The ULTIMATE CRUELTY: Sandworm uses PowerPoint against Swiss bank customers • The Register
CurrentC mobile payment system hacked, user info stolen
#CiscoPublicSafety Series: Redefining Public Safety and Justice through IoE
Bugtraq: [slackware-security] wget (SSA:2014-302-01)
Bugtraq: Call for Papers - WorldCIST'15 - Azores, Deadline: November 23
How to install and configure Kaspersky Safe Browser (iOS)
Students Test Cyber Security Skills - Time Warner Cable News
Shellshock–Related Attacks Continue, Targets SMTP Servers | Security Intelligence Blog | Trend Micro
Mozilla Releases Geolocating WiFi Sniffer For Android ≈ Packet Storm
Europe Hosts Its Biggest Ever Cyber Security Exercise ≈ Packet Storm
Louisville Infosec 2014 - Are You Really Pci Dss Compliant? Case Studies Of Pci Dss Failure!"
What's causing the recent string of data breaches?
FBI raids home of 'second Snowden' whistleblower in US -
Jordan's Furniture Moves Into More Bandwidth and Greater Cost Savings With Comcast Business
The NHS is still clinging on to Windows XP
In-flight entertainment's future may be on your tablet |
Does depleting privacy equate to the end of liberty? Why every business must watch this Edward Snowden documentary | Information Age
FBI wants expanded hacking authority | TheHill
Are the White House Hackers Gone? -
Mobility/BYOD = Power to the People | CIO
A Layman’s Reading of Gartner’s Top 10 Cloud Myths | CloudWedge
Careless employees with mobiles biggest security threat | IT PRO
IDC To CIOs: 60 Percent Of You Will Be Supplanted By Chief Digital Officers By 2020 - Forbes
Hackers breached a mobile payment system... - BREAKING NEWS - Seattle Sports Nut
IDC's 2015 CIO Predictions: Demand For Analytics Continues To Skyrocket - Forbes
As HomeKit Launch Draws Near, the Internet of Things Still Faces a Major Obstacle | Re/code
Apple Pay Rival CurrentC Hit By Hackers ≈ Packet Storm
Drupalocalypse! Dev Says Your CMS Is Probably Owned ≈ Packet Storm
The Biggest Mistake Companies Make With Security Breaches - The Experts - WSJ
Antivirus Software and Internet Security For Your PC or Mac | McAfee
Axcient and Business Continuity Institute to Host Complimentary Webinar Series on Disaster Recovery and Business Continuity Initiatives - BWWGeeksWorld
3 ways to make your Gmail account safer | Naked Security
5 Mistakes You're Probably Making Selling Security - And How To Fix Them! - Powered by Infusionsoft
Juniper Networks
Update on charity:water Efforts in Nepal – Blog Post – RSA Conference
Websense 2015 Security Predictions Report
Скачать Яндекс.Браузер (бета)
Barracuda Extends Email Management Capabilities for Microsoft Azure Customers - MarketWatch
Hackers Attack Cleburne Servers, May Be Linked To Controversial Dog Shooting | KERA News
Right message, wrong messenger
Judge orders hacking case against Chinese military officers put on hold | TribLIVE
What Are Next-Generation Firewalls? — BizTech
UK smart meters arrive in 2020. Hackers have ALREADY found a flaw • The Register
BBC News - White House computer network 'hacked'
Russian Hackers Suspected In Recent White House Computer Breach | Global Grind
My Digital Shield Releases 'Shield Test' Free for SMBs
Biggest ever cyber security exercise in Europe is underway
Bugtraq: [SECURITY] [DSA 3059-1] dokuwiki security update
Pirate Bay co-founder found guilty of hacking in Denmark | PCWorld
Barracuda Extends Email Management Capabilities for Microsoft Azure Customers
AVG Technologies Announces New Managed Workplace® Enhancements to Partners at Cloud Summit
IBM Rolls Out Analytics-Based Security Solution - Big Data on Top Tech News
Next-Generation Connected Wearable, Samsung Gear S, Arrives at Sprint Nov. 7 - MarketWatch
Securing Your Portfolio with Network Security Company -
The Mirror journalists to face phone-hacking charges | Rockhampton Morning Bulletin
If next generation firewalls don't evolve, they'll soon be irrelevant |
Axcient and Business Continuity Institute to Host Complimentary Webinar Series on Disaster Recovery and Business Continuity Initiatives
Trend Micro sur Twitter : "Trend Micro CEO, Eva Chen, kicks off the TrendMicro 2014 industry analyst conference #TrendInsight in Boston"
Comprehensive CIP, NERC, and FERC Information Security Policies and Procedures Now Available for Download from North America’s Cyber Security Leaders at
Are You Putting Your Agency’s Networks at Risk? | FedTech Magazine
The Architecture of Morrisons OrderPad
Hackers Breach White House's Unclassified Computer Network |
Most Users Don't Use Windows Update Properly: Report |
White House computer system breached by hackers: Report - Economic Times
Assume your Drupal 7 site has been compromised
Americans Fear Hacking (Much) More Than Murder |
Hackers Breach White House's Unclassified Computer Network |
Gartner Report Reveals Cloud Computing's Top Myths | CloudWedge
Social Engineers work in teams to harness the power of information | CSO Online
Apple Pay rival CurrentC hacked | ZDNet
Drupal Security Team gives ominous news | ZDNet
UK consumers particularly prone to piss-poor patching • The Register
Advisory says to assume all Drupal 7 websites are compromised | CSO Online
White House networks hacked | Naked Security
SMB Fall Housekeeping: 5 Security Concerns to Discuss with Customers | Talkin Cloud Blog
More Than 18.5M California Residents' Information Was Exposed Last Year
White House cyber attack breach of computer network confirmed | BGR
Hackers Breach White House Computers | News | teleSUR
Tim Cook: "I'm Proud to be Gay" - Businessweek
Pirate Bay founder guilty in historic hacker case - The Local
Pirate Bay founder found guilty in historic hacker case - News - The Copenhagen Post
MCX speaks out over CurrentC hack and their position on Apple Pay | SiliconANGLE
European Commission - PRESS RELEASES - Press release - Biggest ever cyber security exercise in Europe today
Louisville Infosec 2014 - Creating The Department Of How: Security Awareness That Makes Your Company Like You.
Apple Pay disabled at Rite Aid, CVS. Building their own system? -
The data breach detection system will eclipse $1bn by 2018 | News | TechRadar
Calif. AG: 18.5 million residents' info exposed - Fairfield Citizen
California tallies retail data breaches | Retail Dive
Microsoft Office 16 release date revealed as H2 2015 | IT PRO
Making the Security Super Human: How to Effectively Train Anyone/Anything – Video – RSA Conference
absorptions: Visualizing hex bytes with Unicode emoji
Correction: Apple Pay-Retail Skirmish story | The Kansas City Star
Photo gallery: McAfee FOCUS 14
Snapchat escapes Australian cyberbullying crackdown, for now | Naked Security
NIST Guide to Cyber Threat Information Sharing open for comments
Post Snowden, most users have changed Internet habits
White House Still Impacted By 'Inconveniences' Following Breach Of Computer System - KMBZ
California Attorney General releases 2014 data breach report and recommendations, finding more of the same. - Lexology
Windows 10: Microsoft's plan to win over the enterprise | IT PRO
Office 365 Strengthens Mobile Device Management #TEE14
Business continuity briefs
Opinion: Congress must act on consumer data breaches
Dynamic endpoint protection by McAfee and ForeScout
Over a third of orgs have no real-time insight on cyber risks
BRIEF-China's Pci-Suntek Tech wins bid for project worth 108 mln yuan| Reuters
UK government faces £5.5m bill as NHS clings on to Windows XP |
Gottfrid Svartholm Found Guilty in Hacking Trial | TorrentFreak
IDC has blind faith in chief digital officers | ZDNet
Windows 10 Technical Preview updated, boasts 7,000 changes and fixes - CNE
Drupal PSA: If You Didn't Patch Within 7 Hours Consider Your Site Compromised - The State of Security
Sue Oliva - Juniper Networks talks to Total Telecom - YouTube
Startup Semprius Fights to Bring Breakthrough Solar Tech to Market | MIT Technology Review
Hackers Breach White House's Unclassified Computer Network |
How to figure out if a data breach is a hoax | ITworld
Hackers break into White House computer network
Cyber Attack Hits White House, Causing Outages | Vanity Fair
Was Russia involved in White House cyber attacks?
How to control Touch ID on the iPhone and iPad - CNE
Data Breaches Jump in California and are Expected to Keep Climbing
Xiaomi Data Breach — "Exposing Xiaomi" Talk Pulled from Hacking Conference
FCC: The New Data Security Sheriff In Town | The National Law Review
Apple says 'Shellshock' no risk to vast majority of Mac users, AsiaOne Digital News
California data breach report reveals spike in incidents - SC Magazine
How to fix Text Message Forwarding issues on iOS 8.1 - CNE
Common cloud myths revealed
Why So Many American Retailers Are Fighting to Freeze Out Apple Pay | WIRED
Practice Makes Imperfect: Why Do We Keep Getting Disaster Recovery Wrong? - NJ Spotlight
MCX Confirms Retailer Exclusivity for CurrentC Mobile Payments, but No Fines for Leaving Consortium - Mac Rumors
Microsoft Offers Office 365 Users Free, Unlimited OneDrive Storage - Data Storage on CIO Today
Android's Surprising Next Big Competitor: Google - Mobile Tech on CIO Today
IBM Rolls Out Analytics-Based Security Solution - Big Data on CIO Today
What We Know Now About CurrentC, the Apple Pay Competitor - ABC News
MIS-Asia - Office 365 admins get spreadsheet search help
MCX Holds Press Conference, Does Itself No Favors - The Mac Observer
White House computer network reportedly breached by Russian hackers - Silicon Valley Business Journal
Gartner busts top 10 cloud myths - InformationWeek – IT news & articles
Information-security implications feared as Parliament weighs data retention - CSO | The Resource for Data Security Executives
Carders offer malware with the human touch to defeat fraud detection • The Register
18.5m Californians vulnerable to fraud | FOX5 San Diego – San Diego news, weather, traffic, sports from KSWB
Apple Pay competitor CurrentC suffers e-mail breach | VatorNews
Adopters of Australian Azure must remember security, governance obligations - CSO | The Resource for Data Security Executives
Breakthrough in MPC Cryptography makes Cloud and Online computing more secure - Media Releases - CSO | The Resource for Data Security Executives
Attack campaign infects industrial control systems with BlackEnergy malware | PCWorld
Mozilla releases geolocating WiFi sniffer for Android • The Register
A Neuroscientist's Radical Theory of How Networks Become Conscious | WIRED
Facebook, Twitter, Instagram AND trolls will be charged over hate-filled posts | Daily Mail Online
Drupal Core - Highly Critical - Public Service announcement - PSA-2014-003 |
Latest local breaking news by The State Newspaper in Columbia, SC | The State
CurrentC, an Apple Pay Rival, Has Been Hacked
Big Retail's Apple Pay killer CurrentC HACKED, tester info stolen • The Register
CurrentC won’t let email hack delay launch as it explores NFC | Macworld
GCHQ views data without a warrant, government admits | UK news | The Guardian
Security Slice: Internet Privacy Realities - The State of Security
Fidelity National employees hacked after targeted phishing attack
Beyond a Major, To Be Successful In Security You Need To Select The Right Minor - The State of Security
Drupalocalypse! Devs say it's best to assume your CMS is owned • The Register
Security in the Cloud? Your Questions and Cloud Resources – Blog Post – RSA Conference
Microsoft Band, the smart band powered by Microsoft Health
Computer Hackers Attack Cleburne After Dog Shooting | NBC 5 Dallas-Fort Worth
Microsoft Tightens the Lid on Office 365 Data
Big Retail: We don't hate Apple, just the credit card companies • The Register
Cyber security experts warn Rocket City is top target for hackers |
Fire Brand - Profile - The Listener
Leaked employee passwords open up Fortune 500 companies to hackers
Research Suggests Backoff Malware Still Widely Infecting POS Systems
FM Radio Hack Allows Data To Be Routed Out of Isolated Networks
How to figure out if a data breach is a hoax | CSO Online
Did Russia Just Hack the White House? - The Atlantic
JPMorgan data breach affected 76 million households - Business - The Boston Globe
What IBM can learn from its own cybersecurity business | Network World
White House Still Impacted by ‘Inconveniences’ Following Breach of Computer System | WPRO-AM
KARN News Radio 102.9 FM / 920 AM - Some White House Computer Networks Breached by Hackers [From ABC News]
Suspicious cyber activity at White House detected, addressed| Reuters
DailyTech - The Usual Suspects: Russia or China Suspected in White House Data Breach
Merced community news from Merced Sun-Star in Merced, CA |
Russian Hackers Suspected For Breaching White House Computers | Wall Street OTC
Local News | Columbus Ledger Enquirer
White House hack just the beginning: experts say major cyberattack coming soon
White House detects, addresses sustained cyberattack. Who is the culprit? : LIFE : Tech Times
White House Cyberattack: Officials Confirm Computer Network Hit by Sustained Cyberattack : US News : Latin Post
The Long and Winding Road to Shellshock Recovery | Enterprise | LinuxInsider
Supes campaigns show slight shifts in focus
U.S. Health Care System Woefully Unprepared For Ebola
Office 365 admins get spreadsheet search help - Computerworld New Zealand
Hackers Are Using Gmail Drafts to Update Their Malware and Steal Data | WIRED
Shared Responsibility Examples: The Re:Boot -
Red Hat Security Advisory 2014-1726-01 ≈ Packet Storm
Red Hat Security Advisory 2014-1727-01 ≈ Packet Storm
Red Hat Security Advisory 2014-1728-01 ≈ Packet Storm
Hackers Reportedly Breached White House Network
Cyber breaches put 18.5 million Californians’ data at risk
California Attorney General’s Second Annual Data Breach Report Finds Dramatic Increase in Number of Data Breaches | The National Law Review
CurrentC Hacked - Business Insider
Mandriva Linux Security Advisory 2014-211 ≈ Packet Storm
Red Hat Security Advisory 2014-1725-01 ≈ Packet Storm
Debian Security Advisory 3050-2 ≈ Packet Storm
San Diego Source > Technology > Cybersecurity tops SPAWAR concerns
Internet experts: 'Widespread harm' likely from cyber attack in next decade
Options to curb terror | New Straits Times
How to figure out if a data breach is a hoax | PCWorld
How to figure out if a data breach is a hoax -
BSides Toronto 2014 | CSO Online
Nico Sell of Wickr: Privacy Is the New Fame | Re/code
Rappelling off a roof — Red Teams
San Diego Source > News > Cybersecurity tops SPAWAR concerns
Wal-Mart and allies in face-off with Apple Pay over mobile payments| Reuters
The NO-NAME vuln: wget mess patched without a fancy brand • The Register
Juniper Networks sur Twitter : "Spooky week!"
