Google Now Pays Bug Hunters Bigger Bucks Year-Round - World Wide Web on Top Tech News
How to Mitigate Compliance Risks with BYOD - EndNotes February 2015 | Poyner Spruill LLP - JDSupra
HP Buys Aruba Networks for $3B, Aiming for Enterprise Networks - Tech Trends on CIO Today
Hewlett Packard is securing Wi-Fi network device maker Aruba Networks
Huawei aims to conquer US - The Rakyat Post - The Rakyat Post
ID management vital for IoT success - IT-Online | IT-Online
TOKYO & LUXEMBOURG & FRANKFURT, Germany: NTT Communications to Acquire 86.7% Stake in e-shelter | Business Wire | Rock Hill Herald Online
Hackers Cut In Line for Burning Man Tickets, Hack Back Against Lenovo and Scam Illinois Cops -
Nobody was 'hacked' during iMessage kerfuffle: Turnbull -
How to Find Out if GCHQ Illegally Spied on You | Lifehacker UK
Spam messages not hacking: Turnbull | Daily Mail Online
Did NSA plant spyware in computers shipped abroad? -
Attorney General Lisa Madigan Unveils New Plan to Beef Up Illinois Data Breach Law | NBC Chicago
AG Schuette Lists Top Ten MI Consumer Complaints |
Data breach-Nebraskans information possibly exposed - News, Weather and Sports for Lincoln, NE;
Debt, ID theft top list of consumer complaints in Illinois - Chicago Tribune
GoLocalProv | 30,000 Rhode Islanders Hit by Health Data Breaches
Awards -
For Samsung, Galaxy S6 needs to hit with a big bang - CNE
House leaders, Senate Democrats at odds over how to fund Homeland Security before deadline - 3/2/2015 11:23:06 AM | Newser
INGENICO GROUP: Allianz Hungaria selects Ingenico Mobile Solutions' innovative, integrated and fully managed mPOS -
Hillary Clinton used personal email for State business, report says - Washington Times
Hillary Only Used Personal Email at State -- NYMag
Google Pwnium Competition Now a Year-Round Event | News & Opinion |
Cuts to Australian R&D tax offset voted down by Senate | ZDNet
Exclusive: Huawei plans big push to sell its phones, wearable devices in U.S. | Reuters
BARCELONA, Spain: Google selling wireless plans to get more people online | Nation |
Huawei plans big push to sell its phones, wearable devices in U.S. | Daily Mail Online
Nation's air traffic control system still needs 'significant' improvements as plane guidance system remains ripe target for hackers, report warns | Daily Mail Online
Fitch Affirms CP ALL's Upsized Unsecured Bonds at 'A(tha)' | Reuters
Facebook 'wants to help' telcos facing woes due to Facebook | ZDNet
The New Terrorism: How to fight it and defeat it | Fox News
Millions of Georgia health insurance customers exposed in data breach | New Pittsburgh Courier
Apple OS X 10.10.3 Including New Photos App Is Available as Public Beta : Tech : News Every Day
First look: HTC's One M9 vs. Samsung's Galaxy S6 and S6 Edge
Mozilla Launches 64-bit Firefox Developer Edition For Windows
The hunt for data analytics: Is your SIEM on the endangered list?
Powershell Summit 2014 - Just Enough Admin - Security In A Post-Snowden World
Powershell Summit 2014 - Powershell For Security Incident Response - Lee Holmes And Joe Bialek
Powershell Summit 2014 - Using Powershell As A Reverse Engineering Tool
Powershell Summit 2014 - Monitoring Using Powershell - Josh Swenson
Toorcon 16 - Finfisher Breakdown Toorcon
Toorcon 16 - Reverse Engineering Malware For Newbies
Xss Tutorial #6 - Avoiding Advanced Filters And Protecting Against Xss
Juriaan Bremer: Cuckoo Sandbox: State-Of-The-Art Automated Malware Analysis
Christian Wagner, Aleksandar Hudi: Secure Cloud Computing For Critical Infrastructure It
Marion Marschalek: Rise Of The Banking Trojans: Zeus Is Not Dead Yet
House leaders, Senate Democrats at odds over how to fund Homeland Security before deadline - 3/2/2015 8:06:03 AM | Newser
LINCOLN, Neb.: Some Nebraskans at risk from data security breach | National Business News |
Hillary Clinton and the private email account that could haunt her - MarketWatch
Hillary Clinton didn't use government email account as secretary of state: Report - Washington Times
MSNBC's O'Donnell: No Explanation for Hillary E-mail Story - Breitbart
MSNBC’s O’Donnell: Clinton Using Private Email ‘Stunning Breach of Security’ | Mediaite
Hillary Clinton 'used an unsecured personal email account for her four years as Secretary of State - and then her aides decided which correspondence to hand over for the public record' | Daily Mail Online
Google Scraps Format for Pwnium Bug Disclosures
