NetSecu

www.fool.com
www.fool.com
Why Palo Alto Networks Rallied 87% in 2014 (PANW)
sdtimes.com
sdtimes.com
The Detekt government spyware detection tool, a speech recognition software competition, and Google acquires RelativeWave—SD Times news digest: Nov. 20, 2014 - SD Times
www.consumeraffairs.com
www.consumeraffairs.com
FTC shuts down two more tech-support scammers
indianexpress.com
indianexpress.com
The Android 5.0 Lollipop aam aadmi review: I think I’ve made a terrible mistake | The Indian Express
community.websense.com
community.websense.com
Webcast: Preparing for Big Data and the Internet of Things - Websense Insights
www.usatoday.com
www.usatoday.com
Uber tracking raises privacy concerns
www.biztechmagazine.com
www.biztechmagazine.com
Businesses Prepare as End-of-Life for Windows Server 2003 Nears — BizTech
www.zdnet.com
www.zdnet.com
NSA chief admits China could cripple U.S. power grid, financial networks | ZDNet
www.christiantoday.com
www.christiantoday.com
Nexus 9 vs Nokia N1: Buy now or wait a bit longer? | Christian News on Christian Today
www.halifaxcourier.co.uk
www.halifaxcourier.co.uk
Halifax homes spied on by camera hackers - Halifax Courier
www.cmswire.com
www.cmswire.com
Customers Aren't Worried About Data Breaches [Infographic]
www.businessweek.com
www.businessweek.com
Foreign Governments Have Hacked U.S. Grid, NSA Head Says - Businessweek
www.thetimes.co.uk
www.thetimes.co.uk
Hacking, hitmen and high stakes in biggest ever cyberwar exercise | The Times
thehackernews.com
thehackernews.com
Firing Range — Open Source Web App Vulnerability Scanning Tool From Google
learningportal.juniper.net
learningportal.juniper.net
Activity Info
www.schneier.com
www.schneier.com
Schneier on Security: Pre-Snowden Debate About NSA Call-Records Collection Program
www.scmagazine.com
www.scmagazine.com
SC Congress Chicago 2014: Make FBI an ally after breach - SC Magazine
www.chainstoreage.com
www.chainstoreage.com
Survey: Breaches don’t change consumer behavior | Chain Store Age
blog.trendmicro.com
blog.trendmicro.com
Tracking Activity in the Chinese Mobile Underground | Security Intelligence Blog | Trend Micro
www.marketwired.com
www.marketwired.com
Actiance Recognized in Gartner 2014 Magic Quadrant for Enterprise Information Archiving
www.washingtonpost.com
www.washingtonpost.com
Apple’s Mac computers can automatically collect your location information - The Washington Post
www.slate.com
www.slate.com
Federal Trade Commission busted two telemarketing schemes selling fake tech support, raking in $120 million.
www.marketwatch.com
www.marketwatch.com
Imperva Expands Big Data Protection with SecureSphere 11.0 - MarketWatch
www.toptechnews.com
www.toptechnews.com
Microsoft Patches Critical Windows Server Flaw - Microsoft/Windows on Top Tech News
www.pcmag.com
www.pcmag.com
AVG Protection PRO Review & Rating | PCMag.com
www.gamerheadlines.com
www.gamerheadlines.com
Antivirus Comparisons: Kapersky Antivirus vs. G Data Total Protection
home.bt.com
home.bt.com
How to protect yourself online - B
fcw.com
fcw.com
NSA director predicts major cyberattack by 2025 -- FCW
www.gamerheadlines.com
www.gamerheadlines.com
Avast Free AntiVirus vs AVG AntiVirus - Which Free Antivirus is best for you
www.securitytube.net
www.securitytube.net
Owasp Appsecusa 2014 - Your Password Complexity Requirements Are Worthless
www.scmagazine.com
www.scmagazine.com
Buffer overflow vulnerabilities identified in Hikvision DVR devices - SC Magazine
www.zdnet.com
www.zdnet.com
Open-source IaaS: OwnCloud 7 Enterprise Edition arrives | ZDNet
www.thenewamerican.com
www.thenewamerican.com
Forty-two Senators Block USA Freedom Act to Limit NSA Surveillance
www.rferl.org
www.rferl.org
British Watchdog Wants Russian Hacking Site Shut
www.washingtonpost.com
www.washingtonpost.com
Lawmaker: Delayed notification of postal hacking ‘doesn’t fly’ - The Washington Post
www.scmagazine.com
www.scmagazine.com
Android malware 'NotCompatible' evolves, spawns resilient botnet - SC Magazine
googleonlinesecurity.blogspot.it
googleonlinesecurity.blogspot.it
Google Online Security Blog: Ready, aim, fire: an open-source tool to test web security scanners
www.scmagazine.com
www.scmagazine.com
USPS draws ire of Congress over data breach response - SC Magazine
blogs.microsoft.com
blogs.microsoft.com
New Strategies and Features to Help Organizations Better Protect Against Pass-the-Hash Attacks | Cyber Trust Blog
www.dailymail.co.uk
www.dailymail.co.uk
Hackers use radio signals to steal private information from PCs OFFLINE | Daily Mail Online
abcnews.go.com
abcnews.go.com
NSA Director Worries Some Nations Hacking Into Computer Networks to Shut Down US Utilities - ABC News
www.digitaljournal.com
www.digitaljournal.com
Actiance Recognized in Gartner 2014 Magic Quadrant for Enterprise Information Archiving - Press Release - Digital Journal
www.zdnet.com
www.zdnet.com
Amazon promises to run entirely on renewable energy... finally | ZDNet
www.newser.com
www.newser.com
NSA director confirms China, other countries can hack into and shut down critical systems - 11/20/2014 10:24:02 AM | Newser
www.talkradionews.com
www.talkradionews.com
U.S. Cyber Commander Expects Attack Before 2025Talk Radio News Service
www.opendemocracy.net
www.opendemocracy.net
Brazil doubles down on cyber security

 | openDemocracy
www.padgadget.com
www.padgadget.com
More Scare Tactics From the Government Regarding Apple’s Super Secure iMessages | PadGadget
www.consumerelectronicsnet.com
www.consumerelectronicsnet.com
Viptela Partners With Zscaler in Industry-First Integration of SD-WAN and Cloud Security Infrastructure
www.esecurityplanet.com
www.esecurityplanet.com
Australian Government Data Breach Linked to Poor Security Training - eSecurity Planet
www.kabc.com
www.kabc.com
TalkRadio 790 KABC - How Russian Website Is Spying on Thousands of Private Moments [From ABC News]
www.computerworld.com
www.computerworld.com
IT needs to stop pretending it's not responsible for cloud security | Computerworld
www.youtube.com
www.youtube.com
Move Your Network to the Cloud - YouTube
www.eweek.com
www.eweek.com
Five Steps to PCI DSS Compliance
www.infosecisland.com
www.infosecisland.com
Security or Checking a Box?
www.channelpartnersonline.com
www.channelpartnersonline.com
Tech Data Partners Get Cisco Cybersecurity Solutions
www.kyivpost.com
www.kyivpost.com
Financial Times: NATO holds largest cyber war games
www.fiercegovernmentit.com
www.fiercegovernmentit.com
USPS delayed breach notification so as not to tip off hackers - FierceGovernmentI
www.nbcnews.com
www.nbcnews.com
Russian Webcam Hackers Spy on Bedrooms and Offices - NBC News
www.itworldcanada.com
www.itworldcanada.com
Azure vs. AWS | IT World Canada Syndicated
fox8.com
fox8.com
Russian hackers streaming video from thousands of private webcams | fox8.com
www.wired.com
www.wired.com
Amazon Vows to Run on 100 Percent Renewable Energy | WIRED
www.good4utah.com
www.good4utah.com
New crash tests reveal which minivans are safe - Good4Utah.com
www.doctorslounge.com
www.doctorslounge.com
Risk of Adverse Outcomes Up With PCI In Adults With Diabetes --Doctors Lounge
www.networkcomputing.com
www.networkcomputing.com
Mobile Internet Faces Big Obstacles - Network Computing
twitter.com
twitter.com
Juniper Networks sur Twitter : "We’re thrilled to win the @TSIACommunity STAR Award for Innovation in Enabling Customer Success in Support Services! http://t.co/rQCP6eouHb"
www.infosecisland.com
www.infosecisland.com
Access Governance 101: Job Changes and Elevated Permissions
greece.greekreporter.com
greece.greekreporter.com
Greek Hackers Breach Legal Database | GreekReporter.com
www.arnnet.com.au
www.arnnet.com.au
Gartner's cloud showdown: Amazon Web Services vs. Microsoft Azure - ARN
www.hstoday.us
www.hstoday.us
Homeland Security Today: Destructive Malware Evades Detection to Cause Multi-million Dollar Losses
www.bizjournals.com
www.bizjournals.com
How to reduce your risk of a cyber security breach - The Business Journals
abcnews.go.com
abcnews.go.com
Poland Opens Probe Into Electoral Hacking - ABC News
phys.org
phys.org
Polish election commission website hacked
www.securitytube.net
www.securitytube.net
Owasp Appsecusa 2014 - Clientside Security With The Security Header Injection Module Shim
www.zdnet.com
www.zdnet.com
High volume DDoS attacks rise in Q3 2014 | ZDNet
www.portagedailygraphic.com
www.portagedailygraphic.com
PCI helps kids globally | Portage Daily Graphic
www.fiercetelecom.com
www.fiercetelecom.com
Verizon enhances cloud purchasing experience with new marketplace - FierceTelecom
www.cbsnews.com
www.cbsnews.com
Russian-backed website hacks into thousands of webcams in U.S. - CBS News
www.reuters.com
www.reuters.com
Hackers to probe cyber crime defences at British banks| Reuters
www.shanghaidaily.com
www.shanghaidaily.com
Cyberspace calls for better coordinated governance | Shanghai Daily
www.buzzfeed.com
www.buzzfeed.com
ESPN Student Reporter Makes Jameis Winston Joke During FSU Shooting, Claims Hacking
www.cbc.ca
www.cbc.ca
Hackers post webcam, security camera, baby monitor video online - Technology & Science - CBC News
www.theatlantic.com
www.theatlantic.com
Can Hackers Get Into Your Pacemaker? - The Atlantic
www.darkreading.com
www.darkreading.com
Enter The Digital Risk Officer
www.kktv.com
www.kktv.com
Russian Hackers Posting Baby Monitors, Web Cams Online
packetstormsecurity.com
packetstormsecurity.com
Exploiting Sudo's Grace Period ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Paid Memberships Pro 1.7.14.2 Path Traversal ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
CryptoPHP - Analysis Of A Hidden Threat Inside Popular Content Management Systems ≈ Packet Storm
twitter.com
twitter.com
RSA Conference sur Twitter : "The mantra of any good security engineer is: 'Security is a not a product, but a process.' -@Bruce_Schneier http://t.co/5jvqxQnqrn"
www.net-security.org
www.net-security.org
Detekt government surveillance spyware on your computer
seclists.org
seclists.org
Bugtraq: [SECURITY] [DSA 3075-1] drupal7 security update
www.wired.com
www.wired.com
Swedish Court Rejects Julian Assange's Appeal to Dismiss His Arrest | WIRED
nakedsecurity.sophos.com
nakedsecurity.sophos.com
Hackers blamed for unusual tweets from Jeremy Clarkson, Columbian FARC rebels | Naked Security
seekingalpha.com
seekingalpha.com
FireEye: A Next-Generation Cyber Security Play - FireEye, Inc. (NASDAQ:FEYE) | Seeking Alpha
packetstormsecurity.com
packetstormsecurity.com
Mandriva Linux Security Advisory 2014-217 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
WordPress CM Download Manager 2.0.0 Code Injection ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Advantech AdamView 4.3 Buffer Overflow ≈ Packet Storm
forums.juniper.net
forums.juniper.net
Spotlight Secure - Actionable threat intelligence - J-Net Community
thatguy.trendmicro.com
thatguy.trendmicro.com
Secure Apps & Mobile Devices – Don’t be that Guy – Trend Micro
www.pekintimes.com
www.pekintimes.com
Team heads to cyber war competition - News - Pekin Daily Times - Pekin, IL
www.express.co.uk
www.express.co.uk
Russian website allows webcam hackers to spy on British families in their own homes | UK | News | Daily Express
www.americanbanker.com
www.americanbanker.com
The Dridex Threat: How to Block the Latest Malware Aimed at Banks - American Banker Article
www.latimes.com
www.latimes.com
Review: Shane Harris' book '@War' details rising military-Internet link - LA Times
www.cso.com.au
www.cso.com.au
Imperva Expands Big Data Protection with SecureSphere 11.0 - Media Releases - CSO | The Resource for Data Security Executives
www.amazon.com
www.amazon.com
CSA Guide to Cloud Computing: Implementing Cloud Privacy and Security: Raj Samani, Jim Reavis, Brian Honan: 9780124201255: Amazon.com: Books
packetstormsecurity.com
packetstormsecurity.com
Red Hat Security Advisory 2014-1876-01 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Red Hat Security Advisory 2014-1877-01 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Ubuntu Security Notice USN-2410-1 ≈ Packet Storm
thehackernews.com
thehackernews.com
Keeping the Bots at Bay: How to Detect Brute Force Attacks
www.cmswire.com
www.cmswire.com
Forrester's Best of the Best in Private, Public Cloud Space
justsecurity.org
justsecurity.org
There Will Be Surveillance Reform | Just Security
www.pcworld.com
www.pcworld.com
How to protect yourself from PC tech support scams | PCWorld
www.marketwired.com
www.marketwired.com
FireMon Extends Network Security Monitoring to Cloud Service Infrastructure
www.schneier.com
www.schneier.com
Schneier on Security: Citadel Malware Steals Password Manager Master Passwords
arstechnica.com
arstechnica.com
Malware’s new target: your password manager’s password | Ars Technica
packetstormsecurity.com
packetstormsecurity.com
Amnesty / EFF Launch Detekt Tool To Spot Web Snooping ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
CAPTCHA Rapture As 'Thousands' Affected By 7 Year Old Bug ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Russian Site Lists Breached Webcams ≈ Packet Storm
blogs.microsoft.com
blogs.microsoft.com
What will cybersecurity look like in 2025?, Part 3: How Microsoft is shaping the future of cybersecurity | Cyber Trust Blog
www.heraldonline.com
www.heraldonline.com
Local news from Rock Hill, SC | The Herald
blog.trendmicro.com
blog.trendmicro.com
A Peek Inside a POS Scammer’s Toolbox | Security Intelligence Blog | Trend Micro
www.securingthehuman.org
www.securingthehuman.org
SANS Securing The Human | American vs. European Reporting - Creating a Sense of Urgency
metro.co.uk
metro.co.uk
Russian hackers are turning your webcams without you knowing | Metro News
rbth.co.uk
rbth.co.uk
Critical infrastructure vulnerable to hackers | Russia Beyond The Headlines
www.theregister.co.uk
www.theregister.co.uk
Gartner mages: And the Enterprise Archiving Magic Quadrant top spot goes to... • The Register
www.businessweek.com
www.businessweek.com
Russians Hacking Into Home Webcams Sparks U.K. Warning - Businessweek
www.wmur.com
www.wmur.com
How to Protect Yourself From a Data Breach | TV - WMUR Home
www.knoxnews.com
www.knoxnews.com
Review: Snowden documentary ‘Citizenfour’ steeped in real-time anxiety - Go Knoxville Story
www.express.co.uk
www.express.co.uk
Charles Dance: 'I was a phone hacking victim' | Showbiz | News | Daily Express
blog.trendmicro.com
blog.trendmicro.com
Trend Micro Collaborates with Latin American Leaders on Cybercrime -
www.theweek.co.uk
www.theweek.co.uk
Webcam hack uncovered: how you can protect yourself| News | The Week UK
www.washingtonpost.com
www.washingtonpost.com
Hacking Cava Grill: How to order nachos - The Washington Post
www.telegram.com
www.telegram.com
Cyberdefender who cut his teeth in Worcester sounds alarm on hackers - Worcester Telegram & Gazette - telegram.com
www.cso.com.au
www.cso.com.au
US strikes massive tech support scam - CSO | The Resource for Data Security Executives
www.pcworld.com
www.pcworld.com
Court shuts down tech support 'scams' targeted by FTC | PCWorld
www.bizjournals.com
www.bizjournals.com
Data breach at Triangle food-takeout shop unique because of its size - Triangle Business Journal
news.techworld.com
news.techworld.com
Ransom malware attacks underscore limitations of anti-virus software - Techworld.com
recode.net
recode.net
Yahoo Replaces Google as Mozilla Search Partner | Re/code
www.sans.org
www.sans.org
SANS Institute Brings Information Security Training Back to the Big Easy with SANS Security EAST 2015 | SANS Institute: Press
www.trendmicro.com
www.trendmicro.com
Trend Micro Security Predictions | The Invisible Becomes Visible
mashable.com
mashable.com
Russian website posting live video streams from hacked webcams
www.cnbc.com
www.cnbc.com
Russian webcam hackers spy on bedrooms and offices
www.thenorthernecho.co.uk
www.thenorthernecho.co.uk
Hackers use webcams to spy inside homes of Middlesbrough families and broadcast video live to internet (From The Northern Echo)
www.pymnts.com
www.pymnts.com
Enterprise Mobile Dollars Pouring To iPhone | PYMNTS.com
www.mirror.co.uk
www.mirror.co.uk
Hacked footage from BABY MONITORS, webcams and CCTV systems in Britain being broadcast LIVE on Russian website - Mirror Online
www.irishexaminer.com
www.irishexaminer.com
Do you know who's watching you through your webcam and CCTV? | Irish Examiner
www.consumeraffairs.com
www.consumeraffairs.com
Minivans show major flaw in IIHS safety test
www.zdnet.com
www.zdnet.com
Got a webcam? You might want to pick a stronger password right about now | ZDNet
www.broadwayworld.com
www.broadwayworld.com
Tufin Adds Support For Amazon Web Services, Delivers Security Policy Orchestration For Public, Private And Hybrid Cloud Environments - BWWGeeksWorld
www.manchestereveningnews.co.uk
www.manchestereveningnews.co.uk
Warning as webcam hackers stream live footage from Manchester homes, businesses and gym on the internet - Manchester Evening News
www.expressandstar.com
www.expressandstar.com
Warning on webcam 'spying' site « Express & Star
www.bbc.co.uk
www.bbc.co.uk
BBC News - Breached webcam and baby monitor site flagged by watchdogs
www.shropshirestar.com
www.shropshirestar.com
Warning on webcam 'spying' site « Shropshire Star
www.bizjournals.com
www.bizjournals.com
Target says customers are over last year's data breach - Triangle Business Journal
news.stv.tv
news.stv.tv
Webcam hackers spy on Scots homes and post footage on Russian website | Glasgow & West | News
money.cnn.com
money.cnn.com
Russian website streams thousands of private webcams - Nov. 20, 2014
www.belfasttelegraph.co.uk
www.belfasttelegraph.co.uk
Warning on webcam 'spying' site - BelfastTelegraph.co.uk
www.securitytube.net
www.securitytube.net
Owasp Appsecusa 2014 - Ios App Integrity: Got Any?
