Jay Trinckes - Authors & Columnists - Dark Reading
Cybersecurity & Healthcare: Does Cybersecurity Act Help or Hurt?
France attacks Facebook data tracking, opening new front in privacy battles -
French Authorities Warn Facebook Over User Data Sharing With The U.S - The Whistler
Big data privacy must be fixed before the revolution can begin | ZDNet
Google may disconnect the phone for its VR vision of the future - CNE
Infoblox acquires IID, combining threat intelligence with network
5 Ways Firms Can Secure Privileged Access -
Feature: MWC 2016 - Top 5 themes - Mobile World Live
White-hat hackers key to securing connected cars | CIO
FBI, British police nab alleged 'crackas' hacker | Politics - WMUR Home
British boy aged 15 arrested for allegedly hacking into CIA director's email - Mirror Online
PGP co-founder: Ad companies are the biggest privacy problem today, not governments | ZDNet
Palo Alto Networks Inc (PANW) Lowered to “Buy” at Vetr Inc. - Financial Market News
Banks urged to share data but warned over security | IT PRO
Evidence Suggests the Sony Hackers Are Alive and Well and Still Hacking | WIRED
John Leslie loses phone-hacking damages claim appeal - Edinburgh Evening News
VTech's new T&C;'s warns customers that it won't be held responsible should another hack occur - TechSpot
Locks Law Firm Appointed to Experian Data Breach Plaintiffs’ Steering Committee | Business Wire
3 Flavors of Machine Learning: Who, What & Where
Palo Alto Networks Inc (NYSE:PANW) Institutional Investors Sentiment Index Up in 2015 Q3 -
Apple, Intel, Other Top Merrill Lynch Dividend Tech Stock Picks (NASDAQ: AAPL) (NASDAQ: INTC) - 24/7 Wall St.
Is The Cybersecurity Bubble About To Burst? - Dark Reading
500 euro banknote 'a security risk' | SBS News
IT pros confident they can detect a cyber-breach |
FreeCharge partners with ePaisa, strengthen payments at offline stores | Latest Tech News, Video & Photo Reviews at BGR India
Parents urged to boycott VTech toys after hack - BBC News
More Reasons To Drop The War On Encryption - Dark Reading
Cybersecurity Statistics Predict A Hot Market For 2016 To 2020 - Companies most fearful of cyber-attacks, says poll
India, UAE resolve to expand cooperation to fight terror
Marines Could Cut Infantry Troops to Expand Cyber Community |
Internet Is Growing Market for Illegal Drugs, Says EU Watchdog | NDTV
What Developers Want From Their Technology (But Mostly Cloud)
Judicial Redress Bill Passes Senate | Broadcasting & Cable
Senate group OKs data protection and privacy bills | News |
Three ways to get a better relationship with your IT assets | Information Age
IBM's X-Force team hacks into smart building | Networks Asia | Asia's Source for Enterprise Network Knowledge
Hackers target Netflix » Digital TV Europe
Hackers could be selling your Netflix account on the black market |
Hackers of two Ukrainian utilities probably hit mining and railroad targets, too | CSO Online
John Leslie loses appeal over blocked phone-hacking damages claim (From Herald Scotland)
Congress Passes Judicial Redress Act, UK Snoopers' Charter Gets Closer Look - Dark Reading
Fitch Upgrades Panasonic to 'BBB'; Outlook Stable | Reuters
Social engineering tops the hacking pops
Phishing is the most popular hacking technique |
Determining Physical Location on the Internet - Schneier on Security
Democratic debate: CNN's Reality Check team inspects claims -
New Release Preview Rings For Windows 10 Announced By Microsoft - MyTechBits
7 Android tools that can help your personal security | Computerworld
The top 25 skills to get hired - The Sunday Business Post
Big Data in the Sandbox: Learning to Play Better | Information Management Blogs
Securosis Blog |
Securosis Blog | The Summary is dead. Long live the Summary!
Securosis Guide: Threat Intelligence & Bothan Spies | RSA Conference
The Securosis Guide to the RSA Conference 2016: The FUD Awakens!
Securosis Guide: R2DevOps | RSA Conference
Securosis Guide: Escape from Cloud City | RSA Conference
EU finance ministers' head urges ECB to study security risks of 500 euro banknote | Reuters
Redwood Technologies Group Achieves PCI DSS Certification -
ISCS Improves Payment Capability With PCI-Compliant Microservice
FreeCharge partners with ePaisa, strengthen payments at offline stores | Business Standard News
VTech 'is responsible' for kids' data says UK watchdog - BBC News
US intelligence agencies may use home devices to boost surveillance: Clapper
President Plans New Top Level Cyber Official
U.S. Intelligence Director Details Threats - Warrior - Scout
India, the UAE resolve to expand cooperation to fight terror | Latest News & Gossip on Popular Trends at
US Intelligence Chief Lists Main Global Threats, Warns Of IoT As Tools For Spying On You : FUTURE TECH : Tech Times
'Internet of things': U.S. government may use ordinary household items to spy on people, intel chief says | Christian News on Christian Today
Symantec Warns of Netflix Malware and Scams - Infosecurity Magazine
No agreement as deadline to replace Safe Harbor nears | Network World
EU, U.S. officials tackle last hurdles in data pact talks ahead of key deadline | Reuters
Now, access your personal Facebook Messenger from shared device - The Economic Times
Internet of Things: I Spy With My Little Eye... »
Is your refrigerator connected to the Wi-Fi yet?
When hackers turn your lights off (Opinion) -
Apple Employees Offered Up To $23,000 For Log In Details By Hackers
Hackers of two Ukrainian utilities probably hit mining and railroad targets, too | CIO
Palo Alto Networks Inc (PANW) Stake Raised by Candriam Luxembourg S.C.A. - The Vista Voice
'World-class' cyber-detective Cynet raises $7 million | The Times of Israel
Watch SophosLabs experts present their research on Hacking Team, PDF malware and APTs | Sophos Blog
FBI, British police nab alleged 'crackas' hacker | Politics - KCCI Home
CIA Director Won't Admit That CIA Hacking Of U.S. Senate Computers Was Improper (Video)
New report from NTT Com Security highlights critical importance of data protection
The Health Requisite for Development
Russian to ditch Windows OS, decides to join the Linux club » TechWorm
UK business decision makers see cyberattacks as their great nemesis
NopSec Makes Security Threat Remediation Easier With Unified VRM 4.0
LG plugs gap exposing info of millions of G3 users | IT PRO
Mac tool vulnerability exposes lots of apps to man-in-the-middle attacks
Prawit denies rumours of Russian tanks procurement - The Nation
China - Information Protection And Cyber Security The Counter-Terrorism Law. Implication to Telecom And Internet Companies | Conventus Law
U.S. official blames Russia for power grid attack in Ukraine -
FY2017 DoD budget request totals $582.7 billion « American Society of Military Comptrollers (ASMC)
Internet of Things: cyber crime on the rise
Personal data privacy breaches 'should carry a jail term' « Express & Star
Laws to give EU citizens right of redress in the US over data handling move closer
Cass Patented BYOD Payment Solution Expands Globally > Mobile Commerce Press
Veritas Advances Retention and Risk Mitigation with Innovations that Improve Information Governance - Media Releases - CSO | The Resource for Data Security Executives
Vigilante Hackers Build Botnet To Secure Routers From Lizard Squad » TechWorm
Former TV presenter John Leslie loses appeal over blocked phone-hacking damages claim (From Evening Times)
Ex-county worker pleads guilty to data breach on lawmakers | News & Observer
Cisco CEO: Executing well despite macro slowdown - Yahoo Finance
Several states seek to block 2nd trimester abortion method | KIRO-TV
VMware enables affordable application and desktop | IT-Online
VMware Provides Digital Workspaces with Workspace One, Horizon 7 and Horizon Air | Hybrid Cloud content from Windows IT Pro
VMware transforms application, desktop virtualization for mobile-cloud with Horizon 7, Horizon Air - Computer Technology Review
Traveler to Venezuela Brings First Case of Zika to China - Breitbart
Cruz App Data Collection Helps Campaign Read Minds of Voters | NBC New York
The Sas 2015 - Finding Adobe Flash Zero-Day
The Sas 2015 - Monitoring Swedish .Tld For Malicious Code
The Sas 2015 - Routing-Based Internet Infrastructure Attacks And Manipulations
The Sas 2015 - Rebooting Dns Analysis
The Sas 2015 - Chase And Collect - Candc Server Investigations
The Sas 2015 - Security Lessons From The Sochi Olympics
The Sas 2015 - How I Hacked My Home
FireEye's (FEYE) CEO David DeWalt on Q4 2015 Results - Earnings Call Transcript | Seeking Alpha
IST researchers aim to help companies fortify cyber defenses | Penn State University
Obama's Shop-'til-You-Drop Nuclear Spending Spree
India, UAE sign 9 agreements, to boost ties further - Firstpost
On a slow track : The Big Story - India Today
GSMA issues first Internet of Things security guidelines
Personal data privacy breaches 'should carry a jail term' -
US to Europe: You can sue us if our agencies misuse your personal data | ZDNet
National Cyber Security Alliance Announces Expansion Of Multi-Factor Authentication-Focused Education -- WASHINGTON, Feb. 9, 2016 /PRNewswire-USNewswire/ --
Elementary schools looking to adopt BYOD - The Bristol Press: Bristol Press
Swipe Left to Avoid Liability: Policing Dating Apps in the Workplace | Ogletree, Deakins, Nash, Smoak & Stewart, P.C. - JDSupra
IBM Researchers Hack Into A Smart Building To Highlight The Backdoors Created For Hackers » TechWorm
Amazon, AsiaInfo Team Up to Disrupt the Telco Back Office | Light Reading
