Spy agency uses game to find tomorrow's cyber security stars - TechRepublic
The guide to password security (and why you should care) - CNE
CISOs Can Combat APTs with a Bit of Preparation - CSO | The Resource for Data Security Executives
New hack could steal personal information from Gmail, other popular apps - CBS News
It's a New Day for Data for American Consumers - MarketWatch
Traffic lights are dangerously easy to hack | Money - Home
Facebook slings $50k Internet Defense Prize™ at bug hunter duo • The Register
UPS confirms data breach at some locations | TheHill
WGN-TV | Chicago's Very Own source for breaking news, weather, sports and entertainment.
Healthcare Cyberthreat Advisory & VERT Alert - The State of Security
Cybercrime Exposed: When Adware Go Bad - YouTube
DocumentDB Documentation | Azure
Black Hat Asia 2014 - Solutum Cumulus Mediocris By Eldar Marcussen
Course Introduction
Chinese Hackers Vacuum Data From U.S. Health Industry - Bloomberg
It's all about trust: What data breaches mean for hospitals, health systems - Nashville Business Journal
Study: Most higher ed malware infections attributed to 'Flashback' - SC Magazine
Pair in court in phone hacking case « Express & Star
Computer bug 'Heartbleed' likely source of Community Health Systems data breach - FierceHealthI
Panda Antivirus Pro 2015 Review & Rating |
Mercedes-Benz C-Class Review: 2015 C 200 and C 250 Road Test Page 1 of 2 | The Motor Report
2011: Symantec leases big office building that could contain up to 1,000 workers - San Jose Mercury News
Archive Systems Recognized in Gartner Hype Cycle for Human Capital Management - Press Release - Digital Journal
Hackers Directly Targeting Health Care Organizations, FBI Warns - iHealthBeat
Enterprise pros say cloud, Big Data prompting radical IT shifts | SiliconANGLE
Gmail app hack works 92 percent of the time (Wired UK)
Apple’s iMessage becomes a major source of mobile spam - Dwight Silverman's TechBlog
FBI says healthcare industry targeted by hackers -
HITRUST Cyber Threat Briefing focuses on CHSI data breach |
City of London Police brings in Kaspersky to train officers to tackle cybercrime | CSO Online
Simply Security News, Views and Opinions from Trend Micro, IncTrend Micro and SanDisk: Storing and Securing Your Digital Life » Simply Security News, Views and Opinions from Trend Micro, Inc
From Private to Multi to Hybrid Cloud in the Enter... - J-Net Community
Gamasutra: Kevin Maxon's Blog - Finances of a Bare Bones Developer
Is Open Source an Open Invitation to Hack Webmail Encryption? | Hacking | TechNewsWorld
The IoT is already here – Will you be secure? | IT News Africa- Africa's Technology News Leader
Sprint and T-Mobile Offer Up New Competitive Plans
How to apply for reimbursement in Schnucks data breach settlement - St. Louis Business Journal
New-Generation Earthquake Forecasting Swings into Operation in Italy | Science | KQED Public Media for Northern CA
UPS Data Breach Affecting Omaha Customers
Macy's in New York City to pay $650,000 in shopper-profiling probe
Idevnews | Cloud Security, Identity Solutions Heat Up The Summer
Global Platinum Sponsor Trend Micro to Share Security Insight at VMworld 2014 -
With Black Hat and DefCon comes spike in Vegas-based attacks - SC Magazine
Bitcoin Block Explorer -
Cybersecurity In Its Several Aspects | The Metropolitan Corporate Counsel
UPS Store data breach hits Durham - Triangle Business Journal
Virulent Chinese hacking group mows through U.S. health industries - SCNow: Local
Does Microsoft Need a Big Windows Unveiling at the End of September? - Digits - WSJ
After Jewel, UPS, how do consumers stay safe from data hacks? -
Smartphone Safety: Antivirus Apps Protect Users from Digital Threats
Simply Security News, Views and Opinions from Trend Micro, IncOperational Efficiency: the Key to Data Center Success » Simply Security News, Views and Opinions from Trend Micro, Inc
Symantec on Twitter: In the future, what role do you think proactive defense will play in #security ? #DirtyTopics
FAQ: Protecting your OpenSSL Server from HeartBlee... - J-Net Community
Preparing for a Successful IAM Integration Project (Part 2 of 2)
Security Compliance is Necessary for Real-Time Mobile Data Access
Accenture high performance IT research
Symantec on Twitter: What is the biggest obstacle for you and your organization when it comes to investing in #cybersecurity? #DirtyTopics
Experts discover history of malware infections on network of Community Health Systems - SC Magazine
AOL announces that it does not follow 'Do Not Track' requests - SC Magazine
Oracle Java SE CVE-2014-4221 Remote Security Vulnerability (RSS)
Configuration management with Juniper Junos |
[Price War] Sprint Fires Back With New $60 Unlimited Data Plan
2 Connecticut UPS Stores Hit By Nationwide Data Breach | FOX C
30 million patients hit by health data breaches | BenefitsPro
DailyTech - Opera Becomes Official Browser of Microsoft-Nokia's Non-Windows Phones
Data breach at UPS Stores in 24 states – Including Pennsylvania | WPMT FOX43
Sprint's new individual plan gets you unlimited everything for $60
List of 51 stores hit in new data breach just released | Local News - KCCI Home
Lake Forest, Riverwoods stores among 51 UPS retailers affected by data breach |
UPS Stores Hacked : Business : Chinatopix
UPS Warns of Data Breach at 51 Stores | Re/code
Simply Security News, Views and Opinions from Trend Micro, IncExtend Your Virtualized Data Center to the Cloud with Ease » Simply Security News, Views and Opinions from Trend Micro, Inc
Multi-Datacenter Cassandra on 32 Raspberry Pi’s : DataStax
Apple Opens iCloud Data Center in China - Cloud Computing on CIO Today
Black Hat Asia 2014 - Abusing The Internet Of Things: Blackouts, Freakouts, And Stakeouts By Nitesh Dhanjani
Chester, Lancaster hospital patients could be at risk after data breach |
Study: It may be easier than you think to hack traffic signals |
Syrian Cyber-Attacks Expose Activists, Firms to Malware Infection
My graphics card covers my PCI-E x1 slot [Solved] - Graphics Cards - Components
Facebook reports enormous uptick in use of snoop-proof email - CNE
Bitdefender GravityZone Authentication Bypass and Unauthorized Access Vulnerabilities (RSS)
Apache HttpComponents Incomplete Fix SSL Certificate Validation Security Bypass Vulnerability (RSS)
Juniper Networks on Twitter: How do you prepare for your exams? Here's @sid_1011's testing lab!
History, Travel, Arts, Science, People, Places | Smithsonian
Survey: Impact of Target Data Breach on Cybersecurity Budget, Executive Awareness Diminishing | Business Wire
Cisco 2014 Midyear Security Report: Brush Your Teeth, Change Your Passwords, Update Your Software
Driving Information Security, From Silicon Valley to Detroit
Cybersecurity Among Top Energy Industry Concerns - US News
Symantec on Twitter: Just one hour left until our first #DirtyTopics chat launches! Join us!
BBC News - Ebola patients Kent Brantly and Nancy Writebol discharged
Should companies practice data retention or data destruction? | CSO Online
Retired US airport body scanners fail to spot guns, knives | CSO Online
The UPS Store says malware found on systems of 51 stores | CSO Online
Apple patches 12 Mac bugs in Flash, SSL | CSO Online
90% of hospitals and clinics lose their patients' data - Aug. 20, 2014
Spotlight on the Road Warrior
RAD to exhibit new NFV platform at CIGRE 2014 - Telecompaper
Virulent Chinese hacking group mows through U.S. health industry - Chicago Tribune
Cyber spies whip out 'Machete', stride towards Latin America • The Register
Dictionary Attack on Hidden SSID Networks
Save $300 on ICS Cyber Security Conference Registration
Tech Jargon Buster - August 2014 - PC Advisor
Hackers Steal Data From 4.5M Hospital-Chain Patients
Run Windows software on Google's Chromebooks with Citrix Receiver for Chrome
Data breach at UPS Stores in 24 states - Aug. 21, 2014
Chinese hackers targeted the MH 370 investigation and appear to have stolen classified documents – Quartz
It's a New Day for Data for American Consumers -- OVERLAND PARK, Kan., Aug. 19, 2014 /PRNewswire/ --
Turning the Tables on Cyber Attacks | TrendLabs 2Q 2014 Security Roundup
Hackers breach social network MeetMe - SC Magazine
Product Hunt for iOS
Google et al slammed by justice chief over ‘right to be forgotten’ | Naked Security
‘Facebook Drug Task Force’ hoax cranks up the paranoia | Naked Security
SSCC161 – What do you mean, “Trade him for Edward Snowden”? [PODCAST] | Naked Security
Mother tracks down Facebook predator who lured son away from home | Naked Security
Police push for phone screen locking by default | Naked Security
News from Macon and Warner Robins, GA, and beyond | The Telegraph
Sprint Family Share Pack How It Works
Windows 8.1 August Update causes crashes, gets pulled - The Tech Report
How Chinese Hackers Stole Patient Data - Kaiser Health News
Finextra: Security startup vArmour raises $36m
Local news from Rock Hill, SC | The Herald
Avast vs AVG: Protect Your PCs with Free Antivirus Software
Researchers Find It's Terrifyingly Easy To Hack Traffic Lights ≈ Packet Storm
Clouds Fail: Deal with It -- Virtualization Review
Green Lights Forever: Analyzing The Security Of Traffic Infrastructure ≈ Packet Storm
This Is Your Brain on Silence - Issue 16: Nothingness - Nautilus
Black Hat Asia 2014 - Beyond ‘Check The Box’: Powering Intrusion Investigations By Jim Aldridge
Hackers Target Colleges to Steal Personal Data, University Research - NBC News
Here's how easy it is to hack a traffic light with a laptop - Vox
UPS: Hackers Hit Computer Systems At 51 Retail Stores, Possibly Exposing Customer Info – Consumerist
Facebook Order to Respond to Class Action Suit | VPN Creative
Alert Details - Security Center - Cisco Systems (RSS)
Incapsula mitigates multi-vector DDoS attack lasting longer than a month - SC Magazine
Protecting Your Business from a DDoS Attack -- MOUNTAIN VIEW, California, Aug. 21, 2014 /PR Newswire UK/ --
Data breach at UPS stores in North Carolina |
Supervalu reveals potential data breach - CBS News
Traffic lights are dangerously easy to hack - Aug. 21, 2014
Hack Attack: How the Truth Caught Up With Rupert Murdoch by Nick Davies – review | Books | The Guardian
Critical Delphi and C++Builder VCL library bug found
Microsoft: We plan to CLEAN UP this here Windows Store town • The Register
Home -
Simply Security News, Views and Opinions from Trend Micro, IncSeverity of Attacks against Organizations Escalated » Simply Security News, Views and Opinions from Trend Micro, Inc
SciFi Dune: Dune Genesis by Frank Herbert
Check Point a Leader in Unified Threat Management for Completeness of Vision and Ability to Execute
Hackers target colleges to steal personal data, university research
Annapolis Portable Search
Cost of Target Data Breach: $148 Million Plus Loss of Trust - Computing on Top Tech News
Fortinet: Leader in Gartner's 2014 Magic Quadrant for UTM - ITWeb Africa
