Data Protection Starts with Everyone - Infosecurity Magazine
Malware Poses as Flash Update Infects 110,000 Facebook Users within 2 Days - Hacker News
DzHack Event 2015
WAHCKon Perth 2015
Detection On Wep Arp Request Replay Attack
Be Aware of Your Privacy and Security When Shopping Online - Security News - Trend Micro USA
IBM Systems Magazine Publishes ASPG Cryptography Expertise – Press Release Rocket
IBM Systems Magazine Publishes ASPG Cryptography Expertise
Detection On Deauthentication
The ‘Smart’ way to enhance VMware virtual machine’s performance | Symantec Connect
Watch "Researcher hacks drove with Maldrone malware" Video at SCMagazine
USArmyResearchLab/Dshell · GitHub
Nextpert: 6 tips to help with cyber security
UMass Medical Center reports possible data breach | Local News - WCVB Home
Maligno Video Series - Multiple Clients
Is Your Small Business Prepared for These 4 Big Compliance Risks? |
Exploring Control Flow Guard in Windows 10
Cyber Defense | SANS Instructor Paul Henry Shares Tips On How to Secure Your Organization's Infrastructure Using a Multi-layered approach | SANS Institute
The Hack That Warmed the World | Foreign Policy
Who will pay for the Internet of Things? - Telegraph
Maligno Video Series - Client Exe Generation - Pyinstaller
Linux GHOST vulnerability (CVE-2015-0235) is not as scary as it looks | Symantec Connect
Improving Your Privacy on Social Networks - Security News - Trend Micro USA
Scapy: Deauthentication Attack - Pentester Academy
Security priorities shifting to preventing breaches, improving internal controls | CSO Online
Does your mate send smut vids on Facebook? 1. That's a bit weird. 2. It may be malware • The Register
Hack of the Day: Wireless SSID Sniffer in 10 Lines of Python - YouTube
D-Link routers vulnerable to DNS hijacking
Schneier on Security: Friday Squid Blogging: Large Squid Washes up on Greek Beach
It’s Baaacck: Ransomware Returns with a Vengeance -
Hello World in Assembly
Be warned: Google enlists Chrome in push for encrypted Web - CNE
Debian Security Advisory 3147-1 ≈ Packet Storm
Online Dating Site Topface Pays Hacker To Not Reveal Email Addresses ≈ Packet Storm
Debian Security Advisory 3146-1 ≈ Packet Storm
Lift Conference 2015 | Lift Conference
McAfee Data Loss Prevention Endpoint Privilege Escalation ≈ Packet Storm
WhatsApp Profile Pic Privacy Blunder Discovered ≈ Packet Storm
NPDS CMS Revolution-13 SQL Injection ≈ Packet Storm
Getting “Eyes on the Glass” for Critical Infrastructure – Blog Post – RSA Conference
Bsides Columbus 2015 - Breaking Bad
Google Forced To Make Data Privacy Changes | Enterprise Security Today
SymantecVoice: How To Secure Your Personal Data In The Internet Of Things - Forbes
Not So Spooky: Linux "Ghost" Vulnerability
ZeroAccess botnet reactivates, click fraud activity resumes - SC Magazine
Report: From Q3 to Q4, 90 percent increase in global DDoS attacks observed - SC Magazine
D-Link routers subject to backdoor hacking, again- The Inquirer
Business Associates: A Greater Security Threat Than Hackers
UMass Memorial Medical Group reports data breach - Worcester Telegram & Gazette -
BCBS of Tennessee shares personal data on 80K in marketing campaign - SC Magazine
Super-cookie crumbles: Verizon vows to FINALLY kill off hated zombie stalkers • The Register
New Research Shows Global DDoS Attacks Grew 90% in Q4 2014 | The State of Security
Big insurer groups push Senate on cyber security bill | Business Insurance
Hackers blackmailed Silk Road underground | ZDNet
Malware uses video and tags to infect 100,000 people on Facebook | CSO Online
Kaspersky notes increase in legitimate certificates used to sign malware - SC Magazine
Schneier on Security: Co3 Systems Is Expanding into Europe
Pirate Bay relaunch labelled corporate malware risk - Computer Business Review
WhatsApp Web has privacy holes that expose user photos | Naked Security
Phishing quiz: Can you spot a scam when you see one? Don't be so sure - CBS News
The "Unicorn" Budget: Can CIOs And CFOs Agree On IT Spending? (with images, tweets) · symantec · Storify - Storage Reviews
Russian dating site rewards hacker for amassing email database and 'discovering vulnerability' - SC Magazine
Strong Authentication and the Trusted Mobile Device - YouTube
