Local banks react to data breach - Temple Daily Telegram: News
» Cloud Connections Bolster In-Vehicle Systems Navigant Research
contagio mobile: Android Hideicon malware samples
Marco Ramilli's Blog: Romantic Cyber Attack Process
ZeroAccess botnet resumes click-fraud activity after six-month break | Dell SecureWorks Security and Compliance Blog
Quantum Entanglement Now On-a-Chip | EE Times
Mozilla dusts off old servers, lights up Tor relays • The Register
UH hosts national cyber security exercise - Ka Leo O Hawaii: News
Bsides Columbus 2015 - Malware Development As The Evolution Of Parasites
Linux GHOST vulnerability (CVE-2015-0235) is not as scary as it looks | Symantec Connect
How GitHub is redefining software development
Business Continuity: 4 Core Principles to Be Successful | Patrick Duroseau
GHOST glibc gethostbyname() vulnerability CVE-2015-0235 - YouTube
CVE-2015-0235: A GHOST in the Machine
Netflix is upgrading its cloud architecture for scale | Business Cloud News
McAfee January #SecChat on Thu, Jan 29 @ 11am. #SecChat
Researcher says Aussie spooks help code Five Eyes mega malware • The Register
Making improved authentication second nature to users - SC Magazine
Bsides Columbus 2015 - Snort Beyond Ids: Open Source Application And File Control
Turning Mobility to a Winning Advantage | Symantec Connect
World's Largest DDoS Attack Reached 400Gbps, says Arbor Networks | CIO
Privacy Tips |
Password Practices at Businesses Fall Short of Secure
UH to host national cyber security exercise - Ka Leo O Hawaii: News
SymantecVoice: The "Unicorn" Budget: Can CIOs And CFOs Agree On IT Spending? - Forbes
A Heroin Dealer Tells the Silk Road Jury What It Was Like to Sell Drugs Online | WIRED
Mobile Virtualization: Solving the BYOD Problem - Security News - Trend Micro USA
Course Introduction
Apple iOS 8.1.3 Release Will Again Anger Users - Forbes
FTC calls on IoT vendors to protect privacy | PCWorld
Intel Security to Deliver Keynote at ITEXPO Miami 2015
7 Smart Ways to Ensure Data Privacy - J-Net Community
What I'll Do With My Parents' Facebook After They Die - The Atlantic
Installation Tutorial - Waidps - Wireless Auditing Intrusion Detection And Prevention System On Kali
Google Cloud Platform Blog
Malware infects payment card system at French Lick Resort - SC Magazine
Could the Sony breach have been prevented? - SC Magazine
Don’t be Shellshocked by GHOST | The State of Security
FTC publishes security recommendations for IoT device makers - SC Magazine
How Vetting Mobile Apps Works for App Stores and Its Users - Security News - Trend Micro USA
Why you should celebrate Data Protection Day 2015
Highly critical “Ghost” allowing code execution affects most Linux systems | Ars Technica
House subcommittee hears testimony on data breach law - SC Magazine
'GHOST' bug in Linux library enables remote takeover of victim's system - SC Magazine
SANS 575 Review | Digital Forensics Tips
Businesses warned about new espionage campaigns from of China | CSO Online
CABG linked to better outcomes than PCI, but at higher price | Cardiology
Mandatory PCI DSS 3.0 Updates for Businesses Accepting Credit Cards - Record
SANS 2015 Enterprise Mobile Workspace Survey
Customer Story - Rush University Medical Center - Trend Micro USA
Search Like A Boss
GHOST Vulnerability and its Patch History
How organizations can prepare for 2015 data privacy legislation - SC Magazine
Stop, think, connect: safeguarding your online reputation - Lumia Conversations
Researchers Tie Qwerty Keylogger to Regin Malware Platform | SecurityWeek.Com
8 ways to celebrate Data Privacy Day securely - Computer Business Review
It's Data Privacy Day--do you know where your info is?