Analtsis - Earnings bolster Cisco, but raise concerns for broader IT spending | Reuters
Microsoft: Win 10 Will Protect States from Hackers - Maximum PC
Thefts of patient medical records starting to add up | Health Data Management
NH primary: Outsiders won, insiders crumbled | Politics - WAPT Home
Sentry wounded, attacker killed in hacking at Sulu Army base
FBI, British police nab alleged 'crackas' hacker | Politics - WTAE Home
Clemson students test hacking skills in intercollegiate competition
Data breach at Missoula school included records of former students
New information released on Hellgate student data breach | Missoula Local News -
Auditing Company Reports Potential Healthcare Data Breach
DHS calls for new appropriations structure for 'Unity' progress
Agenda of the next president: Peace and order | Inquirer News
Absolute Manage, long known for Mac management, was just re-released by Heat Software as Heat LANrev - Jack Madden -
New Release Preview Rings For Windows 10 Announced By Microsoft
Microsoft Will Now Share More Details About What's in Windows 10 Updates
Cruz app data collection helps campaign read minds of voters | The Charlotte Observer
Ted Cruz's data app helps campaign target voters - CBS News
Senate Bill Aims to Derail NKorea’s Nuclear Weapons Program – The Yeshiva World
FBI, British police nab alleged 'crackas' hacker | Politics - WDSU Home
A Clear-Eyed Focus on Our Interests: A Guide for the Next President
Junior Marines would be first to go in cuts for cyber capabilities
Cyber Defense: What We're Missing
Judicial Redress Act Would Extend Privacy Act Remedies to Citizens of Designated Foreign Nations - Lexology
The EU-U.S. Data Protection Dispute and Possible Resolution |
Tech and privacy: Judicial Redress Act, Internet providers and user data, ACLU guide
Western Sydney hit by $50,000 fine and suspended three-point deduction over flare use | Football | The Guardian
Google to unveil VR headset with built-in screen
Guidance Software's (GUID) CEO on Q4 2015 Results - Earnings Call Transcript | Seeking Alpha
Hackers infiltrate Finance Ministry computers | The Times of Israel
Mozilla Releases Security Updates
Ex-County Worker Pleads Guilty to Data Breach on Lawmakers
Radware Ltd. (NASDAQ:RDWR) PT & Analyst Recommendation Review | Uptick Analyst
How Higher Ed Fends Off Cyberthreats | EdTech Magazine
Singapore to Get New Cyber Security Legislation - Lexology
Addiction experts praise Haslam's drug crimes sentencing initiative |
Law firm follows through with plan to file class action suit against Apple over ‘Error 53’ | 9to5Mac
Discontinued Technology in .NET Core
Windows 10 Mobile Build 10586.107 Now Available for Insiders
evLeaks teases something mind blowing for the "Windows faithful" - WMPoweruser
TARGIT Makes Big Data Analytics More Approachable with New Data Discovery Module Version - insideBIGDATA
Cruz app data collection helps campaign read minds of voters | News & Observer
Thailand, Russia plan terror, crime blitz | Bangkok Post: news
`Snooper's Charter' Would Make Brits Most Spied-Upon People - Bloomberg Business
The British Government Can Now Record The Internet History Of Every UK Citizen : PERSONAL TECH : Tech Times
U.S. blames Russia for Ukraine grid attack | Politics - WDSU Home
U.S. blames Russia for Ukraine grid attack | Politics - WMUR Home
Navy Fiscal Year 2017 Budget Request Briefing | Video |
Cisco Pitches $1.4B Deal For Internet Of Things Platform - Law360
Paul Hastings launches 'Internet of Things' cross-practice - The Global Legal Post
Is privacy possible in the Internet of Things? | R Street Institute | Free Markets. Real Solutions.
2017 federal budget includes $19B for cybersecurity | CIO Dive
Personal data privacy breaches 'should carry a jail term' | Daily Mail Online
The Push and Pull Between Data and Privacy - Lexology
How to get a free data plan for your iPad - CNE
Who Will Own The Virtual Reality Interface? | TechCrunch
Analtsis - Earnings bolster Cisco, but raise concerns for broader IT spending | Interactive Investor
Hackers of two Ukrainian utilities probably hit mining and railroad targets, too | PCWorld
Cyber experts: how to stay safe from hackers on your mobile banking app - Story | WJZY
For Hillary to Survive, Clintonism Had to Die - Bloomberg Politics
Ex-county worker pleads guilty to data breach on lawmakers
United States v. Rojas, 13-40998 (5th Cir. 01/28/2016) | Texas Lawyer
Monitoring your internal network with intelligent firewalls | Networks Asia | Asia's Source for Enterprise Network Knowledge
More Symantec partners may see vendor's security services assets
Apple Facing Class Action Lawsuit Over 'Error 53' iPhone 6 Bricking - Mac Rumors
Microsoft Intros Web-Based Management Tools With Nano Server Support
Windows 10 finally surpasses XP - Feb. 2, 2016
Q&A: How Facebook handles product security, with help from outside bug hunters - GeekWire
Protegrity Taps IT Industry Veterans for Sales Leadership Roles - Yahoo Finance
SAP, Certified Security Solutions to Integrate Technology - February 11, 2016 -
Rules vs. behavioral heuristics vs. data mining vs. machine learning. Actually, you want it all. - McAfee
Congress Passes Judicial Redress Act, UK Snoopers' Charter Gets Closer Look
The effects of a hacked power grid | EDN
Obama seeks cybersecurity boost to replace 'ancient' tech
The Courier - Your Messenger for the River Valley - Bill aimed at N Korea weapons program
UAE, India ink 7 agreements in key sectors - Khaleej Times
Homeland Security Starts Overseas
SEAPOWER Magazine Online
'Jason Bourne' news, spoilers: Matt Damon reprises his role as troubled agent in upcoming sequel | Christian Examiner Newspapers
Obama's liberal Republican budget: Column
Cisco Spends $1.4 Billion on Jasper IoT Platform - Unified Communications on Top Tech News
Google extends European Right to Be Forgotten link blocks
Netizen Report: The EU wrestles with Facebook over privacy.
Startup Day FAQ: What to know if you are coming to our big entrepreneurial bootcamp Friday - GeekWire
Vevo’s New, More Personalized Music App Comes To Android & Apple TV | TechCrunch
Earnings bolster Cisco, but raise concerns for broader IT spending | Reuters
Carbanak Hackers Targeting Banks Again, Security Pros Say | American Banker
Opinion: When hackers turn your lights off | News - Home
Judicial Redress Act Passes Congress, UK Snoopers' Charter Gets Closer Look
Critical VPN key exchange flaw exposes Cisco security appliances to remote hacking | CIO
Hacking Slack to keep your house in order
Hellgate High data breach included records of former students | Local |
Locks Law Firm Appointed to YapStone Data Breach Plaintiffs’ Executive Committee | Business Wire
Third-party app stores riddled with malicious apps, Trend Micro warns - SC Magazine
Symantec Beat 3Q16 Estimates despite the Strong Dollar - Market Realist
Department of Homeland Security press conference in Knoxville | News, Weather, Sports, Breaking News | WTVC
'I have nothing to hide' is killing the privacy argument
F-Secure: New malvertising campaign delivers ransomware via Skype, browsers - SC Magazine
IBM: Phishing scams a major cause of bank breaches - SC Magazine
ENCRYPT Act, Comey testimony show stark differences toward encryption - SC Magazine
Small Business Windows 10 Adoption Lags
It's official: Older versions of IE are now at risk | Computerworld
Five simple tricks to solve Wi-Fi problems, Windows issues and more
Security Breach Imminent At Aso Rock As Security Grumbles Over Unpaid Allowances | INFORMATION NIGERIA
Survey: 65% of Businesses Expect to Suffer an Information Security Breach - Security Sales and Integration
Hats, Hoodies, Short Shorts & Chromebooks - PBSD Talks Budgets Plus A New Code Of Conduct
Senate OKs N. Korea sanctions | NWADG
Disaster and cyber security forums set for Bossier City | Red River Radio
Panel approves Cobert as nominee for OPM director - SC Magazine
Finland Aiming To Add Offensive Edge To Cyberwar Arsenal
Commandant to Marines: 'Get out your map and your compass'
NextNine's security platform helps to reduce industrial cyber risks | Network World
Google Finally Expands Europe’s Search Delisting To Domain | TechCrunch
US can't ban encryption because most of it comes from overseas | ZDNet
Flash browser plugin is still not optional | ZDNet
David Webb: Bring Your Own Device - worth the risk? - Business - NZ Herald News
Rackspace Announces Private Cloud Powered by Red Hat
Hackers Trying to Steal Your Tax Refund With Stolen SSNs | News & Opinion |
FBI hack updates: Hackers claim to release contact details of over 20,000 FBI employees
Deloitte: Cybersecurity Moves to the Offensive - Infosecurity Magazine
FBI Says It Still Can't Unlock San Bernardino Shooter's Encrypted Phone | Fast Company | Business + Innovation
Clinton Scrambles as Sanders Puts the Black Vote in Play | The Fiscal Times
How UCaaS will help enterprise workers collaborate - CIO
Pwn2Own Hacking Contest Returns as Joint HPE-Trend Micro Effort
Social Engineering Leads the Top 10 List of Most Popular Hacking Methods -- Balabit Survey Results From Black Hat USA and EU Shows - Press Release - Digital Journal
Critical flaw exposes Cisco security appliances to remote hacking | Computerworld
Faux Insiders Represent the Greatest Cyber-threat to Organizations - Infosecurity Magazine
Leaky Mobile Apps Expose Personal Info for Millions - Infosecurity Magazine
SC Congress London: Are we on the verge of an Armageddon? - SC Magazine
Alumni, deceased students among 1,100 affected in Montana school breach - SC Magazine
