The Evolution of and Need for Secure Network Access
Taking A Bolder Approach To Protect Identities And Endpoints | Symantec Connect
Digital Transformation and IT: The CIO´s balancing act | ZDNet
Why is Microsoft updating Windows PCs for a security bug on the server? | PCWorld
THUNK! News - Awesome Holiday Gifts And Tips From A Pro
Budding Brazilian Hackers Get Online Training from $46 - Infosecurity Magazine
Mobile Data Protection Market Worth $3.54 Billion by 2019 -- DALLAS, November 21, 2014 /PR Newswire UK/ --
Protecting critical healthcare data in the era of 'big data'
Ex-US Navy administrator sentenced for hacking
Don't Worry, Your PSN Account Details Probably Haven't Been Leaked - Push Square
NSA Chief Warns Chinese Cyberattacks Could Shut U.S. Infrastructure - NBC News
Why is Microsoft updating Windows PCs for a security bug on the server? - Techworld
Kaspersky Lab sur Twitter : "Time to #TestYourBrain... do you know the answer?"
Coming soon: Slow, heavy, shrieking, autonomous robot rent-a-cops | Ars Technica
What We Mean by Maturity Models for Security - Dark Reading
ACCES I/O Products Releases Rugged Mini PCI Express Isolated RS232 Serial Communication Cards with Tru-Iso™ Isolation and Extended Temperature | Virtual-Strategy Magazine
Target Corporation (NYSE:TGT) News Analysis: How Target (TGT) Recovered From Last Year's Credit-Card Breach
Man gets 18 months for Subway cash register hacks | FOX10 News |
Swedish appeals court nixes Assange's plea - SC Magazine
Marcio Barbado, Jr. sur Twitter : "@2600 Can you tell potentially dangerous human beings from embodied in-course cataclysms?"
Switzerland May Give Every Citizen $2,600 a Month | Motherboard
Avoid becoming a victim to webcam hackers |
US man sentenced for hacking POS systems at Subway | Network World
Facing up to a water crisis – Global Public Square - Blogs
Protecting your home cameras from hackers
Holiday shoppers nervous about hacking
Russian hackers hijacked webcams included Lexington home
Court Sends Subway Restaurant Hacker to Jail for 18 Months | WHAV
Soonr Inks Distribution Deal With Nuvotera To Boost Workplace File Sync Product - Page: 1 | CRN
Researchers craft molecule that works as flash storage | Ars Technica
Security Conferences - Security Events - Trend Micro USA - Trend Micro USA
VIDEO: Hackers Snooping on Unsecure Webcams | Video |
PSN, Windows Live, 2K Games & Other Services Hacked By Hacker Group DerpTrolling, Customers Login Details Leaked
In a cloud outage, no one can hear you scream | InfoWorld
ifty sur Twitter : "Relaxing after a hard week including a most excellent CTF/conference @irisscert"
Usenix Security '14 - On The Feasibility Of Large-Scale Infections Of Ios Devices
Man gets 18 months for hacking into Subway and stealing more than $40,000 in gift cards |
USB Armory is the Swiss army knife of security devices | ITworld
Ex-Navy administrator sentenced for hacking
Anonymous proves: Take hacks seriously - Northern Star Online: Scene
Firefox maker remains 'utterly confident' as revenue growth sputters - CNE
Dell Unveils a Slew of New Enterprise Systems - Cloud Computing on Top Tech News
Why Do People Keep Getting Pushed onto Subway Tracks? | VICE | United States
Hundreds of baby monitors and CCTVs hacked: how to keep your cameras safe - News - Gadgets and Tech - The Independent
Ex-US Navy administrator sentenced for hacking - San Francisco Chronicle
Russian Website Hacks Nanny Cams and Baby Monitors | Video - ABC News
Study: Third of employees use company devices for social media and online shopping - SC Magazine
Critical XSS vulnerability addressed in WordPress - SC Magazine
3 Questions to Ask Vendors When Securing POS - BankInfoSecurity
'DoubleDirect' MitM attack affects iOS, Android and OS X users - SC Magazine
The Brazilian Underground Market -
Preventing Another Holiday Season Data Breach – Blog Post – RSA Conference
Experts Predict Retailers Will Face Holiday Hacking Surge - The CIO Report - WSJ
Man gets 18 months for Subway cash register hacks - San Francisco Chronicle
UCF Police increase campus security following FSU shooting
New Malware, NSA Director Statements Shine Spotlight on Mobile Security - The CIO Report - WSJ
IT Departments across EMEA Still Not Ready for the Internet of Things, Finds ISACA Survey | Business Wire
Ransom malware attacks underscore limitations of anti-virus software | CSO Online
Northeast Florida campus security plans in place, yet students likely to still feel unsafe |
FSU shooting prompts review of security in Florida colleges - Sun Sentinel
NSA director states China can shut down U.S. electric grids, report indicates - SC Magazine
Web Shell: PHP Meterpreter
Beth Israel fined $100,000 for patient data breach - Business - The Boston Globe
DerpTrolling Leaks Thousands of Logins for PSN, Windows Live, 2K | SegmentNext
California man sentenced to 18 months for hacking into cash registers at Subway shops
South Florida must lead on climate change - Sun Sentinel
Schneier on Security: Friday Squid Blogging: Cephalopod Cognition
Being Refused CABG a Sign of Extra Risk for PCI Patients With Left Main, Multivessel Disease - Journal News - TCTMD
Has the PlayStation Network really been hacked? Should you change your password? | Naked Security
What SMBs Need to Know About Disaster Recovery as a Service
The Elevation of Privilege (EOP) Card Game
A Quick Look at MS14-068 | BeyondTrust
How to Position IT Security as an Enterprise Profit Center
News Story - Silver Surfer Today
Andy Coulson Walks From Prison After Five Months
USB Armory is the Swiss army knife of security devices - PC World New Zealand
Former Subway Franchise Owner Sentenced to 18 Months in Prison for Gift Card Hacking Scheme at Subway Restaurants
Which Retailers will Profit the Most This Holiday Shopping Season? -
US man sentenced for hacking POS systems at Subway | PCWorld
Kaspersky Internet Security for Android Proves Most Effective in PC Security Labs Test | Kaspersky Lab US
3 Internet of Things Security Nuances You May Not Have Considered
Privacyware Privatefirewall 7.0 Privilege Escalation ≈ Packet Storm
Corporate Call for National Data Breach Standards | Legal Times
PCI-DSS 3.0's Focus on the Data Security Practices of Service Providers | Snell & Wilmer - JDSupra
WordPress SP Client Document Manager 2.4.1 SQL Injection ≈ Packet Storm
Supr Shopsystem 5.1.0 Cross Site Scripting ≈ Packet Storm
Mandriva Linux Security Advisory 2014-223 ≈ Packet Storm
AWS Partner Story: Trend Micro
Registration is Now OPEN for RSA Conference 2015! – Blog Post
PSN, Windows Live, 2K Games User Accounts Leaked By Hacking Group
Google Launches Chrome 39, the 64-Bit Version Mac's OSX : Trending News : Latinos Health
UK National Crime Agency Arrests Hackers Using Remote Access Trojans
Fitch Upgrades Picard BondCo's Senior Notes to 'BB', Affirms IDR at 'B+'| Reuters
Chrysler, Nissan minivans earn 'dire' crash test results, says IIHS [w/video] - Autoblog
Bugtraq: [security bulletin] HPSBUX03087 SSRT101413 rev.2 - HP-UX CIFS Server (Samba), Remote Denial of Service (DoS), Execution of Arbitrary Code, Unauthorized Access
Feds Laud UMaine System as Cyber-Security Education Leader | Maine Public Broadcasting
Just Released 2015 Information Security Policy Documents Available for Download from the Compliance Leaders at | Virtual-Strategy Magazine
Juniper Networks sur Twitter : "Love it when the network surprises us with haikus."
Preparing for the Social Internet of Things
Usenix Security '14 - Security Analysis Of A Full-Body Scanner
Fitch Revises Ibercaja Banco's Outlook to Positive; Affirms IDR at 'BB+'| Reuters
Corporate Call for National Data Breach Standards | Corporate Counsel
(ISC)²® Opens Call for Speakers for Third Annual CyberSecureGov Training Event | Virtual-Strategy Magazine
Dell, Intel Open Doors to New IoT Solutions Lab
Target Continues Push To Nix Consumer Data Breach Suits - Law360
TidBITS: Keeping Up with the Snoops 7: Too Many Snoops
TECHNICAL WHITE PAPER▶The Cyber Resilient Enterprise - Harnessing You…
Angus King touts Maine University System’s role in preventing cyber ‘Pearl Harbor’ — Education — Bangor Daily News — BDN Maine
Target to judge: Banks’ losses in our card breach aren’t our problem | Ars Technica
Extracting Insight from Unstructured Data
ENTER PASSWORD_: A supercut of ‘90s cinema hackers · Great Job, Internet! · The A.V. Club
RSA Cloud Identity and Access Management for All of Your Applications - YouTube
Press Release: Russian webcam hackers-authority available for comment
Webcam hacking website based in Cocos Islands prompts warning from privacy commissioner - ABC News (Australian Broadcasting Corporation)
Homeland Security Today: Destructive Malware Evades Detection to Cause Multi-million Dollar Losses
HACKERS can DELETE SURVEILLANCE DVRS remotely – report • The Register
Kent man held in international computer hacking raids | Meridian - ITV News
Car-hacked: Cyber-criminals could target driverless vehicles, cause chaos – expert — RT UK
What tops Target's holiday wish list? Bringing back 'Tarjay'
Tech Data Partners Get Cisco Cybersecurity Solutions
Surveillance Camera Flaw Leaves Hackers in Control - Infosecurity Magazine
Computer hackers arrested in international operation by police - Telegraph
Critical XSS flaws patched in WordPress and popular plug-in | CSO Online
Why Mozilla is scared of Google | The Verge
iX Pro Tip: Using the PR Search Database - J-Net Community
Security is a People Problem, Training is the Solution | SecurityWeek.Com
6 tips for protecting your Internet-connected devices
DoubleDirect: Hackers Redirect High-Traffic Sites Via New MITM Attack
Tracking Activity in the Chinese Mobile Underground | Security Intelligence Blog | Trend Micro
Amazon's AppStream can now stream any Windows application | ZDNet
How a Russian Web site peers into your home, and your baby’s room, by hacking webcams - The Washington Post
Using a password manager on Android? It may be wide open to sniffing attacks | Ars Technica
Bugtraq: [ MDVSA-2014:223 ] wireshark
Bugtraq: [ MDVSA-2014:224 ] krb5
Bugtraq: [ MDVSA-2014:219 ] srtp
Bugtraq: [ MDVSA-2014:220 ] qemu
BillGuard And Experian Partner For Consumer Protection - Forbes
Advisory meeting has a melt-down | All Point Bulletin
Cyberwar is bullshit | The Verge
A bad year for cybersecurity, but a great one for business
Internet to Hit 3 Billion Users in 2015 - eMarketer
FTC shuts down operations of computer repair scammers - SC Magazine
Brigham Young University-Idaho student hacks transcript, earns $7k in scholarships - SC Magazine
DoubleDirect Hackers Snag Device Traffic ≈ Packet Storm
Computer Hijacking Arrests In UK And Across Europe ≈ Packet Storm
PayPal Takes 18 Months To Patch Critical Remote Code Execution Hole ≈ Packet Storm
The Emerging Moral Obligation You Have to People L... - J-Net Community
Executive Cyber Intelligence Report: November 21, 2014
Social Privacy - Online Reputation Protection – Don’t be that Guy
Privacy, rights groups support gov't spyware detection tool - SC Magazine
ACLU requests info on gov't spy program using 'dirtboxes' - SC Magazine
FTC Kills Tech Support Scam Firms That Raked In $120m ≈ Packet Storm
PlayStation Network and Windows Live hack could be a hoax, experts say | Technology | The Guardian
Pro tip: Fixes for common Active Directory connectivity issues on OS X - TechRepublic
Mobile Data Protection Market Worth $3.54 Billion by 2019 -- DALLAS, November 21, 2014 /PRNewswire/ --
Convicted ID Thief, Tax Fraudster Now Fugitive — Krebs on Security
Citadel variant targets master passwords, authentication solutions - SC Magazine
VirusBulletin tests 48 antivirus scanner for Windows 8.1 – Avast doesn’t pass |
Android Lollipop: Get All the Sweet Without the Sour -- What Enterprises Need to Know - Innovation Insights
Millions of WordPress websites in danger due to easily exploitable bug
IRISSCON 2014: Security Tales from the Emerald Isle - Infosecurity Magazine
Staying Safe from Online Threats This Thanksgiving - Security News - Trend Micro USA
The CRM Lottery
After Decent Quarter, Target's Strategy For The Next Carries Risk - Forbes
Three Wire Systems Buys Hardware Hosting Cage in San Diego | ExecutiveBiz
Incapsula estimates DDoS attacks cost $40,000 per hour | Network World
Family Internet Safety using a Secure Home Internet Gateway: How to Make Your Home Safe for Kids and from Malware | ওয়াশিংটন বাংলা রেডিও Washington Bangla Radio USA
Hackers leak logins from PSN, Windows Live, and 2K Games | SiliconANGLE
Kaspersky Lab sur Twitter : "@thisisdebasish There are a few reasons, which are explained in the article. More about privacy than being unsecure."