DDOS attack size up 50-fold over past decade | CSO Online
Data Privacy Day: Why Data Privacy Awareness Is Important - Security News - Trend Micro USA
Azimuth Security: BlackPwn: BlackPhone SilentText Type Confusion Vulnerability
In 2015, Omnichannel And Big Data Will Bring Channel Marketing To The Next Level | Channel Marketer Report
Cybersecurity is a mess, but Obama can learn a few things from Estonia – and Eugene Kaspersky – Quartz
Hacking Exposed Computer Forensics Blog
Automating the Incident Response Process - SANS Institute
Wireless Auditing Intrusion Detection And Prevention System - Switching Of Display Information
Short, sharp spam attacks aiming to spread Dyre financial malware | Symantec Connect
Bugtraq: [SECURITY] [DSA 3143-1] virtualbox security update
Canada Joins World Powers in Spying on Smartphone and Download Data | WIRED
Instant Anonymity: Are Ephemeral Apps Really Safe? - Security News - Trend Micro USA
TEN: The Enthusiast Network - Wikipedia, the free encyclopedia
4 obstacles keeping traditional IT from moving to cloud - Thoughts on Cloud
Nonprofit Brings Technology To Disaster Recovery - Forbes
Dutch judge OKs alleged Russian hacker extradition to U.S. - SC Magazine
Data Privacy and Convenience: Can We Have Both? - J-Net Community
Light Reading
Targeted Scam Cost Businesses $215 Million Using Fraudulent Wire Transfers
GHOST in the Linux Machine – CVE-2015-0235
Data Privacy Day in a World of Cloud Computing | Cyber Trust Blog
Activity Info
Ransomware 101: What It Is and How It Works - Security News - Trend Micro USA
SANS Institute Returns to Northern Virginia for Cybersecurity Training Event | SANS Institute: Press
Thought Experiment: Mandatory Online Banking Security Standards
Four Basic Steps to Protecting Your Digital Privacy in 2015 | Internet Society
SXSW 2015: The Challenges Facing Women in Tech
Two-Factor Authentication Transforms Even ‘123456’ Into a Secure Password  « VPN Haus
How To Conduct An Information Security Gap Analysis | CIO
Researcher commandeers drone through Maldrone backdoor - SC Magazine
Watch "Silent Circle asks consumers about mobile privacy" Video at SCMagazine
Bugtraq: Multiple vulnerabilities in MantisB
A peek inside Apple’s R&D wish list. TV reimagined? | Toronto Star
ClearDATA to Provide Disaster Recovery and HIPAA-Compliant Cloud Solution for Henry Schein's Dentrix Enterprise Practice Management Software
Massive DEA license plate reader program tracks millions of Americans | Naked Security
Improving Your Privacy on Social Networks - Security News - Trend Micro USA
CyLon aims to help London-based security startups - SC Magazine
Watch "FTC releases in-depth IoT report" Video at SCMagazine
VPO Press Release - PAM4 Analysis, USB 3.1 Compliance, DDR Debug, PCI Express Link Equalization, and 100 GHz Oscilloscope Capabilities Showcased at DesignCon 2015
Data Privacy Day 2015 – Putting people in control - Microsoft on the Issues
Bsides Winnipeg - Michael Zapp - Ssd Security Risks
Bugtraq: [CVE-2015-1393] Photo Gallery (Wordpress Plugin) - SQL Injection in Version 1.2.8
Bugtraq: Two XSS Vulnerabilities in SupportCenter Plus
Convicting the Silk Road founder won't stop the booming digital drug trade | Mike Power | Comment is free | The Guardian
A Single DDoS Attack Can Cost A Company More Than $400,000 | Kaspersky Lab US
Old arguments may bog down US data breach notification legislation | ITworld
A Global Black Market for Stolen Personal Data
RSA Conference sur Twitter : ""
Radware Integrates Platforms with Cisco Application-Centric Infrastructure
Bugtraq: [CORE-2015-0003] - FreeBSD Kernel Multiple Vulnerabilities
Bugtraq: NEW VMSA-2015-0001 - VMware vCenter Server, ESXi, Workstation, Player, and Fusion updates address resolve security issues
ClearDATA to Provide Disaster Recovery and HIPAA-Compliant Cloud Solution for Henry Schein's Dentrix Enterprise Practice Management Software - MarketWatch
Day One Posters — Juniper Networks
Defeat The Casual Attacker First!!
Data Privacy Day on Livestream
IR Event Log Analysis - SANS Institute
Lack of encryption makes official NFL mobile app a spear phisher’s dream | Ars Technica - image uploaded by @DataPrivacyDay
International Privacy Day: Protect Your Digital Footprint | Stewart Wolpin
New Veritas Name Blends our History and Vision for Tomorrow’s Data Challenges | Symantec Connect
2600 Magazine as DRM-free Kindle, PDF ebooks - Boing Boing
Vormetric sur Twitter : "We are thrilled to present Encrypto @RSAConference this year #DataDefenseLeague #DefenderofData #RSAC"
From Point Solutions to Application Centric Services: Cisco ACI and Radware | Radware Blog
Value Investing | Market Insight of Investment Gurus
Spy Ghana News-Latest News, Breaking News, Ghana Business, Sports, Politics News
Today's CIO @ The C Suite - Information Security: The 3 Key Governance Challenges of the CIO
The New Year Security Checklist: Security Resolutions for 2015 - Security News - Trend Micro USA
Microsoft’s big task: Replicating Windows-Office success in cloud — Tech News and Analysis
Cosentry Teams With EMC and 451 Research for Disaster Recovery Webinar
Facebook’s privacy class action lawsuit to be heard on 9 April | Naked Security
Schneier on Security: Subconscious Keys
PCI Council Champions Global Data Privacy Day | Business Wire
Facebook, Instagram, and Tinder Were Down: What This Means for You - Security News - Trend Micro USA
Ghost Linux Bug Haunting Red Hat And Ubuntu Systems ≈ Packet Storm
Scouts Take Down Database Due To Security Vulnerabilities ≈ Packet Storm
Hacker For Hire Site Surfaces, Has Trouble Staying Up ≈ Packet Storm
The Practical Guide to HIPAA Privacy and Security Compliance – Blog Post – RSA Conference
Reactions to the serious vulnerability found in Glibc
Not So Spooky: Linux "Ghost" Vulnerability
Scouts take down database due to 'security vulnerabilities' • The Register
Critical BlackPhone bug allows attackers to spy on users
Cisco Security sur Twitter : "Have you stopped by our #CLEUR booth yet? Find out the latest in #security from our experts!"
