NetSecu
NetSecu

blog.trendmicro.com
blog.trendmicro.com
Think Before you “Share” to Prevent Identity Theft -
www.scmagazine.com
www.scmagazine.com
Apple premiers automatic update for security flaw - SC Magazine
www.securitytube.net
www.securitytube.net
Def Con 22 Burner Phone Ddos 2 Dollars A Day 70 Calls A Minute
www.trendmicro.com
www.trendmicro.com
Security Tips for the Holidays - Security News - Trend Micro USA
twitter.com
twitter.com
Cisco Security sur Twitter : "Have a Snorty Holiday! RT to spread the holiday cheer! http://t.co/RE9PW4kU7J"
twitter.com
twitter.com
RSA sur Twitter : "Happy holidays and a joyful 2015 from all of us at RSA! http://t.co/NnyHfTQACV"
www.securitytube.net
www.securitytube.net
Def Con 22 Bug Bounty Programs Evolution
www.consumerelectronicsnet.com
www.consumerelectronicsnet.com
The Gift that Keeps on Giving: How Our Online Habits are Paving the Way for a Society of Surveillance for our Children and how to avoid becoming a victim
www.rsaconference.com
www.rsaconference.com
Bulletproof SSL and TLS – Blog Post – RSA Conference
twitter.com
twitter.com
Trend Micro sur Twitter : "We wish everyone safe travels, wonderful family gatherings and the happiest of holiday seasons! http://t.co/zNZirPBRsg"
www.securitytube.net
www.securitytube.net
Def Con 22 Blowing Up The Celly Building Your Own Sms - Mms Fuzzer
twitter.com
twitter.com
Kaspersky Lab sur Twitter : "Wishing you all a happy holiday season! http://t.co/eRIvNzUoI4"
twitter.com
twitter.com
RSA Conference sur Twitter : "http://t.co/Slpta7WqYm"
twitter.com
twitter.com
Cisco Security sur Twitter : "To our valued customers, partners & employees around the globe, we hope you have very #HappyHolidays! http://t.co/ggufVvPNFn"
www.whatech.com
www.whatech.com
Explore Global disaster recovery services market that is expected to grow at a CAGR of 12.47% to 2019 - WhaTech
www.schneier.com
www.schneier.com
Schneier on Security: "Santa Claus and the Surveillance State"
www.governing.com
www.governing.com
Why Some Cities Are Using Cloud-Based Approaches to Disaster Recovery
magazine.vulnerability-db.com
magazine.vulnerability-db.com
Wickr Desktop v2.2.1 Windows - Denial of Service Vulnerability (Demonstration Video) | VULNERABILITY MAGAZINE - Bug Bounties, Acknoweldgements & Security Research
seclists.org
seclists.org
Bugtraq: Lazarus Guestbook v1.22 - Multiple Web Vulnerabilities
seclists.org
seclists.org
Bugtraq: Wickr Desktop v2.2.1 Windows - Denial of Service Vulnerability
slur.io
slur.io
Introducing Slur
www.youtube.com
www.youtube.com
Wickr Desktop v2.2.1 Windows - Denial of Service Vulnerability - YouTube
www.securitytube.net
www.securitytube.net
Def Con 22 Blinding The Surveillance State
www.seetheinterview.com
www.seetheinterview.com
The Interview - Kernel
www.securitytube.net
www.securitytube.net
Def Con 22 Panel - Diversity In Information Security
twitter.com
twitter.com
Symantec sur Twitter : "Symantec would like to wish you and your families a very warm and Merry Christmas! http://t.co/47HrmfvXL0"
seclists.org
seclists.org
Bugtraq: DRAM unreliable under specific access patern
www.thebradentontimes.com
www.thebradentontimes.com
Movers and Shakers: Sarasota Law Firm Launches New Data Breach Practice Group - The Bradenton Times - Local News for Bradenton and Manatee County - Free News for Bradenton, FL and Manatee County
www.securitytube.net
www.securitytube.net
Def Con 22 Domain Name Problems And Solutions
