip Advisor review | Naked Security
Billions of Android Devices Vulnerable to Privilege Escalation Except Android 5.0 Lollipop
How Millennials Created the IoT Without Even Knowing | WIRED
Paul Ryan sur Twitter : "@integrity_Solutions Sean Rooney speaking about the human element #irisscon"
Amnesty, EFF and Privacy International launch Detekt tool to spot web snooping - IT News from
Webcam hacking: How to keep your computer safe and what measures you can take to increase security - Wales Online
Webcam Hackers Could Be Watching You Online, Watchdog Warns
Secure file storage and sharing with nCrypted Cloud Review
Bugtraq: [ MDVSA-2014:216 ] php-ZendFramework
Waitrose enhances business continuity planning system with Fruition Partners UK - Retail Times
BrianHonan sur Twitter : "Hacker fuel at #irisscon :)"
Grampian Health Board rapped over patient data security failures | IT PRO
‘Digital dragon’ disrupts CIO agenda - CIO
Deep Identity Raises $470,000 To Help Companies Manage Access On Their Networks | TechCrunch
​If Russian spies were looking at your webcam - what would they see? | Gloucester Citizen
Is your webcam allowing hackers to peer into your home? - Telegraph
5 Reasons IT Is Scared of Mobile Security
Robert O'Donoghue sur Twitter : "The Workday security team taking over #IRISSCON in Dublin!"
Post Breach: Jimmy John’s, Coke Sued - DataBreachToday
Eddie Mize sur Twitter : "Please RT: Do Diligence? - My latest blog "If I do not know about it...I am not responsible!""
Six Welsh homes and businesses among hundreds of webcams hacked by Russian website - Wales Online
The Internet of Insecure Things | NDTV Gadgets
Baby monitors, CCTV cameras and webcams from UK homes and businesses hacked and uploaded onto Russian website - Gadgets and Tech - Life and Style - The Independent
IoT moves into business strategy - IT-Online | IT-Online
Police Blotter | | The Grand Blanc View
8 cybercrime trends that will shape I
How the threat landscape is shaping the network security business
U.S. energy grid hacked 79 times this year | Money - Home
Cloud is in, but big data trails - IT-Online | IT-Online
Sinister Russian website transmits live footage of hundreds families unwittingly filmed by their home webcams - Daily Record
TRA hosts the 10th Business Continuity Management Forum for the Telecommunications Sector - Zawya
PCI Applauds House Scrutiny of International Regulatory Standards
Good App/Bad App: Is Investigating Mobile Apps Necessary? | Security Intelligence Blog | Trend Micro
8 on your side: How hackers do what they do | Local News - WGAL Home
USB Armory is the Swiss army knife of security devices - Good Gear Guide Australia
New Synology NAS optimized for encryption and intensive tasks
Whitepaper: Zero Trust approach to network security
Most IT pros prefer open source to proprietary software
Section Introduction and Challenge 1
Owasp Appsecusa 2014 - Blended Web And Database Attacks On Real-Time, In-Memory Platforms
Hacktivists exploiting old, vulnerable corporate websites: Trend Micro - Channel NewsAsia
CAPTCHA rapture as 'thousands' affected by seven year-old bug • The Register
Four Best Practices for Discovering Cloud Data Sources | Symantec Connect
Webcam hackers could be watching you, watchdog warns | Technology | The Guardian
Jon Stewart On The 'Daily Show': 'I'm Still Really Proud Of The Work We Do' | KWI
Jimmy John's customers file class action suit over data breach | Fast Casual
U.S. energy grid hacked 79 times this year | Money - KSBW Home
How to encrypt an Android 5.0 Lollipop device - CNE
Webcam hackers 'spying on families' | Herald Scotland
Hackers seize Detroit's database, demand $800k. Motor City shrugs: OK, take it • The Register Nigeria: Insurgency and the Emir's Prescription
Chrome Browser Updated with 64-bit Mac OS X Support | Digital Trends
Timeline: How the Postal Service Data Breach Went Down -
10 hottest IT skills for 2015 | Computerworld
Fitch Rates NTPC's Proposed USD Notes 'BBB-(EXP)'| Energy & Oil| Reuters
Economy may expand at 5.6% in FY15: Fitch
Riley county looks to beef up courthouse security | Kansas First News
iOS And OS X Malware Suspects Nabbed In China - Site Also Shut Down
Paul O'Grady wins settlement for hacking claim - Liverpool Echo
Why It's Crucial to Get More Women Into Science
Astro-boffins start opening universe simulation data • The Register
Challenge 36: XSS 17
The Truth About ‘Friends’ - The Daily Beast
Russian spies use your computer to watch you at home then post photos online | Daily Mail Online
China Suspected in Attacks on USPS, NOAA | Cybersecurity | TechNewsWorld
Fitch Downgrades Sky to 'BBB-'; Stable Outlook| Reuters
Ebola, hackers drive word of the year: 'Exposure' - CNE
New Security Awareness Guidance Published By PCI Security Standards Council
CPI Financial | CPI Financial News | Banking and Financial News,Islamic Business and Finance, Commercial Banking | Delta Partners Emerging Markets TMT Growth Fund II investing $10 million into CipherCloud
CERN's 2014 Xmas gift from the Large Hadron Collider: Two new baryons • The Register
Black Hat Usa 2014 - Appsec: Svg Exploiting Browsers Without Image Parsing Bugs
Mac won't boot? Yosemite disabled TRIM for third-party SSDs
Hackers wade into US energy grid
Apple releases OS X Yosemite v10.10.1; Wi-Fi, Mail Fixes & Updates - Where to Download : Trending News : Latinos Health
BBC News - Phone hacking: Paul O'Grady settlement with News of the World
Important safeguards can keep hackers from stealing personal data from your computer -
Security Slice: Patch Or Be Prey - The State of Security
Vulnerability Coordination for the Internet… of Everything
Four Steps To An Effective Targeted Attack Response | Security Intelligence Blog | Trend Micro
Video: Symantec's Cecily Joseph Talks Diversity at Net Impact
Insurgency and the Emir’s Prescription, Articles | THISDAY LIVE
世界的にプライバシー侵害が疑われるNSAデータ収集問題--これまでを振り返る - ZDNet Japan
Hewlett Foundation gives $15M to MIT for new cybersecurity policy initiative - Boston Business Journal
Postal Workers Union Complains to NLRB About Post Office Data Breach | The National Law Review
Hackers turning smartphones into slave armies - Business - NZ Herald News
Protect yourself: cyber security tips for online holiday shopping -
GOTCHA: Google caught STRIPPING SSL from BT WiFi users' searches • The Register
Introducing the Industry’s First Threat-Focused Next-Generation Firewall
China ready to deepen int'l co-ops, uphold cyber security: Xi - CCTV News - English
Hackers targetting Android devices with malicious malwares | Tech/Gadgets | Malay Mail Online
Jon Stewart On The 'Daily Show': 'I'm Still Really Proud Of The Work We Do' | WUNC
Home Depot Earnings Review: Solid Growth On High Demand, Despite The Data Breach - Forbes
USB Armory is the Swiss army knife of security devices | PCWorld
"Exposure" Named 2014 Word of the Year by | Virtual-Strategy Magazine
Cybersecurity experts warn Windows Server 2003 users - The Times of India
Student arrested after hacking into school's computers and changing his grades from Fs to As to win $7,000 scholarship | Daily Mail Online
Hackers tried to hold a Detroit city database hostage
US energy grid targeted 79 times by hackers in 2014 alone
CNBC Transcript: CNBC Exclusive: Target Chairman & CEO Brian Cornell Speaks with CNBC's Courtney Reagan on "Fast Money Halftime Report" Today
U.S. energy grid hacked 79 times this year | Home - Home
Symantec and HP Sign Disaster Recovery as-a-Service Agreement for HP Helion OpenStack(R) - MarketWatch
US The Transition to the Agile Data Center
Passwords Aren’t Dead Yet — Here’s Why You Need A Password Manager | Satnam Narang | LinkedIn
AWS Partner Story: Trend Micro
Can Your Security Protection Keep Up with Roaming Mobile Workers? | Enterprise CIO Forum
Protecting yourself from hackers during holiday shopping | Video/Photos - Central and Southwest VA
WireLurker Malware Targets Apple at Its Core - Apple/Mac on Top Tech News
Black Hat Usa 2014 - Appsec: Ravage Runtime Analysis Of Vulnerabilities And Generation Of Exploits
Target's (TGT) CEO Brian Cornell on Q3 2014 Results - Earnings Call Transcript | Seeking Alpha