Walgreens Exec On Why They're Backing Apple Pay - Forbes
Cleburne’s computer systems under attack by hackers | Local News | News from Fort...
Tips for protecting yourself against cyber attacks
The Attkisson hacking incident: Vexed by Vox
Just Announced 2014 Corporate Information Security Policy Manual Available for Download from the Compliance Leaders at | Virtual-Strategy Magazine
Watch "Android malware leverages Tor" Video at SCMagazine
Juniper Networks sur Twitter : "Enact #security solutions to fight today’s threats. #NCSAM"
Find Out Whether This Unkillable Tracker Is On Your Smartphone - Forbes
Samsung ‘Find My Mobile’ security exploit discovered | BGR
Georgia Tech Releases 2015 Emerging Cyber Threats Report
main is usually a function: A taste of Rust (yum) for C/C++ programmers
OPD, OCSO mishandled Carline Brumaire Jean case, internal reviews show - Orlando Sentinel
"Citizenfour" Directly Confronts the Intelligence Apparatus' Subversion of Democracy
Why You Should Care That the White House Got Hacked
Flash Pack Exploit Leads to New Family of Malware
Cyber security a non-stop headache for federal government, conference hears | Ottawa Citizen
Virtualization advancements focus on protecting data at the source, not on the device - SC Magazine
ForeScout Partners With McAfee to Deliver Dynamic Endpoint Protection
Apple Pay rival CurrentC hit by hackers - CNE
Retail group MCX says it's not telling merchants to block Apple Pay - CNE
University of Rochester Medical Center Installs ForeScout Security
RackWare, NetApp Partner for Cloud-based Disaster Recovery | Cloud Companies content from Talkin' Cloud
Disaster recovery funds must continue: councillor | Fraser Coast Chronicle
6 Backup and Disaster Recovery (BDR) Lessons From October | InfoCenter BDR content from MSPmentor
Dirty Topic Tweet Chat 10/30 – Securing Mobile Devices In The Workplace | Symantec Connect
Whisper, Secret, and Snapchat leaks show that fake privacy is almost worse than no privacy at all | VentureBeat | Security | by Ruth Reader
Trend Micro
A Whole New Way to Spot Malware Before It Spots You – Blog Post – RSA Conference
What Does an Idle CPU Do? - Gustavo Duarte
AP IMPACT: US health care unprepared for Ebola : News
AG Says 18 Million in State Touched by Data Breaches Last Year | The Recorder
Apple Pay rival MCX defends security after hackers steal emails | Computerworld
Munchausen by Proxy: A Case Study of Abuse
Hacking Sexism in the Tech Industry - Room for Debate -
AP IMPACT: If Ebola batters US, we are not ready | Daily Mail Online
More Surveillance Punishes Canadians, Not Terrorists | Tom Henheffer
Apple Pay: Apple Pay Competitor CurrentC Has Already Been Hacked
Of course blocking instant messaging at work makes sense | Ars Technica
A Review of the Avast Antivirus After 25 Years
About Google - Products
Activate Symantec’s “Disarm” Feature to Sanitize Infected PowerPoint Attachments | Symantec Connect
Time to step up: vendors missing the mark on IoT - from
Australian E-Health records breached twice in the last year • The Register
McAfee Inc. sur Twitter : "Pop culture's biggest icons are a cause for online search concern—beware of the #RiskyCeleb Top 10:"
Data breach victimizes local woman; Info you need to know |
Modern Day Dillinger Gangs -
Bootstrap 3.3.0 released · Bootstrap Blog
California reports huge jump in data breaches | CSO Online
'State sponsored' Russian hacker group is attacking geographic rivals
Gigamon says it can analyze attacker SSL traffic without hitting performance - Good Gear Guide Australia
Keep Calm & Verify: How To Spot A Fake Online Data Dump
Apple Pay competitor confirms email breach
Russian Hackers Take White House? | The Weekly Standard
White House hacked - Oct. 29, 2014
CurrentC Platform Suffers Security Breach During Pilot Program, MCX Group Attempts To Save Face
White House computers attacked by suspected Russian hackers - The Week
FOCUS 14 live: Obama needs to win back trust after Snowden revelations, says Condoleezza Rice |
Best Of: Free Antivirus Software | KTLA
Office 365 admins get spreadsheet search help -
Hackers Breach White House's Unclassified Computer Network |
How to respond to SEC inquiries concerning data breach and data security policies - Lexology
Collegeville-based Just Chimneys cleaning service fulfills growing need
Gallup: More Americans worried about hacking than murder - Houston Chronicle
The Mirror journalists to face phone-hacking charges | Gympie Times
Citizenfour's Laura Poitras Explains Why Edward Snowden Did It | Phoenix New Times
SVP Young: Intel Security Has No Need To Poach Symantec Partners - Page: 1 | CRN
Next Generation Firewall: CSO Webcast
Popular Science served up Rig Exploit Kit on its website - SC Magazine
SMBs See IoT Potential, Wary of Possible Challenges
Attack on White House systems breached unclassified networks - SC Magazine
Now available – "Windows Server 2012 Security from End to Edge and Beyond" | Cyber Trust Blog
The FBI created a fake malware-spreading newspaper article to trace a bomb threat | The Verge
Email addresses stolen from CurrentC in security breach | The Verge
The Mirror journalists to face phone-hacking charges | Sunshine Coast Daily
How Governments Can Mitigate Data Risks | StateTech Magazine
'Sophisticated' Chinese hackers launched attacks against 43,000 computer systems - SC Magazine UK
How to Use AirDrop to Share Files Between Macs and iOS Devices - Mac Rumors
Panda Free Antivirus 15.0.3 - Neowin
Retail industry’s Apple Pay rival has experienced a data breach - The Washington Post
Are Containers the Beginning of the End of Virtual Machines? -- Virtualization Review
Apple Pay Competitor CurrentC Reports Breach By 'Unauthorized Third-Parties' - The State of Security
Deloitte releases paper on vetting leaks, avoiding costly hoax - SC Magazine
Apple Mac OS X Yosemite Update: Wi-Fi Bug
How to protect your business hardware | News | TechRadar
Microsoft's new Office 365 search tool is like Minesweeper for Excel spreadsheets | PCWorld
PCI Elects Erie's Cavanaugh As Chair
Bad dog: Redmond's new IE tool KILLS POODLE with one shot • The Register
Apple Pay rival CurrentC suffers pre-launch compromise | CSO Online
Independent Herald -
Keep Cybercriminals Guessing with Unique Passwords -
FBI demands new powers to hack into computers and carry out surveillance | US news |
Apple Pay competitor CurrentC reports data breach | 89.3 KPCC
FCC: Telecom customers' data may have been exposed in cybercrime havens abroad - DecodeDC Story
NSA Chief Warns Companies Against Revenge Hacking -
FCC enters new area of privacy and data security regulation with proposed $10 million fine - Lexology
McAfee Threat Intelligence Exchange | McAfee Products
Criminal phone-hacking charges against up to nine Mirror Group journalists 'imminent' - Crime - UK - The Independent
Gartner Explodes 10 Cloud Myths -- Virtualization Review
Microsoft releases anti-POODLE Fix It | ZDNet
Vulnerability Note VU#973460 - drchrono Electronic Health Record (EHR) web applications vulnerable to cross-site scripting and cross-site request forgery
Microsoft’s Perspective on the Cybersecurity Framework: Next Steps for Incentives and International Harmonization | Cyber Trust Blog
Compliance-Based Infosec Vs Threat-Based Infosec
Hexis, Others Put Security Response On Autopilot - Page: 1 | CRN
The BYOD Disconnect Complying With Mobile Device Security At Work
Google Gmail drafts malware attack discovered | BGR
CurrentC, an Apple Pay Rival, Gets Hit by Hackers - Bloomberg
AFP mulls filing disbarment case vs Laude family lawyer Harry Roque | Inquirer News
'Major' hacking attack in US looms: expert survey
Bugtraq: CVE-2014-8399 SQL Injection in NuevoLabs flash player for clipshare
White House network breach was likely nation-sponsored
Dispelling car hacking fears |
N.J. close to passing tougher regulation on data breaches - Philadelphia Business Journal
Blocking Apple Pay Is A Terrible Strategy For CurrentC Merchants - Forbes
CurrentC's Data Breach Adds to Awful Week for Apple Pay Rival - Businessweek
NSA Chief Warns Companies Against Revenge Hacking - Defense -
'Major' hacking attack looming in US: Expert survey
McAfee Inc. sur Twitter : ".@condoleezzarice and @youngdchris have an informal chat about the current landscape of #cybersecurity at #FOCUS14"
#CiscoChampion Radio S1|Ep 38. Threat Focused Firewall
Bugtraq: SEC Consult SA-20141029-0 :: Multiple critical vulnerabilities in Vizensoft Admin Panel
Bugtraq: SEC Consult SA-20141029-1 :: Persistent cross site scripting in Confluence RefinedWiki Original Theme
Patrick Flynn sur Twitter : "McAfee's DXL Digital Exchange Layer #FOCUS14"
Attack campaign infects industrial control systems with BlackEnergy malware | CSO Online
Full Security and Privacy Tip Sheet - Trend Micro
Juniper Networks sur Twitter : "A new day, a new quiz question. Show off your chops in today’s certification quiz."