www.jdsupra.com
www.jdsupra.com
Consumers Permitted To Proceed With Data Breach Class Action Against Target | King & Spalding - JDSupra
www.scmagazine.com
www.scmagazine.com
What we can be thankful for in '14, and what we might expect in '15 - SC Magazine
www.koat.com
www.koat.com
Albuquerque Journal, on ISIS headline: There was no data breach | New Mexico News - KOAT Home
www.securitytube.net
www.securitytube.net
Def Con 22 Don't Ddos Me Bro Practical Ddos Defense
twitter.com
twitter.com
Cisco Security sur Twitter : "#CableWednesday - Holiday Edition! How does your tree compare to ours? #HappyHolidays! http://t.co/lDpm33YpE9"
www.insurancetech.com
www.insurancetech.com
5 Tips On How To Prepare For A Data Breach | Insurance & Technology
www.pe.com
www.pe.com
COMMUNITY NOTES: Cyber security competition, teens donate diapers, more - Press Enterprise
www.securityweek.com
www.securityweek.com
MBR Wiper Attacks Hit Korean Power Plant: Trend Micro | SecurityWeek.Com
www.information-age.com
www.information-age.com
2015 technology trends – what are the security implications? | Information Age
www.securitytube.net
www.securitytube.net
Def Con 22 Dropping Docs On Darknets How People Got Caught
www.cbsnews.com
www.cbsnews.com
Phishing quiz: Can you spot a scam when you see one? Don't be so sure - CBS News
www.scmagazine.com
www.scmagazine.com
A forecast of the cyberthreat landscape in 2015 - SC Magazine
www.mcafee.com
www.mcafee.com
Downloader
www.youtube.com
www.youtube.com
Using Endpoint Visibility to Protect Your Enterprise with RSA Security Analytics and RSA ECAT - YouTube
www.csoonline.com
www.csoonline.com
5 lessons to help security pros craft a New Year’s resolution | CSO Online
twitter.com
twitter.com
Dan Kaminsky sur Twitter : "The New Yorker wins. http://t.co/23XKNhWPUa"
www.scmagazine.com
www.scmagazine.com
The problem with Big Data - SC Magazine
blogs.cisco.com
blogs.cisco.com
Cisco Cloud Security for Public and Private Cloud – A Secure, and Compliant Cloud Data Center
www.securitytube.net
www.securitytube.net
Def Con 22 Elevator Hacking From The Pit To The Penthouse
www.bizjournals.com
www.bizjournals.com
3 South Florida Staples impacted by data breach - South Florida Business Journal
www.trendmicro.com
www.trendmicro.com
Korean Nuclear Plant Faces Data Leak and Destruction - Security Intelligence - Trend Micro USA
www.reuters.com
www.reuters.com
Security experts fear Sony attack to fuel more company extortion| Reuters
twitter.com
twitter.com
McAfee sur Twitter : "Hackers' hoaxes are all over the web. Steer clear of these #12Scams. http://t.co/9gFpH6qJUI"
staysafeonline.org
staysafeonline.org
Download Details | StaySafeOnline.org
www.tripwire.com
www.tripwire.com
JPMorgan Chase Breach: From Nation State to Simple Mistake | The State of Security
packetstormsecurity.com
packetstormsecurity.com
Sony To Show 'The Interview' On Youtube, Other Internet Channels ≈ Packet Storm
www.pe.com
www.pe.com
SAN BERNARDINO: Girl Scouts learn about cyber security and related careers - Press Enterprise
www.infosecisland.com
www.infosecisland.com
JPMorgan Hackers Compromised Server Unprotected by Two-factor Authentication
www.youtube.com
www.youtube.com
Have you been naughty or nice? Find out if Santa knows. - YouTube
www.scmagazine.com
www.scmagazine.com
DNS attacks putting organizations at risk, survey finds - SC Magazine
now.avg.com
now.avg.com
A Silver Lining in the Sony Hack Attack?