Target customers getting over credit, debit card data breach |
Target customers and profits are back after hack - Nov. 19, 2014
ABC7 News - KGO Bay Area and San Francisco News
WhatsApp now using end-to-end encryption in its Android app
Shellshock-exploiting Bash malware targets embedded devices running BusyBox | PCWorld
Student accused of making failing grades all A's - San Francisco Chronicle
Jon Stewart On The 'Daily Show': 'I'm Still Really Proud Of The Work We Do' | WVTF
NATO launches largest cyber exercise to test its network security - SC Magazine
Reese Witherspoon slams 'cruel' Zellweger comments | Entertainment | 3 News
Report: Data breach of Staples, Michaels likely connected
Zebra Technologies' Global Study Tracks the Growing Momentum of the Internet of Things in the Enterprise
Install Chrome 39 for OS X for 64-bit Web browsing - CNE
‘Cyber War Team’ to Monitor Web | The Cambodia Daily
A neverending story: PC users lose another $120M to tech support scams | Ars Technica
The Rise of Thingbots | Radware Blog
Chrome 39 contains 42 security fixes, fallback to SSL 3.0 removed - SC Magazine
WebApp Sec: Re: concurrent logins
WebApp Sec: RE: concurrent logins
Hewlett Foundation funds new MIT initiative on cybersecurity policy | MIT News
Apple OS X 10.10.1 Fixes Four Vulnerabilities
How to protect your plastic in times of retailer data breaches | FOX 11 Online | WLUK-TV
WhatsApp begins rolling out end-to-end encryption - SC Magazine
Black Hat Usa 2014 - Appsec: Pivoting In Amazon Clouds
U.S. Retailers Still Struggling With Data Breach Security, Says BitSight | CIO
Gartner Names Proofpoint a Leader in 2014 Magic Quadrant for Enterprise Information Archiving for Third Consecutive Year - MarketWatch
Trusted Security for SMBs - YouTube
Symantec and HP Sign Disaster Recovery as-a-Service Agreement for HP Helion OpenStack(R)
Despite Breach, Home Depot's Profits Grow - BankInfoSecurity
'Free' Credit Score Sites Duped Hundreds of Thousands - DailyFinance
The Hacker Digest - LIFETIME (PDF)
Internet Architecture Board Calls For Net Encryption By Default
WireLurker Malware Targets Apple at Its Core - Operating Systems on CIO Today
Protecting the Network: Today's Fierce Firewalls ::Security & Resiliency:: Midsize Insider
DOLLARS AND SENSE: Protecting yourself from hackers this holiday shopping season | Local News - Central and Southwest VA
Android Lollipop users warn of 'unusable' devices after upgrading | ZDNet
Whatsapp now provides end-to-end encryption by default for messages | Naked Security
Yosemite patch fails to squash OS X Wi-Fi bug | ZDNet
AWS re:Invent 2014 Wrap Up -
ROVNIX Infects Systems with Password-Protected Macros
The Year Of The Retailer Data Breach
US legislators poll banks on IT data breaches - FTSE Global Markets
Fake antivirus scams: It's a $120m business – and alleged ringleaders have just been frozen • The Register
2012: LinkedIn admits theft of users' passwords, invalidates them
Company that promised customers free credit scores agrees to $22M settlement - KGTV ABC10 San Diego
Court shuts down 2 alleged tech-support scammers
Details emerge on Windows Kerberos vulnerability | ZDNet
CESG approved cyber-security training launched - SC Magazine UK
Target and Home Depot Rebound from Hacking Scandals
Hackers Possibly Copied Postal Employee Pay Records -
Heel hacking: Woman arrested for allegedly attacking woman with stilettos |
USPS: Hack That Affected 800,000 Employees 'Very Sophisticated' - NBC News
Clarkson University: Cybersecurity Pioneer to Keynote Global Entrepreneurship Week at Clarkson University
Twitter Update Now Lets Users Search Every Public Tweet Ever Sent - ABC News
Vulnerabilities identified in three Advantech products - SC Magazine
State Department offers reward for arrest of Romanian fugitives - SC Magazine
Is every individual the same? Is every network the... - J-Net Community
GEN14 sur Twitter : "@JuniperNetworks exhibit booth looking great at #GEN14"
Decrypting the Notorious Banking Trojan ZBOT | Security Intelligence Blog | Trend Micro
7 commonly overlooked ways to tighten cybersecurity | Network World
WhatsApp Adds Snowden-Approved Encryption Techniques to Keep User Messages Safe : Business : Latin Post
NotCompatible botnet infects Android mobiles, infiltrates corporate networks - SC Magazine UK
Devices stolen from Boston physician in armed robbery led to data breach | Healthcare Dive
SANS Institute Brings Information Security Training Back to the Big Easy with SANS Security EAST 2015 - BWWGeeksWorld
Data breach: are you prepared to respond? - Lexology
Cam Newton had Twitter hacked because his password was 'Camnewton1' | Larry Brown Sports
Black Hat Usa 2014 - How To Leak A 100-Million-Node Social Graph In Just One Week? - A Reflection On Oauth And Api Design In Online Social Networks
Reese Witherspoon Calls Renee Zellweger Face Critics ‘Cruel’ | Amy Adams, Felicity Jones, Hilary Swank, Julianne Moore, Laura Dern, Magazine, Patricia Arquette, Reese Witherspoon : Just Jared
Hacking health care
USPS Hacked: Congress Presses for More Timely Notification After Data Breach - ABC News
Congress Presses for More Timely Notification After Postal Data Breach |
Dem: Agencies 'whistling through the graveyard' on data breaches | TheHill
Bugtraq: [CORE-2014-0008] - Advantech AdamView Buffer Overflow
Bugtraq: [CORE-2014-0010] - Advantech WebAccess Stack-based Buffer Overflow
Be the one who stops the next IT security breach - YouTube
PCI Addresses Insurance Gaps Involving Transportation Network Companies in North Carolina
U.S. State Department Takes Network Offline After Activity of 'Concern' | SecurityWeek.Com
BlackBerry’s Deal With Samsung: 3 Things Investors Need To Know (BBRY)
Student Accused Of Hacking Computer To Change Fs To As
Stocks to Watch: Target, Lowe’s, Staples - MoneyBeat - WSJ
Gone in 180 Seconds: Hackers Quickly Raid E-Mails in Search of 'Wire Transfer' and Sex Photos - Bloomberg
Kaspersky warns of paranoia over targeted hacking - Computer Business Review
Operation Mangal: Win32/Syndicasec Used In Targeted Attacks Against Indian Organizations | McAfee
Congress Presses for More Timely Notification After USPS Data Breach | KTIC Radio
Hackers Can Steal Data Wirelessly From PCs That Aren't Even Online - Bloomberg
Orange Business Services positioned as a Leader in Gartner Magic Quadrant for Managed Machine-to-Machine Services | M2M World News
Target says customers are over last year's data breach - Minneapolis / St. Paul Business Journal
TGT Stock: The Turnaround at Target Appears to be Working | InvestorPlace
Student accused of hacking Brigham Young U.-Idaho computer system to change grades |
Hollywood's Top Actresses Talk Nude Photo Hacking Scandal, Jennifer Lawrence & Renee Zellweger Critics
WhatsApp Adopts End-to-End Encryption for Android Users - The State of Security
Long-running Android botnet evolves, could pose threat to corporate networks | CSO Online
Postal Service ‘functioning normally’ after cyber breach, official says in testimony for hearing - The Washington Post
Anti-hacking advocate lands key House panel | TheHill
Coming by 2023, an exascale supercomputer in the U.S. | Computerworld
Facebook offers privacy tips, updates - SC Magazine
Juniper at AfricaCom 2014: Towards Virtualization - J-Net Community
SSCC 174 – Who says law enforcement isn’t tackling cybercrime? [PODCAST] | Naked Security
Attackers trading malware for privilege | CSO Online
Microsoft Warns of Issues With Recent SChannel Update, But Patch Away! | SecurityWeek.Com
Congress Presses for More Timely Notification After Postal Data Breach |
Microsoft Adds Video Service to Office 365
Old 3DS Title Unlocks Hacking and Homebrew Features on the Nintendo Handheld System : US : Headlines & Global News
DHS: Hackers targeted the grid 79 times this year | Utility Dive
Wontok SafeCentral AntiMalware Tops All 34 Antivirus Entrants in Latest VB 100 Comparative's RAP Test - Press Release - Digital Journal
Heartbreaking: Hackers target parents who have lost children to cancer |
The Future of File Sharing: What's on Our Horizon?