Cracking wifi passwords with Kali Linux
Kaspersky Lab: 94% of Companies Are Dealing with Cybersecurity Issues | Managed Security Services content from MSPmentor
Samsung fixes bug that let hackers lock phones | TheHill
Hackers swipe e-mail addresses from Apple Pay-competitor CurrentC | Ars Technica
Credit-card hacking 'is top crime worry' - IOL SciTech |
Rival to Apple Pay is breached by hackers | TheHill
MCX suffers email address data breach • NFC World+
Samsung users vulnerable to DDoS attacks via Find My Mobile service | SiliconANGLE
NHS Trusts Are Still Struggling On With Windows XP, FOI Request Finds
White House won't confirm Russian hacking connection - Washington Times
Apple Pay’s biggest competitor has already been hacked | Cult of Mac
StrikeForce Technologies, Inc. Announces Cino Ltd. as a Global Cyber Security Distributor
Bugtraq: [security bulletin] HPSBUX03159 SSRT101785 rev.1 - HP-UX kernel, Local Denial of Service (DoS)
Bugtraq: [ MDVSA-2014:211 ] wpa_supplicant
Hackers Breach White House's Unclassified Computer Network |
FireEye uncovers Russian malware with hint of government backing |
Five smartwatch features we’ll see by 2015 | Features | PC Pro
Gigamon says it can analyze attacker SSL traffic without hitting performance - PC World Australia
Apple Pay competitor CurrentC suffers its first data breach -- AppAdvice
AP IMPACT: US health care unprepared for Ebola ::
​Samsung phones vulnerable to hacking - CBS News
Retailer-Backed Apple Pay Rival CurrentC Has Been Hacked, Testers’ Email Addresses Stolen | TechCrunch
Panel teaches small business how to secure technology - My News 4 - KRNV, Reno, NV
Gavin Struthers sur Twitter : "#FOCUS14 #intelsecurity @MichaelFeyCTO 2014 marks the death of security by obscurity"
Hacker Lacroix apologizes, gets four years in federal prison - SC Magazine
AntiVirus PRO Android Security - Android Apps on Google Play
MSRC - Site Home - TechNet Blogs
Kaspersky Lab eStore
My Kaspersky
SMB Disaster Recovery Toolkit Released By DatabarracksChannelBiz UK
Securonix taps former BofA exec for chief scientist role - SC Magazine
Espionage Hacks Tied To Russians - BankInfoSecurity
Sprout | HP® Official Site
Walk, Don’t Run: A Security Framework For Midsize Organizations
Why Credit Card Companies Couldn't Stop Hacks At Target And Home Depot
Latest local news from San Luis Obispo, CA | The Tribune
Survey finds many experts fear worsening cyber attacks | SiliconBeat
White House Computers Breached By Hackers
Experts: Major cyberattack will hit in next 11 years
White House Computers Breached By Suspected Russian Hackers
White House’s unclassified computer network hacked | US news | The Guardian
Fake "Online Ebola Alert Tool" delivers Trojan, unwanted apps
Orgs choose network performance over security
MPAA urges USTR to put pirate sites on 'Notorious Markets' list - SC Magazine
Juniper Networks - press-releases
Hacking is the crime Americans worry about most, Gallup poll shows - DecodeDC Story
Cyber Attacks Likely to Increase | Pew Research Center's Internet & American Life Project
Russia may have hacked White House computers: report  - NY Daily News
The Value of Endpoint and Network Protection Together
Securing Your Online Reputation - YouTube
Can Authorities Cut Off Utilities And Pose As Repairmen To Search A Home? : NPR
Voxer Appliance Enables Self-Contained, Secure, Real-Time Voice and Instant Messaging Deployments for Government Organizations | Virtual-Strategy Magazine
Easy Network Security with Palo Alto Networks | InsideTrade
Voxer Appliance Brings Secure, Real-time Voice, Instant Messaging Deployments to Government Organizations | TruTower
Chrome update vs Firefox download with security armor for Mac OS X and Windows 8.1 - The REM
Check Point Launches Capsule: Mobile Security that Goes Wherever Users Go
Four Strategies for Successful Next-Generation Firewall Deployment | FedTech Magazine
Know Right Now: Russian Hackers Take on the White House
Cost Of Data Breach Detection System Rising; Will Be Over $1bn By 2018 | AEG India
Emory Hospital Shares Lessons Learned On Ebola Care | NCPR News
Americans Are More Afraid of Being Hacked Than Getting Murdered
Anti-virus is no longer enough - new apps show how vulnerability scanning is becoming a must - Blogs -
Five Ways Automation Speeds Up Big Data Deployments
TeamDigi7al US navy hacker sentenced to 2 years in jail | Naked Security
How to Tell Data Leaks from Publicity Stunts — Krebs on Security
The “Dirty Dozen” SPAMPIONSHIP – who’s got the biggest zombie problem? | Naked Security
Banks' Concerns About Cyberthreats Grow - BankInfoSecurity
The big one: The makings of a global cyber attack | InfoWorld
More Californians exposed to data breaches, says state Attorney General |
Microsoft's Android moment has arrived - TechRepublic
Lollipop's new features sweeten the Android experience - Tech Opinion | The Star Online
Top Security Threats Still Plaguing Enterprise Cloud Adoption --
How hackers access sensitive information: cybersecurity report
How to make your Windows 8.1 PC run faster |
Hackers Use 'Find My Mobile' To Wipe Any Samsung Phone - Business Insider
Information Security News: Hackers breach some White House computers
Lite-On EP1 Series SSDs deliver PCI Express speeds in M.2 format | ZDNet
SSCC 171 – Are you SURE that “1234” is a bad password? [PODCAST] | Naked Security
RSA sur Twitter : "Remember, what you do online can potentially affect everyone. Practice good #online habits! #NCSAM"
Louisville Infosec 2014 - Changing What Game- One Future For Information Security
6 Ways Ambient Assisted Living Improves Quality of Life
Seagate NAS 2-Bay Review & Rating |
Russia-linked hackers allegedly penetrated unclassified White House networks - Sun, surf and the NIST framework - POLITICO Morning Cybersecurity -
BYOD: Why the biggest security worry is the fool within rather than the enemy without | ZDNet
CPI Financial | Jobs | Business Continuity Manager
Password Manager – Online Account protection – Don’t be that Guy
SANS Institute - Photos du journal | Facebook
Studies find fast traders get data from SEC seconds early: WSJ| Reuters
McAfee Report Reveals Organizations Choose Network Performance Over Advanced Security Features | Business Wire
White House Hacked: Computer Networks Breached, Reportedly By Russians
The Tribune, Chandigarh, India - Latest News
Israeli Accelerator UpWest Helps Startups Move to Silicon Valley - Venture Capital Dispatch - WSJ
MSPs Can Help SMB Customers Pursue BYOD -- Safely | MSPmentor Blog
Why the defense industry is ripe picking for hackers - The Week
White House hacked (Russia involved?)
Growing BYOD Trend in Middle East Requires Ramped Up Data Center Security - Zawya
Why even compliant enterprises can be vulnerable in today’s threat landscape | Information Age
New report looks into Global bring your own device (BYOD) market that is expected to grow to $83.76 billion by 2019 - WhaTech
Samsung Find My Mobile bug lets hackers remotely lock devices | Daily Mail Online
Identity Theft Resource Center - TOLL-FREE NO COST ASSISTANCE at 888-400-5530
White House Computer Network 'Hacked' ≈ Packet Storm
BlackEnergy Malware Has Compromised Systems For 2 Years ≈ Packet Storm
Hackers Are Using Gmail Drafts To Update Their Malware And Steal Data ≈ Packet Storm
Hackers target unclassified White House network | CSO Online
For big raises in IT, look to mobile, security, big data -
Security Companies Team Up, Take Down Chinese Hacking Group
Walk through buildings from your own device
How software defined networking and cloud computing pave the way towards a digital society - Cloud Tech News
The FBI says to be wary of hackers ... and to let the FBI hack what it wants | Trevor Timm | Comment is free |
WHITE HOUSE network DOWN: Nation-sponsored attack likely • The Register
The Link You Just Clicked May Not Be Real - Bloomberg View
Why networks 'are being sacrificed for security' - Computer Business Review
'State sponsored' Russian hacker group linked to cyber attacks on neighbours | Technology |
Fortune 500 Companies at Risk with Exposure of Employee Passwords - The CIO Report - WSJ
Data Breaches? Bah, humbug! We're going to shop - Money -
Americans are more afraid of being hacked than of all other crimes, including murder | The Verge
Unwitting Workers Give Hackers Keys to Fortune 500 Firms' Networks: Study - NBC News
Sanovi and 3Qube Partner to Provide Business Continuity in the Cloud
Hackers infiltrate White House network | ZDNet
SymantecVoice: How To Hire The Best IT Security Team For Your Business - Forbes
Snap webcam photos whenever your app crashes
Attorney general: 18.5 million Californians had info hacked, stolen or exposed | Local & Regional News | Bakersfield Now - News, Weather and Sports
How you would fix Social Security: Sooner rather than later - The Washington Post
HMSHost deploys WatchGuard firewall system | QSRWeb
Cyber Espionage Attacks Attributed To Russian Government
Hacked! Russian Hackers Breached White House Computer Networks
FireEye report provides a view into Russia's cyber-espionage tactics | Uncover Michigan
US ICS operators under attack by crims wielding BlackEnergy malware
Information Security News: Army fitness standards for fat ‘cyber warriors’ may change as U.S. waistlines grow
Arrests made after ‘specialist malware’ used in £1.6 million ATM heist | Naked Security
FISMA and NIST Information Security Policies and Procedures Available for Instant Download from the Security Experts from Flat Iron Technologies, LLC
Louisville Infosec 2014 - Practical Interception Of Mobile Device Traffic
Gigamon says it can analyze attacker SSL traffic without affecting performance | Computerworld
BYOD: How to keep the boss out of your business -
Data breach: Most holiday shoppers undeterred
NHS Trusts struggling with Windows XP migration, FoI request finds -
Tech support’s NSFW problem
Enterprise network security takes backseat to speed: McAfee | ZDNet
White House computers 'breached by hackers' - ITV News
Placemeter monitors streets from apartment windows: time to don a mask? | Naked Security
ASU-Beebe Warns Campuses Of Possible Data Breach | Times Record
Internet Archive: Digital Library of Free Books, Movies, Music & Wayback Machine
Microsoft Offers Office 365 Users Free, Unlimited OneDrive Storage - Cloud Computing on CIO Today
Google upgrades Android Lollipop security with encryption - IT News from
How to keep emails private and avoid embarrassing leaks
Azure expands, while security, storage, APIs lift Office 365 | InfoWorld
Information Security News: BlackEnergy crimeware coursing through US control systems
Information Security News: Research links massive cyber spying ring to Russia
New Rulings Protect Hospitals Against Security Data Breaches
Securing Social Business in Office 365
10 steps to a safe driving program
South Korea spy agency says North hacking smartphones
Newly Revised 2014 Cyber Security Policies and Procedures Available for Instant Download from the Experts at
10% of employees unaware if they have an IT department or not
Enterprise Data Protection Simplified & Enhanced with NetBackup 5330 | Symantec
This is why I can’t have conversations using Twitter - Antirez weblog
Washington Post: Russia suspected to be behind White House hack
Cyber breaches put 18.5 million Californians' data at risk in 2013: report| Reuters
White House Detects Suspicious Cyber Activity, Report Blames Russia
National Stories - WJAC
Gigamon Announces New Solutions for SSL Visibility and Enhancements for Multi-Tiered Security - MarketWatch
Russians accused of hacking White House computer network -
Report: Security Pressures Making Older Firewalls Obsolete -- THE Journal
The Death Squad Dilemma: Counterinsurgency Policy and the Salvadoran Model - Foreign Policy Journal
Allied Telesis Selects Emerging Threats’ ETPro® and IQRisk® Products for New Range of Next-Generation Firewalls | Business Wire
IT is losing the battle on security in the cloud
Sony Xperia Devices Secretly Sending User Data to Servers in China
TITUS Recognized by McAfee as Most Valuable Partner of the Year | Virtual-Strategy Magazine
EMEA CR Awareness Event: Drumming Up EMEA’s Corporate Responsibility Initiatives | Symantec Connect
Turning Medical Device Hacks into Tools for Defenders – Podcast – RSA Conference
Seoul: N. Korea's Kim Jong Un had ankle surgery | The Kansas City Star
PhishLine Recognized as a Visionary in Gartner 2014 Magic Quadrant for Security Awareness Computer-Based Training - Press Release - Digital Journal
Attorney General Kamala D. Harris Releases Data Breach Report; 18.5 Million Californians’ Personal Information Put at Risk
Louisville Infosec 2014 - Building An Enterprise Ddos Mitigation Strategy
SC Magazine Awards PFU iNetSec Smart Finder 5-Star Rating for Features, Ease of Use, Performance, Support and Value | Virtual-Strategy Magazine
How Governments Can (and should) Use Hadoop | SmartData Collective
BlackEnergy crimeware coursing through US control systems • The Register
Careers - TerrAvion
