Free Virus Removal Tool | Antivirus and Malware Removal Tool for Conficker, Rootkits and Virus Detection
Android Malware Removal | Free Android Malware Security Tool | Sophos
Mac Antivirus | Free Antivirus for Mac Malware Tool Download | Sophos
Free Firewall Download for SMB | Sophos Essential Firewall for Small Business
Download Free Firewall for Home Users | UTM Firewall Home Edition | Sophos
Home Routers Being Targeted in DNS Hijacking Attack, Trend Micro Says - Dark Reading
How I Would Secure The Internet With $4 Billion - Dark Reading
Build a performance gaming PC for $620 | ZDNet
Six Clicks: Apps to customize your Android smartphone | ZDNet
Ubuntu / Debian Fuse Privilege Escalation (Cve-2015-3202)
Scapy / Kivy Tutorial 16 (Port Scan -1 Un Threaded)
Angler Exploit Kit Loads Up CryptoWall 3.0, Flash Flaw - Infosecurity Magazine
Facebook Rolls Out Security Check - Infosecurity Magazine
Sophos at Infosec 2015: Attack demonstrations, intelligent security, crypto explained and more | Sophos Blog
How many companies make UTMs with 802.11ac integrated wireless? Just one. | Sophos Blog
Spreading the word about cybersecurity – Sophos featured on NBC’s “The Hacking of America” | Sophos Blog
You might be surprised by how few businesses protect their Linux servers with antivirus | Sophos Blog
How to keep your data from ending up in the wrong hands | Sophos Blog
NSA Snooping Faces Shutdown as Senate Convenes Sunday - Infosecurity Magazine
Microsoft rolls out Windows 10 test build 10130 for PCs | ZDNet
Google to Cardboard developers: Keep it short and simple, and watch out for nausea | CIO
Google I/O 2015: Inside the developer show turned theme park | ZDNet
The NSA reportedly tried -- but failed -- to use a Stuxnet variant against North Korea | CIO
Exclusive: U.S. tried Stuxnet-style campaign against North Korea but failed - sources | Reuters
Moose Malware Uses Linux Routers For Social Network Fraud - Dark Reading
Home Routers Being Targeted in DNS Hijacking Attack, Trend Micro Says
Ulbricht found guilty of all charges in Silk Road online drug market case | PCWorld
Silk Road prosecutors rest their case, cite 'mountain' of digital evidence | PCWorld
Silk Road mastermind Ulbricht sentenced | CIO
NEWS ALERT: Silk Road operator Ross Ulbricht sentenced to life in prison - SC Magazine
Asus ZenFone 2 first impressions: Plenty to like so far for $299 | ZDNet
PC Magazine Communication |
Google levels up security at I/O with secure comms tool, better authentication | CIO
'Linux Moose' turns Linux devices into proxy servers to build social media followings - SC Magazine
Sally Beauty confirms malware on POS systems - SC Magazine
20 N.J. students charged in 'sexting' investigation - SC Magazine
New ISACA Events Serve Women in Security
UN report says encryption protects people's liberties and expression - SC Magazine
New Survey Shows Lack of Confidence in Organizations' Cyber Security
Websites redirect Congressional users to protest page, groups call for end of surveillance - SC Magazine
Report: Disclosed zero-days in early part of 2015 point to another yearly uptick - SC Magazine
Cyber Threat Analysis: A Call for Clarity - Dark Reading
DR Radio: Incident Response War-Gaming - Dark Reading
When Hackers Get Hacked: the Malware Servers of a Data-Stealing Campaign - McAfee
Ankit Anubhav, Author at McAfee
Poor Crypto Dooms Blockchain Android App | Threatpost | The first stop for security news
Google I/O 2015: Google's smart home blueprint is still in the drafting stage | ZDNet
Microsoft and Google rise while IBM sinks in Gartner's Magic Quadrant for cloud providers | ZDNet
Chrome extension creates map of Facebook users' precise locations - SC Magazine
Man charged with creating counterfeit coupons, selling them on Silk Road - SC Magazine
UN Report Warns Encryption Backdoors Violate Human Rights - Dark Reading
How I Would Secure the Internet with $4 Billion - Dark Reading
IRS Attack Demonstrates How Breaches Beget More Breaches - Dark Reading
Totvs partners with AWS to support growth | ZDNet
Cartoon: Spring Fever - Dark Reading
Silk Road coupon forger charged with wire fraud | Naked Security
Tor connections to hidden services could be easy to de-anonymize | CIO
Some Music to Big Data By | ZDNet
Apple Publishes Workaround for Unicode iMessage Bug | Threatpost | The first stop for security news