Number of cyber security jobs doubles as firms realise hacking threat
FACT SHEET: U.S. Assistance to Ukraine | The White House
Fitch Affirms Novartis AG at 'AA'; Outlook Stable| Reuters
A Forum to Spur America’s Return to Federalism
Ransom malware attacks underscore limitations of anti-virus software - CSO | The Resource for Data Security Executives
Hackers could pose the greatest threat to driverless cars | Concept - Car News Nov 2014 -
Linux Mint 17.1 finally makes MATE's fancy Compiz graphics easy to use | PCWorld
PSN, Windows Live and 2K Gaming networks ‘hacked’: experts recommend immediate password change, though release could be fake - News - Gadgets and Tech - The Independent
Fitch Downgrades AstraZenaca to 'A+'; Outlook Stable| Reuters
Computing Industry Pioneers Announce New Cybersecurity Venture | Business - Press Releases | | The Providence Journal
New Citadel Trojan Targets Your Password Managers
RSA TCO Calculator - EMC
Agenda – RSA Conference
Home Depot tops Street 3Q forecasts; breach costs hazy
The Pueblo Chieftain |Hackers breach webcam privacy
Will Black Friday Spawn Another Massive Data Breach? - Target (NYSE:TGT) - 24/7 Wall St.
Microsoft Azure Outage: What Went Wrong? | IaaS content from Talkin' Cloud
Video: Anonymous hacks Ku Klux Klan Twitter - Telegraph
CIA crypto-king offers new 'clock' clue to crack Kryptos code • The Register
Russians Hacking Webcams; FTC Ends Tech Scams; Tracking Comcast Techs | News & Opinion |
Is New Zealand Spying on Citizens? Greenwald vs Key | Top Secret Writers – Conspiracy Theory, Strange Stories and Truth
Apple Blocks Flash Player Over Security Issues - The Mac Observer
Driverless cars! They might get hacked! | BitterWallet
Russian webcam hacking website which shows feed apparently from Canterbury pub or bar
Homeland Security Today: Response Time is the Key to Mitigating Data Breaches, Survey Finds
Apple pushes Flash Player update to address security issues | 9to5Mac
Happy Holidays (for the bad guys, maybe not for you) -
What’s Missing from the Industrial Internet of Things Conversation? Software | WIRED
How to Protect From Webcam Hackers: Video - Bloomberg
Mark Fulford - Authors & Columnists - Dark Reading
The Brazilian Underground: A Market for Cybercriminal Wannabes? - Security News - Trend Micro USA
Target customers and profits are back after hack | Money - WYFF Home
Top 8 enterprise network and security trends for 2015 - ITWeb Africa
Barracuda Offers Integrated Security; Boosts Portfolio with Consolidated Network and Content Security... -- CAMPBELL, Calif., Nov. 20, 2014 /PRNewswire/ --
Retail Security Not Getting Any Better, BitSight Study Finds
IBM Rolls Out Analytics-Based Security Solution - Big Data on CIO Today
Module 2: Class-Dump-Z
HP, Symantec team on Disaster Recovery as-a-Service offering based on Helion OpenStack
Norton Holiday Sale | Norton
3 Mobile Security Myths That Can Hurt You | FedTech Magazine
Usenix Security '14 - The Emperor’S New Password Manager: Security Analysis Of Web-Based Password Managers
Anonymous hackers to Ferguson police: 'We are the law now' - Washington Times
Facebook at Work: Here's what you need to know - TechRepublic
(ISC)²® Opens Call for Speakers for Third Annual CyberSecureGov Training Event
Four held in computer hacking probe | Daily Mail Online
POS malware: Potent threat remains for retailers | Symantec Connect
Ventiv Technology's chief information security officer now reports to CEO - BWWGeeksWorld
RSA Security Analytics - EMC Store
Which Is It: Privacy vs. Security, or Privacy and Security? – Blog Post – RSA Conference
Distribution Watch: Accu-Tech, Synnex, Tech Data | Distribution Watch content from The VAR Guy
Four Held In UK Amid Crackdown On Hacking
Customers are over Target's 2013 holiday data breach - Albany Business Review
The Daily Tar Heel :: Tarheel Takeout data hacked
NSA Chief Concerned about Cyber Attacks on U.S Critical Infrastructure
Zero Day Weekly: WhatsApp, Blackphone, Citadel hits password managers | ZDNet
Britain urges Russia to shut down webcams
Australian baby monitors and webcams hacked as footage appears on a Russian website
Web Site Shows Feeds from Thousands of Private Webcams - Network Security on CIO Today
Experts: Home, baby cameras not secure worldwide - WTVQ
Hackers use webcams to spy on homes and businesses (From Daily Echo)
Man guilty in Hidalgo County attempted hacking - Houston Chronicle
Local news from Bellingham, Whatcom County, WA |
Hackers use webcams to spy inside homes of Middlesbrough families and broadcast video live to internet (From The Northern Echo)
Bugtraq: [ MDVSA-2014:218 ] asterisk
DoubleDirect hackers snaffle fandroid and iPhone-strokers' secrets • The Register
Video: How to protect yourselves from Russian webcam hackers - Telegraph
Target will ask judge to toss bank suits over breach - Minneapolis / St. Paul Business Journal
Want to beat auditors and adversaries? Think like an attacker | Government Health I
Website shows hacked private webcams, including several in Greensboro and High Point |
Britain urges Russia to shut down webcam spying site
Russians easily 'hack' webcams, like others have for YEARS | Computerworld
Australian baby monitors and webcams hacked |
Want to know how to shop safely on Black Friday and Cyber Monday? Join our Twitter chat! | Naked Security
Symantec Intelligence Report - October
Trend Micro Security Predictions | The Invisible Becomes Visible
Liverpool teen questioned by detectives as part of European-wide computer hacking investigation - Liverpool Echo
How to use an authenticator app to improve your online security | ZDNet
Barracuda Offers Integrated Security; Boosts Portfolio with Consolidated Network and Content Security Solution - MarketWatch
How hacking the sounds in your head could be the key to happiness - Telegraph
Examining 1 billion transactions for fraud
Hikvision DVRs sporting bugs that allow device hijacking
Raising awareness quickly: Holiday tips and tricks | CSO Online
Andy Coulson freed from prison after just five months | Daily Mail Online
Video: Three held in Leeds over international computer hacking UPDATED - Yorkshire Evening Post
Phone-hacking editor Andy Coulson out of prison after five months
Uber taken to task over anti-journalist privacy debacle | Naked Security
WebApp Sec: AW: concurrent logins
Technology News & Electronic Updates | Electronics Weekly
How to troubleshoot performance issues in SharePoint custom code on your own? Part 4 – Tools Summary - SharePoint Developer Support Team Blog - Site Home - TechNet Blogs
Three held in Leeds over international computer hacking - Yorkshire Post
Former News Of The World Editor Andy Coulson Released From Prison
You want driverless cars? We need to sort out hacking first | Irish Examiner
You want driverless cars? We need to sort out hacking first |
Hacking major threat to driverless vehicle adoption - E & T Magazine
Technology is still a distraction for drivers
WiDy: Motivation and Goal
Black Friday Themed Amazon Voucher Scam
FBI offers $1 million reward for anybody who can help catch online car scam fugitive | Naked Security
Paul Hearns sur Twitter : "Leon van der Eijk of the Honeynet Project demos user account hack at #irisscon"
Usenix Security '14 - Automatically Detecting Vulnerable Websites Before They Turn Malicious
Phone-hacking editor Andy Coulson released from open prison to serve home detention - Crime - UK - The Independent
Andy Coulson released from prison on electronic tag - Telegraph
Grocers, retailers gobble up Apple Pay in time for holidays | Computerworld
Techbytes: Russian Hackers Tap Into Nearly 5,000 US Web Cams | Video - ABC News
Microsoft Says Config. Change Caused Azure Outage | Data Center Knowledge
Four held in computer hacking probe -
Welcome back, Andy Coulson. Let me tell you about life after prison | Denis MacShane | Comment is free |
NDB Advisory Announces Expansion of Edmonton, Alberta PCI QSA Services for Canada Merchants and Service Providers
The 12 scams of Christmas | ZDNet
NotCompable sets new standards for mobile botnet sophistication | CSO Online
Governments act against webcam-snooping websites | CSO Online
Apple iOS Masque flaw dangers: Legitimate app infiltration discovered | ZDNet
Cyber PreCogs? What Do the Next 2-3 Years Hold For Us? -
Why CIOs Need to Embrace New Norms of the Hybrid Cloud | CIO
$120M in tech support scams shut down by FTC -
AVG Bloggers Brunch 2014
MIT, Stanford, Land Major Cyber-Security Funding Injection
WebApp Sec: RE: concurrent logins
Hackers Leak PSN, 2K, Windows Live Accounts, Reset Passwords Now
Android 5.0 Lollipop review - reviews for UK IT professionals -
$120M in tech support scams shut down by FTC -
DerpTrolling leaks PSN, 2K, Windows Live customer logins - CNE
BBC News - World Internet Conference: Has China overcome paranoia?