Bsides Columbus 2015 - Cloud And Virtualization Theory
Backdoor.Winnti attackers have a skeleton in their closet? | Symantec Connect
Report Global Disaster Recovery-as-a-Service Market Will Grow At Dramatic Rate
Reddit's first transparency report shows user info provided for 58 percent of requests - SC Magazine
Data Privacy and Online Gaming: Why Gamers Make for Ideal Targets - Security News - Trend Micro USA
Data Privacy Day: Why Data Privacy Awareness Is Important - Security News - Trend Micro USA
RSA Conference sur Twitter : "#RSAC keynote speaker Paul Kocher was inducted into the National #CyberSecurity Hall of Fame in November @rambusinc"
Kaspersky: DDoS Attack Can Cost a Company More Than $400K | Managed Security Services content from MSPmentor
Top 10 Internet Law Developments of 2014 (Forbes Cross-Post)
Bugtraq: [security bulletin] HPSBOV03226 rev.2 - HP TCP/IP Services for OpenVMS, BIND 9 Server Resolver, Multiple Remote Vulnerabilities
Cloud Insider Threat Survey
ZeroAccess botnet back in business | CSO Online
Trend Micro at VMware Partner Exchange 2015 -
Activity Info
BBC News - Office puts chips under staff's skin
WolfPAC Launches Next Generation Online Risk Based Business Continuity Planning Solution -- BOSTON, Jan. 30, 2015 /PRNewswire/ --
Rambus Cryptography Research Division Enters Agreement with Microsemi to Resell Advanced Security Technologies to Penetrate Opportunities in Government and Military Markets
BackBox Linux 4.1 released! | BackBox Linux
Industry backing Obama's cybersecurity agenda
Networking FAQ 2: Certifications -
Bsides Columbus 2015 - User Behavior Analysis
Top 4 Leading Providers of Gigabit Internet in 2015
Phishing scam tricks users by acting as fake child sex offender alert - SC Magazine
xHamster malvertising campaign exploits Adobe zero-day - SC Magazine
Teenager exposes WhatsApp profile pic privacy bug • The Register
Facebook, Instagram, and Tinder Were Down: What This Means for You - Security News - Trend Micro USA
Data Privacy in the Era of Sharing – Blog Post – RSA Conference
Bugtraq: [SECURITY] [DSA 3146-1] requests security update
Bugtraq: [SECURITY] [DSA 3147-1] openjdk-6 security update
QR Scanner | Capacité de protection contre les codes QR malveillants | Kaspersky Lab
New DYRE Variant Hijacks Microsoft Outlook, Expands Targeted Banks
The Importance of Effective Information Sharing | Cyber Trust Blog
Outlook for iOS app "breaks" corporate security, developer says | ZDNet
Disaster recovery grants help flood survivors rebuild in Larimer County - Estes Park Trail-Gazette
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network …
Bugtraq: ESA-2015-006: EMC Avamar Missing Certificate Validation Vulnerability
Superbowl XLIX Hype Deflated by Spam - Security News - Trend Micro USA
ITEXPO Panel: Sidestepping Security Hacks in a Mobile World
Google wireless service could disrupt carriers
Air-Gapped Computers Can Be Compromised Using EM Side-Channel Attacks, Says Researchers
IsAnybodyDown’s Craig Brittain banned from the ‘revenge porn’ business | Naked Security
2600 won't settle with the distributor that screwed it and all the other indie mags - Boing Boing
Zeus variant targeting Canadian banks, U.S. banks may also be a target - SC Magazine
A Global Black Market for Stolen Personal Data
Radware’s DefenseFlow with Cisco 3850 and OpenDaylight Controller - Demo - YouTube
Security Partners | Find or Become a Partner | Kaspersky Lab Indonesia
Symantec sur Twitter : "@FrankOKelly wise words"
6 Biggest Business Security Risks and How You Can Fight Back | CIO
UK official LOSES Mark Duggan shooting discs IN THE POST • The Register
Bsides Columbus 2015 - Plunder, Pillage And Print - The Art Of Leverage Multifunction Printers During Penetration Testing
Android in the Enterprise Part 2: 4 Steps for Protecting Against Threats on the Device | Symantec Connect
Office Puts Chips Under Staff's Skin ≈ Packet Storm
Outlook For iOS Security Fail ≈ Packet Storm
Financial Firm Infiltrated for Six Months With Off The Shelf Malware ≈ Packet Storm
Bugtraq: [SECURITY] [DSA 3145-1] privoxy security update
InnoTech taps ‘Dr. Z’ as 2015 keynote speaker - San Antonio Business Journal
Researchers show how easy it is to de-anonymize shoppers
How three small credit card transactions could reveal your identity | CSO Online