Congress Presses for More Timely Notification After Postal Data Breach |
The Senate defeated an overhaul of the NSA. Here's what's next for surveillance reform. - The Week
Commando Colonel Accused of Exposing his Lover to HIV - The Daily Beast
Anonymous wages cyberwar on the KKK with #OpKKK & #HoodsOff | Computerworld
Symantec and HP Sign Disaster Recovery as-a-Service Agreement for HP Helion OpenStack - BWWGeeksWorld
Microsoft Releases Emergency Security Update — Krebs on Security
The Recursive Cloud – Sending the Cloud to the Clo... - J-Net Community
McAfee Endpoint Protection for SMB | McAfee Products
The Brazilian Underground Market -
Target rebounds in third quarter on solid sales - San Francisco Chronicle
CipherCloud Scores Monster Series B - Forbes
Ebola-Related Phishing Attack Becomes Outright Fundraising Fraud | McAfee
Top 10 1/2 Things That Can Undermine Your Security Program - SANS Institute
Police chief: Very strong chance of City cyberattack
More Data Breaches Expected This Holiday Season |
One billion attacks were blocked during the third quarter
Senate kills bill that would have reined in NSA and rampant surveillance | Naked Security
Juniper Networks sur Twitter : "Can you handle this week's certification quiz? Give us your best guess!"
Operation Onymous Challenges Tor to Strengthen Its Security
Hillstone Networks Certifies Next-Generation Firewall With Trend Micro Deep Discovery | Business Wire
When Your Organization is Under Attack, Minutes Count | McAfee
Black Hat Usa 2014 - Appsec: Finding And Exploiting Access Control Vulnerabilities In Graphical User Interfaces
BitTorrent Sync Plans Pro Tier - InformationWeek
Hewlett Foundation Funds Academic Cyber Initiative
Danger comes in small packages: Securing employees' mobile devices | PCWorld
Wontok SafeCentral AntiMalware Tops All 34 Antivirus Entrants in Latest VB 100 Comparative's RAP Test
A balancing act: Apple technology - SC Magazine
Dolibarr ERP And CRM 3.5.3 SQL Injection ≈ Packet Storm
Capstone 3.0 ≈ Packet Storm
Clam AntiVirus Toolkit 0.98.5 ≈ Packet Storm
Cybercrime, Data Protection, and Multi-Factor Authentication (MFA) | Cyber Trust Blog
Centralization: The Hidden Trap
Sophisticated Android-based botnet a danger to enterprise networks
Longest words - Wikipedia, the free encyclopedia
2015 prediction: Expect massive spikes in global information security threats - TechRepublic
USA Freedom Act foiled by Senate Republicans - SC Magazine
Faronics Deep Freeze Arbitrary Code Execution ≈ Packet Storm
IO Slaves KDE Insufficient Input Validation ≈ Packet Storm
Compaq/Hewlett Packard Glance 11.00 Privilege Escalation ≈ Packet Storm
Password Manager – Online Account protection – Don’t be that Guy
Update on charity:water Efforts in Nepal – Blog Post – RSA Conference
Target's 3Q earnings rise 3.2 per cent as it recovers from last year's data breach - Canadian Business
Hackers to probe cyber crime defenses at British banks| Reuters
Erroneous Beliefs About DDoS Attacks That Could Cost You
Cyber threats on the rise, but firms won’t fix tech |
Target’s Canadian stores improving but still ‘well below our expectations’ | Toronto Star
UC Adopts New Information Security Training Program
Google advances SSL with new Chrome versions | ZDNet
Cyber PreCogs? What Do the Next 2-3 Years Hold For Us? -
Hacker Lexicon: What Is The Dark Web? ≈ Packet Storm
Debian Security Advisory 3074-1 ≈ Packet Storm
Hewlett Foundation Lays Out Millions On Security ≈ Packet Storm
Bugtraq: CVE-2014-7137 - Multiple SQL Injections in Dolibarr ERP & CRM
SANS Institute Brings Information Security Training Back to the Big Easy with... -- BETHESDA, Md., Nov. 19, 2014 /PRNewswire-USNewswire/ --
Cost of Data Breach Hazy as Home Depot Profits Rise |
Target Corp shares climb as profit tops estimates, Canadian stores improve | Financial Post
Hackers to Probe Cybercrime Defenses at British Banks - NBC News
US retailers still struggling with data breach security, says BitSight - CSO | The Resource for Data Security Executives
'Someone Had Taken Over My Life': An Identity Theft Victim's Story - Forbes
Debian Security Advisory 3074-2 ≈ Packet Storm
Endpoint Protection and Least Prevalence
10 top security threats of 2014 (so far) | ZDNet
AVG vs Comodo vs Avast vs Avira Free Antivirus – Offering Protection Above Par
CPI to Display Cutting-Edge Network Cabinet and Remote Monitoring System at... -- WESTLAKE VILLAGE, Calif., Nov. 19, 2014 /PRNewswire/ --
Target Rebounds in Third Quarter on Solid Sales - ABC News
Delta Partners Emerging Markets TMT Growth Fund II investing $10 million into CipherCloud - Zawya
Christopher Poulsen (Photo: Business Wire) - Press Release - Digital Journal
MIT wants to set drone cybersecurity policy | TheHill
Android Lollipop Download Features: Trusted Places feature is awesome | BGR
Data breaches rose 25 percent to 320 incidents in single quarter, SafeNet figures find - CSO | The Resource for Data Security Executives
Prioritize security efforts with a data-centric approach - The Business Journals
New venture aims to completely rethink enterprise security
Target U.S. same-store sales rise for first time in four quarters | Reuters
After Ferguson threat, Anonymous removes the KKK’s hoods. Effective? -
'Desperate' organisations will enlist hackers to fight security threat -
HSBC Acknowledges Massive Payment Card Breach - eSecurity Planet
NATO Is Sharpening Its Cyber War Defenses | Motherboard
Target (TGT) Q3 beats the Street as it recovers from data breach-TGT-Stockhouse news
Target tries to be cool |
Barracuda Solutions Now Available in the ArrowSphere Cloud Marketplace - MarketWatch
iOS 8.1.1 Introduces Promising Bug Fixes And Security Updates
Target rebounds from data breach, posts third-quarter profit ahead of the holidays |
Reporting from AVAR 2014 | AVG Now
Pentesting Windows Endpoints: Hidden Bind Shell Payload
Press Releases - News - Stockhouse
Symantec sur Twitter : "@LindaShanley Have you been good this year?"