How to troubleshoot performance issues in SharePoint custom code on your own? Part 3- Slow - SharePoint Developer Support Team Blog - Site Home - TechNet Blogs
$120M in tech support scams shut down by FTC - 23ABC News
Hacking Group May Be Linked to Russian Government, Report Says - Businessweek
PSN and Windows LIVE passwords leaked, Twitter and Facebook may be next -
7 Questions About The President's Immigration Plan Answered | NCPR News
PSN, Windows Live and 2K accounts allegedly compromised – change your passwords | VG247
Users of Remote Access Trojans arrested in Europe
Detekt — Free Anti-Malware Tool To Detect Govt. Surveillance Malware West Africa: Testimony of Assistant Administrator Nancy Lindborg Before the Senate Committee On Homeland Security and Governmental Affairs
Business Continuity Institute publishes a ‘Working Paper’ about organizational resilience
Why Online Privacy Protection Is Not Just About the NSA | Sanjay Sanghoee Directory of Businesses Jobs Press Releases Products Services Articles - Find Companies
Sophos launches Cloud Server Protection - ARN
Russian hackers posting footage from hacked web cams - WWMT - News, Sports, Weather, Traffic
Hacking group leaks PSN, Windows Live customer data | Attack of the Fanboy
BBC News - Chinese authorities arrest three over iOS malware
Wake Co. Schools Asking Students to Bring Their Own Smart Device to School - Time Warner Cable News
Ebola, hackers drive word of the year: 'Exposure' - CNE
Researchers Shine Spotlight on OS X/iOS Masque Attack | Malware | TechNewsWorld
Using company devices for personal activities leads to data loss
ITIL and ISO 20000 problem management
Scenario Based Haccking - Powershell And Mimikatz And Meterpreter
ESG Lab Review: Protecting Virtual Environments with Symantec Backup Exec 2014 - ESG Research - Enterprise Strategy Group
Spy cable revealed: how telecoms firm worked with GCHQ - Channel 4 News
Russia Hacking Into Cameras Across the World
AM - Worldwide webcam hack by Russian site 21/11/2014
Android phones turned into slave armies by hackers - The Times of India
Thomas J. DeMayo, CISSP CIPP/US CPT CEH CHFI MCSE, Director, IT Audit and Consulting, O’Connor Davies, LLP to Speak at the Knowledge Group’s Cyber Security Plans Event -
WhatsApp adds end-to-end encryption using TextSecure | Technology | The Guardian
Financial services cyber trends for 2015
Wireless attacks against 'air gapped' targets are possible, Israeli team claims
MySQL Injection: Comments On Comments | Symantec Connect
Police probe local webcam hacking fears - Hartlepool Mail
House committee asks for details on State Dept breach - SC Magazine
Assembly Language and Shellcoding on Linux « SecurityTube Trainings
My Week | SumAll
Bugtraq: WordPress 3 persistent script injection
These hackers wear white hats | Albuquerque Journal News
British Watchdog Wants Russian Hacking Site Shut
Hackers Can Steal Data Wirelessly From PCs That Aren't Even Online - Bloomberg
Enable the Agile Data Center | Symantec
Driverless cars could be hacked by terrorists, warn transport experts - Telegraph
Driverless cars a 'terror risk' -
PayPal takes 18 months to patch critical remote code execution hole • The Register
Bugtraq: AST-2014-013: PJSIP ACLs are not loaded on startup
Bugtraq: AST-2014-012: Mixed IP address families in access control lists may permit unwanted traffic.
Driverless cars could face threat from hackers trying to cause road chaos | Technology | The Guardian
How to decide between a $199 Windows notebook and a Chromebook | ZDNet
Prioritize security efforts with a data-centric approach - The Business Journals
Hackers turning Android smartphones, tablets into slave armies - IBNLive
Windows 10 Technical Preview updated, boasts 7,000 changes and fixes - CNE
The moral mire of not patching Windows XP | pcpro
A cause for Internet hacking: Anonymous vs KKK - The Daily Athenaeum Online: Opinion
Baby monitors, CCTV cameras and webcams from UK homes and businesses hacked and uploaded onto Russian website - Gadgets and Tech - Life and Style - The Independent
Bugtraq: AST-2014-017: <font size="3" style="font-size: 12pt">Permission escalation through ConfBridge actions/dialplan functions</font>
Bugtraq: AST-2014-016: Remote Crash Vulnerability in PJSIP channel driver
Target Fights to End Bank Suits a Year After Data Breach - Bloomberg
Enterprise software vendors go freemium: It's all about the long tail | ZDNet
‘Citizenfour’ goes inside the mind, motives of Edward Snowden (B+) | Dallas Morning News
Russian Hacker Site Leaks Footage from 70000 Webcams Around the World - Saving Advice Articles
Mobile Cloud Security: What CXOs Need to Know
Remote Code Execution - Powerpoint - 2013 Exploit - Cve-2014-4114 Ms14-060
The Other Side of Masque Attacks: Data Encryption Not Found in iOS Apps
Target Fights to End Bank Suits a Year After Data Breach - Businessweek
Hackers can access personal security systems, post video online | Local News - WISN Home
Snowden’s story exudes agitation of political thriller
Tool launched to detect government surveillance spyware on your computer - Telegraph
Malware don't need Coffee: CVE-2014-8440 (Flash up to and Exploit Kits
Data Breach Developments in California (Part 1) | The National Law Review
Apple security checks may miss iWorm malware - CSO | The Resource for Data Security Executives
Avoiding the Bait: Tips to Protect Yourself Against Phishing Scams
Uber, facing public backlash, will rethink privacy | CSO Online
Consumers urged to protect themselves from data breaches | Special Reports - WMUR Home
Tor's feral fans are its own worst enemy | ZDNet
NSA director admits U.S. power grid is not safe from Chinese hackers | The State Column
A New Service Will Help You Wrest Your Online Identity From Google | WIRED
Critics storm Poland's electoral body over delays
Changing Default Passwords Prevents Hacking in Cameras -
$120M in tech support scams shut down by FTC - 7NEWS Denver
NATO's Cyber War Games Amid Surge In Attacks
Russian-based hackers stream videos from baby monitors, home security cameras and webcams online | Financial Post
Webcam hacking site back online
Self-Healing Virtual Machines Coming To Datacenter Near You? | CloudWedge
Malware’s new target: your password manager’s password | Ars Technica
Suit Filed Over Jimmy John's Data Breach | National Law Journal
Internet governance & cyber security highlighted - CCTV News - English
Critics storm Poland's electoral body over delays - World - NZ Herald News
Webcam owners beware of hackers and change your password, warns the UK's technology tsar - Mirror Online
World // Russian Hackers Compromising U.S. Security | Houghton Star
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER • The Register
Citadel Trojan snooped on password managers to snatch victims' logins • The Register
Owasp Appsecusa 2014 - Headless Browser Hide And Seek
Kaspersky Lab sur Twitter : "Hold on... the weekend is near!"
Cyber-security 'critical' to market - Yahoo News UK
Why you should add application virtualization and streaming to your c…
China arrests three over WireLurker iOS malware attack- The Inquirer
Tech Data Offering Cisco Next Generation Network Security Solutions Nasdaq:TECD
Cyber Arms Dealers Peddle 85 Worms a Day -
Opinion: Cyber arms control? Forget about it -
Chinese APT Campaigns May Be More Connected Than Previously Thought
'Masque Attack' Vulnerability Allows Malicious Third-Party iOS Apps to Masquerade as Legitimate Apps - Mac Rumors
Apple Responds to 'Masque Attack' Vulnerability, Not Aware of Customers Affected by Attack - Mac Rumors
Where Do Cyber-Weapons Come From? Try a Cyber Arms Dealer -
Tor Project responds to NSA’s Xkeyscore tracking of visitors | BetaBoston
RSA Conference 2014: Celebrating Milestones, (ISC)² also Revamps its CISSP Exam - Infosecurity Magazine
Should you lose sleep over losing sleep over the economy? | BetaBoston
How the NSA's XKeyscore program works - NBC News
Review: The CISSP Companion You Can’t Do Without - Infosecurity Magazine
Sweden's Intelligence Agency has Access to NSA's XKeyscore system - Infosecurity Magazine
FTC on PC malware security scams: How to avoid fake security programs | BGR
Finally, a New Clue to Solve the CIA's Mysterious Kryptos Sculpture | WIRED
Liferay Portal 6.2 EE SP8 Cross Site Scripting ≈ Packet Storm
Asterisk Project Security Advisory - AST-2014-012 ≈ Packet Storm
Asterisk Project Security Advisory - AST-2014-013 ≈ Packet Storm
4 Ways Your Competitors Are Stealing Your IT Talent | CIO
Microsoft Internet Explorer OLE Pre-IE11 Code Execution ≈ Packet Storm
libCryptoLog 0.1 ≈ Packet Storm
Red Hat Security Advisory 2014-1880-01 ≈ Packet Storm
Separating Hype from Reality SDN in the Financial Services Market | SevOne - Network Performance Management & Monitoring for Your Entire Infrastructure
Site Undergoing Maintenance
Privacy advocates release free 'Detekt' tool that finds surveillance malware | PCWorld
AWS re:Invent 2014 Wrap Up -
Thousands Of Facebook Users Fall For 'Free Audi R8' Scam
Russian 'Satellite Catcher' Test a Step Toward Advanced Cyber Attacks?