California woman blames data breach on Group | Legal News Line
2016 Data Breaches Expose 1.4 Million Records - 24/7 Wall St.
Cisco beats profit estimates, adds $15 billion to buyback - Times of India
Cyber security and mining in the age of automation | Mining Australia
Late Night 'Motor Noises' Heard From Apple-Leased Sunnyvale Campus - Mac Rumors
Lost in the wild? Smart drones can help search for you! - The Economic Times
Microsoft expands Windows 10 release notes, but experts want more, much more | Computerworld
What Channel Partners Need to Know Before Diving Into Vertical Markets
ISCS Improves Payment Capability With PCI-Compliant Microservice - Press Release - Digital Journal
Cyber security breaches could prove costly for UK businesses | Technology | Manufacturing Global
Obama Administration Plans New High-Level Cyber Official - Data Security on Top Tech News
Obama wants more cybersecurity funding and a federal CISO | CIO
Check Point Software co-founder bets on perimeter-less security
The Phishie Awards: (Dis)Honoring The Best Of The Worst Phishing Attacks - Dark Reading
Man arrested in decapitation of his grandmother, her husband | WJAX-TV
India, UAE sign 7 agreements to step up bilateral cooperation on cyber security, insurance and more | Latest News & Updates at Daily News & Analysis
International Wireless IPv6 Network Service for the Internet of Things
Report says drugs from online stores tend to be high in purity - News - Mixmag
Phishing scam nets PII from 730 Brightview employees - SC Magazine
iovation Shares Data on Online Dating Scams and Mobile Usage Ahead of Valentine's Day
Why Entrepreneurship Holds the Key to Solving the Autism Employment Crisis
Data Privacy And Ownership – Who Owns Car-Generated Data? - Data Protection - Germany
Privacy victory, as Google removes 'right to be forgotten' content across EU - E & T Magazine
Noodlecake Studios: the tiny Canadian outfit bringing your favorite iOS games to Android | The Verge
VTech: You acknowledge that PII "may not be secure" - SC Magazine
How B2B eCommerce is evolving in the cloud [Q&A]
VTechs new TC holds buyers responsible if its servers are hacked in future | Mobile Choice
SC Congress: Cooperation and preparation in the face of cyber-criminality. - SC Magazine
Analysis: New Hampshire results keep nomination races fluid | KTVB.COM
4 Growth Hacking Tactics Every Startups Needs to Consider - Fourth Source
VTech tries to blame parents for future data breaches |
Technavio Identifies Top Four Emerging Trends for the Global Data Loss Prevention Application Market in APAC Through 2020 | Business Wire
Investigatory Powers versus Fighting Fraud Together and the Skills for Both - When IT Meets Politics
Error 53: Apple accused of 'arrogant approach to customers' over secrecy around issue | News | Lifestyle | The Independent
HP unveils new ink tank series for low cost printing - The Economic Times
SC Congress: "flakey kettles and dolls that swear at you" - SC Magazine
Patrick Gallagher: Carahsoft, HPE Form Info Governance Partnership for Big Data Clients | ExecutiveBiz
Could Big Data Help Fight The Zika Virus?
SANS Atlanta Cybersecurity Training will Detail the Most Effective Steps to Prevent Against Attacks
How To Avoid Getting Counterfeit Money When You Travel
NowSecure Research Looks At Mobile Security & How To Manage It |
How to Track North Korea's New Satellite as It Streaks Through Space | WIRED
Tripwire Study: IT Professionals Overconfident in Cyber Attack Detection | Business Wire
The Future of Payments Security: 3 Predictions for Dramatic Change in 2016 | Payment Week
ISCS Improves Payment Capability With PCI-Compliant Microservice - EIN News
BlackBerry talk about its acquisition of security technology. - Infosecurity Magazine
Worldwide Encryption Products Survey - Schneier on Security
Cryptography: A Worldwide Survey of Encryption Products - Schneier on Security
Politics - REVEALED: Why There are Fears of Security Breeches in Aso Rock | Nigerian Bulletin - Latest News Updates
IoT Vulnerability Discovered in Children's Connected Toy - Data Security on CIO Today
Puddle of Mudd singer pleads not guilty in vandalism case | FOX23
Cyber-security and the Case For Really Good Train Sets
DIA’s Vincent Stewart: Cyber, Hostile Intell, Terrorism Key Global Security Challenges
Marsh Appoints Lobban as Senior Adviser on Cyber Risk
North Korea to cut hotlines with South amid Kaesong shutdown - BBC News
U.S. Pacific Air Forces chooses Tinian island as divert airfield
Air Force design computer weapon systems - SFGate
Missing airman has ties to East Texas - - Tyler, Longview, Jacksonville |ETX News
Losing data through defences is as bad as via absent mindedness - Infosecurity Magazine
Anti-terror police quiz hacker Vincent Lauton over 'Evacuators 2K16' bomb hoaxers | Daily Mail Online
How to access the dark web | Alphr
UK privacy watchdog warns that IoT devices can track people | IT PRO
Rubicon Labs Debuts TLS Armor(TM) Security & Trust Platform for Cloud-based Data Centers
What's New in February '16 in Open Source CMS
Veritas Advances Retention and Risk Mitigation With New Innovations That Improve Information Governance | Business Wire
Kaspersky Lab Named a Leader in Gartner’s Magic Quadrant for Endpoint Protection Platforms for the Fifth Consecutive Year | Business Wire
Concerns remain over Investigatory Powers Bill - SC Magazine
Cyber-Ark Software (NASDAQ:CYBR), (FEYE) - Russian Hackers Illegally Manipulated $400 Million Of Dollar/Ruble Trades In February 2015 | Benzinga
Toy company's new terms and conditions spark child cyber-safety concern | SBS News
John Leslie loses appeal over blocked phone-hacking damages claim - UK / News / The Courier
Misgivings rise as EU-US agreement unravels under scrutiny
Critical VPN key exchange flaw exposes Cisco security appliances to remote hacking | InfoWorld
Nir Zuk Sells 30,000 Shares of Palo Alto Networks Inc (PANW) Stock - Financial Market News
Analyst Coverage Updates - Barracuda Networks, Inc. (NYSE:CUDA)
Social engineering is top hacking method, survey shows
The top ten most popular hacking methods revealed | Information Age
Citing hacking, harassment, Princeton U. professor shuts Twitter account |
Missoula school student data breach included alumni records | Missoula Local News -
anti-israel hackers | fbi |data breach | opm | hactavist
Why EHR Vendors Are Next Healthcare Data Breach Target
IT industry bellwether Cisco is ok – TechEye
Is New Narrative on Fighting Extremism a Fantasy? « ISN Blog
Senate, House OK Judicial Redress Act, send to Obama to sign - SC Magazine
Man 'brutalised' by casino security
Apple Releases iOS 9.3 Public Beta 3; Update Brings Night Shift, Touch ID Notes and More : Trending News : Lawyer Herald
BlueTalon Data-Centric Security for Hadoop Now Available On-Demand on Microsoft Azure Marketplace - PennEnergy
Big Data Security For Dummies - Vollversion - Download - CHIP
How to ensure PCI DSS compliance when dealing with message queues | CSO Online
The Top Security Challenges Facing Retailers | Retail News | RIS News: Business/Technology Insights for Retail, Supermarket Executives
5 Reveals About Today's Attack M.O.s From Skype Spying Malware
10 Shocking New Facts About Ransomware - Dark Reading
Justice, DHS Probe Hack Allegedly Made Possible By DOJ Help Desk -
IRS Online Security Breach Affects 100k Taxpayers |
Critical VPN key exchange flaw exposes Cisco security appliances to remote hacking | PCWorld
James Clapper Tackles Cyber Threats, Anti-Satellite Systems Before Senate Panel
Obama Administration Plans New High-Level Cyber Official | Sci-Tech Today
Dyre Trojan Silenced After Moscow Arrests - Infosecurity Magazine
5 Big Incident Response Mistakes
Senate Approves Harsher Sanctions for North Korea
Cyber a top national security threat to U.S.: Intelligence director | Business Insurance
Woman, 3 children critically hurt in stabbing at NYC hotel | FOX23
Islamic State 'help desk' helps members avoid internet surveillance
Fighting the last war | TheHill
North Korea accuses South Korea of dangerous declaration of war | Latest News | Breaking UK News & World News Headlines | Daily Star
Silver Spring Networks Extends Internet Of Things Technology Platform With Gen5 Networking Advancements
Online market 'is turning drug dealers from goons to geeks' | World news | The Guardian
Tackling Tech: NFL Ends Periscope Ban for Teams, But Sets Limits | New England Patriots
Skyhigh Networks Announces Expansion of Skyhigh Cloud Security Labs to Include Cloud Threat Intelligence | Business Wire
Gartner Defines Benefits of Software-Defined Perimeter Around Enabling Business Agility in Upcoming Webinar
Future of Cloud and Data Center: Next-Gen Convergence
CYBERPOL public information released - Dark Reading
Hacking Group Chief Says Close to Breaking Encryption Used by Popular Games Like FIFA 16 | NDTV
Petraeus Fallout: 5 Gmail Security Facts - Dark Reading
VTech asks parents to accept responsibility for data breach- The Inquirer
VTech defends new T&Cs stance following data breach | Latest news from the toy industry | ToyNews
Podcast 494: Error 53 is only helpful to robots | Macworld
Let there be light: How Li-Fi could change the Apple ecosystem | Macworld
Google: Please give Nexus devices removable storage! | Stark Insider
Make Privacy a 2016 Election Issue - Schneier on Security
Big Data Innovator Koverse to Accelerate Growth with Appointment of Jon Matsuo as Chief Executive Officer and Paul Brown as Chief Product Officer | Business Wire
Valentine’s Day: Find out how to get an engagement ring through security at East Midlands Airport! | Derby Telegraph
Finextra: Fastacash and Cellum partner to extend global footprint
If conveyed correctly, you can raise awareness and change behavior. - Infosecurity Magazine
All Windows OS Versions Hit By Severe Security Vulnerability | MobiPicker
The new frontier: Even Developing Nations Do Cyber Spying | Fabius Maximus website
German envoy urges China to speed up talks on deal protecting business data security | South China Morning Post - Americans Cite Cyberterrorism Among Top Three Threats to U.S.