Zero Day Weekly: D-Link router hijack, China demands backdoors, critical Linux Ghost | ZDNet
Schneier on Security: Operating a Fake Bank
Could your business survive a cyber attack? - Kansas City Business Journal
Does size matter? It does if you’re French, and a chess-loving hacker! | Naked Security
Facebook to fill with (more!) kittens in Wickr’s message-hiding scheme | Naked Security
Reddit released its first transparency report
HITBSecConf2015 Amsterdam
How to install Windows 10 in a virtual machine | ExtremeTech - News and information from the UK contact centre | News and information from the UK contact centre industry
Nike+ FuelBand SE BLE Protocol Reversed
Dating site Topface buys back 20 million hacked email addresses | Naked Security
Security Experts Unite to Rewrite Proposed Cyber Laws | SecurityWeek.Com
How to protect yourself from phishing attacks
Identity theft prevention tips and assistance
Is The Internet of Things IPv6 Ready? - Forbes
GHOST glibc Vulnerability Affects WordPress and PHP applications - Hacker News
Crypto-Ransomware Spreads into New Territories - Security News - Trend Micro USA
Bsides Columbus 2015 - Common Sense Security Framework
UK watchdog grills big biz: So HOW do you use their 'consumer data'? • The Register
Cable’s next step: Offer “virtual” cellular service — Tech News and Analysis
Internet of Things: A security threat to business by the backdoor? | ZDNet
How to determine if insiders should be your primary concern
Nearly half of all DDoS attacks uses multiple attack vectors
Unvalidated Redirects: Security through Obscurity!
Generate Mozilla Security Recommended Web Server Configuration Files
Information Security News: 3 things CSOs can learn from CPOs
Information Security News: What every utility should know about the new physical security standard
Using Customer Data? Start With Clean Data
Super Bowl: costly spectacle amid heightened security and surveillance | Naked Security
Outlook for iOS does security STUPIDLY says dev • The Register
What IT workplace issues keep CIOs awake at night?
How people perceive online privacy
Positive Research Center: GHOST(dot)WEB: The First Blood
Malware don't need Coffee: CVE-2015-0311 (Flash up to integrating Exploit Kits
Bsides Columbus 2015 - Owasp Mobile Top Ten - Why They Matter And What We Can Do
New 'f0xy' malware is intelligent - employs cunning stealth & trickery
MSIL/Agent.PYO: Have botnet, will travel
GHOST gethostbyname() heap overflow in glibc (CVE-2015-0235) - SpiderLabs Anterior
Facebook patched flaw within 9hours - XML Cross Domain Vulnerability | VULNERABILITY MAGAZINE - Bug Bounties, Acknoweldgements & Security Research
Bugtraq: NEW VMSA-2015-0002 VMware vSphere Data Protection product update addresses a certificate validation vulnerability
Bugtraq: [SECURITY] [DSA 3144-1] openjdk-7 security update
Ghost Flaw Still Haunting Linux Despite Patching Efforts : PERSONAL TECH : Tech Times
A docket, tweet and selfie can reveal your identity, boffins find • The Register
Pentesting Windows Endpoints: Automatic Outbound Open Port Detection
Beware the Unwitting Insider Threat -
OAS hails Jamaica's cyber security efforts - News -
Clearing the Air with Gogo Inflight Internet
Bsides Columbus 2015 - Got Software? Need A Security Test Plan? Got You Covered.
Microsoft's decision to ditch Surface is a long-overdue mercy killing for Windows R
Threats and technologies of a shifting data security landscape
2015: Trends in network performance measurement and application virtualization - SC Magazine
Habits Are Formed By Repetition, Not Reminders
Security of Home Surveillance Cameras | Security Intelligence Blog | Trend Micro
Samsung's $100 Million Internet of Things Bet Is Even Crazier Than You Think | Fast Company | Business + Innovation
Sony hack serves as wake-up call, boosts interest in cyber security protocol | Business Insurance
We take bots down, but they get up again – you're never going to keep them down • The Register
Bsides Columbus 2015 - Corporate Wide Ssl Interception And Inspection
iTunes Connect does developer shuffle • The Register
Insider Threat Alert as Spokesman Allegedly Leaks Private Data - Infosecurity Magazine
Kaspersky Lab sur Twitter : "Time to #TestYourBrain! Do you know the answer?"
