Boston Technology Jobs
Family: Doctors don't detect Ebola in nurse's body | The Miami Herald
Backoff Malware Is Spreading in Retail Systems - Network Security on Top Tech News
The 'Backoff' malware used in retail data breaches is spreading | PCWorld
Now Everyone Wants to Sell You a Magical Anonymity Router. Choose Wisely | WIRED
RSA Conference Communication Preference Center
FCC: Phone companies posted private info online
Humanitarian crises demand better response|Op-Ed Contributors|
How Apple Pay Could Rid Holiday Shopping Security Concerns
Target Offers Free Shipping on All Holiday Items - DailyFinance
Eight Ways Cloud Is Making Supply Chains Very Smart - Forbes
Protecting the vault: First Financial Bank's go-to solution - SC Magazine
Estonian hacker that stole $9.4M receives 11-year prison sentence
Hacker gets prison for cyberattack stealing $9.4M •
With a $10 million fine, the FCC is leaping into data security for the first time - The Washington Post
Apple mum as Mac owners tussle with Yosemite over Wi-Fi problems - Good Gear Guide Australia
The FCC as data security cop: $10 million fine for carriers’ security breaches | Network World
Family: Doctors don't detect Ebola in nurse's body | The Kansas City Star
FCC announces $10 million fine for two telecoms following Scripps investigation - DecodeDC Story
Local students to participate in cybersecurity competition this weekend - Post and Courier
Malware Threat Detection and Malware Block Effectiveness – Reviews | McAfee
Targeted Attack Protection via Network Topology Alteration | Security Intelligence Blog | Trend Micro
Grrcon 2014 - $#!T My Industry Says. . .
Child restraints save lives | Scoop News
Cloud Data Security Concerns Raised After Reported iCloud Attack In China : All Tech Considered : NPR
WP Engine adds disaster recovery to keep your blog alive during natural disasters & zombie uprisings | VentureBeat | Cloud | by Jordan Novet
Securing Your Online Reputation - YouTube
A black hat hacker that changed his colour - The Globe and Mail
7 Myths You Probably Believe About Social Security - Forbes
Cheapo telcos fined for their cheapo security: Financial records on 305,000 people spilled • The Register
Attacks On Patched Sandworm Flaw Force Microsoft To Issue Fix It
Mobile Health Information: Secure or a Joke? – Blog Post – RSA Conference
How Verizon’s Advertising Header Works | Web Policy
Why hackers are targeting big-name retail chains -
Hackers Are Using Microsoft PowerPoint To Attack Computers | Business Insider India
Blogs |
Democrats haven't given up on beating Mitch McConnell yet, buying new ads in Kentucky - The Week
Amber Vinson’s family says she’s Ebola-free as hazmat crews remove 53 barrels from her apartment - NY Daily News
VC cyber security funding tops £850 million - SC Magazine UK
Cyber security needed in all aspects of life - Tahlequah Daily Press: News
Cyber Security Business Doubles for London Insurer - The CIO Report - WSJ
3 Enterprise Security Tenets To Take Personally - InformationWeek
Security Conferences - Security Events - Trend Micro USA - Trend Micro USA
Well Workouts
The DEA Once Turned A 14-Year-Old Into A Drug Kingpin. Welcome To The War On Drugs
McAfee exec pitches NYU-Poly women on cybersecurity careers - Technically Brooklyn
Bulgarian national sentenced 30 months for role in ID theft ring - SC Magazine
Expect more data breaches, experts say - MarketWatch
Grrcon 2014 - Memory Forensics With Hyper-V Virtual Machines
Pakistan hackers deface Indian websites - The Hindu
Are you in the dark about mobile security?
Tripwire Announces Expanded Support for Federal Information Systems and Organizations - The State of Security
Proofpoint acquires Nexgate for $35 million - SC Magazine
Sophisticated phishing attacks launched against Outlook Web App users | PCWorld
Exclusive: Google CEO Larry Page Reorgs Staff, Anoints Sundar Pichai as New Product Czar | Re/code
Credit card breaches: How will they affect 2014’s holiday spending? - San Diego Identity Theft |
Techday – Symantec aims to make businesses more resilient against attacks
Of Google, governments and authentication | ZDNet
Porsche: The Hedge Fund that Also Made Cars
Apple mum as Mac owners tussle with Yosemite over Wi-Fi problems - PC World New Zealand
iCloud phishing attack: How to detect a fraudulent Apple site | BGR
Amplification DDoS attacks most popular, according to Symantec - SC Magazine
TOR Virtual Network Tunneling Tool ≈ Packet Storm
UK Foreign Minister: Bulk Data Collection Is Not Mass Surveillance | News | teleSUR
Data Breaches Are Making People Hate Your Brand | Co.Exist | ideas + impact
Is the mobile device the new company car? |
FBI — International Hacker Sentenced
The Battle for Palestine — Part Three | Consortiumnews
Phone-hacking: The Piers Morgan connection - Mirror admits some stories during Morgan's tenure may have been obtained by illegal means - Home News - UK - The Independent
Apple's iPad, Mac, OS X Yosemite event: Here's what to expect | ZDNet
ISSA tackles workforce gap with career lifecycle program - SC Magazine
Mandriva Linux Security Advisory 2014-206 ≈ Packet Storm
Mandriva Linux Security Advisory 2014-207 ≈ Packet Storm
Mandriva Linux Security Advisory 2014-208 ≈ Packet Storm
Ebola Hack: Trojan Malware Attached To Fake World Health Organization Emails
How To Become A CISO, Part 1
Debian Security Advisory 3055-1 ≈ Packet Storm
Slackware Security Advisory - pidgin Updates ≈ Packet Storm
Slackware Security Advisory - glibc Updates ≈ Packet Storm
The Fourier Transform, explained in one sentence
Air Force welcomes hackers to Dayton |
Apple iOS 8.1 review | Expert Reviews
Hackers face off this weekend to solve Air Force's cyber challenges | C4ISR & Networks |
Apple mum as Mac owners tussle with Yosemite over Wi-Fi problems | PCWorld
Franchises to get assistance on cybersecurity strategy - SC Magazine
NICE Conference & Expo to be held in Columbia, Md. - SC Magazine
Black Hat Usa 2014 - Virtualization: More Shadow Walker The Progression Of Tlb Splitting On X86
Wireless price war's good for consumers, but challenges carriers | Computerworld
This Week In Credit Card News: Data Breach At Staples, Early Glitches With Apple Pay - Forbes
Mobile app exploits Chilean public transit payment system - FierceMobileGovernment
The Internet of Things Will Change Your Company, Not Just Your Products - Joey Fitts - Harvard Business Review
Multivessel PCI outperformed culprit-vessel PCI in STEMI | Cardiology
Model 1012 8-channel mini PCI-express frame grabber
Court shutters NY co. selling security software with "no value" - SC Magazine
Think Before you “Share” to Prevent Identity Theft -
MIT computer scientists can predict the price of Bitcoin | MIT News
Chaos in the Video Content Management Market
Kaspersky Lab Partners with LifeJourney to Support Future Generations of Malware Experts | Kaspersky Lab US
EMCTV - Enterprise Technology Video Portal - EMCTV
Business Pulse Poll: CEO Faceoff Finals: It's down to Musk and Chambers - Silicon Valley Business Journal
Hackers breach the Warsaw Stock Exchange | TheHill
See the Windows 10 Start menu in action - CNE
Infographic: Is your business ready for a cyber data breach? | PropertyCasualty360
Physical keys give Google services added security
BDNA’s Walker White: Big Data Security, Virtualization as Priorities for Gov’t I
WHITE PAPER ▶ Legal, Security, and IT Tackle BYOD
Hackers Are Exploiting Microsoft PowerPoint to Hijack Computers
New home sales up 0.2% - NBC News
Cyber insurance is becoming increasingly necessary > Live Insurance News
Celebrity hacking scandal: Russian behind website posting the pictures begins removing them, but was he the hacker? : PERSONAL TECH : Tech Times
TorrentLocker Ransomware Reaches Italy and Brazil, Affects Thousands - Softpedia
Holiday hacking fears |
Green Party will help students in financial distress | Scoop News
Ponemon Institute Finds Data Breaches Are Increasing - Are You Ready? | The National Law Review
Facebook, Yahoo prevent use of recycled email addresses to hijack accounts | Computerworld
Juniper Networks sur Twitter : "How to trap a hacker. #NetworkLingo"
Kentucky Initiative Pushes Computer Science Awareness
McAfee Inc. sur Twitter : "Free yourself from malware by steering clear of "free" downloads:"
Russian/Chinese cyber-security pact raises concerns - SC Magazine UK
Using 8 Backdoor Techniques, Attackers Steal Company Data - Security News - Trend Micro USA
SANS Penetration Testing | Stuck on the #SANSBrochureChallenge? It's Ending Soon! Read inside for hints! | SANS Institute
SANS 2015 Big Data Security Survey
Mobile Security Blog: Why Samsung Knox isn't really a Fort Knox
A Print Magazine for Hackers - The New Yorker
Making the best of a hacking situation | Columbia Business Times
Protecting DNS: Securing Your Internet Address Book - SANS Institute
Black Hat Usa 2014 - Virtualization: Openstack Cloud At Yahoo Scale How To Avoid Disaster
Why the Mac momentum may just be starting | ZDNet
Progress buys Telerik for $262.5m - Computer Business Review
PoS Malware Infections Soar Ahead of Holiday Season - NBC News
'Fantasia: Music Evolved' and its origins in the Kinect-hacking scene
Hackers exploit Ebola scare to spread malware - Computer Business Review
Progress Software Announces Intent to Acquire Telerik - MarketWatch
Trying to Avoid Backoff Malware? Good Luck | News & Opinion |
Tim Cook wants to bring Apple Pay to China | TUAW: Apple news, reviews and how-tos since 2004
Progress Software Buys Telerik for $262.5 Million - Cloud Computing on CIO Today
GIGABYTE Releases GA-H81M-Gaming 3 Motherboard - Industry News - Overclockers Club
Bugtraq: [ MDVSA-2014:209 ] java-1.7.0-openjdk
Alex Fullick Pens Releases New Book on Testing Disaster Recovery and Business Continuity Plans - BWWBooksWorld
SC Congress Events - SC Congress Chicago
AWS Expands To Frankfurt -
Snowden filmmaker Laura Poitras: ‘Facebook is a gift to intelligence agencies’ - The Washington Post
Local | Fort Mill Times
Windows 10's ID Management and Security Controls -- Microsoft Certified Professional Magazine Online
Hackers who threaten national security could face life sentences | Naked Security
Annapolis County says hackers holding computer files for ransom - Regional - The Hants Journal
More hackers targeting mobile phones to get bank info: survey - The China Post
SS&C Technologies Finalizes PCI-DSS and EI3PA Security Assessments - MarketWatch
5 Reasons Why Information Security Departments Are Under-Resourced | Technology | Business Review Australia
Proofpoint acquires Nextgate for $35 million - SC Magazine
Bugtraq: [ MDVSA-2014:207 ] ejabberd
Bugtraq: [ MDVSA-2014:208 ] phpmyadmin
Estonia man gets 11 years in prison for credit card hacking |
Estonian hacker gets 11 years for theft in Atlanta - Atlanta Business Chronicle
Windows Office Zero-day and CryptoWall 2.0 security issues explained | BGR
Apple Mac OS criticised for sending search results to third parties - SC Magazine UK
Apple CEO says had 'very open' privacy talks in China: Xinhua| Reuters
Google extends its two-factor authentication support with physical USB keys - FierceCIO
10 key takeaways from Apple’s expectation-crushing earnings call | Cult of Mac
Protect Google Account With REAL Physical Key
New World Notes: New World Slurl: Dune in Second Life
Risk Assessments Critical for Budget Planning – Blog Post – RSA Conference
Clicktools - Sourcefire Inc.