Wonkbook: The Fed just might raise rates sooner than expected - The Washington Post
Apple’s iMessage becomes a major source of mobile spam - TechBlog
Spammers love iMessage: Apple's service blamed for one-third of mobile spam - Tech2
Apache Axis Certificate Validation Flaw Lets Remote Users Spoof Server Certificates - SecurityTracker (RSS)
Whiteboard Fox - Simple Online Whiteboard
Ground Zero Summit 2014
Most popular Android apps open users to MITM attacks
Target cuts outlook as data breach costs hit earnings again - Orlando Business Journal
Latest local breaking news by The State Newspaper in Columbia, SC | The State
As sales deadline approaches, OEMs continue to push Windows 7 PCs to consumers - Computerworld
The UPS Store says malware found on systems of 51 stores | Security - InfoWorld
Protecting Your Business from a DDoS Attack | Virtual-Strategy Magazine
Review: One Of The Best Software In The Market - TrustPort Antivirus
Sheheen hits Haley on hacking in new TV ad - Post and Courier
Morning Report: Dirty Rotten iMessage Spam, Walmart's 97-Cent iPhone 5c | Mac|Life
Microsoft .NET Framework CVE-2014-4062 ASLR Security Bypass Vulnerability (RSS)
These six lawsuits shaped the internet | The Verge
BBC News - UPS branches hit by data breach
Security from the Cloud: More Risky? | MSPmentor Blog
WPMT FOX43 - News in Harrisburg, York, Lancaster, Lebanon News, Weather, Sports
Ozone-Depleting Compound Persists, NASA Research Shows | NASA
Black Hat Asia 2014 - The Inner Workings Of Mobile Cross-Platform Technologies By Simon Roses Femerling
Google XSS Challenge 2
Pair in court in phone hacking case - Harborough Mail
Traffic Lights Hacked Through An Old Laptop | VPN Creative
Coalfire to Showcase New Reference Architecture Guides at VMworld 2014 - BWWGeeksWorld
Phone hacking: Neil Wallis and Jules Stenson appear in court | UK news |
Michigan team finds security flaws in traffic lights
Traffic Lights Hacked in Michigan - autoevolution
Hacking Gmail with 92 percent success
Traffic Lights Are Vulnerable to Simple Hack, Researchers Find - NBC News
BusinessMirror - Services sector: A few highlights
iMessage “being taken over by spammers,” accounts for almost a third of mobile spam | 9to5Mac
Traffic lights hacked in major cities using just a laptop | Mail Online
Most Facebook email notifications are now encrypted
Chinese hackers spied on investigators of Flight MH370 - report • The Register
How Hackers Could Mess With 911 Systems and Put You at Risk | Threat Level | WIRED
Schneier on Security: Disguising Exfiltrated Data (RSS)
More email nasties to come, Nats warned |
US, German researchers create framework for core Android security modules | ZDNet
Protecting Your Business from a DDoS Attack - BWWGeeksWorld
The IT director as realist: how to accelerate practical change in board meetings | Information Age
Millions of Android smartphones ‘at risk’ of hacking in Middle East |
Syrian malware is lurking, is dangerous | Deccan Chronicle
Pair in court in phone hacking case -
CORRECTING and REPLACING Parallels Announces Parallels Desktop 10 for Mac with OS X Yosemite Integration, Enables to Launch Office Applications Up to 50 Percent Faster an - BWWGeeksWorld
Universities fail to get to grips with cyber security
Tip sheet PCI-compliant payment processing: Tokenless two-factor authentication overcomes the compliance issues
Bitcoin phishing campaign targets media, tech, education industries | ZDNet
UPS Stores report data breach |
GCHQ launches cyber war games to find future spooks - IT News from
Pair face phone hacking allegations | Mail Online
SDS still young, but very much on the rise | Security - InfoWorld
Bugtraq: [SECURITY] [DSA 3008-1] php5 security update
Bugtraq: [SECURITY] [DSA 2940-1] libstruts1.2-java security update
Information Security News: 5 cool new security research breakthroughs
Information Security News: Chinese hackers reportedly took classified data on MH370 a day after it went missing
Operation Flag Day: GCHQ Launches Online Spy Game To Find Cyber Security Talent
SecurityFocus (RSS)
Symantec Moving All Norton Security into One Cloud Service
Sophos in Leader's Quadrant in 2014 Unified Threat Management Magic Quadrant for 3rd Consecutive Year
Microsoft reports fall in fake antivirus programs |
Data breach at 51 UPS Stores; 3 Colorado locations affected - Denver Business Journal
Two Area UPS Stores Affected by Data Breach | NBC Chicago
Vietnamese hackers invited to join maiden hacking contest
Coalfire to Showcase New Reference Architecture Guides at VMworld 2014 | Business Wire
51 UPS stores hit with PoS malware
Hear ye, young cyber warriors of the realm: GCHQ wants you • The Register
GCHQ Launches 'Cyber Security Challenge' To Find Hacking Superheroes
BRMC patients affected by data breach
Two Ex-News Corp. Editors Appear in London Court Over Hacking - Businessweek
Hackers Compromise 51 UPS Stores Across the United States
Bill penalizing techy intruders advances to plenary | Inquirer Technology
New Research Claims iMessage Accounts for 30% of Mobile Spam Messages - Mac Rumors
How the role of the CSO is changing
USPA conducts a seminar on information security
The Strange Tale of the North Pond Hermit
Black Hat Usa 2014 - Oracle Data Redaction Is Broken By David Litchfield
Challenge 8: Broken Authentication
Avast Antivirus: The Best Things Coming From The Best Software
Avast Antivirus: Protection Guaranteed From A Free Software
Pair face phone hacking allegations - Harborough Mail
Smartlink brings next generation wireless technology with its new router - Dataquest
Some Principles of Cyber Strategy / ISN
Boffins propose security shim for Android • The Register
What can we learn from the top 10 biggest data breaches?
Workshop on cyber security for women in Kochi - The Hindu
Review: Protection Guaranteed From Kaspersky Antivirus Software
UPS Says Hack May Have Exposed Customer Data at 51 Stores - NBC News
Antivirus Remover - PC Advisor
OpenSSL DTLS CVE-2014-3507 Remote Denial of Service Vulnerability (RSS)
Norman Antivirus: The Best Features From An Outstanding Program
How Hackers Stole Data From 4.5 Million Patients | MDDI Medical Device and Diagnostic Industry News Products and Suppliers
BYOD policies in local government explored | IT PRO
New twist as rogue antivirus enters death throes • The Register
NIST vetting guide helps in testing mobile apps
Did you swipe your card through one of these UPS Store tills? You may have been pwned • The Register
Butterick’s Practical Typography
New twist as rogue anti-virus enters death throes • The Register
Retailer takes profiling deal - Times Union
Apple’s OS X Yosemite Public Beta available for download Nigeria: Protecting Financial Data From Cyber Attacks
NC locations included in UPS data breach |
Westcon Group and Palo Alto Networks extend global partnership - ARN
UPS says 51 retail stores breached by malware | Dallas - Fort Worth
Amazon flicks switch on CloudFront security features • The Register
Why Are Chinese Patients Violently Attacking Their Doctors?
UPDATE: UPS's UPS Store Notifies Customers of Potential Data Breach, Discovered 51 Locations Malware In 24 States | Benzinga
Heartbleed bug reportedly behind major Community Health Systems data breach | IT PRO
CHSI data breach result of Heartbleed bug, says TrustedSec |
Black Hat Usa 2014 - Breaking The Security Of Physical Devices By Silvio Cesare
Heartbleed behind massive healthcare data breach - Security - News -
Fitch Affirms St. Jude Medical's at 'A'; Outlook Stable| Reuters
Hackers Reportedly Exploited Heartbleed Bug to Steal 4.5 Million Patient Records
US hospital breach biggest yet to exploit Heartbleed bug
Parallels Desktop 10: run Windows on your Yosemite Mac
Hospital Network Hacked, 4.5 Million Patient Records Stolen - Leah Barkoukis
Macy's To Pay $650,000 In Settlement Over Alleged Racial Profiling : The Two-Way : NPR
Attackers Are Using High-Profile Vulnerabilities to Evade Detection - The State of Security
5 cool new security research breakthroughs | ITworld
Slapdash SSL code puts tons of top Android Play Store apps in hack peril • The Register
Bioterror lab errors cloaked in secrecy
Why Hackers Want Your Twitter Account More Than Your Credit Card
Hackers tapped Heartbeat Internet flaw in massive healthcare data breach : PERSONAL TECH : Tech Times
ASPR seeks development of disaster recovery best practices |
Top Health Data Breaches Caused by Hackers
The Real Deal: Car Hacking - WRGB CBS6 - Top Stories
FBI warns healthcare firms they are targeted by hackers| Reuters
Ftrace: The hidden light switch []
Black Hat Usa 2014 - Badusb - On Accessories That Turn Evil By Karsten Nohl + Jakob Lell
Researchers propose new Android security framework that could aid BYOD schemes — Tech News and Analysis
2014 Women in IT Security: Kristin Lovejoy - SC Magazine
Macy's to Pay $650,000 to Settle Profiling Case |
South Baldwin Regional Medical Center reports hacking - News
Microsoft Security on Twitter: Want a chance to win an #Xbox One? Submit Pass-the-Hash related questions to #AskPtH #sweeps and be entered to win
Cost of Target Data Breach: $148 Million Plus Loss of Trust | Sci-Tech Today
BBC News - Entering the 'house of hacking horrors'
Gainspeed Voted Most Innovative at CableLabs Summe... - J-Net Community
Cisco WebEx MeetMeNow Server Input Validation Flaw Lets Remote Authenticated Users View Files - SecurityTracker (RSS)
Researchers build security framework for Android | CSO Online
Cisco ASR Router Packet Data Network Gateway Session Manager Lets Remote Users Deny Service - SecurityTracker (RSS)
Panda Security 2014 Privilege Escalation ≈ Packet Storm
WordPress Mobile Pack 2.0.1 Information Disclosure ≈ Packet Storm
Delphi And C++ Builder VCL Library Buffer Overflow ≈ Packet Storm
Ubuntu Security Notice USN-2320-1 ≈ Packet Storm
Red Hat Security Advisory 2014-1084-01 ≈ Packet Storm
Laurence Tratt: An editor for composed programs
Cisco NX-OS Nexus 5000/6000 SNMP Bug Lets Remote Users Obtain Potentially Sensitive Information - SecurityTracker (RSS)
Visa, MasterCard Severed From Target Data Breach MDL - Law360
Dropbox's Mailbox Lands on Mac Desktop | Cloud Computing | E-Commerce Times
RiseCON 2014 Call For Papers ≈ Packet Storm
51 UPS Branches Pwned By Malware ≈ Packet Storm
ESET Windows Products 7.0 Privilege Escalation ≈ Packet Storm
Collective self-defence: What Japan’s new defence policy means for international cooperation on cyber security | East Asia Forum
Hacking as a Service: How Much Does it Cost to Hack an Account? | Symantec Connect
Israeli officers learn to fight cyber-war | Israel | Jewish Journal
Avast VS AVG Antivirus: Protection Guaranteed From A Free Software
Avast Free Antivirus software update 19 August improves performance
4.5 Million Patient Records Leaked in Healthcare Data Breach - Press Release - Digital Journal
Computer virus caused data breach at UPS stores in 24 states
VRT: Discovering Dynamically Loaded API in Visual Basic Binaries
Twitter / Jofo : Oh my god. Intern was fucking ...