Google open sources Firing Range, a test tool for web app security scanners
Black Hat Usa 2014 - Appsec: Epidemiology Of Software Vulnerabilities: A Study Of Attack Surface Spread Nigeria: How to Be Security (Terrorism) Conscious - Expert
MacStadium Intros Mac-Centric Hosting for Enterprises | NewsFactor Business Report
Computing Industry Pioneers Announce New Cybersecurity Venture -- WALTHAM, Mass., Nov. 19, 2014 /PRNewswire/ --
Lawmakers Seek Details on Finanial Services Firms' Data Breaches
ForeScout Enhances Access and Threat Management Through Integration With Palo Alto Networks Next-Gen Firewalls and WildFire
MacStadium Announces First VMware Powered Mac-Centric Hosting and Cloud Service Offering for Enterprises
Kaspersky Lab | Antivirus Protection | Internet Security
Download Kaspersky Security for Mac | Kaspersky Lab US
Core Impact Knows Arduino-Based Attacks | Core Security Blog
Why We Love Appliances | Symantec Connect
Archiving and eDiscovery Blogs Symantec eDiscovery Blog | Symantec Connect
RSA Advanced Security Operations Center, SOC Use Cases - EMC
Incidence Response: Are You Ready For the End of the Year? – Video – RSA Conference
Full Disclosure: CVE-2014-7911: Android <5.0 Privilege Escalation using ObjectInputStream
WhatsApp Now Encrypts Messages, Making it Nearly Impossible for Hackers to Read : Tech : Chinatopix
Paul O’Grady settles ‘News of the World’ phone hacking claim
PureFunds To Stop Hackers With This Cyber Security ETF | Seeking Alpha
Gartner Names Proofpoint a Leader in 2014 Magic Quadrant for Enterprise Information Archiving for Third Consecutive Year
WhatsApp starts encrypting messages to protect from hackers | GlobalPost
Chantel Bernier: Data breach response is ‘not the time to improvise’ | Financial Post
'Most advanced mobile botnet EVER' is coming for your OFFICE Androids • The Register
WebApp Sec: concurrent logins
MIT, Stanford, Land Major Cyber-Security Funding Injection
SANS Digital Forensics and Incident Response Blog | SANS DFIR Summit 2015 - Call For Papers | SANS Institute
CipherCloud Scores $50M As Cloud Security Comes To Forefront | TechCrunch
O'Grady wins hacking settlement | Herald Scotland
Building a globe-spanning quantum internet | The Verge
Bugtraq: Reflected Cross-Site Scripting (XSS) in Simple Email Form Joomla Extension
Bugtraq: [SECURITY] [DSA 3074-2] php5 regression update
Let’s Encrypt: A Certificate Authority To Help the Web Deploy HTTPS
Apple, Microsoft, Google and others join push against government spying | CSO Online
Security Conferences - Security Events - Trend Micro USA - Trend Micro USA
Go on, buy your workers a smartphone. You know it makes sense • The Register
How to avoid the "bah humbug" of holiday scams - CBS News
WhatsApp's latest Android update provides 'foolproof' security to users' conversations | Latest News & Updates at Daily News & Analysis
Thinspace Responds to Japan's Growing Market Demand for Cloud-Based Desktop
Hackers attacked the U.S. energy grid 79 times this year |
Rand Paul Beats Ted Cruz, Saves NSA From ‘Reform’ - The Daily Beast
CITY BANKERS, prepare for a TERRORIST CYBER ATTACK – London police chief • The Register
Hacker Lexicon: What Is the Dark Web? | WIRED
WhatsApp Moves To Protect Messages From Snoops - Forbes
With Blend, Blackberry focuses on core strengths – and it shows | Digital Trends
Avoid Holiday Hacking | News - Home
WhatsApp encrypts messages against hackers | SBS News
UK hires hackers, convicts to defend corporate networks | ZDNet
Elizabeth Warren to Banks: Prove You Can Protect Customer Data From Hackers | Mother Jones
Police across nation raid IT firms over hacking - The Japan News
Spate of cyber attacks target U.S. government systems - CBS News
Tech industry veterans form VS2 to put hackers in 'Twilight Zone' - Boston Business Journal
DRaaS-tic action: Trust the cloud to save your data from disaster • The Register
How to troubleshoot performance issues in SharePoint custom code on your own? Part 1 – High Memory Usage - SharePoint Developer Support Team Blog - Site Home - TechNet Blogs
Bugtraq: [ MDVSA-2014:215 ] gnutls
PCI appoints panel to probe attack on mediapersons in Hisar | Zee News
Google fined for not taking down “right to be forgotten” links worldwide | Naked Security
WhatsApp starts encrypting messages to thwart hackers - The Economic Times
Paul O'Grady settles News of the World phone hacking claim - Telegraph
MacStadium Intros Mac-Centric Hosting for Enterprises - Press Releases on Top Tech News
WhatsApp Partners With Open WhisperSystems To End-To-End Encrypt Billions Of Messages A Day | TechCrunch
O'Grady wins hacking settlement -
Tampering with the Return Address
Black Hat Usa 2014 - Appsec: Cloudbots Harvesting Crypto Coins Like A Botnet Farmer
Intelligent Automation, Inc. releases the ARGUS™ - IS Series Industrial Security System -- ROCKVILLE, Md., Nov. 19, 2014 /PRNewswire/ --
Contact Us | CSA EMEA Congress - Cloud Security Alliance Congress
Top tips on hack-proofing your life | ZDNet
SymantecVoice: Conveniently Connected And...Compromised? The New Security Landscape Of The Internet Of Things - Forbes
IBHS Business Continuity Planning Toolkit now available as an app
PCI appoints panel to probe attack on scribes during clashes at Rampal’s ashram in Hisar | The Indian Express
BCC Risk Advisory sur Twitter : "Come to @irisscert IRISSCon tomorrow & meet edgescan folks...we've got cupcakes!!"
New non-profit CA aims to make HTTPS use universal
Wearable Litigation – Fitbit Data Could Be About To Set A Legal Precedent
Daily catch-up: NHS markets, phone hacking and doing the Strand - Comment - Voices - The Independent
Elephant Talk Communications' (ETAK) CEO Steven van der Velden on Q3 2014 Results - Earnings Call Transcript | Seeking Alpha
Fitch Affirms Sony at 'BB-'; Revises Outlook to Stable| Reuters
Correction: Fitch Rates NTPC's Proposed USD Notes 'BBB-(EXP)'| Energy & Oil| Reuters
Yes, we’re all in the cloud - but use it to develop enterprise apps? Not yet - Cloud Tech News
Shadow IT: data protection and cloud security — Gigaom Research
PureFunds to Stop Hackers with This Cyber Security ETF - November 18, 2014 -
Top 5 Free Best Antivirus Security Apps For Your Smartphones | The Fuse Joplin
Obama on Net Neutrality: Principle or Politics? » CounterPunch: Tells the Facts, Names the Names
Encryption, tokenisation to shape future PCI compliance - Security - News -
Microsoft “tops up” Patch Tuesday, issues delayed fix for zero-day hole in logon security | Naked Security
Let’s Encrypt — A Certificate Authority to Provide Free SSL Certificates for Entire Web
320 breaches reported between July and September
Hackers targeted the grid 79 times this year | Utility Dive
8 Ways to outsmart hackers Black Friday
Risico’s van Bring Your Own Device in de Zorg |
Overwhelming optimism for information security in 2015
iOS 8.1.1 Brings Bug Fixes, Hope For iPhone 4S And iPad 2 Device Owners | TechCrunch
Additional information about CVE-2014-6324 - Security Research & Defense - Site Home - TechNet Blogs
Patched Windows Vulnerability Allows For Remote Privilege Escalation | Security Intelligence Blog | Trend Micro
Dell integrates, innovates security portfolio - IT-Online | IT-Online
US State Department's E-Mail Hacked - Network Security on Top Tech News
Does cyber insurance help the CISO get a seat in the board room?
DDoS attacks continue to fall in size and frequency
Task 20: Multi-Level JSON Parsing
Asian mobiles the DDOS threat of 2015, security mob says • The Register
Wget Exploit Demonstration - Cve-2014-4877
Hackers target U.S. energy grid 79 times - Huntsville News | and ABC 31: National News
Microsoft issues emergency update for Windows desktop and Server systems - Gearburn
Threats at every turn – time to hit back | Symantec Connect
Sophos Expands Cloud-Managed Security Portfolio with Server Protection - Zawya
Bill curbing NSA surveillance programs blocked in Senate - CNE
Security To Achieve Newer Paradigms - CRN India
Cloud computing: pros and cons | euronews, hi-tech
The evolution of threat detection and Big Data
Home Depot profit appears unaffected by data breach | The Columbus Dispatch
Sophos expands Cloud-Managed Security Portfolio with server protection | Al Bawaba
Cyber-jihadisme: la guerre électronique contre Daech est-elle perdue d'avance? | Sonia Eyaan
Home Depot’s profits rise, suggesting data breach hasn’t led customers to flee - The Washington Post
Analysis: How to prevent the next terror attack | i24news - See beyond
Lame phone dodgers fleece finance's foolish and fat fingered • The Register
Command Injection ISO: Hints for SugarCRM, Webmin, Zenoss
ConnectOne: "We notified customers about hacking incident" - Business -
Best Practices for Selecting a Next-Generation Firewall | FedTech Magazine
Hewlett Foundation lays out MEELLIONS on security • The Register