What Makes Washington 'Imperial'? | Tom Engelhardt
Cyberwar: Kaspersky identifiziert die ersten fünf Stuxnet-Opfer -
Obama Will Halt Deportation Of Up To 5 Million Immigrants | NCPR News
Human Rights Organizations Launch Free Tool to Detect Surveillance Software - Business & Technology - AllMediaNY
Hackers 'Spying On British Webcams And Baby Monitors'
Wie fand der Stuxnet-Computerwurm seinen Weg in iranische Urananreicherungsanlagen :: AD HOC NEWS
Cybersecurity Expert Peter Singer to Keynote Cyber-risk Conference at DePaul University on December 2
Challenge 35: XSS 16
We can't easily shut down Russian webcam hackers, admits Information Commissioner - News - Gadgets and Tech - The Independent
Closed Circuit Camera Hacking Finds Way To Western Mass - Western Massachusetts Breaking News and First Warning Weather with ABC 40
HTC Nexus 9 Tips And Tricks: Android 5.0 Features, Accessories, Speakers, User Accounts, Software Update - International Business Times
Inside The Hacker's Head: How Cyber-Criminals Look For Opportunities To Wreak Havoc | BCW
Do I need anything besides Windows Defender? | Cyber Trust Blog
AWS re:Invent Round Up -
$120M in tech support scams shut down by FTC - News Sentinel Story
Community news from Biloxi and Gulfport, MS | Sun Herald
Healthcare’s Big Data Opportunity | TechCrunch
Owasp Appsecusa 2014 - Hacking The Oracle Application Framework
Citadel malware attacking open source password managers | ZDNet
Russian hackers hijack webcams worldwide — including at least four in Ottawa | Ottawa Citizen
How To Catch A Cattle Thief | New Hampshire Public Radio
Foreign Governments Have Hacked U.S. Grid, NSA Head Says - Bloomberg
IBM Rolls Out Dedicated Bluemix, Cloud Foundry-Based PaaS
Sophos expands cloud-managed security portfolio with server protection - Media Releases - CSO | The Resource for Data Security Executives
BlackBerry Gets Ready for Internet of Things With BES12 and Project Ion (BBRY)
Australian baby monitors and webcams hacked as footage appears on a Russian website
12 recent data breaches
Report: Government Has Only 5 Years To Secure Internet of Things -
Facebook's privacy blunders may trip up potential enterprise push | Computerworld
Risk of Adverse Outcomes Increase With PCI In Adults With Diabetes
Poland opens probe into electoral hacking - Newsday
Bradenton Local News | Bradenton Herald & Lakewood Ranch Herald
$120M in tech support scams shut down by FTC -
Ukrainian, Western experts debate how to stop Putin
Polish election commission website hacked | World, News, The Philippine Star |
NSA Director: China can damage US power grid - Pacific - Stripes
Exploiting Echo Server v3 Part 1
FTC smackdown! More fake support scammers taken out… | Naked Security
Drupal addresses denial-of-service, session hijacking vulnerabilities - SC Magazine
Malicious banking apps in Google Play target Brazilian Android users - SC Magazine
NSA Director Says Chinese Cyber Hackers Can Shut Down U.S. Power Grid
iTWire - Website hosted in Russia shows global unsecured security cam feeds
We compare BitDefender Antivirus with Panda Global Protection 2014
How to Tame Your Mobile Security Dragon
Android malware 'NotCompatible' evolves, spawns resilient botnet - SC Magazine
Life in the Digital Crosshairs
Gaming Will Level Up The Network - Network Computing
Website live streaming unsecured webcams
Why Palo Alto Networks Rallied 87% in 2014 (PANW)
The Detekt government spyware detection tool, a speech recognition software competition, and Google acquires RelativeWave—SD Times news digest: Nov. 20, 2014 - SD Times
FTC shuts down two more tech-support scammers
The Android 5.0 Lollipop aam aadmi review: I think I’ve made a terrible mistake | The Indian Express
Webcast: Preparing for Big Data and the Internet of Things - Websense Insights
Uber tracking raises privacy concerns
Businesses Prepare as End-of-Life for Windows Server 2003 Nears — BizTech
NSA chief admits China could cripple U.S. power grid, financial networks | ZDNet
Nexus 9 vs Nokia N1: Buy now or wait a bit longer? | Christian News on Christian Today
Halifax homes spied on by camera hackers - Halifax Courier
Customers Aren't Worried About Data Breaches [Infographic]
Foreign Governments Have Hacked U.S. Grid, NSA Head Says - Businessweek
Hacking, hitmen and high stakes in biggest ever cyberwar exercise | The Times
Firing Range — Open Source Web App Vulnerability Scanning Tool From Google
Activity Info
Schneier on Security: Pre-Snowden Debate About NSA Call-Records Collection Program
SC Congress Chicago 2014: Make FBI an ally after breach - SC Magazine
Survey: Breaches don’t change consumer behavior | Chain Store Age
Actiance Recognized in Gartner 2014 Magic Quadrant for Enterprise Information Archiving
Apple’s Mac computers can automatically collect your location information - The Washington Post
Federal Trade Commission busted two telemarketing schemes selling fake tech support, raking in $120 million.
Imperva Expands Big Data Protection with SecureSphere 11.0 - MarketWatch
Microsoft Patches Critical Windows Server Flaw - Microsoft/Windows on Top Tech News
AVG Protection PRO Review & Rating |
Antivirus Comparisons: Kapersky Antivirus vs. G Data Total Protection
How to protect yourself online - B
NSA director predicts major cyberattack by 2025 -- FCW
Avast Free AntiVirus vs AVG AntiVirus - Which Free Antivirus is best for you
Owasp Appsecusa 2014 - Your Password Complexity Requirements Are Worthless
Buffer overflow vulnerabilities identified in Hikvision DVR devices - SC Magazine
Open-source IaaS: OwnCloud 7 Enterprise Edition arrives | ZDNet
Forty-two Senators Block USA Freedom Act to Limit NSA Surveillance
Lawmaker: Delayed notification of postal hacking ‘doesn’t fly’ - The Washington Post
Google Online Security Blog: Ready, aim, fire: an open-source tool to test web security scanners
USPS draws ire of Congress over data breach response - SC Magazine
New Strategies and Features to Help Organizations Better Protect Against Pass-the-Hash Attacks | Cyber Trust Blog
Hackers use radio signals to steal private information from PCs OFFLINE | Daily Mail Online
NSA Director Worries Some Nations Hacking Into Computer Networks to Shut Down US Utilities - ABC News
Actiance Recognized in Gartner 2014 Magic Quadrant for Enterprise Information Archiving - Press Release - Digital Journal
Amazon promises to run entirely on renewable energy... finally | ZDNet
NSA director confirms China, other countries can hack into and shut down critical systems - 11/20/2014 10:24:02 AM | Newser
U.S. Cyber Commander Expects Attack Before 2025Talk Radio News Service
Brazil doubles down on cyber security

 | openDemocracy
More Scare Tactics From the Government Regarding Apple’s Super Secure iMessages | PadGadget
Viptela Partners With Zscaler in Industry-First Integration of SD-WAN and Cloud Security Infrastructure
Australian Government Data Breach Linked to Poor Security Training - eSecurity Planet
TalkRadio 790 KABC - How Russian Website Is Spying on Thousands of Private Moments [From ABC News]
IT needs to stop pretending it's not responsible for cloud security | Computerworld
Move Your Network to the Cloud - YouTube
Five Steps to PCI DSS Compliance
Security or Checking a Box?
Financial Times: NATO holds largest cyber war games
USPS delayed breach notification so as not to tip off hackers - FierceGovernmentI
Russian Webcam Hackers Spy on Bedrooms and Offices - NBC News
Azure vs. AWS | IT World Canada Syndicated
Russian hackers streaming video from thousands of private webcams |
Amazon Vows to Run on 100 Percent Renewable Energy | WIRED
New crash tests reveal which minivans are safe -
Risk of Adverse Outcomes Up With PCI In Adults With Diabetes --Doctors Lounge
Mobile Internet Faces Big Obstacles - Network Computing
Juniper Networks sur Twitter : "We’re thrilled to win the @TSIACommunity STAR Award for Innovation in Enabling Customer Success in Support Services!"
Access Governance 101: Job Changes and Elevated Permissions
Greek Hackers Breach Legal Database |
Gartner's cloud showdown: Amazon Web Services vs. Microsoft Azure - ARN
How to reduce your risk of a cyber security breach - The Business Journals
Poland Opens Probe Into Electoral Hacking - ABC News
Polish election commission website hacked
Owasp Appsecusa 2014 - Clientside Security With The Security Header Injection Module Shim
High volume DDoS attacks rise in Q3 2014 | ZDNet
PCI helps kids globally | Portage Daily Graphic
Verizon enhances cloud purchasing experience with new marketplace - FierceTelecom
Russian-backed website hacks into thousands of webcams in U.S. - CBS News
Hackers to probe cyber crime defences at British banks| Reuters
Cyberspace calls for better coordinated governance | Shanghai Daily
ESPN Student Reporter Makes Jameis Winston Joke During FSU Shooting, Claims Hacking
Hackers post webcam, security camera, baby monitor video online - Technology & Science - CBC News
Can Hackers Get Into Your Pacemaker? - The Atlantic
Enter The Digital Risk Officer
Russian Hackers Posting Baby Monitors, Web Cams Online
Exploiting Sudo's Grace Period ≈ Packet Storm
Paid Memberships Pro Path Traversal ≈ Packet Storm
CryptoPHP - Analysis Of A Hidden Threat Inside Popular Content Management Systems ≈ Packet Storm
RSA Conference sur Twitter : "The mantra of any good security engineer is: 'Security is a not a product, but a process.' -@Bruce_Schneier"
Detekt government surveillance spyware on your computer
Bugtraq: [SECURITY] [DSA 3075-1] drupal7 security update
Swedish Court Rejects Julian Assange's Appeal to Dismiss His Arrest | WIRED
Hackers blamed for unusual tweets from Jeremy Clarkson, Columbian FARC rebels | Naked Security
FireEye: A Next-Generation Cyber Security Play - FireEye, Inc. (NASDAQ:FEYE) | Seeking Alpha
Mandriva Linux Security Advisory 2014-217 ≈ Packet Storm
WordPress CM Download Manager 2.0.0 Code Injection ≈ Packet Storm
Advantech AdamView 4.3 Buffer Overflow ≈ Packet Storm
Spotlight Secure - Actionable threat intelligence - J-Net Community
Secure Apps & Mobile Devices – Don’t be that Guy – Trend Micro
Team heads to cyber war competition - News - Pekin Daily Times - Pekin, IL
Russian website allows webcam hackers to spy on British families in their own homes | UK | News | Daily Express