www.securitytube.net
www.securitytube.net
Def Con 22 Empowering Hackers To Create A Positive Impact
twitter.com
twitter.com
Cisco Security sur Twitter : "2001: Cisco Networking Academy reached 100 countries and more than 318,000 students learning IT skills! #Cisco30 http://t.co/RVSIPdRGIp"
www.channelpartnersonline.com
www.channelpartnersonline.com
Weathering the Storm: How to Build an Effective Long-Term Business Continuity Plan
www.scmagazine.com
www.scmagazine.com
Modified Zeus trojan targets numerous online banking systems - SC Magazine
www.waaytv.com
www.waaytv.com
Apple CEO Tim Cook coming to Huntsville for cyber security summit - Huntsville News | WAAYTV.com and ABC 31: Tech Alabama
packetstormsecurity.com
packetstormsecurity.com
SysAid Server Arbitrary File Disclosure ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Debian Security Advisory 3110-1 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Cisco Security Advisory 20141222-ntpd ≈ Packet Storm
www.youtube.com
www.youtube.com
Juniper Networks Holiday Card - YouTube
packetstormsecurity.com
packetstormsecurity.com
AMSI 3.20.47 Build 37 File Disclosure ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
NotePad++ 6.6.9 Buffer Overflow ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Nuit Du Hack 2015 Call For Papers ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Rackspace Restored After DDOS Takes Out DNS ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
How Laws Restricting Tech Expose Us To Greater Harm ≈ Packet Storm
www.platts.com
www.platts.com
ATLANTIC MET COAL: Russian PCI tight, US high-vol blends aid costs - Coal | Platts News Article & Story
blog.trendmicro.com
blog.trendmicro.com
Trend Micro Consumer Security is the Sole Leader in Real-World Testing Done by Independent Organization -
packetstormsecurity.com
packetstormsecurity.com
US Politician Wants Details On The Sony Pictures Hack ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
JPMorgan Chase Mega-Hack Was A Simple Two-Factor Auth Fail ≈ Packet Storm
thenextweb.com
thenextweb.com
Cyber Security Resources to Protect You from Hackers
www.bizjournals.com
www.bizjournals.com
Staples stores in St. Petersburg, Largo, Bradenton hit by data breach - Tampa Bay Business Journal
www.cisco.com
www.cisco.com
Data and Analytics - Cisco
www.sans.org
www.sans.org
Information Security Training | Scottsdale, AZ | Cybersecurity | SANS
www.facebook.com
www.facebook.com
SANS Institute - Photos du journal | Facebook
www.slideshare.net
www.slideshare.net
Radware State of the Union: Ecommerce Page Speed & Web Performance I…
www.tripwire.com
www.tripwire.com
Belden Acquisition Promises a Bright Future for Tripwire
blog.trendmicro.com
blog.trendmicro.com
Phishing schemes: Don’t take the bait! -
new2015.kaspersky.com
new2015.kaspersky.com
Santa appreciated my behavior this year.
twitter.com
twitter.com
RSA sur Twitter : "Wishing everyone a joyful 2015 from all of us at RSA! http://t.co/eoFwvlMysj"
www.usatoday.com
www.usatoday.com
Key industries train to thwart cyber attacks
www.securitytube.net
www.securitytube.net
Panel: Ephemeral Communications: Why And How?
play.google.com
play.google.com
Norton Security and Antivirus - Android Apps on Google Play
www.schneier.com
www.schneier.com
Schneier on Security: Did North Korea Really Attack Sony?