Stanford Cyber Initiative will tackle Internet technology concerns
Most UK companies would consider hiring ex-hackers for cyber security - IT News from
Cam Newton's Twitter Account Gets Hacked, Tweets 'Overrated' to Richard Sherman | Bleacher Report
Hacking mastermind shunned by friends after conviction
Hackers need to find a day job - High School
Watch Symantec's Vine "Empower your team with Symantec Mobility Solutions. #GoEmpower"
Black Hat Usa 2014 - Exploit: Abusing Performance Optimization Weaknesses To Bypass Aslr
Ku Klux Klan Hacked by Anonymous After Ferguson Threat
Hacking health care | MIT News
Bugtraq: [SECURITY] [DSA 3074-1] php5 security update
IoT security: Fix the problems before they start - FierceITSecurity
The Top Infosec Issues of 2014 | CIO
Chris Freind: Chewing the fat on issue of obesity
Operation Onymous Challenges Tor To Strengthen Its Security
iOS 8.1.1 Update: Apple Promises To Improve The Performance Of The Aging iPhone 4S and iPad 2 - International Business Times
Google rolls out 64-bit Chrome for Mac | SciTech | GMA News Online
If You Didn’t Change The Default Password On Your Security Camera, Someone’s Probably Watching It Stream – Consumerist
Google launches first 64-bit Chrome Web browser for OS X
Caution against Windows-2003 OS as Microsoft announces its end - The Economic Times
SMS pwnage on MEELLIONS of flawed SIM cards, popular 4G modems • The Register
Australian technology spend to hit AU$78.7 billion in 2015: Gartner | ZDNet
State Dept computers hacked, email shut down | Deseret News
Unholy war: How to calm Islamist rage? | New York Post
State Department suffers hacking attack |
BBC News - #BBCTrending: Anonymous takes on the Ku Klux Klan
All the things you can use private browsing mode for - gHacks Tech News
FAA Can Make All Drone Flights Illegal, Federal Court Rules | Motherboard
(ISC)² - IT Certification and Security Experts
Home Depot profit rises despite data breach - LA Times
Will NZ Digital Businesses replace Kiwis with robots? - Reseller News
Techday – BI/analytics top Kiwi CIO tech priorities list
Home Depot posts earnings of $1.15 a share vs $1.13 expected
Symantec Intelligence Report - October
Black Hat Usa 2014 - Enterprise: When The Lights Go Out Hacking Cisco Energywise
Activist group Anonymous hacks KKK Twitter account | 89.3 KPCC
Websense Security Labs Reveals Cybersecurity Predictions for 2015 - Press Release - Digital Journal
Watch "Chinese hackers accused of breaching NOAA systems" Video at SCMagazine
tcpdump 4.6.2 Geonet Denial Of Service ≈ Packet Storm
tcpdump 4.6.2 AOVD Unreliable Output ≈ Packet Storm
Apple Security Advisory 2014-11-17-1 ≈ Packet Storm
POWELIKS Levels Up With New Autostart Mechanism
Critical NSA Reform Bill Fails in the Senate | WIRED
Ubuntu Security Notice USN-2411-1 ≈ Packet Storm
Mandriva Linux Security Advisory 2014-214 ≈ Packet Storm
Mandriva Linux Security Advisory 2014-213 ≈ Packet Storm
Attack in Jerusalem Casts Shadow on Tourism | TravelPulse
Hackers target U.S. energy grid 79 times - Huntsville News | and ABC 31: Appnews
Freedom Act to curb NSA surveillance dies in US Senate | ZDNet
Verizon Aims Big Data at Data Threats | Light Reading
IT Security News and Security Product Reviews - SC Magazine
Vulnerability Note VU#213119 - Microsoft Windows Kerberos Key Distribution Center (KDC) fails to properly validate Privilege Attribute Certificate (PAC) signature
GISuser The GIS and mapping professional resource
Updating Security Operations For The Cloud
8 on your side: Data breaches... Who's watching out for you? | Local News - WGAL Home
Chrome for Mac Gains 64-Bit Support in Latest Chrome 39 Update - Mac Rumors
US Senate falls 2 votes short of shutting down NSA phone spying | Ars Technica
Next year's DDOS attacks to come from Vietnam, India and Indonesia | CSO Online
Journalism jobs (media, editorial), news for journalists
L.A. Auto Show: Hackers now targeting cars and driver data - LA Times
Nearly Half Of The Operation Onymous Takedowns Were Scam Or Clone Sites | TechCrunch
Techworld: Breaking News for Business Technology & Enterprise IT -
Failing the security test: Target wasn't the first failing grade, or the last - SC Magazine
E-Payments & Security - Data breaches are on the rise - Internet Retailer
Milwaukee Companies Looking Closely at Data Breaches | WUWM
Home Depot Sales Beat, But Data Breach Hurts Stock HD LOW TGT -
Home Depot earnings rise despite data breach
Patch NOW! Microsoft slings emergency bug fix at Windows admins • The Register
Black Hat Usa 2014 - Enterprise: Unveiling The Open Source Visualization Engine For Busy Hackers
Film interviewing whistleblowers to be shown in Belfast | PenBay Pilot
A power user’s guide to OS X Server, Yosemite edition | Ars Technica
Open WhisperSystems >> Blog >> Open Whisper Systems partners with WhatsApp to provide end-to-end encryption
You're all TERRORISTS now! WhatsApp turns on end-to-end encryption for 600 million people • The Register
Microsoft patches Kerberos vulnerability with emergency update | CSO Online
The Human Element in the Data Breach – Blog Post – RSA Conference
There is no room to err against computer hackers | Opinion , Commentary | THE DAILY STAR
Press Release: Imperva Expands Big Data Protection with SecureSphere 11.0
The Yeshiva World What Measures are Being Taken Following the Har Nof Massacre? « » Frum Jewish News
Mozilla, Cisco and others sponsor certificate provider Let's Encrypt - SC Magazine
SCMagazine sur Twitter : "Industry experts discuss incident response at @sccongress Chicago. #SCChi"
Task 21: Multi-Level XML Parsing
Zebra Technologies' Global Study Tracks the Growing Momentum of the Internet of Things in the Enterprise - MarketWatch
1st Source Announces the Addition of Christopher Poulsen - MarketWatch
Tighten Small Business Security for the Holiday Rush
Top 10 Android Lollipop Features [VIDEO]
Good Cyber Security Habits are Essential During the Holidays - Sun Sentinel
Microsoft issues delayed elevation of privilege patch - SC Magazine
Identity Fraud & Data Theft – Don’t be that Guy
Staples incident possibly connected to Michaels breach, report indicates - SC Magazine
Added Network Visibility with Belden's Newest Security OS: HiSecOS 2.0
"Less Is More" as Cisco Completely Reimagines Flagship Three-Screen Video Conferencing Technology - Telepresence Options
Survey: real-time SIEM solutions help orgs detect attacks within minutes - SC Magazine
Microsoft redoes SChannel patch, releases MS14-068/KB 3011780, KB 3000850 | InfoWorld
State Dept. Breach Heightens Concerns Over Resilience Of Government Networks
FBI Probes Agency Computer Breaches Said to Bear Signs of Spying
The boss has malware, again... : talesfromtechsupport
TRUSTe settles FTC charges over its 'certified' privacy seals - SC Magazine
Mozilla, EFF, Cisco back free-as-in-FREE-BEER SSL cert authority • The Register
Build With Confidence -
Cries of spies as audit group finds possible 'backdoor' in Bittorrent Sync • The Register
IT News Online > PR Newswire - Websense Security Labs Reveals Cybersecurity Predictions for 2015
After Ku Klux Klan threatens Ferguson protesters, Anonymous hackers attack | News - Home
Software-Defined Networks: Nervous Time for IT Departments
U.S. House oversight panel asks when State Department data breach was discovered, how it was fixed
Microsoft releases emergency patch to stymie Windows Server attacks | Computerworld
Synagogue attack a 'crime,' says Bahraini foreign minister - Diplomacy and Defense Israel News | Haaretz
Challenge 14: HTTP Traffic File Carving Solution
SAS 2015: Are You Ready to Fightback? - YouTube
Open Whisper Systems helps WhatsApp achieve end-to-end encryption
Black Hat Usa 2014 - Enterprise: The Library Of Sparta
Citigroup Inc. (NYSE:C), Wells Fargo & Co. (NYSE:WFC), J. P. Morgan Chase & Co. (NYSE:JPM) News Analysis: Financial Firms Increase Cybersecurity Budgets To $2 Billion
Important safeguards can keep hackers from stealing personal data from your computer - Cleveland
Microsoft reissues fixed Schannel update | ZDNet
Taking A Bolder Approach To Protect Identities And Endpoints | Symantec Connect
Home Depot bests 3Q expectations; costs of huge data breach still not fully known - Opinion - Times Colonist
New Research Shows One Third of Retail Breaches Originated From Third-Party Vulnerabilities
Home Depot beats expectations despite data breach | Toronto Star
State Department hit in cyberattack that also compromised White House | Federal Times |
Retail sector still at risk, but breach survivors grow stronger: BitSight | ZDNet
Home Depot Sales, Earnings Build, but Data Breach Questions Remain Unanswered (HD)
One third of retail security breaches come from third-party vulnerabilities
US retailers still struggling with data breach security, says BitSight -
Is Security Awareness Training Really Worth It?