IoT Adoption And Its Impact On Manufacturing
The Internet of Things 2014 [Slideshare] | Vala Afshar
Hacking traffic lights is easy if you have the right gear and some basic know-how - TechSpot
You can hack that? Here are 5 new cyber risks associated with the Internet of Things | PropertyCasualty360
Study Reveals 70 Percent of IoT Devices Vulnerable to Attack | News | Vertical Systems Reseller (VSR)
KL, Interpol probe hacking of MH370 data | TODAYonline
UPS Store hacked, possibly compromising user data - CNE
Hackers Were Busy at Black Hat
New hacking scenario emerges: Wi-Fi signal-sniffing drones -- Defense Systems
Juniper Ethernet Switches Target BYOD, Cloud Environments
Mozilla Firefox vs Google Chrome: Which Should Assert Its Dominance
Panda Free Antivirus 2015 Review & Rating |
US Community Health says 4.5mil peoples' data stolen in cyber attack from China - Business News | The Star Online
Pro-Palestinian Hackers Deface Delaware State Treasury Site -
Antivirus Works Too Well, Gripe Cybercops - WSJ
Boot up: Google's AdSense clawback, HTC's Windows M8, data carpentry | Technology |
UPS Confirms Data Breach at 51 Retail Stores Nationwide - The State of Security
Driving Information Security, From Silicon Valley to Detroit - Wall Street & Technology
Black Hat Usa 2014 - The State Of Incident Response By Bruce Schneier
Bike theft numbers drop in Somerville - News - Somerville Journal - Somerville, MA
Global Digital Solutions, Inc. (GDSI) Announces New Details - And Photo - Regarding Its Planned Shipment of High-End, Mobile Command and Control Vehicle to Sadara, a $20 Billion Petrochemical Joint Venture Between Dow Chemical and Saudi Aramco, the Global Petroleum and Chemicals Enterprise Owned by the Kingdom of Saudi Arabia - MarketWatch
How to Upgrade Your Customers to Next Gen Security Services | MSPmentor Blog
Oi! Rip Van Winkle: PATCH, already • The Register
Payment Card Industry (PCI) Data Security Standard 3.0: New Guidance to Consider When Engaging Service Providers | The National Law Review
UPS Store warns of data breach at 51 locations nationwide - Chicago Tribune
Will California Ruling Put Brakes on BYOD Trend?
Target’s biggest challenge isn’t bouncing back from the data breach - The Washington Post
Target lowers outlook, reeling from data breach - MarketWatch
Hackers steal patients’ information from Trinity | Maine News Online
Need a green traffic light all the way home? Easy with insecure street signals, say researchers • The Register
Scientists Hack Cryptography Keys By Simply Touching a Laptop
Data Breach Hits Four UPS Stores In Arizona | KJZZ
FBI Probing Reported Theft of 1.2 Billion Passwords by Russian Hackers | NDTV Gadgets
Kyle Whitmire: There Will Be A Dome? (WBHM - Your NPR News Station)
New York City's Herald Square Macy's Department Store to Pay Thousands for Racial Profiling, Report on New Policies for 3 Years : Business : Latin Post
CHS Starts Notification Process Following Huge Breach - HDM Top Stories Article | Health Data Management
U.S. Military Bans The Intercept - The Intercept
Hospital chain says it has cyber security insurance
Twitter / ramirahim : Impressed with our interns! ...
Data Breach Strikes 51 UPS Stores Around U.S. « CBS New York
Meta-Analysis: Worse Clinical Outcomes But Less Bleeding With Bivalirudin in PCI - Journal News - TCTMD
Chairless Chair, an invisible chair that you can wear -
7 reasons why we're going to see more card data breaches at our favorite retail stores | VentureBeat | Security | by Slava Gomzin, security and payments expert, HP
Data Breaches May Drive Consumers Back to Cash - Bank Think Article - American Banker
Parallels Announces Parallels Desktop® 10 for Mac with OS X Yosemite Integration
Munroe: Hospital not affected by computer hacking |
Cost of Target Data Breach: $148 Million - Network Security on Top Tech News
Community Health opens toll-free line for patients who may be data-breach victims | Tampa Bay Times
7 Scary Things Employees Can Do With Their Mobile Devices |
Preparing for a Successful IAM Integration Project (Part 1 of 2)
Community Health Systems attackers exploited Heartbleed bug for access, firm says - SC Magazine
Computer hackers in China hit area hospitals, steal patient data
Most Companies Admit They Don’t Have a Very Effective Security Response Plan
EMC RSA Archer GRC CVE-2014-2517 Unspecified Privilege Escalation Vulnerability (RSS)
RSA Archer GRC CVE-2014-0641 Unspecified Cross Site Request Forgery Vulnerability (RSS)
EMC RSA Archer GRC CVE-2014-2505 Unspecified Remote Code Execution Vulnerability (RSS)
RSA Archer GRC CVE-2014-0640 Unspecified Information Disclosure Vulnerability (RSS)
UPS announces breach impacting 51 U.S. locations - SC Magazine
Troubleshooting Services in Contrail - YouTube
fork() can fail: this is important
Snowshoe Spam Attack Comes and Goes in a Flurry
Scripting Wi-Fi Pentesting Tools In Python - Scapy Basics
2015 Subaru Legacy and Outback earn IIHS Top Safety Pick+ awards - NY Daily News
Malaysia probes apparent hacking of MH370 data - The Hindu
Big Data Overwhelms Security Teams - eSecurity Planet
Community Health Breach Highlights Security Problems in Health Care Industry
Hackers from China Stole Data on 4.5 Million Patients
Nato can help UAE cyber security | The National
Google Voice Search On Android Smartphones Could be Exploited by Malware
Two-step verification: FAQ - Windows Help
Chinese hackers 'stole classified data from Malaysia's MH370 investigation | Mail Online
East Nashville Farmers Market gets its website back
The PS4 is still selling much faster than expected – and Sony doesn’t know why | ExtremeTech
Target cuts outlook as data breach costs hit earnings again - Dallas Business Journal
Hacking traffic lights with a laptop is easy | Network World
PernixData Raises $35M in Series C Financing, Closes First FiscalYear With Record Revenue - MarketWatch
Chinese Hackers Nab Info on Millions of U.S. Patients - Network Security on Top Tech News
Four Anonymous hackers have pleaded guilty to minor charges - Computer Business Review
Daily Deals for August 20, 2014, last chance on VPN Unlimited Premium Plan | TUAW: Apple news, reviews and how-tos since 2004
Blocked by Symantec Endpoint Protection - YouTube
IBM Rational Directory Server CVE-2014-3089 Local Information Disclosure Vulnerability (RSS)
Health care breaches continue to rise, over 30M affected - SC Magazine
Parallels Announces Parallels Desktop 10 for Mac with OS X Yosemite Integration Plus Faster AND Better Battery Life! - BWWGeeksWorld
Sophos in Leader's Quadrant in 2014 Unified Threat Management MagicQuadrant for 3rd Consecutive Year - MarketWatch
Macy's to pay $650,000 to resolve 'shop-and-frisk' probe| Reuters
A Leader in the Global Security Software -
Parallels Desktop 10 for Mac with OS X Yosemite integration announced - Canadian Reviewer - News, Reviews and Opinion with a Canadian Perspective
CryptoLocker copycat, TorrentLocker, discovered by researchers - SC Magazine
Counterfeit U.S. Cash Floods Crime Forums — Krebs on Security
Our Latest Vulnerability Advisory: Delphi and C++ Builder VCL library Buffer Overflow | Core Security
Evanston hospital endures data breach | Today's News | Wyoming Business Report
Roman Mars 99 Percent Invisible: Jules Yap hacks Ikea products at
U.S. hospital breach biggest yet to exploit Heartbleed bug: expert| Reuters
Hackers Successfully Attacked U.S. Nuclear Agency Three Times in Three Years |
BBC News - US hospital hack 'exploited Heartbleed flaw'
HP earnings may show how much further PC rebound will bound - Yahoo Finance
Metro-east news from Belleville, IL | Belleville News-Democrat
Staying safe on public Wi-Fi - CNE
Parallels' new Desktop 10 brings Windows to Yosemite Mac | The latest news from the Computer and IT Industry | PC Retail
Hospitals: Few clients call in over files breach | NWAonline
What to do if your Social Security number was stolen - MarketWatch
Palo Alto Networks goes global with Westcon Group | Computer Dealer News
What will cybersecurity look like in 2025?, Part 2: Microsoft envisions an optimistic future - Microsoft Security Blog - Site Home - TechNet Blogs
Reveton ransomware now comes with password stealers
Kaspersky Lab Recognized with Top Honors in CRN 2014 Annual Report Card | Kaspersky Lab US
New Orleans, LA Local News, Breaking News, Sports & Weather -
'AdThief' Chinese Malware Infects Over 75,000 Jailbroken iOS devices
'Backoff' malware compromises POS devices in New Orleans restaurant - SC Magazine
FBI begins investigation into 1.2 billion stolen credentials - SC Magazine
RiverBed Stingray Traffic Manager Virtual Appliance Cross Site Scripting Vulnerability (RSS)
IBM WebSphere Application Server CVE-2014-0965 Unspecified Information Disclosure Vulnerability (RSS)
Baidu Spark Browser Stack Overflow Denial of Service Vulnerability (RSS)
Health network reports 4.5 million patients had information hacked
Shaw's, Star Market Data Breach: How to Protect Yourself | NECN
Local & North Carolina state news from Raleigh, NC |
Memorial Hospital's operator reports data breach affecting 4.5 million people - York Dispatch
Hackers get 4.5 million hospital patients’ names, addresses, Social Security numbers - Atlanta Business Chronicle
About 30.1M Patients Affected by Health Data Breaches Since 2009 - iHealthBeat
News-Sun Editorial: No reason to feel safe after hospital data breach | Lake County News-Sun
Twitter / SecurityTube : Say Hello to WiDy! Our Wi-Fi ...
Black Hat Usa 2014 - Mission Mpossible By Nils + Jon Butler
Researchers Discover Google Chrome Is Plagued With Malicious Browser Extensions - The State of Security
From the archive, 2002: Symantec in demand as viruses, security create huge need - San Jose Mercury News
Macy's Settles Shopper-Profiling Probe for $650K - NBC News
Calif. Court's Cell Phone Ruling Could Affect Hospitals' BYOD Policies - iHealthBeat
New Police Hacking Technologies Raise Familiar Questions About Civil Liberties
Attorney General Patrick Morrisey Warns Consumers About Data Breach at West Virginia Hospitals
What are the top three anti-virus security programs?Baltimore Post-Examiner
P.F. Chang's in Bellevue, Lynnwood affected by data breach
Colleges Expand into Mobile Content Management | EdTech Magazine
Google's retreat on Pointer Events makes life harder for web developers | CITEworld
Children's Mercy Hospital notifies employees of data breach |
Macy's settles racial profiling complaints at NY store
Market Update (NASDAQ:CSCO): Why Cisco (CSCO) Stock Is Still a ‘Buy’ at TheStreet
Macy's to pay $650,000 to settle allegations of racial profiling at Herald Square store - Newsday
Dropbox beefs up security of shared links - for business users
Pass the popcorn! Juniper’s 1TB Line Card Takes t... - J-Net Community
'Bring your own device' creates privacy issues for employees | 2014-08-20 | Indianapolis Business Journal |
Finextra: Flash virtualisation startup PernixData raises $35m
Target cuts outlook as data breach costs hit earnings again - Minneapolis / St. Paul Business Journal
Australian surveillance law will legalize snooping on and hacking the entire Internet - Boing Boing
Still reeling from data breach, Target cuts forecast - CBS News
PE HUB » Storage software company PernixData raises $35 mln from Menlo, KP, Benioff and others
Vulnerability Management: Just Turn It Off! PART III
Storage Virtualization Startup Closes $35M Round by Benioff, Luczo, VCs
The latest numbers: Who is really on Facebook?