5 Critical Cloud Security Practices - InformationWeek
3 things CSOs can learn from CPOs | CSO Online
POS Terminals Rich Vein for Gold-Digging Hackers | Cybersecurity | TechNewsWorld
Cisco 2015 Annual Security Report: Top Takeaways - YouTube
Challenge 19: HTML Injection IV Solution
Luna smart mattress will turn off lights when you go to sleep, get coffee ready when you’re waking up - News - Gadgets and Tech - The Independent
Bsides Columbus 2015 - How To Rapidly Prototype Machine Learning Solutions To Solve Security Problems
Companies That Take Social Media Security Lightly Won't Be Able To Hack It In 2015 01/28/2015
Ransomware: Refusing to Negotiate with Attackers Local News in Norwalk, Wilton, Westport, Weston, Stamford
Winnti trojan may help set stage for Skeleton Key attacks, analysts say - SC Magazine
How to Detect the GHOST glibc Vulnerability
The end for 1024-bit SSL certificates is near, Mozilla kills a few more | CSO Online
Local news from Rock Hill, SC | The Herald
FTC settles with revenge porn site operator - SC Magazine
Celebrity hacks – why do they continue?
High Availability and Disaster Recovery with SQL Server 2014 AlwaysOn Availability Groups | Windows IT Pro
Jacob Cord 程信哲 on Twitter: "@2600 I got blocked by @TENenthusiast for this one tweet last year:"
Shmoocon 2015 Videos: Playlist Version : Free Download & Streaming : Internet Archive
Facebook and Instagram deny being hacked - Telegraph
Obama talks cybersecurity legislation in State of the Union - SC Magazine
Bsides Columbus 2015 - A Basic Guide To Advanced Incident Response
Cisco Email Security Stays Ahead of Current Threats by Adding Stronger Snowshoe Spam Defense, AMP Enhancements, and More…
Investing, Trading and Retirement - E*TRADE Financial
5 Tricks That Fraudsters Use to Target eGaming Operators Free Playbook
What do China, FBI and UK have in common? All three want backdoors in Western technology • The Register
TRH Health Plan notifies 80,000 members of potential data breach
BBC News - Data from death inquiries lost by Ministry of Justice
Hoff sur Twitter : "Yeah. Two giant brains of networking and @JuniperNetworks #BGP #MPLS #CIDR #VPLS"
Matt Stephenson sur Twitter : "@ScottSpiker @ChristianMcM the calm cool head of the C-Suite #dirtytopics"
Prosecutors Trace $13.4M in Bitcoins From the Silk Road to Ulbricht's Laptop | WIRED
StealthGenie spyware goes kaput following court ruling - SC Magazine
It takes more than compliance to protect against cybercriminals
Symantec sur Twitter : "Welcome to #DirtyTopics chat about forming a strong #CIO #CFO partnership. We'll be discussing #ITbudget & IT ROI."
Fortinet FortiOS Denial Of Service / Man-In-The-Middle ≈ Packet Storm
ManageEngine File Download / Content Disclosure / SQL Injection ≈ Packet Storm
Slackware Security Advisory - glibc Updates ≈ Packet Storm
Latest Gadgets | Mobiles | Tablets | Android apps | Social Media | Tech News: Google Fiber Launched In Four Cities Coming With 1GBPS Internet
Bugtraq: Reflected XSS vulnarbility in Asus RT-N10 Plus Router
Bugtraq: Unauthenticated Reflected XSS vulnarbility in Asus RT-N10 Plus router
Admin Alert: Kaspersky Lab Reports Twice as Many Digital Certificates Used to Sign Malware in 2014 | Kaspersky Lab US
FTC's "Things" report has too much faith in present to secure future | ZDNet
The (ISC)²® Board of Directors Elects 2015 Officers | Business Wire
New Chinese cybersecurity policies require U.S. companies to hand over source code - SC Magazine
CVE-2014-4113 Windows Privilege Escalation Analysis ≈ Packet Storm
VSAT SAILOR SAT COM 900 Password Change ≈ Packet Storm
Exim ESMTP GHOST Denial Of Service ≈ Packet Storm
Customer Story - Rush University Medical Center - Trend Micro USA
What the Sony Hack Means for Critical Infrastructure – Blog Post – RSA Conference
USF awarded grant to study cybersecurity
Make sure ex-employees don’t walk out the door with your data | CSO Online
SCO presents rules of information security to UN | Vestnik Kavkaza
Upatre, Dyre used in Univ. of Florida attack - SC Magazine
GitHub raises max bug bounty award to $10K - SC Magazine
Are Your Passwords At Risk?