Keurig: People Are Hacking Our Coffee Machines Because They Need A Challenge
Devices stolen from Boston hospital physician during armed robbery contained patient data - SC Magazine
Strategies, Capacity Building and Legislative Initiatives: Cybersecurity Policy Development Battles Through “Tumultuous Teens” | Cyber Trust Blog
Schneier on Security: Whatsapp Is Now End-to-End Encrypted
Schneier on Security: A New Free CA
Winding Down Windows Server 2003 | Windows Server content from Windows IT Pro
MacStadium Intros Mac-Centric Hosting for Enterprises - Press Releases on CIO Today
KKK hit by cyber attacks after Ferguson threats
How to overcome the hidden costs of virtualization
Fortinet FortiDB 1000D product review | SC Magazine
Reversing Multilayer .NET Malware
Bugtraq: [ MDVSA-2014:213 ] curl
Disaster recovery as a service market report
Apples releases OS X Yosemite and iOS updates - SC Magazine
SCMagazine sur Twitter : "Our track sessions are currently under way! @sccongress #scchi"
Mozilla, EFF, Cisco Back Free SSL Certificate Authority ≈ Packet Storm
Anonymous Hacks The Ku Klux Klan After Ferguson Threats ≈ Packet Storm
Terror Attack In Jerusalem Synagogue Kills Four ≈ Packet Storm
The moment I learned just how far Uber will go to silence journalists and attack women | PandoDaily
US banks set to splash the cash on cyber-security - SC Magazine UK
Get an Asus EeeBook 11.6-inch laptop for $139.99 - CNE
China, Hacking, And Murder
Cummings and Warren Ramp Up Investigation of Consumer Data Breaches Throughout U.S. Financial Sector
Launching in 2015: A Certificate Authority to Encrypt the Entire Web
Bugtraq: [ MDVSA-2014:214 ] dbus
Microsoft Security Bulletin MS14-068 - Critical
Microsoft patches critical Windows Server vulnerability` | ZDNet
Laptop with PHI Stolen from Brigham and Women’s Doctor |
1st Source Announces the Addition of Christopher Poulsen - Finances
Zebra Technologies' Global Study Tracks the Growing Momentum of the Internet of Things in the Enterprise
Sophos launches new server protection offering - Telecompaper
802.11ac: The Business Wi-Fi Fast Lane ::Mobile:: Midsize Insider
How To Free Up Space On iPhone, iPad — Free Up Storage Space | BGR
SCMagazine sur Twitter : "Experts discussing BadUSB at @sccongress Chicago during today's keynote lunch presentation."
Juniper Networks sur Twitter : "Steve Shaw presenting on global networking at #MEFGF14, happening now at the Gaylord Convention Center in DC!"
Concrete Products - Toscas to transition from PCI to PCA
183 million accounts compromised in Q3 2014, report finds |
Cubic Ninja prices soar as hackers reveal it’s key to unlocking Nintendo 3DS. | Ars Technica
EU to Israel: If you want to get along with us, make peace
Early Movers: HD, TJX, MDT, EA, ZTS, GPRO & more
Cybersecurity Expert Puts Focus on Training People, Not Developing Technology
Breaking: Out-of-Band Critical Security Update Coming in the Next Few Hours | Security content from Windows IT Pro
Jerusalem attacks pose new challenges for Israeli security forces | World news | The Guardian
How I Manage a $4B Business from my Phone
Healthcare sector's broad data sets will attract increased attacks in 2015 - SC Magazine
Magic Quadrant for IT Vendor Risk Management
Black Hat Usa 2014 - Enterprise: The Devil Does Not Exist The Role Of Deception In Cyber
Windows 10, OneDrive sync and the art of difficult conversations | ZDNet
KKK hit by cyberattack after Ferguson threats
Home Depot sales rise despite massive data breach | New York Post
Cancer Charity Hacked: Vile Messages Sent to Parents of Childhood Cancer Victims - - KTVE NBC 10 - KARD FOX 14 - Your homepage for the latest News, Weather and Sports in the ArkLaMiss!
Naked Security bids farewell to HTTP | Naked Security
SCMagazine sur Twitter : "The expo floor is bustling at @sccongress Chicago."
Schneier on Security: Snarky 1992 NSA Report on Academic Cryptography
Android and iOS apps still being cloned to spread malware | CSO Online
The four I’s to proactively addressing data breach risks - Lexology
Stop More than the Usual Suspects (Blog 2 of 4) | McAfee
Tor domains seized by police were fakes - Telecom Tech News
U.S. energy grid hacked 79 times this year | Money - KHBS Home
Another fox sneaks into southern Utah substation, zaps power; prevention equipment on order - Daily Journal
Urban Outfitters' Profits and Shares Tumble
Cyber Threat Intelligence Summit (Washington, DC)
Boise, Meridian, Nampa, Caldwell news by Idaho Statesman
Urban Outfitters quarterly profit down, shares decline
Anonymous Hacks KKK in 'Cyber War' After Alleged Ferguson Threats
Linux still owns supercomputing | ZDNet
KKK threatened with public 'unhooding' after Ferguson threats |
Deconstructing the Cyber Kill Chain
Microsoft to release urgent out-of-band Windows security patch today - MS14-068 - The State of Security
Whatsapp Just Switched On End-To-End Encryption For Hundreds of Millions of Users | WIRED
EFF, Mozilla back new certificate authority that will offer free SSL certificates | CSO Online
DIY Hardware Startup LittleBits Wants To Help People Make Their Own Smart Home - Forbes
VA falters in cybersecurity audit for 16th year - SC Magazine | Meriden, CT | Meriden elementary school set to give every student a laptop or iPad
Will Apple Pay Drive 20% Of Mobile Payments In 2 Years? |
Home Depot Outlook Bright Despite Data Breach - Forbes
Home Depot bests 3Q expectations; costs of huge data breach still not fully known - B.C. - Times Colonist
Hackers target award-winning photographer to discredit water protest picture -
Apple releases iOS 8.1.1, includes performance improvements for older iPhones, iPads | ZDNet
KnowBe4 Announces New 2015 Kevin Mitnick Security Awareness Training
Data Center Technology | A3 | SmartData Collective
KnowBe4 Announces New 2015 Kevin Mitnick Security Awareness Training - Press Release - Digital Journal
New 2015 Kevin Mitnick Security Awareness Training - Gartner Top 20 Pick
Protect Across the Entire Attack Continuum with Cisco Next-Generation Firewall
Would you allow access to Facebook at Work? [POLL] | Naked Security
81% of Tor Users Can be Easily Unmasked By Analysing Router Information
Biometric security moves to counter cyber fraud | EurActiv
The worst year for data breaches
Mobile Payment Spending to Reach $142B by 2019 -
Download Microsoft Security Intelligence Report, Volume 17 from Official Microsoft Download Center
My Kaspersky
Microsoft to release Windows security fix today | ZDNet
Large Number of Tor Sites Seized in Operation Onymous Were Fake - image uploaded by @HS_UserImages (Hootsuite User Image)
Careers in tech: The Internet of Things - Career Planning - Student - The Independent
Sangfor Technologies Earns Recommended Rating from NSS Labs - BWWGeeksWorld
Apple credits Pangu jailbreakers for helping make iOS 8.1.1 even more secure | Cult of Mac
Apple iOS 8.1.1, OS X 10.10.1 Now Available. What iDevice Lovers Should Know : PERSONAL TECH : Tech Times
Cisco Courts a Mobile, Collaborative Workforce with Project Squared - Digits - WSJ
Menlo Security Lands $10.5 Million to Reinvent Cyber Security - Press Release - Digital Journal
Home Depot Q3 earnings impress, despite data breach -
DisplaySearch: Global notebook PC market grew 10 percent | ZDNet
Pentesting Routers: SNMP audit with Metasploit, Snmpcheck and Onesixtyone
'Bashlite' Malware Leverages ShellShock In BusyBox Attack
Annual G20 summit is attractive target for Flea attack group | Symantec Connect
EMC Store Products - EMC Store
Cisco open sources Big Data security analytics framework
Owasp Appsecusa 2014 - Stop Chasing Vulnerabilities - Introducing Continuous Application Security
Men think they can fix a computer (but can't), study says - CNE
House, Senate Democrats seek details from financial firms on data breaches| Reuters
Sangfor Technologies Earns Recommended Rating from NSS Labs -- SANTA CLARA, Calif., Nov. 18, 2014 /PRNewswire/ --
Trend Micro Deep Security Now Available on AWS Marketplace
How To Remove Credit Cards from Apple Pay If Your iPhone 6 Is Stolen | Know Your Mobile
IT Act 2000 lacks teeth - Dataquest | The Bible of Indian IT (Information and Trends, Analysis, Research, News, People, Events)Dataquest | The Bible of Indian IT (Information and Trends, Analysis, Research, News, People, Events)
Delete Apple Pay credit cards remotely on | BGR
PLA has set up Chinese version of 'PRISM' monitoring in H.K.: Kanwa | Most Viewed | FOCUS TAIWAN - CNA ENGLISH NEWS
Lawmakers target banks for hacking details | TheHill
Did White House hackers have another target? | TheHill
Credit 101: How to build financial security without breaking the bank - The Red and Black : Uganews
Analysis casts doubt on FBI claims over Tor website seizures | ZDNet
Koler Ransomware Extorts Money from Users | McAfee
AVG Extends Global Partnership with ALCATEL ONETOUCH
Anonymous ‪hacks the Ku Klux Klan after Ferguson‬ threats • The Register
Security Storage: To HSM or Not To HSM? – Blog Post – RSA Conference
US State Department's E-Mail Hacked - Government on Top Tech News
Facebook's Enterprise Ambition: 3 Big Hurdles - InformationWeek
More patch problems reported with MS14-066/KB 2992611/WinShock | InfoWorld
8 Ways to Categorize Enterprise Mobility Management - Post - No Jitter
Hackers attacked the U.S. energy grid 79 times this year - Nov. 18, 2014
Court Ruling Could Bring Down BYOD | CIO
BlackBerry Launches BES 12, Partners With Samsung To Ride The MDM Wave - Forbes
US State Department network shut after cyber breach - World - DAWN.COM
State Dept’s unclassified e-mail systems are hacked
Critical factors in preventing data breaches
Menlo Security Lands $10.5 Million to Reinvent Cyber Security
10 hottest IT skills for 2015 | InfoWorld
Making sure a BYOD policy has teeth | Government Health I
Hackers attacked the U.S. energy grid 79 times this year | Money - WPTZ Home
Sophos Expands Cloud-Managed Security Portfolio With Server Protection
Meet A3, New Software that can Kill Malware and Automatically Repair Damages : PERSONAL TECH : Tech Times
Data breaches rose 25 percent to 320 incidents in single quarter, SafeNet figures find -
BYOD - the legal issues - 18 Nov 2014 - Computing Opinion
Websense 2015 Security Predictions Report
Intel® Security Report Details Critical Factors in Preventing Data Breaches
Localized Tools and Services, Prominent in the Brazilian Underground | Security Intelligence Blog | Trend Micro
Home Depot Earnings Diminished by Potential Impact of Data Breach (NYSE: HD) - 24/7 Wall St.