Business to Copy Banks and Develop Triple-A Security Rating - CSO | The Resource for Data Security Executives
New Chinese regulation hits online lottery sellers Alibaba, Tencent | ZDNet
As Homeland Security Steps Up Cybercrime Fight, Tech Industry Wary | WBUR & NPR
Palo Alto Networks' (PANW) CEO Mark McLaughlin on Q2 2015 Earnings Results - Earnings Call Transcript | Seeking Alpha
Watchdog: Air traffic control system is a hacking risk -
iPhone theft victims tricked into unlocking devices | CIO
Cybercriminals phish iCloud credentials from victims of iPhone, iPad theft | Symantec Connect
TowerSec ECUSHIELD Cyber Security Software Stops Hacking As Vehicles Become Internet of Things... -- GENEVA, March 2, 2015 /PRNewswire/ --
Terrorism fear takes over security at the Library of Congress - Greater Greater Washington
Migrating Windows Server 2003 Active Directory Domains --
BlackBerry To Offer MDM via Cloud Subscription - Mobile Tech on Top Tech News
Latest Cyber Bank Robbery Demonstrates That Government Prefers Crappy Tech Security for Its Own Benefit
Republicans Differ Over How to Fight Obama on Immigration
GOP's week extension of homeland security funding makes great reality TV - Chicago Tribune
Pioneer Bank affected by possible security breach
Hillary Clinton's Private Email: Possibly a Security Breach - Kevin Glass
Possible security breach affects Pioneer Bank
DCP Axed for Attack on CM Carcade - The New Indian Express
Chester County Man Charged in White House Security Breach | NBC 10 Philadelphia
Security and Vulnerability Management (SVM) Market Worth $9,087.4 Million by 2019 -- DALLAS, March 2, 2015 /PR Newswire UK/ --
CellTrust SecureLine For Good To Demonstrate New BYOD Solution At MWC |
NXP Semiconductor Bets $12 Billion on Smarter Cars - WSJ
More Businesses Turn to Insurance for Protection Against Hackers - Western Massachusetts Breaking News and First Warning Weather with ABC 40
Virginia Labs, Businesses Engineer Ways to Fight Hackers
U.S. air safety threatened by possible hacking - senators - World | The Star Online
As Homeland Security Steps Up Cybercrime Fight, Tech Industry Wary : All Tech Considered : NPR
VLP Therapeutics Wins the 2015 Life Sciences Impact Grant Award from the Montgomery County Department of Economic Development | SYS-CON MEDIA
Australian lawmakers can't use phones, will vote on data retention | ZDNet
Air traffic control system a hacking risk, watchdog says | Fox News
Air Traffic Control vulnerable to hacking | Politics - KCRA Home
Malcolm Turnbull confirms he uses Wickr, WhatsApp instead of unsecure SMS technology - ABC News (Australian Broadcasting Corporation)
Australian businesses on a path to adopting big data: EMC | ZDNet
Uber Goes on Offense Over 2014 Data Breach | The Recorder
Pioneer Bank alert: Customer data on stolen employee laptop - Albany Business Review - Data breach at Pioneer Bank
Mobile World Congress 2015: Seven big news stories from day one | SmartCompany
Security and Microsoft take center stage as Mobile World Congress 2015 opens - CNE
Cool Stuff You're Missing at Mobile World Congress #MWC15
End the antics over Homeland Security funds - The Denver Post
Crisis of the Week: Anthem’s Breach Response Evaluated - Risk & Compliance - WSJ
AG Cooper urges Anthem breach victims to protect themselves - Stanly News and Press: News
LINCOLN, Neb.: Some Nebraskans at risk from data security breach | Technology | SanLuisObispo
NC Anthem customers urged to protect themselves after data breac - WECT, weather & sports Wilmington, NC
Kaspersky MDM 'Knox' on Samsung Devices - Datamation
Chip Maker Places A $12 Billion Bet On Smarter Cars -
Palo Alto Earnings Jump 90% On Cybersecurity 'Paradigm Shift' PANW -
OVERNIGHT CYBERSECURITY: Why discovering hackers can take months | TheHill
Air Traffic Control vulnerable to hacking | Politics - Home
Arrest Made in Hacking Death of Alpharetta Man | Alpharetta-Milton, GA Patch
U.S. air safety threatened by possible hacking: senators | Reuters
Trinity Mirror pays former chief operating officer £1.36m | Herald Scotland
Fort Smith Housing Authority and Public Service Alliance of Canada reach a collective agreement | SYS-CON MEDIA
Get hooked up at home: Banner Medical Group offers easy Home Sleep Study to detect sleep apnea | SYS-CON MEDIA
Attorney General: AG Jepsen Opens Inquiry into Lenovo, Superfish Privacy and Security Concerns
Conn. AG Launches Lenovo-Superfish 'Crapware' Probe | CIO