XSS - Modifying Form fields: JS for Pentesters task 4 write up - SecureTheLock
FOCUS 14 - Breakout Sessions
Malware on Breyer Horses website for about 18 months, payment card data at risk - SC Magazine
Ebola Outbreak Used To Trick Users Into Downloading Malware ≈ Packet Storm
Moscow, Beijing Poised To Sign Deal On Joint Cyber Security Ops ≈ Packet Storm
Cisco Patches Three Year Old Remote Code Execution Hole ≈ Packet Storm
Juniper Networks sur Twitter : "Address network #security by identifying what your biggest threats are. #NCSAM"
Microsoft Issues Advice on SSL 3.0 Security Vulnerability --
This POODLE bites - ITWeb Africa
Online personal data theft soars - UTV Live News
iMessage SPAM floods US mobile networks • The Register
Bugtraq: [KIS-2014-12] TestLink <= 1.9.12 (database.class.php) Path Disclosure Weakness
Bugtraq: [slackware-security] pidgin (SSA:2014-296-02)
Bugtraq: [slackware-security] glibc (SSA:2014-296-01)
Photo Gallery: Meet the Chiefs: John Murdock, Kaspersky Lab North America | The VAR Guy
The New Security Features of iOS 8 and Android Lollipop - Security News - Trend Micro USA
Research and Markets: Global Antivirus Software Package Market 2014-2018: Key Vendors are Avast, AVG, ESET, Microsoft & Symantec | Business Wire
How to partition your drive before installing Windows 10 - CNE
Campus IT bracing for 'Internet of Things' demands | Education Dive
Computer hacker sentenced - News - The Shawnee News-Star - Shawnee, OK
PoS malware infections soar ahead of holiday season
How to Tell if Your Broker Protects You Against Identity Theft - 1
Apple CEO says had 'very open' privacy talks in China: Xinhua - News - WTAQ News Talk 97.5FM and 1360AM
Oregon Employment Department Notifies 851,322 People of Data Breach - eSecurity Planet
Virtual reality gains a small foothold in the enterprise | Network World
Hot Sectors: Employers desperately seeking cyber security skills
UD employees, faculty must collaborate to protect private, high-risk, sensitive information.
Information Security: Cyber Security Awareness ... | SecurityStreet
Pawn Storm Espionage Attacks Use Decoys, Deliver SEDNIT - Security News - Trend Micro USA
FTDI driver kills fake FTDI FT232?? - Page 38
Data Breach Bulletin: Staples, NeedMyTranscript, iCloud, Sourcebooks - Forbes
The GOP Has a New Darling, But He Lives in Canada - The Daily Beast
First Read's Morning Clips - NBC News
Black Hat Usa 2014 - Virtualization: Poacher Turned Gamekeeper: Lessons Learned From Eight Years Of Breaking Hypervisors
Beware Ebola Spam Pushing Drugs, Information
How Facebook prevents account hijacking when old email addresses are recycled
Bugtraq: APPLE-SA-2014-10-22-1 QuickTime 7.7.6
Bugtraq: [ MDVSA-2014:202 ] php
Mobility: What We Can Learn From Millennials | CIO
Two burglaries every hour in Austria - The Local
Apple Issues Security Warning for iCloud - CIO Issues on CIO Today
Better passwords could have prevented Jennifer Lawrence hacking
Microsoft discloses severe Office zero-day flaw, publishes quick fix | PCWorld
Malware strain attacks ATMs overseas - ABA Banking Journal
How Twitter will power the Internet of Things - Telegraph sur Twitter : "An insightful & balanced viewpoint on #Data #Security in the #Cloud from @carlLsecurity Snr Manager @websense"
Be Ready for a Breach with Intelligent Response - SANS Institute
Identity Fraud & Data Theft – Don’t be that Guy
SANS 2015 Cyberthreat Intelligence Survey
College Student Gets 2 Years For Hacking Navy, Others - Law360
Will your Mac run OS X 10.10 Yosemite? | ZDNet
How to set up SMS sharing with iOS 8, OS X 10.10 Yosemite - CNE
Twitter's Digits Still Bound by a Single Point-of-Failure
The 7 scariest cyber security breaches of 2014 | Opinion | Softonic
SS&C Technologies Finalizes PCI-DSS and EI3PA Security Assessments Nasdaq:SSNC
Media Release from Closing the Gap on Health and Housing | Scoop News
Zero Day Weekly: Samsung Knox controversy, Twitter Digits, bricked FTDI chips | ZDNet
Vietnam student receives American information security certificate
Has the “Sandworm” zero-day exploit burrowed back to the surface? | Naked Security
Cloud Security: Shared Responsibility in Action -
Airbnb valued at $13B ahead of staff stock sale
Poll: 'Consistent liberals' most likely to unfriend you over politics - The Week
Ello converts to a PBC to remain ad free | ZDNet
McAfee Debuts New Firewall for Gov’t, Commercial Clients; Pat Calhoun Comments | ExecutiveBiz
Old Adobe Vulnerability Used in Dyreza Attack, Targets Bitcoin Sites
Cybercriminals Are Using Cloud Storage to Hoard Stolen Files
Microsoft Windows 10 is serious about security |
Holiday Shoppers May Be Wary of Compromised Retailers | KTIC Radio
Pathway to a Cloud-Ready Wide-Area Network (WAN)
The 'Backoff' malware linked to data breaches is spreading | CSO Online
Cyberespionage group launches sophisticated phishing attacks against Outlook Web App users | CSO Online
Disaster as CryptoWall encrypts US firm's entire server installation | CSO Online
Amazon Web Services Cloud Computing Platform Now Available to Customers from Datacenters in Germany - MarketWatch
Jailbreak iOS 8 And iOS 8.1 Untethered Using 'Pangu' Jailbreak Tool
Forget the Pumpkin Spice Latte: Starbucks is rolling out a Chestnut Praline Latte next month - The Week
BBC News - Hertfordshire Police probe anti-social behaviour data leak
D.C.-area security executives tell you how to secure your business - Washington Business Journal
How-to guide to protecting yourself from electronic spying
Vendor Q&A; Series: John Murdock, Kaspersky Lab - from
Keep Your Business’s Data Safe in the Cloud -
Black Hat Usa 2014 - Windows: Abusing Microsoft Kerberos Sorry You Guys Don't Get It
Herts police admits data breach which published confidential details of 61 people on government website | Bishops Stortford Herts & Essex Observer
Mass Surveillance and Resistance | Scoop News
Hacking a Big Danger for Small Businesses | NewsFactor Business Report
Amber Vinson's Family Says Ebola No Longer Detectable in Her Body
Hackers Are Using Microsoft PowerPoint To Attack Computers - Business Insider
Microsoft forced to issue quick fix for PowerPoint flaw | IT PRO
Chinese Hackers May Have Attacked Apple's iCloud
How to decide if it's time to upgrade to OS X Yosemite | ZDNet
Kaspersky virtual tour
Cyber Security Awareness Month: Engage Your Users – Blog Post – RSA Conference
How to kill a troll | Naked Security
Data-hacking scares us - MarketWatch
Remaining relevant amidst crisis
We chat to CloudFlare about its 'EVERYBODY GETS SSL' venture • The Register
Twitter invites us to say goodbye to passwords, use Digits instead | Naked Security
Some Bank of America customers double-charged with Apple Pay | PCWorld
A Cyberwar Quietly Rages Over Hong Kong
Commissioner calls for probe into police data breach as names and address are leaked online - Hemel Gazette
Google busts its 'iOS 7 move' with Android Lollipop | InfoWorld
Names and addresses of victims and culprits of anti-social behaviour are published online in Herts Police data leak - News - Welwyn Hatfield Times
Herts Police Admit Confidential Data Breach - Heart Four Counties News
Chipmaker deliberately cripples user devices with driver update | CSO Online
Google Launches User-Friendly 'Inbox' App, Alternative To Gmail
Heartland Files Motion to Dismiss Data Breach Litigation
Art a hack: is hacking yesterday’s news?| Culture professionals network | The Guardian
Cisco patches three-year-old Metasploit-able hole • The Register
How to Hack Your Own Network and Beef Up Its Security with Kali Linux | Life Hacker India
New Rotorua TV Commercials to Attract Aucklanders | Scoop News
Council wins $3M health project to benefit local families | Scoop News
Do we really need strong passwords? | Naked Security
ARM speeds data flow in the cloud with new, zippy interconnects | Computerworld
Speak Up Program Highlights – Video – RSA Conference
Apple issues a warning for iCloud users amid reports of hacking effort in China - B.C. - Times Colonist
What’s Worse Than Ebola in West Africa? Almost Everything - The Daily Beast
Will Hackers Change Your Holiday Shopping Habits?