The Dridex Threat: How to Block the Latest Malware Aimed at Banks - American Banker Article
Review: Shane Harris' book '@War' details rising military-Internet link - LA Times
Imperva Expands Big Data Protection with SecureSphere 11.0 - Media Releases - CSO | The Resource for Data Security Executives
CSA Guide to Cloud Computing: Implementing Cloud Privacy and Security: Raj Samani, Jim Reavis, Brian Honan: 9780124201255: Books
Red Hat Security Advisory 2014-1876-01 ≈ Packet Storm
Red Hat Security Advisory 2014-1877-01 ≈ Packet Storm
Ubuntu Security Notice USN-2410-1 ≈ Packet Storm
Keeping the Bots at Bay: How to Detect Brute Force Attacks
Forrester's Best of the Best in Private, Public Cloud Space
There Will Be Surveillance Reform | Just Security
How to protect yourself from PC tech support scams | PCWorld
FireMon Extends Network Security Monitoring to Cloud Service Infrastructure
Schneier on Security: Citadel Malware Steals Password Manager Master Passwords
Amnesty / EFF Launch Detekt Tool To Spot Web Snooping ≈ Packet Storm
CAPTCHA Rapture As 'Thousands' Affected By 7 Year Old Bug ≈ Packet Storm
Russian Site Lists Breached Webcams ≈ Packet Storm
What will cybersecurity look like in 2025?, Part 3: How Microsoft is shaping the future of cybersecurity | Cyber Trust Blog
Local news from Rock Hill, SC | The Herald
A Peek Inside a POS Scammer’s Toolbox | Security Intelligence Blog | Trend Micro
SANS Securing The Human | American vs. European Reporting - Creating a Sense of Urgency
Russian hackers are turning your webcams without you knowing | Metro News
Critical infrastructure vulnerable to hackers | Russia Beyond The Headlines
Gartner mages: And the Enterprise Archiving Magic Quadrant top spot goes to... • The Register
Russians Hacking Into Home Webcams Sparks U.K. Warning - Businessweek
How to Protect Yourself From a Data Breach | TV - WMUR Home
Review: Snowden documentary ‘Citizenfour’ steeped in real-time anxiety - Go Knoxville Story
Charles Dance: 'I was a phone hacking victim' | Showbiz | News | Daily Express
Trend Micro Collaborates with Latin American Leaders on Cybercrime -
Webcam hack uncovered: how you can protect yourself| News | The Week UK
Hacking Cava Grill: How to order nachos - The Washington Post
Cyberdefender who cut his teeth in Worcester sounds alarm on hackers - Worcester Telegram & Gazette -
US strikes massive tech support scam - CSO | The Resource for Data Security Executives
Court shuts down tech support 'scams' targeted by FTC | PCWorld
Data breach at Triangle food-takeout shop unique because of its size - Triangle Business Journal
Ransom malware attacks underscore limitations of anti-virus software -
Yahoo Replaces Google as Mozilla Search Partner | Re/code
SANS Institute Brings Information Security Training Back to the Big Easy with SANS Security EAST 2015 | SANS Institute: Press
Russian website posting live video streams from hacked webcams
Russian webcam hackers spy on bedrooms and offices
Enterprise Mobile Dollars Pouring To iPhone |
Hacked footage from BABY MONITORS, webcams and CCTV systems in Britain being broadcast LIVE on Russian website - Mirror Online
Do you know who's watching you through your webcam and CCTV? | Irish Examiner
Minivans show major flaw in IIHS safety test
Got a webcam? You might want to pick a stronger password right about now | ZDNet
Tufin Adds Support For Amazon Web Services, Delivers Security Policy Orchestration For Public, Private And Hybrid Cloud Environments - BWWGeeksWorld
Warning as webcam hackers stream live footage from Manchester homes, businesses and gym on the internet - Manchester Evening News
Warning on webcam 'spying' site « Express & Star
BBC News - Breached webcam and baby monitor site flagged by watchdogs
Warning on webcam 'spying' site « Shropshire Star
Target says customers are over last year's data breach - Triangle Business Journal
Webcam hackers spy on Scots homes and post footage on Russian website | Glasgow & West | News
Russian website streams thousands of private webcams - Nov. 20, 2014
Warning on webcam 'spying' site -
Owasp Appsecusa 2014 - Ios App Integrity: Got Any?
Module 1: GDB TUI Mode
Digital Journal: A Global Digital Media Network
Idaho student busted for hacking himself straight-As: cops - NY Daily News
Webcam hackers 'spying inside British homes' - Channel 4 News
Staples Still Tallying Costs of Data Breach
Barracuda Offers Integrated Security; Boosts Portfolio with Consolidated Network and Content Security Solution
Information Security News: SMS pwnage on MEELLIONS of flawed SIM cards, popular 4G modems
Information Security News: Report: Government Has Only 5 Years To Secure Internet ofThings
Carnegie Mellon hosts expert panel on cyber security - Zawya
Ocoee High starts cyber-security team - West Orange Times & Observer - West Orange Times & Observer
RSA Conference APJ Day 1 Recap – Blog Post
How to delete your old, embarrassing, now-much-easier-to-find tweets | Naked Security
Selling disaster recovery -
Comprehensive FISMA and NIST SP 800-53 Information Security Policies and Procedures Now Available for Instant Download from the Experts at Flat Iron Technologies, LLC
ZDNet | Symantec
Lowe's scores big in earnings | The Journal Gazette
3 Reasons Why Lowe's (LOW) Will Outperform Home Depot (HD) Over The Next Few Days
Hackers turning smartphones into slave armies
Is Home Depot Still Hot After Earnings? - Home Depot, Inc. (NYSE:HD) | Seeking Alpha
HD: Buy Home Depot Despite Its Data Breach | InvestorPlace
The Morning Download: Post-PC CEO Reflects Starwood’s Deeper Mobile Shift - The CIO Report - WSJ
Hackers Streaming Brits' Private Webcams
Windows Kerberos bug: How to detect signs of exploitation before the update?
Meet Jasminder Singh - Indian Security Researcher ~ Pentesting and Ethical Hacking Blog
OpenDNS and IRISSCERT partner to fight security threats
8 ways Lollipop 5.0 reinvents Android - Computerworld
(ISC)²® Opens Call for Speakers for Third Annual CyberSecureGov Training Event - Press Release - Digital Journal
AVG Extends Global Partnership with ALCATEL ONETOUCH | Virtual-Strategy Magazine
How Splitting A Computer Into Multiple Realities Can Protect You From Hackers | WIRED
Webcam Hacking: Five Previous Attacks
U.K. to Shut Down Russian Webcam Hackers - The Daily Beast
Gartner Names Proofpoint a Leader in 2014 Magic Quadrant for Enterprise Information Archiving for Third Consecutive Year - BWWGeeksWorld
How the Dark Web's New Favorite Drug Market Is Profiting From Silk Road 2's Demise | WIRED
Free tool detects 'government surveillance spyware'
Activists release Detekt tool that finds surveillance malware | CSO Online
Intel to work with Europol on fighting cybercrime | CSO Online
Russians Hacking Into Home Webcams Sparks U.K. Warning - Bloomberg
Residents in the Bristol area could be spied on by Russian hackers, via baby monitors and webcams | Bristol Post
Intronis Receives 2014 Cloud Computing Backup and Disaster Recovery Award
NetJapan, backup and disaster recovery solution provider, hires Richard Zinner as European Technical... -
A life of cybercrime, a caipirinha and a tan: Fraudsters love a Brazilian • The Register
Information Security News: Hackers seized database from City of Detroit, demanded $800k in bitcoin
Information Security News: Long-running Android botnet evolves, could pose threat to corporate networks
Paul O’Grady settles News of the World phone hacking claim ·
Cyberspace calls for better coordinated governance - People's Daily Online
How to troubleshoot performance issues in SharePoint custom code on your own? Part 2 – High CPU Utilization - SharePoint Developer Support Team Blog - Site Home - TechNet Blogs
Spam Nation: Meet the Russian cybercrooks behind the digital threats in your inbox.
Bugtraq: [ MDVSA-2014:217 ] clamav
Bugtraq: CVE-2014-8877 - Code Injection in Wordpress CM Download Manager plugin
Cyber Security: Protect Yourself And Profit | Seeking Alpha
Amnesty's Detekt tool wants to help you thwart government spying | ZDNet
South Koreans defend their rights in cyberspace | East Asia Forum
Target Sees First Profit Boost Since Data Breach |
Thousands fall for Free Audi R8 Facebook scam
Boot Russian website Peeping Toms from your house ... secure your FRIKKIN' webcam • The Register
HTTP Verb Tampering Demo | What's next in payments
New Citadel variant is after your master password
Owasp Appsecusa 2014 - Modern Web Application Defense With Owasp Tools
8 ways Lollipop 5.0 reinvents Android | InfoWorld
Gartner’s cloud showdown: Amazon Web Services vs. Microsoft Azure | Network World
Local & North Carolina state news from Raleigh, NC |
Russia hacking site spying webcams worldwide: Britain
Change Your Password Now!
Security breaches: protecting your company by supporting your people
“Rotten stinking hovel” hotel charges couple £100 for bad Trip Advisor review | Naked Security
Billions of Android Devices Vulnerable to Privilege Escalation Except Android 5.0 Lollipop
How Millennials Created the IoT Without Even Knowing | WIRED
Paul Ryan sur Twitter : "@integrity_Solutions Sean Rooney speaking about the human element #irisscon"
Amnesty, EFF and Privacy International launch Detekt tool to spot web snooping - IT News from
Webcam hacking: How to keep your computer safe and what measures you can take to increase security - Wales Online
Webcam Hackers Could Be Watching You Online, Watchdog Warns
Secure file storage and sharing with nCrypted Cloud Review
Bugtraq: [ MDVSA-2014:216 ] php-ZendFramework
Waitrose enhances business continuity planning system with Fruition Partners UK - Retail Times
BrianHonan sur Twitter : "Hacker fuel at #irisscon :)"
Grampian Health Board rapped over patient data security failures | IT PRO
‘Digital dragon’ disrupts CIO agenda - CIO
Deep Identity Raises $470,000 To Help Companies Manage Access On Their Networks | TechCrunch
​If Russian spies were looking at your webcam - what would they see? | Gloucester Citizen
Is your webcam allowing hackers to peer into your home? - Telegraph
5 Reasons IT Is Scared of Mobile Security
Robert O'Donoghue sur Twitter : "The Workday security team taking over #IRISSCON in Dublin!"
Post Breach: Jimmy John’s, Coke Sued - DataBreachToday
Eddie Mize sur Twitter : "Please RT: Do Diligence? - My latest blog "If I do not know about it...I am not responsible!""