Russian government gathers intelligence with malware: report - CNE
South Korea Spy Agency Says North Hacking Smartphones
California AG Says 18.5 Million Residents' Info Exposed - US News
Cryptography Hacks - Hash Encryption using DuckDuckGo Search Engine
Enable the Agile Data Center | Symantec
Fixing the broken windows of software security
PhishLine Recognized as a Visionary in Gartner 2014 Magic Quadrant for Security Awareness Computer-Based Training
Citrix Positioned for the Eighth Consecutive Year in the Leaders Quadrant for Application Delivery Controllers MQ - Finances
Comment: Retailers are too complacent about data security | Comment | Retail Week
US Urges More Government-Business Cooperation on Cyber-Security | NDTV Gadgets
New Personal Trading Instruments (PCI) from IFC Markets are Now Available for Trading - MarketWatch
Microsoft leans on data-center strength to get cloud edge -
Charleroi to review school security plan | TribLIVE
Personal data of more than 18.5 million Californians exposed - SFGate
Gartner Recognizes FishNet Security for Computer-Based Security Awareness Training - Power Engineering
North Korea: Stop sending it luxury goods (Opinion) -
Ed Snowden Taught Me To Smuggle Secrets Past Incredible Danger. Now I Teach You. - The Intercept
Warnings Issued About Fake Ebola Treatments, Malware Scams - iHealthBeat
The Man Who Writes His Dissenting Opinion in ALL CAPS
Maine nurse who treated Ebola patients will not observe quarantine - CBS News
Hackers Breach White House Computers - The Daily Beast
Personal Info Of 18.5M Californians Exposed In 2013 | KPBS
McAfee Report Reveals Organizations Choose Network Performance Over Advanced Security Features - MarketWatch
Data breaches jump in California and are expected to keep climbing - LA Times
Seoul: N. Korea's Kim Jong Un had ankle surgery | The Miami Herald
IBM Rolls Out Analytics-Based Security Solution | Sci-Tech Today
White House officials confirm breach on unclassified network | CSO Online
Louisville Infosec 2014 - A Crosswalk Of The Department Of Defense (Dod) Information Assurance Certification And Accreditation Process (Diacap)
Kaci Hickox Won't Follow Maine Ebola Quarantine Rule, Lawyer Says - ABC News
Gigamon says it can analyze attacker SSL traffic without hitting performance - PC World New Zealand
US eyes cyber `deterrence` to stop hackers
Boe Forum speaker: Protection from hackers a top priority
AG Kamala D. Harris Releases Data Breach Report; 18.5 Million Californians' Personal Information Put at Risk
Local News |
US military to secure cyberspace
Cisco: We made UCS secure but need your help to finish the job • The Register
Outgoing PCI chair wins President's Award | Business Insurance
New PCI chairman monitors federal regulatory posture | Business Insurance
US-CERT warns of phishing campaign spreading Dyre - SC Magazine
Data Breaches Plague California | ATVN
Hackers Breach White House's Unclassified Computer Network - ABC News
California reports huge jump in data breaches | PCWorld
Find My Phone does just one thing but Samsung's messed it up • The Register
Calif. AG: 18.5 million residents’ info exposed - The Washington Post
California reports huge jump in data breaches | Computerworld
Data breaches affected 18.5 million Californians last years |
Hackers breach White House network - Security - News -
Intel Exec Tells Partners Missed Security Services Opportunity 'Criminal' - Page: 1 | CRN
New Intel Security boss asks the big question | Computer Dealer News
Has the mystery behind Kim Jong Un’s disappearance been solved? | Toronto Star
The Chosun Ilbo (English Edition): Daily News from Korea - N.Korea Hacks 20,000 S.Korean Smartphones
McAfee Overhauls Partner Program | Information Technology Channel Partner Programs content from The VAR Guy
Local news from Rock Hill, SC | The Herald
Report: Russian hackers thought to breach White House network - News - Stripes
Businesses Learn Cyber Security
McAfee Report Reveals Organizations Choose Network Performance Over Advanced Security Features
Additional indicators relating to Sofacy (APT28) phishing - Cyber security updates
Malware don't need Coffee: The worst of Windows "Police Locker" is also available on Android
Security vendor coalition cleans 43,000 malware infections used for cyberespionage | PCWorld
MacOS X 10.10 & FreeBSD10 ftp Remote Comand Execution -
Microsoft's Innovation Can Take It Higher -
White House computer network is hacked, official says - LA Times
How an ankle brought Kim to heel -
Seattle FBI admits to faking news report to drop spyware on teen's computer -
Social News 29/10 - News VietNamNet
The dangers of opening suspicious emails: Crowti ransomware - Microsoft Malware Protection Center - Site Home - TechNet Blogs
Threat Spotlight: Group 72, Opening the ZxShell
Pentester Academy Lab
North Korean Leader Kim Jong Un Had Ankle Surgery: Officials
N. Korea attempts to hack into S. Koreans' smartphones: NIS
Gigamon says it can analyze attacker SSL traffic without hitting performance | PCWorld
The Ten Most Wanted Hackers By The FBI – #9 and #8 - The State of Security
300,000 Social Security Numbers, driving licenses and more private data leaked after being left on publicly accessible server
Chip-based cards targeted after Home Depot hack | TheHill
Louisville Infosec 2014 - Issa Awards
Suspicious Activity Detected on White House Computer Network
UPDATE 2-Suspicious cyber activity at White House detected, addressed| Reuters
How Qualys tackles an incident response | IT Business
Google for Work scores 45,000 new users -- should Microsoft worry?
Suspicious cyber activity detected by technicians at the White House, AsiaOne World News
Apple Addresses 'Shellshock' Bug as More Attacks Appear
McAfee Delivers New Product Portfolio for Small and Medium-Sized Businesses - Press Release - Digital Journal
Cyber attacks enrich security specialists - Worcester Telegram & Gazette -
NHS Greater Glasgow and Clyde issue apology after confidentiality breach | Herald Scotland
Mobile Is Eating the World | Andreessen Horowitz
White House says it has handled suspicious hacker activity | CTV News
Former NSA Official Warns Companies Against Cyber-Retaliation or ‘Hacking Back’ | Military & Intelligence | RIA Novosti
IATA launches Aviation Cyber Security Toolkit -
The world of 'hackonomics' - Video
Prometric Expands Industry Leadership for Systems Security and Management - Power Engineering
Hackers breach some White House computers - The Washington Post
Is the Washington Press Corps Covering Up Another Obama Administration Fiasco? [Updated] | Power Line
Local issues, national candidates in Nov. 4 general election : The Issaquah Press – News, Sports, Classifieds and More in Issaquah, WA
A New Ambition for Europe: A Memo to the European Union Foreign Policy Chief - Carnegie Europe
FBI uncovers second person leaking government documents - SC Magazine
‘Replay’ Attacks Spoof Chip Card Charges — Krebs on Security
FireEye identifies cyber espionage group possibly tied to Russian government - SC Magazine
Avoiding BYOD? Why Setting BYOD Policies Is Increasingly Critical – Video – RSA Conference
Hacks on Californians shot up last year, more are expected this year - LA Times
California Attorney General Kamala Harris: 18.5 million residents' information exposed |
Hackers hit data of 18.5M Californians in mostly retail breaches : PERSONAL TECH : Tech Times
MFE PS14 Highlight - YouTube
'GCHQ's surveillance data gulp is BULKY and WARRANTLESS', human rights groups moan • The Register
Find My Phone glitch lets hackers lock up Samsung handsets : PERSONAL TECH : Tech Times
Potential data breach for 44,000 Arizona retirees
Office 365 is getting management features for iOS, Android and Windows Phone -
Amit Yoran promoted to RSA president - SC Magazine
Latest breaking news from Hilton Head & Beaufort, SC | The Island Packet
Pawn Storm Espionage Attacks Use Decoys, Deliver SEDNIT - Security News - Trend Micro USA
Survey: The Crime Americans Worry About Most? Credit Card Hack Attacks – Consumerist
Coalition sheds more light on Hikit threat, Axiom spy group - SC Magazine
Malware Threat Detection and Malware Block Effectiveness – Reviews | McAfee
Data breach at Cape May-Lewes Ferry — NewsWorks
ASU-Beebe warns campuses of possible data breach | The Miami Herald
Gigamon announces new solutions for SSL visibility and enhancements for multi-tiered security - Media Releases - CSO | The Resource for Data Security Executives
'Cash out' crew member sentenced to 21 months in prison - SC Magazine
SuperValu Reports Second Cyberattack
Louisville Infosec 2014 - What Your Web Vulnerability Scanners Aren't Telling You
Health board apology to 86 transgender patients over privacy breach | Glasgow & West | News
Calif. AG: Personal data hacked, exposed from 18.5 million Calif. accounts in 2013, up 600 pct - 10/28/2014 12:37:03 PM | Newser
AZ State Retirment System Responds To Potential Data Breach | KJZZ
WatchGuard Technologies Delivers a Leading Combination of Security and Value in NSS Labs' Analysis of Next Generation Firewall Appliances - Press Release - Digital Journal
State Hacking Hike |
Local & North Carolina state news from Raleigh, NC |
Unencrypted Discs with PHI Create Potential Health Data Breach |
Review: Batch Commander for Pro Tools, from Slate Media Technology | SonicScoop - Creative, Technical & Business Connections For NYC’s Music & Sound Community
The evidence that Sharyl Attkisson got her laptop hacked seems weak - Vox
Man charged with hacking into Clinton's computers
Report: Russian Government in on Hacking Schemes
The grinch who hacked Telethon's Instagram account
Layering EMV chip, tokenization, encryption bolsters card payment security - SC Magazine
Watch "Hackers exploiting Microsoft PowerPoint to access computers" Video at SCMagazine
Providing Next-Gen Security for Today’s Healthcare - YouTube
Microsoft’s Commitment to Protect Customer Data through Encryption Continues | Cyber Trust Blog
NASA Television | NASA
NSA Chief Warns Companies Against Revenge Hackings -
Amit Yoran Named RSA President; Art Coviello Remains as RSA Executive Chairman
This Credit-Card-Size Cellphone Would Be the Ultimate Backup
​Watch your attachments: Microsoft Office bug lets hackers take over computers — RT USA
Gavin Struthers' Partner Summit 2014 Keynote Recap | McAfee
Partner Summit 2014 Wraps Up | McAfee
Is Jailbreaking Apple iPhone 6 and iOS 8 Legal? Let’s Find Out! | Master Herald
Hacking Group May Be Linked to Russian Government: Video - Bloomberg
More Evidence the Government Hacked Sharyl Attkisson's Computer
OneNote for iOS gets cloud storage attachments and Touch ID, OneNote for Mac gets SharePoint Server support | VentureBeat | News Briefs | by Emil Protalinski
Techday – Think you know all there is to know about the cloud? Think again
Cybersecurity Executives Raises Hacks - Business Insider
US-CERT Warns of Phishing Campaigns Spreading ‘Dyre’ Banking Trojan - The State of Security
Wall Street Beset by Hackers Raises Key Executive Pay - Bloomberg
Microsoft Launches TechEd Europe with Wave of Announcements | Cloud content from Windows IT Pro
Hacking is the crime Americans worry about most, Gallup poll shows - DecodeDC -
Wall Street Beset by Hackers Raises Key Executive Pay - Businessweek
Who knew? MPAA concerned online pirates are exposed to malware | Ars Technica
Tor users advised to check their computers for malware | Technology |
Hugging a Medieval Book | medievalbooks
Improving cybersecurity for small and medium-sized businesses | Federal Times |
No Page Found - Khaleej Times
Cisco Unveils Industry's First Threat-Focused Next-Generation Firewall
Republican 2016 Contenders Have Taken Positions on NSA Reform. Where Does Hillary Clinton Stand? - Defense -
Why International Cybercrime Is Going To Keep Getting Worse | Fast Company | Business + Innovation
Security Avengers team up to take down Chinese hacking group • The Register
Official Website of Popular Science Compromised
Kaspersky Lab sur Twitter : "We'd like to extend a very big thank you to our sponsors today at the #KasperskyGSS Government Cybersecurity Forum:"
Louisville Infosec 2014 - A Place At The Table
2600 Profiled: "A Print Magazine For Hackers" - Slashdot
Small Business Security: Hackers Dial Up Telephone Fraud
Finextra: Feedzai and Encap form security partnership
Lawyers in Seattle ask to move Russia hacking trial to May | - Northwest
Deliver Business Value Through Big Data: Make It Small
18.5M Californians' data breached last year: Report
DailyTech - Samsung's Remote Wipe Could Let Hackers Hold Your Phone Ransom
Local news from Bellingham, Whatcom County, WA |
Prometric Expands Industry Leadership for Systems Security and Management - Power Engineering International
McAfee Inc. sur Twitter : "At the Demonstrating Proxy on #NGFW Turbo Talk—looking at improved isolation between clients and servers. #FOCUS14"
Vulnerability Note VU#685996 - GNU wget Arbitrary Filesystem Access through FTP Symlinks
Juniper Networks sur Twitter : "Give this week's certification quiz your best guess, good luck!"