www.pentesteracademy.com
www.pentesteracademy.com
Module 1: GDB TUI Mode
www.digitaljournal.com
www.digitaljournal.com
Digital Journal: A Global Digital Media Network
www.nydailynews.com
www.nydailynews.com
Idaho student busted for hacking himself straight-As: cops - NY Daily News
www.channel4.com
www.channel4.com
Webcam hackers 'spying inside British homes' - Channel 4 News
www.insurancejournal.com
www.insurancejournal.com
Staples Still Tallying Costs of Data Breach
www.reuters.com
www.reuters.com
Fitch Affirms Novartis AG at 'AA'; Outlook Stable| Reuters
money.cnn.com
money.cnn.com
Barracuda Offers Integrated Security; Boosts Portfolio with Consolidated Network and Content Security Solution
seclists.org
seclists.org
Information Security News: SMS pwnage on MEELLIONS of flawed SIM cards, popular 4G modems
seclists.org
seclists.org
Information Security News: Report: Government Has Only 5 Years To Secure Internet ofThings
www.zawya.com
www.zawya.com
Carnegie Mellon hosts expert panel on cyber security - Zawya
www.wotimes.com
www.wotimes.com
Ocoee High starts cyber-security team - West Orange Times & Observer - West Orange Times & Observer
www.rsaconference.com
www.rsaconference.com
RSA Conference APJ Day 1 Recap – Blog Post
nakedsecurity.sophos.com
nakedsecurity.sophos.com
How to delete your old, embarrassing, now-much-easier-to-find tweets | Naked Security
www.channelbuzz.ca
www.channelbuzz.ca
Selling disaster recovery - ChannelBuzz.ca
www.prweb.com
www.prweb.com
Comprehensive FISMA and NIST SP 800-53 Information Security Policies and Procedures Now Available for Instant Download from the Experts at Flat Iron Technologies, LLC
www.zdnet.com
www.zdnet.com
ZDNet | Symantec
www.journalgazette.net
www.journalgazette.net
Lowe's scores big in earnings | The Journal Gazette
www.bidnessetc.com
www.bidnessetc.com
3 Reasons Why Lowe's (LOW) Will Outperform Home Depot (HD) Over The Next Few Days
www.newvision.co.ug
www.newvision.co.ug
Hackers turning smartphones into slave armies
seekingalpha.com
seekingalpha.com
Is Home Depot Still Hot After Earnings? - Home Depot, Inc. (NYSE:HD) | Seeking Alpha
investorplace.com
investorplace.com
HD: Buy Home Depot Despite Its Data Breach | InvestorPlace
blogs.wsj.com
blogs.wsj.com
The Morning Download: Post-PC CEO Reflects Starwood’s Deeper Mobile Shift - The CIO Report - WSJ
news.sky.com
news.sky.com
Hackers Streaming Brits' Private Webcams
www.net-security.org
www.net-security.org
Windows Kerberos bug: How to detect signs of exploitation before the update?
www.hackw0rm.net
www.hackw0rm.net
Meet Jasminder Singh - Indian Security Researcher ~ Pentesting and Ethical Hacking Blog
www.net-security.org
www.net-security.org
OpenDNS and IRISSCERT partner to fight security threats
www.computerworld.com.au
www.computerworld.com.au
8 ways Lollipop 5.0 reinvents Android - Computerworld
www.digitaljournal.com
www.digitaljournal.com
(ISC)²® Opens Call for Speakers for Third Annual CyberSecureGov Training Event - Press Release - Digital Journal
www.virtual-strategy.com
www.virtual-strategy.com
AVG Extends Global Partnership with ALCATEL ONETOUCH | Virtual-Strategy Magazine
www.wired.com
www.wired.com
How Splitting A Computer Into Multiple Realities Can Protect You From Hackers | WIRED
news.sky.com
news.sky.com
Webcam Hacking: Five Previous Attacks
www.thedailybeast.com
www.thedailybeast.com
U.K. to Shut Down Russian Webcam Hackers - The Daily Beast
www.broadwayworld.com
www.broadwayworld.com
Gartner Names Proofpoint a Leader in 2014 Magic Quadrant for Enterprise Information Archiving for Third Consecutive Year - BWWGeeksWorld
www.wired.com
www.wired.com
How the Dark Web's New Favorite Drug Market Is Profiting From Silk Road 2's Demise | WIRED
betanews.com
betanews.com
Free tool detects 'government surveillance spyware'
www.csoonline.com
www.csoonline.com
Activists release Detekt tool that finds surveillance malware | CSO Online
www.csoonline.com
www.csoonline.com
Intel to work with Europol on fighting cybercrime | CSO Online
www.trendmicro.com
www.trendmicro.com
The Brazilian Underground: A Market for Cybercriminal Wannabes? - Security News - Trend Micro USA
www.bloomberg.com
www.bloomberg.com
Russians Hacking Into Home Webcams Sparks U.K. Warning - Bloomberg
www.bristolpost.co.uk
www.bristolpost.co.uk
Residents in the Bristol area could be spied on by Russian hackers, via baby monitors and webcams | Bristol Post
www.prweb.com
www.prweb.com
Intronis Receives 2014 Cloud Computing Backup and Disaster Recovery Award
www.bobsguide.com
www.bobsguide.com
NetJapan, backup and disaster recovery solution provider, hires Richard Zinner as European Technical... - bobsguide.com
www.theregister.co.uk
www.theregister.co.uk
A life of cybercrime, a caipirinha and a tan: Fraudsters love a Brazilian • The Register
seclists.org
seclists.org
Information Security News: Hackers seized database from City of Detroit, demanded $800k in bitcoin
seclists.org
seclists.org
Information Security News: Long-running Android botnet evolves, could pose threat to corporate networks
www.pinknews.co.uk
www.pinknews.co.uk
Paul O’Grady settles News of the World phone hacking claim · PinkNews.co.uk
english.peopledaily.com.cn
english.peopledaily.com.cn
Cyberspace calls for better coordinated governance - People's Daily Online
bgr.com
bgr.com
FTC on PC malware security scams: How to avoid fake security programs | BGR
blogs.technet.com
blogs.technet.com
How to troubleshoot performance issues in SharePoint custom code on your own? Part 2 – High CPU Utilization - SharePoint Developer Support Team Blog - Site Home - TechNet Blogs
www.slate.com
www.slate.com
Spam Nation: Meet the Russian cybercrooks behind the digital threats in your inbox.
seclists.org
seclists.org
Bugtraq: [ MDVSA-2014:217 ] clamav
seclists.org
seclists.org
Bugtraq: CVE-2014-8877 - Code Injection in Wordpress CM Download Manager plugin
seekingalpha.com
seekingalpha.com
Cyber Security: Protect Yourself And Profit | Seeking Alpha
www.zdnet.com
www.zdnet.com
Amnesty's Detekt tool wants to help you thwart government spying | ZDNet
www.eastasiaforum.org
www.eastasiaforum.org
South Koreans defend their rights in cyberspace | East Asia Forum
www.pymnts.com
www.pymnts.com
Target Sees First Profit Boost Since Data Breach | PYMNTS.com
www.net-security.org
www.net-security.org
Thousands fall for Free Audi R8 Facebook scam
www.theregister.co.uk
www.theregister.co.uk
Boot Russian website Peeping Toms from your house ... secure your FRIKKIN' webcam • The Register
www.pentesteracademy.com
www.pentesteracademy.com
HTTP Verb Tampering Demo
www.pymnts.com
www.pymnts.com
PYMNTS.com | What's next in payments
www.net-security.org
www.net-security.org
New Citadel variant is after your master password
www.securitytube.net
www.securitytube.net
Owasp Appsecusa 2014 - Modern Web Application Defense With Owasp Tools
www.infoworld.com
www.infoworld.com
8 ways Lollipop 5.0 reinvents Android | InfoWorld
www.networkworld.com
www.networkworld.com
Gartner’s cloud showdown: Amazon Web Services vs. Microsoft Azure | Network World
www.newsobserver.com
www.newsobserver.com
Local & North Carolina state news from Raleigh, NC | NewsObserver.com
phys.org
phys.org
Russia hacking site spying webcams worldwide: Britain
www.signalscv.com
www.signalscv.com
Change Your Password Now!
www.onwindows.com
www.onwindows.com
Security breaches: protecting your company by supporting your people
nakedsecurity.sophos.com
nakedsecurity.sophos.com
“Rotten stinking hovel” hotel charges couple £100 for bad Trip Advisor review | Naked Security
thehackernews.com
thehackernews.com
Billions of Android Devices Vulnerable to Privilege Escalation Except Android 5.0 Lollipop
www.wired.com
www.wired.com
How Millennials Created the IoT Without Even Knowing | WIRED
twitter.com
twitter.com
Paul Ryan sur Twitter : "@integrity_Solutions Sean Rooney speaking about the human element #irisscon http://t.co/kVSIYR8uTH"
www.v3.co.uk
www.v3.co.uk
Amnesty, EFF and Privacy International launch Detekt tool to spot web snooping - IT News from V3.co.uk
www.walesonline.co.uk
www.walesonline.co.uk
Webcam hacking: How to keep your computer safe and what measures you can take to increase security - Wales Online
www.huffingtonpost.co.uk
www.huffingtonpost.co.uk
Webcam Hackers Could Be Watching You Online, Watchdog Warns
www.net-security.org
www.net-security.org
Secure file storage and sharing with nCrypted Cloud Review
seclists.org
seclists.org
Bugtraq: [ MDVSA-2014:216 ] php-ZendFramework
www.retailtimes.co.uk
www.retailtimes.co.uk
Waitrose enhances business continuity planning system with Fruition Partners UK - Retail Times
twitter.com
twitter.com
BrianHonan sur Twitter : "Hacker fuel at #irisscon :) http://t.co/0guUsuNpuJ"
www.itpro.co.uk
www.itpro.co.uk
Grampian Health Board rapped over patient data security failures | IT PRO
www.cio.com.au
www.cio.com.au
‘Digital dragon’ disrupts CIO agenda - CIO
techcrunch.com
techcrunch.com
Deep Identity Raises $470,000 To Help Companies Manage Access On Their Networks | TechCrunch
www.gloucestercitizen.co.uk
www.gloucestercitizen.co.uk
​If Russian spies were looking at your webcam - what would they see? | Gloucester Citizen
www.telegraph.co.uk
www.telegraph.co.uk
Is your webcam allowing hackers to peer into your home? - Telegraph
www.cmswire.com
www.cmswire.com
5 Reasons IT Is Scared of Mobile Security
twitter.com
twitter.com
Robert O'Donoghue sur Twitter : "The Workday security team taking over #IRISSCON in Dublin! http://t.co/UZulEV7ZJK"
www.databreachtoday.com
www.databreachtoday.com
Post Breach: Jimmy John’s, Coke Sued - DataBreachToday
twitter.com
twitter.com
Eddie Mize sur Twitter : "Please RT: Do Diligence? - My latest blog "If I do not know about it...I am not responsible!" http://t.co/KLbuNPQEdG http://t.co/J5pBdWtjcn"
www.walesonline.co.uk
www.walesonline.co.uk
Six Welsh homes and businesses among hundreds of webcams hacked by Russian website - Wales Online
gadgets.ndtv.com
gadgets.ndtv.com
The Internet of Insecure Things | NDTV Gadgets
www.independent.co.uk
www.independent.co.uk
Baby monitors, CCTV cameras and webcams from UK homes and businesses hacked and uploaded onto Russian website - Gadgets and Tech - Life and Style - The Independent
it-online.co.za
it-online.co.za
IoT moves into business strategy - IT-Online | IT-Online
grandblancview.mihomepaper.com
grandblancview.mihomepaper.com
Police Blotter | grandblancview.mihomepaper.com | The Grand Blanc View
www.net-security.org
www.net-security.org
8 cybercrime trends that will shape I
www.net-security.org
www.net-security.org
How the threat landscape is shaping the network security business
www.news4jax.com
www.news4jax.com
U.S. energy grid hacked 79 times this year | Money - Home
it-online.co.za
it-online.co.za
Cloud is in, but big data trails - IT-Online | IT-Online
www.dailyrecord.co.uk
www.dailyrecord.co.uk
Sinister Russian website transmits live footage of hundreds families unwittingly filmed by their home webcams - Daily Record
www.zawya.com
www.zawya.com
TRA hosts the 10th Business Continuity Management Forum for the Telecommunications Sector - Zawya
insurancenewsnet.com
insurancenewsnet.com
PCI Applauds House Scrutiny of International Regulatory Standards
blog.trendmicro.com
blog.trendmicro.com
Good App/Bad App: Is Investigating Mobile Apps Necessary? | Security Intelligence Blog | Trend Micro
www.wgal.com
www.wgal.com
8 on your side: How hackers do what they do | Local News - WGAL Home
www.goodgearguide.com.au
www.goodgearguide.com.au
USB Armory is the Swiss army knife of security devices - Good Gear Guide Australia
www.net-security.org
www.net-security.org
New Synology NAS optimized for encryption and intensive tasks
www.net-security.org
www.net-security.org
Whitepaper: Zero Trust approach to network security
www.net-security.org
www.net-security.org
Most IT pros prefer open source to proprietary software
www.pentesteracademy.com
www.pentesteracademy.com
Section Introduction and Challenge 1
www.securitytube.net
www.securitytube.net
Owasp Appsecusa 2014 - Blended Web And Database Attacks On Real-Time, In-Memory Platforms
www.channelnewsasia.com
www.channelnewsasia.com
Hacktivists exploiting old, vulnerable corporate websites: Trend Micro - Channel NewsAsia
www.theregister.co.uk
www.theregister.co.uk
CAPTCHA rapture as 'thousands' affected by seven year-old bug • The Register
www.symantec.com
www.symantec.com
Four Best Practices for Discovering Cloud Data Sources | Symantec Connect
www.theguardian.com
www.theguardian.com
Webcam hackers could be watching you, watchdog warns | Technology | The Guardian
kwit.org
kwit.org
Jon Stewart On The 'Daily Show': 'I'm Still Really Proud Of The Work We Do' | KWI
www.fastcasual.com
www.fastcasual.com
Jimmy John's customers file class action suit over data breach | Fast Casual
www.ksbw.com
www.ksbw.com
U.S. energy grid hacked 79 times this year | Money - KSBW Home
www.cnet.com
www.cnet.com
How to encrypt an Android 5.0 Lollipop device - CNE
www.heraldscotland.com
www.heraldscotland.com
Webcam hackers 'spying on families' | Herald Scotland
www.theregister.co.uk
www.theregister.co.uk
Hackers seize Detroit's database, demand $800k. Motor City shrugs: OK, take it • The Register
allafrica.com
allafrica.com
allAfrica.com: Nigeria: Insurgency and the Emir's Prescription
www.digitaltrends.com
www.digitaltrends.com
Chrome Browser Updated with 64-bit Mac OS X Support | Digital Trends
www.nextgov.com
www.nextgov.com
Timeline: How the Postal Service Data Breach Went Down - Nextgov.com
www.computerworld.com
www.computerworld.com
10 hottest IT skills for 2015 | Computerworld
af.reuters.com
af.reuters.com
Fitch Rates NTPC's Proposed USD Notes 'BBB-(EXP)'| Energy & Oil| Reuters
firstbiz.firstpost.com
firstbiz.firstpost.com
Economy may expand at 5.6% in FY15: Fitch
kansasfirstnews.com
kansasfirstnews.com
Riley county looks to beef up courthouse security | Kansas First News
wccftech.com
wccftech.com
iOS And OS X Malware Suspects Nabbed In China - Site Also Shut Down
www.liverpoolecho.co.uk
www.liverpoolecho.co.uk
Paul O'Grady wins settlement for hacking claim - Liverpool Echo
news.nationalgeographic.com
news.nationalgeographic.com
Why It's Crucial to Get More Women Into Science
www.theregister.co.uk
www.theregister.co.uk
Astro-boffins start opening universe simulation data • The Register
www.pentesteracademy.com
www.pentesteracademy.com
Challenge 36: XSS 17
www.thedailybeast.com
www.thedailybeast.com
The Truth About ‘Friends’ - The Daily Beast
www.dailymail.co.uk
www.dailymail.co.uk
Russian spies use your computer to watch you at home then post photos online | Daily Mail Online
www.technewsworld.com
www.technewsworld.com
China Suspected in Attacks on USPS, NOAA | Cybersecurity | TechNewsWorld
www.reuters.com
www.reuters.com
Fitch Downgrades Sky to 'BBB-'; Stable Outlook| Reuters
www.cnet.com
www.cnet.com
Ebola, hackers drive Dictionary.com word of the year: 'Exposure' - CNE
www.bsminfo.com
www.bsminfo.com
New Security Awareness Guidance Published By PCI Security Standards Council
www.cpifinancial.net
www.cpifinancial.net
CPI Financial | CPI Financial News | Banking and Financial News,Islamic Business and Finance, Commercial Banking | Delta Partners Emerging Markets TMT Growth Fund II investing $10 million into CipherCloud
www.theregister.co.uk
www.theregister.co.uk
CERN's 2014 Xmas gift from the Large Hadron Collider: Two new baryons • The Register
www.securitytube.net
www.securitytube.net
Black Hat Usa 2014 - Appsec: Svg Exploiting Browsers Without Image Parsing Bugs
www.macworld.com
www.macworld.com
Mac won't boot? Yosemite disabled TRIM for third-party SSDs
www.fudzilla.com
www.fudzilla.com
Hackers wade into US energy grid
www.latinoshealth.com
www.latinoshealth.com
Apple releases OS X Yosemite v10.10.1; Wi-Fi, Mail Fixes & Updates - Where to Download : Trending News : Latinos Health
www.bbc.com
www.bbc.com
BBC News - Phone hacking: Paul O'Grady settlement with News of the World