Bsides Winnipeg - Yvan Boily - Security In The Open
Spying program leaked by Snowden is tied to campaign in many countries| Reuters
Symantec Cyber-Resilent Enterprise
The new norm — PCI DSS v3.0 takes effect | Briefings | The Lawyer
About |
Ultra-secure Blackphone Vulnerability lets Hackers Decrypt Texts - Hacker News
Old arguments may bog down US data breach notification legislation | CSO Online
Bughunter cracks “absolute privacy” Blackphone – by sending it a text message | Naked Security
Search Google without being tracked: Abine adds Private Search to Blur | ZDNet
Infamous Regin malware linked to spy tools used by NSA, Five Eyes intelligence | ZDNet
I ain't afraid of no GHOST – securo-bods • The Register
Google defends policy that leaves most Android devices unpatched | Computerworld
No, Department of Justice, 80 Percent of Tor Traffic Is Not Child Porn | WIRED
Turns Out Apple Pay Can't Solve Credit Card Fraud | Gizmodo UK
'Ghost' vulnerability poses high risk to Linux distributions | CSO Online
How important is online privacy?
New OS X Yosemite version fixes critical security issues, including Thunderstrike
Cisco Security sur Twitter : "#CLEUR | Join @mroesch today at 15:30 for his session on Embracing the Open-Source Model #security"
CVE-2015-0235 - how to handle the "GHOST" vulnerability affecting Linux distributions
Security vulnerability in Blackphone service exposed | ZDNet
The “Dirty Dozen” SPAMPIONSHIP: Who’s the biggest? Who’s the worst? | Naked Security
Ubisoft yanks keys for online games purchased via unauthorised parties | Naked Security
5 things you can do to limit your exposure to insider threats | CSO Online
Hijacking drones with malware
New Legislation on Threat Intelligence Sharing May Have a Chance
Information Security News: World's largest DDoS attack reached 400Gbps,says Arbor Networks
Information Security News: Northrop Grumman Foundation Congratulates Top 28 Teams Advancing to CyberPatriot National Finals Competition
Join Symantec at LegalTech NY | February 3-5, 2015 | Symantec Connect
Industry Leading 2015 Information Security Policies and Procedures Now Available for Immediate Download from the Cyber Security Experts at – Press Release Rocket
Links Found between NSA, Regin Spy tool and QWERTY Keylogger - Hacker News
Bsides Winnipeg - Closing Ceremonies Bsides Winnipeg 2013
Rising Tide Of Malware Alerts Proving Costly, Study Finds - Page: 1 | CRN
Sutter Health California Pacific Medical Center audit uncovers data breach | CSO Online
Industry Leading 2015 Information Security Policies and Procedures Now Available for Immediate Download from the Cyber Security Experts at | Virtual-Strategy Magazine
Be prepared for the breach that’s headed your way | Computerworld
Multiple vulnerabilities in the FreeBSD kernel code
4 tips to make data protection everyone's business
The Internet of Things just got a watchdog: FTC issues official report | Ars Technica
House Debates Federal Data Breach Legislation | The National Law Review
Landing Page |
Challenge 31: XSS XII
Five Top Disaster Recovery Services Announced in January 2015 by
Critical GHOST vulnerability affects most Linux Systems - Hacker News
IBM's sophisticated cryptographic algorithm protects your identity
Regin super-malware has Five Eyes fingerprints all over it says Kaspersky • The Register
Bsides Winnipeg - Kyle Geske - Internet Bots For Fun And No Profit
IoT security and privacy best practices
Threats and technologies of a shifting data security landscape
CVE-2015-0016: Escaping the Internet Explorer Sandbox
Malware makers try to cash in with fake YouTube views — Tech News and Analysis
Taylor Swift's Twitter and Instagram Accounts Hacked - Hacker News
Big data is a privacy minefield | Business Spectator
Bsides Winnipeg - Sergii Polishcuk - Arp Attack On Ixp Infrastructure
How the Internet of Things impacts enterprise security
VERT Alert: GHOST - glibc overflow | The State of Security
Click-fraud malware brings thousands of dollars to YouTube scammers
Building A Cybersecurity Program: 3 Tips
oss-security - Qualys Security Advisory CVE-2015-0235 - GHOST: glibc gethostbyname buffer overflow
The Big Data Mistake In The Internet Of Things - Forbes
Thought Experiment: Mandatory On-line Banking Security Standards.