IBM Rolls Out Analytics-Based Security Solution - Computing on CIO Today
Out of the Shadows: Iran’s Evolving Approach to Drug Addiction
How to Make Your Money Last for a Longer Lifetime - Total Return - WSJ
Security vendor coalition cleans 43K malware infections used for cyberespionage | Computerworld
Microsoft: 42% of Americans endure daily or weekly attacks on personal data
FBI impersonated newspaper to finger school bomb threat suspect • The Register
EC Q4 2014: NFV/SDN Survey
Wal-Mart's War Against Apple Pay, The iPhone Payments System - Business Insider
Gallup poll: Americans fear hackers more than any other crime
Calif. AG: 18.5 million residents' info hacked
Hacking Group May Be Linked to Russian Government, Report Says - Bloomberg
ASU-Beebe Warns Campuses of Possible Data Breach | Arkansas Business News |
Identifying Jailbroken iPhones/rooted Android Phones To Stop Fraud
Gartner Recognizes FishNet Security for Computer-Based Security Awareness Training - Power Engineering International
Which crime scares Americans the most? Poll says hacking : T-Lounge : Tech Times
US eyes cyber 'deterrence' to stop hackers
New Chinese Cyber-Espionage Group Exposed - Network Security on Top Tech News
RALPH R. REILAND: Can Obama Administration do anything right?
Russian-based cyber spies going after military, intelligence targets
Looking at the Threat Landscape to Improve Your Endpoint Security | Symantec Connect
Tuleap 7.2 XXE Injection ≈ Packet Storm
Tuleap Remote Command Execution ≈ Packet Storm
CUPS Filter Bash Environment Variable Code Injection ≈ Packet Storm
Careers Listing —
BBC News - Google is developing cancer and heart attack detector
Gartner Recognizes FishNet Security for Computer-Based Security Awareness Training
Millions Of Californians Face Fraud Risk Due To Data Breaches « CBS Los Angeles
2014 Cybersecurity Leadership and Innovation Awards Announced - Directions Magazine
Cylance Introduces Threat Indicators to CylancePROTECT and CylanceV, Providing Context on Threats Before They Execute | Virtual-Strategy Magazine
ScanBox keylogging framework lurking on disparate watering holes
Prometric Expands Industry Leadership for Systems Security and Management
HP Security Bulletin HPSBMU03152 ≈ Packet Storm
HP Security Bulletin HPSBST03157 ≈ Packet Storm
Debian Security Advisory 3058-1 ≈ Packet Storm
Example: Configuring BGP PIC Edge for MPLS Layer 3 VPNs - Technical Documentation - Support - Juniper Networks
Community |
95% of companies challenged by BYOD security - SC Magazine UK
Microsoft announcements: From TechEd Europe innovations to baking Skype into IE | Network World
New York Governor Lays Out Ebola Rules: Mandatory Home Quarantine - NBC News
WikiLeaks’ Julian Assange warns: Google is not what it seems
Security vendor coalition cleans 43,000 malware infections used for cyberespionage | CSO Online
Attorney General Kamala D. Harris Releases Data Breach Report - Highland Community News: Breaking News
Globes English - Export Institute to support cyber security sales
Unencrypted discs missing, Arizona State Retirement System notifies 44,000 - SC Magazine
Pen Test Hackfest (Washington, DC)
Government steps up resources for SME's on Cyber and Information Security risk | Continuity Forum
The New Security Features of iOS 8 and Android Lollipop - Security News - Trend Micro USA
Skills shortage tears holes in government security - Business Technology
FTC Says AT&T Has Misled Millions of Consumers with ‘Unlimited’ Data Promises | Federal Trade Commission
Calif. AG: 18.5 million residents' info exposed - SFGate
Hackers can use the Samsung Find My Mobile feature to attack phones
NATO and UK defence groups hit by Russian cyber-attack - SC Magazine UK
Cloud, mobile technologies boost bottom line
Microsoft unwraps new auto data-protection in Office 365 tools • The Register
FCC Issues First Data Security Fine - Federal Communications Commission | The National Law Review
FBI raids house of 'second Snowden' - SC Magazine UK
Calif. AG: 18.5 million residents’ info hacked
Calif. AG: 18.5 Million Residents' Info Exposed - ABC News
2nd Russian Hacker Group Accused of Targeting NATO | Business | The Moscow Times
Vladimir Putin Employs An Army Of Skilled Hackers, Report Finds
Louisville Infosec 2014 - Origin Of Cybersecurity Laws - An Insider's Story
Marcel Holsheimer sur Twitter : "Securing the Internet of Things. Renee James at #FOCUS14 #intelsecurity"
Healthcare Data Today: In Motion or Out of Control?
Verizon: CIOs control over half of enterprise cloud spending |
New Managed Security Information and Event Management Service from Sungard AS Helps... -- LAS VEGAS, Oct. 28, 2014 /PRNewswire/ --
An Update on DOT’s Passenger Protection Rulemaking #3, NextGen, Ebola, Drones, Enforcement Actions, Security Fees and Other Aviation Regulatory Matters | Cozen O'Connor - JDSupra
Security vendor coalition cleans 43,000 malware infections used for cyberespionage - Techworld
FCC Expands Application of Customer Privacy Provisions with $10 Million Fine Against Carriers | The National Law Review
Calif. AG: 18.5 million residents' info hacked |
Cloud computing: CIOs are taking back control, but it is already too late? | ZDNet
ASI - DMA Releases Data Breach Guide
Data Loss Prevention Expanded to Office 365 | Office 365 content from Windows IT Pro
IBM Security App Focuses on Multi-Dimensional Analysis
Sign In
Cyber club prepares high school students for future careers - Baltimore Sun
Symantec sur Twitter : "Microsoft Office 365 Gets Unlimited Cloud Storage"
Belgacom shares more details about alleged GCHQ breach
‘Al-Quida Free Terror Nettwork’ Wi-Fi hotspot grounds plane | Naked Security
Shellshock attacks against MTAs could leave SMBs exposed | CSO Online
DigitalOcean Partners With Mesosphere To Allow Developers To Focus On Apps, Not Servers | TechCrunch
Experts: Russian hackers targeting military secrets | TheHill
Microsoft warn Windows Office software bug allows hackers to take over your computer | Tech | Life & Style | Daily Express
Microsoft unveils new products TechEd Europe - Telecompaper
Introducing The Check Point Capsule: Groundbreaking Mobile Security That Goes Where You Go - MarketWatch
Bugtraq: [ MDVSA-2014:210 ] mariadb
Bugtraq: phpfusion (Search Page) Denial of Service Vulnerability
Feds Probe Cybersecurity Dangers in Medical Devices - IEEE Spectrum
Private-sector spying foils China-linked hacking | Business Standard News
Solutionary Releases Security Platform Leveraging Hadoop - Database Trends and Applications
Microsoft offers unlimited OneDrive storage to Office 365 users : News, News - India Today
Windows 7 no longer sold to consumers – all about Windows 8.1 now |
Cape May-Lewes Ferry financial data breach affects bank card data |
Concerned About Big Data Breaches? Technology Can Help | Technology | Business Review USA
In BYOD We Trust | CIO
Russian hackers target Nato, military secrets
What To Do When Your Big Data Isn't Big Enough - Forbes
Credit-card hacking is Americans' top crime worry: poll, News, News, AsiaOne Business News
Russia fingered in long-running spying campaign | Computerworld
File Security With the Click of a Button
McAfee Inc. sur Twitter : "Use the automation, Luke. Did you know that you can patch Java, Mozilla, Adobe Flash & Reader, all w/ ePO? #FOCUS14"
'Cyber Security Awareness month' comes to a close, but don't let your M2M guard down - M2M Now - News and expert opinions on the M2M industry, machine to machine magazine
The Tech Conundrum: White Hat vs. Black Hat - J-Net Community
Around the Web: Backoff, Online Payments, Security – Blog Post – RSA Conference
Jimmy Kimmel Is the Most Dangerous Cyber Celebrity of 2014 - iQ by Intel
US banks biggest target for phishing scams, reveals RSA - 29 Sep 2014 - Computing News
Researchers reveal new Chinese hacking group
Office 365 to get MDM capabilities baked in | IT PRO
Next Office for Mac leaks, shots of UI appear | Computerworld
Bugtraq: [security bulletin] HPSBHF03156 rev.1 - HP TippingPoint Intrusion Prevention System (IPS) Local Security Manager (LSM) running SSL, Remote Disclosure of Information
Bugtraq: [security bulletin] HPSBST03160 rev.1 - HP XP Command View Advanced Edition running Apache Struts, Remote Execution of Arbitrary Code
McAfee Inc. sur Twitter : "Monitor exploitable processes—tips & lessons learned for managing your ePO environment—tech deep dives #fFOCUS14"
Flextronics' INS Division: Cheapest Way To Buy Into Cyber Security - Flextronics International Ltd. (NASDAQ:FLEX) | Seeking Alpha
NewsWorks: News and conversation for Philadelphia, Pennsylvania, New Jersey and Delaware
Defense And Military Cyber Attacks Traced Back To Russia ≈ Packet Storm
Shellshock Over SMTP Attacks Mean You Can Now Ignore Your Email ≈ Packet Storm
Camera Jacket Turns You Into A Walking Surveillance Station ≈ Packet Storm
Why businesses should care about cybersecurity this October | Cyber Trust Blog
How to deal with neighbourhood hackers: tips for securing your Wi-Fi - Techzim
Introducing The Check Point Capsule: Groundbreaking Mobile Security That Goes Where You Go
Hacking for a cause: Cybersecurity for the govt procurement system | SciTech | GMA News Online
Check Point's Third Annual Mobile Security Survey Highlights Careless Employees as Greatest Mobile Security Threat
Solution Providers Get Stealthy On Shadow IT - Page: 1 | CRN
Earnings Releases, Court Rulings, and Preliminary Quarterly Results - Research Reports on TSMC, Seagate, 3DS, Xerox and Check Point - MarketWatch
HDS flings cloud-in-a-box at EMC Vblock, NetApp FlexPod • The Register
Sencha Space 1.2 unifies enterprise application deployment and management - SD Times
McAfee Inc. sur Twitter : "Very informative deep dive into maximizing your SIEM. #FOCUS14"
Customer support related to the order, payment or software delivery | Avangate
Feds seek potential 'second Snowden' gov doc leaker – report • The Register
Bugtraq: Apple iOS v8.0.2 - Silent Contact Denial of Service Vulnerability
Bugtraq: Folder Plus v2.5.1 iOS - Persistent Item Vulnerability
DMA Releases Data Breach Survival Guide, Gives Marketers Essentials - EContent Magazine
Merging Missions: Business Continuity and Emergency Management | .torrent -> streamable video
New Docker Engine
Cloud does NOT equal data centre: Gartner dispels the top 10 myths of cloud computing | Information Age
IT Security Stories to Watch: Did Hackers Attack, Infiltrate Staples? | Managed Security Services content from MSPmentor
Docker CTO: Why Microsoft's Docker plans for Windows will matter to you | ZDNet
Crooks use stolen magnetic payment card info to make fraudulent chip-enabled transactions
Louisville Infosec 2014 - Linking Users To Social Media Usage On Android Mobile Devices
Look for Windows 7 Mainstream Support to be extended | ZDNet
EFF files brief in response to Jewel v. NSA opposition - SC Magazine
MEF Appoints Judith Bitterli to Global Board of Directors
Reservation Management | Product Spotlight
My three favorite Windows laptop alternatives - CNE
ONC policy group examines Big Data questions — FTC’s Ramirez applauds HealthKit policies — FCC Commissioner has universal service fund in his sight - POLITICO Morning eHealth -
Gigamon Announces New Solutions for SSL Visibility and Enhancements for Multi-Tiered Security | Virtual-Strategy Magazine
Who wins Senate in Election 2014? 3 reasons it could be mystery for weeks. - Failure to win a majority -
Bugtraq: [security bulletin] HPSBMU03152 rev.1 - HP Operations Orchestration running SSL, Remote Disclosure of Information
Bugtraq: [security bulletin] HPSBST03157 rev.1 - HP StoreEver ESL E-series Tape Library and HP Virtual Library System (VLS) running Bash Shell, Remote Code Execution
BAE Systems boosts expertise in cyber warfare and cyber security with acquisition of SilverSky
Dexmo is an exoskeleton glove that lets you feel virtual objects | News |
iClarified - Apple News - OS X Yosemite is Now Available to Download!