www.theindychannel.com
www.theindychannel.com
Important safeguards can keep hackers from stealing personal data from your computer - TheIndyChannel.com
www.tripwire.com
www.tripwire.com
Security Slice: Patch Or Be Prey - The State of Security
www.tripwire.com
www.tripwire.com
Vulnerability Coordination for the Internet… of Everything
blog.trendmicro.com
blog.trendmicro.com
Four Steps To An Effective Targeted Attack Response | Security Intelligence Blog | Trend Micro
www.triplepundit.com
www.triplepundit.com
Video: Symantec's Cecily Joseph Talks Diversity at Net Impact
www.thisdaylive.com
www.thisdaylive.com
Insurgency and the Emir’s Prescription, Articles | THISDAY LIVE
japan.zdnet.com
japan.zdnet.com
世界的にプライバシー侵害が疑われるNSAデータ収集問題--これまでを振り返る - ZDNet Japan
www.bizjournals.com
www.bizjournals.com
Hewlett Foundation gives $15M to MIT for new cybersecurity policy initiative - Boston Business Journal
www.natlawreview.com
www.natlawreview.com
Postal Workers Union Complains to NLRB About Post Office Data Breach | The National Law Review
www.nzherald.co.nz
www.nzherald.co.nz
Hackers turning smartphones into slave armies - Business - NZ Herald News
www.wxyz.com
www.wxyz.com
Protect yourself: cyber security tips for online holiday shopping - WXYZ.com
www.theregister.co.uk
www.theregister.co.uk
GOTCHA: Google caught STRIPPING SSL from BT WiFi users' searches • The Register
blogs.cisco.com
blogs.cisco.com
Introducing the Industry’s First Threat-Focused Next-Generation Firewall
english.cntv.cn
english.cntv.cn
China ready to deepen int'l co-ops, uphold cyber security: Xi - CCTV News - CCTV.com English
www.themalaymailonline.com
www.themalaymailonline.com
Hackers targetting Android devices with malicious malwares | Tech/Gadgets | Malay Mail Online
wunc.org
wunc.org
Jon Stewart On The 'Daily Show': 'I'm Still Really Proud Of The Work We Do' | WUNC
www.forbes.com
www.forbes.com
Home Depot Earnings Review: Solid Growth On High Demand, Despite The Data Breach - Forbes
www.pcworld.com
www.pcworld.com
USB Armory is the Swiss army knife of security devices | PCWorld
www.virtual-strategy.com
www.virtual-strategy.com
"Exposure" Named 2014 Word of the Year by Dictionary.com | Virtual-Strategy Magazine
timesofindia.indiatimes.com
timesofindia.indiatimes.com
Cybersecurity experts warn Windows Server 2003 users - The Times of India
www.dailymail.co.uk
www.dailymail.co.uk
Student arrested after hacking into school's computers and changing his grades from Fs to As to win $7,000 scholarship | Daily Mail Online
www.engadget.com
www.engadget.com
Hackers tried to hold a Detroit city database hostage
www.tweaktown.com
www.tweaktown.com
US energy grid targeted 79 times by hackers in 2014 alone
www.cnbc.com
www.cnbc.com
CNBC Transcript: CNBC Exclusive: Target Chairman & CEO Brian Cornell Speaks with CNBC's Courtney Reagan on "Fast Money Halftime Report" Today
www.kwch.com
www.kwch.com
U.S. energy grid hacked 79 times this year | Home - Home
www.marketwatch.com
www.marketwatch.com
Symantec and HP Sign Disaster Recovery as-a-Service Agreement for HP Helion OpenStack(R) - MarketWatch
agiledatacenter.cio.com
agiledatacenter.cio.com
US The Transition to the Agile Data Center
www.linkedin.com
www.linkedin.com
Passwords Aren’t Dead Yet — Here’s Why You Need A Password Manager | Satnam Narang | LinkedIn
aws.amazon.com
aws.amazon.com
AWS Partner Story: Trend Micro
www.enterprisecioforum.com
www.enterprisecioforum.com
Can Your Security Protection Keep Up with Roaming Mobile Workers? | Enterprise CIO Forum
www.wdbj7.com
www.wdbj7.com
Protecting yourself from hackers during holiday shopping | Video/Photos - WDBJ7.com Central and Southwest VA
www.toptechnews.com
www.toptechnews.com
WireLurker Malware Targets Apple at Its Core - Apple/Mac on Top Tech News
www.securitytube.net
www.securitytube.net
Black Hat Usa 2014 - Appsec: Ravage Runtime Analysis Of Vulnerabilities And Generation Of Exploits
seekingalpha.com
seekingalpha.com
Target's (TGT) CEO Brian Cornell on Q3 2014 Results - Earnings Call Transcript | Seeking Alpha
abc7news.com
abc7news.com
Target customers getting over credit, debit card data breach | abc7news.com
money.cnn.com
money.cnn.com
Target customers and profits are back after hack - Nov. 19, 2014
abc7news.com
abc7news.com
ABC7 News - KGO Bay Area and San Francisco News
ultimaki.com
ultimaki.com
WhatsApp now using end-to-end encryption in its Android app
www.pcworld.com
www.pcworld.com
Shellshock-exploiting Bash malware targets embedded devices running BusyBox | PCWorld
www.sfchronicle.com
www.sfchronicle.com
Student accused of making failing grades all A's - San Francisco Chronicle
wvtf.org
wvtf.org
Jon Stewart On The 'Daily Show': 'I'm Still Really Proud Of The Work We Do' | WVTF
www.scmagazine.com
www.scmagazine.com
NATO launches largest cyber exercise to test its network security - SC Magazine
www.3news.co.nz
www.3news.co.nz
Reese Witherspoon slams 'cruel' Zellweger comments | Entertainment | 3 News
www.tweaktown.com
www.tweaktown.com
Report: Data breach of Staples, Michaels likely connected
internet.itbusinessnet.com
internet.itbusinessnet.com
Zebra Technologies' Global Study Tracks the Growing Momentum of the Internet of Things in the Enterprise
www.cnet.com
www.cnet.com
Install Chrome 39 for OS X for 64-bit Web browsing - CNE
www.cambodiadaily.com
www.cambodiadaily.com
‘Cyber War Team’ to Monitor Web | The Cambodia Daily
arstechnica.com
arstechnica.com
A neverending story: PC users lose another $120M to tech support scams | Ars Technica
blog.radware.com
blog.radware.com
The Rise of Thingbots | Radware Blog
www.scmagazine.com
www.scmagazine.com
Chrome 39 contains 42 security fixes, fallback to SSL 3.0 removed - SC Magazine
seclists.org
seclists.org
WebApp Sec: Re: concurrent logins
seclists.org
seclists.org
WebApp Sec: RE: concurrent logins
newsoffice.mit.edu
newsoffice.mit.edu
Hewlett Foundation funds new MIT initiative on cybersecurity policy | MIT News
www.eweek.com
www.eweek.com
Apple OS X 10.10.1 Fixes Four Vulnerabilities
fox11online.com
fox11online.com
How to protect your plastic in times of retailer data breaches | FOX 11 Online | WLUK-TV
www.scmagazine.com
www.scmagazine.com
WhatsApp begins rolling out end-to-end encryption - SC Magazine
www.securitytube.net
www.securitytube.net
Black Hat Usa 2014 - Appsec: Pivoting In Amazon Clouds
www.cio.com
www.cio.com
U.S. Retailers Still Struggling With Data Breach Security, Says BitSight | CIO
www.marketwatch.com
www.marketwatch.com
Gartner Names Proofpoint a Leader in 2014 Magic Quadrant for Enterprise Information Archiving for Third Consecutive Year - MarketWatch
www.youtube.com
www.youtube.com
Trusted Security for SMBs - YouTube
money.cnn.com
money.cnn.com
Symantec and HP Sign Disaster Recovery as-a-Service Agreement for HP Helion OpenStack(R)
www.bankinfosecurity.com
www.bankinfosecurity.com
Despite Breach, Home Depot's Profits Grow - BankInfoSecurity
www.dailyfinance.com
www.dailyfinance.com
'Free' Credit Score Sites Duped Hundreds of Thousands - DailyFinance
store.2600.com
store.2600.com
The Hacker Digest - LIFETIME (PDF)
www.darkreading.com
www.darkreading.com
Internet Architecture Board Calls For Net Encryption By Default
www.cio-today.com
www.cio-today.com
WireLurker Malware Targets Apple at Its Core - Operating Systems on CIO Today
midsizeinsider.com
midsizeinsider.com
Protecting the Network: Today's Fierce Firewalls ::Security & Resiliency:: Midsize Insider
www.wdbj7.com
www.wdbj7.com
DOLLARS AND SENSE: Protecting yourself from hackers this holiday shopping season | Local News - WDBJ7.com Central and Southwest VA
www.zdnet.com
www.zdnet.com
Android Lollipop users warn of 'unusable' devices after upgrading | ZDNet
nakedsecurity.sophos.com
nakedsecurity.sophos.com
Whatsapp now provides end-to-end encryption by default for messages | Naked Security
www.zdnet.com
www.zdnet.com
Yosemite patch fails to squash OS X Wi-Fi bug | ZDNet
blog.trendmicro.com
blog.trendmicro.com
AWS re:Invent 2014 Wrap Up -
blog.trendmicro.com
blog.trendmicro.com
ROVNIX Infects Systems with Password-Protected Macros
www.darkreading.com
www.darkreading.com
The Year Of The Retailer Data Breach
www.ftseglobalmarkets.com
www.ftseglobalmarkets.com
US legislators poll banks on IT data breaches - FTSE Global Markets
www.theregister.co.uk
www.theregister.co.uk
Fake antivirus scams: It's a $120m business – and alleged ringleaders have just been frozen • The Register
www.chicoer.com
www.chicoer.com
2012: LinkedIn admits theft of users' passwords, invalidates them
www.10news.com
www.10news.com
Company that promised customers free credit scores agrees to $22M settlement - 10News.com KGTV ABC10 San Diego
www.usatoday.com
www.usatoday.com
Court shuts down 2 alleged tech-support scammers
www.zdnet.com
www.zdnet.com
Details emerge on Windows Kerberos vulnerability | ZDNet
www.scmagazineuk.com
www.scmagazineuk.com
CESG approved cyber-security training launched - SC Magazine UK
time.com
time.com
Target and Home Depot Rebound from Hacking Scandals
www.nextgov.com
www.nextgov.com
Hackers Possibly Copied Postal Employee Pay Records - Nextgov.com
fox13now.com
fox13now.com
Heel hacking: Woman arrested for allegedly attacking woman with stilettos | fox13now.com
www.nbcnews.com
www.nbcnews.com
USPS: Hack That Affected 800,000 Employees 'Very Sophisticated' - NBC News
clarkson.edu
clarkson.edu
Clarkson University: Cybersecurity Pioneer to Keynote Global Entrepreneurship Week at Clarkson University
abcnews.go.com
abcnews.go.com
Twitter Update Now Lets Users Search Every Public Tweet Ever Sent - ABC News
www.scmagazine.com
www.scmagazine.com
Vulnerabilities identified in three Advantech products - SC Magazine
www.scmagazine.com
www.scmagazine.com
State Department offers reward for arrest of Romanian fugitives - SC Magazine
forums.juniper.net
forums.juniper.net
Is every individual the same? Is every network the... - J-Net Community
twitter.com
twitter.com
GEN14 sur Twitter : "@JuniperNetworks exhibit booth looking great at #GEN14 http://t.co/HeyNhy8Ch3"
blog.trendmicro.com
blog.trendmicro.com
Decrypting the Notorious Banking Trojan ZBOT | Security Intelligence Blog | Trend Micro
www.networkworld.com
www.networkworld.com
7 commonly overlooked ways to tighten cybersecurity | Network World
www.latinpost.com
www.latinpost.com
WhatsApp Adds Snowden-Approved Encryption Techniques to Keep User Messages Safe : Business : Latin Post
www.scmagazineuk.com
www.scmagazineuk.com
NotCompatible botnet infects Android mobiles, infiltrates corporate networks - SC Magazine UK
www.healthcaredive.com
www.healthcaredive.com
Devices stolen from Boston physician in armed robbery led to data breach | Healthcare Dive
www.broadwayworld.com
www.broadwayworld.com
SANS Institute Brings Information Security Training Back to the Big Easy with SANS Security EAST 2015 - BWWGeeksWorld
www.lexology.com
www.lexology.com
Data breach: are you prepared to respond? - Lexology
larrybrownsports.com
larrybrownsports.com
Cam Newton had Twitter hacked because his password was 'Camnewton1' | Larry Brown Sports
www.securitytube.net
www.securitytube.net
Black Hat Usa 2014 - How To Leak A 100-Million-Node Social Graph In Just One Week? - A Reflection On Oauth And Api Design In Online Social Networks
www.justjared.com
www.justjared.com
Reese Witherspoon Calls Renee Zellweger Face Critics ‘Cruel’ | Amy Adams, Felicity Jones, Hilary Swank, Julianne Moore, Laura Dern, Magazine, Patricia Arquette, Reese Witherspoon : Just Jared
medicalxpress.com
medicalxpress.com
Hacking health care
abcnews.go.com
abcnews.go.com
USPS Hacked: Congress Presses for More Timely Notification After Data Breach - ABC News
abc11.com
abc11.com
Congress Presses for More Timely Notification After Postal Data Breach | abc11.com
thehill.com
thehill.com
Dem: Agencies 'whistling through the graveyard' on data breaches | TheHill
seclists.org
seclists.org
Bugtraq: [CORE-2014-0008] - Advantech AdamView Buffer Overflow
seclists.org
seclists.org
Bugtraq: [CORE-2014-0010] - Advantech WebAccess Stack-based Buffer Overflow
www.youtube.com
www.youtube.com
Be the one who stops the next IT security breach - YouTube
insurancenewsnet.com
insurancenewsnet.com
PCI Addresses Insurance Gaps Involving Transportation Network Companies in North Carolina
www.securityweek.com
www.securityweek.com
U.S. State Department Takes Network Offline After Activity of 'Concern' | SecurityWeek.Com
www.fool.com
www.fool.com
BlackBerry’s Deal With Samsung: 3 Things Investors Need To Know (BBRY)
www.kwtx.com
www.kwtx.com
Student Accused Of Hacking Computer To Change Fs To As
blogs.wsj.com
blogs.wsj.com
Stocks to Watch: Target, Lowe’s, Staples - MoneyBeat - WSJ
www.bloomberg.com
www.bloomberg.com
Gone in 180 Seconds: Hackers Quickly Raid E-Mails in Search of 'Wire Transfer' and Sex Photos - Bloomberg
www.cbronline.com
www.cbronline.com
Kaspersky warns of paranoia over targeted hacking - Computer Business Review
blogs.mcafee.com
blogs.mcafee.com
Operation Mangal: Win32/Syndicasec Used In Targeted Attacks Against Indian Organizations | McAfee
kticradio.com
kticradio.com
Congress Presses for More Timely Notification After USPS Data Breach | KTIC Radio
www.bloomberg.com
www.bloomberg.com
Hackers Can Steal Data Wirelessly From PCs That Aren't Even Online - Bloomberg
m2mworldnews.com
m2mworldnews.com
Orange Business Services positioned as a Leader in Gartner Magic Quadrant for Managed Machine-to-Machine Services | M2M World News
www.bizjournals.com
www.bizjournals.com
Target says customers are over last year's data breach - Minneapolis / St. Paul Business Journal
investorplace.com
investorplace.com
TGT Stock: The Turnaround at Target Appears to be Working | InvestorPlace
www.oregonlive.com
www.oregonlive.com
Student accused of hacking Brigham Young U.-Idaho computer system to change grades | OregonLive.com
www.celebuzz.com
www.celebuzz.com
Hollywood's Top Actresses Talk Nude Photo Hacking Scandal, Jennifer Lawrence & Renee Zellweger Critics
www.tripwire.com
www.tripwire.com
WhatsApp Adopts End-to-End Encryption for Android Users - The State of Security
www.csoonline.com
www.csoonline.com
Long-running Android botnet evolves, could pose threat to corporate networks | CSO Online
www.washingtonpost.com
www.washingtonpost.com
Postal Service ‘functioning normally’ after cyber breach, official says in testimony for hearing - The Washington Post
thehill.com
thehill.com
Anti-hacking advocate lands key House panel | TheHill
www.computerworld.com
www.computerworld.com
Coming by 2023, an exascale supercomputer in the U.S. | Computerworld
www.scmagazine.com
www.scmagazine.com
Facebook offers privacy tips, updates - SC Magazine
forums.juniper.net
forums.juniper.net
Juniper at AfricaCom 2014: Towards Virtualization - J-Net Community
nakedsecurity.sophos.com
nakedsecurity.sophos.com
SSCC 174 – Who says law enforcement isn’t tackling cybercrime? [PODCAST] | Naked Security
www.csoonline.com
www.csoonline.com
Attackers trading malware for privilege | CSO Online
www.securityweek.com
www.securityweek.com
Microsoft Warns of Issues With Recent SChannel Update, But Patch Away! | SecurityWeek.Com
abc7.com
abc7.com
Congress Presses for More Timely Notification After Postal Data Breach | abc7.com
www.cmswire.com
www.cmswire.com
Microsoft Adds Video Service to Office 365
www.hngn.com
www.hngn.com
Old 3DS Title Unlocks Hacking and Homebrew Features on the Nintendo Handheld System : US : Headlines & Global News
www.utilitydive.com
www.utilitydive.com
DHS: Hackers targeted the grid 79 times this year | Utility Dive
www.digitaljournal.com
www.digitaljournal.com
Wontok SafeCentral AntiMalware Tops All 34 Antivirus Entrants in Latest VB 100 Comparative's RAP Test - Press Release - Digital Journal
kfor.com
kfor.com
Heartbreaking: Hackers target parents who have lost children to cancer | KFOR.com
www.business2community.com
www.business2community.com
The Future of File Sharing: What's on Our Horizon?