A Different Exploit Angle on Adobe's Recent Zero-Day « Threat Research | FireEye Inc
Security in a Connected Home | The Network
4 Promising Linux Distros To Look Forward To In 2015 Free eGuide
Oz spooks hack, wreck Middle East 'cooling system': report • The Register
Maldrone: Watch Malware That Wants To Spread Its Wings Kill A Drone Mid-Flight - Forbes
Size and frequency of DDoS attacks increasing, annual report shows - SC Magazine
Bsides Winnipeg - Theo Baschak - Infosec From An Isp Perspective
NetBackup 7.6.1 Highlights | Symantec Connect
Twenty-eight percent of security spending wasted on shelfware | CSO Online
Symantec partners with Global Fund for Women to help close gender gap in STEM | Symantec Connect
In-Depth Look: APT Tools of the Trade | TrendLabs Security Intelligence Blog
Pinterest to sell ads based on what you’re thinking of buying | Naked Security
Google asked to muzzle Waze ‘police-stalking’ app | Naked Security
Lizard Squad took down Facebook and Instagram! Believe it! Or not… | Naked Security
Evidence shows Regin spy malware is used by Five Eyes intelligence
Apple preparing fix for Thunderstrike malware in upcoming OS X 10.10.2 release - TechRepublic
Clam AntiVirus Toolkit 0.98.6 ≈ Packet Storm
FreeBSD Kernel Crash / Code Execution / Disclosure ≈ Packet Storm
Ubuntu Security Notice USN-2486-1 ≈ Packet Storm
Red Hat Security Advisory 2015-0087-01 ≈ Packet Storm
'Boozed up' US drone spook CRASHED UFO into US White House • The Register
SANS Institute
Embed Cloud Security - YouTube
DLL Injection using AppInit_DLLs Part 2
Fed data at risk in attacks on university computers -- FCW
Europe Gets A Cyber Security Incubator | TechCrunch
Data Privacy Day Raises Awareness on Consumer Privacy, Cybersecurity Best Practice
Australian information security posture weak by world standards: Cisco - CSO | The Resource for Data Security Executives - image uploaded by @TheHackersNews (The Hacker News™)
Bsides Winnipeg - Josh More - Security Metaphors: Discussing Problems With Others While Avoiding Arguments
Apple Releases iOS 8.1.3 - Hacker News
Firm finds link between Regin spy tool and QWERTY keylogger - SC Magazine
Trend Micro Safe Mobile Workforce - Trend Micro USA
Insider threats changing security spending, report says - SC Magazine
Insurer sues web designer in bank breach - SC Magazine
'Super-secure' BlackPhone pwned by super-silly txt msg bug • The Register
Bugtraq: APPLE-SA-2015-01-27-3 Safari 8.0.3, Safari 7.1.3, and Safari 6.2.3
Bugtraq: APPLE-SA-2015-01-27-4 OS X 10.10.2 and Security Update 2015-001
Contact Kaspersky Via Phone or Email | Kaspersky Lab GB
India’s cyber-security budget 'woefully inadequate': Experts - The Economic Times
Marriott fixes Android app issue that may have exposed personal data - SC Magazine
BOO! Grave remote-code exec bug in GNU C Library haunts Linux • The Register
FUMBLE! NFL app drops privacy ball in time for Superbowl Sunday • The Register
The Internet of Things is going to be a legal nightmare | The Verge
New attack uses ransomware to drop trojans and keyloggers - SC Magazine
Data Privacy Day raises focus on need to protect personal data - Business
Phishing quiz: Can you spot a scam when you see one? Don't be so sure - CBS News
National Cyber Security Strategy to be launched - Latest News -
Retail Groups Want Data Breach Law With Broad Preemption - Law360
Juniper Networks - Q4 2014 Financial Results Conference Call
Why Network Segmentation is Imperative on the Internet of Things | The Security Ledger
Juniper Networks - Juniper Networks Reports Preliminary Fourth Quarter and Fiscal Year 2014 Financial Results
FTC to Internet of Stuff: Security, motherf****r, do you speak it? • The Register
Lizard Animated GIF
Hacked or Spoofed: Digging into the Malaysia Airlines Website Compromise - Security News - Trend Micro USA
Watch "Reading the Tea Leaves of the RSAC Submissions" webcast
AVGFree sur Twitter : "Which is your favorite AVG product? If you could change one thing about that product, what would it be?"