4 holdouts at Oregon refuge have diverse backgrounds | WJAX-TV
India's counter terror financing agencies and investigative agencies need to be fully integrated, say experts | Latest News & Gossip on Popular Trends at
Missing airman has ties to East Texas - KSLA News 12 Shreveport, Louisiana News Weather & Sports
Spy Fridge: The Internet of Things Meets the Surveillance State - Breitbart
Data Protection Day 2016 – 4 Trends For The Coming Year - Data Protection - European Union
Obama budget rejected by House Republicans -
Swipe Left to Avoid Liability: Policing Dating Apps in the Workplace - Lexology
5 ways to establish effective privileged access management | Information Age
Financial Executives International DailyMicrosoft Finance and the Journey to Digital Transformation - Financial Executives International Daily
Webinar Highlights Secure Enterprise Application Access - Contributed Content on CIO Today
VTech alters terms and conditions to avoid blame if it is hacked again | Daily Mail Online
VTech Revises Terms Of Service: If Hackers Steal Your Data, It's Not At Fault : PERSONAL TECH : Tech Times
Expert: cross-platform Adwind RAT - Securelist
Encryption, interference and bulk powers need revision - Infosecurity Magazine
Concerns growing over NBA hacking tactic's impact - Sports - The Bulletin - Norwich, C
Security Pros Struggling with Increasing Workplace Pressure - Infosecurity Magazine
Sanders aims for big win in New Hampshire |
New Hampshire Voters Give the Establishment a Middle Finger Salute
NBA wants to limit hacking
Nobody likes it, but NBA coaches and players acknowledge hacking has its uses | Concord Monitor
Fortran must die! Malware Museum harks back to simpler days of hacking- The Inquirer
Chinese Consortium Makes $1.2 Billion Offer for Opera Software -- 2nd Update -
Missoula school student data breach included alumni records
IRS Suffers Automated Hacker Attack - Network Security on Top Tech News
Shri R S Mooshahary delivers key note address at 16th International | Business Standard News
Enterprise File Security Leader Vaultize Expands to... -- NEW YORK, LONDON, MUMBAI and NAIROBI, Kenya, February 11, 2016 /PRNewswire/ --
GSMA Release IoT Security Guidelines - Infosecurity Magazine
How Hacking Team and FBI planned to Unmask A Tor User
US Government builds "Memex Deep Web Search Engine" to Track Criminals
How Spies Could Unmask Tor Users without Cracking Encryption
iPhone 5se news and rumors: New iPhone might also have a pink variant
Here are 10 apps to help switch operating systems - timesofindia-economictimes
Apple smartphones affected by ‘Error 53’ spark controversy | Toronto Star
Who will unlock the giant data bottleneck in healthcare? | CIO
Dell makes the most secure PCs in the industry even more secure with new BIOS verification and advanced threat protectihnologyon technology | Al Bawaba
Sourcing Security Superheroes: Part II: How Policy Can Enhance, Rather Than Hinder, Breach Detection
Hacker May Have Punched Through FBI Cyber Security With One Phone Call - Defense One
Cynet, BugSec Uncover SNAP, a Major Vulnerability on LG G3 Devices
James Clapper, intel chief: North Korea has restarted plutonium reactor - Washington Times
IoT Could Be Used To Spy, Admits James Clapper | TechCrunch
Arbor Networks 11th Annual Worldwide Infrastructure Security Report Finds Relentless... -- NEW DELHI, January 29, 2016 /PR Newswire India/ --
Adele holds tour warm-up in LA | KIRO-TV
UAB students learn about fighting terrorism - WBRC FOX6 News - Birmingham, AL -
USC AD Pat Haden suffers episode of light-headedness | FOX23
The Sas 2015 - Class Warfare: Considering Mitigations Against The Unknown
The Sas 2015 - The Billion Dollar Apt
The Sas 2015 - Tools Of Nsa Playset
The Sas 2015 - Using Encryption To Protect Sources And Secrets
The Sas 2015 - Digital Krav Maga: Opsec For Security Researchers
The Sas 2015 - Active Defense And The A.R.T. Of W.A.R
The Sas 2015 - Bounty Up To The Bar: How I Learned To Relax And Love Bug Bounties
The Sas 2015 - Distributors, Developers And Tools Behind Black Flag Comms
The Sas 2015 - The Challenges Of Detecting Silent Exits Of Your Data
Islamic State determined to strike U.S. this year, top intelligence officials say - Honolulu Star-Advertiser
BREXIT – Data protection: how medical researchers persuaded the European Parliament to compromise
Cass Patented BYOD Payment Solution Expands Globally -
Blackberry Priv hits Australia - PC & Tech Authority
200 BlackBerry Layoffs For Employees In Waterloo And Florida – TechMalak
Webinar Highlights Secure Enterprise Application Access | NewsFactor Network
Gartner Defines Benefits of Software-Defined Perimeter Around Enabling Business Agility in Upcoming Webinar - EIN News
NOVA: Memory Hackers | KPBS
Spartan Hackers put computer science skills to the test | The State News
Analysts Consensus For Sophos Group (LON:SOPH)
Sanders aims for big win in New Hampshire |
The Sas 2015 - Malware In The Industrial World
Identity thieves obtain 100,000 electronic filing PINs from IRS system | PCWorld
Missoula school student data breach included alumni records | The Olympian
20 Cybersecurity Terms Everyone Should Know | TechWeekEurope UK
8 Things to Look For in the 2017 IT Budget -
Spike in tourist deaths sparks ministry concern | Bangkok Post: business
Nikon releases ViewNX-i version 1.1.0a for Windows
MIS-Asia - Rethinking data protection
State orders city to provide 'around-the-clock' security for homeless shelters | POLITICO
Don't give fraudsters a hand filing a fake tax return
White House Requests $1.8 Billion to Fight Zika Virus Video - ABC News
New Potter play coming out in book form | FOX23
FBI launches website to stop online terror recruitment amid criticism | Minnesota Public Radio News
The global threats that keep the CIA up at night | PBS NewsHour
Back to cybersecurity basics - Post and Courier
Corruption Currents: Kenyan Athletes Allege Bribery - Risk & Compliance - WSJ
Missing airman has ties to East Texas - KWES NewsWest 9 / Midland, Odessa, Big Spring, TX: |
Maria Vergelis - Securelist
Fairfax: Providence Elementary Presents Progress Report
Manufacturers courted with Internet of Things cloud options
Hackers stole 101,000 taxpayers' logins/passwords from the IRS / Boing Boing
This Is How The Power Grid Can Be Hacked Through Home Air Conditioners » TechWorm
IRS reports a hacking attack - Houston Chronicle
Cisco Systems (CSCO) Charles H. Robbins on Q2 2016 Results - Earnings Call Transcript | Seeking Alpha
NBA hacking tactics becoming a growing issue
Chinese companies want to buy Opera for $1.2 billion
Chinese group bids $1.2 billion for Opera Software - MarketWatch
What 2 southern Walmarts say about crime in America | The Sun News
Our Favorite Internet-of-Things Stocks for 2016 - San Antonio Express-News
How to ensure VPN security in a BYOD environment
61% of Merchants Still Store Unencrypted Payment Card Data
Identity thieves breach IRS with stolen Social Security numbers | TheHill
Identity thieves obtain 100,000 electronic filing PINs from IRS system | Computerworld
Intel chiefs find bright spots amid serious risks to US security -
D.C. would get critical funding, budget autonomy in federal budget - Washington Times
Senate passes bill to hit North Korea with harsher sanctions
The Latest: 2 deputies wounded, suspect killed in shootout | WJAX-TV
Obama unveils $5.7 trillion election-shaping US Budget, United States News & Top Stories - The Straits Times
North Korea Sanctions Pass US Senate
Senate Passes North Korea Sanctions Legislation -
U.S. Senate Passes North Korea Sanctions Legislation - WSJ
Internet of Things Devices: Intelligence-Gathering Opportunity?
School Report Card: Frankfort CUSD 168 - WSIL-TV 3 Southern Illinois
Google strengthens online security, rolls out new features - The Economic Times
Tech Companies Looking To Eliminate Passwords |
Application and security trends changing the IT landscape in 2016 |
Hackers could crash electricity grids and cause massive blackouts using this terrifyingly simple trick - Mirror Online
AC Units Can Be Hacked To Create Power Grid Failure | Digital Trends
Hackers are trying to steal our tax refunds -- again - CNE
IRS Hack Affects 101,000 Tax Returns - Infosecurity Magazine
Black lawmakers sprint to Clinton's aid | TheHill
Vetr Inc. Upgrades Palo Alto Networks Inc (PANW) to Strong-Buy - The Vista Voice
Best US Cellular phones of 2016
Symantec warns of malware hidden in Hearthstone cheat programs | SiliconANGLE
Pro-Palestine hacktivist makes good on threat, posts data on FBI and DHS personnel - SC Magazine UK
Hellgate High data breach included records of former, deceased students | Local |
Banks Seek $20M In Atty Fees After Target Data Breach Deal - Law360
Android SMS Stealer Masquerades as Fake AliPay Security App - Infosecurity Magazine
Cisco second-quarter earnings
2017 Nissan Armada prepares to Patrol the US
Spike in tourist deaths sparks ministry concern | Bangkok Post: news
LibreOffice 5.1 released with redesigned user interface | InfoWorld
Fireglass Emerges From Stealth with a Military-Grade, Enterprise-Ready Threat Isolation Platform to... -- NEW YORK, Feb. 10, 2016 /PRNewswire/ --
Fast Data Will Revolutionize Cybersecurity in 2016
Security experts share tips on how to stay safe on the subway |
Why and How to Update Your Adobe Flash Player | TNH Online
Obama Administration Plans New High-Level Cyber Official - Network Security on CIO Today
Washington fears a return to the Cold War with Russia | The Siver Times
South Korea retaliates for North Korea's rocket test -
Top intel official confirms ISIS made, used chemical weapons | Fox News
The Odd Couple: ACLU, Tenth Amendment Center Take on Student Data Privacy
IoT and Privacy: Keeping Secrets from your Webcam - McAfee
Cass Offers Patented Solution for BYOD Payments in Europe
Vapor Services Proud to Announce the Release of Its New eFolder Product | Benzinga
Top Considerations When Building BYOD Policies | Kroll Ontrack Inc. - JDSupra
IoT heading towards serious security issues, says expert » Digital By Default News
Hexadite lands $8M from H-P and others amid string of cybersecurity investments | BetaBoston
Logi Analytics Placed as a Visionary in 2016 Gartner Magic Quadrant for BI & Analytics Platforms - EIN News
Report: Hackers Targeting ATMs Via Phone, Internet Jacks | News & Opinion |
IRS successfully thwarted hack attempt (this time) - SlashGear
Ex-FBI official: IRS is a favorite hacking target
NSA plans to merge offensive, defensive hacking operations | Nation |
NSA Reorganizes, Combines Cyberdefense and Offensive Hacking
Chinese companies are betting on boring apps to expand abroad - Quartz
Chinese companies make offer to acquire Opera Software - gHacks Tech News
Feds Investigate FBI, DHS Alleged Data Breach
Illinois couple blames McBride, Lock for data breach | Madison County Record
Startup Spotlight: Vectra Networks' Threat Detection - eSecurity Planet
Cisco beats profit estimates, adds $15 billion to buyback | Reuters
Red Lobster enjoys sales surge after mention in Beyonce song | WJAX-TV
New, improved DMA Locker ransomware patches decryption flaw - SC Magazine
Wendy's finds malware at some locations - SC Magazine
Our Favorite Internet-of-Things Stocks for 2016 -- The Motley Fool
Protecting Compliance in the Public Cloud -
Arrest made after fire service staff data breach (From South Wales Argus)
How updating your Mac's apps could allow man-in-the-middle attacks | Macworld
Obama Budget Calls for Increased Cybersecurity Funding, New High-Level Post
DNI: China continues cyber espionage – Asia Times
The Latest: FBI chief says encryption blocks investigations |
New Encryption Bill Could Stop States From Getting a Backdoor Into Your Smartphone - ABC News
Nato to draw new strategies to combat security threats - Army Technology
Landmark Cybersecurity Proposals from White House on Workforce Development and Privacy - McAfee
Securosis Blog | Securing Hadoop: Operational Security Issues
Inside the Beltway: Reckless, irresponsible: The 2017 budget reviews are in - Washington Times
Hearthstone gamers who download cheats may be cursed with malware - SC Magazine
The Phishie Awards: (Dis)Honoring the Best of the Worst Phishing Attacks
Over 100,000 E-File PINs Fraudulently Accessed In Automated Attack On IRS App
Cisco Bulks Up Switch Lineups for Emerging Workloads
15 great Valentine's Day steals and deals |
What's happening at the Yarmouth libraries in February - News - The Register - Yarmouth, MA
How Symantec's CIO used SDN, cloud to pull off Veritas split | CIO
Why SMBs should build a threat intelligence program -- no tech investment required - TechRepublic
The role of mobile services in the evolution of Io
Hacked Again: Can the IRS Protect Your Tax Info This Year? | The Fiscal Times
Hackers leak contact information of 20,000 FBI employees
Hackers hit IRS with stolen Social Security digits
Is The Cybersecurity Bubble About To Burst?