abc7chicago.com
abc7chicago.com
Congress Presses for More Timely Notification After Postal Data Breach | abc7chicago.com
theweek.com
theweek.com
The Senate defeated an overhaul of the NSA. Here's what's next for surveillance reform. - The Week
www.thedailybeast.com
www.thedailybeast.com
Commando Colonel Accused of Exposing his Lover to HIV - The Daily Beast
www.computerworld.com
www.computerworld.com
Anonymous wages cyberwar on the KKK with #OpKKK & #HoodsOff | Computerworld
www.broadwayworld.com
www.broadwayworld.com
Symantec and HP Sign Disaster Recovery as-a-Service Agreement for HP Helion OpenStack - BWWGeeksWorld
krebsonsecurity.com
krebsonsecurity.com
Microsoft Releases Emergency Security Update — Krebs on Security
forums.juniper.net
forums.juniper.net
The Recursive Cloud – Sending the Cloud to the Clo... - J-Net Community
www.mcafee.com
www.mcafee.com
McAfee Endpoint Protection for SMB | McAfee Products
blog.trendmicro.com
blog.trendmicro.com
The Brazilian Underground Market -
www.sfchronicle.com
www.sfchronicle.com
Target rebounds in third quarter on solid sales - San Francisco Chronicle
www.forbes.com
www.forbes.com
CipherCloud Scores Monster Series B - Forbes
blogs.mcafee.com
blogs.mcafee.com
Ebola-Related Phishing Attack Becomes Outright Fundraising Fraud | McAfee
www.sans.org
www.sans.org
Top 10 1/2 Things That Can Undermine Your Security Program - SANS Institute
www.cnbc.com
www.cnbc.com
Police chief: Very strong chance of City cyberattack
www.pymnts.com
www.pymnts.com
More Data Breaches Expected This Holiday Season | PYMNTS.com
www.net-security.org
www.net-security.org
One billion attacks were blocked during the third quarter
nakedsecurity.sophos.com
nakedsecurity.sophos.com
Senate kills bill that would have reined in NSA and rampant surveillance | Naked Security
twitter.com
twitter.com
Juniper Networks sur Twitter : "Can you handle this week's certification quiz? Give us your best guess! http://t.co/Po8F6FNw7y"
www.infosecisland.com
www.infosecisland.com
Operation Onymous Challenges Tor to Strengthen Its Security
www.businesswire.com
www.businesswire.com
Hillstone Networks Certifies Next-Generation Firewall With Trend Micro Deep Discovery | Business Wire
blogs.mcafee.com
blogs.mcafee.com
When Your Organization is Under Attack, Minutes Count | McAfee
www.securitytube.net
www.securitytube.net
Black Hat Usa 2014 - Appsec: Finding And Exploiting Access Control Vulnerabilities In Graphical User Interfaces
www.informationweek.com
www.informationweek.com
BitTorrent Sync Plans Pro Tier - InformationWeek
www.laboratoryequipment.com
www.laboratoryequipment.com
Hewlett Foundation Funds Academic Cyber Initiative
www.pcworld.com
www.pcworld.com
Danger comes in small packages: Securing employees' mobile devices | PCWorld
www.marketwired.com
www.marketwired.com
Wontok SafeCentral AntiMalware Tops All 34 Antivirus Entrants in Latest VB 100 Comparative's RAP Test
www.scmagazine.com
www.scmagazine.com
A balancing act: Apple technology - SC Magazine
packetstormsecurity.com
packetstormsecurity.com
Dolibarr ERP And CRM 3.5.3 SQL Injection ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Capstone 3.0 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Clam AntiVirus Toolkit 0.98.5 ≈ Packet Storm
blogs.microsoft.com
blogs.microsoft.com
Cybercrime, Data Protection, and Multi-Factor Authentication (MFA) | Cyber Trust Blog
www.infosecisland.com
www.infosecisland.com
Centralization: The Hidden Trap
www.net-security.org
www.net-security.org
Sophisticated Android-based botnet a danger to enterprise networks
en.wikipedia.org
en.wikipedia.org
Longest words - Wikipedia, the free encyclopedia
www.techrepublic.com
www.techrepublic.com
2015 prediction: Expect massive spikes in global information security threats - TechRepublic
www.scmagazine.com
www.scmagazine.com
USA Freedom Act foiled by Senate Republicans - SC Magazine
packetstormsecurity.com
packetstormsecurity.com
Faronics Deep Freeze Arbitrary Code Execution ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
IO Slaves KDE Insufficient Input Validation ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Compaq/Hewlett Packard Glance 11.00 Privilege Escalation ≈ Packet Storm
thatguy.trendmicro.com
thatguy.trendmicro.com
Password Manager – Online Account protection – Don’t be that Guy
www.rsaconference.com
www.rsaconference.com
Update on charity:water Efforts in Nepal – Blog Post – RSA Conference
www.canadianbusiness.com
www.canadianbusiness.com
Target's 3Q earnings rise 3.2 per cent as it recovers from last year's data breach - Canadian Business
www.reuters.com
www.reuters.com
Hackers to probe cyber crime defenses at British banks| Reuters
www.datacenterknowledge.com
www.datacenterknowledge.com
Erroneous Beliefs About DDoS Attacks That Could Cost You
www.advisor.ca
www.advisor.ca
Cyber threats on the rise, but firms won’t fix tech | Advisor.ca
www.thestar.com
www.thestar.com
Target’s Canadian stores improving but still ‘well below our expectations’ | Toronto Star
www.uc.edu
www.uc.edu
UC Adopts New Information Security Training Program
www.zdnet.com
www.zdnet.com
Google advances SSL with new Chrome versions | ZDNet
blog.trendmicro.com
blog.trendmicro.com
Cyber PreCogs? What Do the Next 2-3 Years Hold For Us? -
packetstormsecurity.com
packetstormsecurity.com
Hacker Lexicon: What Is The Dark Web? ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Debian Security Advisory 3074-1 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Hewlett Foundation Lays Out Millions On Security ≈ Packet Storm
seclists.org
seclists.org
Bugtraq: CVE-2014-7137 - Multiple SQL Injections in Dolibarr ERP & CRM
www.prnewswire.com
www.prnewswire.com
SANS Institute Brings Information Security Training Back to the Big Easy with... -- BETHESDA, Md., Nov. 19, 2014 /PRNewswire-USNewswire/ --
www.theledger.com
www.theledger.com
Cost of Data Breach Hazy as Home Depot Profits Rise | TheLedger.com
business.financialpost.com
business.financialpost.com
Target Corp shares climb as profit tops estimates, Canadian stores improve | Financial Post
www.nbcnews.com
www.nbcnews.com
Hackers to Probe Cybercrime Defenses at British Banks - NBC News
www.cso.com.au
www.cso.com.au
US retailers still struggling with data breach security, says BitSight - CSO | The Resource for Data Security Executives
www.forbes.com
www.forbes.com
'Someone Had Taken Over My Life': An Identity Theft Victim's Story - Forbes
packetstormsecurity.com
packetstormsecurity.com
Debian Security Advisory 3074-2 ≈ Packet Storm
blogs.cisco.com
blogs.cisco.com
Endpoint Protection and Least Prevalence
www.zdnet.com
www.zdnet.com
10 top security threats of 2014 (so far) | ZDNet
solarhbj.com
solarhbj.com
AVG vs Comodo vs Avast vs Avira Free Antivirus – Offering Protection Above Par
www.prnewswire.com
www.prnewswire.com
CPI to Display Cutting-Edge Network Cabinet and Remote Monitoring System at... -- WESTLAKE VILLAGE, Calif., Nov. 19, 2014 /PRNewswire/ --
abcnews.go.com
abcnews.go.com
Target Rebounds in Third Quarter on Solid Sales - ABC News
www.zawya.com
www.zawya.com
Delta Partners Emerging Markets TMT Growth Fund II investing $10 million into CipherCloud - Zawya
www.digitaljournal.com
www.digitaljournal.com
Christopher Poulsen (Photo: Business Wire) - Press Release - Digital Journal
thehill.com
thehill.com
MIT wants to set drone cybersecurity policy | TheHill
bgr.com
bgr.com
Android Lollipop Download Features: Trusted Places feature is awesome | BGR
www.cso.com.au
www.cso.com.au
Data breaches rose 25 percent to 320 incidents in single quarter, SafeNet figures find - CSO | The Resource for Data Security Executives
www.bizjournals.com
www.bizjournals.com
Prioritize security efforts with a data-centric approach - The Business Journals
betanews.com
betanews.com
New venture aims to completely rethink enterprise security
www.reuters.com
www.reuters.com
Target U.S. same-store sales rise for first time in four quarters | Reuters
www.csmonitor.com
www.csmonitor.com
After Ferguson threat, Anonymous removes the KKK’s hoods. Effective? - CSMonitor.com
www.misco.co.uk
www.misco.co.uk
'Desperate' organisations will enlist hackers to fight security threat - Misco.co.uk
www.esecurityplanet.com
www.esecurityplanet.com
HSBC Acknowledges Massive Payment Card Breach - eSecurity Planet
motherboard.vice.com
motherboard.vice.com
NATO Is Sharpening Its Cyber War Defenses | Motherboard
www.stockhouse.com
www.stockhouse.com
Target (TGT) Q3 beats the Street as it recovers from data breach-TGT-Stockhouse news
www.marketplace.org
www.marketplace.org
Target tries to be cool | Marketplace.org
www.marketwatch.com
www.marketwatch.com
Barracuda Solutions Now Available in the ArrowSphere Cloud Marketplace - MarketWatch
www.inquisitr.com
www.inquisitr.com
iOS 8.1.1 Introduces Promising Bug Fixes And Security Updates
www.oregonlive.com
www.oregonlive.com
Target rebounds from data breach, posts third-quarter profit ahead of the holidays | OregonLive.com
now.avg.com
now.avg.com
Reporting from AVAR 2014 | AVG Now
www.pentesteracademy.com
www.pentesteracademy.com
Pentesting Windows Endpoints: Hidden Bind Shell Payload
www.stockhouse.com
www.stockhouse.com
Press Releases - News - Stockhouse
twitter.com
twitter.com
Symantec sur Twitter : "@LindaShanley Have you been good this year? http://t.co/Qb3AXPJynf"
www.net-security.org
www.net-security.org
Google open sources Firing Range, a test tool for web app security scanners
www.securitytube.net
www.securitytube.net
Black Hat Usa 2014 - Appsec: Epidemiology Of Software Vulnerabilities: A Study Of Attack Surface Spread
allafrica.com
allafrica.com
allAfrica.com: Nigeria: How to Be Security (Terrorism) Conscious - Expert
business.newsfactor.com
business.newsfactor.com
MacStadium Intros Mac-Centric Hosting for Enterprises | NewsFactor Business Report
www.prnewswire.com
www.prnewswire.com
Computing Industry Pioneers Announce New Cybersecurity Venture -- WALTHAM, Mass., Nov. 19, 2014 /PRNewswire/ --
www.insurancejournal.com
www.insurancejournal.com
Lawmakers Seek Details on Finanial Services Firms' Data Breaches
globenewswire.com
globenewswire.com
ForeScout Enhances Access and Threat Management Through Integration With Palo Alto Networks Next-Gen Firewalls and WildFire
www.itbusinessnet.com
www.itbusinessnet.com
MacStadium Announces First VMware Powered Mac-Centric Hosting and Cloud Service Offering for Enterprises
www.kaspersky.com
www.kaspersky.com
Kaspersky Lab | Antivirus Protection | Internet Security
usa.kaspersky.com
usa.kaspersky.com
Download Kaspersky Security for Mac | Kaspersky Lab US
blog.coresecurity.com
blog.coresecurity.com
Core Impact Knows Arduino-Based Attacks | Core Security Blog
www.symantec.com
www.symantec.com
Why We Love Appliances | Symantec Connect
www.symantec.com
www.symantec.com
Archiving and eDiscovery Blogs Symantec eDiscovery Blog | Symantec Connect
www.emc.com
www.emc.com
RSA Advanced Security Operations Center, SOC Use Cases - EMC
www.rsaconference.com
www.rsaconference.com
Incidence Response: Are You Ready For the End of the Year? – Video – RSA Conference
seclists.org
seclists.org
Full Disclosure: CVE-2014-7911: Android <5.0 Privilege Escalation using ObjectInputStream
www.chinatopix.com
www.chinatopix.com
WhatsApp Now Encrypts Messages, Making it Nearly Impossible for Hackers to Read : Tech : Chinatopix
www.irishtimes.com
www.irishtimes.com
Paul O’Grady settles ‘News of the World’ phone hacking claim
seekingalpha.com
seekingalpha.com
PureFunds To Stop Hackers With This Cyber Security ETF | Seeking Alpha
www.marketwired.com
www.marketwired.com
Gartner Names Proofpoint a Leader in 2014 Magic Quadrant for Enterprise Information Archiving for Third Consecutive Year
www.globalpost.com
www.globalpost.com
WhatsApp starts encrypting messages to protect from hackers | GlobalPost
business.financialpost.com
business.financialpost.com
Chantel Bernier: Data breach response is ‘not the time to improvise’ | Financial Post
www.theregister.co.uk
www.theregister.co.uk
'Most advanced mobile botnet EVER' is coming for your OFFICE Androids • The Register
seclists.org
seclists.org
WebApp Sec: concurrent logins
www.techweekeurope.co.uk
www.techweekeurope.co.uk
MIT, Stanford, Land Major Cyber-Security Funding Injection
digital-forensics.sans.org
digital-forensics.sans.org
SANS Digital Forensics and Incident Response Blog | SANS DFIR Summit 2015 - Call For Papers | SANS Institute
techcrunch.com
techcrunch.com
CipherCloud Scores $50M As Cloud Security Comes To Forefront | TechCrunch
www.heraldscotland.com
www.heraldscotland.com
O'Grady wins hacking settlement | Herald Scotland
www.theverge.com
www.theverge.com
Building a globe-spanning quantum internet | The Verge
seclists.org
seclists.org
Bugtraq: Reflected Cross-Site Scripting (XSS) in Simple Email Form Joomla Extension
seclists.org
seclists.org
Bugtraq: [SECURITY] [DSA 3074-2] php5 regression update
www.tripwire.com
www.tripwire.com
Let’s Encrypt: A Certificate Authority To Help the Web Deploy HTTPS
www.csoonline.com
www.csoonline.com
Apple, Microsoft, Google and others join push against government spying | CSO Online
www.trendmicro.com
www.trendmicro.com
Security Conferences - Security Events - Trend Micro USA - Trend Micro USA
www.theregister.co.uk
www.theregister.co.uk
Go on, buy your workers a smartphone. You know it makes sense • The Register
www.cbsnews.com
www.cbsnews.com
How to avoid the "bah humbug" of holiday scams - CBS News
www.dnaindia.com
www.dnaindia.com
WhatsApp's latest Android update provides 'foolproof' security to users' conversations | Latest News & Updates at Daily News & Analysis
money.cnn.com
money.cnn.com
Thinspace Responds to Japan's Growing Market Demand for Cloud-Based Desktop
wtvr.com
wtvr.com
Hackers attacked the U.S. energy grid 79 times this year | WTVR.com
www.thedailybeast.com
www.thedailybeast.com
Rand Paul Beats Ted Cruz, Saves NSA From ‘Reform’ - The Daily Beast
www.theregister.co.uk
www.theregister.co.uk