Ohio family: Nurse Amber Vinson appears to be Ebola-free - CBS News
Ebola-themed emails deliver malware, exploit Sandworm vulnerability
Disaster recovery updates - Mission Network News
Soundsquatting Unraveled: Homophone-based Domain Squatting | Security Intelligence Blog | Trend Micro
Black Hat Usa 2014 - Windows: Computrace Backdoor Revisited
Bring Your Own Device: Vor allem junge Arbeitnehmer gefährden IT-Sicherheit | heise online
Goodfellas actor files $250 million lawsuit against The Simpsons for allegedly stealing his likeness - The Week
U.S. government probes medical devices for possible cyber flaws| Reuters
Disabling AVG when Windows cannot start | AVG
Family: Amber Vinson free of Ebola virus
InvestmentNews : Login
ISSA launches professional development framework
Open source NAC solution PacketFence 4.5.0 released
40% of enterprise employees use personal devices for work
Google absorbs Oxford Uni boffins in artificial intelligence boost quest • The Register
EPCOR goes to video in bid to curtail cost of upgrading Sun City infrastructure - Your West Valley News: Suncity
Bank of America to refund Apple Pay customers charged twice  - NY Daily News
'Citizenfour' Follows The Snowden Story Without (Much) Grandstanding : NPR
Homeland Security Investigating Medical Device Cybersecurity - iHealthBeat
Websense Bypasses Low-Value Partners To Focus On Elite Integrators - Page: 1 | CRN
“Good security is good marriage” | Symantec Connect
Friday Poll: How do you like Apple Pay so far? - CNE
Research and Markets: Global Antivirus Software Package Market 2014-2018: Key Vendors are Avast, AVG, ESET, Microsoft & Symantec | Virtual-Strategy Magazine
McAfee Delivers New Product Portfolio for Small and Medium-Sized Businesses - MarketWatch
Snowden documentary director touts encryption
Protect yourself from cyber hackers, modern day pirates
In the Wake of Shellshock, Mac Users Are Left Waiting for a Patch
How to combat cyber attacks using speed and sophistication
Home Depot Offering Credit Protection Following Security Breach: Here's How To Get It - Hartford Courant
McAfee Delivers New Product Portfolio for Small and Medium-Sized Businesses - Finances
Android Security App: How to keep data safe on Android | BGR
Apple Pay Partners With American Express, Visa Card Networks - Businessweek
How to Get Your Nobel Prize Medal Past Airport Security
Safe from Shellshock: How to protect your home computer from the Bash shell bug | PCWorld
How to Meet Energy Industry Mobile Security Requirements with Samsung KNOX™: Networkworld White Paper
How to measure the success of your security program - The Business Journals
Social Security tax torpedo: How to blunt it before you turn 71 |
SIEMs like a good idea: How to manage security in real time • The Register
Social Security Eligibility: How to Qualify for Each Benefit
Social Security Q&A;: How to Begin Steps to Retirement | Valley News
Nurse Who Contracted Ebola Virus-Free, Mom Says - ABC News
How Late-Life Marriage Can Hurt Your Retirement Security - 1
Cloud Data Security: How To Strategically Analyze Risk | CIO
European IS fighters: plans to avoid threats to EU’s internal security debated by MEPs
Social Security Q&A;: How to protect against identity theft | News OK
Government regulation on cloud security may spur SaaS use in health care | PCWorld
How to become a programmer, or the art of Googling well | okepi
Techday – Why enterprises must make sense of cyber security
Hackers threaten federal judge in Silk Road founder case | New York Post
Information Security Manager contract – Contract – North West England |
No Page Found - Khaleej Times
There's a lot more to backup than you thought • The Register
Bank Settles Data Breach Case with Conn., Other States | Connecticut Law Tribune
Asylum seekers win appeal over immigration department data breach | Australia news |
Demand for iOS devices helps drive enterprise mobility strategy - CIO
La démocratie canadienne pourrait devenir une illusion | Le Devoir
Bill to protect consumers against data breaches advances
Local Man Headed to Prison for Cyber Crimes | WSILTV | Local News
Bay Area Security Firm Hires ‘White Hat Hackers’ To Find Vulnerabilities In Digital Systems « CBS San Francisco
A private geo-cloud for the rest of us | ZDNet
Protect Data at the Source - Preventing Data Breaches | Virtual-Strategy Magazine
Hacker group leader gets 24 months in federal prison for attacking US Navy, 50 other institutions | Network World
Yahoo! Timestamps! Now! Block! Facebook! Email! Snoops! • The Register
ADL alert: Uptick in online hackers - Heritage Florida Jewish News
Apple Pay's next move: phone-to-phone payments? | Computerworld
U.S. Futures Slip on Ebola Report as Yen, Treasuries Rise - Bloomberg
The Evolution of Webinject
Powerpoint Vulnerability (CVE-2014-4114) used in Malicious Spam - SpiderLabs Anterior
Best Private Browsing Tools
Combatting Cyber Attacks Through Advanced Analytics & Intelligence – Video – RSA Conference
Calories in, calories out | Possibly Wrong
Honoring Shon Harris, a Leader of Information Security - The State of Security
How Agora Secured Their Infrastructure and Gained Visibility - The State of Security
Keeping Your Business Safe Online - The State of Security
EPIC: driver data shared via V2V technology needs protection - SC Magazine
Disarm Advanced Persistent Threats with Symantec Messaging Gateway | Symantec Connect
~kjiwa: x86 DOS Boot Sector Written in C
Where can I use Apple Pay? 220,000 U.S. stores accept cardless payment - NY Daily News
Security Privacy & Digital Life Safety - Don’t be that Guy – Trend Micro
Microsoft Windows Hit By New Zero-Day Attack | Security Intelligence Blog | Trend Micro
Moscow, Beijing poised to sign deal on joint cyber security ops • The Register
Black Hat Usa 2014 - Windows: Windows Kernel Graphics Driver Attack Surface
Greens Take Nanny State To A New Level | Scoop News
Apple's Yosemite OS shares Spotlight search terms by default | CSO Online
Mac OS X Yosemite sends search, location data to Apple, Microsoft - Security - News -
The Battle for Palestine | Consortiumnews
Telefónica dives into the consumer internet of things with Thinking Things “ambient” pack — Tech News and Analysis
A Natural A/B Test of Harassment - Kongregate Developer News
Event: Learn how to protect your kids online - West London Mum
Apple Pay Glitch Charges Some Bank of America Users Twice - Digits - WSJ
Apple CEO Tim Cook discusses security with China amid iCloud hacking claims - The Times of India
Techday – New super massive firewall to protect all business sizes
Why Apple Pay Is The Most Secure Payment Platform On The Planet
Incident Response Plan - CSO | The Resource for Data Security Executives
Protect Against Email Targeted Attacks with Symantec Disarm Technology | SymantecTV
Leaders working on cyber security education
FAQs – RSA Conference
Hackers May Have Found a Way to Infiltrate Apple’s iCloud in China | PadGadget
Ventir Trojan Intercepts Keystrokes from Mac OS X Computers | The Mac Security Blog
Top 5 Scariest Zombie Botnets
OpenBSD 5.5 Local Kernel Panic ≈ Packet Storm
TestLink 1.9.12 PHP Object Injection ≈ Packet Storm
Centreon SQL / Command Injection ≈ Packet Storm
Microsoft launches two new Android apps, one new Android Wear app | Android and Me
Ransomware takes malware from bad to worse | InfoWorld
ElectricCommander Privilege Escalation ≈ Packet Storm
Red Hat Security Advisory 2014-1668-01 ≈ Packet Storm
Ubuntu Security Notice USN-2388-2 ≈ Packet Storm
POS malware - a look at Dexter and Decebal - HP Enterprise Business Community
An Imaginary Town Becomes Real, Then Not. True Story : Krulwich Wonders... : NPR
Nurses face obstacles on front lines against Ebola
Symantec sees rise in high-traffic DDoS attacks | PCWorld
The BlackEye Delusion - YouTube
Grrcon 2014 - Reducing Your Organization’S Social Engineering Attack Surface
Carmakers ignore hacking risk, security expert says - Technology & Science - CBC News
Historians’ work meant little to an MI5 obsessed with cold-war communists | World news | The Guardian
Hackers face off this weekend to solve Air Force's cyber challenges | Air Force Times |
Apple Dropping SSL 3.0 for Push Notifications in Wake of Poodle Security Flaw - The Mac Observer
DES Appear Safe and Effective in SVG PCI - Journal News - TCTMD
NetApp Plug-in for Symantec NetBackup Solution Brief
Malware directs stolen documents to Google Drive
Break the Fraud Lifecycle – Video – RSA Conference