Check out this infographic showing the history of mobile threats, 2004-2015 | Sophos Blog
Ultra-popular Hola VPN extension sold your bandwidth for use in a botnet attack | CIO
What Are You Doing During The Golden Hour After An Attack? - McAfee
Intelligent Security and the Takedown of Beebone - McAfee
Google Photos: Optimized for organization, viewing, and sharing with unlimited storage | ZDNet provides cross-platform mobile harmony for BYOD | ZDNet
Jim Manico - Authors & Columnists - Dark Reading
How I Would Secure the Internet with $4 Billion
FUD Watch: The Marketing Of Security Vulnerabilities - Dark Reading
Marauders Map – Is your location being tracked on Facebook Messenger? | Naked Security
How the EMV shift could impact online retailers | ZDNet
Oracle PeopleSoft In The Crosshairs
Small-to Mid-sized Organizations Targeted By 'Grabit' Cyberspies - Dark Reading
Microsoft to hike by 13 percent its user client-access license prices as of August 1 | ZDNet
Zero day, Web browser vulnerabilities spike in 2014 | CSO Online
Majority of websites have serious, unfixed vulnerabilities | CIO
Brian Donohue on Security and Journalism | Threatpost | The first stop for security news
Oracle PeopleSoft Security Vulnerabilities Elevate ERP Security | Threatpost | The first stop for security news
Schneier on Security: Blog Entries Tagged UN
Lizard Squad: Original Pranksters - Infosecurity Magazine
Oracle PeopleSoft In The Crosshairs - Dark Reading
Zero Day Weekly: IRS blames Russia, a loose Moose, Megaupload malware | ZDNet
How context is slowly killing off the mobile app menu | ZDNet
UN Report on the Value of Encryption to Freedom World-Wide - Schneier on Security
#SecChatUK: What you need to know about social engineering
AMD launches new performance A10-7870K chip | ZDNet
Free Ransomware Decryption and Malware Removal ToolKit
Lessons learned from Flame, three years later - Securelist
Mary-Beth Samekh - Securelist
20 students charged in school sexting scandal | Naked Security
Iran Blames US for Cyber-Attack on Oil Ministry - Infosecurity Magazine
Apple issues temporary workaround for iPhone crashing Messages bug | ZDNet
A Passion for Online Safety, Part 1 - Infosecurity Magazine
Hola: A free VPN with a side of botnet | ZDNet
Facebook tests new tool to fend off account hijacking | Naked Security
Statistics on botnet-assisted DDoS attacks in Q1 2015 - Securelist
Leeds the UK Capital of Smartphone Theft - Infosecurity Magazine
Hardcore Porn Collage Graces Scareware Scam - Infosecurity Magazine
Good Math, book review: Challenging concepts, well explained | ZDNet
Heartbleed's Intranet & VPN Connection - Dark Reading
Dimension Data sends 76 Australian jobs offshore | ZDNet
Japan remains Google Play's top country by revenue | ZDNet
Grabit Spy Campaign Nabs 10,000 SMB Files - Infosecurity Magazine
Sophos talks at Infosec 2015: Linux malware, dodgyware for Android, crypto explained, and more | Sophos Blog
Ingogo closes AU$12 million Series C funding round | ZDNet
Australian government to auction regional 1800MHz spectrum | ZDNet
Man charged with selling fake discount coupons on Silk Road | CIO
China Preps 5-Year Cybersecurity Plan - Infosecurity Magazine
Companies Buy Good Security, But Fail to Deploy It Properly - Infosecurity Magazine
Marine Rescue Queensland trains squadrons with Office 365 | ZDNet
UN Report Warns Encryption Backdoors Violate Human Rights
Another NZ tech, IkeGPS, misses forecast | ZDNet
Silk Road sentencing approaches, prompting letters from both defense and prosecution - SC Magazine
IRS attack may have originated in Russia - SC Magazine
- Page 643 of 643 - Blog Central
David Small, Author at McAfee
Maintain the Momentum: Moving Forward Together - McAfee
ACLU urges gov't to establish bug bounty programs, disclosure policies - SC Magazine
How Google is changing mobile for the next billion users | ZDNet
iOS text message bug a nuisance, could have broader security implications - SC Magazine
Splunk beats Q1 estimates, ups outlook | ZDNet
Small-to Mid-sized Organizations Targeted By 'Grabit' Cyberspies
'Tox' Offers Ransomware As A Service
Google Locks Down Excessive Android App Permissions | Threatpost | The first stop for security news
AMD brightens up Times Square with 25,000 square foot high-definition display | ZDNet
Vulnerability in Cordova Android platform allows for app behavior modification - SC Magazine