Pranking MPs with messages not hacking, says Malcolm Turnbull
Spam messages not hacking: Turnbull | SBS News
Bangladesh makes arrest in hacking death of American blogger - WDAM-TV 7-News, Weather, Sports-Hattiesburg, MS
Air traffic control vulnerable to hacking, GAO finds | TheHill
Mirror Phone Hacking Trial to determine 'amount of damages due' to Actors
Ad breaches cost iiNet AU$200,000 fine | ZDNet
Anthem Inc Data Breach Reaches Wyoming Residents
Identity theft remains a top concern for Americans: 3 steps to protecting your identity -
In Wake of Anthem Breach, more Medical Identity Theft is being r - Local news, weather, sports Savannah | WSAV On Your Side
Keep a wary eye on your information as number of ID thefts rise
Proofpoint Acquires Emerging Threats for $40 Million
D-Link Technical Support
Remote access vulnerabilities in D-Link routers remain unpatched | PCWorld
D-Link patches router, says more fixes are on the way | CIO
Newswire & Press Release / Absolute Software Partners with YEZZ - Software - Absolute Software Corp. | NewswireToday
Closer look at 'good enough' security after recent data breaches
Crooks targeting call centers to further Apple Pay fraud | CSO Online
Q&A: Marcus Ranum chats with AT&T's CSO Ed Amoroso
Apple begins seeding OS X 10.10.3 Public Beta, includes new Photos app | TechnoBuffalo
Window XP market share went slightly up last month - despite no support anymore -
Alibaba to establish $318m Taiwan startup fund | ZDNet
IT Technical Compliance Analyst - Gibraltar - Gaming Intelligence
What You Need To Know About Nation-State Hacked Hard Drives
Senate Dems Block GOP Calls to Negotiate Homeland Security Funding - NBC News
Voices: This time immigration impasse can do real harm
‘Small number’ of Rogers’ business clients affected by security breach | Toronto Star
Two men arrested in two separate White House security breaches in less than 24 hours after new Secret Service director vows to regain public trust | Daily Mail Online
LINCOLN, Neb.: Some Nebraskans at risk from data security breach | Technology | The State
Google Pwnium Program Now Open All Year | Threatpost | The first stop for security news
Google Now Pays Bug Hunters Bigger Bucks Year-Round - Network Security on CIO Today
Natural Grocers investigating unauthorized access to POS systems - SC Magazine
Five Ways Next-Gen Data Centers Will Be Different from Today's | Data Center Knowledge
Secure Device Concept Remains a Hard Sell, CIOs Say - The CIO Report - WSJ
FAA computers vulnerable to hackers, GAO report says - The Washington Post
Sex toys and other things you didn't know could be hacked | TheHill
Hackers attack Baldwin County District Attorney's website |
The 414s: The Original Teenage Hackers - CNN Video
GAO Warns: Air Traffic Control Systems Vulnerable to Hackers
Trinity Mirror reports robust performance in 2014 - The Journal
GoPro and Guitar Center Present Done in One | SYS-CON MEDIA
Firewalls: The Once and Future King of Network Security
Avoiding Social Engineering and Phishing Attacks | US-CER
FTC Details the Top 10 Imposter Scams of 2014 | US-CER
Data at risk for about 50,000 current and former Uber drivers - SC Magazine
Proposed Consumer Privacy Bill of Rights Act doesn't go far enough, critics say - SC Magazine
Watchdog: Air Traffic Control System Is a Hacking Risk - ABC News
Air Traffic Control vulnerable to hacking | Politics - KITV Home
Banks join technology chiefs to press Congress for cybersecurity bill - Pensions & Investments
Connecticut Attorney General Raises Concerns About Software on Lenovo Computers | NBC Connecticut
Opinions - SC Magazine
Cyber demands decision-making in near-realtime
CHEYENNE, Wyo.: More than 52K residents may be affected by data breach | Technology | The News Tribune
What ever happened to VDI? | ZDNet
UPDATE: Right-to-work debate moves to Wisconsin Assembly - Iowa-Illinois-Wisconsin
Officials: Ohio school shooter barricades could be used to rape students (VIDEO)
Principles of constitutionalism: federalism as a check on federal power
SIM-Karten-Hack: Die Kompromittierung der Mobilfunknetze durch NSA/GCHQ | heise online
Securosis Blog | Firestarter: Cyber vs. Terror (yeah, we went there)
Securosis Blog |
BlackBerry To Offer MDM via Cloud Subscription | Sci-Tech Today
Republicans' Homeland Security move called political blunder | The Jakarta Post
Has PC maker Lenovo committed the ultimate breach of customer security? - LA Times