blogs.cisco.com
blogs.cisco.com
Santa Visits Children’s Hospitals Across North America using Cisco Video Technology
www.bizjournals.com
www.bizjournals.com
Shoppers can sue Target over data breach - Memphis Business Journal
www.csoonline.com
www.csoonline.com
Crimeware-as-a-Service offers custom targeting | CSO Online
www.wired.com
www.wired.com
How Laws Restricting Tech Actually Expose Us to Greater Harm | WIRED
www.wired.com
www.wired.com
8 Free Privacy Programs Worth Your Year-End Donations | WIRED
thehackernews.com
thehackernews.com
South Korean Nuclear Power Plant Hacked - Hacker News
www.cio.com
www.cio.com
Cybercrime group steals millions from Russian banks, targets US and European retailers | CIO
www.telegraph.co.uk
www.telegraph.co.uk
Mobile phones 'wide open' to global hackers - Telegraph
www.securitytube.net
www.securitytube.net
Def Con 22 Extreme Privilege Escalation On Windows 8 Uefi Systems
www.bbc.com
www.bbc.com
BBC News - South Korea's Park Geun-hye orders cyber security boost
www.efinancialnews.com
www.efinancialnews.com
Five cyber-security trends to watch for in 2015
uk.businessinsider.com
uk.businessinsider.com
Steven Sinofsky: Sony Hack Is A Major Security 'Breaking Point' - Business Insider
seclists.org
seclists.org
Bugtraq: Reflecting XSS Vulnerability in CMS Contenido 4.9.x-4.9.5
www.westerncarolinian.com
www.westerncarolinian.com
Senior Security Engineer (CISSP) at Western Carolina University (Western Carolinian) | Western Carolinian
www.securitytube.net
www.securitytube.net
Def Con 22 From Raxacoricofallapatorius With Love Case Studies In Insider Threats
www.symantec.com
www.symantec.com
The Gift that Keeps on Giving: 12 Ways Everyone Can Help IT This Holiday Season | Symantec Connect
www.reuters.com
www.reuters.com
Apple pushes first ever automated security update to Mac users| Reuters
seclists.org
seclists.org
Bugtraq: FreeBSD Security Advisory FreeBSD-SA-14:31.ntp
seclists.org
seclists.org
Bugtraq: Cisco Security Advisory: Multiple Vulnerabilities in ntpd Affecting Cisco Products
hothardware.com
hothardware.com
Apple Pushes Its First Automated Security Update To Squash Critical OS X NTP Flaw
www.securitytube.net
www.securitytube.net
Def Con 22 I Am A Legend Hacking Hearthstone With Machine Learning
now.avg.com
now.avg.com
Thoughts on Workplace Privacy
www.tripwire.com
www.tripwire.com
The 12 Hacks of Christmas – Part 3
www.healthdatamanagement.com
www.healthdatamanagement.com
10 Cloud Security Considerations for Healthcare
www.theregister.co.uk
www.theregister.co.uk
Rackspace restored after DDOS takes out DNS • The Register
www.tripwire.com
www.tripwire.com
Hacking the Internet of Things: Be Afraid of the Toasters
thehill.com
thehill.com
Chip-and-PIN will cut fraud | TheHill
now.avg.com
now.avg.com
Thoughts on Mobile Digital Parenting
www.theregister.co.uk
www.theregister.co.uk
ICANN's technical competence queried by Verisign report • The Register
krebsonsecurity.com
krebsonsecurity.com
The Case for N. Korea’s Role in Sony Hack — Krebs on Security
www.trendmicro.com
www.trendmicro.com
You Better Watch Out, You Better Not Click: Holiday Movie Threats - Security News - Trend Micro USA
now.avg.com
now.avg.com
Technology is still a distraction for drivers
www.theregister.co.uk
www.theregister.co.uk
POS malware crooks hack IP cams to validate targets • The Register
communities.cisco.com
communities.cisco.com
Threat-Centric Security: Top Security Highlight... | Cisco Communities
www.securitytube.net
www.securitytube.net
Def Con 22 How To You Feel About Your Mother Psych And The Se
now.avg.com
now.avg.com
What does the Future hold for Women in Tech
thehill.com
thehill.com
Sony hack reveals threat of ‘psychological’ cyber warfare | TheHill
www.businessinsider.in
www.businessinsider.in
Here Are 10 Internet Security Predictions For 2015 BySymantec [Infographic] | Business Insider India
www.laptopmag.com
www.laptopmag.com
Kaspersky Anti-Virus 2015 Review - PC Antivirus Software
www.theregister.co.uk
www.theregister.co.uk
Hack flings bootkits from Macs' Thunderbolts • The Register
www.creditcards.com
www.creditcards.com
7 high-tech holiday scams
now.avg.com
now.avg.com
The Changing Landscape of BYOD
www.theregister.co.uk
www.theregister.co.uk
Doh! WikiLeaks' PDF viewer springs XSS vuln • The Register
www.infosecurity-magazine.com
www.infosecurity-magazine.com
AutoIT-based POS Malware 'Sparks' Fresh Threat - Infosecurity Magazine
now.avg.com
now.avg.com
Boardroom or Baby? Why are there so few women in tech?