CITY BANKERS, prepare for a TERRORIST CYBER ATTACK – London police chief • The Register
www.wired.com
www.wired.com
Hacker Lexicon: What Is the Dark Web? | WIRED
www.forbes.com
www.forbes.com
WhatsApp Moves To Protect Messages From Snoops - Forbes
www.digitaltrends.com
www.digitaltrends.com
With Blend, Blackberry focuses on core strengths – and it shows | Digital Trends
www.news4jax.com
www.news4jax.com
Avoid Holiday Hacking | News - Home
www.sbs.com.au
www.sbs.com.au
WhatsApp encrypts messages against hackers | SBS News
www.zdnet.com
www.zdnet.com
UK hires hackers, convicts to defend corporate networks | ZDNet
www.motherjones.com
www.motherjones.com
Elizabeth Warren to Banks: Prove You Can Protect Customer Data From Hackers | Mother Jones
the-japan-news.com
the-japan-news.com
Police across nation raid IT firms over hacking - The Japan News
www.cbsnews.com
www.cbsnews.com
Spate of cyber attacks target U.S. government systems - CBS News
www.bizjournals.com
www.bizjournals.com
Tech industry veterans form VS2 to put hackers in 'Twilight Zone' - Boston Business Journal
www.theregister.co.uk
www.theregister.co.uk
DRaaS-tic action: Trust the cloud to save your data from disaster • The Register
blogs.technet.com
blogs.technet.com
How to troubleshoot performance issues in SharePoint custom code on your own? Part 1 – High Memory Usage - SharePoint Developer Support Team Blog - Site Home - TechNet Blogs
seclists.org
seclists.org
Bugtraq: [ MDVSA-2014:215 ] gnutls
zeenews.india.com
zeenews.india.com
PCI appoints panel to probe attack on mediapersons in Hisar | Zee News
nakedsecurity.sophos.com
nakedsecurity.sophos.com
Google fined for not taking down “right to be forgotten” links worldwide | Naked Security
economictimes.indiatimes.com
economictimes.indiatimes.com
WhatsApp starts encrypting messages to thwart hackers - The Economic Times
www.telegraph.co.uk
www.telegraph.co.uk
Paul O'Grady settles News of the World phone hacking claim - Telegraph
www.toptechnews.com
www.toptechnews.com
MacStadium Intros Mac-Centric Hosting for Enterprises - Press Releases on Top Tech News
techcrunch.com
techcrunch.com
WhatsApp Partners With Open WhisperSystems To End-To-End Encrypt Billions Of Messages A Day | TechCrunch
www.belfasttelegraph.co.uk
www.belfasttelegraph.co.uk
O'Grady wins hacking settlement - BelfastTelegraph.co.uk
www.pentesteracademy.com
www.pentesteracademy.com
Tampering with the Return Address
www.securitytube.net
www.securitytube.net
Black Hat Usa 2014 - Appsec: Cloudbots Harvesting Crypto Coins Like A Botnet Farmer
www.prnewswire.com
www.prnewswire.com
Intelligent Automation, Inc. releases the ARGUS™ - IS Series Industrial Security System -- ROCKVILLE, Md., Nov. 19, 2014 /PRNewswire/ --
www.cloudsecuritycongress.com
www.cloudsecuritycongress.com
Contact Us | CSA EMEA Congress - Cloud Security Alliance Congress
www.zdnet.com
www.zdnet.com
Top tips on hack-proofing your life | ZDNet
www.forbes.com
www.forbes.com
SymantecVoice: Conveniently Connected And...Compromised? The New Security Landscape Of The Internet Of Things - Forbes
continuitycentral.com
continuitycentral.com
IBHS Business Continuity Planning Toolkit now available as an app
indianexpress.com
indianexpress.com
PCI appoints panel to probe attack on scribes during clashes at Rampal’s ashram in Hisar | The Indian Express
twitter.com
twitter.com
BCC Risk Advisory sur Twitter : "Come to @irisscert IRISSCon tomorrow & meet edgescan folks...we've got cupcakes!! http://t.co/ZqrglexmzZ"
www.net-security.org
www.net-security.org
New non-profit CA aims to make HTTPS use universal
www.security-faqs.com
www.security-faqs.com
Wearable Litigation – Fitbit Data Could Be About To Set A Legal Precedent
www.independent.co.uk
www.independent.co.uk
Daily catch-up: NHS markets, phone hacking and doing the Strand - Comment - Voices - The Independent
seekingalpha.com
seekingalpha.com
Elephant Talk Communications' (ETAK) CEO Steven van der Velden on Q3 2014 Results - Earnings Call Transcript | Seeking Alpha
in.reuters.com
in.reuters.com
Fitch Affirms Sony at 'BB-'; Revises Outlook to Stable| Reuters
af.reuters.com
af.reuters.com
Correction: Fitch Rates NTPC's Proposed USD Notes 'BBB-(EXP)'| Energy & Oil| Reuters
www.cloudcomputing-news.net
www.cloudcomputing-news.net
Yes, we’re all in the cloud - but use it to develop enterprise apps? Not yet - Cloud Tech News
research.gigaom.com
research.gigaom.com
Shadow IT: data protection and cloud security — Gigaom Research
www.zacks.com
www.zacks.com
PureFunds to Stop Hackers with This Cyber Security ETF - November 18, 2014 - Zacks.com
thefusejoplin.com
thefusejoplin.com
Top 5 Free Best Antivirus Security Apps For Your Smartphones | The Fuse Joplin
www.counterpunch.org
www.counterpunch.org
Obama on Net Neutrality: Principle or Politics? » CounterPunch: Tells the Facts, Names the Names
www.itnews.com.au
www.itnews.com.au
Encryption, tokenisation to shape future PCI compliance - Security - News - iTnews.com.au
nakedsecurity.sophos.com
nakedsecurity.sophos.com
Microsoft “tops up” Patch Tuesday, issues delayed fix for zero-day hole in logon security | Naked Security
thehackernews.com
thehackernews.com
Let’s Encrypt — A Certificate Authority to Provide Free SSL Certificates for Entire Web
www.net-security.org
www.net-security.org
320 breaches reported between July and September
www.utilitydive.com
www.utilitydive.com
Hackers targeted the grid 79 times this year | Utility Dive
www.king5.com
www.king5.com
8 Ways to outsmart hackers Black Friday
www.medicalfacts.nl
www.medicalfacts.nl
Risico’s van Bring Your Own Device in de Zorg | MedicalFacts.nl
www.net-security.org
www.net-security.org
Overwhelming optimism for information security in 2015
techcrunch.com
techcrunch.com
iOS 8.1.1 Brings Bug Fixes, Hope For iPhone 4S And iPad 2 Device Owners | TechCrunch
blogs.technet.com
blogs.technet.com
Additional information about CVE-2014-6324 - Security Research & Defense - Site Home - TechNet Blogs
blog.trendmicro.com
blog.trendmicro.com
Patched Windows Vulnerability Allows For Remote Privilege Escalation | Security Intelligence Blog | Trend Micro
it-online.co.za
it-online.co.za
Dell integrates, innovates security portfolio - IT-Online | IT-Online
www.toptechnews.com
www.toptechnews.com
US State Department's E-Mail Hacked - Network Security on Top Tech News
www.net-security.org
www.net-security.org
Does cyber insurance help the CISO get a seat in the board room?
www.net-security.org
www.net-security.org
DDoS attacks continue to fall in size and frequency
www.pentesteracademy.com
www.pentesteracademy.com
Task 20: Multi-Level JSON Parsing
www.theregister.co.uk
www.theregister.co.uk
Asian mobiles the DDOS threat of 2015, security mob says • The Register
www.securitytube.net
www.securitytube.net
Wget Exploit Demonstration - Cve-2014-4877
www.waaytv.com
www.waaytv.com
Hackers target U.S. energy grid 79 times - Huntsville News | WAAYTV.com and ABC 31: National News
gearburn.com
gearburn.com
Microsoft issues emergency update for Windows desktop and Server systems - Gearburn
www.symantec.com
www.symantec.com
Threats at every turn – time to hit back | Symantec Connect
www.zawya.com
www.zawya.com
Sophos Expands Cloud-Managed Security Portfolio with Server Protection - Zawya
www.cnet.com
www.cnet.com
Bill curbing NSA surveillance programs blocked in Senate - CNE
www.crn.in
www.crn.in
Security To Achieve Newer Paradigms - CRN India
www.euronews.com
www.euronews.com
Cloud computing: pros and cons | euronews, hi-tech
www.net-security.org
www.net-security.org
The evolution of threat detection and Big Data
www.dispatch.com
www.dispatch.com
Home Depot profit appears unaffected by data breach | The Columbus Dispatch
www.albawaba.com
www.albawaba.com
Sophos expands Cloud-Managed Security Portfolio with server protection | Al Bawaba
www.huffingtonpost.fr
www.huffingtonpost.fr
Cyber-jihadisme: la guerre électronique contre Daech est-elle perdue d'avance? | Sonia Eyaan
www.washingtonpost.com
www.washingtonpost.com
Home Depot’s profits rise, suggesting data breach hasn’t led customers to flee - The Washington Post
www.i24news.tv
www.i24news.tv
Analysis: How to prevent the next terror attack | i24news - See beyond
www.theregister.co.uk
www.theregister.co.uk
Lame phone dodgers fleece finance's foolish and fat fingered • The Register
www.pentesteracademy.com
www.pentesteracademy.com
Command Injection ISO: Hints for SugarCRM, Webmin, Zenoss
www.northjersey.com
www.northjersey.com
ConnectOne: "We notified customers about hacking incident" - Business - NorthJersey.com
www.fedtechmagazine.com
www.fedtechmagazine.com
Best Practices for Selecting a Next-Generation Firewall | FedTech Magazine
www.theregister.co.uk
www.theregister.co.uk
Hewlett Foundation lays out MEELLIONS on security • The Register
www.argusleader.com
www.argusleader.com
Calendar
news.stanford.edu
news.stanford.edu
Stanford Cyber Initiative will tackle Internet technology concerns
www.v3.co.uk
www.v3.co.uk
Most UK companies would consider hiring ex-hackers for cyber security - IT News from V3.co.uk
bleacherreport.com
bleacherreport.com
Cam Newton's Twitter Account Gets Hacked, Tweets 'Overrated' to Richard Sherman | Bleacher Report
minisites.ninemsn.com.au
minisites.ninemsn.com.au
Hacking mastermind shunned by friends after conviction
blog.timesunion.com
blog.timesunion.com
Hackers need to find a day job - High School
vine.co
vine.co
Watch Symantec's Vine "Empower your team with Symantec Mobility Solutions. #GoEmpower"
www.securitytube.net
www.securitytube.net
Black Hat Usa 2014 - Exploit: Abusing Performance Optimization Weaknesses To Bypass Aslr
guardianlv.com
guardianlv.com
Ku Klux Klan Hacked by Anonymous After Ferguson Threat
newsoffice.mit.edu
newsoffice.mit.edu
Hacking health care | MIT News
seclists.org
seclists.org
Bugtraq: [SECURITY] [DSA 3074-1] php5 security update
www.fierceitsecurity.com
www.fierceitsecurity.com
IoT security: Fix the problems before they start - FierceITSecurity
www.cio.com
www.cio.com
The Top Infosec Issues of 2014 | CIO
www.delcotimes.com
www.delcotimes.com
Chris Freind: Chewing the fat on issue of obesity
www.tripwire.com
www.tripwire.com
Operation Onymous Challenges Tor To Strengthen Its Security
au.ibtimes.com
au.ibtimes.com
iOS 8.1.1 Update: Apple Promises To Improve The Performance Of The Aging iPhone 4S and iPad 2 - International Business Times
www.gmanetwork.com
www.gmanetwork.com
Google rolls out 64-bit Chrome for Mac | SciTech | GMA News Online
consumerist.com
consumerist.com
If You Didn’t Change The Default Password On Your Security Camera, Someone’s Probably Watching It Stream – Consumerist
www.mcafee.com
www.mcafee.com
Downloader
appleinsider.com
appleinsider.com
Google launches first 64-bit Chrome Web browser for OS X
economictimes.indiatimes.com
economictimes.indiatimes.com
Caution against Windows-2003 OS as Microsoft announces its end - The Economic Times
www.theregister.co.uk
www.theregister.co.uk
SMS pwnage on MEELLIONS of flawed SIM cards, popular 4G modems • The Register
www.zdnet.com
www.zdnet.com
Australian technology spend to hit AU$78.7 billion in 2015: Gartner | ZDNet
www.deseretnews.com
www.deseretnews.com
State Dept computers hacked, email shut down | Deseret News
nypost.com
nypost.com
Unholy war: How to calm Islamist rage? | New York Post
wivb.com
wivb.com
State Department suffers hacking attack | wivb.com
www.bbc.co.uk
www.bbc.co.uk
BBC News - #BBCTrending: Anonymous takes on the Ku Klux Klan
www.ghacks.net
www.ghacks.net
All the things you can use private browsing mode for - gHacks Tech News
motherboard.vice.com
motherboard.vice.com
FAA Can Make All Drone Flights Illegal, Federal Court Rules | Motherboard
www.isc2.org
www.isc2.org
(ISC)² - IT Certification and Security Experts
www.latimes.com
www.latimes.com
Home Depot profit rises despite data breach - LA Times
www.reseller.co.nz
www.reseller.co.nz
Will NZ Digital Businesses replace Kiwis with robots? - Reseller News
techday.com
techday.com
Techday – BI/analytics top Kiwi CIO tech priorities list
www.cnbc.com
www.cnbc.com
Home Depot posts earnings of $1.15 a share vs $1.13 expected
www.slideshare.net
www.slideshare.net
Symantec Intelligence Report - October
www.securitytube.net
www.securitytube.net
Black Hat Usa 2014 - Enterprise: When The Lights Go Out Hacking Cisco Energywise
www.scpr.org
www.scpr.org
Activist group Anonymous hacks KKK Twitter account | 89.3 KPCC
www.digitaljournal.com
www.digitaljournal.com
Websense Security Labs Reveals Cybersecurity Predictions for 2015 - Press Release - Digital Journal
outsidelens.scmagazine.com
outsidelens.scmagazine.com
Watch "Chinese hackers accused of breaching NOAA systems" Video at SCMagazine
packetstormsecurity.com
packetstormsecurity.com
tcpdump 4.6.2 Geonet Denial Of Service ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
tcpdump 4.6.2 AOVD Unreliable Output ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Apple Security Advisory 2014-11-17-1 ≈ Packet Storm
blog.trendmicro.com
blog.trendmicro.com
POWELIKS Levels Up With New Autostart Mechanism
www.wired.com
www.wired.com
Critical NSA Reform Bill Fails in the Senate | WIRED
packetstormsecurity.com
packetstormsecurity.com
Ubuntu Security Notice USN-2411-1 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Mandriva Linux Security Advisory 2014-214 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Mandriva Linux Security Advisory 2014-213 ≈ Packet Storm
www.travelpulse.com
www.travelpulse.com
Attack in Jerusalem Casts Shadow on Tourism | TravelPulse
www.waaytv.com
www.waaytv.com
Hackers target U.S. energy grid 79 times - Huntsville News | WAAYTV.com and ABC 31: Appnews
www.zdnet.com
www.zdnet.com
Freedom Act to curb NSA surveillance dies in US Senate | ZDNet
www.lightreading.com
www.lightreading.com
Verizon Aims Big Data at Data Threats | Light Reading
www.scmagazine.com
www.scmagazine.com
IT Security News and Security Product Reviews - SC Magazine
www.kb.cert.org
www.kb.cert.org