Juveniles escape exposes security breach at Garland County Deten - KATV - Breaking News, Weather and Razorback Sports
UPDATE 1-Uber says security breach affected about 50,000 drivers | Reuters
Over 100,000 Nebraskans Impacted by Anthem Data Security Breach - KHGI-TV/KWNB-TV/KHGI-CD-Grand Island, Kearney, Hastings
Bank of Quincy warns customers of security breach : News :
Sun, Sea, Sand And Data Security Breach Sanctions - Data Protection - UK
Mobile App Users at Risk as Developers Fail to Address Security Vulnerabilities
Firefox 36 Gains HTTP/2 Support, Fixes Critical Vulnerabilities
Seagate Business NAS Firmware Vulnerabilities Disclosed | Threatpost | The first stop for security news
Lenovo Releases Tool To Remove The Sketchy Exploitable “SuperFish” Garbage It Pre-Loaded On Laptops | TechCrunch
Vulnerable mobile apps are not being patched -- millions of people at risk
Secure Shell Key Management in Light of OpenSSL Vulnerabilities: Part 1
How to ensure BYOD doesn't put health data at risk - FierceMobileHealthcare
Silent Circle to buy out Geeksphone, fully own Blackphone - SC Magazine
No Cookies | Herald Sun
Hacking Cyber Security Stocks - March 2, 2015 -
Cyber Intelligence: Defining What You Know - Dark Reading
Proofpoint Signs Definitive Agreement to Acquire Emerging Threats; Enhances Threat Intelligence, Detection and Response
N Korea fires missiles into sea as US-Seoul war games begin | TODAYonline
104,795 Nebraskans exposed in Anthem data breach -
HHS' OCR Rarely Levies Fines for Security Breaches, Data Show - iHealthBeat
Thousands at Risk After Major Data Breach
Anthem breach: Get set for medical identity fraud - San Jose Mercury News
VA Requests $180M in Information Security Spending for FY 2016 - iHealthBeat
Attempts made to access Toys"R"Us reward program profiles - SC Magazine
North Carolina credit union notification says laptop containing data missing - SC Magazine
BBM updated with Apple Touch ID, Android Wear support - CNE
6 Tips to Secure Your Android Device | CIO
Android malware fakes phone shutdown to steal data | CSO Online
Beware of employees' cheap Android phones | CSO Online
Google defends policy that leaves most Android devices unpatched | CSO Online
Twitter Investigates ISIS Threats Against Dorsey, Costolo and Employees | CIO
Some Nebraskans at risk from data security breach - Washington Times
Uber Breach Affecting 50,000 Drivers Went Unreported for Months - Digits - WSJ
Rogers reveals online security breach - The Globe and Mail
Kids Get Hurt by Anthem Security Breach - DailyFinance
Anthem Breach Puts Millions of Children at Risk for ID Theft | WRIC
Millions of Children Exposed to ID Theft Through Anthem Breach
Mobile Apps Remain Vulnerable For Months - InformationWeek
Mobile apps fail to patch 'basic' security flaw, McAfee Labs says - Technology & Science - CBC News
Google Releases New Security Scanner on Its Cloud Platform
Lenovo CTO admits Superfish put users at risk, talks damage control
Google Releases Cloud Security Scanner Beta for Web Apps
Google Launches Cloud Security Scanner To Make Scanning For Vulnerability On Its Cloud Platform More Effective
Zero Day - Page 271 | ZDNet
Google reverses its promise to enable encryption by default in Android Lollipop | ZDNet
11 questions to ask to figure out if your company is covered on data privacy | VentureBeat | Enterprise | by Jaspreet Singh, Druva
Pro-Russian Hackers Expose U.S. Military Contractor Activity in Ukraine | | Observer
Hackers get info on 50,000 Uber drivers - SFGate
Kaspersky Lab report details how hackers stole $1 billion from more than 100 banks in 30 countries
Hacking vulnerabilities with the Internet of Things: Risks and security loopholes | ZDNet
Bangladesh officials say suspect in hacking death of U.S. blogger has been arrested |
Air Traffic Control vulnerable to hacking | Politics - WPTZ Home
Is it time to force PC makers to disclose how much they make from crapware? | ZDNet
The government's strategy to combat the "cyber arms race" - Lexology
More Than 100,000 Nebraskans Affected By Anthem Data Security Breach
More than 52K residents may be affected by data breach - Washington Times
Data breach at Uber: 50,000 affected |
Reader writes: Are Beaumont's burglaries up? - Beaumont Enterprise
Meet the free encryption app that promises to put your privacy first | ZDNet
Uber Takes Over 5 Months To Issue Breach Notification
Tim Cook reiterates Apple’s strong privacy stance | Cult of Mac