go-junos & Junos Space
Digital Reputation: Can’t Buy it, Gotta Earn It
Canada's spy agency monitors file downloads around the world
Wisconsin chiropractic clinic notifies 3,000 patients of insider breach - SC Magazine
The Internet of Dangerous Things — Krebs on Security
Two-Factor Authentication Transforms Even ‘123456’ Into a Secure Password
SymantecVoice: The "Unicorn" Budget: Can CIOs And CFOs Agree On IT Spending? - Forbes
The State of Security this Past Year is a Just a Glimpse of What’s to Come in 2015 | SecurityWeek.Com
Card Breach Hints at Lingering Concerns - BankInfoSecurity
Bsides Columbus 2015 - Supply And Demand: Solving The Infosec Talent Shortage
Email Turns 44 in 2015 [Infographic]
Business continuity briefs
Interview with Accuvant co-founder Dan Wilson
The Hacker News sur Twitter : "#Security #php #SQLi and yes, #Concerned"
SANS Institute to Bring Cybersecurity Training to Houston | SANS Institute: Press
SupportCenter Plus 7.9 Cross Site Scripting ≈ Packet Storm
Asterisk Project Security Advisory - AST-2015-001 ≈ Packet Storm
Microsoft Windows Server 2003 SP2 Arbitrary Write Privilege Escalation ≈ Packet Storm
Adobe Flash 0-Day Vulnerability Serves Up Bedep Malware on Adult Website
It's Not Easy to Determine Costs of Data Breach - eSecurity Planet
New business collaboration platform secures data with personalized cryptography
3 Simple Steps to improve your Company’s Security DNA | AlienVault
Bugtraq: Blubrry PowerPress Security Advisory - XSS Vulnerability - CVE-2015-1385
Cisco Seminar Series 2015 North America Roadshow
Breaches are a personal nightmare for corporate security pros - ARN
Federal cyber security rules should learn from industry guidelines
WordPress Photo Gallery 1.2.8 SQL Injection ≈ Packet Storm
Cracking The Hadoop User Experience ≈ Packet Storm
WordPress Photo Gallery 1.2.8 Cross Site Scripting ≈ Packet Storm
Uncommon Sense Security: RSA Conference’s new crowdsourced submissions program
Cyber sleuths find 'smoking gun' linking British spy agency to Regin malware
Bugtraq: CVE-2014-8779: SSH Host keys on Pexip Infinity
Suits and Spooks DC 2015: The Agenda - Last Chance to Register
Worst passwords of 2014
Swiss bank on safe haven label to become world's data vault
Lawmakers offer bipartisan data security bill | TheHill
US military explores biometric replacement for passwords | ZDNet
US Tech Firms Ask China To Postpone 'Intrusive' Rules ≈ Packet Storm
Red Hat Security Advisory 2015-0100-01 ≈ Packet Storm
Dutch Judge Allows Russian Hacker To Be Sent To US ≈ Packet Storm
Bugtraq: Cisco Security Advisory: GNU glibc gethostbyname Function Buffer Overflow Vulnerability
Bugtraq: [The ManageOwnage Series, part XII]: Multiple vulnerabilities in FailOverServlet (OpManager, AppManager, IT360)
Intel Security to Deliver Keynote at ITEXPO Miami 2015
Measuring the impact of government cyber security initiatives on enterprise | Information Age
Coast Guard holds cyber security exercise at UH Manoa - Washington Times
The (ISC)²® Foundation Opens Application Period for 2015 Women’s Information Security Scholarships and Faculty Exam Vouchers | Virtual-Strategy Magazine
Mantis BugTracker 1.2.19 Open Redirect ≈ Packet Storm
House Subcommittee Hears Testimony On Data Breach Law ≈ Packet Storm
FreeBSD Security Advisory - Kernel Memory Disclosure / Corruption ≈ Packet Storm
Snowden reveals LEVITATION technique of Canada’s spies • The Register
Contact Information | Contact Us | Kaspersky Lab AU
Criminals holding compromised websites for ransom | CSO Online
Bsides Columbus 2015 - Do We Still Need Pen Testing?
المتجر الالكتروني. اشتر برامج مكافحة الفيروسات كاسبرسكي عبر الموقع
Android in the Enterprise Part 1: Challenges of Android | Symantec Connect
The GHOST vulnerability – what you need to know | Naked Security
CSR Impact Story: CyberPatriot Networking United States @ Cisco
Data breach loss capped at $500,000
OnX Managed Services and BTB Security Partner for Enhanced Security Solutions - Yahoo Finance UK
Athena and Intrinsic-ID Team to Deliver the Dragon-QT Security Processor Offering Flexible, Scalable Security for Hardware Root of Trust Applications
Top 10 Security Vendors To Watch In 2015 - Page: 5 | CRN
RSA Conference sur Twitter : "#TBT to the #cryptographers' panel at #RSAC 2014. RT if you were there!"