NSS Labs Report on Cyber Resilience Highlights the Need for a New Approach to Security
State Street gets a positive 'A+' | Asset Servicing news |
Anonymous hackers plead guilty - IOL SciTech |
Heartbleed to blame for Community Health Systems breach | Security - InfoWorld
Touching a Laptop Can Break Its Encryption | MIT Technology Review
How To Ruin Your Day But Save Your Year - The State of Security
Data for 4.5 Million Patients Stolen From Hospital Group - Bloomberg
HP Security Bulletin HPSBMU03101 ≈ Packet Storm
HP Security Bulletin HPSBUX03091 SSRT101667 ≈ Packet Storm
HP Security Bulletin HPSBUX03092 SSRT101668 ≈ Packet Storm
HP Security Bulletin HPSBUX03095 SSRT101674 ≈ Packet Storm
Deutsche Telekom CERT Advisory DTC-A-20140820-001 ≈ Packet Storm
ManageEngine Desktop Central / Password Manager Pro / IT360 SQL Injection ≈ Packet Storm
ArticleFR 3.0.4 SQL Injection ≈ Packet Storm
WordPress All In One SEO Pack 2.2.2 Cross Site Scripting ≈ Packet Storm
FOCUS: Connected Travel | The Network
Profit Without CapEx: Disaster Recovery as a Service (DRaaS) | Managed Services content from MSPmentor
Spam industry reinvented as messages containing malicious links surge | CSO Online
'Reveton' ransomware upgraded with powerful password stealer | CSO Online
Bug in iOS Instagram app fixed, impacts Facebook accounts - SC Magazine
Professor hacks University Health Conway in demonstration for class - SC Magazine
Red Hat Security Advisory 2014-1083-01 ≈ Packet Storm
Debian Security Advisory 3007-1 ≈ Packet Storm
Red Hat Security Advisory 2014-1082-01 ≈ Packet Storm
Ubuntu Security Notice USN-2319-1 ≈ Packet Storm
Red Hat Security Advisory 2014-1078-01 ≈ Packet Storm
HP Security Bulletin HPSBMU03094 ≈ Packet Storm
Citrix Cites Strong Customer Demand For Comprehensive Enterprise Mobility Management - MarketWatch
Macy's pays $650k to settle racial discrimination probe | Local News - WLWT Home
Citrix Sees Growing Demand for Industry-Tailored File Sharing Solutions | Virtual-Strategy Magazine
To solve Android’s update woes, Google should look to the PC | Ars Technica
Cyber security: SMEs more vulnerable than ever to cyber crime | Briefings | The Lawyer
Yale profs propose openness, crypto for disciplined surveillance | ZDNet
Cloud Storage Is Eating The World Alive | TechCrunch
Lazy Sysadmins Rooted In Looming Mozilla Cert Wipeout ≈ Packet Storm
Microsoft Warns Of Fake Virus Alert Hitting Windows Users ≈ Packet Storm
Cryptolocker Flogged On YouTube ≈ Packet Storm
US Hospital Hack 'Exploited Heartbleed Flaw' ≈ Packet Storm
Area Patients Victims of Cyber Attack - - your one stop community web portal for all your Central Pennsylvania News, Sports and Weather, powered by WTAJ Your News Leader
iPhone 6: A delicate compromise | ZDNet
Data breach impact: Target earnings off 62 percent | The Salt Lake Tribune
Heartbleed Flaw Said Used by Chinese in Hospital Hacking - Bloomberg
CHS hackers exploited the Heartbleed bug
Learn Pentesting Online
Analysis reveals many malicious Chrome extensions
Black Hat Usa 2014 - Cellular Exploitation On A Global Scale: The Rise And Fall Of The Control Protocol | Home
Target’s customers haven’t forgiven it for that data breach – Quartz
Nuclear Regulatory Commission hacked 3 times in 3 years | Network World
Target (TGT) slashes annual profit forecast. Blame Canada. -
The Next Battleground In The War Against Quantum Hacking | MIT Technology Review
Citrix Cites Strong Customer Demand For Comprehensive Enterprise Mobility Management | Virtual-Strategy Magazine
Target cuts annual profit outlook - US News
Workers Going Rogue With BYOD (and BYOA) | CIO
Is BYOD Nothing But Hot Air? | Managed Services content from MSPmentor
M’sia, Interpol probe hacking of MH370 data | TODAYonline
New device will help monitor Parkinson's patients
5 excuses for doing nothing about computer security! | Naked Security
Michael J. Fox Smart Watches Are Right On Time For Parkinson's Breakthrough - Forbes
US Companies Can't Protect Citizens? Chinese Hackers Steal 4.5 Million Patients Info, Including Social Security Numbers
Researchers Easily Slipped Weapons Past TSA’s X-Ray Body Scanners | Threat Level | WIRED
DUBLIN: Research and Markets: Business Continuity and Scenario Planning: 2-day In-person Seminar, Johannesburg, South Africa - 4th-5th December 2014 | Business Wire | Rock Hill Herald Online
Leadership - a business continuity risk | ITWeb
St. Kate’s & Juniper Build a Unified Wired & Wireless Network Solution - YouTube
ITAR-TASS: Non-political - Scientists find traces of sea plankton on ISS surface
Data vs. Metadata - F-Secure Weblog : News from the Lab (RSS)
Archive Systems Recognized in Gartner Hype Cycle for Human Capital Management | Virtual-Strategy Magazine
Meet John Tye: the kinder, gentler and by-the-book whistleblower | Ars Technica
UPDATE - Latisys Announces PCI Compliance and HIPAA Risk Assessment for Cloud-Enabled Systems Infrastructure - BWWGeeksWorld
vArmour Raises $36 Million to Protect the Data Defined Perimeter - BWWGeeksWorld
California BYOD ruling could impose new costs on hospitals | Healthcare Dive
Target Lowers Earnings Outlook, Still Reeling From Data Breach - WSJ
Macy's to pay $650,000 in shopper-profiling probe - Business -
Target Cuts Full-Year Forecast As Effects From Data Breach Linger - Forbes
Parallels adds support for Yosemite in Desktop 10 for Mac - IT News from
Target Cuts Annual Profit Outlook in Wake of Data Breach - DailyFinance
PE HUB » vArmour grabs $36 mln
Security startup vArmour targets the hybrid cloud with a $21M funding round — Tech News and Analysis
Poquoson to test drive "Bring Your Own Device" program - Daily Press
Review Board CVE-2014-5027 Unspecified Cross Site Scripting Vulnerability (RSS)
Cacti Multiple Cross Site Scripting Vulnerabilities (RSS)
Data Breach Bulletin: Chinese Hackers Allegedly Steal 4.5 Million Patient Records - Forbes
What to do When a Data Breach Occurs
Target cuts annual profit outlook as the discounter continues to reel from breach
Patient data accessed via Heartbleed bug: expert | Sarnia Observer
Centralized Point of Sale Management – Five Reasons Why Now is the Time for Transformation | Point of Sale News | POS News, Information and Resources
Macy’s To Pay $650,000 To Settle Racial Profiling Allegations « CBS New York
Five ways to keep your student's digital life safe | Macworld
Letters going out beginning Wednesday to Lutheran Health patients affected by hackers' data theft -
Macy's to pay $650,000 in shopper-profiling probe
San Diego Source > News > Corporate boards must focus on data security
A "Top Safety Pick+" rating for Subaru
Crooks trying out new tactics to spread fake AV
Bugtraq: SQL Injection Vulnerability in ArticleFR
Bugtraq: CVE-2014-4973 - Privilege Escalation in ESET Windows Products
Information Security News: Attend Cyber Security EXPO - October 8-9, 2014
Information Security News: Heartbleed to blame for Community Health Systems breach
Many Chrome browser extensions do sneaky things | Security - InfoWorld
Research and Markets: Business Continuity and Scenario Planning: 2-day In-person Seminar, Johannesburg, South Africa - 4th-5th December 2014 | Business Wire
Hackers Steal Info of 4.5 Million Hospital Patients
The Morning Download: Community Health Systems Breach Stirs Up Heartbleed Fears - The CIO Report - WSJ
'Chinese' hackers target MH370 investigators - Telegraph
Beacon Hill Roll Call - News - Wicked Local Wenham - Wenham, MA
Solomons town first in Pacific to relocate due to climate change| Reuters
Sophos in Leader's Quadrant in 2014 Unified Threat Management Magic Quadrant for 3rd Consecutive Year
Heartbleed implicated in US hospital megahack • The Register
WordPress WP Content Source Control Plugin 'download.php' Directory Traversal Vulnerability (RSS)
OpenStack Neutron CVE-2014-3555 Denial of Service Vulnerability (RSS)
Microsoft Windows Installer Service CVE-2014-1814 Local Privilege Escalation Vulnerability (RSS)
Phishing Frenzy: How to Protect Your Company - ITInflections
Citrix Cites Strong Customer Demand For Comprehensive Enterprise Mobility Management -
HTC One M8 now comes in Windows Phone form. Will you buy it? : PERSONAL TECH : Tech Times
GuardiCore raises US$11m to protect against cyber attacks | Datacenter Dynamics
Bugtraq: [SECURITY] [DSA 3007-1] cacti security update
Barracuda Networks Web Security Flex - Filter Bypass & Persistent Web Vulnerabilities - YouTube
1000x Faster Spelling Correction algorithm | FAROO Blog
Black Hat Usa 2014 - Saving Cyberspace By Jason Healey
'Anonymous' hackers plead guilty to minor charge in U.S. for cyberattacks| Reuters
Dell Recognized as a Leader in Gartner 2014 Magic Quadrant for Unified Threat Management (UTM) | Virtual-Strategy Magazine
Ocean Energy Management Bureau Seeks Comments on Proposed Rulemaking for Risk Management, Financial Assurance, and Loss Prevention Regulations
Avionics Magazine :: Wind River Virtualizes RTOS
Sharon Regional responds to Community Health's cyber theft - The Herald: News
ALBANY, N.Y.: Macy's to pay $650,000 in shopper-profiling probe | Business | The Island Packet
Machete cyber espionage campaign targeting Latin America
Using the iStorage datAshur Personal secure USB flash drive Review
Nullcon 2015
Bugtraq: ICETC2014 - IEEE Extended Submission until Aug. 28, 2014
Bugtraq: Deutsche Telekom CERT Advisory [DTC-A-20140820-001] check_mk vulnerabilities
Best Bug Bounty Program of the Year 2014 - Competition & Award | Official Vulnerability- & Bug- News Resource! - Sofia News Agency
Microsoft Windows Kernel 'Win32k.sys' CVE-2014-0318 Local Privilege Escalation Vulnerability (RSS)
HybridAuth 'install.php' Remote Code Execution Vulnerability (RSS)
FFmpeg 'libavcodec/proresenc_kostya.c' Buffer Overflow Vulnerability (RSS)
FFmpeg 'libavcodec/iff.c' Memory Corruption Vulnerability (RSS)
CHS Hacked by Heartbleed (Exclusive to TrustedSec)
Avast Antivirus: The Perfect Solution to PC Problems
Lawsuit: Hackers may have stolen credit card info from Shop 'n Save customers | Top Stories | News Democrat
Total Defense Anti-Virus: Guaranteed Protection from an Outstanding Software
Apple releases OS X Yosemite Developer Preview 6 -- AppAdvice
RISC creator is pushing open source chips for cloud computing and the internet of things — Tech News and Analysis
Microsoft detects fall in fake antivirus traffic
Macy's agrees to pay $650G to settle state probe into racial profiling at its Herald Square store - NY Daily News
Customers welcome C-suite advocate, CipherCloud chief trust officer reports - CSO | The Resource for Data Security Executives
The top 10 ways why BYOD initiatives fail | Information Age
Bugtraq: [security bulletin] HPSBUX03091 SSRT101667 rev.1 - HP-UX running Java7, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities
Bugtraq: [security bulletin] HPSBUX03092 SSRT101668 rev.1 - HP-UX running Java6, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities
Hackers break into Nuclear Regulatory Commission computers - IT News from
Clean up after over 30 antivirus tools with Antivirus Remover
2014 Women in IT Security: Samara Moore - SC Magazine
How to solve Java's security problem | Application security - InfoWorld
Bugtraq: [security bulletin] HPSBMU03094 rev.1 - HP Connect-IT, running OpenSSL, Remote Disclosure of Information or Unauthorized Access
Bugtraq: [security bulletin] HPSBMU03101 rev.1 - HP Asset Manager, CloudSystem Chargeback, running OpenSSL, Remote Disclosure of Information or Unauthorized Access
IBHS’ Business Continuity Planning Resources Included in Leading Disaster Planning Guides for Communities and Small Businesses | Virtual-Strategy Magazine
Kosciusko Co. hospital patient information hacked
California Lawmakers Move to Protect the State’s Collapsing Groundwater Supply | Circle of Blue WaterNews
Hackers steal info of 4.5M hospital patients |
Smarter Chips Will Mobilize Compassion - Forbes
Hacked – Data breach in Jewel-Osco stores reveals customer data Argyll Free Press
All your vulnerabilities belong to us: The rise of the exploit - SC Magazine UK
Brother, can you spare a DIME for holy grail of secure webmail? • The Register
Adding LGPL v3 to Qt | Qt Blog
Schneier on Security: US Air Force is Focusing on Cyber Deception (RSS)
Webroot Secure Anywhere versus Trend Micro Titanium+6 Internet Security: Which Performs Best?