California Supreme Court declines to review Sutter data-breach case - Sacramento Business Journal
Apple Inc. (NASDAQ:AAPL) News Analysis: How to Secure Your Apple iOS 8 Device
EMC Corporation
Cisco 2014 Annual Security Report: Cybercriminals Applying “Old” Techniques in New Ways
Microsoft Announces Unlimited OneDrive Storage for Office 365 Subscribers | NDTV Gadgets
'Cloud aids mobility of human experience across devices' -
Chipmaker Disables Counterfeits With Software Update - InformationWeek
Watchful Software Announces Industry’s First Mac OS X Support for Microsoft RMS Classification and Data Protection
Microsoft unveils new Azure tools, opens up Office 365 with new APIs | News | TechRadar
EvilToss and Sourface hacker crew 'likely' backed by Kremlin – FireEye • The Register
Gigamon Announces New Solutions for SSL Visibility and Enhancements for Multi-Tiered Security
Microsoft reveals ramped-up security offerings for Windows 10 and Office 365 across multiple devices - 28 Oct 2014 - Computing News
Why CIOs 'should lead data breach responses' - Computer Business Review
Sharyl Attkisson's Computer was Bugged Using Government Software (Update)
Allied Telesis Selects Emerging Threats’ ETPro® and IQRisk® Products for New Range of Next-Generation Firewalls - Media Releases - CSO | The Resource for Data Security Executives
Samsung phones can be remotely hacked, warns NIST - Recombu
New Bedford man gets 4-year federal prison sentence for hacking into police computer servers, including chief's email account |
What the world is reading: What were you thinking, Mr Nadella? | The Indian Express
ArmstrongAdams wins Imperva partner award
Targeted attacks on rise, costly, survey says - SC Magazine
Latest Gadgets | Mobiles | Tablets | Android apps | Social Media | Tech News: EBOLA Virus Is Affecting Fast Around 5000 People Died
Mobile app permissions: Who does it right? | ZDNet
Security Researcher Suggests Samsung's KNOX and Android 5.0 Lollipop Aren't All That Secure |
Microsoft adds new cloud, mobility solutions - IT-Online | IT-Online
Watchful Software Announces Industry's First Mac OS X Support for Microsoft RMS Classification and Data Protection
246 percent spike in Apple-themed phishing scams
Sencha Space 1.2 Unifies Enterprise Application Deployment and Management | Virtual-Strategy Magazine
Community news from Biloxi and Gulfport, MS | Sun Herald
Thinspace CEO Advises Chinese Government IT Solutions Supplier of Desktop Virtualization Security Technologies | Virtual-Strategy Magazine
Sencha Rolls Out The Latest Flavor Of Its Cross-Platform Mobile Toolkit - Forbes
Fortinet Misses on Q3 Earnings, Revenues Beat, Shares Up - October 28, 2014 -
Military secrets theft hacking trail leads to Russia | ZDNet
Cape May-Lewes Ferry Data Breach | Delmarva Public Radio
Microsoft Office 365 Gets Unlimited Storage, MDM And APIs
Microsoft Azure Gains Big Data And Automation Tools
Cloud will never be fully secure, get over it | ZDNet
5 Ways to Curb Your Child's Chronic Texting | McAfee
Top 10 cloud myths
Clues point to Russia in long-running spying campaign | CSO Online
'ScanBox' keylogger targets Uyghurs, US think tank, hospitality industry | CSO Online
0x5f3759df | Hummus and Magnets
NHS Scotland accidentally leaks list of transgender patients ·
For big raises in IT, look to mobile, security, big data | ITworld
Local News | The News Tribune
Media Release: Allied Telesis Selects Emerging Threats’ ETPro® and IQRisk® Products for New Range of Next-Generation Firewalls
Thinspace CEO Advises Chinese Government IT Solutions Supplier of Desktop Virtualization Security Technologies
Samsung Find My Mobile reported to be vulnerable to attack - SlashGear
Capital Journal Daybreak: Rare Sight in New England for GOP | Hacking Trail Leads to Russia | The Policy-Free Campaign of 2014 - Washington Wire - WSJ
Alert Logic Security Solutions Now Microsoft Azure Certified -- BARCELONA, Spain, Oct. 28, 2014 /PRNewswire/ --
An exploit in Samsung's 'Find My Mobile' service could remotely wipe your phone - Shiny Shiny
Americans Fear Hacking More Than Any Other Crime, Poll Finds
Hackers Used Online Video Site to Smuggle Data Out of Firm - Infosecurity Magazine
Louisville Infosec 2014 - Trash Talkin - It Audit Guide To Dumpster Diving
WebApp Sec: Re: Shameless plug: OWASP Board Elections
Drake Reveals Three Previously Unheard New Songs To Stop Hackers Leaking Them - Capital FM
The evolution of the CISO role and organizational readiness | CSO Online
NSS Labs Tests Show Next Generation Firewall Security Effectiveness Remains Strong | Virtual-Strategy Magazine
F5 Positioned as a Leader in the Magic Quadrant for Application Delivery Controllers for Eighth Consecutive Year | Business Wire
How to handle a data breach - The Herald-Tribune: Business
Microsoft opens Office 365 to programmers | Computerworld
Alert Logic Security Solutions Now Microsoft Azure Certified -- BARCELONA, Spain, Oct. 28, 2014 /PR Newswire UK/ --
Is Google Maps accurate? Ask the giant cat… | Naked Security
An Easy Way to Dramatically Improve iPhone (or Any Phone) Security | CIO
BBC News - Online harassment affects 40% of US adults, report says
Nationally-Recognized Cyber Security Program Adds Focus in Computer Forensics | National University
Navigating the Internet of Things – Video – RSA Conference
We Are All Confident Idiots - Pacific Standard: The Science of Society
Windows 10 Looks to Eliminate Passwords - Infosecurity Magazine
Russia May Have Hacked US Firm Keeping Classified Military Data: Cybersecurity Company | Military & Intelligence | RIA Novosti
More Microsoft News From TechEd Europe--Azure, Mobile And Ecosystem - Forbes
Cape May-Lewes Ferry card data breached
Mobile Payments Still Facing the Same Big Obstacles | Street Fight
Election countdown: Runoff in Louisiana? Dems hope not
Mac OS X unsecured documents are by default stored in the iCloud
SC Magazine Awards PFU iNetSec Smart Finder 5-Star Rating for Features, Ease of Use, Performance, Support and Value
Cyber security coalition reports on Chinese state-sponsored espionage
Coalfire Updates Navis Rapid PA-DSS to PCI 3.0 Standards | Business Wire
Samsung denies KNOX security flaw claims | News | PC Pro
OneRNG - Hardware Random Number Generator
CNN poll: Voters are angry | Politics - Home
BBC News - US 'probes hackable flaws' in medical devices
IBM's Big Data analytics solution to uncover criminal cyber activity in seconds
Microsoft delivers wave of innovation at TechEd Europe - Press Release - Digital Journal
Can Security and Privacy Happily Co-Exist in the Enterprise? - Infosecurity Magazine
Gartner Identifies Tech Trends
BSF on high alert as Nilofer approaches border districts in Rajasthan - The Times of India
Business continuity planning essential - IT-Online | IT-Online
Neuro-Hacking 101: Taming Your Inner Curmudgeon – Podcast – RSA Conference
Apple releases iOS 8.1 with Apple Pay | News | PC Pro
Britain declares cyber war on ISIS to stop home-grown jihadism, 28 October 2014
Un lanceur d'alerte post-Snowden identifié par le FBI
Queen Elizabeth Abused By Twitter Trolls After Sending Her First Tweet
Intel bods to detail RSA birko crypto man-in-the-middle diddle • The Register
27c3 - Sip Home Gateways Under Fire
Cloud, Hardware Drive Record Microsoft Revenue | NewsFactor Network
Microsoft's Azure Data Centres Now Live in Australia -
Telstra, Equinix to Link to Azure Data Centers in Australia
Microsoft launches Australian Azure offering (+13 photos) - ARN
Microsoft Azure Australia begins operating
Plošné digitální sledování ohrožuje demokracii -
Microsoft Azure goes live in Australia | Business Cloud News
Microsoft opens up Office 365 APIs to other platforms, including Android | PCWorld
Why NZ firms can benefit from Microsoft's new Aussie datacentres - Reseller News
Microsoft unveils Azure Australia cloud services - CIO
Microsoft Azure cloud launches in Australia
Microsoft Azure in Australia Goes Live Today | CloudWedge
Microsoft unveils Office 365 SDK and APIs for iOS app extensibility
Microsoft offers new APIs for Office 365 - SD Times
Sky high expectations as Microsoft launches Australian Azure cloud service
Microsoft Azure to contest supremacy in local cloud market
Rogue Tor exit node injects malware into downloaded binaries - SC Magazine UK
Why Social Media Guidance Is Important | Jeannie Borin
BBC News - Met Office to build £97m supercomputer
SmartCompany - Microsoft launches Azure cloud platform data centres in Australia
Microsoft unleashes big-data tools for Azure and Office 365 security features | VentureBeat | Cloud | by Jordan Novet
Containers: Beyond Virtualization --
New Microsoft data centres in Australia to offer NZ benefits | Scoop News
Microsoft delivers wave of innovation at TechEd Europe
Taylor Swift warns friends against hackers
Xfernet To Showcase Affordable Business Continuity Solutions At The Los Angeles Small Business Expo | Virtual-Strategy Magazine
HMSHost deploys WatchGuard firewall system | Pizza Marketplace
China-Linked Hacking Foiled by Private-Sector Sleuthing - Bloomberg
How cryptography can help banks guard against data breaches - InformationWeek – IT news & articles
Knock Knock tool makes a joke of Mac AV • The Register
Security companies form pact for mobile authentication | Mobile Payments Today
Baroness Kidron interview: ‘Children’s online safety is too vital to leave to Government’ - Profiles - People - The Independent
Cyber Security Coalition Releases Full Report on Large-Scale Interdiction of Chinese State Sponsored... -- WASHINGTON, Oct. 28, 2014 /PRNewswire/ --
Clues point to Russia in long-running spying campaign | PCWorld
Potential Health Data Breach, Medical Records Fly off Truck |
Researchers identify sophisticated Chinese cyberespionage group - The Washington Post
HMSHost deploys WatchGuard firewall system | Fast Casual
Where Things Stand With The Senate: ABC News Election 2014 Race Ratings - ABC News
SnoopWall's privacy flashlight app protects your information | Daily Mail Online
Think Before you “Share” to Prevent Identity Theft -
Keep Your Business’s Data Safe in the Cloud -
Cloud Security: Shared Responsibility in Action -
EWF USA 2014: Best Practice and Playbooks for Incident Response - Infosecurity Magazine