BlackBerry Delivers Cross-Platform Software And Services Blitz At MWC - Page: 1 | CRN
BlackBerry plans to broaden its cross-platform strategy; to provide its security, productivity, communication tools to iOS, Android, Windows devices - IBNLive
Silent Circle buys out Geeksphone, fully owns Blackphone - SC Magazine
Uber Takes Over 5 Months To Issue Breach Notification - Dark Reading
Stanford: Former Pinal clerk ignored massive data breaches - County News
TalkTalk security breach fuels bogus tech-support scam | ZDNet
Natural Grocers investigating security breach | Steamboat Pilot & Today
Court clerk: Security breach affects hundreds of court cases |
SOAP vulnerability leaves Netgear routers open to hackers
Secure Shell Key Management in Light of OpenSSL Vulnerabilities: Part 2
Google scraps Pwnium security contest in favor of its Chrome Vulnerability Reward Program | VentureBeat | Security | by Ruth Reader
Lenovo admits security issues with Superfish, releases removal tool | ZDNet
HP Buying Aruba Networks for $3 Bln, Targeting Enterprise Networks - Enterprise Hardware on Top Tech News
11 Questions to Ask to Figure Out If Your Company is Covered on Data Privacy
You Don't Have a Strategic CIO? 5 Ways to Fix the Flaw
Hearing to decide hacking damages « Shropshire Star
Hacking hauls grow as security experts rush to catch up |
The internet of things and big data: Unlocking the power | ZDNet
IE exploit added to Angler EK, beats MemProtect mitigation - SC Magazine
Credit card breach at national grocery chain |
MWC 2015: Consumer Trust Key in Development of Identity Solutions - Infosecurity Magazine
F-Secure Extends Privacy Protection Efforts to Step Up Fight for Digital Freedom
Research shows companies recognize the power of combining big data and IoT - TechRepublic
Ten examples of IoT and big data working well together | ZDNet
5 Signs That The Firewall's Not Dead Yet - Dark Reading
White House security breach prompts a temporary lockdown - KFOX - Breaking News, Weather, and Traffic
Hackers possibly hit Natural Grocers
Personal data on 50,000 Uber drivers exposed in breach -
Natural Grocers Investigating Card Breach — Krebs on Security
Over 1 million WordPress websites at risk from SQL injection | ZDNet
Lenovo's Superfish security snafu blows up in its face - CNE
Lenovo's Superfish spectacle: 'Catastrophic' security failures discovered | ZDNet
Million-plus WordPress sites may be vulnerable due to flaw in popular plug-in | PCWorld
'Superfish'-style vulnerability found in games and parental control software | Technology | The Guardian
As many as 1 million+ WordPress sites imperiled by critical plugin bug | Ars Technica
EyeVerify tech lands on ZTE smartphone - Kansas City Business Journal
Executive's guide to IoT and big data (free ebook) | ZDNet
Research: 30 percent of organizations collecting big data | ZDNet
Proofpoint to Acquire Emerging Threats - Infosecurity Magazine
Hackers got to some data of Blue Cross and Blue Shield of Nebraska members
Video nasty as Blu-ray malware routes identified - SC Magazine UK
Vulnerability in Blu-Ray Players can allow hackers to infiltrate into network
Hackers' $1 billion bank theft may still impact consumers - Economic Times
The value of digital data - Columbia Journalism Review
Uber Waits Months To Admit Data Breach, 50,000 Drivers Exposed
Lorie Wigle - Authors & Columnists - Dark Reading
PayPal fills out NFC plans with purchase of mobile wallet Paydiant | ZDNet
Mozilla scrubs Superfish certificate from Firefox
Getting Superfish out of Firefox | Mozilla Security Blog
No Silver Bullets for Security - Dark Reading
Mobile World Congress: Samsung KNOX Gets Keyless Entry App - Infosecurity Magazine
A warning on the rise of mobile threats | IT World Canada Syndicated
Windows 10 For Mobile Takes MWC Stage - InformationWeek
Blackberry teams up with rival Samsung for secure Android - The Times of India
MWC: Lumia 640 hands on review - Labs - a blog from
Windows Server 2016 leaks reveal Nano Server, protected VM role plans | ZDNet
Is cloud computing secure enough for spies? CIA bets on Amazon | ZDNet
Dems: GOP blundered on Homeland Security - National News
Why Homeland Security crisis is about much more than John Boehner (+video) -
Update: transaction processors appeal order denying third-party fees after cyber attack - Lexology
Uber Security Breach Affected Up To 50,000 Drivers
Uber hack: 50,000 drivers may be affected in 2014 security breach.