FTDI admits to bricking innocent users' chips in silent update | ZDNet
NIST finalizes cloud computing roadmap - SC Magazine
Microsoft's Android Wear app lets you search Bing with a flick of the wrist | News | TechRadar
Microsoft launches three new Android apps
Techday – Why enterprises must make sense of cyber security #WGImagine14
Startup Marketing Conference: Conversion Hacking The Brain « iMediaConnection Blog
Efua Dorkenoo, who fought female genital mutilation, dies at 65 - The Washington Post
Chinese MitM attack targets iCloud users - SC Magazine
Data Center Server Security: A SANS Survey - SANS Institute
Online Harassment Prevalent, Often by Strangers, Pew Study Finds - Digits - WSJ
Websense CEO: Bush-League Partners Were Hurting Our Channel Strategy - Page: 1 | CRN
BYOD In Australia - Cool, Cheap And (Potentially) Catastrophic! | DLA Piper - JDSupra
OS X Yosemite Download Available Now: How to Update Mac OS to Yosemite | The Christian Times
Microsoft beefs up security features in Windows 10 | News | TechRadar
Forrester Grades Its 2014 Cloud Predictions | News | Vertical Systems Reseller (VSR)
Windows 10 has new ways to protect you against internet data breaches
Symantec Endpoint Protection Small Business Edition 2013 | Symantec
Researchers observe recently patched Adobe bug added to exploit kits - SC Magazine
Vuln Hunt: Find the Security Vulnerability Challenge # 3 | Cyber Trust Blog
Twitter wages war on the password with 'Digits' phone number login - Telegraph
Ebola Spreads - In Cyber Attacks Too
Ubuntu Security Notice USN-2387-1 ≈ Packet Storm
Half Of UK Affected By Cybercrime, Financially And Emotionally ≈ Packet Storm
Quick PHP Patch Beats Slow Research Reveal ≈ Packet Storm
Apple warns of new iCloud threat | Technology |
Mono for Unreal Engine - Miguel de Icaza
ThreatTrack Vipre Antivirus 2015 Review & Rating |
Viral-research moratorium called too broad : Nature News & Comment
‘Spam Nation’ Publisher Discloses Card Breach — Krebs on Security
Juniper Q3 earnings in line with estimates, outlook bleak | ZDNet
Sourcebooks shopping-cart security breach hits over 5,000 customers
IBM and Microsoft promise to make their clouds compatible | Computerworld
Startup Marketing Conference Panel: Lean Marketing Meets Growth Hacking: Getting the First 1000 users Overnight « iMediaConnection Blog
Citizenfour's Laura Poitras Explains Why Edward Snowden Did It | Houston Press
Location Labs wants to disrupt 911 - SFGate
Grrcon 2014 - New World, New Realities: Endpoint Threat Detection, Response And Prevention
Twitter throws devs an authentication bone | ZDNet
Patch for Windows flaw can be bypassed, prompts temporary fix from Microsoft - SC Magazine
SEDNIT malware delivered in 'Operation Pawn Storm' - SC Magazine
Three Things Small Businesses Can Learn from High Profile Data Breaches | ThreatMetrix
Adobe spies on readers: EVERY page you turn leaked to base over SSL • The Register
SP Network Transformation at the Cisco Live Cancun World of Solutions
Annapolis County says hackers holding computer files for ransom - Local - The Spectator
Facebook tells DEA: Stop impersonating users - Oct. 20, 2014
Vulnerability Note VU#184540 - Incorrect implementation of NAT-PMP in multiple devices
Juniper Networks - press-releases
Juniper Networks - Q3 2014 Financial Results Conference Call
CSO seeks feedback for reader survey | CSO Online
Malvertising impacts Yahoo, AOL visitors, spreads ransomware - SC Magazine
Cyber Security Careers: What You Need To Know To Advance In The Security Field
Building a Forex trading platform using Kafka, Storm and Cassandra
Stalker gets life for hacking girl 10 years ago
Microsoft ramps up Windows 10 security, introduces two-factor authentication |
Three Latin American men arrested not connected to ATM-hacking cases — IGP – BorneoPost Online | Borneo , Malaysia, Sarawak Daily News | Largest English Daily In Borneo
Health Data Breach Lawsuits Face Uphill Battle in California - iHealthBeat
Filming in fear: Edward Snowden as 'Citizenfour'
Staples Investigating Possible Data Breach - Network Security on CIO Today
Three Latin American men not connected to ATM-hacking cases, says IGP | theSundaily
Data breach lawsuits not always a slam dunk for plaintiffs | Healthcare Dive
Ebola advice emails from 'World Health Organization' are malware spam | Technology |
Protect My Business | Small Business Security Solutions | Kaspersky Lab
PCI student speaks about RYLA experience | Portage Daily Graphic
Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion -
Why would you want Windows for IoT anyway? | CITEworld
Security Education K Through Life
XL Group Appoints New Cyber & Technology Insurance Underwriters
CloudOne Appoints James Goldman Chief Trust and Security Officer
Security in the age of IOT - CSO Bloggers - CSO | The Resource for Data Security Executives
Microsoft Wants to Own You [Video]
CyberSecurity Academy students get real world training - Baltimore Sun
Huawei smartphone shipments up 26 percent; on track for annual targets | ZDNet
XL Group Adds New Cyber & Technology Insurance Expertise - MarketWatch
People In Business: Carl Boyer of The Technology Group |
Cybersecurity Credentials Coalition (C3) Featured at ISACA Security Conference
Financial Executives International DailyCyber Risk Banks’ Biggest Worry - Financial Executives International Daily
Attackers circumvent patch for Windows Sandworm vulnerability | Symantec Connect
Microsoft misses Windows bug, hackers slip past patch | Computerworld
Migrating from AWS to AWS - Instagram Engineering
Lawyer Goes After Obama, Sues Over Illegal Spying | The Daily Caller
Your business can’t afford the cost of cyber crime | CSO Online
Microsoft Releases Workaround for Zero-Day Flaw in Windows OLE - The State of Security
Healthcare Cyber Security Summit (San Francisco, CA)
One Year after Data Breach, FDA System Still Vulnerable |
Hackers use Ebola outbreak to trick users into downloading malware- The Inquirer
Amazon Web Services opens German location to ease privacy concerns - Techworld
Ebola email viruses go viral with 'healthtips' from hackers — RT News
Terrible People Prey On Ebola Fears In New Email Scam
The Pueblo Chieftain |Will Apple Pay be the next iRevolution?
Ebola epidemic: fake emails from World Health Organization used by hackers to spread malware - Gadgets and Tech - Life and Style - The Independent
Why Apple Pay Is the Most Secure Payment Platform on the Planet
Derek sur Twitter : "Thanks @2600 for my latest copy of the Mag!!! #WiGLE looks cool."
#NCSAM: Cisco’s Cyber Security Story
Akamai sees record-setting spikes in size and volume of DDoS attacks | CSO Online
Poisoned Apples: A Look Into The Recent Threats That Affected iOS Users - Security News - Trend Micro USA
Federal Trade Commission appoints new chief technologist - SC Magazine
Juniper Networks sur Twitter : "That’s #SRX appeal! Via @RFairclough, @cooperlees & @aijayadams."
New ABA Head Wants To Work With Retailers For Payments Security |
Tiempo Blog - Y-Combinator, a Two-Year-Old, and a Pregnant Wife
Amazon Web Services opens German location to ease privacy concerns | PCWorld
Microsoft To Step Up Security Controls in Windows 10 -- Redmond Channel Partner
Brown: Ebola will elevate respect for nurses | Nation/World - Home
Blaming everything but the real causes |
Tamsin Fox-Davies sur Twitter : "Listening to Judith Bitterli the CMO of @AVGFree on the power of three minutes at @The_Pitch"
Android Malware Attacks Soaring |
From ASCII Atlantic City 5 Great Quotes 2 Helpful Business Continuity Tools
Cybercriminals continue to piggyback on Ebola news - SC Magazine
Grrcon 2014 - Adopting A Risk-Based Threat Model To Secure Your Defenses And Regain Control Of Your Critical Data
Local news from Rock Hill, SC | The Herald
Documentary 'Citizenfour' tracks how decision to become a whistleblower posed a gripping dilemma for Edward Snowden - NY Daily News
First Data launches Perka beacon to accompany loyalty app for SMBs | ZDNet
Computer users who damage national security could face jail | Law | The Guardian
Is Target Stock a Buy Nearly a Year After the Data Breach? (TGT)
Outgoing UK spy chief rejects mass surveillance claims| Reuters
INFOGRAPHIC▶DDoS Attacks on the Rise
Abandoned subdomains pose security risk for businesses | CSO Online
Adobe exploit used to spread Dyre credential stealer - SC Magazine
Apple iOS v8.0.2 - Silent Contact 0Day Vulnerability (Denial of Service) | Official Vulnerability- & Bug- News Resource!