Six Welsh homes and businesses among hundreds of webcams hacked by Russian website - Wales Online
The Internet of Insecure Things | NDTV Gadgets
IoT moves into business strategy - IT-Online | IT-Online
Police Blotter | | The Grand Blanc View
8 cybercrime trends that will shape I
How the threat landscape is shaping the network security business
U.S. energy grid hacked 79 times this year | Money - Home
Cloud is in, but big data trails - IT-Online | IT-Online
Sinister Russian website transmits live footage of hundreds families unwittingly filmed by their home webcams - Daily Record
TRA hosts the 10th Business Continuity Management Forum for the Telecommunications Sector - Zawya
PCI Applauds House Scrutiny of International Regulatory Standards
Good App/Bad App: Is Investigating Mobile Apps Necessary? | Security Intelligence Blog | Trend Micro
8 on your side: How hackers do what they do | Local News - WGAL Home
USB Armory is the Swiss army knife of security devices - Good Gear Guide Australia
New Synology NAS optimized for encryption and intensive tasks
Whitepaper: Zero Trust approach to network security
Most IT pros prefer open source to proprietary software
Section Introduction and Challenge 1
Owasp Appsecusa 2014 - Blended Web And Database Attacks On Real-Time, In-Memory Platforms
Hacktivists exploiting old, vulnerable corporate websites: Trend Micro - Channel NewsAsia
CAPTCHA rapture as 'thousands' affected by seven year-old bug • The Register
Four Best Practices for Discovering Cloud Data Sources | Symantec Connect
Webcam hackers could be watching you, watchdog warns | Technology | The Guardian
Jon Stewart On The 'Daily Show': 'I'm Still Really Proud Of The Work We Do' | KWI
Jimmy John's customers file class action suit over data breach | Fast Casual
U.S. energy grid hacked 79 times this year | Money - KSBW Home
How to encrypt an Android 5.0 Lollipop device - CNE
Webcam hackers 'spying on families' | Herald Scotland
Hackers seize Detroit's database, demand $800k. Motor City shrugs: OK, take it • The Register Nigeria: Insurgency and the Emir's Prescription
Chrome Browser Updated with 64-bit Mac OS X Support | Digital Trends
Timeline: How the Postal Service Data Breach Went Down -
10 hottest IT skills for 2015 | Computerworld
Fitch Rates NTPC's Proposed USD Notes 'BBB-(EXP)'| Energy & Oil| Reuters
Economy may expand at 5.6% in FY15: Fitch
Riley county looks to beef up courthouse security | Kansas First News
iOS And OS X Malware Suspects Nabbed In China - Site Also Shut Down
Paul O'Grady wins settlement for hacking claim - Liverpool Echo
Why It's Crucial to Get More Women Into Science
Astro-boffins start opening universe simulation data • The Register
Challenge 36: XSS 17
The Truth About ‘Friends’ - The Daily Beast
Russian spies use your computer to watch you at home then post photos online | Daily Mail Online
China Suspected in Attacks on USPS, NOAA | Cybersecurity | TechNewsWorld
Fitch Downgrades Sky to 'BBB-'; Stable Outlook| Reuters
New Security Awareness Guidance Published By PCI Security Standards Council
CPI Financial | CPI Financial News | Banking and Financial News,Islamic Business and Finance, Commercial Banking | Delta Partners Emerging Markets TMT Growth Fund II investing $10 million into CipherCloud
CERN's 2014 Xmas gift from the Large Hadron Collider: Two new baryons • The Register
Black Hat Usa 2014 - Appsec: Svg Exploiting Browsers Without Image Parsing Bugs
Mac won't boot? Yosemite disabled TRIM for third-party SSDs
Hackers wade into US energy grid
Apple releases OS X Yosemite v10.10.1; Wi-Fi, Mail Fixes & Updates - Where to Download : Trending News : Latinos Health
BBC News - Phone hacking: Paul O'Grady settlement with News of the World
Important safeguards can keep hackers from stealing personal data from your computer -
Security Slice: Patch Or Be Prey - The State of Security
Vulnerability Coordination for the Internet… of Everything
Four Steps To An Effective Targeted Attack Response | Security Intelligence Blog | Trend Micro
Video: Symantec's Cecily Joseph Talks Diversity at Net Impact
Insurgency and the Emir’s Prescription, Articles | THISDAY LIVE
世界的にプライバシー侵害が疑われるNSAデータ収集問題--これまでを振り返る - ZDNet Japan
Hewlett Foundation gives $15M to MIT for new cybersecurity policy initiative - Boston Business Journal
Postal Workers Union Complains to NLRB About Post Office Data Breach | The National Law Review
Hackers turning smartphones into slave armies - Business - NZ Herald News
Protect yourself: cyber security tips for online holiday shopping -
GOTCHA: Google caught STRIPPING SSL from BT WiFi users' searches • The Register
Introducing the Industry’s First Threat-Focused Next-Generation Firewall
China ready to deepen int'l co-ops, uphold cyber security: Xi - CCTV News - English
Hackers targetting Android devices with malicious malwares | Tech/Gadgets | Malay Mail Online
Jon Stewart On The 'Daily Show': 'I'm Still Really Proud Of The Work We Do' | WUNC
Home Depot Earnings Review: Solid Growth On High Demand, Despite The Data Breach - Forbes
USB Armory is the Swiss army knife of security devices | PCWorld
"Exposure" Named 2014 Word of the Year by | Virtual-Strategy Magazine
Cybersecurity experts warn Windows Server 2003 users - The Times of India
Student arrested after hacking into school's computers and changing his grades from Fs to As to win $7,000 scholarship | Daily Mail Online
Hackers tried to hold a Detroit city database hostage
US energy grid targeted 79 times by hackers in 2014 alone
CNBC Transcript: CNBC Exclusive: Target Chairman & CEO Brian Cornell Speaks with CNBC's Courtney Reagan on "Fast Money Halftime Report" Today
U.S. energy grid hacked 79 times this year | Home - Home
Symantec and HP Sign Disaster Recovery as-a-Service Agreement for HP Helion OpenStack(R) - MarketWatch
US The Transition to the Agile Data Center
Passwords Aren’t Dead Yet — Here’s Why You Need A Password Manager | Satnam Narang | LinkedIn
Can Your Security Protection Keep Up with Roaming Mobile Workers? | Enterprise CIO Forum
Protecting yourself from hackers during holiday shopping | Video/Photos - Central and Southwest VA
WireLurker Malware Targets Apple at Its Core - Apple/Mac on Top Tech News
Black Hat Usa 2014 - Appsec: Ravage Runtime Analysis Of Vulnerabilities And Generation Of Exploits
Target's (TGT) CEO Brian Cornell on Q3 2014 Results - Earnings Call Transcript | Seeking Alpha
Target customers getting over credit, debit card data breach |
Target customers and profits are back after hack - Nov. 19, 2014
ABC7 News - KGO Bay Area and San Francisco News
WhatsApp now using end-to-end encryption in its Android app
Shellshock-exploiting Bash malware targets embedded devices running BusyBox | PCWorld
Student accused of making failing grades all A's - San Francisco Chronicle
Jon Stewart On The 'Daily Show': 'I'm Still Really Proud Of The Work We Do' | WVTF
NATO launches largest cyber exercise to test its network security - SC Magazine
Reese Witherspoon slams 'cruel' Zellweger comments | Entertainment | 3 News
Report: Data breach of Staples, Michaels likely connected
Zebra Technologies' Global Study Tracks the Growing Momentum of the Internet of Things in the Enterprise
Install Chrome 39 for OS X for 64-bit Web browsing - CNE
‘Cyber War Team’ to Monitor Web | The Cambodia Daily
A neverending story: PC users lose another $120M to tech support scams | Ars Technica
The Rise of Thingbots | Radware Blog
Chrome 39 contains 42 security fixes, fallback to SSL 3.0 removed - SC Magazine
WebApp Sec: Re: concurrent logins
Hewlett Foundation funds new MIT initiative on cybersecurity policy | MIT News
Apple OS X 10.10.1 Fixes Four Vulnerabilities
How to protect your plastic in times of retailer data breaches | FOX 11 Online | WLUK-TV
WhatsApp begins rolling out end-to-end encryption - SC Magazine
Black Hat Usa 2014 - Appsec: Pivoting In Amazon Clouds
U.S. Retailers Still Struggling With Data Breach Security, Says BitSight | CIO
Gartner Names Proofpoint a Leader in 2014 Magic Quadrant for Enterprise Information Archiving for Third Consecutive Year - MarketWatch
Trusted Security for SMBs - YouTube
Symantec and HP Sign Disaster Recovery as-a-Service Agreement for HP Helion OpenStack(R)
Despite Breach, Home Depot's Profits Grow - BankInfoSecurity
'Free' Credit Score Sites Duped Hundreds of Thousands - DailyFinance
The Hacker Digest - LIFETIME (PDF)
Internet Architecture Board Calls For Net Encryption By Default
WireLurker Malware Targets Apple at Its Core - Operating Systems on CIO Today
Protecting the Network: Today's Fierce Firewalls ::Security & Resiliency:: Midsize Insider
DOLLARS AND SENSE: Protecting yourself from hackers this holiday shopping season | Local News - Central and Southwest VA
Android Lollipop users warn of 'unusable' devices after upgrading | ZDNet
Whatsapp now provides end-to-end encryption by default for messages | Naked Security
Yosemite patch fails to squash OS X Wi-Fi bug | ZDNet
ROVNIX Infects Systems with Password-Protected Macros
The Year Of The Retailer Data Breach
US legislators poll banks on IT data breaches - FTSE Global Markets
Fake antivirus scams: It's a $120m business – and alleged ringleaders have just been frozen • The Register
2012: LinkedIn admits theft of users' passwords, invalidates them
Company that promised customers free credit scores agrees to $22M settlement - KGTV ABC10 San Diego
Court shuts down 2 alleged tech-support scammers
Details emerge on Windows Kerberos vulnerability | ZDNet
CESG approved cyber-security training launched - SC Magazine UK
Target and Home Depot Rebound from Hacking Scandals
Hackers Possibly Copied Postal Employee Pay Records -
Heel hacking: Woman arrested for allegedly attacking woman with stilettos |
USPS: Hack That Affected 800,000 Employees 'Very Sophisticated' - NBC News
Clarkson University: Cybersecurity Pioneer to Keynote Global Entrepreneurship Week at Clarkson University
Twitter Update Now Lets Users Search Every Public Tweet Ever Sent - ABC News
Vulnerabilities identified in three Advantech products - SC Magazine