Another day, yet another emergency Adobe Flash patch. Because that's how we live now • The Register
Module 3: Programming with Scapy
Google Says It’s Not Practical to Fix Flaws in Pre-KitKat Android
Bsides Winnipeg - Mark Jenkins - Auditable Offline Bitcoin Wallet Implementation
SEANux 1.0 Remote Code Execution ≈ Packet Storm
Red Hat Security Advisory 2015-0092-01 ≈ Packet Storm
Qualys Security Advisory - glibc gethostbyname Buffer Overflow ≈ Packet Storm
High severity vulnerability found in Linux GNU C library
Adobe releases another Flash zero-day fix - SC Magazine
Apache Qpid 0.30 Crash ≈ Packet Storm
Apache Qpid 0.30 Anonymous Action Prevention ≈ Packet Storm
BSides SF 2015 Call For Papers ≈ Packet Storm
Sony begins accepting claims in proposed PSN settlement - SC Magazine
CISOs Need a Board Coach - Rook Security
Schneier on Security: Police Using Radar that Sees Through Walls
Cisco Security Manifesto - YouTube
Judith Rodin's warning for the world: 'Crisis is becoming the new normal' | Cities | The Guardian
Report: Organizations concerned about risk from insider attacks | CSO Online
Apple readies Thunderstrike fix for upcoming OS X release - SC Magazine
Cyberterrorists to target critical infrastructure
RILA Outlines Key Elements of Data Breach Legislation at Energy & Commerce Subcommittee Hearing | LP Magazine
'Mastermind' hacker steals 20 million credentials from dating website | CSO Online
Junos Space Log Director Installation - YouTube
Do You Want “Security Analytics” Or Do You Just Hate Your SIEM?
The Strategic Value of APIs - HBR
Lawmakers see momentum for legislation on data breaches | TheHill
Former California pharmacist employee accessed data without business or treatment purpose - SC Magazine
Debian Security Advisory 3141-1 ≈ Packet Storm
Debian Security Advisory 3142-1 ≈ Packet Storm
Ubuntu Security Notice USN-2485-1 ≈ Packet Storm
Bugtraq: Qualys Security Advisory CVE-2015-0235 - GHOST: glibc gethostbyname buffer overflow
Top 3 Small Business Tech Trends for 2015
Northrop Grumman to provide cyber security to UK Gov't - Computer Business Review
Rooting Out Malware With a Side-Channel Chip Defense System - IEEE Spectrum
Bsides Winnipeg - Jared Bater And Chris Kluka - Canadian Cyber Defence Challenge: Building A War Zone
Reducing the Attack Surface: Takeaways from the 2015 Annual Security Report
PCI DSS 3.0 went into effect Jan. 1. Are you in compliance? | Network World
PerezStart - Video Gaming and Movies on Xbox 360, PS3, Wii and Atari! Anime, Otaku and Cosplay.
Retailers Reiterate Support for Federal Data Breach Notification Standard | NRF
From Infection to Extortion: Watch TorrentLocker In Action - Security News - Trend Micro USA
Apple OS X Yosemite 10.10.2 Update to Patch years-old Thunderstrike vulnerability - Hacker News
Bugtraq: [SECURITY] [DSA 3141-1] wireshark security update
Bugtraq: [SECURITY] [DSA 3142-1] eglibc security update
Reengineering the tech platform for the new era of manufacturing
April 20 – 24, 2015- RSA Conference United States 2015 - Gregory D. Evans | Worlds No. 1 Security Consultant | By Gregory Evans
Why Google won't be updating pre-KitKat WebKit anymore
Bugtraq: [SYSS-2014-013] FancyFon FAMOC - Use of a One-Way Hash without a Salt
Bugtraq: [SECURITY] [DSA 3140-1] xen security update
Results Rely on Security Confidence | Radware Blog
Kaspersky: 32% of users don't take precautions when sharing devices
How CRM Changed Cloud and Cloud Changed CRM
Historic Blizzard or an Opportunity to Test Your Business Continuity Plan? | Virtual-Strategy Magazine
Red Hat Security Advisory 2015-0085-01 ≈ Packet Storm
Apple Patch Shields Macs From Thunderstrike ≈ Packet Storm
Red Hat Security Advisory 2015-0086-01 ≈ Packet Storm
End of Life
Supposedly clean Office documents download malware
Anonymous: Snap on that Guy Fawkes mask, we're marching against child sex abuse • The Register
Give01Day and IASME Partner to Secure UK Charities
Ubuntu Security Notice USN-2484-1 ≈ Packet Storm
Spies Track Mobile Users With BADASS Tracker ≈ Packet Storm
Ubuntu Security Notice USN-2483-1 ≈ Packet Storm
Bsides Winnipeg - Richard Rodd And Chris Otto - Usb: A Look Inside
Robust information security proven to reduce data breach costs - EIN News
Yet Another Emergency Flash Player Patch — Krebs on Security
New Collaboration Platform Witkit Introduces Personalized Cryptography to Prevent Data Breaches
Windows 10: What's New in Security?