www.emc.com
www.emc.com
Big Data Analytics & Hadoop | Big Data Solutions | EMC
www.securitytube.net
www.securitytube.net
Def Con 22 How To Get Phone Companies To Just Say No To Wiretapping
blog.trendmicro.com
blog.trendmicro.com
MBR Wiper Attacks Strike Korean Power Plant
now.avg.com
now.avg.com
How to Identify Yourself, Digitally
blogs.cisco.com
blogs.cisco.com
Network Access Control Sure Isn’t What It Used to Be…
Patch.com
Patch.com
Best of Patch | Local News, Community, Sports, Shopping, Restaurants, Things To Do
www.csoonline.com
www.csoonline.com
Staples says 1.16M cards affected during data breach | CSO Online
www.sans.org
www.sans.org
SANS Institute
www.radware.com
www.radware.com
How New Cyber Security Federal Regulations Are Impacting Application and Network Security
www.healio.com
www.healio.com
ACCOAST-PCI: Prasugrel treatment should be deferred for non-STEMI | Cardiology
www.bizjournals.com
www.bizjournals.com
Local cyber security expert shares tips for Phoenix businesses after Sony hack - Phoenix Business Journal
forums.juniper.net
forums.juniper.net
Hackers - Deadly as Australia's wildlife - J-Net Community
www.schneier.com
www.schneier.com
Schneier on Security: Manipulating Juries with PowerPoint
www.computerworld.com
www.computerworld.com
US lawmaker asks Sony for details on data breach | Computerworld
blog.didierstevens.com
blog.didierstevens.com
oledump: Extracting Embedded EXE From DOC | Didier Stevens
blog.foundationdb.com
blog.foundationdb.com
Hot Cloud Swap: Migrating a Database Cluster with Zero Downtime
www.securitytube.net
www.securitytube.net
Def Con 22 How To Disclose An Exploit Without Getting In Trouble
www.informationweek.com
www.informationweek.com
SDN Comes Of Age - InformationWeek
now.avg.com
now.avg.com
Here’s To Second Acts
www.csoonline.com
www.csoonline.com
What the Sony breach means for security in 2015 | CSO Online
blog.trendmicro.com
blog.trendmicro.com
FBI Insights On Fighting Cybercrime -
now.avg.com
now.avg.com
How technology will change the way we behave in 2015
www.datacenterknowledge.com
www.datacenterknowledge.com
The Sony Hack: A Bitter Multi-Motive Pill to C.H.E.W.