WMH not hit by security breach4.5 million people affected by computer hack - Williamson Daily News -
Total Defense Antivirus: The Best Things Offered By An Antivirus Software
Mobile device security: Tackling the risks
AnandTech | NAS Units as VM Hosts: QNAP's Virtualization Station Explored
U.S. hospital breach biggest yet to exploit Heartbleed bug-expert| Reuters
Who is hacking Malaysia Airlines on MH370? -
Infographic: How secure is Bitcoin?
1 KB Hard Drive in Vanilla Minecraft - Imgur
Bsides Las Vegas 2014 - Clusterf*Ck - Actionable Intelligence From Machine Learning
Community Health Systems Hacked, 4.5 Million Patients Affected - CIO Issues on CIO Today
Some in Our Region Affected by Healthcare Data Breach
Missing Malaysia Airlines plane MH370: Alleged hacking of officials’ computers linked to the search |
Community Health Systems Hacked, 4.5 Million Patients Affected - Data Security on CIO Today
Chinese Hackers Nab Info on Millions of U.S. Patients - CIO Issues on Top Tech News
Shoppers Food customers may be affected by data breach
Hackers steal info of 4.5M hospital patients |
Albertsons Warns Customers of Data Breach - KPVI News 6 - Pocatello, ID
Parallels upgrade brings more Windows-on-Mac integration for $80 | Ars Technica
Dissecting Microsoft's Redefined Core
QFF launches "Elem Sendai" - Qatar's latest contribution to 3/11 disaster recovery in Japan - Zawya
BBC News - Community Health Systems data hack hits 4.5 million
Community Health Systems' data breach will likely be the first of many in health care | VentureBeat | Health | by Mark Sullivan
Backup Exec Blueprints▶ Deduplication
Hacker targets info on MH370 probe - Nation | The Star Online
iClarified - Apple News - Parallels Announces Parallels Desktop 10 for Mac With Support for Yosemite [Video]
Vipre Antivirus: Results on Its Configuration Matters
Parallels Desktop 10 for Mac features OS X Yosemite integration and more -- AppAdvice
Macy's to pay $650,000 in shopper-profiling probe
The week in security: Old malware continues onslaught as new devices found vulnerable - CSO | The Resource for Data Security Executives
MH370 probe hacked and sent to China; Malaysia-Interpol investigating | Malaysia | The Malay Mail Online
UK funds development of 'world wide web for machines' - Telegraph
Malware married to software in undetectable attack • The Register
Word Perhect
Tucson patient data breached in massive cyber attack
Windows 9 in 2015? -- Virtualization Review
Macy's to pay $650,000 in shopper-profiling probe - San Francisco Chronicle
Baidu Antivirus Beta - Neowin
Microsoft Security Essentials: What Can it Offer to Its Users?
51% of consumers share passwords
Screenshots Forever and Ever Until You Can’t Stand it « ASCII by Jason Scott
'Anonymous' Hackers Plead Guilty to Minor Charge in US for Cyber-Attacks | NDTV Gadgets
Parallels 10 allows Mac users to reach "new levels of productivity" by running Windows » Appliance Retailer
Chinese hackers targeted MH370 investigation a day after jet went missing: report | South China Morning Post
Hackers are after more than just personal info - Rachel Marsden - Page 1
Hospital hack puts 4.5M patients at risk | Spokane/E. WA -
MH370: ‘Boeing 777 Found’ E-mail Exposes Classified Information To Hackers - International Business Times
Microsoft Plans Final Windows 8.1 Tweak - Mobile Tech on CIO Today
Bsides Las Vegas 2014 - Know Thy Operator
Key stands by Collins - dominion-post |
Nine Norton Security Products Are Becoming One - Enterprise Software on Top Tech News
Russian Accused of Hacking Small Businesses Set for Trial in Seattle
Cybersecurity Demands New Framework - InformationWeek
Target extends hours for night owls |
BBC News - Hacking cars and traffic lights at Def Con
ALBANY, N.Y.: Macy's to pay $650,000 in shopper-profiling probe | National Business News | The Bellingham Herald
Riding Rails: Rails 4.2.0 beta1: Active Job, Deliver Later, Adequate Record, Web Console
Macy's to pay $650,000 in shopper-profiling probe - SFGate
VMworld 2014 Preview: The highlights in video | SiliconANGLE
Leveraging Cloud-Based Analytics to Make IT Smarter - Datamation
Foley hospital affected by hacking of personal data of 4.5 million patients linked to Community Health Systems |
Hackers target information on MH370 probe: Report
Lazy sys admins rooted in looming Mozilla cert wipeout • The Register
Wyden: 'Big league' economy needs long-term transportation funding
DeKalb Regional Medical Center also victim of data breach |
OS X Yosemite inspires Parallels to upgrade Desktop | ZDNet
Start-up offers up endpoint detection and response for behavior-based malware detection | Network World
Parallels Announces Parallels Desktop® 10 for Mac with OS X Yosemite Integration, Enables to Launch Office Applications Up to 50 Percent Faster and Delivers Up to 30 Percent Better Battery Life | Business Wire
Hackers Exploited Heartbleed Bug to Steal Patient Data from Community Health Systems
TrustPort Antivirus: The Perfect Software For Windows 8 OS
Hackers steal patient info from parent company of Rockwood Clinic, Deaconess and Valley hospitals - - Aug. 18, 2014
Cyber hack endangers patients data - News - Moberly Monitor-Index - Moberly, MO - Moberly, MO
Cyber security and policing meet in Kochi - Tech2
Moberly Medical Center affected by HIPPA data breach | Local News - Home
Trend Micro Titanium Antivirus Software vs Avira Antivirus Premium vs Webroot Secure Anywhere: The Battle between the Best Software
An easy way to test your disaster recovery plan - The Business Journals
ZoneAlarm Antivirus: Best Protection Offered by an Intrusive Software
Microsoft Security Essentials: Security Assurance from a Perfect Software
1-15 August 2014 Cyber Attacks Timeline |
Tokyo combats flood threats with second mammoth reservoir | The Japan Times
Linux Trojan ported to Windows — Dr.Web - innovation anti-virus security technologies. Comprehensive protection from Internet threats.
Details on the threat Trojan.DnsAmp.1 — Dr.Web - innovation anti-virus security technologies. Comprehensive protection from Internet threats.