Home Depot tops 3Q expectations; costs of data breach still not known | CTV News
If only Paul Vickers had staged a real investigation into phone hacking... | Media |
UPS, FedEx & USPS warn of holiday phishing scams hackers are using to get your personal information - 7NEWS Denver
Brigham and Women’s reports patient privacy breach
Michaels and Staples breaches carried out by same attackers?
Northern Ireland website leaves FRONT DOOR open, spills users' data • The Register
F-Secure starts official Vulnerability Reward Program in November 2014 | VULNERABILITY MAGAZINE - Bug Bounties, Acknoweldgements & Security Research
Brigham & Women's patient data stolen | Health - WCVB Home
U.S. State Department Shuts Down Email After Hack Attack | Digital Trends
Home Depot tops 3Q expectations; costs of data breach still not fully known - Winnipeg Free Press
Identify Security Software Inc. Demonstrates its Advanced Security and Authentication Software for Bank Atm Transactions | Ticker Report
Cybersecurity experts warn Pittsburgh conference about dangers of hacking | TribLIVE
Home Depot profit beats estimates as U.S. job market improves| Reuters
Anonymous e-hijacks KKK in wake of threats against Ferguson protesters | Naked Security
Python for Pentesters and Hackers « SecurityTube Trainings
IBHS Business Continuity Planning Toolkit is now an App
Cisco hands over security analytics framework to open source development | ZDNet
Twitter Is Not at War With ISIS: Here's Why. | Mother Jones
Home Depot 3Q results top Wall Street's view |
The Home Depot Announces Third Quarter Results; Reaffirms Fiscal Year 2014 Guidance
How to lose customers with excessive security | InfoWorld
Home Depot 3Q results top Wall Street's view - San Francisco Chronicle
Can’t be TRUSTe-d? Online privacy firm coughs $200k to settle 'deception' charges • The Register
Trojanized Android firmware found on inexpensive handhelds
One-in-four have been victims of identity theft
Owasp Appsecusa 2014 - Threat Modeling Made Interactive
Anonymous targets Ku Klux Klan Twitter account | IT PRO
Dems Demand Answers In State Department Cyberattack
The Jewish Press » » Why Hacking Jews to Death During Prayers Has NOTHING to Do with “Occupation”
OS X Yosemite and third-party SSDs: Here's what you need to know | ZDNet
Comodo Internet Security - Neowin
No One is Immune to Breaches as 183 Million Accounts Compromised in Q3 2014 - Zawya
Business continuity briefs
What The Hack? Over Half Of UK Businesses Would Consider Risky Recruitment Practices
Top 5 fraud risk areas in the workplace
Metasploit for Pentesters « SecurityTube Trainings
Breached US State Department takes email offline to update security | Naked Security
SymantecVoice: Epidigitalogy: Surveying For Digital Diseases Like An Epidemiologist - Forbes
BYOD and Security: A Work in Progress ::Mobile:: Midsize Insider
Fitch: Russia's Largest Food Retailers Unaffected By Food Import Ban; Smaller Formats Outperform| Reuters
Internet of Things is web’s next money spinner say small businesses
OS X Yosemite v10.10.1 Update Brings Improvements to Mail, Wi-Fi, and More | NDTV Gadgets
FBI Probes Agency Computer Breaches Said to Bear Signs of Spying - Bloomberg
IT News Online > - Tech Data Offering Cisco Next Generation Network Security Solutions
Steve La stands between hackers and Cal State Long Beach computers
So you want to introduce a BYOD plan. Where do you start? • The Register
FBI Probes Agency Computer Breaches Said to Bear Signs of Spying - Businessweek
Javascript for Pentesters « SecurityTube Trainings
Apple ships X 10.10.1 – does it fix those Wi-Fi problems? | Naked Security
State Department Pulls Email System Offline Amidst Hacking Incident : PERSONAL TECH : Tech Times
The vital role of protected areas in climate disaster risk reduction - News - Professional Resources -
TRUSTe deceived consumers through its privacy seal program
Risk assessment benefits, best practices and pitfalls
Network Security Engineer at University of Tennessee (The Pacer) | The Pacer
Bug fixes! Get your APPLE BUG FIXES! iOS and OS X updates right here! • The Register
The show must go on: How to prepare a business continuity plan - Computerworld
Windows Phone 8.1 Hacked
DFIR Summit (Austin, TX)
Suspected Wirelurker iOS Malware Creators Arrested in China
ReadyNAS OS offers 5 levels of data protection
Gee THANKS: Cryptoscum offer a free decrypt in latest ransomware racket • The Register
Cyber Security Summit 2014 - Cyber Security Summit 2014
Owasp Appsecusa 2014 - Ten Secrets To Secure Mobile Applications
Dell Unveils a Slew of New Enterprise Systems | NewsFactor Network
State Department Confirms Hackers Breached Email - The Atlantic
Spate of cyber-attacks hit US government systems | Zee News
[Commendation Award] Banks need to take defferent approaches
Which software security for online banking? - Telegraph
PCI Chairman Katju Asks AMU Not to Target Journalists as VC Bans TOI in University
Police Beat - The Daily Barometer: News
Are tablets the "sweet spot" of NZ BYOD programs? - Computerworld New Zealand
Watch how hackers get inside Ohio woman's computer and steal personal data - Cleveland
Bugtraq: CVE-2014-8768 tcpdump denial of service in verbose mode using malformed Geonet payload
Bugtraq: CVE-2014-8767 tcpdump denial of service in verbose mode using malformed OLSR payload
Module 2: HelloWorld Shellcode JMP-CALL-POP Technique
Student hackers code for social good | The Herald-Sun
Microsoft's Big Data Cloud Broadens Support
Chinese Authorities Shut Down WireLurker Distribution Site, Arrest Suspects Involved - Mac Rumors
Intrusion Inc. Reports Net Income Of $147 Thousand On Revenue Of $2.0 Million In The Third Quarter Of 2014
Anonymous hacks Ku Klux Klan Twitter accounts, reveals members’ names
Bugtraq: CVE-2014-8769 tcpdump unreliable output using malformed AOVD payload
USB coding anarchy: Consider all sticks licked • The Register
Review: Apple's iOS 8 Provides a Smarter Type - ABC News
Owasp Appsecusa 2014 - Hacking .Net(C#) Applications: The Black Arts (Asm Attacks)
Bugtraq: [security bulletin] HPSBMU03072 rev.3 - HP Data Protector, Remote Execution of Arbitrary Code
Bugtraq: [security bulletin] HPSBMU03183 rev.2 - HP Server Automation and Server Automation Virtual Appliance, running SSL, Remote Disclosure of Information
Internet-connected battery turns your old smoke detector into a smart one
Reverse engineering NAND Flash Memory – POS device... - HP Enterprise Business Community
contagio: AlienSpy Java RAT samples and traffic information
Cybersecurity experts warn in Pittsburgh conference about dangers of hacking | TribLIVE
Malware in Android firmware makes itself at home on handheld devices — Dr.Web - innovation anti-virus security technologies. Comprehensive protection from Internet threats.