www.csoonline.com
www.csoonline.com
Flaw in open-source PDF viewer could put WikiLeaks users, others at risk | CSO Online
blog.coresecurity.com
blog.coresecurity.com
A Security Carol | Core Security Blog
www.wired.com
www.wired.com
Experts Are Still Divided on Whether North Korea Is Behind Sony Attack | WIRED
thatguy.trendmicro.com
thatguy.trendmicro.com
Identity Fraud & Data Theft – Don’t be that Guy
sites.google.com
sites.google.com
Child Safe Initiative - Alamo ISSA
www.pcworld.com
www.pcworld.com
US lawmaker asks Sony for details on data breach | PCWorld
www.infosecisland.com
www.infosecisland.com
Forensic Examinations And Facts
www.sans.edu
www.sans.edu
Cyber Security masters degree | Information Security Masters Degree
www.csoonline.com
www.csoonline.com
China is key to North Korean Internet, but maybe not hackers | CSO Online
blog.radware.com
blog.radware.com
Your Six Favorite Posts of 2014 | Radware Blog
securityledger.com
securityledger.com
Coordinating Threat Intelligence to Stop Sophisticated Attacks | The Security Ledger
www.symantec.com
www.symantec.com
Reaffirming Symantec’s Commitment to Security and Privacy for the Online World | Symantec Connect
www.csoonline.com
www.csoonline.com
Thunderbolt devices can infect MacBooks with persistent rootkits | CSO Online
www.theregister.co.uk
www.theregister.co.uk
JPMorgan mega breach traced back to simple 2FA fail • The Register
www.securitytube.net
www.securitytube.net
Def Con 22 Home Alone With Localhost Automating Home Defense
packetstormsecurity.com
packetstormsecurity.com
Slackware Security Advisory - xorg-server Updates ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Apple Security Advisory 2014-12-22-1 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
BitRaider Streaming Client 1.3.3.4098 Local Privilege Escalation ≈ Packet Storm
www.sans.org
www.sans.org
Information Security Training | New Orleans, LA | Cybersecurity | SANS
www.schneier.com
www.schneier.com
Schneier on Security: North Korea DDoSed Off the Internet
recode.net
recode.net
South Korea Steps Up Cyber Security at Nuclear Plants | Re/code
www.realclearpolitics.com
www.realclearpolitics.com
MSNBC Cyber Security Expert: Evidence That North Korea Behind Sony Hack "Speculative" | Video | RealClearPolitics
www.13wham.com
www.13wham.com
RIT cyber security scholarship - 13WHAM ABC Rochester NY - Top Stories
packetstormsecurity.com
packetstormsecurity.com
SmoothWall 3.1 Cross Site Request Forgery / Cross Site Scripting ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
SoX 14.4.1 Heap Buffer Overflow ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
UnZip 6.0 Heap Buffer Overflow ≈ Packet Storm
thatguy.trendmicro.com
thatguy.trendmicro.com
Phishing Scams & Identity Theft Protection – Don’t be that Guy – Trend Micro
www.youtube.com
www.youtube.com
Innovation Sandbox 2014 - RedOwl - YouTube
www.inforisktoday.com
www.inforisktoday.com
Sony Hack Breaks 'Nation-State' Mold - InfoRiskToday
www.scmagazine.com
www.scmagazine.com
Weak server entry point in JPMorgan Chase breach - SC Magazine
packetstormsecurity.com
packetstormsecurity.com
IPCop 2.1.4 Cross Site Request Forgery / Cross Site Scripting ≈ Packet Storm
www.sans.org
www.sans.org
Fun with CISSP Questions: "The Absurd, The Drink the Kool-Aid, and The Ugly" - SANS Institute
www.sans.org
www.sans.org
Cyber Threat Intelligence Summit (Washington, DC)
blogs.cisco.com
blogs.cisco.com
Issues and Dilemmas in Information Security Practices
www.usatoday.com
www.usatoday.com
Holiday shopping may not be more secure
packetstormsecurity.com
packetstormsecurity.com
Apple Updates Macs For First Time Without Asking ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
China Fingered For Afghan Govt Attacks ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