US scrambling to hire enough cyber security agents to protect itself
APT gear: Custom Windows task hiding tool
Meat puppet security sucks... let machines find your flaws • The Register
Will 2015 be the biggest yet for Cybersecurity?
Schneier on Security: The IDEA Encryption Algorithm with a 128-bit Block Length
Cisco Security sur Twitter : "#CLEUR | Don't miss our #Security Keynote with SVP David Goeckeler TODAY at 16:45!"
Link between NSA and Regin cyberespionage malware becomes clearer | CSO Online
CEO's must become fluent in language of cyber security - Computer Business Review
Marriott’s Android App Found To Have Exposed Customers Credit Card Data
Austin, TX PCI QSA Services Now Offered by the North American Payments Experts at NDB Advisory
Maldrone: Malware which hijacks your personal drone | ZDNet
Python for Pentesters and Hackers « SecurityTube Trainings
China signals censors will continue to crack down on VPN services | CSO Online
Startup finds malware intrusions by keeping an eye on processor radio frequencies | CSO Online
Marriott Customers' Personal Details Exposed by Simple Web Flaw
US startup finds malware intrusions by keeping an eye on processor radio frequencies - ARN
Facebook pours cold water on Lizard Squad: Takedown? YOU WISH! • The Register
Keylogger: Somebody STOP ME! Oh hang on, I just did • The Register
Northrop Grumman Awarded Cyber Security Contract by UK Government -- LONDON, Jan. 27, 2015 /PRNewswire/ --
Entangled Photons on Silicon Chip: Secure Communications & Ultrafast Computers - Hacker News
5 Myths (Debunked) About Security and Privacy for Internet of Things | CIO
The Stack
Will Congress Answer Obama’s Call for Data-Breach Law? -
Silicon Valley Has Lost Its Way. Can Skateboarding Legend Rodney Mullen Help It? | WIRED
Flash forward – Angler, here we come
Singapore ups the ante in cyber security fight| Reuters
Northrop Grumman Awarded Cyber Security Contract by UK Government NYSE:NOC
Android Wi-Fi Direct DoS vulnerability discovered
Data Breaches Drive Investments In Security Response, Data Protection - Page: 1 | CRN
Android Wi-Fi Direct Vulnerability Lets Hackers to Kick your Devices OFF - Hacker News
Bsides Winnipeg - Leslie Bester - Voip And Voip Related Fraud
Gas Stations Urged To Secure Exposed Fuel Tank Devices
IT Governance becomes first in the UK with CISSP CBK 2015 training course - EIN News
Facebook says that outage was technical, not DDoS related | CSO Online
MalDrone — First Ever Backdoor Malware for Drones - Hacker News
Bugtraq: CVE-2015-0224: qpidd can be crashed by unauthenticated user
Bugtraq: CVE-2015-0223: anonymous access to qpidd cannot be prevented
Information Security News: The tooth gnashing you hear is from Flash users installing a new 0day patch
Government to set up Cyber Security Agency - Channel NewsAsia
Micro ring could hasten the adoption of quantum cryptography
The impact of new EU security legislation
Apple patch shields Macs from Thunderstrike • The Register
IDT911 Consulting Grows Cybersecurity and Breach Expertise with Addition of Privacy, Security and Information Governance Advisors
Information security: why we should talk about incident response
Video: Bruce Schneier talks to Edward Snowden
Employees would sell passwords for $150
Jellybean upgrade too hard for Choc Factory, but not for YOU • The Register
Bsides Winnipeg - Brandon Enright - Detecting Malicious Activity And Malware On A Large Network
Success! Hardly anyone uses 'password' as their password anymore | PCWorld
House Subcommittee to Hold Hearing and Begin Drafting Data Breach Bill | The National Law Review
At 90, She's Designing Tech For Aging Boomers : All Tech Considered : NPR
The Hacker News sur Twitter : "#FacebookDown - 'Something went terrible wrong.'"
Photons link arms on chip to hasten march of quantum crypto • The Register
P0wning for the fjords: Malware turns drones into DEAD PARROT • The Register
Business Continuity and Disaster Recovery to Highlight eMazzanti Appearance on Voice of Manhattan Business
APTs: Minimizing losses with early detection
Bsides Winnipeg - Ian Trump - Cyber Threat Intelligence: Is It Real, Or Is It Hokum?