Bugtraq: APPLE-SA-2014-11-17-1 iOS 8.1.1
Bugtraq: APPLE-SA-2014-11-17-2 OS X Yosemite 10.10.1
Indian Advertising, Indian Advertising Services, Indian Marketing Services, Indian Newspaper, Indian Television, Latest News and Media News, Advertising -
Triggering MS14-066 | BeyondTrust
Hackers Humiliate U.S. State Department | Government | E-Commerce Times
New breed of identity thieves targeting your medical records - TODAY'S TMJ4
Anonymous statement: KKK is a terrorist group, KKK responds poorly | ZDNet
The Ten Most Wanted Hackers By The FBI – #2
New ransomware CoinVault allows users to decrypt one file for free | PCWorld
Corrective Education Company Adds Top Retail Industry Veterans to Its Field Organization
FBI probes State Department hacking tied to White House breach | The Japan Times
Dell Debuts SuperMassive 9800 Next-Gen Firewall | NewsFactor Network
Ethical hackers step in to solve cyber crimes
Cisco Just Released A Slack Clone With Audio And Video (CSCO) - Houston Chronicle
Cisco crashes the enterprise mobile party with new collaboration app | Computerworld
The show must go on: How to prepare a business continuity plan - Techworld
Schneier on Security: The NSA's Efforts to Ban Cryptographic Research in the 1970s
State Department Latest Federal Agency to Be Hacked, No Classified Systems Believed to Be Accessed
Anonymous hacks KKK Twitter accounts, reveals members’ names | WGN-TV
State Dept Shuts Down Email After Hacking Attack |
Using big data analytics to secure the enterprise | IT World Canada News
US State Department network ‘hacked’
Philip Nitschke tribunal hearing: is there such a thing as ‘rational suicide’? | Australia news |
Cisco Launches Open-Source Security Analytics - Infosecurity Magazine
PCI Council looks to stem data breaches after bad year | Computerworld
WebsiteBaker 2.8.3 XSS / SQL Injection / HTTP Response Splitting ≈ Packet Storm
Zoph 0.9.1 Cross Site Scripting / SQL Injection ≈ Packet Storm
Fwknop Port Knocking Utility 2.6.4 ≈ Packet Storm
The Hot and Cold of Everyday Life (NSFW) - The Daily Beast
Cisco Grows Collaboration Lineup With Mobile App, Room System
What To Expect with Microsoft's New Per-User Windows Licensing -- Redmond Channel Partner
Local news from Bellingham, Whatcom County, WA |
WHITE PAPER: Using Symantec Endpoint Protection 12.1 to Protect Against Advanced Persistent Threats (APTs) | Symantec Connect
Slackware Security Advisory - mozilla-thunderbird Updates ≈ Packet Storm
Joomla HD FLV Arbitrary File Download ≈ Packet Storm
Videos Tube 2.0 SQL Injection / XSS / Shell Upload ≈ Packet Storm
Owasp Appsecusa 2014 - Warning Ahead: Security Storms Are Brewing In Your Javascript
Smoother start, but some struggle with
Gentoo Linux Security Advisory 201411-05 ≈ Packet Storm
Malware Spreading Via Steam Chat ≈ Packet Storm
HP Security Bulletin HPSBGN03192 1 ≈ Packet Storm
Suspects behind “WireLurker” malware arrested in China - SlashGear
Security is “a massively complex topic” - CA World - CSO | The Resource for Data Security Executives
PLA has set up Chinese version of 'PRISM' monitoring in H.K.: Kanwa | Cross-Strait Affairs | FOCUS TAIWAN - CNA ENGLISH NEWS
Best Practices for Selecting a Next-Generation Firewall | EdTech Magazine
How to set up Smart Lock on Android 5.0 Lollipop - CNE
The KKK Learns the Hard Way: Don't Mess With Anonymous | TakePart
Nebraska, Iowa trade associations call for legislation regarding data breaches - Money Talks Blog
Anonymous takes over Ku Klux Klan's Twitter account | Technology |
Protecting Your World Against Cyber Security Threats | Kaspersky Lab Video - YouTube
Snapchat issues outright ban on third-party apps following 4chan hack | ZDNet
Google Genomics is a cloud service just for DNA data
OSPFv2 Neighborships vs Adjacencies on Broadcast/NBMA Networks - YouTube
Merchants and credit cards are getting safer - Business - The Boston Globe
CISO’s Words of Wisdom: How To Address The Most Pressing Challenges in Healthcare Information Security
A Wool – Free Winter -The New Indian Express
IT Departments across EMEA Still Not Ready for the Internet of Things, Finds ISACA Survey - Yahoo Finance
The E-Commerce Cyber Security Advantage - CSO | The Resource for Data Security Executives
Course Introduction
Chinese sites hosting 'Wirelurker' Mac-to-iOS malware taken down, suspects arrested
How to keep everything fluffy in your hybrid cloud world • The Register
NOAA websites fall victim to cyberattack |
US State Department's E-Mail Hacked - Computing on CIO Today
U.S. State Department Is Latest Hacking Victim
Latest Federal Hacking Victim: State Department | 850 KOA
Hackers targeting families of children with cancer
Flashpack Exploit Kit Used in Free Ads, Leads to Malware Delivery Mechanism
Seven Favorite FOCUS Sessions: Ready to Replay | McAfee
State Dept Shuts Down Email After Hacking Attack |
Report: Payment Information Breaches At Staples And Michaels May Be Linked – Consumerist
Community |
iTWire - VIDEO: F5 Networks at the 2014 Gartner Symposium
Online Shoppers Turned Off by Shipping Costs, Security Concerns
Organizations Hit By DDoS Attack Lose $40,000 Per Hour, Survey Says
BadUSB: What you can do about undetectable malware on a flash drive | PCWorld
State Department hack may be tied to White House network breach - SC Magazine
The most unpopular person in the room
Owasp Appsecusa 2014 - When You Can't Afford 0days: Client-Side Exploitation For The Masses
Duggan: Hackers went after Detroit database, official
Apple OS X Yosemite Update Boosts Wi-Fi, Patches Mail Bugs : PERSONAL TECH : Tech Times
Best Practices for Selecting a Next-Generation Firewall — BizTech
BlackBerry Launches BES 12, Partners With Samsung To Ride The MDM Wave -- Trefis
Hunger Games Mockingjay Part 1 Review: Sequel Is "Forgettable" - Us Weekly
Cisco crashes the enterprise mobile party with new collaboration app | InfoWorld
Microsoft report explores dangers of running expired security software - SC Magazine
Fitbit Data Now Being Used In The Courtroom - Forbes
Creating the Next 2 Billion Smart Users
News Details |
Scammers move from Ebola phishing to fundraising | CSO Online
Dems demand answers in State Dept. cyber-attack | Nation & World | The Seattle Times
Democrats on US House oversight panel ask when data breach was discovered, how it was fixed - International - Thompson Citizen
MS14-066 is this Month's Problem Patch | Security content from Windows IT Pro
Cisco thinks outside the box with Project Squared - Forbes
Anonymous Hacks the KKK: 5 Fast Facts You Need to Know |
Should You Switch From The iPhone 5S to iPhone 6? | The Fuse Joplin
Democrats on House oversight panel ask when data breach was discovered, how it was fixed - 11/17/2014 3:52:10 PM | Newser
State Department shuts down e-mail amid hacking concerns - The Daily Item: News
Quebec nursing home that burned down not required to have sprinklers, inquest hears
Hackers claim BitTorrent Sync should not be used for sensitive data | Network World
Engewood Cliff-based ConnectOne discloses hacking of a customer's account - Business -
Let's talk about Robot Butler...