Vulnerability Note VU#213119 - Microsoft Windows Kerberos Key Distribution Center (KDC) fails to properly validate Privilege Attribute Certificate (PAC) signature
GISuser.com
GISuser.com
GISuser The GIS and mapping professional resource
www.slideshare.net
www.slideshare.net
Updating Security Operations For The Cloud
www.wgal.com
www.wgal.com
8 on your side: Data breaches... Who's watching out for you? | Local News - WGAL Home
www.macrumors.com
www.macrumors.com
Chrome for Mac Gains 64-Bit Support in Latest Chrome 39 Update - Mac Rumors
arstechnica.com
arstechnica.com
US Senate falls 2 votes short of shutting down NSA phone spying | Ars Technica
www.csoonline.com
www.csoonline.com
Next year's DDOS attacks to come from Vietnam, India and Indonesia | CSO Online
www.journalism.co.uk
www.journalism.co.uk
Journalism jobs (media, editorial), news for journalists
www.latimes.com
www.latimes.com
L.A. Auto Show: Hackers now targeting cars and driver data - LA Times
techcrunch.com
techcrunch.com
Nearly Half Of The Operation Onymous Takedowns Were Scam Or Clone Sites | TechCrunch
www.Techworld.com
www.Techworld.com
Techworld: Breaking News for Business Technology & Enterprise IT - Techworld.com
www.scmagazine.com
www.scmagazine.com
Failing the security test: Target wasn't the first failing grade, or the last - SC Magazine
www.internetretailer.com
www.internetretailer.com
E-Payments & Security - Data breaches are on the rise - Internet Retailer
wuwm.com
wuwm.com
Milwaukee Companies Looking Closely at Data Breaches | WUWM
news.investors.com
news.investors.com
Home Depot Sales Beat, But Data Breach Hurts Stock HD LOW TGT - Investors.com
www.usatoday.com
www.usatoday.com
Home Depot earnings rise despite data breach
www.theregister.co.uk
www.theregister.co.uk
Patch NOW! Microsoft slings emergency bug fix at Windows admins • The Register
www.securitytube.net
www.securitytube.net
Black Hat Usa 2014 - Enterprise: Unveiling The Open Source Visualization Engine For Busy Hackers
www.penbaypilot.com
www.penbaypilot.com
Film interviewing whistleblowers to be shown in Belfast | PenBay Pilot
arstechnica.com
arstechnica.com
A power user’s guide to OS X Server, Yosemite edition | Ars Technica
whispersystems.org
whispersystems.org
Open WhisperSystems >> Blog >> Open Whisper Systems partners with WhatsApp to provide end-to-end encryption
www.theregister.co.uk
www.theregister.co.uk
You're all TERRORISTS now! WhatsApp turns on end-to-end encryption for 600 million people • The Register
www.csoonline.com
www.csoonline.com
Microsoft patches Kerberos vulnerability with emergency update | CSO Online
www.rsaconference.com
www.rsaconference.com
The Human Element in the Data Breach – Blog Post – RSA Conference
www.dailystar.com.lb
www.dailystar.com.lb
There is no room to err against computer hackers | Opinion , Commentary | THE DAILY STAR
prwire.com.au
prwire.com.au
Press Release: Imperva Expands Big Data Protection with SecureSphere 11.0
www.theyeshivaworld.com
www.theyeshivaworld.com
The Yeshiva World What Measures are Being Taken Following the Har Nof Massacre? « » Frum Jewish News
www.scmagazine.com
www.scmagazine.com
Mozilla, Cisco and others sponsor certificate provider Let's Encrypt - SC Magazine
twitter.com
twitter.com
SCMagazine sur Twitter : "Industry experts discuss incident response at @sccongress Chicago. #SCChi http://t.co/T3qNZx1JdR"
www.pentesteracademy.com
www.pentesteracademy.com
Task 21: Multi-Level XML Parsing
www.marketwatch.com
www.marketwatch.com
Zebra Technologies' Global Study Tracks the Growing Momentum of the Internet of Things in the Enterprise - MarketWatch
www.marketwatch.com
www.marketwatch.com
1st Source Announces the Addition of Christopher Poulsen - MarketWatch
www.smallbusinesscomputing.com
www.smallbusinesscomputing.com
Tighten Small Business Security for the Holiday Rush
phandroid.com
phandroid.com
Top 10 Android Lollipop Features [VIDEO]
www.sun-sentinel.com
www.sun-sentinel.com
Good Cyber Security Habits are Essential During the Holidays - Sun Sentinel
www.scmagazine.com
www.scmagazine.com
Microsoft issues delayed elevation of privilege patch - SC Magazine
thatguy.trendmicro.com
thatguy.trendmicro.com
Identity Fraud & Data Theft – Don’t be that Guy
www.scmagazine.com
www.scmagazine.com
Staples incident possibly connected to Michaels breach, report indicates - SC Magazine
www.darkreading.com
www.darkreading.com
Added Network Visibility with Belden's Newest Security OS: HiSecOS 2.0
www.telepresenceoptions.com
www.telepresenceoptions.com
"Less Is More" as Cisco Completely Reimagines Flagship Three-Screen Video Conferencing Technology - Telepresence Options
www.scmagazine.com
www.scmagazine.com
Survey: real-time SIEM solutions help orgs detect attacks within minutes - SC Magazine
www.infoworld.com
www.infoworld.com
Microsoft redoes SChannel patch, releases MS14-068/KB 3011780, KB 3000850 | InfoWorld
www.darkreading.com
www.darkreading.com
State Dept. Breach Heightens Concerns Over Resilience Of Government Networks
www.newsmax.com
www.newsmax.com
FBI Probes Agency Computer Breaches Said to Bear Signs of Spying
www.reddit.com
www.reddit.com
The boss has malware, again... : talesfromtechsupport
www.scmagazine.com
www.scmagazine.com
TRUSTe settles FTC charges over its 'certified' privacy seals - SC Magazine
www.theregister.co.uk
www.theregister.co.uk
Mozilla, EFF, Cisco back free-as-in-FREE-BEER SSL cert authority • The Register
blog.trendmicro.com
blog.trendmicro.com
Build With Confidence -
www.theregister.co.uk
www.theregister.co.uk
Cries of spies as audit group finds possible 'backdoor' in Bittorrent Sync • The Register
www.itnewsonline.com
www.itnewsonline.com
IT News Online > PR Newswire - Websense Security Labs Reveals Cybersecurity Predictions for 2015
www.local10.com
www.local10.com
After Ku Klux Klan threatens Ferguson protesters, Anonymous hackers attack | News - Home
www.itbusinessedge.com
www.itbusinessedge.com
Software-Defined Networks: Nervous Time for IT Departments
www.canadianunderwriter.ca
www.canadianunderwriter.ca
U.S. House oversight panel asks when State Department data breach was discovered, how it was fixed
www.computerworld.com
www.computerworld.com
Microsoft releases emergency patch to stymie Windows Server attacks | Computerworld
www.haaretz.com
www.haaretz.com
Synagogue attack a 'crime,' says Bahraini foreign minister - Diplomacy and Defense Israel News | Haaretz
www.pentesteracademy.com
www.pentesteracademy.com
Challenge 14: HTTP Traffic File Carving Solution
www.youtube.com
www.youtube.com
SAS 2015: Are You Ready to Fightback? - YouTube
www.net-security.org
www.net-security.org
Open Whisper Systems helps WhatsApp achieve end-to-end encryption
www.securitytube.net
www.securitytube.net
Black Hat Usa 2014 - Enterprise: The Library Of Sparta
www.bidnessetc.com
www.bidnessetc.com
Citigroup Inc. (NYSE:C), Wells Fargo & Co. (NYSE:WFC), J. P. Morgan Chase & Co. (NYSE:JPM) News Analysis: Financial Firms Increase Cybersecurity Budgets To $2 Billion
www.newsnet5.com
www.newsnet5.com
Important safeguards can keep hackers from stealing personal data from your computer - newsnet5.com Cleveland
www.zdnet.com
www.zdnet.com
Microsoft reissues fixed Schannel update | ZDNet
www.symantec.com
www.symantec.com
Taking A Bolder Approach To Protect Identities And Endpoints | Symantec Connect
www.timescolonist.com
www.timescolonist.com
Home Depot bests 3Q expectations; costs of huge data breach still not fully known - Opinion - Times Colonist
www.marketwired.com
www.marketwired.com
New Research Shows One Third of Retail Breaches Originated From Third-Party Vulnerabilities
www.thestar.com
www.thestar.com
Home Depot beats expectations despite data breach | Toronto Star
www.federaltimes.com
www.federaltimes.com
State Department hit in cyberattack that also compromised White House | Federal Times | federaltimes.com
www.zdnet.com
www.zdnet.com
Retail sector still at risk, but breach survivors grow stronger: BitSight | ZDNet
www.fool.com
www.fool.com
Home Depot Sales, Earnings Build, but Data Breach Questions Remain Unanswered (HD)
betanews.com
betanews.com
One third of retail security breaches come from third-party vulnerabilities
news.techworld.com
news.techworld.com
US retailers still struggling with data breach security, says BitSight - Techworld.com
www.darkreading.com
www.darkreading.com
Is Security Awareness Training Really Worth It?
www.huffingtonpost.ca
www.huffingtonpost.ca
Keurig: People Are Hacking Our Coffee Machines Because They Need A Challenge
www.scmagazine.com
www.scmagazine.com
Devices stolen from Boston hospital physician during armed robbery contained patient data - SC Magazine
blogs.microsoft.com
blogs.microsoft.com
Strategies, Capacity Building and Legislative Initiatives: Cybersecurity Policy Development Battles Through “Tumultuous Teens” | Cyber Trust Blog
www.schneier.com
www.schneier.com
Schneier on Security: Whatsapp Is Now End-to-End Encrypted
www.schneier.com
www.schneier.com
Schneier on Security: A New Free CA
windowsitpro.com
windowsitpro.com
Winding Down Windows Server 2003 | Windows Server content from Windows IT Pro
www.cio-today.com
www.cio-today.com
MacStadium Intros Mac-Centric Hosting for Enterprises - Press Releases on CIO Today
www.freep.com
www.freep.com
KKK hit by cyber attacks after Ferguson threats
betanews.com
betanews.com
How to overcome the hidden costs of virtualization
www.scmagazine.com
www.scmagazine.com
Fortinet FortiDB 1000D product review | SC Magazine
blogs.cisco.com
blogs.cisco.com
Reversing Multilayer .NET Malware
seclists.org
seclists.org
Bugtraq: [ MDVSA-2014:213 ] curl
www.continuitycentral.com
www.continuitycentral.com
Disaster recovery as a service market report
www.scmagazine.com
www.scmagazine.com
Apples releases OS X Yosemite and iOS updates - SC Magazine
twitter.com
twitter.com
SCMagazine sur Twitter : "Our track sessions are currently under way! @sccongress #scchi http://t.co/ZD4J4pYGUG"
packetstormsecurity.com
packetstormsecurity.com
Mozilla, EFF, Cisco Back Free SSL Certificate Authority ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Anonymous Hacks The Ku Klux Klan After Ferguson Threats ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Terror Attack In Jerusalem Synagogue Kills Four ≈ Packet Storm
pando.com
pando.com
The moment I learned just how far Uber will go to silence journalists and attack women | PandoDaily
www.scmagazineuk.com
www.scmagazineuk.com
US banks set to splash the cash on cyber-security - SC Magazine UK
www.cnet.com
www.cnet.com
Get an Asus EeeBook 11.6-inch laptop for $139.99 - CNE
www.westernjournalism.com
www.westernjournalism.com
China, Hacking, And Murder
www.enewspf.com
www.enewspf.com
Cummings and Warren Ramp Up Investigation of Consumer Data Breaches Throughout U.S. Financial Sector
www.infosecisland.com
www.infosecisland.com
Launching in 2015: A Certificate Authority to Encrypt the Entire Web
seclists.org
seclists.org
Bugtraq: [ MDVSA-2014:214 ] dbus
technet.microsoft.com
technet.microsoft.com
Microsoft Security Bulletin MS14-068 - Critical
www.zdnet.com
www.zdnet.com
Microsoft patches critical Windows Server vulnerability` | ZDNet
healthitsecurity.com
healthitsecurity.com
Laptop with PHI Stolen from Brigham and Women’s Doctor | HealthITSecurity.comHealthITSecurity.com
www.finances.com
www.finances.com
1st Source Announces the Addition of Christopher Poulsen - Finances
money.cnn.com
money.cnn.com
Zebra Technologies' Global Study Tracks the Growing Momentum of the Internet of Things in the Enterprise
www.telecompaper.com
www.telecompaper.com
Sophos launches new server protection offering - Telecompaper
midsizeinsider.com
midsizeinsider.com
802.11ac: The Business Wi-Fi Fast Lane ::Mobile:: Midsize Insider
bgr.com
bgr.com
How To Free Up Space On iPhone, iPad — Free Up Storage Space | BGR
twitter.com
twitter.com
SCMagazine sur Twitter : "Experts discussing BadUSB at @sccongress Chicago during today's keynote lunch presentation. http://t.co/lHSREjprTX"
twitter.com
twitter.com
Juniper Networks sur Twitter : "Steve Shaw presenting on global networking at #MEFGF14, happening now at the Gaylord Convention Center in DC! http://t.co/NqZp6nzt94"
concreteproducts.com
concreteproducts.com
Concrete Products - Toscas to transition from PCI to PCA
ameinfo.com
ameinfo.com
183 million accounts compromised in Q3 2014, report finds |
arstechnica.com
arstechnica.com
Cubic Ninja prices soar as hackers reveal it’s key to unlocking Nintendo 3DS. | Ars Technica
www.jpost.com
www.jpost.com
EU to Israel: If you want to get along with us, make peace
www.cnbc.com
www.cnbc.com
Early Movers: HD, TJX, MDT, EA, ZTS, GPRO & more
www.govtech.com
www.govtech.com
Cybersecurity Expert Puts Focus on Training People, Not Developing Technology
windowsitpro.com
windowsitpro.com
Breaking: Out-of-Band Critical Security Update Coming in the Next Few Hours | Security content from Windows IT Pro
www.theguardian.com
www.theguardian.com
Jerusalem attacks pose new challenges for Israeli security forces | World news | The Guardian
blogs.cisco.com
blogs.cisco.com
How I Manage a $4B Business from my Phone
www.scmagazine.com
www.scmagazine.com
Healthcare sector's broad data sets will attract increased attacks in 2015 - SC Magazine
www.gartner.com
www.gartner.com
Magic Quadrant for IT Vendor Risk Management
www.securitytube.net
www.securitytube.net
Black Hat Usa 2014 - Enterprise: The Devil Does Not Exist The Role Of Deception In Cyber
www.zdnet.com
www.zdnet.com
Windows 10, OneDrive sync and the art of difficult conversations | ZDNet
www.usatoday.com
www.usatoday.com
KKK hit by cyberattack after Ferguson threats
nypost.com
nypost.com
Home Depot sales rise despite massive data breach | New York Post
www.myarklamiss.com
www.myarklamiss.com
Cancer Charity Hacked: Vile Messages Sent to Parents of Childhood Cancer Victims - MyArkLaMiss.com - KTVE NBC 10 - KARD FOX 14 - Your homepage for the latest News, Weather and Sports in the ArkLaMiss!