Global Substation Automation and Integration Industry -- NEW YORK, Feb. 10, 2016 /PRNewswire/ --
Palo Alto Networks Inc (PANW) Insider Nir Zuk Sells 30,000 Shares | Daily Political
Google issues Chrome update to fix Windows, Mac, and Linux bugs - SC Magazine
Google car software attains 'driver' status - SC Magazine
Criticial Fixes Issued for Windows, Java, Flash — Krebs on Security
Chinese Consortium Makes $1.2 Billion Offer for Opera Software -- Update -
Qihoo 360-Led Chinese Consortium Makes $1.2 Billion Offer for Opera Software - WSJ
Opera Gets A $1.2 Billion Buying Offer From Chinese Consortium Made Of Kunlun And Qihoo 360
IRS Says ID Thieves Used Stolen Social Security Numbers in Attack - NBC News
IRS website attack nets e-filing credentials for 101,000 taxpayers | Ars Technica
IRS suffers another data breach
Gun, drug, car deaths loom large in US longevity gap: Study | WJAX-TV
Day One 2: Journal app users unhappy with pricing and sync options | CIO
Apple News & Rumors, Feb. 10: Streaming TV, Hackable Macs |
Adwind: Malware-as-a-Service Platform That Hit More Than 400,000 Users and Organisations Globally -- LONDON, February 10, 2016 /PRNewswire/ --
Microsoft fixes 36 flaws in IE, Edge, Office, Windows, .Net Framework | InfoWorld
This IT security and ethical hacking training bundle is now 98% off - TechSpot
Five cyber-security trends to watch - SC Magazine UK
Google Expert Offers Online Security Tips
Wendy's Investigating Breach Of Data, Unusual Activity : News : Headlines & Global News
Senate to sanction North Korea in rebuke of Obama policy | TheHill
Obama seeks cybersecurity boost to replace 'ancient' tech |
Obama administration plans new high-level cyber official - News - Journal Star - Peoria, IL
How can IT Infrastructure Library (ITIL) improve information security?
Senate bill aims to derail NKorea's nuclear weapons program ::
Iranian Hacker Gained Access to Computer Database
Budget calls for new planes, but no change to end strength
AT&T; Does Not Care about Your Privacy - Schneier on Security
Cryptowall has been a cash bonanza for criminals, failure for cops - SC Magazine
European Commission : CORDIS : News and Events : Data Protection, Security and Privacy (DPSP) in the Cloud: 1st Workshop of the Project Cluster on Data Protection, Security and Privacy in the Cloud.
Gartner Defines Benefits of Software-Defined Perimeter Around Enabling Business Agility in Upcoming Webinar - Press Release - Digital Journal
Gartner Recognizes MetricStream as a Leader in 2015 Magic Quadrant for... -- PALO ALTO, Calif., Feb. 10, 2016 /PRNewswire/ --
Webinar Highlights Secure Enterprise Application Access - Contributed Content on Top Tech News
'Memory Hackers' on PBS shows limitations, possibilities of the mind - (Los Angeles, CA)
Hack Brief: Hacker Leaks the Info of Thousands of FBI and DHS Employees | WIRED
Having Trouble Hacking Government Agencies? Just Call Their Help Desks - The Libertarian Republic
US officials trivialize impact of Department of Justice hacking
New Case Suggests the FBI Shared Data from Its Mass Hacking Campaign with the UK | Motherboard
IRS hackers try to use stolen SSNs to generate E-file PINs - SC Magazine
Sanders aims for big win in New Hampshire |
Sanders aims for big win in New Hampshire |
New Hampshire primary: How the outsiders won -- and the insiders crumbled -
Hearthstone hacking can compromise your PC, say antivirus firm | PCGamesN
FDA presses medical device makers to OK good faith hacking -
VC Firm Social Capital Opens Up Its 'Magic 8-Ball' Growth And Data Tools For Any Startup To Use
Chinese antivirus cheats offer $1.2 billion to buy Opera Software | Apps and Software |
Browser maker Opera receives $1.2 billion offer from Chinese companies
Opera gets $1.2 billion buyout offer from Chinese companies – Tech2
Food and drink industry face data protection regulation headache
GDPR: A new data protection landscape for multichannel retailers |
New report says the average cost of a data breach is nearly $1 million | Trucks at Work
Cisco Releases Security Update | US-CER
Enforcing Information Policies Using a Small-Data Approach | The Legal Intelligencer
Quick Heal public offer subscribed 10.8 times - Livemint
Phony Adobe Flash Update Hosts Malware, Targets Apple Users - McAfee
Report: Pros urged to roll out IT projects before they are security-ready - SC Magazine
Bipartisan House Bill Will Seek To Prevent States From Mandating Encryption Backdoors
Apple Releases Third OS X 10.11.4 El Capitan Beta to Public Beta Testers - Mac Rumors
Bromium Announces Next-Generation Endpoint Protection Software Solution | Virtual-Strategy Magazine
5 most dangerous computer viruses of all time » TechWorm
Microsoft fixes 36 flaws in IE, Edge, Office, Windows, .NET Framework | CIO
Latest Group Tests - SC Magazine
Employees mishandle data, violate HIPAA in Washington State Medicaid breach - SC Magazine
Google is giving away 2GB data free on Drive till tomorrow: Here’s how to get it | The Indian Express
How to Make Nest's Thermostat Your Smart-Home Hub | WIRED
Government may tap into your IoT gadgets and use your smart devices to spy on you | Computerworld
Letter: Clinton’s security breach - Post and Courier
Awareness of security risks up, but more needs to be done
80% of Security Industry says Mobile Access Control Increases Vulnerability to Cyber Attacks - IFSEC Global
4 Ways To Protect America's Internet From Cyber Threats - Techaeris
Security issues plague web dating software - SC Magazine
"Cyber-Antiterror-2016" joint exercises of CIS Countries to be held in Belarus | ARMENPRESS Armenian News Agency
Proposed Nato reinforcement 'will send signal' to Russia - BBC News
PressTV-Clapper: US, Russia in Cold War spiral
Super Bowl 2016 Trailers Released; Which Teaser Is Best? 'Jason Bourne' And Other Films Teased! : Trending News : koreaportal
Going out with a bang - POLITICO
Obama's Cybersecurity Plan is Meant to Secure His Legacy | WIRED
Is the cloud more secure than the hardware for the SMB? - Infosecurity Magazine
Advancing Your Security Career - Dark Reading
When Will Passwords Finally Die? - Dark Reading
Cisco Spends $1.4 Billion on Jasper IoT Platform - Unified Communications on CIO Today
Drugs, guns more common on dark web than religious extremism
Hacking and Penetration Testing Certifications - Infosecurity Magazine
Security and the Network - Dark Reading
CorreLog, Inc., Xbridge Systems, Inc. to announce first fully integrated SIEM with automated data discovery and DLP for IBM z/OS at SHARE San Antonio, Feb. 28-Mar. 4 | Virtual-Strategy Magazine
Privacy Shield – Replacement To Safe Harbor Agreed - Data Protection - European Union
Utah anti-doxing bill would impose six-month jail term - SC Magazine
Students told: bring your mobile phone to the classroom - Installation
Vidyo Updates Video Platform for Easier, More Secure Enterprise Use
Gartner Positions Sophos as a Leader in Magic Quadrant Report for Endpoint Protection Platforms
Gartner Positions Dell SecureWorks in the “Leaders” Quadrant of the Magic Quadrant for Managed Security Services (MSS), Worldwide | Business Wire
Obama Seeks $19B for Cybersecurity Plan -
Hackers take control of a TOILET using bog-standard computer skills - Mirror Online
Twitter bug allows hackers to hijack big Twitter accounts like @God, @Vagina etc » TechWorm
La vita ai tempi di internet: monitorati anche decine di volte al giorno -
Palo Alto Networks Inc (NASDAQ:PANW) Given Consensus Recommendation of “Buy” by Brokerages - The Vista Voice
Clinton's Secret Weapon in Nevada Could Launch Her Comeback | Mother Jones
How the outsiders won -- and the insiders crumbled | Politics - WPTZ Home
How to hack Facebook!!! ; This Facebook hacking tool comes with its own risks » TechWorm
New White House Cybersecurity Plan Creates Federal CISO - Dark Reading
CSO Online's 2016 data breach blotter | CSO Online
91,000 state Medicaid clients warned of data breach | The Seattle Times
8 Issues Derailing IT Team Innovation - Infosecurity Magazine
Testimony Of CFTC Chairman Timothy G. Massad Before The U.S. House Committee On Agriculture
Simplifying Application Security: 4 Steps
Chris Wysopal - Authors & Columnists - Dark Reading
Bromium launches next generation endpoint protection
Microsoft delivers Office 2016 to subscribers on the slow train | Computerworld
Microsoft fixes 36 flaws in IE, Edge, Office, Windows, .NET | PCWorld
How high will IT salaries climb? | CIO
U.S. Intel Chief: Islamic State Produced, Deployed Chemical Weapons - Breitbart
IRS thwarts 'automated attack' against tax e-filing systems | ZDNet