Cyber Security Market in the US Government Sector 2014-2018: Key Vendors are BAE... -- DUBLIN, Oct. 23, 2014 /PRNewswire/ --
Letters of Note: 1984 v. Brave New World
Citizenfour Review | Movie Reviews and News | Fall Movies - Calendar, Trailers, Movie Photos, Movie Clips, Movie Guide |
Noted Cybersecurity Expert John Pirc Joins Bricata as Chief Strategy Officer - Press Release - Digital Journal
ThreatMetrix Data Finds E-Commerce Executives See Drop in Fraud Rates and Chargebacks Following Implementation of Comprehensive Fraud Prevention Solution | Virtual-Strategy Magazine
Twitter Debuts Fabric SDK For Mobile Developers - InformationWeek
You might not be able to avoid a data breach, so here's how to protect yourself from the inevitable |
Cost of cyber attacks increases by 10.4% in 2014 | IDM Magazine
Etsy rolls out Square-like card reader for offline payments | ZDNet
How Avanade institutionalizes innovation | ZDNet
My Certification Journey - J-Net Community
Cyber-Criminals Quickly Adopt Critical Flash Player Vulnerability
Citizenfour's Laura Poitras Explains Why Edward Snowden Did It | Village Voice
Spam in September: Financial Phishing Accounts for Highest Percent of Detections | Kaspersky Lab US
From CIOs to IT: Shining a light on cloud disaster recovery with attainable metrics - Cloud Tech News
ISA president urges state AGs to expand understanding of cybercrime - SC Magazine
Ello Raises $5.5 Million, Legally Files As Public Benefit Corp. Meaning No Ads Ever | TechCrunch
Twitter launches Digits, a password-free login service for mobile apps |
Government issues guidance on Bring Your Own Device to work | theHRDIRECTOR - The only magazine dedicated to HR Directors
ThreatMetrix Data Finds E-Commerce Executives See Drop in Fraud Rates and Chargebacks Following Implementation of Comprehensive Fraud Prevention Solution
Illinois man sentenced for hacking U.S. Navy
‘Best female marketer – B2B’ awards shortlist announced |
Legality pain for security pros | ITWeb
The BlackEye Deception - YouTube
New Zealanders are being watched: Snowden | SBS News
Ebola: Nurses on the front lines of disease (Opinion) -
Apple CEO Talks Security With Top Chinese Official: Xinhua - NBC News
Microsoft unveils tighter security plans for Windows 10- The Inquirer
How to Use Apple Pay | News & Opinion |
Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics
Business continuity planning gets easier | ITWeb
SANS Institute
Staples data breach raises question of - San Francisco Business Times
Apple Pay Can Be Tricked To Work Outside U.S. - Apple/Mac on CIO Today
Lone lawyer sues Obama, alleging illegality of surveillance programs | Ars Technica
HP adds two new Moonshot configs and increased app support | ZDNet
ThreatMetrix Data Finds E-Commerce Executives See Drop in Fraud Rates and Chargebacks Following Implementation of Comprehensive Fraud Prevention Solution - Press Release - Digital Journal
Grrcon 2014 - Advanced Threats And Lateral Movement
Watch "New York financial regulator shifts agency's focus on to cyber security" Video at SCMagazine
Transcript website flaw exposed personal data on 98k users - SC Magazine
The Bash Vulnerability: How to Protect your Environment
7 Things About Android Lollipop 5.0 You Need To Know
15 Hot Security Companies That Could Be Symantec Acquisition Targets - Page: 1 | CRN
Zscaler Launches New Advanced Persistent Threat Protection
10 strategic tech trends to watch for - ABA Banking Journal
Planned new computer hacking laws need greater clarification, say UK lawmakers
Inside the iPad Air 2 | ZDNet
Apple dropping support for SSL 3.0 on push notification servers, requiring TLS by October 29th | 9to5Mac
Kaspersky Internet Security 2015
Watch Out for Suspicious Microsoft Office Files--It Could Be Malware
U.S. national security prosecutors shift focus from spies to cyber - Chicago Tribune
Now Open - AWS Germany (Frankfurt) Region - EC2, DynamoDB, S3, and Much More
Q&A: Laura Poitras | The Nation
Illinois man sentenced for hacking U.S. Navy, other victims : News
We have another White House fence jumper - The Week
Cyber skills shortage makes UK a soft target for hackers
Modular malware for OS X includes backdoor, keylogger components - SC Magazine
Ad-borne Cryptowall ransomware is set to claim FRESH VICTIMS • The Register
Apple iCloud under attack from Chinese hackers. Here's why : PERSONAL TECH : Tech Times
Michael Rasmussen Governance Risk and Compliance 2015 | ITWeb
A Hacker’s Perspective: How I Took Over Your City’s Power Grid – Podcast – RSA Conference
Mapillary in the OpenStreetMap iD Editor
Celebrating two OS landmarks: Windows 7 and 8.1 | News | TechRadar
Hackers Ran Loose Inside JPMorgan For 2 Months Before Getting Caught
Attackers bypass Sandworm patch with new 0-day
Information Security News: Oracle's Quarterly Critical Patch Update Includes 25 Java Security Patches
Hector Martin sur Twitter : "Here's how @FTDIChip's new driver is intentionally and maliciously bricking clones."
Apple iOS v8.0 - v8.0.2 - Denial of Service Vulnerability (UIAlertControlview & Invalidationhandler) - YouTube
Vacker targets top automation company status with new offerings
Brown: Ebola will elevate respect for nurses | National News - WPTZ Home
Smart Lock Devices: Security Risks and Opportunities | Security Intelligence Blog | Trend Micro
Google unveils “Inbox” as combined toolset for mail, calendars, tasks | Ars Technica
Apple to stop SSL 3.0 support for push notifications soon | CSO Online
Microsoft misses Windows bug, hackers slip past patch | CSO Online
Business continuity briefs
Ten years of Ubuntu: How Linux’s beloved newcomer became its criticized king | Ars Technica
Family of nurse Amber Vinson says she is free of Ebola virus - The Week
Inspired eLearning is a Leader in the New Gartner Magic Quadrant for Security Awareness Computer-Based Training | Virtual-Strategy Magazine
519 Million Reasons Why Your Financial Records Are in a Hacker's Hands
The Easiest Ways to Protect Yourself After a Data Breach |
UK spy chief rejects mass surveillance claims | Europe | Worldbulletin News
Wind River hunts viruses using Atom processor | Electronics Weekly
Windows 10 to include built-in two-factor authentication
Target Says Banks Can't Go After It For Data Breach Losses - Law360
Staples Investigating Possible Data Breach
Grrcon 2014 - Pci And Crypto: The Good, The Bad, And The Frankly Ugly
Information Security News: Many Americans Say They Will Avoid Breached Retailers,Study Shows
Cyber Threats: Information vs. Intelligence
Review: Ups and Downs of Apple Pay in Action - Digital Life on Top Tech News
Apple to grow retail stores in China from 15 to 40 within two years, says Cook | 9to5Mac
Windows 10 to get two-factor authentication built-in | InfoWorld
How Savvy Security Leaders Get the Budgets They Need – Blog Post – RSA Conference
[1410.6079] Bitcoin over Tor isn't a good idea
Citrix ShareFile review | PC Pro
Cybersecurity and Data Breaches: What CMOs Need to Know | DigitalNext - Advertising Age
Information Security News: Offensive Cyber Operations in US Military Doctrine
Pro-Privacy Senator Wyden on Fighting the NSA From Inside the System | WIRED
Zscaler Launches New Advanced Persistent Threat Protection With Fall 2014 -- Now Everyone Can Be Protected From Zero-Day and Advanced Threats - EIN News
Scientists closer to understanding mysterious markings on the world's oldest wooden statue - The Week
Windows 10: Aiming for More Business Users - Operating Systems on CIO Today
Apple to Open 25 New Stores in China Over Next Two Years, Says CEO Tim Cook - Mac Rumors
Surprise! Here's the first look at Avengers: Age of Ultron - The Week
Plea to Pāpāmoa pond and aquarium owners | Scoop News
Rasamny: Millennials must take precautions to avoid falling victim to hackers | The Daily Orange – The Independent Student Newspaper of Syracuse, New York
Google goes beyond two-step verification with new USB Security Key | Naked Security
A New Provable Factoring Algorithm | Gödel's Lost Letter and P=NP
Apple’s iCloud service suffers cyber-attack in China, putting passwords in peril - The Washington Post
Information Security News: CJK network security consultation mechanism to combat cyber-terrorism matters discussed
Information Security News: Automakers working to prevent vehicle cyber terrorism
SSCC 170 – Is the best time to shop at a store right after it has a breach? [PODCAST] | Naked Security
DefCamp 2014
Colombia negotiator to testify in peace talks hacking case
What's new? Apple releases new iOS 8.1
Review: Ups and Downs of Apple Pay in Action - Data Security on CIO Today
Interview: Hord Tipton, Executive Director, (ISC)2 - Infosecurity Magazine
Castles in the Air: Data Protection in the Consumer Age – Podcast – RSA Conference
From the Canyon Edge: Fingerprints are Usernames, not Passwords
AT&T; revenue misses forecasts as more customers bring own phones| Reuters
Grrcon 2014 - Are You A Janitor, Or A Cleaner?