Ransomware as a Service - Schneier on Security
Schneier on Security: Blog Entries Tagged consumerization
Music streaming service Gaana offline after hacker exposes user database flaw - SC Magazine
Megaupload sites seized by DOJ now distributing malware - SC Magazine
Healthcare IT's seismic shift, how collaboration is changing, cyber-insurance and more! | CIO
Google opens Cloud Test Lab, expands Cloud Messaging to iOS | ZDNet
Check out Sophos products, meet our experts, and win prizes at Infosecurity Europe 2015 | Sophos Blog
PC market to stall ahead of Windows 10 | ZDNet
Angler Exploit Kit Exploiting New Adobe Vulnerability, Dropping Cryptowall 3.0 | Threatpost | The first stop for security news
How Google is trying to simplify Android | ZDNet
Google bets machine learning can create an edge with Android, apps, cloud | ZDNet
What Are You Doing During The Golden Hour After An Attack? - Dark Reading
Unitrends looks to migrate traditional offsite archival storage to the cloud | ZDNet
Fortinet Announces Agreement to Acquire Meru Networks
Like routers, most USB modems also vulnerable to drive-by hacking | CIO
Raytheon Is Addressing the Transformation in Enterprise Security - Infosecurity Magazine
Bill Brenner - Authors & Columnists - Dark Reading
FUD Watch: The Marketing Of Security Vulnerabilities
The price of losing sensitive customer data is about to get a lot higher for Dutch companies | ZDNet
Growing Open Source Use Heightens Enterprise Security Risks - Dark Reading
Apple Blocks Older Versions of Flash Player | Threatpost | The first stop for security news
Removing the Barriers for Data Centre Automation - Infosecurity Magazine
Phishing Gang is Audacious Manipulator — Krebs on Security
IRS Breach Exposes 100,000 Taxpayers' Tax Returns, Other Data - Dark Reading
Grabit campaign spies on SMBs, steals sensitive data | ZDNet
Yahoo to face class action lawsuit over email spying claims | Naked Security
How Google and Apple are battling for your digital wallet | ZDNet
Imperva Unveils New Cloud Architecture to Maximize Protection of Data and Applications - Dark Reading
Pebble Time review roundup: Long battery life and limited iOS functionality | ZDNet
Data Theft The Goal Of BlackEnergy Attacks On Industrial Control Systems, Researchers Say
A Threat Intelligence-Sharing Reality-Check - Dark Reading
The Pitfalls of Common Key Generation Strategies - Infosecurity Magazine
Do these 3 things to help your family and friends stay secure | Sophos Blog
The Internet of Things Poses Cybersecurity Risk Whitepaper | Veracode
Cybersecurity on the agenda for 80 percent of corporate boards | CIO
How your employees put your organization at risk | CIO
Scan documents and whiteboards with your Android smartphone and Microsoft Office Lens | ZDNet
Six Clicks: How to make learning to program a breeze | ZDNet
MOOC on Cybersecurity - Schneier on Security
Schneier on Security: Blog Entries Tagged security education
Researchers track subway riders using smartphone malware - SC Magazine
NSA Tests Out Smartphones that Recognize Handwriting Motion -
Spy Agencies Hijack Google Play Store to Install Spyware on Smartphones
SSCC 200 – If you can’t trust the IRS, whom can you trust? [PODCAST] | Naked Security
Jawbone Accuses Fitbit of Stealing Critical IP - Infosecurity Magazine
Apple working on fix for bug that crashes iPhones with a text message | ZDNet
What Data Breaches Now Cost And Why
Escalating Cyberattacks Threaten US Healthcare Systems
IRS cut its cybersecurity staff by 11% over four years | CIO
Front Page | Corporate Psychologists
What enterprise should do when helpless employees lose hope in fighting cyber attacks | CIO
Security vuln allows Android app tampering through single URL click | ZDNet
Heartland breach expenses pegged at $140M -- so far | Computerworld
TJX data breach: At 45.6M card numbers, it's the biggest ever | Computerworld
5 things you should know about cyber insurance | CIO
Sony Pictures falls victim to major data breach | Computerworld
17% of parents ignore social media privacy settings, still post photos | Naked Security
We don’t cover stupid, says cyber insurer that’s fighting a payout | Naked Security
Security Software Growth Tops 5% But Symantec Slumps - Infosecurity Magazine
Sony buys ex-Facebook exec's storage startup in push for datacentre domiance | ZDNet