New Report from NTT Com Security Highlights Critical Importance of Data Protection | Business Wire
Cyber official to be hired | News |
Great Plains Energy Incorporated Declares Dividends | Business Wire
What are the greatest security threats facing the US? -
Clements Worldwide To Host Lunch Panel with Josh Rogin of Bloomberg on Global Risks Challenging Businesses in 2016 | Benzinga
Data Breaches led 3 Million Brits to Switch Service Provider - Infosecurity Magazine
Advancements in North Korea’s nuclear weapon program a growing concern | Toronto Star
Are Industrial Control Systems the Latest Weapon in Modern Warfare? | TG Daily
Officials fear U.S. lagging in electronic war | NWADG
'We don't have the gear': How the Pentagon is struggling with electronic warfare - U.S. - Stripes
Matt Damon Says 'Jason Bourne' A 'Movie About Today' : Entertainment : Design & Trend
AlphaBay darknet phishing attack impersonates .onion domain | Netcraft
UK Government Launches New Fraud Taskforce - Infosecurity Magazine
Opinion: It's finally time to embrace Privacy by Design -
White House Wants to Revamp Cybersecurity In New $19B Plan - Defense One
Data Protection Day 2016: The Ever-Changing Landscape Of Data Protection - Data Protection - European Union
Global Cellular M2M Market Report 2016-2020 - Market is Estimated to Grow from... -- DUBLIN, Feb. 10, 2016 /PRNewswire/ --
IBM's X-Force team hacks into smart building | CSO Online
The Morning Download: Regulators Tell Google that AI Qualifies as Driver - The CIO Report - WSJ
CIO Network Members - WSJ
Jeremy Seth Davis bio and recent articles
Hackers said to rig exchange rate at Russian bank
Innovation and Industries: Cybersecurity -- The Motley Fool
Analysis: New Hampshire results keep nomination races fluid |
Sanders says N.H. win 'will echo from Wall Street to Washington'
How Tech Startup Founders Are Hacking Immigration - Bloomberg Business
Hacking gold in Hearthstone? You're probably just hacking yourself | Technology | The Guardian : Skype users, beware of new T9000 trojan
New Trojan T9000 Hacks Into Your Skype Conversations, Bypasses Even The Best Antivirus Apps : PERSONAL TECH : Tech Times
Trojan T9000 Bypasses Antivirus Suites to Spy on Skype Calls, Chats: Report | NDTV
Windows 10 updates still largely opaque | ZDNet
New bipartisan bill would prevent states from weakening encryption | ZDNet
£1.2m and a 13% drop in revenue - the cost of a data breach to UK businesses - Computer Business Review
UK firms see data breach as inevitable | Channel Pro
Soil Health Workshop announces speaker - Weekly Mailer: News
Microsoft Wants You Using Windows 10, Like It or Not - Tech Trends on CIO Today
Security Holes in Sparkle Render 'Huge' Number of Mac Apps Vulnerable: Report | NDTV
iCloak plugs in to protect privacy, but it's buggy
Windows 10 | Microsoft finally provides details for OS updates | Windows 10 content from SuperSite for Windows
Tom Reilly Talks About Helping Companies Deal With Big Data - WSJ
General Michael Hayden and Bruce Schneier Announced as Keynote Speakers at Centrify Connect: The Identity Security Conference | Business Wire
Expert's opinion: How I hacked my hospital - Securelist
Privacy and Windows 10 | Windows Experience Blog
PHOTOS: How to stay safe online – Google tips: Top 5 things you can do today to stay secure online | The Financial Express
Microsoft delivers major updates to Internet Explorer and Adobe Flash Player | Computerworld
Pressure grows to boost security of infusion pumps | Health Data Management
US intelligence: ISIS to attempt American attacks - Story
Defense budget focuses on readiness amid shrinking force | Military |
Final stage of CIS anti-cyberterrorism exercise to take place in Belarus
Obama signs two executive orders on cybersecurity
Draft Bill Aims to Grow U.S. Military Cyber Warfare Capabilities - Topic A: DefenseTopic A: Defense
Ennahar Online - Cyber-attacks classified among the main threats to the security of the USA
Two-thirds of Business Resigned to Suffering Security Breach - Infosecurity Magazine
Google Set to Ban Flash Display Ads Next Year - Infosecurity Magazine
The internet of things: how your TV, car and toys could spy on you | World news | The Guardian
Kaspersky Lab warnt vor Malware-Shop im Darknet - com! professional
Netwrix Reports Outstanding Q4 and Year-End Results
February Patch Tuesday Signals Six Critical Microsoft Bulletins - Infosecurity Magazine
A quarter of SME IT managers are women
Cybercrime Doesn't Pay As Much As You'd Think - Dark Reading
Hearthstone hit by malware, 1 in 10 teens know a cybercriminal - security roundup | The latest news from the Computer and IT Industry | PC Retail
The Internet of safer things - Tech News | The Star Online
Developer watches as hackers break into a server
PBS Doc "Memory Hackers" Shows The Future Of Memory Manipulation | Co.Create | creativity + culture + commerce
UE y EE.UU. logran acuerdo sobre transferencia de datos personales
Keith Jensen Unloaded $33,829 Worth of Fortinet Inc (NASDAQ:FTNT) Shares - FDA News Alert
Schneier on Security: Blog Entries Tagged war
10,000-Year-Old Warfare - Schneier on Security
Obama seeks cybersecurity boost to replace ‘ancient’ tech | KSN-TV
Palo Alto Networks Inc (NYSE:PANW) CTO Nir Zuk, Unloaded $3,856,610 in Stock - FDA News Alert
Georgia law giving police grand jury access may face change | KIRO-TV
1Password 6 for Mac review: Enterprise features and lots of small improvements | Macworld
The Futurist Big data, meet big brother - The Daily of the University of Washington: Opinion
How to secure Amazon Web Services like a boss | Networks Asia | Asia's Source for Enterprise Network Knowledge
Steelcon 2015 - Attacking The User To Compromise Corporate Networks With Fruitywifi - Xtr4nge
Steelcon 2015 - Wrong Side Of History - Finux
Steelcon 2015 - Reverse Engineering Android Applications - Tom Keetch
Steelcon 2015 - 0wning The Internet Of Trash: A Gentle Intro To Iot Ownage - Darren Martyn
Steelcon 2015 - Blindslides - Campbell Murray
Steelcon 2015 - Popping The Bubble - Mo Amin
Steelcon 2015 - The Matrix Ld_Preloaded - Alastair
Steelcon 2015 - Opening Speech - Robin Wood
Steelcon 2015 - Getting Started In Scada Testing - Campbell Murray
True IT Change Reconciliation Is Centerpiece of New CimTrak Version 3.1 | Benzinga
UK businesses spend £1.2 million recovering from a cybersecurity breach says new research
Two-Thirds of Business Decision Makers Expect to Suffer an Information Security Breach -... -- LONDON, February 10, 2016 /PRNewswire/ --
Breaches Infest C-Stores, Gas Stations: Study
Severe security flaw affects a shocking amount of Mac apps | TechRadar
Obama unveils $4T budget that calls for cybersecurity boost - NY Daily News
Overnight Cybersecurity: Obama budget tries to secure cyber legacy | TheHill
Malware: Understanding the enemy |
Senate to vote on hitting North Korea with tougher sanctions - US News
The Latest: FBI chief says encryption blocks investigations - Houston Chronicle
Pentagon seeks bigger budget for 2017
3 technologies that will transform warfare
Intelligence chief: North Korea restarts plutonium reactor |
Cybersecurity among top targets of President Obama's $4.1 trillion budget blueprint - LA Times
Employee Stole 'Yandex Search Engine' Source Code, Tried to Sell it for Just $29K
How these 25 year old founders from Ahmedabad are trying to make their mark in a $5.3 billion market
Automotive Industry Adopts GSMA Embedded SIM Specification to Accelerate Connected Car Market | Business Wire
Anonymous hackers harpoon Japanese websites in whaling protest | The Japan Times
Furby Just Got a Little Less Cute and a Lot Weirder | E! Online
Hackers said to rig exchange rate at Russian bank | NWADG
JP Morgan Cazenove Indicates Potential 81.61% Increase In Shares Of Sophos Group Plc
Sanders aims for big win in New Hampshire | KTVB.COM
JP Morgan Indicates Potential 81.61% Increase In Shares Of Sophos Group PLC
Hacking Defense & Iraq's Controversial Security Groups
Obama launches cyber-security 'national action plan' | The Times of Israel
Apple Health Care Announces Data Breach - KPQ
Nuns who help homeless face eviction in costly San Francisco | WJAX-TV
New England mops up as snow falls on East Coast | WJAX-TV
Judge's error could set man free without trial for murder | WJAX-TV
Killing Windows Mobile means killing Windows - so stop asking Microsoft to - WMPoweruser
Sparkle app updater exposes many Mac apps to hacking - SlashGear
Create password for personal computer - Your West Valley News: Personal Finance
What Was Your Hardest Device to Transition Into?