Target Moves On From Massive Breach Issue, Preps for Holidays : Marketing : Franchise Herald
Illinois man sentenced in hacking conspiracy - Bluefield Daily Telegraph: News
CDC to monitor all West African travelers for 21 days - The Week
Tablets, cars drive AT&T wireless gains—not phones - SFGate
China linked to cyber attacks on Taiwan exploiting Windows vulnerability | Technology |
Chinese government launches cyber attack on Apple iCloud users |
Auckland man convicted for bags of cash | Scoop News
The mystery of the disappearing Silk Road murder charges
Bring your own ‘anything’ | IT-Online
After attack on Chinese iCloud users, Apple issues browser security notice | ZDNet
With new OS, Microsoft will try to put Windows 8 era behind it - PC World Australia
Crikey says: we stand with Freya | Crikey
Watch crazy, chaotic footage of shots being fired inside Canadian Parliament - The Week
Review: Apple Pay in action - Hindustan Times
Apple Pay Can Be Tricked To Work Outside U.S. - Apple/Mac on Top Tech News
China-backed hackers target Apple's iCloud users - blog
Student who pleaded guilty to hacking Frances Abbott's $60,000 school scholarship files that were leaked online has to wait another month to find out her fate | Daily Mail Online
More victims of data breach contacted: WARMC parent company sending letters to affected clinic patients - Mohave Daily News: News
Skybox Security Accelerates Channel Program Growth with New Offerings | Business Wire
TidBITS: How to Use Apple Pay
Tutus' Secure Smartphone, Farist Mobile, Approved by Spanish Security Agency - Press Release - Digital Journal
Tech Report Best Of: Free Antivirus Software |
Xen says its security policies might be buggier than its software • The Register
New CVE-2014-4114 Attacks Seen One Week After Fix | Security Intelligence Blog | Trend Micro
Operation Pawn Storm: The Red in SEDNIT | Security Intelligence Blog | Trend Micro
Grrcon 2014 - Vulnerable By Design – The Backdoor That Came Through The Front
WebApp Sec: Re: Shameless plug: OWASP Board Elections
WebApp Sec: Administrivia: Trouble Ticket Systems subscribing to this list and unsubscribe requests
Business School | Beware of Internet-based Phone System Hacks | Valdosta Today - South Georgia's News Source
Inspired eLearning is a Leader in the New Gartner Magic Quadrant for Security Awareness Computer-Based Training
Have a Techie in Your Life? Hip Tablet Gift Ideas For 2014
3 reasons to invest in a Surface Pro 3 instead of an iPad Air 2 - TechRepublic
Bash Bug can affect computers running Mac OS X: Symantec - The Economic Times
Experts: Beware of hackers, security lapses - News - - Middletown, NY
Blackwater Guards Found Guilty In 2007 Shootings In Iraq | NCPR News
AT&T, like Verizon, misses profit estimates | The Kansas City Star
Homegrown developers look to unseat Microsoft’s dominant OS - Headlines, features, photo and videos from|china|news|chinanews|ecns|cns
How to keep your rigs from getting ripped off | Fire Chief
Vietnam police hunt hackers behind mass outage | PCWorld
Illinois voting machine changes Republican votes to Democratic ones - The Week
AT&T revenue misses forecasts as more customers bring own phones | TODAYonline
Why are so many big-name retail chains being hacked?
Bankers say data breach over that affected Easthampton, Southampton businesses, including Big E’s Supermarket |
Data Privacy for Businesses: A Part of Doing Business | Security Intelligence Blog | Trend Micro
Videos – RSA Conference
Apple Pay: Who Won and Who Lost?
Techday – Fortinet’s next-generation firewall platforms unveiled
Soldier Killed, Suspect Dead In Shooting Near Canadian Parliament | NCPR News
Hackers play cat-and-mouse with retailers' security systems
Microsoft pulls SHA-2 update for Windows 7 and Server 2008 R2 - Neowin
Windows Update drivers bricking USB serial chips beloved of hardware hackers | Ars Technica
My adventures in CNC robotics
New McAfee Security Suites for SMB - McAfee
Tablets, cars drive AT&T wireless gains_not phones | The Kansas City Star
Hewlett-Packard Company(NYSE:HPQ): Should You Buy The Split? | ETF DAILY NEWS
Tablets, Cars Drive AT&T; Wireless gains_not Phones - ABC News
Personal Data up for Grabs in the Great Cyber War
And Then There Were None: Europe, the Internet, and the Right to Be Forgotten – Blog Post – RSA Conference
Techday – Moving beyond fear with business assurance technology
How to upgrade to Kaspersky Internet Security 2015 - YouTube
Trend Micro sur Twitter : "The Home of the Future. #NCSAM"
New AWS Directory Service
Websense® Office of the CSO Resources —
SSLv3 "POODLE" Vulnerability CVE-2014-3566
Indianapolis Cyber Security Summit aims to fight back against computer hackers | Fox 59
Maybe there really is an Ebola (malware) outbreak | CSO Online
Officials: 500M records stolen
AT&T revenue misses forecasts as more customers bring own phones - News - AM 590 - WKZO Everything Kalamazoo
Google Nexus 6 vs. Apple iPhone 6 Specs, Review & Comparison: Ecosystems Matter Now : Tech : Latin Post
Tablets, cars drive AT&T wireless gains_not phones | The Miami Herald
US Legislator Demands Snowden be Charged with Murder | News | teleSUR
FBI Charges NOAA Worker With Swiping Data on Dams
Apple issues China iCloud security warning | South China Morning Post
No Application for Amenities Board Funding for 2015/16 | Scoop News
AT&T; revenue misses forecasts as more customers bring own phones | Daily Mail Online
FBI Arrests NOAA Employee for Stealing Sensitive Dam Information : World : Chinatopix
Maritime Union backs change of Government | Scoop News
Hacker gets two-years in case involving penetration of government computers - News
Health Care Equipment Could Be Vulnerable to Hackers | The Fiscal Times
US focus on naming foreign hackers gets criticized | TheHill
AVG Technologies Previews New Identity-as-a-Service “CloudCare SSO” at Cloud Summit | AVG Now
Grrcon 2014 - Biohacking: Becoming The Best Me I Can Be
Competitive Landscape: Carrier-Class Network Firewalls
The Savvy Security Leader: Using Guerrilla Tactics to ID Security Program Resources – Video – RSA Conference
Websense 2015 Security Predictions Report
Courthouse News Service
Quick Facts About Ebola | NCPR News
Apple’s iCloud service under attack in Mainland China - MarketWatch
Hackers may have infiltrated iCloud: blog | Sarnia Observer
Apple issues security warning for iCloud amid reports of hacking in China - The Economic Times
AT&T Q3 Revenue, EPS Miss, Shares Slip; Cuts Year Growth View - Tech Trader Daily -
Metro-east news from Belleville, IL | Belleville News-Democrat
Apple says hackers attacked iCloud -
The pit and the pendulum - Lexology
Survey: Data breaches could keep shoppers away
I.T. boss accused of hacking will get new trial |
Staples data breach raises question of - Silicon Valley Business Journal
Hackers targeting phones for bank info | World | 3 News
Microsoft Outlines Windows 10 Security and ID Management Controls --
VA: Hackers Never Siphoned Data Out of its Systems -
Microsoft warns users about 0-day behind PowerPoint attacks • The Register
FBI: No evidence that JPMorgan hack was payback for sanctions against Russia - The Washington Post
AT&T; revenue rises less than expected| Reuters
McAfee Delivers New Product Portfolio For Small and Medium-Sized Businesses
Google Introduces Enhanced Two-Factor Authentication with USB Security Key - The State of Security
How to Make Sure You're Visiting the Real iCloud Page
The Number of Industries Getting Classified Cyberthreat Tips from DHS Has Doubled Since July -
Google implements Security Key two-factor authentication - SC Magazine
Business Safe Online |
Red Hat Security Advisory 2014-1686-01 ≈ Packet Storm
Red Hat Security Advisory 2014-1685-01 ≈ Packet Storm
Red Hat Security Advisory 2014-1692-01 ≈ Packet Storm
You asked, we answered: #AskPtH Questions and Answers | Cyber Trust Blog
Americans fear identity theft more than getting shot to death – survey • The Register
Is your home or office internet gateway one of '1.2 MILLION' wide open to hijacking? • The Register
The Hacker News — Hacking, Cyber and Internet Security
Hackers make companies' phones call premium-rate numbers, cost them billions
Worm variant of Android ransomware, Koler, spreads via SMS - SC Magazine
Google launches support for Security Key, a simpler kind of two-factor authentication | The Verge
6 Actions Businesses Should Take During Cyber Security Awareness Month
Inside San Francisco's housing crisis — Vox
Defence-in-depth, more than a buzzword | McAfee
Feds investigating two dozen potential hacks targeting life-saving medical devices — RT USA
Earnings Challenged by Guidance from AT&T - AT&T (NYSE:T) - 24/7 Wall St.