Is This Dangerous Minecraft Hack Stealing Your Data Or Is Your Password Amazing?
10 Notorious Cyber Criminals Brought to Justice – No. 5 | The State of Security
What happens when data gets lost from the cloud? - Cloud Tech News
Information Security: How Do We De-Criminalize ... | SecurityStreet
Some Androids can be HOSED by WiFi Direct vuln • The Register
Scapy: Beating Hidden SSID Detection
Be prepared for the breach that's headed your way - ARN
Google’s 2015 Priority Is Securing Ads From Malware | Beet.TV
Bsides Winnipeg - Michael Legary - Nfc And Rfid Harvesting For Redacted
eDiscovery Exchange | Symantec
Scientists create quantum entanglement on a silicon chip — Tech News and Analysis
WikiLeaks requests information on staffers search warrant data requests - SC Magazine
Secret Service on alert after drone CRASHES into White House • The Register
Sony accepting claims on 2011 PSN data breach settlement | Joystiq
AT&T; texts can be faked to hack you - Jan. 23, 2015
North is becoming a cyber-security hub as firms win important contracts
CyberWar Games: Do you have what it takes to win? | Symantec Connect
CTB-Locker ransomware variant being distributed in spam campaign - SC Magazine
Challenge 12: Decrypting SSL Traffic
White House cybersecurity plan a step in right direction, but needs work - FierceHealthI
Bham IT experts warn of software taking computers hostage - Birmingham Business Journal
Don’t let IoT hype distract from security fundamentals, experts say | SiliconANGLE
Bsides Winnipeg - Adrien De Beaupre - Making Pen-Testing Analysis Sexy
Google reveals Mac security holes before Apple's fix is ready
Pilgrim pushes for data retention breach notices - Security - News -
Microsoft Business - Microsoft SMB Blog
High Availability and Disaster Recovery with SQL Server 2014 AlwaysOn Availability Groups | SQL Server Pro
Deconstructing an IRS Phishing scam | CSO Online
Looking for current, former or potential Symantec Backup Exec customers!!! - Spiceworks
Over a Decade and Still Running: Targeted Attack Tool Hides Windows Tasks
Cyber Risk Report: January 19-25, 2015
Using Prioritized Analyst Workflows to Improve Incident Response with RSA Security Analytics & ECAT - YouTube
Microsoft cloud and devices momentum highlights second quarter results | News Center
Malaysia Airlines attacked, big data dump threatened | CSO Online
This is What Technology In North Korea Looks Like
Data Breach Notification Law Even Applies to You, California Employer | Sherman Law Corporation - JDSupra
Banks Want Merchants to Chip In After a Data Breach | Corporate Counsel
Java is the biggest vulnerability for US computers | CSO Online
Schneier on Security: Defending Against Liar Buyer Fraud
Schneier on Security: When Thinking Machines Break the Law
Schneier on Security: Friday Squid Blogging: Giggling Squid Restaurant
Cyber security experts set for 20% pay rise in 2015 as businesses crave protection | Information Age
'Sexy Girls' wallpaper app in Google Play store accessed account info - SC Magazine
Uninstall AVG Toolbar, home page and Secure Sear... | AVG
DLL Injection using AppInit_DLLs Part 1
Hackers to Target Smart TV Sets After Phones, Kaspersky Predicts - Businessweek
Spoof page credits 'Official Cyber Caliphate' with Malaysia Airlines hack - SC Magazine
Rooted Con 2014 - Aladdin Gurbanov - Magnetic Road
Hacking Wi-Fi is child's play
Entanglement On a Chip - IEEE Spectrum
Spreading the Disease and Selling the Cure — Krebs on Security
Lizard Squad Hacks Malaysia Airlines Website, Warns of ‘Dumping’ User Data
Report: Most U.S. weapons programs contain 'significant vulnerabilities' - SC Magazine
The dangers of relying on our smart devices
Banks Want Merchants to Chip in After a Data Breach | Corporate Counsel
20 million users' information compromised on Russian dating site - SC Magazine
Virtual Chassis Fabric: Automatic Software Upgrades - YouTube
How we can each fight cybercrime with smarter habits
Risk Management Framework: Four Things to Like | Core Security | Core Security Blog
Cisco 2015 Annual Security Report Overview - YouTube
Albany health system notifies more than 5,000 patients of data breach - SC Magazine
CISOs Need a Board Coach – Blog Post – RSA Conference
Using Ansible to deploy Juniper configurations | MyTeneo!!!