Второй Сноуден в США: ФБР поведало о содержании документов, которые мужчина передавал СМИ | Собеседник.ру
Windows 10 will come with a command line package manager, much to the lament of Linux users | ExtremeTech
Microsoft Scrambles to Fix Zero-Day Flaw in OLE
Cevallos: Why Ebola quarantine is legal | National News - WCTI NewsChannel 12
Automation is the key to successful policy implementation
Whitepaper: 10 network security tools you should use
27c3 - Safety On The Open Sea
Most Americans are afraid of credit card hacking
Government aims to make $15 billion Internet of Things industry in India by 2020 - Economic Times
Democratic attack ads aim to save Senate majority | The Kansas City Star
BBC News - Exposing the hidden history of computer hacking
Novetta leads first coordinated malware eradication campaign - Microsoft Malware Protection Center - Site Home - TechNet Blogs
Operation SMN - Disruption of Axiom Group - Prolific Chinese Cyber Espionage Team - iSIGHT Partners
How to Keep Passion in a Relationship:
ASU-Beebe reports potential data breach
Fight for U.S. Senate control may not end on Election Day| Reuters
Hackers target Fort Myers family business, and daughter - WINK-TV News
Credit-card hacking is Americans' top crime worry: poll - Business News | The Star Online
China-Linked Hacking Foiled by Private-Sector Sleuthing - Businessweek
NJIT Offers Certified Information Systems Security Professional (CISSP) Exam Preparation Boot Camp - Press Release - Digital Journal
New Bedford computer hacker sentenced to 4 years in federal prison - Metro - The Boston Globe
8-Year-Old CEO Reuben Paul Proves that Kids Are the Future of Cybersecurity - The State of Security
Enabling Adaptive Threat Protection - The State of Security
The Bash Vulnerability: Practical Tips to Secure your Environment | AlienVault
Russia and China to sign cyber-security treaty in November - 26 Oct 2014 - Computing News
Potential data breach at ASRS; 44,000 retirees affected
Banks Ramp Up Cybersecurity Requirements For Outside Lawyers - Law Blog - WSJ
PCI: Retailer Security Failures – Video – RSA Conference
SALTO - The Xerox Alto Simulator
Hackers take advantage of Bash Shellshock bug as developers rush to patch- The Inquirer
Cevallos: Why Ebola quarantine is legal | National News - WPTZ Home
FCC imposes $10 million fine on TerraCom and YourTel America
Get the Deets on Ansel Elgort's Scary Hacking Incident | J-14
FCC Slaps Telecos With $10M Fine for Data Breaches
Shellshock: The 'Bash Bug' That Could Be Worse Than Heartbleed
FCC Hands Out $10 Million Fine For Comsumer Privacy Breach | Digital Trends
Republican candidates won’t win a mandate: The midterm elections will only prove President Obama is unpopular.
Ex-CBS Reporter: A 'Three-Letter Government Agency' Hacked Into My Computer And Spied On Me
NIST lays out roadmap for cloud computing -- GCN
McAfee Inc. sur Twitter : "A lot of great conversation happening out our #FOCUS14 Expo Hall demo stations."
Channel ban: PCI panel indicts Telangana govt - The Times of India
SUSE Linux Enterprise 12 Is Released - Operating Systems on CIO Today
Trying to Avoid Backoff Malware? Good Luck | News & Opinion |
Samsung 'Find My Mobile' Flaw Allows Hacker to Remotely Lock Your Device
27c3 - Your Infrastructure Will Kill You
Hidden history of computer hacking
Sen. Rob Portman: Changing Majority Will Get Things Done - NBC News
Ukraine Unspun: Chechnya War Pic Passed Off As Ukraine Atrocity By Hackers, Russian TV
Internet-based phone hacking targets US SMBs - The Times of India
Taylor Swift on '1989,' Fans and Her New Year's Eve Plans - ABC News
Techday – Making the complex simple
Here’s why Rite Aid and CVS turned off Apple Pay | Computerworld
iTWire - How to create a secure, easy-to-manage private cloud
Continuity and Spotlight highlight the need to closely examine where our data goes | Macworld
Vulnerability in widely used 'strings' utility could spell trouble for malware analysts | ITworld
Tor Project flags Russian 'exit node' server for delivering malware | Computerworld
Alabama doesn't require data breach notification - Huntsville News | and ABC 31: Appnews
Security Conferences - Security Events - Trend Micro USA - Trend Micro USA
Verizon Wireless Injects Identifiers to Track Mobile Customers’ Online Activities
Well, I'm Back: Are We Fast Yet? Yes We Are!
Biggest challenge for SDN isn’t technology, says Gartner | IT World Canada News
Taylor Swift warns friends against hackers | Business Standard News
Taylor Swift is New York City's new welcome ambassador for tourism
Sharyl Attkisson's Book on the Obama-Media Axis - The Rush Limbaugh Show
'Government-related agency behind laptop hack,' claims former CBS reporter who felt targeted by Obama administration for reporting on Benghazi | Daily Mail Online
China-backed hackers reportedly target Apple’s iCloud users
Microsoft PowerPoint Vulnerable to Zero-Day Attack
Windows TrackPopupMenu Win32k NULL Pointer Dereference ≈ Packet Storm
Data Science Meets the Power of the Crowd | The Network
Credit card hacking is Americans' top crime worry: Poll - Channel NewsAsia
Is new "Bash Bug" worse than Heartbleed? - CBS News
Vulnerability Found In Samsung’s Find My Mobile Feature
Taylor Swift's '1989' Aiming For 900,000-Plus Sales Debut | Billboard
Democratic attack ads aim to save Senate majority | The Miami Herald
Americans Fear Hacking, Most Frequent Crime - WKEF-TV ABC 22 News :: News - Top Stories
Filemaker Login Bypass / Privilege Escalation ≈ Packet Storm
vBulletin 4.x Tapatalk Blind SQL Injection ≈ Packet Storm
libbfd Out Of Bounds ≈ Packet Storm
Vulnerability in widely used 'strings' utility could spell trouble for malware analysts | PCWorld
AWS scores same Oz gov sec creds as Azure • The Register
Shellshock over SMTP attacks mean you can now ignore your email • The Register
Taylor Swift Named New York City Welcome Ambassador | Billboard
Jennifer Lawrence's Ex-Boyfriend Claims Her Steamy Videos Could Be Leaked Next
Taylor Swift warns friends against hackers - Hollywood News -
SUSE Linux Enterprise 12 Is Released - Disaster Recovery on CIO Today
Windows 10's ID Management and Security Controls -- Microsoft Certified Professional Magazine Online
New Exploit of Sandworm Zero-Day Could Bypass Official Patch | McAfee
The ‘Outrageous’ Thing Former CBS Reporter Sharyl Attkisson Says a Source Confirmed That a ‘Government-Related Entity’ Did to Her |
Louisiana Democratic senator in tight race against GOP challenger - CBS News
Six Degrees Of Asteroid Data Separation - Forbes
The Crimes Americans Worry About The Most [Infographic] - Forbes
Could the city of Mobile have prevented a cyber attack? | FOX10 News |
Canada Mulls Mandatory Data Breach Notifications - Infosecurity Magazine
Deathmatch review: Windows 8.1 vs. OS X Yosemite | InfoWorld
New CompTIA Security+ course by IT Governance helps progress career in a competitive job market - EIN News
Report: Hackers can lock Samsung phones | TheHill
Chrome and Firefox Flagging Links as Malware
Download Details |
CrypTool: experiment with cryptographic algorithms - gHacks Tech News
Techday – Making the complex simple #WGImagine14
Our Top Crime Worry? Credit-card Hacking
Drake releases new songs in response to “hackers” · Newswire · The A.V. Club
New Data Security Pressures Driving Next Generation Firewalls -- Campus Technology
Why Should the Law-abiding Care About Electronic Surveillance?
Taylor Swift taps 1989 for inspiration; Neil Diamond strolls bountiful ‘Melody Road’ | The Miami Herald
Feedzai and Encap Security Announce Strategic Partnership | Virtual-Strategy Magazine
Why weasel words might not work for Whisper • The Register
27c3 - Data Retention In The Eu Five Years After The Directive
IBM Brings New Big Data, Analytics Tools to Cloud Marketplace
Set to stand trial: 25-year-old Phoebe Sayavong accused of hacking into her boyfriend’s email account |
Judge like celebrity-hacking victim: lawyer - Winnipeg |
Credit-card hacking is Americans` top crime worry: Poll | Zee News
IBM's new data tools are low-maintenance, Watson-powered | InfoWorld
Fed up, US cities take steps to build better broadband | Ars Technica
A History of Joint Innovation on Display | Symantec Connect
Feds identify suspected 'second leaker' for Snowden reporters - Yahoo News
What's Behind the 2014 Midterm Election Cycle's Trendiest Attack Line - ABC News
Jennifer Lawrence’s Ex Is A Hacker And He Warns That Explicit Videos May Be Leaked Next
Lori Douglas, celeb Jennifer Lawrence both nude photo victims: lawyer - Manitoba - CBC News
CHA: Data breach investigation 'closed' |
Sharyl Attkisson’s computer intrusions: ‘Worse than anything Nixon ever did’ - The Washington Post
Alabama doesn't require businesses to notify customers of data breach - Huntsville News | and ABC 31: Appnews
“Replay” lets fraudsters disguise fake credit card charges as legitimate chip-card transactions
Massachusetts Man Sentenced to Four Years in Prison for Computer Hacking Involving Stolen Credit Card Numbers and Altered Academic Records
2nd robot enables BPD bomb squad to respond to more than 1 incident at a time
Verizon Wireless injects identifiers that link its users to Web requests | Ars Technica
The Most Stunning News Story of 2014 | Power Line
Jennifer Lawrence's former boyfriend alleges he's a hacker - People - News - The Independent
Why Ebola quarantine is legal (Opinion) -
Judge like celebrity-hacking victim: lawyer | Metro
IBM Brings Broad Portfolio of Big Data and Analytics Capabilities to the IBM Cloud Marketplace | Virtual-Strategy Magazine
ASU-Beebe Warns of Potential Data Breach - Arkansas Matters
IBM Brings Broad Portfolio of Big Data and Analytics Capabilities to the... -- LAS VEGAS, Oct. 27, 2014 /PRNewswire/ --
Ebola Nurse Kaci Hickox Will 'Understand' Her Quarantine, New Jersey Governor Says - ABC News
IBM Introduces New Enterprise Intelligence Analytics to Fight Cybercrime at High Speeds and Massive Scale - MarketWatch
Manitoba ‘naked’ judge to tell inquiry she played no culpable role in photo scandal that could get her fired | National Post
Intel Security sur Twitter : "Come one, come all, to the #FOCUS14 expo hall! Now open at #McAfeeFocus."