This Year's Worst Hacks, From Sony To Celebrity Nude Pics ≈ Packet Storm
motherboard.vice.com
motherboard.vice.com
Sony Threatens to Sue Twitter Unless It Removes Tweets Containing Hacked Emails | Motherboard
thehackernews.com
thehackernews.com
Tor Network Is Under Attack through Directory Authority Servers Seizures - Hacker News
www.csoonline.com
www.csoonline.com
11 predictions for security in 2015 | CSO Online
www.schneier.com
www.schneier.com
Schneier on Security: 2008 Cyberattack Against Turkish Oil Pipeline
www.pentesteracademy.com
www.pentesteracademy.com
Dissecting WLAN Headers
www.tripwire.com
www.tripwire.com
Apple Releases Security Patch for NTP Vulnerability in OS X
www.theregister.co.uk
www.theregister.co.uk
GCHQ: We can't track crims any more thanks to Snowden • The Register
www.securitytube.net
www.securitytube.net
Def Con 22 Hacking Us And Uk &Amp; Australia &Amp; France Etc Traffic Control Systems
www.csoonline.com
www.csoonline.com
North Korea's Internet restored after over 9-hour outage | CSO Online
www.zdnet.com
www.zdnet.com
Charlatans: The new wave of privacy profiteers | ZDNet
blogs.cisco.com
blogs.cisco.com
Cisco UCS Mini Wins infoTECH Spotlight Award
www.csoonline.com
www.csoonline.com
Misfortune Cookie vulnerability affects 12 million routers | CSO Online
www.csoonline.com
www.csoonline.com
Two-factor authentication oversight led to JPMorgan breach, investigators reportedly found | CSO Online
www.csoonline.com
www.csoonline.com
North Korea, Iran, Syria – asymmetric cyberwar is here to stay | CSO Online
www.wdaz.com
www.wdaz.com
Judge's ruling allows customers to sue Target over data breach | WDAZ
magazine.vulnerability-db.com
magazine.vulnerability-db.com
Facebook Social Network - Privacy Issue disclosed to Bug Bounty Program by Whitehat | VULNERABILITY MAGAZINE - Bug Bounties, Acknoweldgements & Security Research
www.wired.com
www.wired.com
The Sneakiest Way Prosecutors Get a Guilty Verdict: PowerPoint | WIRED
www.wired.com
www.wired.com
The Year's Worst Hacks, From Sony to Celebrity Nude Pics | WIRED
www.newswiretoday.com
www.newswiretoday.com
Newswire & Press Release / Barracuda Wins Three TechTarget Information Security Magazine and SearchSecurity.com 2014 Readers’ Choice Awards - IT Security/Anti-Spam - Barracuda Networks, Inc. | NewswireToday
www.securitytube.net
www.securitytube.net
Def Con 22 Hacking The Fbi How &Amp; Why To Liberate Government Records
now.avg.com
now.avg.com
Make your battery life go further with smart battery profiles
thehackernews.com
thehackernews.com
BitTorrent Invites Sony to Release 'The Interview' Movie On Its Paid Service - Hacker News
now.avg.com
now.avg.com
AVG CloudCare wins VB100 independent antivirus award
continuitycentral.com
continuitycentral.com
Quality control and measurement of business continuity management systems: final survey results
continuitycentral.com
continuitycentral.com
Business continuity briefs
www.theregister.co.uk
www.theregister.co.uk
EU flings €1m at open source security audit wheeze • The Register
www.net-security.org
www.net-security.org
Infosec: More than reindeer games
www.theregister.co.uk
www.theregister.co.uk
China fingered for Afghan Govt attacks • The Register
seclists.org
seclists.org
Bugtraq: [slackware-security] xorg-server (SSA:2014-356-03)
www.zdnet.com
www.zdnet.com
Flaw in MacBook EFI allows boot ROM malware | ZDNet
www.theregister.co.uk
www.theregister.co.uk
Easy Tinder prank hack lets you play stupid cupid • The Register
www.net-security.org
www.net-security.org
5 working days left until the deadline for compliance with PCI DSS 3.0 kicks in
www.securitytube.net
www.securitytube.net
Def Con 22 Hack All The Things 20 Devices In 45 Minutes