Presidential Proposals and Good Governance - Websense Insights
Who's Using Cyberthreat Intelligence and How? Part 2: Best Practices to Improve Incident Detection and Response - SANS Institute
Automating Defenses Against Increasingly Sophisticated DDoS Attacks
Rise Of The Data Force: The Emergence Of The Chief Data Officer | BCW
Breakthrough Promises Secure Communications & Faster Computers - image uploaded by @STOPTHNKCONNEC
From Inside the Cloud: What commitments does Microsoft make when you subscribe to Office 365? - Office Blogs
What makes phishing emails so successful?
Adobe gets second Flash zero-day patch ready 2 days early! | Naked Security
Eleventh Circuit dismisses LabMD motion questioning FTC authority - SC Magazine
The 3 biggest networking shifts, from the new Juniper CEO | Digital News Asia
Rooted Con 2014 - Raul Siles – Ios: Back To The Future
Secure Remote Access During Holidays
Study: Executives Unconcerned About the Risks IoT Poses to Their Networks
VPN services blocked by China's Great Firewall
What Is the Main Difference Between Mobile Web Optimization and Desktop Optimization - Radware - YouTube
Brits need chutzpah to copy Israeli cyberspies' tech creche – ex-spooks • The Register
Hoax Caller Chats With David Cameron By Posing As GCHQ Boss ≈ Packet Storm
Millions Of PSN Hack Victims Finally Get Compensated ≈ Packet Storm
Adobe Rushes Fix For Second Flash Player Zero-Day ≈ Packet Storm
Mouse-Box — An Entire Computer inside a Mouse - Hacker News
WDET Shows - Detroit Today - Why Cyber Security Is Important For The Government And At Home
The State of Obama Cybercare
WikiLeaks demands answers after Google hands staff emails to US government | Technology | The Guardian
Eugene Kaspersky: Cybersecurity Criminals 'Are Getting More And More Professional'
Kaspersky Think Security Guide - Data Privacy Day 2015
Three Reasons Big Companies Should Work With Security Startups - Forbes
Entanglement on a chip: Breakthrough promises secure communications and faster computers
Consumer Support Contacts
How to improve computer performance by configuring Kaspersky Internet Security 2015
The Supply, Demand, and Cost of Your Data - Security News - Trend Micro USA
Myth 1: Dispelling The Myths around Software Tokens - YouTube
Police ransomware scam drives UK teen to suicide
Task 5: Social Engineering
Stealth Mode: Lying in Wait Inside the White House’s Network
Symantec sources claim exec teams in place by April Fools' Day • The Register
Rooted Con 2014 - Chema Alonso – Playing And Hacking With Digital Latches
Maximizing Business Continuity Success
Calgary to host cyber security summit for energy industry | News Talk 770 (CHQR)
The Pirate Bay Updated With Phoenix Image and Set to return on 1 February - Hacker News
Google defends policy that leaves most Android devices unpatched | CSO Online
Adobe updates Flash Player again, plugs 0-day exploited by Angler
Cybersecurity startup scene in Boston is 'frothy,' RSA exec says - Boston Business Journal
20 Million Credentials Stolen From Russian Dating Site 'Topface' - Hacker News
More Than Just a Pretty Dashboard – Cisco ISE and Splunk Turn Event Data Analysis into Action
Hackers can Spoof AT&T; Phone Messages to steal your Information - Hacker News
Google explains why it's not fixing web security in old Android phones
Lizard Squad threatens Malaysia Airlines with data dump: We DID TOO hack your site • The Register
Apple readies fix for Thunderstrike bootkit exploit in next OS X release | Ars Technica
Challenge 6: Digest Authentication Reloaded
Experian Data Breach Resolution and BillGuard collaborate to transform data breach response with launch of an active fraud surveillance and identity theft resolution offering
NDB Advisory Announces Comprehensive PCI DSS QSA Consulting and Compliance Services for South Florida Merchants and Service Providers – Press Release Rocket
Hoaxer posing as GCHQ boss prank-calls PM Cameron • The Register
Florida Colleges Rushing to Offer Degrees in Cybersecurity
Rooted Con 2014 - Roberto Baratta - Security Monetization: More With Less To More With Nothing
Open source software for quantum information
Google Chairman Eric Schmidt: "The Internet Will Disappear" - The Hollywood Reporter
Website Defacement - Definition - Trend Micro USA
Analyzing CVE-2015-0311: Flash Zero Day Vulnerability
'Smart' keyboard knows you - Technology News - redOrbit
BRIEF-Bluedon Information Security Technologies gets regulatory approval for assets acquisition| Reuters
Google Play Store Host Application That Steal Users Account | SecTechno
Day-Con IX 2015
Cartero- E-Mail phishing framework | SecTechno
‘An Inside Look at Disaster Recovery Planning’
What is Assembly Language?
Rooted Con 2014 - Joaquín Moreno - Low Level Forensics On Mac Os X
BEST Practices for a Secure Android Phone | SecTechno
Microsoft wants Windows 10 everywhere, including on your head, starting in 2015