Symantec Pledges to Engage 1M Students in STEM by 2020
Social Media Over-Sharers Are Annoying, But You're Also Over-Following
Incoming PCI council head ready to take on the hackers | CSO Online
Customer Perspectives on Implementing Security Controls with AWS
T-Mobile quietly hardens part of its U.S. cellular network against snooping - The Washington Post
IBM should “stay the course” despite losses, analysts suggest | #ibminsight | SiliconANGLE
Why data breaches keep happening | IT Business
IBM promises security with criminal investigation of enterprise data - Computer Business Review
IBM to host analytics in its cloud marketplace - Computer Business Review
IBM Introduces New Generation of Cloud-Based Data Services to Help Organizations Know More, Faster - MarketWatch
How I Became a CISO: Janet Levesque, RSA
Taylor Swift urges famous pals to tighten online security - powered by NewsChannel 9 WSYR Syracuse
Medical Journal To Governors: You're Wrong About Ebola Quarantine : Goats and Soda : NPR
Cevallos: Why Ebola quarantine is legal | News - Home
ACLU Calls Schools' Policy to Search Devices and 'Approve' Kids' Web Posts Unconstitutional | WIRED
IBM Brings Broad Portfolio of Big Data and Analytics Capabilities to the IBM Cloud Marketplace
Democratic Attack Ads Aim to Save Senate Majority - ABC News
‘Bash’ computer bug could hit millions - Livemint
Report: Point-of-Sale Malware Infections Expected to Surge During Holiday Season - The State of Security
Re/code’s Code/Mobile Conference By The Numbers | Re/code
Invasive Measurements Confirm Quick Recovery of Microcirculation After Primary PCI - Journal News - TCTMD - Agile Project Management inside GitHub
Cybersecurity Contest Challenges Teams to Think Like a Hacker | UConn Today
Hackers DDoS Ukraine elections — First look: Attacks on businesses continue to rise — Feinstein: Intel is the ‘only defense’ against lone wolf terrorists - POLITICO Morning Cybersecurity -
SUSE Linux Enterprise 12 Is Released | Sci-Tech Today
Can the Elephant Dance to a Security Tune?
Adobe updates its e-reader – DRM data no longer transmitted insecurely | Naked Security | Local Breaking News, Weather, Sports | WEWS-TV NewsChannel5 | Cleveland, Akron, Canton, Ohio
Current Status | LiveOffice Support Center
Planning to fly? Pour out your shampoo, toss your scissors, RENAME TERRORIST WI-FI! • The Register
27c3 - Having Fun With Rtp
Taylor Swift urges famous pals to tighten online security - WTVQ
Hacking of Plantation temple website part of growing trend - Sun Sentinel
CNN poll: Voters are angry -
Editorial, Oct. 28, 2014: Bad news for bobcats, good news for lions - Santa Cruz Sentinel
20th anniversary of the banner advert: Digital advertising begins its third decade
Fighting Cybercrime Across Borders - Why Law Enforcement Collaboration Matters | Security Intelligence Blog | Trend Micro
6 Actions Businesses Should Take During Cyber Security Awareness Month
McAfee Inc. sur Twitter : "20% of searches for @JimmyKimmel lead to a malicious site. Here are our other Most Dangerous Celebrities #RiskyCeleb"
WorldPay hacker sentenced to 11 years for role in $9.4M scheme - SC Magazine
Photo Editor | Polarr - Online Photo Editing Re-imagined.
AVG: Moving beyond antivirus | Channel Pro
Press Releases - News - Stockhouse
Absolute Software ups dividend 17% to 7 cents per share - Proactiveinvestors (NA)
Obama Focuses on Governor Races Where He's Welcome - ABC News
Netscaler still leader in the Gartner Magic Quadrant for Application Delivery Controllers - App Delivery, MDM, VDI, Cloud and Virtualization News, Blogs and Community
IBM unveils new enterprise analytics portfolio to combat cybercrime | ZDNet
Fidelity National Financial employees targeted in phishing attack - SC Magazine
Poll: Worries of hacking outweigh burglary, assault | TheHill
Researcher Discovers Tor Is Vulnerable To Malware Binaries Inserted By Exit Nodes
Gartner Positions Verizon in the Leaders Quadrant of the Magic Quadrant of Machine-to-Machine Services
NY Senator Calls for Renewed Crackdown on Dark Web Drug Sales | WIRED
FCC fines telecom companies $10 million - SC Magazine
Tor exit node found to add malware to downloaded binaries - SC Magazine
Juniper Secure Access: Testing Web Rewrite via Proxy SA | Tank on Networking
A Hacking Contest to Promote Digital Literacy | Internet Safety for Kids & Families
The Crime Americans Fear Most Costs $445 Billion a Year | The Fiscal Times
EnterpriseDB Positioned in the Leaders Quadrant in Gartner’s Magic Quadrant for Operational Database Management Systems | Virtual-Strategy Magazine
Struggling governors could hurt GOP's Senate hopes | The Miami Herald
Plaintiff’s Law Firm Steps Up Actions Against Bitcoin-Related Companies: Crypto Currency Exchange and Founder Sued for “Theft� of Bitcoin | Manatt, Phelps & Phillips, LLP - JDSupra
Suse Linux Enterprise 12 goes light on Docker, heavy on reliability | InfoWorld
Almost 70% of Americans Fear Cybercrime More Than Being Killed: Poll | World | RIA Novosti
UNCW Students Tackle Cyber Security | WilmingtonBiz
Google employee arrested over sextortion ruse - SC Magazine
Ebola Spreads - In Cyber Attacks Too
Studying Online – Year 12 and Beyond | McAfee
Struggling governors could hurt GOP's Senate hopes | The Kansas City Star
Apple Mac OS X stores data in iCloud Backup
Maritime environmental laws needed to combat marine pollution
Mobile Security's Budget Shortfall - eSecurity Planet
Businesses responding to data breaches
Beware Microsoft Office! Software contains dangerous bug that could let hackers take over your computer | Daily Mail Online
Cyber Risk Report: October 20-26, 2014
Restrain From Making Provocative Comments: Panel to Telangana CM
Internet-Connected Guns Are The Next Step For Data-Hungry Police - Forbes
Heartbleed, Shellshock and POODLE: The sky is not falling - SC Magazine
APWG launches global cybercrime reporting program
McAfee Inc. sur Twitter : "EVP, CMO @PennyRBaldwin discusses the future of @IntelSecurity, McAfee & what this means for YOU. #mfeps14 #FOCUS14"
Juniper Networks sur Twitter : "Piecing together a giant #Juniper delivery. Thanks for the picture, @wendohw!"
Rewriting Reddit (Aaron Swartz's Raw Thought)
Election countdown: GOP & McConnell chase history
Mystery debit card fraud shows even chip-and-PIN cards vulnerable to theft - JSOnline
Desktop-as-a-Service: Your BYOD assist | Computerworld
FOCUS 14 - Breakout Sessions
McAfee Inc. sur Twitter : "This morning at #FOCUS14: Lisa Matherly addressing the crowd at #mfeps14 to announce our new partner program."
Android.Lockdroid.F | Symantec
Code Red: A global initiative for fighting government surveillance
27c3 - "The Concert" - A Disconcerting Moment For Free Culture
Mobile city email system attacked by hackers |
Senate battle: Six races to watch (Opinion) -
Rep. Dan Maffei challenges John Katko's positions on preserving Social Security
How Vulnerable is the FDA to Computer Hackers? - Pharmalot - WSJ
Suse enterprise Linux can take your system back in time -
Officials warn 500 million financial records hacked
Edward Snowden: A ‘Nation’ Interview | The Nation
Avecto Strikes the Balance between Security and Freedom with the Launch of Defendpoint | Virtual-Strategy Magazine
McAfee Renames, Simplifies Channel Program
Vulnerability in widely used 'strings' utility could spell trouble for malware analysts | CSO Online
Latest Ebola-themed phish leverages unpatched Windows bug - SC Magazine
Tor Exit Node Mashes Malware Into Downloads ≈ Packet Storm
Drone Safeguards Urged By UK Pilots ≈ Packet Storm
Julian Assange: Google Is Breaking Bad ≈ Packet Storm
Automation with Chef/Puppet and Ansible - J-Net Community
Distinguishing Acts of War in Cyberspace
Unstructured Data, Ownership | Data Insight
Report: POS malware sees sharp increase in Q3 - SC Magazine
Old versus New: Vulnerabilities in Targeted Attacks | Security Intelligence Blog | Trend Micro
Research Blog: HDR+: Low Light and High Dynamic Range photography in the Google Camera App
Hacking the mac: a custom McDonald’s menu for London – Now. Here. This. – Time Out London
Learn how to protect your clients from hackers with the White Hat Hacker Bundle [Deals] | Cult of Mac
In the Trenches of the Cyber War
SwiftStack Secures $16M in Funding to Accelerate Adoption of Software-Defined Storage Platform
Shellshock attacks mail servers | ZDNet
RBS WorldPay hack ringleader finally sentenced
Court Sets Trial Date For Global Digital Solutions' (GDSI) Lawsuit Against Merriellyn Kett Murphy, former CEO and Sole Shareholder of Airtronic USA - Press Release - Digital Journal
Compare Credit Cards & Low Interest Credit Cards At
AVGFree sur Twitter : "Want to win 1 year of AVG IS 4 FREE? Tell us about a time you experienced a creepy computer glitch!#ghostinthemachine"
Where Should You Focus Investment in Your Projects?
Poll for National Cyber Security Awareness Month: Of the below four challenges with cybercrime, which do you think is the most significant? - remote monitoring and debugging for
For big raises in IT, look to mobile, security, big data | Computerworld
Bogus Credit Card Charges Look Like They Were Made With Chip-Enabled Cards – Consumerist
Avecto Strikes the Balance between Security and Freedom with the Launch of Defendpoint | Business Wire
Download Free Antivirus for Your Business
HP launches free executive tools to reduce the impact of security incidents
How 64-bit computing will improve the mobile experience - TechSpot
Microsoft Preps Partners for Windows 10 | Windows 10 content from Paul Thurrott's SuperSite for Windows
Security companies form pact for mobile authentication | Retail Customer Experience
Gem-Tech Awards Sound Bite: Monique Jeanne Morrow - YouTube
Login - Fire Engineering
Absolute Software Increases Quarterly Dividend - MarketWatch
Contractors, Hackers and Regulators all Pose Data Breach Risks for Healthcare Providers London Stock Exchange:BEZ
IBM’s first cloud data centre in India to focus on private services for SMEs - The Economic Times
Retailers are disabling NFC readers to shut out Apple Pay | The Verge
Bugtraq: vulnerabilities in libbfd (CVE-2014-beats-me)
Bugtraq: [SECURITY] [DSA 3057-1] libxml2 security update
Targeted attacks against businesses are on the rise
South Korean Internet Regulator Confirms Data Breach at Popular Video Sharing Site | Bloomberg BNA