Capella University Offers New Graduate Certificates in Digital Forensics and Network Defense | Virtual-Strategy Magazine
AVG Technologies to Announce Financial Results | AVG Now Blog
Schneier on Security: Canada Spies on Internet Downloads
IBM punts cryptotastic cloudy ID verification services • The Register
Click-fraud ZeroAccess botnet rises from the ashes | ZDNet
Three key (business continuity) questions that CEOs need to ask - ITWeb Africa
These Are the Hottest New Open Source Projects Right Now | WIRED
Hotels that block personal Wi-Fi hotspots will get busted, says FCC | Naked Security
17-Year-Old Found Bugs in WhatsApp Web and Mobile App - Hacker News
Cisco Security sur Twitter : "Come check out these beauties at the #security booth! #CLEUR"
Data breach loss capped at $500,000 | Business Insurance
Dallas, TX PCI QSA Services Now Offered by the Texas Payments Experts at NDB Advisory
Comprehensive Global PCI Security Policies Packet Offered for Instant Download from the PCI DSS Specialists at | Virtual-Strategy Magazine
Can your disaster recovery plan save your business? | Information Age
Cop who stole nude photos from arrested women’s phones escapes jail | Naked Security
Why data privacy and security should be a boardroom issue | Information Age
US Military wants “cognitive fingerprints” to replace passwords | Naked Security
Weaving the Web from the Crowd Could Make It More Resilient | MIT Technology Review
Email scammers stole $215M from businesses in 14 months
Google says it fought gag orders in WikiLeaks investigation - The Washington Post
Bsides Columbus 2015 - Trolling Attackers For Fun &Amp; Profit
SSCC 183 – It’s Data Privacy Day! Do something! [PODCAST] | Naked Security
Guidance to improve risk management and Io
Cisco Security sur Twitter : "At #CLEUR? Stop by our booth to talk with our #security experts! @CiscoLiveEurope"
Could Your Apps Be Putting Your Smartphone At Risk?
Want to spy on your wife? Change your grades? Hire a hacker! | Ars Technica
Crossword Cybersecurity Plc: Commercialisation Agreement with Bristol University Cryptography & Information Security Group
How much can a DDoS attack cost your organization?
Why you should celebrate Data Protection Day 2015
Companies need to be custodians of customer data, not owners
Market share of antivirus vendors and products
Swiss users inundated with malware-laden spam
Top smut site Flashes visitors, leaves behind nasty virus • The Register
Will 2015 Data Security Be Different Than 2014? | SecTechno
Bsides Columbus 2015 - Inurl:Robots.Txt-What Are You Hiding?
Survey finds increasing demand for disaster recovery solutions amongst US small and medium sized businesses
NLSIU wants cyber security lessons in schools, colleges - The Economic Times
A Manifesto for Cyber Resilience
Local banks react to data breach - Temple Daily Telegram: News
» Cloud Connections Bolster In-Vehicle Systems Navigant Research
contagio mobile: Android Hideicon malware samples
Marco Ramilli's Blog: Romantic Cyber Attack Process
ZeroAccess botnet resumes click-fraud activity after six-month break | Dell SecureWorks Security and Compliance Blog
Quantum Entanglement Now On-a-Chip | EE Times
Mozilla dusts off old servers, lights up Tor relays • The Register
UH hosts national cyber security exercise - Ka Leo O Hawaii: News
Bsides Columbus 2015 - Malware Development As The Evolution Of Parasites
How GitHub is redefining software development
Business Continuity: 4 Core Principles to Be Successful | Patrick Duroseau
GHOST glibc gethostbyname() vulnerability CVE-2015-0235 - YouTube
CVE-2015-0235: A GHOST in the Machine
Netflix is upgrading its cloud architecture for scale | Business Cloud News
McAfee January #SecChat on Thu, Jan 29 @ 11am. #SecChat
Researcher says Aussie spooks help code Five Eyes mega malware • The Register
Making improved authentication second nature to users - SC Magazine
Bsides Columbus 2015 - Snort Beyond Ids: Open Source Application And File Control
Turning Mobility to a Winning Advantage | Symantec Connect
World's Largest DDoS Attack Reached 400Gbps, says Arbor Networks | CIO
Privacy Tips |
Password Practices at Businesses Fall Short of Secure
UH to host national cyber security exercise - Ka Leo O Hawaii: News
A Heroin Dealer Tells the Silk Road Jury What It Was Like to Sell Drugs Online | WIRED
Mobile Virtualization: Solving the BYOD Problem - Security News - Trend Micro USA
Course Introduction
Apple iOS 8.1.3 Release Will Again Anger Users - Forbes
FTC calls on IoT vendors to protect privacy | PCWorld
7 Smart Ways to Ensure Data Privacy - J-Net Community
What I'll Do With My Parents' Facebook After They Die - The Atlantic
Installation Tutorial - Waidps - Wireless Auditing Intrusion Detection And Prevention System On Kali
Google Cloud Platform Blog
Malware infects payment card system at French Lick Resort - SC Magazine
Could the Sony breach have been prevented? - SC Magazine
Don’t be Shellshocked by GHOST | The State of Security
FTC publishes security recommendations for IoT device makers - SC Magazine
How Vetting Mobile Apps Works for App Stores and Its Users - Security News - Trend Micro USA
Highly critical “Ghost” allowing code execution affects most Linux systems | Ars Technica
House subcommittee hears testimony on data breach law - SC Magazine
'GHOST' bug in Linux library enables remote takeover of victim's system - SC Magazine
SANS 575 Review | Digital Forensics Tips
Businesses warned about new espionage campaigns from of China | CSO Online
CABG linked to better outcomes than PCI, but at higher price | Cardiology
Mandatory PCI DSS 3.0 Updates for Businesses Accepting Credit Cards - Record
SANS 2015 Enterprise Mobile Workspace Survey
Search Like A Boss
GHOST Vulnerability and its Patch History
How organizations can prepare for 2015 data privacy legislation - SC Magazine
Stop, think, connect: safeguarding your online reputation - Lumia Conversations
Researchers Tie Qwerty Keylogger to Regin Malware Platform | SecurityWeek.Com
8 ways to celebrate Data Privacy Day securely - Computer Business Review
It's Data Privacy Day--do you know where your info is?