LANS Holdings, Inc. Increases the PCI Payment Security Requirements in Its Payment Platform
Five myths that help overcome contact centre cloud security fears - Ocular Technologies Press Office | ITWeb
Here's How Obama's Cybersecurity Plan Could Affect You | Fast Company | Business + Innovation
DNI Clapper: China continues large-scale cyber espionage against U.S. despite agreement | World Tribune Life
Spy Chief Warns That US Could Face Attacks Inspired By Terrorism In Paris
Sen. John McCain: Silicon Valley should join the war on terrorism - Tulsa World: Other Voices
Intelligence chief warns of more homegrown terror attacks |
Intelligence officials: ISIL determined to strike U.S. |
President Obama’s military budget is still one of the biggest ever.
US agencies may spy on citizens using the Internet of Things
GSMA announces Internet of Things guidelines – Tech2
EU-US Privacy Shield: Still Awaiting Certainty | The National Law Review
Gartner Says India's Market Dynamics Are Impacting Digital Business Implementation | Business Standard News
Is Your Smartwatch Safe From Hackers? « CBS Chicago
Hackers hit two more Japan websites amid whale hunting protests, Technology - THE BUSINESS TIMES
Hackers in Ireland Trying to Buy Apple Employee Logins - The Mac Observer
A Cyber Security Stock You Will Regret Not Buying -
Fortinet Incorporated (NASDAQ:FTNT) Shorted Shares Increased By 51.78% - FDA News Alert
The government just admitted it will use smart home devices for spying | Trevor Timm | Opinion | The Guardian
Majority of 2015 Healthcare Data Breaches Due to IT Hacking
Stallone put Oscars attendance in Coogler's hands | FOX23
Microsoft Wants You Using Windows 10, Like It or Not - Microsoft/Windows on Top Tech News
Apple Begins Offering Trade-In Credit for Damaged iPhones | NewsFactor Network
7 Data Security Concerns Farmers Can't Ignore |
White House unveils broad strategy for strengthening cybersecurity - FierceGovernmentI
5 tips to protect yourself online from a Google security expert -
Will You Experience The Next Data Breach? | TechWeekEurope UK
Nuclear North Korea, ISIS, cyber-espionage: Three biggest world threats in 2016
Obama proposes to ramp up spending against cyberattacks - Washington Times
Intelligence official: ISIS to attempt US attacks in 2016 -
US responses to NKorea nuke, missile tests will upset China
Senate to vote on hitting North Korea with tougher sanctions | Daily Mail Online
Gen. Michael Hayden Gives an Update on the Cyberwar - WSJ
Canadian organizations feel they can’t keep up in cyber security | Computer Dealer News
Intelligence officials: Islamic State determined to strike U.S. this year | News & Observer
2015 Trends: Multi-channel, Streaming Media and the Growth of Fraud
INSIGHT: Growing hacker threats make cybersecurity a great career choice
White House Budgets $19 Billion for New Cyber-Security Measures
Hackers Harpoon Japan Tax Agency Website in Whaling Protest - Bloomberg Business
FBI Hack: Hackers publish contact info of thousands of FBI employees | BGR
Pro-Palestinian hacker dumps data of thousands of Fed workers | The Times of Israel
Sanders aims for big win in New Hampshire |
Infoblox Acquires IID for $45M to Bolster Network Security
Analysis: New Hampshire results keep nomination races fluid
TalkTalk Data Breach Sees Customers Targeted After Engineering Visiots
Data Breach Affects 91,000 Washington State Medicaid Clients . News | OPB
Security, Fraud and Risk: Basics, Strategy and the Bigger Picture
AP PHOTOS: New Hampshire voters gather to vote for president | FOX13
The Latest: Intelligence chief warns of more terror attacks | FOX13
Second City names new film comedy school for Harold Ramis | FOX13
Microsoft Wants You Using Windows 10, Like It or Not - Applications on Top Tech News
Alpine Linux Goes All In for Docker
Data is the New Control Point | Computerworld
The White House wants to teach you about online security - MarketWatch
Feds investigate alleged breach of FBI, Homeland Security data - SFGate
Justice, Homeland Security Probe Hack of DHS, FBI Employee Data - NBC News
Racket 6.4 Improves Security and Adds Incremental Garbage Collection
North Korea Has Restarted Plutonium Reactor: US
Chinese Intellectual Property Theft Demands More Action | IP Theft
Analysis: Obama's Final Budget Lands...GOP Will Likely Punt - NBC News
AP PHOTOS: New Hampshire votes in nation's first primary | WJAX-TV
Obama to release $4 trillion-plus budget for 2017 | FOX13
U.S. intelligence officials say ISIS is determined to strike America this year | News update, news roundup | Tampa Bay Times
Obama sends Congress record $4.1T budget plan | Fox News
Obama's last budget proposal would spend $4.1 trillion
Obama budget expands use of criticized software | TheHill
Cyber training a key point in 2017 DoD budget
Starfish: Silver Spring Networks’ Bid for Smart Cities and the Internet of Things | GTM Squared | Greentech Media
C-Labs Announces New IoT Software Development Kit -- BELLEVUE, Wash., and ORLANDO, Fla., Feb. 9, 2016 /PRNewswire/ --
High-tech Valentine: do dating apps on company-issued mobile devices pose a security risk? - Cambridge Network
The Future of IoT Connectivity |
Get the Most from your Voice of Customer Data
The Internet of Things' Big Software Challenge
Take Google's security challenge to keep hackers at bay
Hackers release huge list of FBI employees | Irish Examiner
Former Israeli army chief's computer hacked in Iranian cyberattack | i24news - See beyond
Controversies - NSA to Merge Offensive and Defensive Hacking Operations, Counter to Advice of Presidential Panel - AllGov - News
Cato Cloud aims to simplify network security
iTWire - SunRice deploys Palo Alto security to support global market push
Cato Networks' Cloud Security-as-a-Service Platform Debuts
Teen cybercrime still has a seriously 'sexy' problem | TechRadar
Health privacy watchdog investigates data breach that led to alleged assault on nurse | Technology | The Guardian
Veolia in talks to install New Orleans flood prevention system
Sparkle software updater leaves 'huge' number of Mac apps open to attack
Everything you need to know about iOS' crippling 'Error 53'
Russia wants to force Apple & Google to pay more tax, apply 18% VAT to App Store purchases | 9to5Mac
February 2016 Patch Tuesday: IE Flash vulnerabilities get a bulletin
How to validate your security program: Part 4 |
How to Get 2GB of Free Google Drive Storage - How to Get 2 GB Free Google Drive Storage
9 Simple Ways To Keep Children Safe Online | TechWeekEurope UK
Addressing PCI Compliance Through Privileged Access Management: CIO White Paper
Obama administration plans new high-level cybersecurity official |
Obama administration plans new high-level cyber official | Fox News
Java-based Trojan was used to attack over 400,000 systems | CSO Online
ET Canada | Blog - WATCH: Samantha Bee Declares Late Night War On Colbert
Pentagon's $583 billion budget plan keyed to terrorism threats - Chicago Tribune
Taylor Swift leads iHeartRadio Award nominations | FOX23
Intelligence officials: IS determined to strike US this year | Boston Herald
Obama Introduces National Hacker-Defense Plan - Breitbart
DNI: China Continues Cyber Espionage
Forget Power Stations, Worry About Toasters, Cyber Experts Say - Bloomberg Business
Facebook hit by French privacy order - BBC News
The Cass Patented BYOD Payment Solution Expands Globally
Walmart Family Mobile Adds an Opt-Out 'Data Saver' |
ATX West - Icon Labs Releases First Ever Embedded Protection for Internet of Things Devices that Connect via Modbus Protocol | RoboticsTomorrow
The Internet of safer Things! | Zee News
Russian hackers jacked up curency exchange rates for 14 minutes using a malware » TechWorm
9 days: Black-hat hackers' threshold in untargeted attacks - TechRepublic
Spurs coach Gregg Popovich hates hacking, 'but I'm gonna do it' - San Antonio Spurs Blog- ESPN
Making Gartner Obsolete: Ombud Update
American Electoral - The Huffington Post
Microsoft Releases February 2016 Security Bulletin
Hacker dumps details on 29,000 FBI and DHS agents online | News |
Hacking Gladwell: Welcome To The Era Of Augmented Expertise
Hackers publish contact info of 20,000 FBI employees |
Data breach affects 91,000 Washington Medicaid clients | The Columbian
State data breach impacts 91,000 Medicaid clients
State notifies 91,000 Apple Health (Medicaid) clients of data breach | Q13 FOX News
Obama goes hard on cybersecurity, new CNAP commits funds, resources - SC Magazine
Obama Seeks Cybersecurity Boost to Replace 'Ancient' Tech - ABC News
Obama wants cybersecurity chief, $3.1B to replace old technology |
Google Releases Security Update for Chrome
Pro-Palestine hacktivist makes good on threat, posts data on FBI and DHS personnel - SC Magazine
NSA reorg could strengthen defense ops - SC Magazine
Adobe issues 32 fixes for February's Patch Tuesday - SC Magazine
Rip-off artists use Southwest Airlines in Facebook scam - SC Magazine
As Dyre Goes Quiet, Focus Turns On Other Banking Trojans
'Huge' Number of Mac Apps Open to Hijacking From Sparkle Updater Vulnerability - Mac Rumors
'Huge' number of Mac apps are vulnerable to man-in-the-middle attacks
Sparkle Updater vulnerability puts ‘huge’ number of Mac apps at risk of hijacking | 9to5Mac
Microsoft (MSFT) Improves Windows 10 Transparency with Dedicated Updates History Site
Mobile enterprise application delivery struggles to catch on
UK Surveillance Powers Bill Slammed For Privacy, Clarity And Targeting Failures | TechCrunch
Concerned by Cyber Threat, Obama Seeks Big Increase in Funding - NBC News
How to get 2GB of free Google Drive storage in two minutes or less - AOL
Sexting and cyber-crime? Welcome to the teenage internet
White House to hire its first chief information security officer | ZDNet
Microsoft released 13 security bulletins for February Patch Tuesday, 6 rated critical | Network World
Top intelligence official: ISIS to attempt U.S. attacks this year |
Intelligence officials: IS determined to strike US this year | The Charlotte Observer
North Korea restarts plutonium reactor: US intelligence chief | The Indian Express
AP News Guide: Snowy New Hampshire has its say in 2016 race | WFTV
Intelligence officials: IS determined to strike U.S. this year
Samantha Bee declares late-night war on Stephen Colbert |
Senior U.S. intelligence officials say a small but determined group of violent extremists will try to overcome the logistical challenges of mounting a strike on American soil
Matt Damon says Jason Bourne "goes deeper than Ultimatum" | GamesRadar
Report: Iran hacked former IDF chief's computer - Middle East - Jerusalem Post
Darknet drug markets are making drug-taking safer | The Mancunion
The 2016 National Threat Assessment - Schneier on Security
Microsoft's February Patch Tuesday: 13 bulletins addressing 36 vulnerabilities - SC Magazine
New White House Cybersecurity Plan Creates Federal CISO
Should the government set consumer data protection rules?