Microsoft misses Windows bug, hackers slip past patch - Computerworld
Target rolls out free shipping for all orders during holidays - LA Times
Dairy Queen latest hit by data breach
United Nations News Centre - Despite gains against tuberculosis, better research funding required – UN report
Sun Current | Richfield Dairy Queen affected by data breach
Corruption Currents: From New Jersey Mafia Hangouts to Medical-Device Hacking - Risk & Compliance - WSJ
How to Tap Your Network and See Everything That Happens On It | Life Hacker India
Windows 10 To Improve Security With Two-Factor Authentication, App Signing, More
Second Healthcare Data Breach Hits Tenn. Facility, Files Misplaced |
For Extra Safety, You Can Now Access Gmail With a Physical Key
Google USB Security Key introduced to keep out hackers | Daily Mail Online
Study: MSPs See Opportunity With Internet Of Things, But Are Slow To Act - Page: 1 | CRN
As the NSA scandal matures, outrage fizzles into business as usual | Personal Liberty
Staples reports possible data breach •
Free antivirus software for your computers | FOX C
New study finds MSPs behind on Internet of Things opportunity | Computer Dealer News
Yes, There Really is a School for Hackers in Costa Rica - Costa Rica Star NewsCosta Rica Star News
Thieves break into banks without entering the building |
Windows 10 Moves to Set the Bar for Security
IBM, Microsoft Collaborate on Hybrid Cloud Offerings - Microsoft/Windows on Top Tech News
Phone hacking cost small businesses $4.73 billion last year - Yahoo Finance
Windows 10 to get two-factor authentication built-in - Techworld
US government probes medical devices for possible cyber flaws - The Times of India
Apple Encouraging Chrome and Firefox Users to Download Safari After Installing Yosemite - Mac Rumors
Massive malvertising campaign on Yahoo, AOL and other sites delivers ransomware | CSO Online
Cisco supply chain CSO talks cradle to grave security - SC Magazine
New Zero-day in Microsoft OLE Being Exploited in Targeted Attacks
Bracket Aims to Tame the Cloud - Digits - WSJ
Gartner identifies the Top 10 strategic technology trends for 2015 | Fort Myers Newspaper | News, Business, Real Estate and Arts in Fort Myers FL | Florida
McAfee trims prices, enhances partner margins on new SMB portfolio -
Startup wants to make cloud attractive for security-sensitive businesses | Network World
Apple Pay: What's the Big Deal? | John C. Dvorak |
Windows 10 to get two-factor authentication built-in | PCWorld
FTDI driver kills fake FTDI FT232?? - Page 1
Chinese hackers slurp iCloud passwords, Apple's CEO jumps into his jet for China • The Register
Apple issues security warning for iCloud users after attack by Chinese hackers | Latest News & Updates at Daily News & Analysis
What Google's Android 5.0 Lollipop Means For Mobile Enterprise (AAPL, BBRY, GOOG, GOOGL)
China responds over "hacker infiltration to Apple's iCloud" - Xinhua |
China-backed hackers may have infiltrated Apple's iCloud: blog| Reuters
BBC News - China denies backing iCloud hack
Phone bill premium number hack detailed | BGR
Apple CEO discusses security with top Chinese official amid hacking claims -Xinhua | Daily Mail Online
Effective security techniques we don't follow enough | ZDNet
Windows 10: Security and Identity Protection for the Modern World
Apple Pay and wearable technology could pose next threats, experts say - SC Magazine
Businesses need to prepare for the wearables invasion right now | News | TechRadar
China is hacking its own citizens’ iCloud accounts | KHON2
Apple CEO Tim Cook meets with Chinese official after iCloud attack | Computerworld
Survey: Big Data Delivers the Goods - Information Management Online Article
Staples May Have Been Breached. (Should You Just Cut Up All Your Cards?) - Forbes
Official Google Blog: An inbox that works for you
Grrcon 2014 - Autonomous Remote Hacking Drones
Windows 10: Continuing to Raise the Security Bar for Cybercriminals | Cyber Trust Blog
Could NFV be the new Google? - J-Net Community
EU group: NSA's 'balance' of security, privacy in surveillance sucks | Network World
Apple iCloud hack attempt: Is my data safe? - Recombu
DHS investigates 24 potentially deadly cyber flaws in medical devices | Computerworld
Discretix Technologies Ltd. Announces Company Name Change to Sansa Security, Inc.
Apple, China talk hacking? | TheHill
Apple claims iCloud target of hacking attacks | Business | 3 News
Possible cybersecurity flaws in medical devices probed - Technology & Science - CBC News
Microsoft warns of new Zero-Day attack | CSO Online
US probes medical devices for possible cyber flaws
Federal Audit Finds FDA Website, Internal Network Vulnerable to Hackers | RAPS
The man with the golden blood | Mosaic
How do you promote cybersecurity across your or... | Cisco Communities
5 Keys To Successfully Sell Business Continuity As A Service
US Government Probes Medical Devices for Possible Cyber-Security Flaws | NDTV Gadgets
Security Advisory 3010060 released - MSRC - Site Home - TechNet Blogs
Bricata, LLC Announces Management Team | Virtual-Strategy Magazine
Microsoft Announces New Azure Plans, Software Marketplace, and Partnerships | NDTV Gadgets
Illumio Brings Adaptive Security to Morgan Stanley, Plantronics, Creative Artists Agency, Yahoo and NTT I3 - MarketWatch
Staples warns of possible breach affecting customer credit cards - Orlando Business Journal
Apple issues iCloud security alert -
BBB Offers Tips For How To Handle A Data Breach - / State
Android’s recent encryption announcement doesn’t protect your data | TheHill
Microsoft Details Windows 10 Security Enhancements | Windows 10 content from Paul Thurrott's SuperSite for Windows
Staples Probing Possible Payment Card Data Breach | Re/code
Microsoft warns on yet another zero-day security flaw - SC Magazine UK
Blotter: Hacking in the street | Blotter | Charleston City Paper
Soundsquatting 101: How Homophones Can Lead to Risks - Security News - Trend Micro USA
Gartner Positions Wombat Security Technologies as "Leader" in Magic Quadrant for Security Awareness Computer-Based Training Vendors
Google Chrome vs. Safari
Apple: Internet Explorer? Never heard of it | Computerworld
60% of Android attacks use financial malware
Here's a bird’s eye view of Ebola epidemic | CSO Online
Are e-health records at fault for Ebola mistakes? | CSO Online
Beachhead Solutions Cited in Gartner's Magic Quadrant for Mobile Data Protection Report
Irish Water gave bank details to landlords | Irish Examiner
Bricata, LLC Announces Management Team - Press Release - Digital Journal
8 ways Big Data helps improve global water and food security |
Target will offer free shipping on all holiday items starting today -
Apple in the enterprise: For some, its already there | ZDNet
Target eyes holiday turnaround with free shipping, faux fur - Business -
Chinese hackers go after iCloud
Microsoft promises Windows 10 will mean two-factor auth for all • The Register
Apple chief meets Chinese leader amid iCloud hacking storm - Times LIVE
Simply Security News, Views and Opinions from Trend Micro, Inc
A California Couple Has Made the World's First Working Hoverboard | Motherboard
Endpoint Visibility is Key to Combatting Attacks
Watch: Target CEO leaves breach behind this holiday season
San Juan Record - Classifieds, Events, Businesses in Monticello, San Juan County, Utah - Rick Eldredge
Microsoft Security Essentials versus Lookout Security & Antivirus: Which one is for you?