The Switchboard: Security breach at Uber may have affected tens of thousands of drivers - The Washington Post
Uber Security Breach Exposes 50,000 Drivers
Uber Security Breach of 50,000 Driver's Licenses | Al Jazeera America
Up to 32,000 could be affected by wireless router vulnerabilities: Security firm - Channel NewsAsia
Microsoft, Lenovo scramble to protect users from Superfish security flaw - CBS News
Lenovo admits Superfish is a security vulnerability |
Lenovo PCs had Superfish adware, HTTPS vulnerability | Digital Trends
Security and Vulnerability Management (SVM) Market Worth $9,087.4 Million by 2019 -- DALLAS, March 2, 2015 /PRNewswire/ --
Lenovo Shipped Laptops With Security Flaw, Experts Say - ABC News
Complexity of IoT may slow adoption, warns AVG - Infosecurity Magazine
SOTI MobiControl 12.1 the First to Integrate Android for Work, Samsung KNOX 2.4 and Advanced iOS Enrollment - Press Release - Digital Journal
Sundar Pichai: "Time That We Think Of Hardware, Software And Connectivity Together" - ARC - ARC
Google's wireless service won't take on Verizon and AT&T - Yahoo Finance
Why Security Awareness Alone Won't Stop Hackers
GCHQ experts to teach university students about ethical hacking, penetration testing and security networks - 02 Mar 2015 - Computing News
GCHQ launches Cyber Insiders programme to bolster UK security skills - IT News from
House Hacking: IKEA Uses Qi Wireless Charging in New Products - GeekDad
Banks and Tech Chiefs Unite to Press Congress for Anti-Hacking Bill - Bloomberg Business
Don't Believe the Car Hacking Hype | Doug Newcomb |
Avast anti-virus has reportedly been blocked by the 'Great Chinese Firewall' - The Tech Portal
Fines are few, but healthcare data breaches aren't | Healthcare Finance News
A New Approach To Protecting Healthcare Data Security
TalkTalk Acknowledges Massive Data Breach - eSecurity Planet
The firewall isn't dead - it's just growing up, and policy has to grow with it | Information Age
Jolla hunts for Sailfish OEMs, taps crypto firm to target the enterprise | ZDNet
BlackBerry offers up cloud EMM for enterprise and SMBs | IT World Canada News
BlackBerry to broaden its cross-platform strategy | Reuters
Windows Server to Get Major Changes in a Future Release | Windows Server content from Windows IT Pro Releases All New PCI Policy Templates Packet and Supporting PCI Policies and Procedures Forms for Data Centers Throughout the Globe - Press Release - Digital Journal
#MWC15: Personal Privacy Has Become an Enterprise Issue - Infosecurity Magazine
Saryu Nayyar - Authors & Columnists - Dark Reading
Samsung Mobile Press
Microsoft's new Windows 10 Universal App Platform: A 'superset of WinRT' | ZDNet
Mobile World Congress: Cavium Debuts Secure Mobile Chip - Infosecurity Magazine
DoCoMo App Shares SIM Credentials With Offline Devices | CIO
Apple Watch: Here are five business models it will disrupt | ZDNet
Google confirms plans to become the 'Nexus' of wireless carriers | ZDNet
TalkTalk Data Breach Exposes Customers to Phone Scams - Infosecurity Magazine
Semiconductor firms NXP, Freescale announce $40 billion merger | ZDNet
Dark Reading Offers Cyber Security Crash Course At Interop 2015
Tim Wilson - Authors & Columnists - Dark Reading
Uber Subpoenas GitHub After Driver Data Breach - Infosecurity Magazine
Schneier on Security: The Democratization of Cyberattack
Mobile Security By The Numbers
PlugX APT group uses backdoor in India campaign - SC Magazine
Reddit to donate money to EFF and Tor Project, among others - SC Magazine
Rapid7 Nexpose Ultimate Appliance product review | SC Magazine
Secunia Corporate Software Inspector (CSI) product review | SC Magazine
Akamai acquires intelligent DNS specialist Xerocole | ZDNet
Webcasts - SC Magazine
Tech specs: Samsung Galaxy S6 and Galaxy S6 Edge | ZDNet
Skybox View Enterprise Suite product review | SC Magazine
Tenable Network Security Nessus product review | SC Magazine
Is this an evolution or a devolution? - SC Magazine