nakedsecurity.sophos.com
nakedsecurity.sophos.com
Naked Security bids farewell to HTTP | Naked Security
twitter.com
twitter.com
SCMagazine sur Twitter : "The expo floor is bustling at @sccongress Chicago. http://t.co/8t748KbHIM"
www.schneier.com
www.schneier.com
Schneier on Security: Snarky 1992 NSA Report on Academic Cryptography
www.csoonline.com
www.csoonline.com
Android and iOS apps still being cloned to spread malware | CSO Online
www.lexology.com
www.lexology.com
The four I’s to proactively addressing data breach risks - Lexology
blogs.mcafee.com
blogs.mcafee.com
Stop More than the Usual Suspects (Blog 2 of 4) | McAfee
www.telecomstechnews.com
www.telecomstechnews.com
Tor domains seized by police were fakes - Telecom Tech News
www.4029tv.com
www.4029tv.com
U.S. energy grid hacked 79 times this year | Money - KHBS Home
www.dailyjournal.net
www.dailyjournal.net
Another fox sneaks into southern Utah substation, zaps power; prevention equipment on order - Daily Journal
time.com
time.com
Urban Outfitters' Profits and Shares Tumble
www.sans.org
www.sans.org
Cyber Threat Intelligence Summit (Washington, DC)
www.idahostatesman.com
www.idahostatesman.com
Boise, Meridian, Nampa, Caldwell news by Idaho Statesman
www.philly.com
www.philly.com
Urban Outfitters quarterly profit down, shares decline
www.newsmax.com
www.newsmax.com
Anonymous Hacks KKK in 'Cyber War' After Alleged Ferguson Threats
www.zdnet.com
www.zdnet.com
Linux still owns supercomputing | ZDNet
www.ajc.com
www.ajc.com
KKK threatened with public 'unhooding' after Ferguson threats | www.ajc.com
www.darkreading.com
www.darkreading.com
Deconstructing the Cyber Kill Chain
www.tripwire.com
www.tripwire.com
Microsoft to release urgent out-of-band Windows security patch today - MS14-068 - The State of Security
www.wired.com
www.wired.com
Whatsapp Just Switched On End-To-End Encryption For Hundreds of Millions of Users | WIRED
www.csoonline.com
www.csoonline.com
EFF, Mozilla back new certificate authority that will offer free SSL certificates | CSO Online
www.forbes.com
www.forbes.com
DIY Hardware Startup LittleBits Wants To Help People Make Their Own Smart Home - Forbes
www.scmagazine.com
www.scmagazine.com
VA falters in cybersecurity audit for 16th year - SC Magazine
www.myrecordjournal.com
www.myrecordjournal.com
MyRecordJournal.com | Meriden, CT | Meriden elementary school set to give every student a laptop or iPad
www.pymnts.com
www.pymnts.com
Will Apple Pay Drive 20% Of Mobile Payments In 2 Years? | PYMNTS.com
www.forbes.com
www.forbes.com
Home Depot Outlook Bright Despite Data Breach - Forbes
www.timescolonist.com
www.timescolonist.com
Home Depot bests 3Q expectations; costs of huge data breach still not fully known - B.C. - Times Colonist
www.independent.ie
www.independent.ie
Hackers target award-winning photographer to discredit water protest picture - Independent.ie
www.zdnet.com
www.zdnet.com
Apple releases iOS 8.1.1, includes performance improvements for older iPhones, iPads | ZDNet
www.prweb.com
www.prweb.com
KnowBe4 Announces New 2015 Kevin Mitnick Security Awareness Training
smartdatacollective.com
smartdatacollective.com
Data Center Technology | A3 | SmartData Collective
www.digitaljournal.com
www.digitaljournal.com
KnowBe4 Announces New 2015 Kevin Mitnick Security Awareness Training - Press Release - Digital Journal
www.darkreading.com
www.darkreading.com
New 2015 Kevin Mitnick Security Awareness Training - Gartner Top 20 Pick
www.cisco.com
www.cisco.com
Protect Across the Entire Attack Continuum with Cisco Next-Generation Firewall
nakedsecurity.sophos.com
nakedsecurity.sophos.com
Would you allow access to Facebook at Work? [POLL] | Naked Security
thehackernews.com
thehackernews.com
81% of Tor Users Can be Easily Unmasked By Analysing Router Information
www.euractiv.com
www.euractiv.com
Biometric security moves to counter cyber fraud | EurActiv
www.csoonline.com
www.csoonline.com
The worst year for data breaches
ww2.cfo.com
ww2.cfo.com
Mobile Payment Spending to Reach $142B by 2019 -
www.microsoft.com
www.microsoft.com
Download Microsoft Security Intelligence Report, Volume 17 from Official Microsoft Download Center
my.kaspersky.com
my.kaspersky.com
My Kaspersky
www.zdnet.com
www.zdnet.com
Microsoft to release Windows security fix today | ZDNet
www.tripwire.com
www.tripwire.com
Large Number of Tor Sites Seized in Operation Onymous Were Fake
ow.ly
ow.ly
Ow.ly - image uploaded by @HS_UserImages (Hootsuite User Image)
www.independent.co.uk
www.independent.co.uk
Careers in tech: The Internet of Things - Career Planning - Student - The Independent
www.broadwayworld.com
www.broadwayworld.com
Sangfor Technologies Earns Recommended Rating from NSS Labs - BWWGeeksWorld
www.cultofmac.com
www.cultofmac.com
Apple credits Pangu jailbreakers for helping make iOS 8.1.1 even more secure | Cult of Mac
www.techtimes.com
www.techtimes.com
Apple iOS 8.1.1, OS X 10.10.1 Now Available. What iDevice Lovers Should Know : PERSONAL TECH : Tech Times
blogs.wsj.com
blogs.wsj.com
Cisco Courts a Mobile, Collaborative Workforce with Project Squared - Digits - WSJ
www.digitaljournal.com
www.digitaljournal.com
Menlo Security Lands $10.5 Million to Reinvent Cyber Security - Press Release - Digital Journal
www.csmonitor.com
www.csmonitor.com
Home Depot Q3 earnings impress, despite data breach - CSMonitor.com
www.zdnet.com
www.zdnet.com
DisplaySearch: Global notebook PC market grew 10 percent | ZDNet
www.pentesteracademy.com
www.pentesteracademy.com
Pentesting Routers: SNMP audit with Metasploit, Snmpcheck and Onesixtyone
www.darkreading.com
www.darkreading.com
'Bashlite' Malware Leverages ShellShock In BusyBox Attack
www.symantec.com
www.symantec.com
Annual G20 summit is attractive target for Flea attack group | Symantec Connect
store.emc.com
store.emc.com
EMC Store Products - EMC Store
www.net-security.org
www.net-security.org
Cisco open sources Big Data security analytics framework
www.securitytube.net
www.securitytube.net
Owasp Appsecusa 2014 - Stop Chasing Vulnerabilities - Introducing Continuous Application Security
www.cnet.com
www.cnet.com
Men think they can fix a computer (but can't), study says - CNE
www.reuters.com
www.reuters.com
House, Senate Democrats seek details from financial firms on data breaches| Reuters
www.prnewswire.com
www.prnewswire.com
Sangfor Technologies Earns Recommended Rating from NSS Labs -- SANTA CLARA, Calif., Nov. 18, 2014 /PRNewswire/ --
news.thomasnet.com
news.thomasnet.com
Trend Micro Deep Security Now Available on AWS Marketplace
www.knowyourmobile.com
www.knowyourmobile.com
How To Remove Credit Cards from Apple Pay If Your iPhone 6 Is Stolen | Know Your Mobile
www.dqindia.com
www.dqindia.com
IT Act 2000 lacks teeth - Dataquest | The Bible of Indian IT (Information and Trends, Analysis, Research, News, People, Events)Dataquest | The Bible of Indian IT (Information and Trends, Analysis, Research, News, People, Events)
bgr.com
bgr.com
Delete Apple Pay credit cards remotely on iCloud.com | BGR
focustaiwan.tw
focustaiwan.tw
PLA has set up Chinese version of 'PRISM' monitoring in H.K.: Kanwa | Most Viewed | FOCUS TAIWAN - CNA ENGLISH NEWS
thehill.com
thehill.com
Lawmakers target banks for hacking details | TheHill
thehill.com
thehill.com
Did White House hackers have another target? | TheHill
www.redandblack.com
www.redandblack.com
Credit 101: How to build financial security without breaking the bank - The Red and Black : Uganews
www.zdnet.com
www.zdnet.com
Analysis casts doubt on FBI claims over Tor website seizures | ZDNet
blogs.mcafee.com
blogs.mcafee.com
Koler Ransomware Extorts Money from Users | McAfee
now.avg.com
now.avg.com
AVG Extends Global Partnership with ALCATEL ONETOUCH
www.theregister.co.uk
www.theregister.co.uk
Anonymous ‪hacks the Ku Klux Klan after Ferguson‬ threats • The Register
www.rsaconference.com
www.rsaconference.com
Security Storage: To HSM or Not To HSM? – Blog Post – RSA Conference
www.toptechnews.com
www.toptechnews.com
US State Department's E-Mail Hacked - Government on Top Tech News
www.informationweek.com
www.informationweek.com
Facebook's Enterprise Ambition: 3 Big Hurdles - InformationWeek
www.infoworld.com
www.infoworld.com
More patch problems reported with MS14-066/KB 2992611/WinShock | InfoWorld
www.nojitter.com
www.nojitter.com
8 Ways to Categorize Enterprise Mobility Management - Post - No Jitter
money.cnn.com
money.cnn.com
Hackers attacked the U.S. energy grid 79 times this year - Nov. 18, 2014
www.cio.com
www.cio.com
Court Ruling Could Bring Down BYOD | CIO
www.forbes.com
www.forbes.com
BlackBerry Launches BES 12, Partners With Samsung To Ride The MDM Wave - Forbes
www.dawn.com
www.dawn.com
US State Department network shut after cyber breach - World - DAWN.COM
www.gulf-times.com
www.gulf-times.com
State Dept’s unclassified e-mail systems are hacked
www.net-security.org
www.net-security.org
Critical factors in preventing data breaches
www.marketwired.com
www.marketwired.com
Menlo Security Lands $10.5 Million to Reinvent Cyber Security
www.infoworld.com
www.infoworld.com
10 hottest IT skills for 2015 | InfoWorld
www.govhealthit.com
www.govhealthit.com
Making sure a BYOD policy has teeth | Government Health I
www.wptz.com
www.wptz.com
Hackers attacked the U.S. energy grid 79 times this year | Money - WPTZ Home
www.marketwired.com
www.marketwired.com
Sophos Expands Cloud-Managed Security Portfolio With Server Protection
www.techtimes.com
www.techtimes.com
Meet A3, New Software that can Kill Malware and Automatically Repair Damages : PERSONAL TECH : Tech Times
news.techworld.com
news.techworld.com
Data breaches rose 25 percent to 320 incidents in single quarter, SafeNet figures find - Techworld.com
www.computing.co.uk
www.computing.co.uk
BYOD - the legal issues - 18 Nov 2014 - Computing Opinion
www.websense.com
www.websense.com
Websense 2015 Security Predictions Report
www.businesswire.com
www.businesswire.com
Intel® Security Report Details Critical Factors in Preventing Data Breaches
blog.trendmicro.com
blog.trendmicro.com
Localized Tools and Services, Prominent in the Brazilian Underground | Security Intelligence Blog | Trend Micro
247wallst.com
247wallst.com
Home Depot Earnings Diminished by Potential Impact of Data Breach (NYSE: HD) - 24/7 Wall St.
www.ctvnews.ca
www.ctvnews.ca
Home Depot tops 3Q expectations; costs of data breach still not known | CTV News
www.theguardian.com
www.theguardian.com
If only Paul Vickers had staged a real investigation into phone hacking... | Media | theguardian.com
www.thedenverchannel.com
www.thedenverchannel.com
UPS, FedEx & USPS warn of holiday phishing scams hackers are using to get your personal information - 7NEWS Denver TheDenverChannel.com
www.healthleadersmedia.com
www.healthleadersmedia.com
Brigham and Women’s reports patient privacy breach
www.net-security.org
www.net-security.org
Michaels and Staples breaches carried out by same attackers?
www.theregister.co.uk
www.theregister.co.uk
Northern Ireland website leaves FRONT DOOR open, spills users' data • The Register
magazine.vulnerability-db.com
magazine.vulnerability-db.com
F-Secure starts official Vulnerability Reward Program in November 2014 | VULNERABILITY MAGAZINE - Bug Bounties, Acknoweldgements & Security Research
www.wcvb.com
www.wcvb.com
Brigham & Women's patient data stolen | Health - WCVB Home
www.digitaltrends.com
www.digitaltrends.com
U.S. State Department Shuts Down Email After Hack Attack | Digital Trends
www.winnipegfreepress.com
www.winnipegfreepress.com
Home Depot tops 3Q expectations; costs of data breach still not fully known - Winnipeg Free Press
tickerreport.com
tickerreport.com
Identify Security Software Inc. Demonstrates its Advanced Security and Authentication Software for Bank Atm Transactions | Ticker Report
triblive.com
triblive.com
Cybersecurity experts warn Pittsburgh conference about dangers of hacking | TribLIVE
www.reuters.com
www.reuters.com
Home Depot profit beats estimates as U.S. job market improves| Reuters
nakedsecurity.sophos.com
nakedsecurity.sophos.com
Anonymous e-hijacks KKK in wake of threats against Ferguson protesters | Naked Security
www.securitytube-training.com
www.securitytube-training.com
Python for Pentesters and Hackers « SecurityTube Trainings
www.prweb.com
www.prweb.com
IBHS Business Continuity Planning Toolkit is now an App
www.zdnet.com
www.zdnet.com
Cisco hands over security analytics framework to open source development | ZDNet
www.symantec.com
www.symantec.com
None
www.motherjones.com
www.motherjones.com
Twitter Is Not at War With ISIS: Here's Why. | Mother Jones
www.ajc.com
www.ajc.com
Home Depot 3Q results top Wall Street's view | www.ajc.com
money.cnn.com
money.cnn.com
The Home Depot Announces Third Quarter Results; Reaffirms Fiscal Year 2014 Guidance
www.infoworld.com
www.infoworld.com
How to lose customers with excessive security | InfoWorld
www.sfchronicle.com
www.sfchronicle.com
Home Depot 3Q results top Wall Street's view - San Francisco Chronicle
www.theregister.co.uk
www.theregister.co.uk
Can’t be TRUSTe-d? Online privacy firm coughs $200k to settle 'deception' charges • The Register
www.net-security.org
www.net-security.org
Trojanized Android firmware found on inexpensive handhelds
www.net-security.org
www.net-security.org
One-in-four have been victims of identity theft
www.securitytube.net
www.securitytube.net
Owasp Appsecusa 2014 - Threat Modeling Made Interactive
www.itpro.co.uk
www.itpro.co.uk
Anonymous targets Ku Klux Klan Twitter account | IT PRO
www.huffingtonpost.com
www.huffingtonpost.com
Dems Demand Answers In State Department Cyberattack
www.jewishpress.com
www.jewishpress.com
The Jewish Press » » Why Hacking Jews to Death During Prayers Has NOTHING to Do with “Occupation”
www.zdnet.com
www.zdnet.com
OS X Yosemite and third-party SSDs: Here's what you need to know | ZDNet
www.neowin.net
www.neowin.net
Comodo Internet Security 8.0.0.4337 - Neowin
www.zawya.com
www.zawya.com
No One is Immune to Breaches as 183 Million Accounts Compromised in Q3 2014 - Zawya
continuitycentral.com
continuitycentral.com
Business continuity briefs
www.security-faqs.com
www.security-faqs.com
What The Hack? Over Half Of UK Businesses Would Consider Risky Recruitment Practices
www.net-security.org
www.net-security.org
Top 5 fraud risk areas in the workplace
www.securitytube-training.com
www.securitytube-training.com
Metasploit for Pentesters « SecurityTube Trainings
nakedsecurity.sophos.com
nakedsecurity.sophos.com
Breached US State Department takes email offline to update security | Naked Security
www.forbes.com
www.forbes.com
SymantecVoice: Epidigitalogy: Surveying For Digital Diseases Like An Epidemiologist - Forbes
midsizeinsider.com
midsizeinsider.com
BYOD and Security: A Work in Progress ::Mobile:: Midsize Insider
www.reuters.com
www.reuters.com
Fitch: Russia's Largest Food Retailers Unaffected By Food Import Ban; Smaller Formats Outperform| Reuters
now.avg.com
now.avg.com
Internet of Things is web’s next money spinner say small businesses
gadgets.ndtv.com
gadgets.ndtv.com
OS X Yosemite v10.10.1 Update Brings Improvements to Mail, Wi-Fi, and More | NDTV Gadgets
www.bloomberg.com
www.bloomberg.com
FBI Probes Agency Computer Breaches Said to Bear Signs of Spying - Bloomberg
www.itnewsonline.com
www.itnewsonline.com
IT News Online > - Tech Data Offering Cisco Next Generation Network Security Solutions
www.presstelegram.com
www.presstelegram.com
Steve La stands between hackers and Cal State Long Beach computers
www.theregister.co.uk
www.theregister.co.uk
So you want to introduce a BYOD plan. Where do you start? • The Register
www.businessweek.com
www.businessweek.com
FBI Probes Agency Computer Breaches Said to Bear Signs of Spying - Businessweek
www.securitytube-training.com
www.securitytube-training.com
Javascript for Pentesters « SecurityTube Trainings
nakedsecurity.sophos.com
nakedsecurity.sophos.com