NSA chief: Encryption isn't bad, it's the future | ZDNet
Cybercrime is Now Big Business - Infosecurity Magazine
Lenovo announces dual-screen smartwatch, projector smartphone | ZDNet
Empired secures AU$20 million Rio Tinto deal | ZDNet
Lenovo ANZ focus to grow consumer business | ZDNet
Apache Cordova
Apache Cordova Android 4.0.2 and 3.7.2 released
Apache Cordova fixes flaw that could cause apps to crash | CIO
IBM steps up analytics rollouts for industries | ZDNet
Lenovo to launch Moto Maker in China | ZDNet
Lenovo launches storage arrays for small, mid-sized enterprises | ZDNet
Wi-Fi access point scans can betray a person's location | CIO
Tracking Human Mobility using WiFi signals | sune lehmann
New Bill Expands on UK's 'Snoopers Charter' - Infosecurity Magazine
Grabit and the RATs - Securelist
Ido Noar - Securelist
(ISC)2 Taps CIA, NSA and NYPD for Conference - Infosecurity Magazine
Millennials Represent a Vast Insider Threat Vector - Infosecurity Magazine
NBN Russian ahead with satellites despite ongoing slot negotiations | ZDNet
Moose Malware Uses Linux Routers For Social Network Fraud
Profile Of A Cybercrime Petty Thief
Mary Meeker's Internet report: User growth slowing, but disruption full speed ahead | ZDNet
Study: Average cost of data breach is $6.5M - SC Magazine
GNU guru slams Windows, OS X, popular apps as malware - SC Magazine
Need a simple, instant warrant canary? Now there's an app for that | ZDNet
Proactive for iOS 9: Apple's challenge to Google Now | ZDNet
Data acquired from non-IRS sources enabled access to 100K taxpayer accounts - SC Magazine
Ransomware threat 'Locker' has sleeper component - SC Magazine
Scammers use Facebook to distribute malware disguised as video player - SC Magazine
Broadcom said to be in buyout talks with Avago | ZDNet
Rockwell RSView32 Security Vulnerability Patched | Threatpost | The first stop for security news
Microsoft releases first public preview of SQL Server 2016 | ZDNet
These 5 free Android apps will boost your productivity | ZDNet
Securing Smart Cities: Leading Security Experts Join Forces to Make Modern Cities Safer - Dark Reading
EMC to aqcuire Virtustream for $1.2 billion - SC Magazine
What Data Breaches Now Cost And Why - Dark Reading
Angler EK begins exploiting patched Flash vulnerability - SC Magazine
Data security in the 21st century: Essentials of solid protection - SC Magazine
Iran says attack on oil ministry work of U.S. hackers - SC Magazine
5 tips to improve your Linux desktop security | Naked Security
Paolo Rovelli | Naked Security
Internap provides colo services to power Scanline's high-end visual effects | ZDNet
Wearables to improve your health and wellbeing | ZDNet
Beacon Health System notifies patients of possible data compromise - SC Magazine
Microsoft to Detect Search Protection Code as Malware | Threatpost | The first stop for security news
A Day in the Life of an IT Pro: Just Listen to Teacher - Infosecurity Magazine
Fortinet acquires Meru Networks, rolls out BYOD service | ZDNet
More Evidence of mSpy Apathy Over Breach — Krebs on Security
1 in 5 experts believe AI will pose an ‘existential threat’ | Naked Security
Security Researchers Publish Comments on Wassenaar Rules | Threatpost | The first stop for security news
Parliamentary insiders clean up MPs’ Wikipedia pages | Naked Security
DDoS-for-Hire: The New School Fire Alarm Prank? - Infosecurity Magazine
Brazilian government reduces scope of tech education initiatives | ZDNet
IRS Breach Exposes 100,000 Taxpayers' Tax Returns, Other Data
Rick Kam and Larry Ponemon - Authors & Columnists - Dark Reading
Employees know better, but still behave badly | CIO
5 tips for keeping your incident response team happy | CIO
BlackBerry Passport and Fitbit Surge: Productivity over bling | ZDNet
Get into Infosec Europe 2015 for free, hear great talks! | Naked Security
Hackers compromise 100,000 IRS tax accounts with pre-stolen data | Naked Security
UK Breach Costs Rise 7% Over Two Years - Infosecurity Magazine
Terrorist Risks by City, According to Actual Data - Schneier on Security
How Deniability is Covering Up Security Weaknesses - Infosecurity Magazine
Meeting the New Challenges of Enterprise Security - Infosecurity Magazine
Linux creator slams Windows, OS X, popular apps as malware - SC Magazine
David Wagner - Authors & Columnists - Dark Reading