10 mistakes companies make after a data breach | CSO Online
March 2015 Issue of SCMagazine
AVG unveils invisibility glasses to defend against facial recognition | ZDNet
Knowledge Corner Spotlight - 28874 :: SEC: Strategic Security Advisory Services for CSOs
Why Hackers Love Companies Who Use Social Media | CIO
DoCoMo app shares SIM credentials with offline devices | CIO
Uber’s Driver Data Breach Hidden For Five Months |
Movius Welcomed Into Samsung Enterprise Alliance Program As An Official Silver Partner | Virtual-Strategy Magazine
[MWC2015] Privacy defending Blackphone 2 and Blackphone tablet announced -
How to keep your email private with PGP encryption on your Mac | Macworld
SOTI MobiControl 12.1 the First to Integrate Android for Work, Samsung KNOX 2.4 and Advanced iOS Enrollment | Virtual-Strategy Magazine
Silent Circle unveils BlackPhone 2, plans BlackPhone+ secure tablet, aims at business | ZDNet
New High-Tech Toys Could Be Vulnerable to Hackers
Brazil Becomes A New Front In The Battle Between Baidu And Qihoo | TechCrunch
Hackers projects shine in 2015 HackIllinois - The Daily Illini : News
Horse rescued from ditch after hacking fall [VIDEO]
Lenovo Offers Antivirus Software for Free After ‘Superfish’ Controversy : Tech : Yibada
Hack gave US and British spies access to billions of phones - Tech News | The Star Online
Data breach from University of Limerick student village - Limerick Leader
AT&T, Microsoft reveal AT&T Mobile Office Suite for SMBs | ZDNet
Movius’ myIDs Secure To Be Shown With Samsung KNOX At MWC
Lenovo website breached, hacker group Lizard Squad claims responsibility
Movius' myIDs Secure To Be Shown With Samsung KNOX At Mobile World Congress In Barcelona | Virtual-Strategy Magazine
BlackBerry takes its device management platform BES12 to the could
Report: Using Malware, Hackers Steal Millions From Banks : The Two-Way : NPR
Silent Circle reveals secure Blackphone 2 phone, Blackphone+ tablet - CNE
Microsoft Security Essentials Removes Superfish Adware - Systems Vulnerable To Attacks
Arrest made in Bangladesh hacking case |
DPRK warns of 'toughest measures' against US-ROK joint annual military drill - Global Times
BlackBerry takes its device management platform to the cloud, AsiaOne Digital News
"Short" hack at computer chip firm ASML - NL Times
ASML suffers hacking attack - Telecompaper
Blackphone+ Tablet is Tailor Made for Tinfoil Hat Wearers | Gizmodo UK Launches PCI Policies and Procedures Packet & PCI Policy Templates for Service Providers Seeking Rapid PCI DSS Certification in 2015 - Press Release - Digital Journal
Gamasutra - Double Fine's 'heartfelt and personal' Hack 'n' Slash: A postmortem
BlackBerry takes its device management platform to the cloud, Technology - THE BUSINESS TIMES
The Marietta Daily Journal
BlackBerry Offers New Mobility Solutions to Sprint Enterprise Customers | Virtual-Strategy Magazine
MWC: Fujitsu unveils rugged Windows 8.1 Pro Stylistic V535 tablet - IT News from
Nokia and NTT DoCoMo show off 2Gbps speeds in 5G trial | ZDNet
Consumer-Privacy Companies Woo Business Customers - Digits - WSJ
Police arrest man in hacking death of Bangladeshi-American blogger Avijit Roy -
Silent Circle Outs Blackphone 2, Blackphone+ Tablet As It Zeroes In On Enterprise Security | TechCrunch
Audience launches a sensor chip that fuses voice and motion | VentureBeat | Mobile | by Dean Takahashi
MWC: Microsoft unveils Lumia 640 and 640 XL ahead of Windows 10 flagship - IT News from
BlackBerry Offers New Mobility Solutions to Sprint Enterprise Customers
Insure People Against Genetic Data Breaches -
BlackBerry Announces New Cross-platform EMM Cloud for Enterprises and SMBs
Phone hacking hearing to decide Mirror damages | UK news | The Guardian
Matt DeHart, the alleged Anonymous hacker, deported to U.S. after Canada refused to grant him asylum | National Post
Biosecurity on farms needs increased - Farming Life
NATO: Defending agains the known unknowns - SC Magazine UK
Canada deports alleged Anonymous hacker Matt DeHart to U.S.