Technavio Announces Top Three Emerging Trends Impacting the Global Mobile Computer Market | Business Wire
Security and Standardization Strategies Needed to Maximize $1.3 Billion in Federal Mobility... -- HERNDON, Va., Feb. 9, 2016 /PRNewswire-USNewswire/ --
Prysm Moves Into Enterprise Collaboration Space
3D Printing Brings New Opportunities and New Challenges to the Oil & Gas Industry |
Hacker Releases Data on 10K DHS Workers, Says FBI Is Next - Customer Data on Top Tech News
Hacker Releases Data on 10K DHS Workers, Says FBI Is Next - Network Security on CIO Today
Hackers Release Contact Information for More Than 20,000 FBI Employees |
Apple Employees: Hackers Have Offered Us $23,000 For Our Login Info | Fast Company | Business + Innovation
Apple employee login: Hackers paying $23,000 for access | BGR
Every version of Windows hit by 'critical' security vulnerability | ZDNet
Cryptzone Named SC Magazine 2016 Trust Awards, Best NAC Solution, Finalist - Press Release Rocket
Pulse Secure Eliminates Security Silos for the Next Generation of Workers, Applications, Networks and Things - Press Release - Digital Journal
Barnabas Health moves to one vendor to standardize firewalls | Health Data Management
Wendy's data breach probe draws Orlando lawsuit - Orlando Sentinel
After 15 years, cleanup plan approved for contaminated town | FOX25
Recent Broker Updates On Zix Corporation (NASDAQ:ZIXI)
Cybersecurity Investments Reach All-Time High
Draft Investigatory Powers Bill draws fire from Parliamentary committee - SC Magazine
AlienSpy returns as cross-platform backdoor - SC Magazine UK
Fake Adobe Flash Player Update 'Officially Certified By Apple' Infects Mac OS X Devices with Malware |
Microsoft will stop hiding what's inside Windows 10 updates | The Verge
iOS 9 review - iOS could get VR by 2018 | IT PRO
Q&A;: Managing data, security at the server | Plant Engineering
Want a safer Internet? Here's how to start - CBS News
How to convince the CFO of the budgetary security need | CSO Online
Why Safer Internet Day could teach businesses a thing or two | IT PRO
Dell Makes the Most Secure PCs in the Industry Even More Secure - Systems - Press Release -
Virus found on Troy school computer server
Louisville International Airport resumes normal operations | Local News - WLKY Home
Security checkpoints at Louisville airport reopen after suspicio - WDRB 41 Louisville News
Obama Debuts $19Bn Cybersecurity National Action Plan - Infosecurity Magazine
Fast Flux Bot Nets and Fluxer - Part 1 - SC Magazine
Corcow Trojan manipulates currency rates - SC Magazine
Microsoft Security Bulletins For February 2016 - gHacks Tech News
Poseidon Group Carries Out Global Cyber Espionage by Land, Air and Sea - Infosecurity Magazine
Medical Device, Health Care Security Continues to Ail | Threatpost | The first stop for security news
Vitaly Kamluk on the Adwind RAT | Threatpost | The first stop for security news
Adobe Releases Security Updates | US-CER
U.S. intelligence chief warns of 'homegrown' security threat | Reuters
U.S. Director of National Intelligence James Clapper speaks on North Korean nuclear threat, ISIS, homegrown terrorsim, cyber threats - CBS News
Twitter says it has shut down over 125k accounts linked to ISIS | Daily Mail Online
DepSecDef Work Details 2017 Budget: Offset Just Beginning EXCLUSIVE « Breaking Defense - Defense industry news, analysis and commentary
Emily Thornberry defends comparing Trident to Spitfires after fiery clash with Labour MPs - Mirror Online
Obama reaches for relevance with $4.1 trillion 2017 budget plan | Centre Daily Times
Obama unveils national cybersecurity action plan
US intelligence chief: we might use the internet of things to spy on you | Technology | The Guardian
Mass EK-as-a-Service Campaign Compromises 30K+ Websites - Infosecurity Magazine
NORML: We Have No Problem Taking Money from Dark Web Drug Dealers | Motherboard
Microsoft Adds Mobile Email Protection for Exchange - Infosecurity Magazine
Article 29 WP Response To "Privacy Shield" - Data Protection - European Union
Facebook Has Three Months To Comply With Data Protection Laws, France Warns
Obama’s Newest Executive Orders Establish ‘Cyber Czar’ and New Privacy Board |
Kaspersky confirms return of Carbanak and two more banking APT groups - SC Magazine
AlienSpy returns as cross-platform backdoor - SC Magazine
Kunal Anand - Authors & Columnists - Dark Reading
How (And Why) AppSec Is Important To Your Business - Dark Reading
VMware Broadens Its Hybrid-Cloud Virtual Desktop Horizons - Datamation
VMware gives enterprises a BYOD boost with three new tools | PCWorld
Blurred lines, teenage hackers, and BYOD: Why we need an Internet Safety Day - Computer Business Review
Hacker Releases Data on 10K DHS Workers, Says FBI Is Next | NewsFactor Network
GSMA releases Intenet of Things industry security guidelines | Latest News & Updates at Daily News & Analysis
Hackers leak contact details of 20,000 FBI staff
Russian Hackers Moved Ruble-Dollar Rate at Regional Bank: Cyber-Security Firm
Vigilante Hackers Fight Lizard Squad For Control Of 150,000 Home Routers
Vulnerabilities in Trane thermostats heat up IoT safety concerns - SC Magazine
Furby Hacking Project Invites Terrifying Modifications to Create "Social Robots"
Sterling Computers Chosen for Network Connectivity Project
Harrison High School Officials Investigating Hacking Of Teacher's Website, E-mail | WBAA
Cybersecurity Smackdown: What Side Are You On? - Dark Reading
Here's How To Protect Against A Ransomware Attack - Dark Reading
Here Are Four Sundance Films the NRA Really Doesn't Want You to See | Mother Jones
Dealing With Careless Users as a CIO | SmartData Collective
US senator calls for investigation of cruise ship in storm | FOX23
CloudMagic is a great cross-platform email app [Review]
Apple could face class-action lawsuit over 'Error 53' | Cult of Mac
Lawfirm Ready to File iPhone Error 53 Lawsuit - The Mac Observer
More Office 365 subscribers are starting to get Office 2016 | ZDNet
Java-based Trojan was used to attack over 400,000 systems | PCWorld
Andy Rubin Unleashed Android on the World. Now Watch Him Do the Same With AI | WIRED
TARGIT Makes Big Data Analytics More Approachable with New Version of its Data Discovery Module | Business Wire
How to Hack the Power Grid Through Home Air Conditioners | WIRED
Bat Blue Releases Book on Unified Cloud Security -- NEW YORK, Feb. 9, 2016 /PRNewswire/ --
Comparing the top vulnerability management tools
Chinese Cyberspies Pivot To Russia In Wake Of Obama-Xi Pact
In cybersecurity bid, Obama wants to retire outdated government systems -
What to See at MWC - McAfee
Former DNI and NSA chief Mike McConnell joins Securonix board - SC Magazine
Florida man charged with having three wives | WJAX-TV
Cyber a top national security threat to U.S.: intelligence director | Reuters
Africanews | Brazzaville: INTERPOL African conference seeks to avert evolving continental crime
US lags behind Russia, China in electronic warfare capabilities
Half of cyber attacks on Canadian firms succeed, survey suggests | IT World Canada News
Matt Damon Talks "Dark And Tortured" 'Jason Bourne,' Says | The Playlist
North Korea Has Resumed Weapons-Grade Nuke Work, Intel Chief Says - NBC News
GSMA releases Internet of Things industry security guidelines
Risks of Tor use inside a network - how to block Tor in business network | Tutorial | Computerworld UK
Zero Day - Page 322 | ZDNet
Obama seeks hike in funding as cybersecurity takes top priority | ZDNet
US DOJ, DHS Yet To Confirm Breach, Leak - Dark Reading
Facebook's Failure in India - The Atlantic
Is the dark web safe? | Alphr
Data Protection Day—Data Processors And The GDPR - Data Protection - European Union
Data protection unlocked - Understanding the EU-US Privacy Shield - Lexology
Cato Networks Launches Cato Cloud to Make Network Security Simple Again
Cellular M2M Market by Application (Video Surveillance, Fleet Management, Asset Tracking, Theft Recovery and POS) 2016 - Global Forecasts to 2020 - Research and Markets | Business Wire
Will CyberArk Software (CYBR) Surprise in Q4 Earnings? - February 9, 2016 -
Gartner BI Magic Quadrant: Inflection Point Has Arrived - InformationWeek
New Safe Harbor Pact Offers Temporary Port in Storm
SentinelOne Named as a Visionary in Gartner 2016 Magic Quadrant for Endpoint Protection Platforms | Business Wire
Should you fight back against hackers? | IT PRO
Hackers trying to bribe Apple workers into handing over login information, report says
Hackers reportedly attempting to bribe Apple employees for login details, offering $23k | 9to5Mac
Skimmers Hijack ATM Network Cables — Krebs on Security
Online 'Batman' Takes On Dridex Banking Trojan Operators