blog.trendmicro.com
blog.trendmicro.com
Patches Not Cure-all for Shellshock
seclists.org
seclists.org
Bugtraq: [slackware-security] ntp (SSA:2014-356-01)
seclists.org
seclists.org
Bugtraq: [slackware-security] php (SSA:2014-356-02)
www.latimes.com
www.latimes.com
UC Berkeley hack: Personal data on 1,600 people possibly compromised - LA Times
www.turkishweekly.net
www.turkishweekly.net
Geers: In the future, national security and cyber security will grow increasingly synonymous, 23 December 2014
www.cloudwedge.com
www.cloudwedge.com
Cyber Security Trends Expected to Continue into 2015 | CloudWedge
www.net-security.org
www.net-security.org
Top Facebook scams and malware attacks
seclists.org
seclists.org
Bugtraq: [SECURITY] [DSA 3111-1] cpio security update
www.nbclosangeles.com
www.nbclosangeles.com
"Not Your Everyday Hack": Cyber Security Wiz Kids Chime in on Sony Hack | NBC Southern California
seclists.org
seclists.org
Bugtraq: APPLE-SA-2014-12-22-1 OS X NTP Security Update
www.mysuncoast.com
www.mysuncoast.com
Bradenton Staples store among 115 locations in data breach - Sarasota News | Mysuncoast.com and ABC 7: Local News
www.net-security.org
www.net-security.org
Digital crime landscape in 2015
www.tripwire.com
www.tripwire.com
The Sony Hack: Comparisons with Shamoon and Dark Seoul
www.tripwire.com
www.tripwire.com
From Toys to Terror
antirez.com
antirez.com
Redis latency spikes and the 99th percentile - Antirez weblog
www.securitytube.net
www.securitytube.net
Def Con 22 Getting Windows To Play With Itself A Hacker's Guide To Windows Api Abuse
www.itbusinessedge.com
www.itbusinessedge.com
Mobile Security 2015: The Enterprise at Risk
continuitycentral.com
continuitycentral.com
If you doubted that information security was a business continuity issue consider a four letter word: Sony
www.infosecurity-magazine.com
www.infosecurity-magazine.com
(ISC)² Security Congress Opens Call for Speakers - Infosecurity Magazine
www.theregister.co.uk
www.theregister.co.uk
Microsoft patch mashes Office forms and macros • The Register
www.bobsguide.com
www.bobsguide.com
Sony cyber security hack could inspire copycats - bobsguide.com
www.theregister.co.uk
www.theregister.co.uk
Sucker for punishment? Join Sony's security team • The Register
www.net-security.org
www.net-security.org
Will 2015 be the year of risk-based security?
www.securitytube.net
www.securitytube.net
Def Con 22 Generating Rop Payloads From Numbers
community.websense.com
community.websense.com
Sony Pictures Entertainment Hack – Truly motion picture worthy
vine.co
vine.co
Watch Symantec's Vine "Empower your team with Symantec Mobility Solutions. #GoEmpower"
www.ky3.com
www.ky3.com
Local experts offer advice for cyber security | Local - KY3.com
nakedsecurity.sophos.com
nakedsecurity.sophos.com
EU to demand 2-factor for online payments by August 2015? | Naked Security
www.fierceitsecurity.com
www.fierceitsecurity.com
North Korean malware that infected Sony network is well-known and 'simplistic,' says Cisco - FierceITSecurity
www.symantec.com
www.symantec.com
Malicious links: Spammers change malware delivery tactics | Symantec Connect
www.securitytube.net
www.securitytube.net
Def Con 22 From Root To Special Pwning Ibm Mainframes
www.scmagazine.com
www.scmagazine.com
Report: SS7 flaws enable listening to cell phone calls, reading texts - SC Magazine
krebsonsecurity.com
krebsonsecurity.com
Gang Hacked ATMs from Inside Banks — Krebs on Security
www.scmagazine.com
www.scmagazine.com
Northwestern Memorial HealthCare laptop stolen, patient data at risk - SC Magazine
betanews.com
betanews.com
The future of wearable technology in 2015
www.reuters.com
www.reuters.com
China condemns cyberattacks, but says no proof North Korea hacked Sony| Reuters