State Department offers reward for arrest of Romanian fugitives - SC Magazine
Is every individual the same? Is every network the... - J-Net Community
GEN14 sur Twitter : "@JuniperNetworks exhibit booth looking great at #GEN14"
Decrypting the Notorious Banking Trojan ZBOT | Security Intelligence Blog | Trend Micro
7 commonly overlooked ways to tighten cybersecurity | Network World
WhatsApp Adds Snowden-Approved Encryption Techniques to Keep User Messages Safe : Business : Latin Post
NotCompatible botnet infects Android mobiles, infiltrates corporate networks - SC Magazine UK
Devices stolen from Boston physician in armed robbery led to data breach | Healthcare Dive
SANS Institute Brings Information Security Training Back to the Big Easy with SANS Security EAST 2015 - BWWGeeksWorld
Data breach: are you prepared to respond? - Lexology
Cam Newton had Twitter hacked because his password was 'Camnewton1' | Larry Brown Sports
Black Hat Usa 2014 - How To Leak A 100-Million-Node Social Graph In Just One Week? - A Reflection On Oauth And Api Design In Online Social Networks
Reese Witherspoon Calls Renee Zellweger Face Critics ‘Cruel’ | Amy Adams, Felicity Jones, Hilary Swank, Julianne Moore, Laura Dern, Magazine, Patricia Arquette, Reese Witherspoon : Just Jared
Hacking health care
USPS Hacked: Congress Presses for More Timely Notification After Data Breach - ABC News
Congress Presses for More Timely Notification After Postal Data Breach |
Dem: Agencies 'whistling through the graveyard' on data breaches | TheHill
Bugtraq: [CORE-2014-0008] - Advantech AdamView Buffer Overflow
Bugtraq: [CORE-2014-0010] - Advantech WebAccess Stack-based Buffer Overflow
Be the one who stops the next IT security breach - YouTube
PCI Addresses Insurance Gaps Involving Transportation Network Companies in North Carolina
U.S. State Department Takes Network Offline After Activity of 'Concern' | SecurityWeek.Com
BlackBerry’s Deal With Samsung: 3 Things Investors Need To Know (BBRY)
Student Accused Of Hacking Computer To Change Fs To As
Stocks to Watch: Target, Lowe’s, Staples - MoneyBeat - WSJ
Gone in 180 Seconds: Hackers Quickly Raid E-Mails in Search of 'Wire Transfer' and Sex Photos - Bloomberg
Kaspersky warns of paranoia over targeted hacking - Computer Business Review
Operation Mangal: Win32/Syndicasec Used In Targeted Attacks Against Indian Organizations | McAfee
Congress Presses for More Timely Notification After USPS Data Breach | KTIC Radio
Orange Business Services positioned as a Leader in Gartner Magic Quadrant for Managed Machine-to-Machine Services | M2M World News
Target says customers are over last year's data breach - Minneapolis / St. Paul Business Journal
TGT Stock: The Turnaround at Target Appears to be Working | InvestorPlace
Student accused of hacking Brigham Young U.-Idaho computer system to change grades |
Hollywood's Top Actresses Talk Nude Photo Hacking Scandal, Jennifer Lawrence & Renee Zellweger Critics
WhatsApp Adopts End-to-End Encryption for Android Users - The State of Security
Long-running Android botnet evolves, could pose threat to corporate networks | CSO Online
Postal Service ‘functioning normally’ after cyber breach, official says in testimony for hearing - The Washington Post
Anti-hacking advocate lands key House panel | TheHill
Coming by 2023, an exascale supercomputer in the U.S. | Computerworld
Facebook offers privacy tips, updates - SC Magazine
Juniper at AfricaCom 2014: Towards Virtualization - J-Net Community
SSCC 174 – Who says law enforcement isn’t tackling cybercrime? [PODCAST] | Naked Security
Attackers trading malware for privilege | CSO Online
Microsoft Warns of Issues With Recent SChannel Update, But Patch Away! | SecurityWeek.Com
Congress Presses for More Timely Notification After Postal Data Breach |
Microsoft Adds Video Service to Office 365
Old 3DS Title Unlocks Hacking and Homebrew Features on the Nintendo Handheld System : US : Headlines & Global News
DHS: Hackers targeted the grid 79 times this year | Utility Dive
Wontok SafeCentral AntiMalware Tops All 34 Antivirus Entrants in Latest VB 100 Comparative's RAP Test - Press Release - Digital Journal
Heartbreaking: Hackers target parents who have lost children to cancer |
The Future of File Sharing: What's on Our Horizon?
Congress Presses for More Timely Notification After Postal Data Breach |
The Senate defeated an overhaul of the NSA. Here's what's next for surveillance reform. - The Week
Commando Colonel Accused of Exposing his Lover to HIV - The Daily Beast
Anonymous wages cyberwar on the KKK with #OpKKK & #HoodsOff | Computerworld
Symantec and HP Sign Disaster Recovery as-a-Service Agreement for HP Helion OpenStack - BWWGeeksWorld
Microsoft Releases Emergency Security Update — Krebs on Security
The Recursive Cloud – Sending the Cloud to the Clo... - J-Net Community
McAfee Endpoint Protection for SMB | McAfee Products
Target rebounds in third quarter on solid sales - San Francisco Chronicle
CipherCloud Scores Monster Series B - Forbes
Ebola-Related Phishing Attack Becomes Outright Fundraising Fraud | McAfee
Top 10 1/2 Things That Can Undermine Your Security Program - SANS Institute
Police chief: Very strong chance of City cyberattack
More Data Breaches Expected This Holiday Season |
One billion attacks were blocked during the third quarter
Senate kills bill that would have reined in NSA and rampant surveillance | Naked Security
Juniper Networks sur Twitter : "Can you handle this week's certification quiz? Give us your best guess!"
Operation Onymous Challenges Tor to Strengthen Its Security
Hillstone Networks Certifies Next-Generation Firewall With Trend Micro Deep Discovery | Business Wire
When Your Organization is Under Attack, Minutes Count | McAfee
Black Hat Usa 2014 - Appsec: Finding And Exploiting Access Control Vulnerabilities In Graphical User Interfaces
BitTorrent Sync Plans Pro Tier - InformationWeek
Hewlett Foundation Funds Academic Cyber Initiative
Danger comes in small packages: Securing employees' mobile devices | PCWorld
Wontok SafeCentral AntiMalware Tops All 34 Antivirus Entrants in Latest VB 100 Comparative's RAP Test
A balancing act: Apple technology - SC Magazine
Dolibarr ERP And CRM 3.5.3 SQL Injection ≈ Packet Storm
Capstone 3.0 ≈ Packet Storm
Clam AntiVirus Toolkit 0.98.5 ≈ Packet Storm
Cybercrime, Data Protection, and Multi-Factor Authentication (MFA) | Cyber Trust Blog
Centralization: The Hidden Trap
Sophisticated Android-based botnet a danger to enterprise networks
Longest words - Wikipedia, the free encyclopedia
2015 prediction: Expect massive spikes in global information security threats - TechRepublic
USA Freedom Act foiled by Senate Republicans - SC Magazine
Faronics Deep Freeze Arbitrary Code Execution ≈ Packet Storm
IO Slaves KDE Insufficient Input Validation ≈ Packet Storm
Compaq/Hewlett Packard Glance 11.00 Privilege Escalation ≈ Packet Storm
Password Manager – Online Account protection – Don’t be that Guy
Update on charity:water Efforts in Nepal – Blog Post – RSA Conference
Target's 3Q earnings rise 3.2 per cent as it recovers from last year's data breach - Canadian Business
Hackers to probe cyber crime defenses at British banks| Reuters
Erroneous Beliefs About DDoS Attacks That Could Cost You
Cyber threats on the rise, but firms won’t fix tech |
Target’s Canadian stores improving but still ‘well below our expectations’ | Toronto Star
UC Adopts New Information Security Training Program
Google advances SSL with new Chrome versions | ZDNet
Hacker Lexicon: What Is The Dark Web? ≈ Packet Storm
Debian Security Advisory 3074-1 ≈ Packet Storm
Hewlett Foundation Lays Out Millions On Security ≈ Packet Storm
Bugtraq: CVE-2014-7137 - Multiple SQL Injections in Dolibarr ERP & CRM
SANS Institute Brings Information Security Training Back to the Big Easy with... -- BETHESDA, Md., Nov. 19, 2014 /PRNewswire-USNewswire/ --
Cost of Data Breach Hazy as Home Depot Profits Rise |
Target Corp shares climb as profit tops estimates, Canadian stores improve | Financial Post
Hackers to Probe Cybercrime Defenses at British Banks - NBC News
US retailers still struggling with data breach security, says BitSight - CSO | The Resource for Data Security Executives
'Someone Had Taken Over My Life': An Identity Theft Victim's Story - Forbes
Debian Security Advisory 3074-2 ≈ Packet Storm
Endpoint Protection and Least Prevalence
10 top security threats of 2014 (so far) | ZDNet
AVG vs Comodo vs Avast vs Avira Free Antivirus – Offering Protection Above Par
CPI to Display Cutting-Edge Network Cabinet and Remote Monitoring System at... -- WESTLAKE VILLAGE, Calif., Nov. 19, 2014 /PRNewswire/ --
Target Rebounds in Third Quarter on Solid Sales - ABC News
Delta Partners Emerging Markets TMT Growth Fund II investing $10 million into CipherCloud - Zawya
Christopher Poulsen (Photo: Business Wire) - Press Release - Digital Journal
MIT wants to set drone cybersecurity policy | TheHill
Android Lollipop Download Features: Trusted Places feature is awesome | BGR
Data breaches rose 25 percent to 320 incidents in single quarter, SafeNet figures find - CSO | The Resource for Data Security Executives
New venture aims to completely rethink enterprise security
Target U.S. same-store sales rise for first time in four quarters | Reuters
After Ferguson threat, Anonymous removes the KKK’s hoods. Effective? -
'Desperate' organisations will enlist hackers to fight security threat -
HSBC Acknowledges Massive Payment Card Breach - eSecurity Planet
NATO Is Sharpening Its Cyber War Defenses | Motherboard
Target (TGT) Q3 beats the Street as it recovers from data breach-TGT-Stockhouse news
Target tries to be cool |
Barracuda Solutions Now Available in the ArrowSphere Cloud Marketplace - MarketWatch
iOS 8.1.1 Introduces Promising Bug Fixes And Security Updates
Target rebounds from data breach, posts third-quarter profit ahead of the holidays |
Reporting from AVAR 2014 | AVG Now
Pentesting Windows Endpoints: Hidden Bind Shell Payload
Press Releases - News - Stockhouse
Symantec sur Twitter : "@LindaShanley Have you been good this year?"