DDOS attack size up 50-fold over past decade | CSO Online
Azimuth Security: BlackPwn: BlackPhone SilentText Type Confusion Vulnerability
In 2015, Omnichannel And Big Data Will Bring Channel Marketing To The Next Level | Channel Marketer Report
Cybersecurity is a mess, but Obama can learn a few things from Estonia – and Eugene Kaspersky – Quartz
Hacking Exposed Computer Forensics Blog
Automating the Incident Response Process - SANS Institute
Wireless Auditing Intrusion Detection And Prevention System - Switching Of Display Information
Short, sharp spam attacks aiming to spread Dyre financial malware | Symantec Connect
Bugtraq: [SECURITY] [DSA 3143-1] virtualbox security update
Canada Joins World Powers in Spying on Smartphone and Download Data | WIRED
Instant Anonymity: Are Ephemeral Apps Really Safe? - Security News - Trend Micro USA
TEN: The Enthusiast Network - Wikipedia, the free encyclopedia
4 obstacles keeping traditional IT from moving to cloud - Thoughts on Cloud
Nonprofit Brings Technology To Disaster Recovery - Forbes
Dutch judge OKs alleged Russian hacker extradition to U.S. - SC Magazine
Data Privacy and Convenience: Can We Have Both? - J-Net Community
Light Reading
Targeted Scam Cost Businesses $215 Million Using Fraudulent Wire Transfers
GHOST in the Linux Machine – CVE-2015-0235
Data Privacy Day in a World of Cloud Computing | Cyber Trust Blog
Ransomware 101: What It Is and How It Works - Security News - Trend Micro USA
SANS Institute Returns to Northern Virginia for Cybersecurity Training Event | SANS Institute: Press
Thought Experiment: Mandatory Online Banking Security Standards
Four Basic Steps to Protecting Your Digital Privacy in 2015 | Internet Society
SXSW 2015: The Challenges Facing Women in Tech
Two-Factor Authentication Transforms Even ‘123456’ Into a Secure Password  « VPN Haus
How To Conduct An Information Security Gap Analysis | CIO
Researcher commandeers drone through Maldrone backdoor - SC Magazine
Watch "Silent Circle asks consumers about mobile privacy" Video at SCMagazine
Bugtraq: Multiple vulnerabilities in MantisB
A peek inside Apple’s R&D wish list. TV reimagined? | Toronto Star
ClearDATA to Provide Disaster Recovery and HIPAA-Compliant Cloud Solution for Henry Schein's Dentrix Enterprise Practice Management Software
Massive DEA license plate reader program tracks millions of Americans | Naked Security
CyLon aims to help London-based security startups - SC Magazine
Watch "FTC releases in-depth IoT report" Video at SCMagazine
VPO Press Release - PAM4 Analysis, USB 3.1 Compliance, DDR Debug, PCI Express Link Equalization, and 100 GHz Oscilloscope Capabilities Showcased at DesignCon 2015
Data Privacy Day 2015 – Putting people in control - Microsoft on the Issues
Bsides Winnipeg - Michael Zapp - Ssd Security Risks
Bugtraq: [CVE-2015-1393] Photo Gallery (Wordpress Plugin) - SQL Injection in Version 1.2.8
Bugtraq: Two XSS Vulnerabilities in SupportCenter Plus
Convicting the Silk Road founder won't stop the booming digital drug trade | Mike Power | Comment is free | The Guardian
A Single DDoS Attack Can Cost A Company More Than $400,000 | Kaspersky Lab US
Old arguments may bog down US data breach notification legislation | ITworld
RSA Conference sur Twitter : ""
Radware Integrates Platforms with Cisco Application-Centric Infrastructure
Bugtraq: [CORE-2015-0003] - FreeBSD Kernel Multiple Vulnerabilities
Bugtraq: NEW VMSA-2015-0001 - VMware vCenter Server, ESXi, Workstation, Player, and Fusion updates address resolve security issues
ClearDATA to Provide Disaster Recovery and HIPAA-Compliant Cloud Solution for Henry Schein's Dentrix Enterprise Practice Management Software - MarketWatch
Day One Posters — Juniper Networks
Defeat The Casual Attacker First!!