Apple ships X 10.10.1 – does it fix those Wi-Fi problems? | Naked Security
www.techtimes.com
www.techtimes.com
State Department Pulls Email System Offline Amidst Hacking Incident : PERSONAL TECH : Tech Times
www.preventionweb.net
www.preventionweb.net
The vital role of protected areas in climate disaster risk reduction - News - Professional Resources - PreventionWeb.net
www.net-security.org
www.net-security.org
TRUSTe deceived consumers through its privacy seal program
www.net-security.org
www.net-security.org
Risk assessment benefits, best practices and pitfalls
www.utmpacer.com
www.utmpacer.com
Network Security Engineer at University of Tennessee (The Pacer) | The Pacer
www.theregister.co.uk
www.theregister.co.uk
Bug fixes! Get your APPLE BUG FIXES! iOS and OS X updates right here! • The Register
www.computerworld.com.au
www.computerworld.com.au
The show must go on: How to prepare a business continuity plan - Computerworld
thehackernews.com
thehackernews.com
Windows Phone 8.1 Hacked
www.sans.org
www.sans.org
DFIR Summit (Austin, TX)
thehackernews.com
thehackernews.com
Suspected Wirelurker iOS Malware Creators Arrested in China
www.net-security.org
www.net-security.org
ReadyNAS OS offers 5 levels of data protection
www.theregister.co.uk
www.theregister.co.uk
Gee THANKS: Cryptoscum offer a free decrypt in latest ransomware racket • The Register
www.pentesteracademy.com
www.pentesteracademy.com
Introduction
cybersecuritysummit.co.uk
cybersecuritysummit.co.uk
Cyber Security Summit 2014 - Cyber Security Summit 2014
www.securitytube.net
www.securitytube.net
Owasp Appsecusa 2014 - Ten Secrets To Secure Mobile Applications
www.newsfactor.com
www.newsfactor.com
Dell Unveils a Slew of New Enterprise Systems | NewsFactor Network
www.theatlantic.com
www.theatlantic.com
State Department Confirms Hackers Breached Email - The Atlantic
zeenews.india.com
zeenews.india.com
Spate of cyber-attacks hit US government systems | Zee News
www.koreatimes.co.kr
www.koreatimes.co.kr
[Commendation Award] Banks need to take defferent approaches
www.telegraph.co.uk
www.telegraph.co.uk
Which software security for online banking? - Telegraph
www.ibtimes.co.in
www.ibtimes.co.in
PCI Chairman Katju Asks AMU Not to Target Journalists as VC Bans TOI in University
www.dailybarometer.com
www.dailybarometer.com
Police Beat - The Daily Barometer: News
www.computerworld.co.nz
www.computerworld.co.nz
Are tablets the "sweet spot" of NZ BYOD programs? - Computerworld New Zealand
www.newsnet5.com
www.newsnet5.com
Watch how hackers get inside Ohio woman's computer and steal personal data - newsnet5.com Cleveland
seclists.org
seclists.org
Bugtraq: CVE-2014-8768 tcpdump denial of service in verbose mode using malformed Geonet payload
seclists.org
seclists.org
Bugtraq: CVE-2014-8767 tcpdump denial of service in verbose mode using malformed OLSR payload
www.pentesteracademy.com
www.pentesteracademy.com
Module 2: HelloWorld Shellcode JMP-CALL-POP Technique
www.heraldsun.com
www.heraldsun.com
Student hackers code for social good | The Herald-Sun
www.eweek.com
www.eweek.com
Microsoft's Big Data Cloud Broadens Support
www.macrumors.com
www.macrumors.com
Chinese Authorities Shut Down WireLurker Distribution Site, Arrest Suspects Involved - Mac Rumors
security.itbusinessnet.com
security.itbusinessnet.com
Intrusion Inc. Reports Net Income Of $147 Thousand On Revenue Of $2.0 Million In The Third Quarter Of 2014
www.news.com.au
www.news.com.au
Anonymous hacks Ku Klux Klan Twitter accounts, reveals members’ names
seclists.org
seclists.org
Bugtraq: CVE-2014-8769 tcpdump unreliable output using malformed AOVD payload
www.theregister.co.uk
www.theregister.co.uk
USB coding anarchy: Consider all sticks licked • The Register
abcnews.go.com
abcnews.go.com
Review: Apple's iOS 8 Provides a Smarter Type - ABC News
www.securitytube.net
www.securitytube.net
Owasp Appsecusa 2014 - Hacking .Net(C#) Applications: The Black Arts (Asm Attacks)
seclists.org
seclists.org
Bugtraq: [security bulletin] HPSBMU03072 rev.3 - HP Data Protector, Remote Execution of Arbitrary Code
seclists.org
seclists.org
Bugtraq: [security bulletin] HPSBMU03183 rev.2 - HP Server Automation and Server Automation Virtual Appliance, running SSL, Remote Disclosure of Information
mashable.com
mashable.com
Internet-connected battery turns your old smoke detector into a smart one
h30499.www3.hp.com
h30499.www3.hp.com
Reverse engineering NAND Flash Memory – POS device... - HP Enterprise Business Community
contagiodump.blogspot.co.uk
contagiodump.blogspot.co.uk
contagio: AlienSpy Java RAT samples and traffic information
triblive.com
triblive.com
Cybersecurity experts warn in Pittsburgh conference about dangers of hacking | TribLIVE
news.drweb.com
news.drweb.com
Malware in Android firmware makes itself at home on handheld devices — Dr.Web - innovation anti-virus security technologies. Comprehensive protection from Internet threats.
seclists.org
seclists.org
Bugtraq: APPLE-SA-2014-11-17-1 iOS 8.1.1
seclists.org
seclists.org
Bugtraq: APPLE-SA-2014-11-17-2 OS X Yosemite 10.10.1
www.exchange4media.com
www.exchange4media.com
Indian Advertising, Indian Advertising Services, Indian Marketing Services, Indian Newspaper, Indian Television, Latest News and Media News, Advertising - exchange4media.com
blog.beyondtrust.com
blog.beyondtrust.com
Triggering MS14-066 | BeyondTrust
www.ecommercetimes.com
www.ecommercetimes.com
Hackers Humiliate U.S. State Department | Government | E-Commerce Times
www.jrn.com
www.jrn.com
New breed of identity thieves targeting your medical records - TODAY'S TMJ4
www.zdnet.com
www.zdnet.com
Anonymous statement: KKK is a terrorist group, KKK responds poorly | ZDNet
www.tripwire.com
www.tripwire.com
The Ten Most Wanted Hackers By The FBI – #2
www.pcworld.com
www.pcworld.com
New ransomware CoinVault allows users to decrypt one file for free | PCWorld
www.marketwired.com
www.marketwired.com
Corrective Education Company Adds Top Retail Industry Veterans to Its Field Organization
www.japantimes.co.jp
www.japantimes.co.jp
FBI probes State Department hacking tied to White House breach | The Japan Times
www.newsfactor.com
www.newsfactor.com
Dell Debuts SuperMassive 9800 Next-Gen Firewall | NewsFactor Network
www.deccanchronicle.com
www.deccanchronicle.com
Ethical hackers step in to solve cyber crimes
www.chron.com
www.chron.com
Cisco Just Released A Slack Clone With Audio And Video (CSCO) - Houston Chronicle
www.computerworld.com
www.computerworld.com
Cisco crashes the enterprise mobile party with new collaboration app | Computerworld
www.techworld.com.au
www.techworld.com.au
The show must go on: How to prepare a business continuity plan - Techworld
www.schneier.com
www.schneier.com
Schneier on Security: The NSA's Efforts to Ban Cryptographic Research in the 1970s
www.newser.com
www.newser.com
State Department Latest Federal Agency to Be Hacked, No Classified Systems Believed to Be Accessed
wgntv.com
wgntv.com
Anonymous hacks KKK Twitter accounts, reveals members’ names | WGN-TV
abc11.com
abc11.com
State Dept Shuts Down Email After Hacking Attack | abc11.com
www.itworldcanada.com
www.itworldcanada.com
Using big data analytics to secure the enterprise | IT World Canada News
nation.com.pk
nation.com.pk
US State Department network ‘hacked’
www.theguardian.com
www.theguardian.com
Philip Nitschke tribunal hearing: is there such a thing as ‘rational suicide’? | Australia news | theguardian.com
www.infosecurity-magazine.com
www.infosecurity-magazine.com
Cisco Launches Open-Source Security Analytics - Infosecurity Magazine
www.computerworld.com
www.computerworld.com
PCI Council looks to stem data breaches after bad year | Computerworld
packetstormsecurity.com
packetstormsecurity.com
WebsiteBaker 2.8.3 XSS / SQL Injection / HTTP Response Splitting ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Zoph 0.9.1 Cross Site Scripting / SQL Injection ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Fwknop Port Knocking Utility 2.6.4 ≈ Packet Storm
www.thedailybeast.com
www.thedailybeast.com
The Hot and Cold of Everyday Life (NSFW) - The Daily Beast
www.eweek.com
www.eweek.com
Cisco Grows Collaboration Lineup With Mobile App, Room System
rcpmag.com
rcpmag.com
What To Expect with Microsoft's New Per-User Windows Licensing -- Redmond Channel Partner
www.bellinghamherald.com
www.bellinghamherald.com
Local news from Bellingham, Whatcom County, WA | BellinghamHerald.com
www.symantec.com
www.symantec.com
WHITE PAPER: Using Symantec Endpoint Protection 12.1 to Protect Against Advanced Persistent Threats (APTs) | Symantec Connect
packetstormsecurity.com
packetstormsecurity.com
Slackware Security Advisory - mozilla-thunderbird Updates ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Joomla HD FLV 2.1.0.1 Arbitrary File Download ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Videos Tube 2.0 SQL Injection / XSS / Shell Upload ≈ Packet Storm
www.securitytube.net
www.securitytube.net
Owasp Appsecusa 2014 - Warning Ahead: Security Storms Are Brewing In Your Javascript
www.usatoday.com
www.usatoday.com
Smoother start, but some struggle with HealthCare.gov
packetstormsecurity.com
packetstormsecurity.com
Gentoo Linux Security Advisory 201411-05 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Malware Spreading Via Steam Chat ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
HP Security Bulletin HPSBGN03192 1 ≈ Packet Storm
www.slashgear.com
www.slashgear.com
Suspects behind “WireLurker” malware arrested in China - SlashGear
www.cso.com.au
www.cso.com.au
Security is “a massively complex topic” - CA World - CSO | The Resource for Data Security Executives
focustaiwan.tw
focustaiwan.tw
PLA has set up Chinese version of 'PRISM' monitoring in H.K.: Kanwa | Cross-Strait Affairs | FOCUS TAIWAN - CNA ENGLISH NEWS
www.edtechmagazine.com
www.edtechmagazine.com
Best Practices for Selecting a Next-Generation Firewall | EdTech Magazine
www.cnet.com
www.cnet.com
How to set up Smart Lock on Android 5.0 Lollipop - CNE
www.takepart.com
www.takepart.com
The KKK Learns the Hard Way: Don't Mess With Anonymous | TakePart
www.omaha.com
www.omaha.com
Nebraska, Iowa trade associations call for legislation regarding data breaches - Omaha.com: Money Talks Blog
www.theguardian.com
www.theguardian.com
Anonymous takes over Ku Klux Klan's Twitter account | Technology | theguardian.com
www.youtube.com
www.youtube.com
Protecting Your World Against Cyber Security Threats | Kaspersky Lab Video - YouTube
www.zdnet.com
www.zdnet.com
Snapchat issues outright ban on third-party apps following 4chan hack | ZDNet
mashable.com
mashable.com
Google Genomics is a cloud service just for DNA data
www.youtube.com
www.youtube.com
OSPFv2 Neighborships vs Adjacencies on Broadcast/NBMA Networks - YouTube
www.bostonglobe.com
www.bostonglobe.com
Merchants and credit cards are getting safer - Business - The Boston Globe
www.healthdatamanagement.com
www.healthdatamanagement.com
CISO’s Words of Wisdom: How To Address The Most Pressing Challenges in Healthcare Information Security
www.newindianexpress.com
www.newindianexpress.com
A Wool – Free Winter -The New Indian Express
finance.yahoo.com
finance.yahoo.com
IT Departments across EMEA Still Not Ready for the Internet of Things, Finds ISACA Survey - Yahoo Finance
www.cso.com.au
www.cso.com.au
The E-Commerce Cyber Security Advantage - CSO | The Resource for Data Security Executives
www.pentesteracademy.com
www.pentesteracademy.com
Course Introduction
appleinsider.com
appleinsider.com
Chinese sites hosting 'Wirelurker' Mac-to-iOS malware taken down, suspects arrested
www.theregister.co.uk
www.theregister.co.uk
How to keep everything fluffy in your hybrid cloud world • The Register
www.securityinfowatch.com
www.securityinfowatch.com
NOAA websites fall victim to cyberattack | SecurityInfoWatch.com
www.cio-today.com
www.cio-today.com
US State Department's E-Mail Hacked - Computing on CIO Today
www.eweek.com
www.eweek.com
U.S. State Department Is Latest Hacking Victim
www.850koa.com
www.850koa.com
Latest Federal Hacking Victim: State Department | 850 KOA
www.11alive.com
www.11alive.com
Hackers targeting families of children with cancer
blog.trendmicro.com
blog.trendmicro.com
Flashpack Exploit Kit Used in Free Ads, Leads to Malware Delivery Mechanism
blogs.mcafee.com
blogs.mcafee.com
Seven Favorite FOCUS Sessions: Ready to Replay | McAfee
6abc.com
6abc.com
State Dept Shuts Down Email After Hacking Attack | 6abc.com
consumerist.com
consumerist.com
Report: Payment Information Breaches At Staples And Michaels May Be Linked – Consumerist
www.centredaily.com
www.centredaily.com
Community | CentreDaily.com
www.itwire.com
www.itwire.com
iTWire - VIDEO: F5 Networks at the 2014 Gartner Symposium
www.eweek.com
www.eweek.com
Online Shoppers Turned Off by Shipping Costs, Security Concerns
www.tripwire.com
www.tripwire.com
Organizations Hit By DDoS Attack Lose $40,000 Per Hour, Survey Says
www.pcworld.com
www.pcworld.com
BadUSB: What you can do about undetectable malware on a flash drive | PCWorld
www.scmagazine.com
www.scmagazine.com
State Department hack may be tied to White House network breach - SC Magazine
www.net-security.org
www.net-security.org
The most unpopular person in the room
www.securitytube.net
www.securitytube.net
Owasp Appsecusa 2014 - When You Can't Afford 0days: Client-Side Exploitation For The Masses
www.freep.com
www.freep.com
Duggan: Hackers went after Detroit database, official
www.techtimes.com
www.techtimes.com
Apple OS X Yosemite Update Boosts Wi-Fi, Patches Mail Bugs : PERSONAL TECH : Tech Times
www.biztechmagazine.com
www.biztechmagazine.com
Best Practices for Selecting a Next-Generation Firewall — BizTech
www.trefis.com
www.trefis.com
BlackBerry Launches BES 12, Partners With Samsung To Ride The MDM Wave -- Trefis
www.usmagazine.com
www.usmagazine.com
Hunger Games Mockingjay Part 1 Review: Sequel Is "Forgettable" - Us Weekly
www.infoworld.com
www.infoworld.com
Cisco crashes the enterprise mobile party with new collaboration app | InfoWorld
www.scmagazine.com
www.scmagazine.com
Microsoft report explores dangers of running expired security software - SC Magazine
www.forbes.com
www.forbes.com
Fitbit Data Now Being Used In The Courtroom - Forbes
now.avg.com
now.avg.com
Creating the Next 2 Billion Smart Users
staysafeonline.org
staysafeonline.org
News Details | StaySafeOnline.org
www.csoonline.com
www.csoonline.com
Scammers move from Ebola phishing to fundraising | CSO Online
seattletimes.com
seattletimes.com
Dems demand answers in State Dept. cyber-attack | Nation & World | The Seattle Times
www.thompsoncitizen.net
www.thompsoncitizen.net
Democrats on US House oversight panel ask when data breach was discovered, how it was fixed - International - Thompson Citizen
windowsitpro.com
windowsitpro.com
MS14-066 is this Month's Problem Patch | Security content from Windows IT Pro
www.forbes.com
www.forbes.com
Cisco thinks outside the box with Project Squared - Forbes
heavy.com
heavy.com
Anonymous Hacks the KKK: 5 Fast Facts You Need to Know | Heavy.com
thefusejoplin.com
thefusejoplin.com
Should You Switch From The iPhone 5S to iPhone 6? | The Fuse Joplin
www.newser.com
www.newser.com
Democrats on House oversight panel ask when data breach was discovered, how it was fixed - 11/17/2014 3:52:10 PM | Newser
www.dailyitem.com
www.dailyitem.com
State Department shuts down e-mail amid hacking concerns - The Daily Item: News
www.theprovince.com
www.theprovince.com
Quebec nursing home that burned down not required to have sprinklers, inquest hears
www.networkworld.com
www.networkworld.com
Hackers claim BitTorrent Sync should not be used for sensitive data | Network World
www.northjersey.com
www.northjersey.com
Engewood Cliff-based ConnectOne discloses hacking of a customer's account - Business - NorthJersey.com
mashable.com
mashable.com
Let's talk about Robot Butler...