Google open sources Firing Range, a test tool for web app security scanners
Black Hat Usa 2014 - Appsec: Epidemiology Of Software Vulnerabilities: A Study Of Attack Surface Spread Nigeria: How to Be Security (Terrorism) Conscious - Expert
MacStadium Intros Mac-Centric Hosting for Enterprises | NewsFactor Business Report
Computing Industry Pioneers Announce New Cybersecurity Venture -- WALTHAM, Mass., Nov. 19, 2014 /PRNewswire/ --
Lawmakers Seek Details on Finanial Services Firms' Data Breaches
ForeScout Enhances Access and Threat Management Through Integration With Palo Alto Networks Next-Gen Firewalls and WildFire
MacStadium Announces First VMware Powered Mac-Centric Hosting and Cloud Service Offering for Enterprises
Kaspersky Lab | Antivirus Protection | Internet Security
Download Kaspersky Security for Mac | Kaspersky Lab US
Core Impact Knows Arduino-Based Attacks | Core Security Blog
Why We Love Appliances | Symantec Connect
Archiving and eDiscovery Blogs Symantec eDiscovery Blog | Symantec Connect
RSA Advanced Security Operations Center, SOC Use Cases - EMC
Incidence Response: Are You Ready For the End of the Year? – Video – RSA Conference
Full Disclosure: CVE-2014-7911: Android <5.0 Privilege Escalation using ObjectInputStream
WhatsApp Now Encrypts Messages, Making it Nearly Impossible for Hackers to Read : Tech : Chinatopix
Paul O’Grady settles ‘News of the World’ phone hacking claim
PureFunds To Stop Hackers With This Cyber Security ETF | Seeking Alpha
Gartner Names Proofpoint a Leader in 2014 Magic Quadrant for Enterprise Information Archiving for Third Consecutive Year
WhatsApp starts encrypting messages to protect from hackers | GlobalPost
Chantel Bernier: Data breach response is ‘not the time to improvise’ | Financial Post
'Most advanced mobile botnet EVER' is coming for your OFFICE Androids • The Register
WebApp Sec: concurrent logins
SANS Digital Forensics and Incident Response Blog | SANS DFIR Summit 2015 - Call For Papers | SANS Institute
CipherCloud Scores $50M As Cloud Security Comes To Forefront | TechCrunch
O'Grady wins hacking settlement | Herald Scotland
Building a globe-spanning quantum internet | The Verge
Bugtraq: Reflected Cross-Site Scripting (XSS) in Simple Email Form Joomla Extension
Bugtraq: [SECURITY] [DSA 3074-2] php5 regression update
Let’s Encrypt: A Certificate Authority To Help the Web Deploy HTTPS
Apple, Microsoft, Google and others join push against government spying | CSO Online
Go on, buy your workers a smartphone. You know it makes sense • The Register
How to avoid the "bah humbug" of holiday scams - CBS News
WhatsApp's latest Android update provides 'foolproof' security to users' conversations | Latest News & Updates at Daily News & Analysis
Thinspace Responds to Japan's Growing Market Demand for Cloud-Based Desktop
Hackers attacked the U.S. energy grid 79 times this year |
Rand Paul Beats Ted Cruz, Saves NSA From ‘Reform’ - The Daily Beast
CITY BANKERS, prepare for a TERRORIST CYBER ATTACK – London police chief • The Register
Hacker Lexicon: What Is the Dark Web? | WIRED
WhatsApp Moves To Protect Messages From Snoops - Forbes
With Blend, Blackberry focuses on core strengths – and it shows | Digital Trends
Avoid Holiday Hacking | News - Home
WhatsApp encrypts messages against hackers | SBS News
UK hires hackers, convicts to defend corporate networks | ZDNet
Elizabeth Warren to Banks: Prove You Can Protect Customer Data From Hackers | Mother Jones
Police across nation raid IT firms over hacking - The Japan News
Spate of cyber attacks target U.S. government systems - CBS News
Tech industry veterans form VS2 to put hackers in 'Twilight Zone' - Boston Business Journal
DRaaS-tic action: Trust the cloud to save your data from disaster • The Register
How to troubleshoot performance issues in SharePoint custom code on your own? Part 1 – High Memory Usage - SharePoint Developer Support Team Blog - Site Home - TechNet Blogs
Bugtraq: [ MDVSA-2014:215 ] gnutls
PCI appoints panel to probe attack on mediapersons in Hisar | Zee News
Google fined for not taking down “right to be forgotten” links worldwide | Naked Security
WhatsApp starts encrypting messages to thwart hackers - The Economic Times
Paul O'Grady settles News of the World phone hacking claim - Telegraph
MacStadium Intros Mac-Centric Hosting for Enterprises - Press Releases on Top Tech News
WhatsApp Partners With Open WhisperSystems To End-To-End Encrypt Billions Of Messages A Day | TechCrunch
O'Grady wins hacking settlement -
Tampering with the Return Address
Black Hat Usa 2014 - Appsec: Cloudbots Harvesting Crypto Coins Like A Botnet Farmer
Intelligent Automation, Inc. releases the ARGUS™ - IS Series Industrial Security System -- ROCKVILLE, Md., Nov. 19, 2014 /PRNewswire/ --
Contact Us | CSA EMEA Congress - Cloud Security Alliance Congress
Top tips on hack-proofing your life | ZDNet
SymantecVoice: Conveniently Connected And...Compromised? The New Security Landscape Of The Internet Of Things - Forbes
IBHS Business Continuity Planning Toolkit now available as an app
PCI appoints panel to probe attack on scribes during clashes at Rampal’s ashram in Hisar | The Indian Express
BCC Risk Advisory sur Twitter : "Come to @irisscert IRISSCon tomorrow & meet edgescan folks...we've got cupcakes!!"
New non-profit CA aims to make HTTPS use universal
Wearable Litigation – Fitbit Data Could Be About To Set A Legal Precedent
Daily catch-up: NHS markets, phone hacking and doing the Strand - Comment - Voices - The Independent
Elephant Talk Communications' (ETAK) CEO Steven van der Velden on Q3 2014 Results - Earnings Call Transcript | Seeking Alpha
Fitch Affirms Sony at 'BB-'; Revises Outlook to Stable| Reuters
Correction: Fitch Rates NTPC's Proposed USD Notes 'BBB-(EXP)'| Energy & Oil| Reuters
Yes, we’re all in the cloud - but use it to develop enterprise apps? Not yet - Cloud Tech News
Shadow IT: data protection and cloud security — Gigaom Research
PureFunds to Stop Hackers with This Cyber Security ETF - November 18, 2014 -
Top 5 Free Best Antivirus Security Apps For Your Smartphones | The Fuse Joplin
Obama on Net Neutrality: Principle or Politics? » CounterPunch: Tells the Facts, Names the Names
Encryption, tokenisation to shape future PCI compliance - Security - News -
Microsoft “tops up” Patch Tuesday, issues delayed fix for zero-day hole in logon security | Naked Security
Let’s Encrypt — A Certificate Authority to Provide Free SSL Certificates for Entire Web
320 breaches reported between July and September
Hackers targeted the grid 79 times this year | Utility Dive
8 Ways to outsmart hackers Black Friday
Risico’s van Bring Your Own Device in de Zorg |
Overwhelming optimism for information security in 2015
iOS 8.1.1 Brings Bug Fixes, Hope For iPhone 4S And iPad 2 Device Owners | TechCrunch
Additional information about CVE-2014-6324 - Security Research & Defense - Site Home - TechNet Blogs
Patched Windows Vulnerability Allows For Remote Privilege Escalation | Security Intelligence Blog | Trend Micro
Dell integrates, innovates security portfolio - IT-Online | IT-Online
US State Department's E-Mail Hacked - Network Security on Top Tech News
Does cyber insurance help the CISO get a seat in the board room?
DDoS attacks continue to fall in size and frequency
Task 20: Multi-Level JSON Parsing
Asian mobiles the DDOS threat of 2015, security mob says • The Register
Wget Exploit Demonstration - Cve-2014-4877
Hackers target U.S. energy grid 79 times - Huntsville News | and ABC 31: National News
Microsoft issues emergency update for Windows desktop and Server systems - Gearburn
Threats at every turn – time to hit back | Symantec Connect
Sophos Expands Cloud-Managed Security Portfolio with Server Protection - Zawya
Bill curbing NSA surveillance programs blocked in Senate - CNE
Security To Achieve Newer Paradigms - CRN India
Cloud computing: pros and cons | euronews, hi-tech
The evolution of threat detection and Big Data
Home Depot profit appears unaffected by data breach | The Columbus Dispatch
Sophos expands Cloud-Managed Security Portfolio with server protection | Al Bawaba
Cyber-jihadisme: la guerre électronique contre Daech est-elle perdue d'avance? | Sonia Eyaan
Home Depot’s profits rise, suggesting data breach hasn’t led customers to flee - The Washington Post
Analysis: How to prevent the next terror attack | i24news - See beyond
Lame phone dodgers fleece finance's foolish and fat fingered • The Register
Command Injection ISO: Hints for SugarCRM, Webmin, Zenoss
ConnectOne: "We notified customers about hacking incident" - Business -
Best Practices for Selecting a Next-Generation Firewall | FedTech Magazine
Hewlett Foundation lays out MEELLIONS on security • The Register
Stanford Cyber Initiative will tackle Internet technology concerns
Most UK companies would consider hiring ex-hackers for cyber security - IT News from
Cam Newton's Twitter Account Gets Hacked, Tweets 'Overrated' to Richard Sherman | Bleacher Report
Hacking mastermind shunned by friends after conviction
Hackers need to find a day job - High School
Watch Symantec's Vine "Empower your team with Symantec Mobility Solutions. #GoEmpower"
Black Hat Usa 2014 - Exploit: Abusing Performance Optimization Weaknesses To Bypass Aslr
Ku Klux Klan Hacked by Anonymous After Ferguson Threat
Hacking health care | MIT News
Bugtraq: [SECURITY] [DSA 3074-1] php5 security update
IoT security: Fix the problems before they start - FierceITSecurity
The Top Infosec Issues of 2014 | CIO
Chris Freind: Chewing the fat on issue of obesity
Operation Onymous Challenges Tor To Strengthen Its Security
iOS 8.1.1 Update: Apple Promises To Improve The Performance Of The Aging iPhone 4S and iPad 2 - International Business Times
Google rolls out 64-bit Chrome for Mac | SciTech | GMA News Online
If You Didn’t Change The Default Password On Your Security Camera, Someone’s Probably Watching It Stream – Consumerist
Google launches first 64-bit Chrome Web browser for OS X
Caution against Windows-2003 OS as Microsoft announces its end - The Economic Times
SMS pwnage on MEELLIONS of flawed SIM cards, popular 4G modems • The Register
Australian technology spend to hit AU$78.7 billion in 2015: Gartner | ZDNet
State Dept computers hacked, email shut down | Deseret News
Unholy war: How to calm Islamist rage? | New York Post
State Department suffers hacking attack |
BBC News - #BBCTrending: Anonymous takes on the Ku Klux Klan
All the things you can use private browsing mode for - gHacks Tech News
FAA Can Make All Drone Flights Illegal, Federal Court Rules | Motherboard
(ISC)² - IT Certification and Security Experts
Home Depot profit rises despite data breach - LA Times
Will NZ Digital Businesses replace Kiwis with robots? - Reseller News
Techday – BI/analytics top Kiwi CIO tech priorities list
Home Depot posts earnings of $1.15 a share vs $1.13 expected
Black Hat Usa 2014 - Enterprise: When The Lights Go Out Hacking Cisco Energywise
Activist group Anonymous hacks KKK Twitter account | 89.3 KPCC
Websense Security Labs Reveals Cybersecurity Predictions for 2015 - Press Release - Digital Journal
Watch "Chinese hackers accused of breaching NOAA systems" Video at SCMagazine
tcpdump 4.6.2 Geonet Denial Of Service ≈ Packet Storm
tcpdump 4.6.2 AOVD Unreliable Output ≈ Packet Storm
Apple Security Advisory 2014-11-17-1 ≈ Packet Storm