FBI Warns of Hacks by Moonlighting Foreign Agents - Bloomberg
Grrcon 2014 - Cryptorush – Rising From The Ashes
Core Impact Pro Training & Certification Now Available Online | Core Security Blog
Apple Offers Guidance Following China iCloud Attack ≈ Packet Storm
Hacker, Terrorist Threats Spur Bases To Build Power Grids ≈ Packet Storm
Gartner Positions Wombat Security Technologies as "Leader" in Magic Quadrant for Security Awareness Computer-Based Training Vendors - MarketWatch
Apple CEO meets Chinese official amid iCloud hacking row
China-backed hackers target Apple's iCloud users- blog| Reuters
Chinese Authorities Hack Apple's China iCloud - Digital Life on Top Tech News
Staples is the latest company to announce a credit card breach | Digital Trends
Chinese Hackers Suspected in iCloud, Website Attacks
Apple CEO discusses security with top Chinese official amid hacking claims - Xinhua| Reuters
Apple faces another cyber attack, issues security warning for iCloud | Wall Street OTC
Chinese Hackers Defy Apple's New Security - US News
Homeland Security Today: McAfee’s Next Generation Firewall: An Integrated Approach To Government Security
Several Staples Stores Suffer Data Breach
Bugtraq: iFunBox Free v1.1 iOS - File Include Vulnerability
Bugtraq: File Manager v4.2.10 iOS - Code Execution Vulnerability
Preview redux: Microsoft ships new Windows 10 build with 7,000 changes • The Register
Pagers Shout Data Center Creds, Pop Star Airport Arrivals ≈ Packet Storm
Google Now Lets Your Prove Your Identity With A USB Security Key ≈ Packet Storm
Staples may be the latest target in string of credit card hacks - Business - The Boston Globe
Apple CEO Meets Chinese Vice Premier to Talk Information Security, Cooperation: Reports | Business | RIA Novosti
Apple CEO Tim Cook Meets with Top Chinese Official After iCloud Login Harvesting Claims - Mac Rumors
Employees Excited, Concerned About Wearables in the Workplace | CIO
ESET reveals Smart Security 8 and NOD32 Antivirus 8 | IT News Africa- Africa's Technology News Leader
Apple CEO Cook Meets With Top Chinese Official Amid Hacking Claims : Trending News : Auto World News
HP Delivers Threat Protection to Academic Institutions
Wearable Devices: Privacy, Security Worries Loom Large - InformationWeek
Python for Pentesters
Live chat today: Protecting your computer from viruses, hackers and scams |
Wind River Pattern Matching Engine Breaks New Ground To Address High-Performance Security For Growing NFV Needs - Intel Corporation (NASDAQ:INTC) | Benzinga
RetailNext Delivers In-Store Analytics Platform Release 5.1 to Brick-and-Mortar Retailers | Virtual-Strategy Magazine
Windows 0-day exploited in ongoing attacks, offers temporary workarounds
#CiscoChampion Radio S1|Ep 37. New Cloud Era, New Data Protection Model
Windows 10 release date | News | PC Pro
Target leaves breach behind this holiday season
Target Eyes Holiday Turnaround on Free Shipping, Faux Fur - Bloomberg
Target CEO leaves breach behind this holiday season
Apple CEO discusses security with top Chinese official amid hacking claims: Xinhua| Reuters
WebApp Sec: Re: unsubscribing from the list
Google Accounts Now Support Security Keys — Krebs on Security
Shelbyville Times-Gazette: Column: October is Cyber Security Awareness Month (10/22/14)
AVG Free Antivirus – Reliable, Sleek and Quick to Load - Ordoh
Cybersecurity Labor Shortage Hurting Battle Against Internet Attacks - Hartford Courant
WebApp Sec: unsubscribing from the list
OS X Yosemite Wi-Fi problems – can you help us solve them? | Naked Security
Mastercard and Cloudera in PCI pact - Computer Business Review
Grrcon 2014 - Around The World In 80 Cons (A Tale Of Perspectives)
PCI Compliance Under Scrutiny Following Big Data Breaches | CIO
Samsung Galaxy Note 4 tips
Attackers change home routers' DNS settings via malicious code injected in ads
Bugtraq: FreeBSD Security Advisory FreeBSD-SA-14:23.openssl
Securonix Appoints Former Bank of America Executive as Chief Scientist to Further Advance the Use of Machine Learning for Cyber and Insider Threat Detection
Symantec sees rise in high-traffic DDoS attacks | CSO Online
Industry can head off IoT privacy rules, former US official says | CSO Online
Woman charged with planting spyware on cop’s phone | Naked Security
Cloud security: Think you're blocking staff access to certain sites? Think again | ZDNet
Children To Be Taught Cyber Security Skills
Starr Launches Cyber Security & Privacy Risk Response on a Primary Basis
Finextra: Cloudera data management platform certified as PCI compliant
This Fake Log Jams Your Phone So You'll Shut Up and Enjoy Nature | WIRED
Latest Radio News, Talk Shows, Sports, Hosts, Personalities |
Insider Threats – how they affect US companies
Staples says investigating possible payment card data breach| Reuters
IPhones, iPads, Macs 'safe', but Apple Inc issues security iCloud warning - Financial Express
Apple Issues ICloud Security Warning - KMBZ
The Multiple Uses of Free Antivirus Programs - The Fuse Joplin
HP Delivers Security To Academic Institutions
Google unveils Security Key | Motherboard
Changing all links: JavaScript for Pentesters task 2 write up - SecureTheLock
6 Ways Big Data Improves Food Security
UN slams mass surveillance as ‘systematic interference’ with right to privacy - Enterprise - | - Ireland's Technology News Service
Staples Investigating Possible Data Breach | Sci-Tech Today
Staples Looking Into Possible Data Breach « CBS Boston
Local and Breaking News from The Modesto Bee in Modesto, CA |
More than 70 Hong Kong government websites 'under attack from Anonymous hackers' | South China Morning Post
Hungary plans to impose new tax on Internet traffic| Reuters
Is your phone line a ‘6-figure liability waiting to happen’? | Naked Security
Bricata Launches its ProAccel Next Generation Intrusion Prevention System in Commercial and Federal Markets
Encrypted channel monitoring: The evolution of privileged access management | Government Security News
Samsung Knox devices approved for classified US government use - IT News from
Staples (SPLS) Investigating Possible Data Breach | InvestorPlace
McAfee vernieuwt Next Generation Firewall | Productnieuws | Computable
Windows 10: Has Microsoft got it right? | Channel Pro
Preparing for Windows 10
Local news from Bellingham, Whatcom County, WA |
Free is good: No-cost Panda Software tops AV-Test's rankings of antivirus software | PC World India
Tsunami siren test next week | Scoop News
Bugtraq: FreeBSD Security Advisory FreeBSD-SA-14:20.rtsold
Bugtraq: FreeBSD Security Advisory FreeBSD-SA-14:21.routed
Cyber-espionage is more difficult to pin to a state than spying in the physical world
Information Security News: Why Data Breach at Staples May Not Matter
Information Security News: NOT OK GOOGLE: Android images can conceal code
Using technology to make your business more efficient: top tips | Guardian Small Business Network | Guardian Professional
China Attack Aims at Apple iCloud Storage Service | NDTV Gadgets
Tutus' Secure Smartphone, Farist Mobile, Approved by Spanish Security Agency
Computer misuse: Brits could face LIFE IN PRISON for serious hacking offences • The Register
Apple sees iCloud attacks; China hack reported - World | The Star Online
Watchdogs inundated by quango complaints -
Apple confirms iCloud under attack as security blog reports Chinese hack - Tech2
Today in the press - RTÉ News
Apple's iCloud believed attacked by Chinese government hackers - Technology & Science - CBC News
Grrcon 2014 - Infosec In The 21st Century
Latest local breaking news by The State Newspaper in Columbia, SC | The State
Staples May Be Latest Data Breach Victim | NECN
Apple iCloud 'hacked' in China - Telegraph
Apple Pay Goes Live, Experts Talk Benefits - Apple/Mac on Top Tech News
Staples hit by data breach, with customers in Northeast hit
Staples Probing Potential Credit-Card Data Breach | Data-Driven Marketing - Advertising Age
Outgoing GCHQ boss defends agency activities after Snowden revelations | UK news | The Guardian
Information Security News: Personal information of almost 100, 000 people exposed through flaw on site for transcripts
Information Security News: NIST drafts guide for hypervisor security
Apple Adds Guide On Browser Security In Wake Of China Hack | TechCrunch
2FA: Google offers physical alternative to verification codes
Koler worm spreads via SMS, holds phones for ransom
Think before you share that file
China attacks lead Apple to alert users on iCloud threats | CSO Online
What It Took for SpaceX to Become a Serious Space Company - The Atlantic
More than 500M financial records stolen by hackers |
Youngstown News, Staples probes possible data breach
How To Create a Windows 8 Recovery Drive [Easy, 10 Min]
Pagers shout data center creds, pop star airport arrivals • The Register
BBC News - Cyber security firm Alert Logic opens in Cardiff
ESET launches Smart Security 8 and NOD32 Antivirus 8 | IT-Online
Chinese Government Reportedly Behind Man-In-The-Middle iCloud Attacks
Users really are bringing their own devices | IT-Online
In brief: Staples reveals possible data breach - - Oct. 22, 2014
Staples is latest retailer to report data breach |
Avast 2015 gains Home Network Security check, HTTPS scanning, hardware-based virtualization
Chinese Authorities Hack Apple's China iCloud - Apple/Mac on Top Tech News
Chinese Big Brother launches nationwide attack on iCloud | Computerworld
Apple issues iCloud security alert -
Apple issues security warning for iCloud | Deccan Chronicle
Finextra: Staples investigates data breach; Moscow cleared of JPMorgan hack
Apple sees iCloud attacks; China hack reported | Capital Business
China Intercepts iCloud Logins in Apparent Attempt to Steal Passwords
Business news roundup, Oct. 22 - SFGate - Dover NH, Rochester NH, Portsmouth NH, Sanford ME
Hackers may have infiltrated iCloud: blog | Sudbury Star
Apple Issues iCloud Security Warning |
China-backed hackers may have infiltrated Apple's iCloud, says Chinese web monitoring group | Latest News & Updates at Daily News & Analysis
Apple responds to iCloud network attacks with guide on verifying browser security | 9to5Mac
Hackers target phones to get bank info
The Pit and the Pendulum (and Commitment to Privacy) | The National Law Review
Steve Wozniak to teach at UTS - ARN
Staples is latestvictim of hackers - Longview News-Journal: Business
Microsoft Windows 10 Technical Preview Updated with Action Centre, UI Improvements | NDTV Gadgets
Parties sent home with report cards | Scoop News
Apple reports hacking attacks on iCloud |
Facebook Automates Fight Against Hackers - InformationWeek
Staples Says It's Investigating Potential Credit Card Data Breach | NDTV Gadgets
Grrcon 2014 - Securing Our Ethics: Ethics And Privacy In A Target-Rich Environment
AndroSec | Category | Assembly Language and Shellcoding on Linux 64 bits
WFT Announces New Services to Help Customers Design and Deploy High-Availability and Disaster-Recovery Solutions for SAP HANA® Tailored Data Center Integration
Staples investigating possible data breach_ -
Review: iPad Air 2 is gold for pros, less so for average joes - The Globe and Mail
More Hackers Targeting Mobile Phones to Get Bank Details: Kaspersky | NDTV Gadgets
'Malvertising' is the new weapon for cyberespionage: Research - The Times of India