Data Privacy Day on Livestream
IR Event Log Analysis - SANS Institute
Lack of encryption makes official NFL mobile app a spear phisher’s dream | Ars Technica - image uploaded by @DataPrivacyDay
International Privacy Day: Protect Your Digital Footprint | Stewart Wolpin
New Veritas Name Blends our History and Vision for Tomorrow’s Data Challenges | Symantec Connect
2600 Magazine as DRM-free Kindle, PDF ebooks - Boing Boing
Vormetric sur Twitter : "We are thrilled to present Encrypto @RSAConference this year #DataDefenseLeague #DefenderofData #RSAC"
From Point Solutions to Application Centric Services: Cisco ACI and Radware | Radware Blog
Value Investing | Market Insight of Investment Gurus
Spy Ghana News-Latest News, Breaking News, Ghana Business, Sports, Politics News
Today's CIO @ The C Suite - Information Security: The 3 Key Governance Challenges of the CIO
The New Year Security Checklist: Security Resolutions for 2015 - Security News - Trend Micro USA
Microsoft’s big task: Replicating Windows-Office success in cloud — Tech News and Analysis
Cosentry Teams With EMC and 451 Research for Disaster Recovery Webinar
Facebook’s privacy class action lawsuit to be heard on 9 April | Naked Security
Schneier on Security: Subconscious Keys
PCI Council Champions Global Data Privacy Day | Business Wire
Ghost Linux Bug Haunting Red Hat And Ubuntu Systems ≈ Packet Storm
Scouts Take Down Database Due To Security Vulnerabilities ≈ Packet Storm
Hacker For Hire Site Surfaces, Has Trouble Staying Up ≈ Packet Storm
The Practical Guide to HIPAA Privacy and Security Compliance – Blog Post – RSA Conference
Reactions to the serious vulnerability found in Glibc
Scouts take down database due to 'security vulnerabilities' • The Register
Critical BlackPhone bug allows attackers to spy on users
Cisco Security sur Twitter : "Have you stopped by our #CLEUR booth yet? Find out the latest in #security from our experts!"
Bsides Winnipeg - Yvan Boily - Security In The Open
Spying program leaked by Snowden is tied to campaign in many countries| Reuters
Symantec Cyber-Resilent Enterprise
The new norm — PCI DSS v3.0 takes effect | Briefings | The Lawyer
About |
Ultra-secure Blackphone Vulnerability lets Hackers Decrypt Texts - Hacker News
Old arguments may bog down US data breach notification legislation | CSO Online
Bughunter cracks “absolute privacy” Blackphone – by sending it a text message | Naked Security
Search Google without being tracked: Abine adds Private Search to Blur | ZDNet
Infamous Regin malware linked to spy tools used by NSA, Five Eyes intelligence | ZDNet
I ain't afraid of no GHOST – securo-bods • The Register
Google defends policy that leaves most Android devices unpatched | Computerworld
No, Department of Justice, 80 Percent of Tor Traffic Is Not Child Porn | WIRED
Turns Out Apple Pay Can't Solve Credit Card Fraud | Gizmodo UK
'Ghost' vulnerability poses high risk to Linux distributions | CSO Online
How important is online privacy?
New OS X Yosemite version fixes critical security issues, including Thunderstrike
Cisco Security sur Twitter : "#CLEUR | Join @mroesch today at 15:30 for his session on Embracing the Open-Source Model #security"
CVE-2015-0235 - how to handle the "GHOST" vulnerability affecting Linux distributions
Security vulnerability in Blackphone service exposed | ZDNet
The “Dirty Dozen” SPAMPIONSHIP: Who’s the biggest? Who’s the worst? | Naked Security
Ubisoft yanks keys for online games purchased via unauthorised parties | Naked Security
5 things you can do to limit your exposure to insider threats | CSO Online
Hijacking drones with malware
New Legislation on Threat Intelligence Sharing May Have a Chance
Information Security News: World's largest DDoS attack reached 400Gbps,says Arbor Networks
Information Security News: Northrop Grumman Foundation Congratulates Top 28 Teams Advancing to CyberPatriot National Finals Competition
Join Symantec at LegalTech NY | February 3-5, 2015 | Symantec Connect