Bsides Las Vegas 2014 - Improving Security By Avoiding Traffic And Still Get What You Want In Data Transfers
5 cool new security research breakthroughs | CSO Online
Healthcare organizations still too lax on security | CSO Online
All of Your Tumblr Photos Will Now Be Scanned for Branded Content | Motherboard
Bring Your Own Network: Is Your Business Data Secure? | Fox Small Business Center
MONEY & THE LAW: Colorado law protects consumers hit by data breaches
Chinese Hackers Steal 4.5M U.S. Hospital Patient Records (Video)
How Hackers Take Control Inside Your Home
EMC Documentum WebTop Products Input Validation Flaws in 'startat' and 'entryId' Parameters Permit Cross-Site Scripting Attacks - SecurityTracker (RSS)
EMC Documentum Web Development Kit Permits Cross-Site Request Forgery Attacks - SecurityTracker (RSS)
California and the Nation - Data Breach Alert at 180 Albertsons Stores in Southern California - Ca - News
GPLGPU now available | ASICSolutions GPLGPU
RSA Archer eGRC Flaws Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Conduct Cross-Site Request Forgery Attacks - SecurityTracker (RSS)
Workers at U.S. nuclear regulator fooled by phishers | CSO Online
Better Website Security and Google Search Rankings for SMB’s with Always On SSL. | Symantec Connect
Pinup: Qubole - The Growth Of Big Data as a Service -
Aviation Today :: Wind River Virtualizes RTOS
U.S. government's nuclear watchdog victim of cyberattacks: report | The Japan Times
Cryptolocker flogged on YouTube • The Register
Heartbleed to blame for Community Health Systems breach | CSO Online
Amit’s Game Programming Information
EMC Documentum Content Server Bug Lets Remote Authenticated Users Inject DQL Commands, Execute Arbitrary Code, and Obtain Potentially Sensitive Information - SecurityTracker (RSS)
RSA Archer GRC Platform 5.5 SP1 Privilege Escalation / CSRF / Access Bypass ≈ Packet Storm
Apache OFBiz 11.04.04 / 12.04.03 Cross Site Scripting ≈ Packet Storm
HybridAuth install.php PHP Code Execution ≈ Packet Storm
Identity theft protection tips in light of hospital data breach | News - Home
Kim Dotcom Denies Hacking Blogger Emails, Accuses Slater of Acting in Behalf of NZ National Party - International Business Times
Hospital Data Breach
Why Chinese Hackers Stole Information From Hospital Patients: Video - Bloomberg
I’m a cop. If you don’t want to get hurt, don’t challenge me. - The Washington Post
EMC Documentum D2 Methods Lets Remote Authenticated Users Gain Elevated Privileges - SecurityTracker (RSS)
EMC Documentum Cross Site Request Forgery ≈ Packet Storm
EMC Documentum Cross Site Scripting ≈ Packet Storm
Melkor ELF Fuzzer 1.0 ≈ Packet Storm
Red Hat Security Advisory 2014-1075-01 ≈ Packet Storm
Red Hat Security Advisory 2014-1076-01 ≈ Packet Storm
EMC Documentum D2 Privilege Escalation ≈ Packet Storm
EMC Documentum Code Execution / DQL Injection ≈ Packet Storm
Bulletproof FTP Client 2010 Buffer Overflow ≈ Packet Storm
BlazeDVD Pro 7.0 Buffer Overflow ≈ Packet Storm
Maligno 1.2 ≈ Packet Storm
FireEye and Fox-IT tool can help recover Crilock-encrypted files - Microsoft Malware Protection Center - Site Home - TechNet Blogs
Hacking Traffic Lights is Apparently Really Easy - TIME
How an 80s Book for Kids Predicted Today's Spy Satellites and Cyberwars
Exclusive: Nuke Regulator Hacked by Suspected Foreign Powers -
Large U.S. Hospital Group Claims 4.5 Million Patients' Personal Data Stolen in Chinese Cyber Attack
Health care data breaches have hit 30M patients and counting - The Washington Post
Hospital Patient Data Breach - WLOS - Asheville Top Stories - ABC
Hackers Successfully Crack US Nuclear Regulator For The First Time... Twice
OFBiz Input Validation Flaw Permits Cross-Site Scripting Attacks - SecurityTracker (RSS)
Homepage » Pharos-Tribune
YC Demo Day Session 4: Product Hunt, Aptible, One Codex, Traction, Shout, And Others! | TechCrunch
Energetic Bear / Crouching Yeti / Dragonfly - Threat Replication Case Study
'Some' Lutheran Health Network patients' info stolen in Community Health Systems hacking attack -
#1 Enterprise Cloud Backup & DR Solution. Server Data Offsite & Online
Foreign Government Agents Suspected of Hacking U.S. Nuclear Regulator - Defense One
Hacking Of HealthCare System Has People Asking How Can They Protect Themselves -
Chinese Hackers Steal Patient Records From Health System
U.S. government's nuclear watchdog victim of cyber attacks: report - News - AM 590 - WKZO Everything Kalamazoo
Nuclear regulator hacked 3 times in 3 years - CNE
Chinese Hackers Stole 4.5 Million Patients’ Data From Hospital Giant - Yahoo Finance
7 Places to Check for Signs of a Targeted Attack in Your Network | Security Intelligence Blog | Trend Micro
Cybersecurity: How safe are you? - Flipboard
Black Hat 2014: 10 Cool Hacking Tools To Check Out - Page: 1 | CRN
Supervalu Becomes Latest To Suffer Data Breach - Digital Life on Top Tech News
Chinese Hackers Stole 4.5 Million Patients’ Data From Hospital Giant - Businessweek
CHS breach shows skilled hacker will find HIT system flaws, exploit them | Vital Signs | The healthcare business blog from Modern Healthcare
UAH students get scholarships to pursue cyber security |
Symantec will start selling Norton Security instead of anti-virus products.
Apple’s iMessage Is Being Taken Over by Spammers | Enterprise | WIRED
Chinese Hackers Breach 4.5 Million Health Care Records
Hackers breach databases at six NM hospitals - Albuquerque Business First
Symantec to slim Norton line to single security suite - CNE
‘BadUSB’ Malware Leaves Terrible Taste at Black Hat 2014
Hackers steal info from Trinity | The Augusta Chronicle
Securing Your Portfolio With Network Security Company -
Nine Norton Security Products Are Becoming One - Data Security on CIO Today
Hackers Don't Cease: SuperValu Examines Data Breach | Retail News | RIS News: Business/Technology Insights for Retail, Supermarket Executives
2015 Subaru Legacy, Outback earn Top Safety Pick Plus
Hospital network hacked -
Data breach affects Dukes Memorial Hospital » Local News » Pharos-Tribune
Bakery giant Greggs targeted by hackers in mock slogan online - Chronicle Live
Suncoast hospital responds to data breach reports - Sarasota News | and ABC 7: Local News
Rail safety must be priority after Lac-Mégantic disaster: mayor
Security Conferences - Security Events - Trend Micro USA - Trend Micro USA
Russian hacker Seleznev ordered to remain in custody - SC Magazine
40 maps that explain the Roman Empire - Vox
Evanston hospital hit by national data breach
Hack of hospital chain leads to theft of up to 4.5M users' data - CNE
Avast Antivirus: Protection Guaranteed from a Free Software
BullGuard Anti-virus: Get the Latest Features
Hack Attack exposes media moguls behaving badly - Story - Paul Henry Show - TV Shows - 3 News
Cisco: Buying Opportunity In A Good Yielding Stock - Cisco Systems, Inc. (NASDAQ:CSCO) | Seeking Alpha
Hospital hacked | Payson Roundup - Payson, AZ
Cryptography Expert Says, 'PGP Encryption is Fundamentally Broken, Time for PGP to Die'
Tips for Cyber Security in This Digital World
Google Strengthens Chrome Browser to Prevent Malware Downloads
Cisco ASR 5000 Series Software CVE-2014-3331 Denial of Service Vulnerability (RSS)
To Err is Human but our Networks Work to Higher St... - J-Net Community
When Big Data Isn’t Quite Big Enough - Linda Ruth - Blogs Audience Development @
Why did Chinese hackers cyber attack U.S. health records? : T-Lounge : Tech Times
Hospitals report breach | News | The Register-Guard | Eugene, Oregon
Proofpoint announces plans to hire 94 IT professionals in Northern Ireland - SC Magazine
Bsides Las Vegas 2014 - The Semantic Age - Or - A Young Ontologist's Primer
50% of corporate passwords crackable within a few minutes - SC Magazine UK
How to use the cloud securely (because it's not going away)
Google’s 10 Zaniest Projects in the 10 Years Since the IPO | Re/code
Twitter / JuniperNetworks : Servin' up your weekly ...
Hackers nab 4.5 million US hospital records | Digital Trends
Data expert: ‘Millions’ could have had info compromised by Supervalu breach - Rick Kupchella's –
Phoenixville, Pottstown Hospitals Among Those With Security Breach - Lower Providence PA News - The Alternative Press
Chinese Hackers Nab Info on Millions of U.S. Patients - Cybercrime on CIO Today
20 years of the Hype Cycle
Gartner Hype Cycle Predicts on Data Science, Predictive Analytics, Connected Home
Target Corporation Has Bitten Off More Than It Could Chew - Target Corporation (NYSE:TGT) | Seeking Alpha
Traffic Light Study Reveals Serious Hacking Risk | MIT Technology Review
YC Demo Day Session 1: Gingko Bioworks, Bikanta, Checkr, WalkSource, ClearTax, And More! | TechCrunch
8 In 10 Desktop Computers Runs Windows And So Should You
Subaru Canada Inc. | Subaru Canada: 2015 Legacy and Outback Achieve 2014 IIHS TOP SAFETY PICK+
Hackers hit hospital chain, 4.5M records stolen | Blouin News
Itus Networks Taps Kickstarter for Home Gateway Security
Hackers steal records on 4.5 million patients from healthcare system | Ars Technica
The Daily Aztec : Life, liberty and the pursuit of privacy
Foreign State Actors Hack US Nuke Regulator Through Phishing Attacks - The State of Security
Locked Down by Symantec Endpoint Protection - YouTube
MIT kerberos 5 'ldap_principal2.c' Buffer Overflow Vulnerability (RSS)
Security Researchers: Supervalu PoS Breach 'Completely Avoidable' - Infosecurity Magazine
2015 Subaru Legacy And Outback Vehicles Earn 2014 IIHS TOP SAFETY PICK+ Awards
Local hospitals affected in Massive Data Breach - The Explorer: News
Health network reports 4.5M patients' information hacked
Why would Chinese hackers want hospital patient data? | Security - InfoWorld
Chromebook vs. HP Stream Price & Specs Comparison 2014: Microsoft Adds Afforadable Laptop to Compete : Tech : Latin Post
Data theft misses Carlisle, Lancaster patients, but hits York Memorial patients |
2015 Subaru Legacy, Outback Earn IIHS' Top Safety Pick Plus Status - KickingTires
Chinese Hackers Collected 4.5 Million American Patients' Private Health Data | ThinkProgress
Bugtraq: ESA-2014-071: RSA Archer® GRC Platform Multiple Vulnerab ilities
Twitter / msftsecurity : Have you heard? We're giving ...
Nike Picks Juniper for Next Gen Data Center ~ Converge! Network Digest
Steve Ballmer steps down as board member at Microsoft
American hospital patients' data stolen in cyber attack by Chinese | Mail Online
Cyber Security Industry Helping Verint Grow - Verint Systems Inc. (NASDAQ:VRNT) | Seeking Alpha
Patch Tuesday Tripped Up by Rapid Release Era | Windows content from Windows IT Pro
Taking Golden Manager to the next level | Celingest Blog – Feel the Cloud
An introduction to AWS VPC Peering | Celingest Blog – Feel the Cloud
Benchmark: Boot Time Comparison in OpsWorks | Celingest Blog – Feel the Cloud
Kaspersky study finds consumers nonchalant about data security | Retail Customer Experience
Successful strategies to avoid frequent password changes
Privacy rights group files complaint over Adobe, AOL Safe Harbor compliance - SC Magazine
5 lessons for managing and recruiting in the new federal IT landscape - FierceCIO
Cyber And Data Security Unlocks New MBA Career Paths | BusinessBecause
A cyber-security expert offers tips for keeping your info from being hacked - Bizwomen
Facebook says most outbound email is encrypted now | CSO Online
Application High Availability and Disaster Recovery for SQL Server, Part 1 | Database High Availability content from SQL Server Pro
Wearing Your Tech on Your Sleeve | Security Intelligence Blog | Trend Micro
Nuclear Regulatory Commission's computers hacked three times in three years - SC Magazine
More Dot-Gov Sites Found Compromised
High Performance Map Interactions using HTML5 Canvas - ChairNerd
Cisco Seminar Series 2014 North America Roadshow
Bsides Las Vegas 2014 - I Am The Cavalry
Symantec rolls Norton solutions into single suite - SC Magazine
Gartner Names 7 'Hype Cycle' Technologies
Community Health Systems Hacked, 4.5 Million Patients Affected | Sci-Tech Today
Why Apple's Mac Product Segment Still Has Room For Growth - Forbes
US won’t release Russian MP’s son being held on PoS hacking charges | Naked Security
Hospital Network Hacked, 4.5 Million Records Stolen |
Juniper Firefly - Setup Cluster with virtual SRX
Kaspersky Internet Security 2015 | PC Protection | Kaspersky Lab IN
Why 'Goldilocks Zone' Of Data Center Security Makes Sense - InformationWeek
Another breach involving Onsite Health Diagnostics, Kansas City hospital impacted - SC Magazine
Nick Davies, Phone Hacking Reporter: 'I Have No Respect For Piers Morgan'
Will Target Corp. (TGT) Miss Q2 Earnings On Higher Costs? - August 19, 2014 -
Target Corporation (NYSE:TGT) News Analysis: Target’s Second-Quarter Earnings: Data Breach Still Driving Away Customers
Norton Cuts Antivirus Product Line from Nine to One
2015 Subaru Legacy, Outback Earn Top Safety Pick+ Rating from IIHS [Video] - autoevolution
Have you seen the HP Stream 14? It seems Microsoft wants a $200 Chromebook killer | The Indian Express
Tech pros in healthcare, retail and finance admit they are failing on data compliance | CSO Online
Cloud Infographic: The Power Of Cloud Disaster Recovery -
New website calls out sites, apps, lacking security - SC Magazine
In Sync: Columbia Engineering Team First to Run iOS Apps on Android Platform | The Fu Foundation School of Engineering & Applied Science - Columbia University
California court mandates BYOD reimbursement | ZDNet
Data breach affects Dukes Memorial Hospital » Local News » Kokomo Tribune; Kokomo, Indiana
Confirmed: Security breach is not reason for Gatekeeper app signing changes | 9to5Mac
Supervalu: Linked to Other Breaches? - BankInfoSecurity
The three biggest barriers between business heads and the IT department | Information Age
Working 4 you: There's been another data breach, now what? | Spokane/E. WA -
Redirecting Anti-Wind Energy | A\J – Canada's Environmental Voice
Developer Portal Breach May have Forced Apple's Gatekeeper Changes - The Mac Observer
WRTnode Opened for $25
Cisco 2014 Midyear Security Report: Security Services and Risk Management
Microsoft Goes From Cellar to Stellar in New Antivirus Test
Hackers breach Mesquite clinic data
Data on 4.5 million hospital patients, including some in Oklahoma, stolen in cyberattack | News OK
PGi and Thinking Phone Networks Join Forces to Bring Cloud Collaboration to Enterprises -
4.5 Million Patients Victimized in National Hospital Data Breach | KSTP TV - Minneapolis and St. Paul
5 Ways to Reduce Mobile Device Loss | StateTech Magazine
State AGs in the news - Lexology
Massive data breach compromises Central Florida resident’s... |
Community Health Hospital Claims China Hacked Them ≈ Packet Storm
Think Crypto Hides You From Spooks On Facebook? Think Again ≈ Packet Storm
Help Employees Think on Their Feet - Natalie Lehr - Harvard Business Review
4.5 million affected in hospital data breach |
Court Ruling Could Bring Down BYOD | CIO
Kickstarter Idea Puts Snort On Home Routers ≈ Packet Storm
Hackers Break Into Nuclear Regulatory Commission Computers ≈ Packet Storm
iSEC Partners Conducts Tor Browser Hardening Study | The Tor Blog
Community Health hospitals hacked; 4.5M patient records stolen - Washington Times
Caught in a social net: the social media users putting companies at risk | Information Age
Community Health Systems data breach affects 4.5M patients | Local News - WGAL Home
Chinese hackers steal 4.5 million patients’ data — Don’t be neutral about net neutrality - POLITICO Morning eHealth -
Wi-Fi Security and Pentesting « SecurityTube Trainings
Philip Guo - My advice for kids: The 1,000-hour rule
Black Hat Usa 2014 - Bringing Software Defined Radio To The Penetration Testing Community
slae64-1337 exam
Client Probes
Why Apple's Mac Product Segment Still Has Room For Growth -- Trefis
New Supercomputing Center to Support Big Data and Analytics, Cybersecurity and other STEM Skills
Beacon Hill Roll Call - News - Wakefield Observer - Wakefield, MA
HP Stream 14 aims to be the Chromebook killer: Windows 8.1 onboard and a sub-$200 pricing - Tech2
Best Cheap Chromebooks: Top Choices for Under $300 - TIME
How Junior Achievement of NY Dumped Tape for Business Continuity | MSPmentor Blog
Six ways to secure your vulnerable network router | ZDNet
HP Stream revealed: Microsoft's Chromebook killer is a Chromebook clone | PCWorld
Target Q2 2014 Earnings Preview - Target Corporation (NYSE:TGT) | Seeking Alpha
Data Breach Compromises Community Health System Patient Data |
Have you seen the HP Stream 14? It seems Microsoft wants a $200 Chromebook killer - Financial Express
The three sins of software development | ionel's codelog
Will OS X Yosemite Bring More Grief for Apple? - Apple/Mac on Top Tech News
Hospital hacking of 4.5 million names includes patients of two metro-east hospitals | Top Stories | News Democrat
US won't reveal records on health website security -
Syrian Malware Attacks Evolving in Sophistication: Kaspersky Lab | SecurityWeek.Com
Community Health Systems (NYSE: CYH): News: Community Health Systems Reports Massive Data Theft
IPv6: An answer to network vulnerabilities? -- FCW
Chinese Hackers Nab Info on Millions of U.S. Patients | Sci-Tech Today
The Market for Online Credentials | Symantec Connect
Microsoft Windows Kernel Pool Allocation CVE-2014-4064 Local Information Disclosure Vulnerability (RSS)
Microsoft Windows Kernel 'Win32k.sys' CVE-2014-1819 Local Privilege Escalation Vulnerability (RSS)
Symantec folds nine Norton products into one service | Security - InfoWorld
Cyber security and policing meet in Kochi
Bring Your Own Device Doesn't Mean Bring in Security Breach |
Apple Becomes Voice Of Reason In Cyber War Of Words - Forbes
EU meeting set to speed, not deepen, sanctions on Russia| Reuters
Northwest Logic's PCI Express Gen3 Core and S2C's Virtex-7 ASIC Prototyping Platform fully validated together | RoboticsTomorrow
Mozilla Firefox and Thunderbird CVE-2013-1670 Cross Site Scripting Vulnerability (RSS)
WV MetroNews – Patient information hacked at 4 hospitals in WV
Hackers take control of Internet appliances
NEW YORK: Agio Launches Managed Security | Business Wire | Rock Hill Herald Online
Chinese hackers may have stolen your medical records - The Washington Post
Fortinet delivers 1 terabit/s firewall throughput - The Nation
Black Hat Usa 2014 - Satcom Terminals: Hacking By Air, Sea, And Land By Ruben Santamarta
Bugtraq: ESA-2014-079: EMC Documentum Content Server Multiple Vulnerabilities
Bugtraq: [CVE-2014-0232] Apache OFBiz Cross-site scripting (XSS) vulnerability
FreedomPay Announces North America's First Fully-Functional, PCI Certified P2PE Technology for Merchants | Business Wire
Ingenico Group, FreedomPay and ScanSource Consortium Power the FirstPCI-Certified P2PE and EMV Payment Solution in North America - MarketWatch
Why it is time to intensify employee education on phishing | CSO Online
Schneier on Security: The Security of al Qaeda Encryption Software (RSS)
FreeNAS Blank Password Authentication Bypass Vulnerability (RSS)
Coder tries shaming apps and site owners into using HTTPS
Why would Chinese hackers want hospital patient data? | PCWorld
Windows 9 Release Date And Features: Public Preview Landing September | Know Your Mobile
Chinese Hackers Steal 4.5M Patient Files - The Daily Beast
How to Save the Net: Don’t Give In to Big ISPs | Magazine | WIRED
This Android Shield Could Encrypt Apps So Invisibly You Forget It’s There | Gadget Lab | WIRED
Stolen data allegedly used by Irish credit unions to find debtors | CSO Online
The Complete iOS7 Course | Product Hunt
Fear the golden ticket attack! | Security - InfoWorld
Bugtraq: ESA-2014-059: EMC Documentum Multiple Cross-Site Scripting Vulnerabilities
Bugtraq: ESA-2014-067: EMC Documentum D2 Privilege Escalation Vulnerability
Hospital company that owns Mat-Su medical center hacked | Alaska Dispatch
BGP hijacking for cryptocurrency profit
Look for VMware and Red Hat to get with the mobile development program — Tech News and Analysis
GitLab 'SSH key upload' Feature CVE-2013-4490 Remote Code Execution Vulnerability (RSS)
Risk Management, Financial Assurance and Loss Prevention
WatchGuard Technologies recognized as a Leader in Gartner's 2014 Magic Quadrant for Unified Threat Management | Technuter
Sensitive info from 4.5 million American patients stolen by hacker group - National News |
Old car batteries could make cheaper, more efficient solar panels - The Washington Post
Data breach affects patients at SRMC - News - Progress-Index
Albertsons in Oregon part of debit and credit card data breach | Technology | Eugene News, Weather, Sports, Breaking News | KVAL CBS 13
The right way to manage the downsides of BYOD
Information Security News: Community Health Systems Says It Suffered Criminal Cyberattack
Information Security News: Steel City’s Hacking Cases Mean Gameover for Trade Theft
Global Think Test From Kaspersky Lab - Match the Ferrari engines
389 Directory Server CVE-2014-3562 Information Disclosure Vulnerability (RSS)
Microsoft Azure’s Cloud Services And Virtual Machines Experience “Service Interruption” | TechCrunch
Court finds fictional software brand in Dark Knight movie doesn’t infringe real brand
Chinese Hackers Steal 4.5 Million U.S. Hospital Records (VIDEO)
Vaultize Introduces Google Drive Content Connector in its File Sharing and... -- LONDON, August 19, 2014 /PR Newswire UK/ --
Courthouse News Service Entertainment Law
Four Kentucky hospitals targeted by hackers
Centre for Disease Control selects Dell for technology services |
Pallone Attends Disaster Recovery Workshop and Tours Rebuild of Sandy-Damaged Home
Think crypto hides you from spooks on Facebook? THINK AGAIN • The Register
Bsides Las Vegas 2014 - Strategies Without Frontiers
Information Security Needs Management, says SGS
Forget Passwords. Now Banks Can Track Your Typing Behavior On Phones - Forbes
Reactions to the massive breach at Community Health Systems
First patients enrolled in study to evaluate dabigatran etexilate after PCI with stenting | Business Wire
Kolibri CVE-2014-4158 Stack Based Buffer Overflow Vulnerability (RSS)
Kolibri Remote Buffer Overflow Vulnerability (RSS)
New ransomware emulates CryptoLocker, CryptoWall
UK fuzz want PINCODES on ALL mobile phones • The Register
Sparks, Summit Not Affected By Data Breach | Times Record
Millions targeted in hospital network data breach - Sarasota News | and ABC 7: News
Beacon Hill Roll Call - News - Salem Gazette - Salem, MA
Steel City’s Hacking Cases Mean Gameover for Trade Theft - Bloomberg
Nuke regulator hacked three times in three years • The Register
Lime Text Editor
Infographic: Major security skills shortages
WHITE PAPER: Threats to Virtual Environments - Symantec Security Resp…
iTWire - Norton Antivirus is dead, say hello to Norton Security
Baseball Bat With an Axe Handle Brings More Power, Fewer Injuries | Gadget Lab | WIRED
Boot up: meeting Eliza, XRaying online ads, open source neural nets | Technology |
Police to assess hacking complaint from WhaleOil blogger - Latest Crime News - Keep up with Newstalk ZB
US hospital operator says Chinese hackers stole patient data - Telegraph
NSW to build federated ID management rig for staff, punters • The Register
The Engineer of the Original Apple Mouse Talks About His Remarkable Career | Design | WIRED
Local hospitals among dozens targeted in international data breach - KGUN9
Data Breach: Chinese hackers blamed for breaking into Community Health Systems Inc. network - News
7th Circuit: Hacking software used by Catwoman in Batman movie doesn't infringe on real-life product
Symantec folds nine Norton products into one service - Good Gear Guide by PC World Australia
Senator questions airlines' data privacy practices | CSO Online
Bsides Las Vegas 2014 - Measuring The Iq Of Your Threat Intelligence Feeds - Alex Pinto • Kyle Maxwell
Biloxi Regional clinics hit by Chinese hackers | Biloxi | The Sun Herald
Hospital chain hacked, 4.5 million records stolen
Hackers steal data from parent company of Las Cruces' MountainView hospital - Las Cruces Sun-News
Chinese hackers steal data from 4.5 million hospital patients | ZDNet
U.S. Senate — Mead Treadwell - Fairbanks Daily News-Miner: Home
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt • The Register
Imitations of Popular Bitcoin Services Trying to Lure Cryptocurrency Owners
Community Health Systems reports data breach impacting millions of patients - Nashville Business Journal
Why Would Chinese Hackers Steal Millions of Medical Records? - Bloomberg
Hospital chain with 11 Alabama hospitals is cyber attacked |
Putin’s Useful (British) Idiots - The Daily Beast
Internet of Things Is Overwhelming IT Networks
The Internet Will Get Worse, Before It Gets Better - Forbes
Commonwealth Health Patient Information Stolen By Hackers -
Chinese Hackers Stole Information On 4.5 Million U.S. Hospital Patients | Business Insider India
Google to offer special accounts for kids: report • The Register
ImageNet Large Scale Visual Recognition Competition 2014 (ILSVRC2014)
Why are LNK Files Important to Your Digital Forensics Investigation? |
Apple-Google Rivalry Moves to Companies as Growth Slows - Bloomberg
Health Network hacked for North Okaloosa Medical Centers Physician clinics - WEAR ABC Channel 3 - Top Stories
Community Health Systems hacked, 4.5 million records stolen - WEAR ABC Channel 3 - Top Stories
Chinese Hackers Steal Info on Millions of U.S. Patients - Network Security on Top Tech News
2014's Hottest IT Certification | Network World
Hackers stole 4.5 million patients' data in hospital breach - LA Times
Community Health Systems blames China for recent data breach | CSO Online
Effects of Shaw's data breach still unclear - The Portland Press Herald / Maine Sunday Telegram
The CDC selects Dell for technology services -- brings new meaning to 'computer virus'
Hackers Obtain Patient Information From Local Hospitals |
State issues consumer alert following Shaw’s financial breach | PenBay Pilot
SuperAntiSpyware Professional 6.0 Review & Rating |
Dell recognized as a Leader in Gartner 2014 Magic Quadrant for UTM - CIOL
Trend Micro Titanium vs Webroot Secure Anywhere vs Avira Antivirus Premium: A Comparative Choice between Three Popular Software
CRMC’s parent company victim of data breach; CEO says local patients likely safe
Area hospital among those impacted by CHS hackers: Siloam Springs Regional Hospital included in data breach - Grove Sun - Delaware County Journal: News
Seen At 11: Hackers May Come After Your Smart Appliances « CBS New York
Security experts call for government action against cyber threats| Reuters
CHS data breach results in 4.5 million patients affected - Times Leader -
F-Secure Anti-Virus: Protection Guaranteed from a Trusted Software
on gnu and on hackers -- wingolog
Vulnerability Management: Just Turn It Off! Part III - The State of Security
TrustPort Antivirus: Feature Worth the Installation
BitDefender Antivirus Plus vs. Kaspersky Antivirus: Great News for PC Users
Review: Zone Alarm Anti Virus - The Best Things About Getting Protected
Hospital network hacked, 4.5 million records stolen - Aug. 18, 2014
Patient Data At Risk In Massive Security Breach | KRWG
Baidu Antivirus: The Software that has Made its Way to Smartphone Industry
Patient information compromised in hospital data breach - The Santa Fe New Mexican: Local News
Martin General Among 206 Hospitals With Patient Info Hacked
Symantec folds nine Norton products into one service - PC Advisor
Chinese hackers hit Community Health Systems' computer network; 4.5M patients affected | Modern Healthcare
Data breach might affect Vista patients -
Symantec folds nine Norton products into one service | CSO Online
Bsides Las Vegas 2014 - Booze, Devil's Advocate, And Hugs: The Best Debates Panel You'll See At Bsideslv 2014
X as a service (XaaS): What the future of cloud computing will bring - Cloud Tech News
Community Health says data stolen in cyber attack from China| Reuters
Hackers hit Community Health Systems - Woodward News: News
Disaster recovery centers helped more than 1,400 in Puna | KHON2
Hospital Data Breach: What You Should Do Now - Tom's Guide
Commonwealth Health Reacts to Data Breach |
Symantec folds nine Norton products into one service | PCWorld
Attackers leverage Ebola virus fear to spread malware - SC Magazine
Business news, business advice and information for Australian SMEs | SmartCompany
Tuning Backup Exec | Symantec Connect
Scientists, Not Politicians, Should Regulate NSA Surveillance | Motherboard
Symantec folds nine Norton products into one service - CIO
Albertsons in Oregon part of debit and credit card data breach | Consumer | Eugene News, Weather, Sports, Breaking News | KVAL CBS 13
Data breach may affect Yakima hospital patients | Local & Regional | KIMA CBS 29 - News, Weather and Sports - Yakima, WA
Hackers nick info of 4.5 million from healthcare network - SlashGear
Slater computer hack allegation assessed by police - Story - Politics - 3 News
Data breach at Community Health Systems
Patient Info Hacked, Stolen From Community Health | Security experts said the hacking group, known as "APT 18," may have links to the Chinese government. | National | Boise Weekly
Huge Hacking Breach at Community Health Systems - HDM Top Stories Article | Health Data Management
Asset Management - The importance of your company's assets - CSO | The Resource for Data Security Executives
Protecting yourself after a data breach
YC-Backed UPower Is Building Nuclear Batteries | TechCrunch
Hospital network reports data breach affecting 4.5 million people- update |
Patients of ‘The Med’ Among 4.5 Million Americans Affected By Data Breach
Over 4 million patients’ info stolen in Community Health hack : LIFE : Tech Times
BusinessMirror - Why secure Wi-Fi is no longer an oxymoron
Community Health details attack on patient records - Washington Times
Hackers Breach Hospital Network, Steal 4.5 Million Patient Records
Hackers hit healthcare network, 4.5M records stolen in data breach : BIZ TECH : Tech Times
Pentesting Windows Endpoints: Hidden Bind Shell Payload
Linux kernel devs made to finger their dongles before contributing code • The Register
REPORT: Most Users of Facebook, Other Social Networks Blissfully Unaware of Security Risks - AllFacebook
Online data breach affects employees of Children’s Mercy Hospital | The Kansas City Star
Storage: Virtualized vs. Software-Defined -- Virtualization Review
Ubuntu Security Notice USN-2232-4 ≈ Packet Storm
Report: Flowers Hospital part of another data breach - Dothan Eagle: Dothan, AL Local News On
Data breach affects Memorial Hospital parent company - The York Daily Record
BBC News - Windows XP upgrade proves tricky business for John Lewis
Flowers Hospital part of another data breach - Dothan Eagle: Business
Target Extending Hours to Compete with Online Shopping - Western Massachusetts Breaking News and First Warning Weather with ABC 40
KSTP TV - Minneapolis and St. Paul - News, Weather and Sports
Alert Details - Security Center - Cisco Systems
Bsides Las Vegas 2014 - A Place To Hang Our Hats: Security Community And Culture
6 cyber security trends to watch for in the rest of 2014 - Computer Business Review
Norton Antivirus: Latest Features and Updates of a Free Software
Las Cruces hospital patients affected by cyberattack - KFOX - El Paso Top Stories - Breaking News, Weather, and Traffic
4.5 Million Patients Victimized In National Hospital Data Breach | KSTP TV - Minneapolis and St. Paul
BlackBerry Creates Business Unit to Develop More of Its IP
Antivirus software: AVG, Avast are solid free choices : PERSONAL TECH : Tech Times
About half of Target stores to stay open later, so check before you head out | Dallas Morning News
Tor-rorists get sneaky Aphex Twin album peek in dance guru hypegasm • The Register
Hackers Stole Private Health Data From Nearly 5 Million People |
Data for 4.5 million Community Health System Inc. patients breached (Ellysa Gonzalez Blog) | Lubbock Online | Lubbock Avalanche-Journal
Whaleoil blogger Cameron Slater lays official complaints over hacking - Vote 2014 News | TVNZ
シリアで起きた「ネット遮断」はNSAの仕業だった:スノーデンの告白 «
Millions of card numbers likely stolen during Supervalu data breach, security expert says - Minneapolis / St. Paul Business Journal
NRMC patients could be victims of data breach - News - Kirksville Daily Express - Kirksville, MO - Kirksville, MO
Target Corporation (TGT) Earnings Report: Back On Target? WMT & DG : Article
Hospital network hacked, 4.5 million records stolen; Oklahoma hospitals at risk |
Community Health details attack on patient records - KFOX - El Paso Top Stories - Breaking News, Weather, and Traffic
Chinese Hackers Stole Info From 4.5 Million Hospital Patients | The Daily Caller
California court rules that employers must reimburse all BYOD calls - FierceCIO
IoT Brings Plenty of Security Concerns, Opportunities | IT Network Software Solutions content from The VAR Guy
Report: Hackers break into hospital network, steal 4.5 million patient records -
Community Health System data breach hits millions, possibly including Bayfront clinic patients | Tampa Bay Times
Hackers stole data from 4.5 million U.S. patients | VentureBeat | Business | by Ruth Reader
Hackers steal data on 4.5 million US hospital patients | PCWorld
Chinese Hackers Steal Personal Data From 4.5M Community Health Systems Patients | TechCrunch
Community Health Systems data breach impacts 4.5 million patient records - Birmingham Business Journal
Identity theft risk at hospitals: Millions of patients’ personal information stolen |
We have C++14! : Standard C++ | Youngstown, Warren and Sharon news, weather, sports.
Hospital network hacked, almost 5 million records stolen; 1 Utah hospital affected |
Updated: Abilene, Brownwood Regional Releases Statement Regarding Massive Data Breach Affecting Patients -
12 OYS: Trinity Hospital targeted by hackers; information exposed
4.5 million hospital patients' data exposed by hackers, Community Health Systems reports | Dallas Morning News
Health Systems Computer Hack: What Can You Do? |
Beacon Hill Roll Call - News - Tri-Town Transcript - Boxford, MA
Hackers steal hospital records | Home - Home
Chinese hackers steal hospital patient's personal data - Security - News -
TidBITS: Save 50% in Take Control’s 2014 Back to School Sale
Chinese Hackers Steal Info on Millions of U.S. Patients | Sci-Tech Today
Monkey Web Server File Descriptor Leak Lets Remote Users Deny Service - SecurityTracker (RSS)
Simply Security News, Views and Opinions from Trend Micro, IncTrend Micro: Lack of security awareness reason for high number of cybercrime victims » Simply Security News, Views and Opinions from Trend Micro, Inc
Can we make hack-proof computers? | ZDNet
Patients at Abilene hospital possible hacking victims | News - Home
Possible data breach at Santa Rosa Medical Center
Chinese hackers steal 4.5 million patients’ data - Arthur Allen -
UNO receives $300K grant for cyber security training | New Orleans CityBusiness