Sigourney Weaver wants hackers to leave J-Law alone |
BlackBerry launches cloud edition of BES12 | ZDNet
Hackers steal up to $1 billion in huge online bank heist | Digital Trends
Estonia's pro-West party wins election focused on neighboring Russia
How do you solve a problem like mobile security? - SC Magazine UK
SOTI MobiControl 12.1 the First to Integrate Android for Work, Samsung KNOX 2.4 and Advanced iOS Enrollment
Samsung's new Galaxy S6: Too much like the iPhone? - CNE
Hackers steal up to $1 billion from banks, security firm says - LA Times
Deepsec 2014 - A Tale Of An Unbreakable, Context-Specific Xss Sanitizer
Deepsec 2014 - An Innovative And Comprehensive Framework For Social Vulnerability Assessment
Deepsec 2014 - Build Yourself A Risk Assessment Tool
Deepsec 2014 - Bending And Twisting Networks
Deepsec 2014 - Addressing The Skills Gap
Deepsec 2014 - Cert.At - Daily Business In A Nutshell
Deepsec 2014 - Advanced Powershell Threat - Lethal Client Side Attacks Using Powershell
Deepsec 2014 - Cloud-Based Data Validation Patterns - We Need A New Approach
Deepsec 2014 - Cognitive Bias And Critical Thinking In Open Source Intelligence Osint
Intel announces brand levels for Atom processors | ZDNet
Closing the gate: Data leak prevention - SC Magazine
Hackers target hedge funds to manipulate trading algorithms - SC Magazine UK
IBM eyes $40 billion in cloud, big data, security revenues by 2018
Malware on the move: Mobile malware - SC Magazine
How SSL encryption gives a false sense of security - WhaTech
Connected Data Expands Product Portfolio - Press Releases on Top Tech News
Madonna hacker indicted in Israel |
Uber says security breach affected about 50,000 drivers - Tech News | The Star Online
An unusual and innovative approach to Java security - SC Magazine
Ashley Carman bio and recent articles
News briefs: Barrett Brown sentenced, research from Qualys and Dell SecureWorks - SC Magazine
Global Mobile Security Market to Reach $34.8B by 2020 | News | Hospitality Magazine (HT)
Connected Data Expands Product Portfolio - Press Releases on CIO Today
Company news: New additions at ESET and Norse, ZeroFOX acquires Vulnr - SC Magazine
Threat of the month: Spear phishing - SC Magazine
Skills in demand: Application security engineers - SC Magazine
Me and my job: Bob West, chief trust officer, CipherCloud - SC Magazine
Apple under scrutiny in Labor's tax loophole crackdown proposal | ZDNet
DigitalBTC boss defends bitcoin amid half-year losses | ZDNet
Homepage - Dark Reading Cyber Security Crash Course
Travels with My Censor - The New Yorker
Challenges of a splintered market: Cybersecurity spending - SC Magazine
Bad movie: Hackers can raid networks with burnt Blu-Rays • The Register
Dark Reading - March 2, 2015
Back To The Future of Real-Time Applications | ZDNet
From Hacking Systems To Hacking People - Dark Reading
High “return-on-learning” | MIT News
Rebekah Brooks rehired by Rupert Murdoch's News Corp after hacking saga | South China Morning Post
HTC announces Grip, its first wearable : News, News - India Today
Five Easiest Ways to Get Hacked - Part 2 - Dark Reading
HTC Grip Takes Fitness Seriously, But Not Style - Personal Tech News - WSJ
'The Walking Dead' Review: "Remember"
MapR Extends Real-Time Capabilities to Distributed Data | Data Center Knowledge
PayPal terminates services to Mega | ZDNet
The week in security: Superfish a super problem, ransomware too - CSO | The Resource for Data Security Executives
Hearing to decide hacking damages -
How a Blu-ray disc could install malware on your computer | CIO
Tom Tancredo: Politics not as usualLos Angeles Post-Examiner
Google Innovates the Pwnium Hacking Program to a Year-Round Bug Bounty : Trending News : Venture Capital Post
Downtown Lynchburg treated to doughnut delights at Mama Crockett’s - Work It, Lynchburg: News
Data-Breach Suits Make Headway | National Law Journal
Boehner Pressed to Break Stalemate - WSJ
MIS-Asia - Personal data on 50,000 Uber drivers exposed in breach
CraveOnline Hosts 'Hackers' in 35mm on Friday, March 6!
iTWire - How SSL encryption gives a false sense of security
China's latest cyberwar: The battle for New Year train tickets - Tech News | The Star Online
Why advanced interconnections are vital for cloud service providers | Networks Asia
Acquisitions hit Inabox half-yearly profits | ZDNet
Youngstown News, Tying immigration to Homeland Security will kill GOP, Republican King says
美英被曝入侵最大SIM卡制造商_ 视频中国
DPRK warns of "toughest measures" against U.S.-ROK joint annual military drill | GlobalPost
How to Keep Your Company Safe & Out of the Headlines - Webcast - 2015-02-26 13:00:00 ES
How SSL encryption gives a false sense of security - Media Releases - CSO | The Resource for Data Security Executives
Immigration-DHS funding: Senate, House Republicans at odds over how to fund the Department of Homeland Security.
BlackBerry wants to bring its secret sauce to iPhone, Android - CNE
GOP discord undercuts efforts to fund DHS - The Washington Post
Rebekah Brooks Poised to Return to News Corp After Hacking Scandal
Myer CIO takes CEO reins | ZDNet
DPRK warns of "toughest measures" against U.S.-ROK joint annual military drill - Xinhua |
DPRK fires two missiles as US-ROK kick off their joint war games -
DPRK will never remain a passive onlooker to U.S-ROK military drills -
Special report: data management – Heads in the Cloud | Analysis | The Lawyer
Rebekah Brooks Poised to Return to News Corp. | Variety
TidBITS: VLC Media Player 2.2.0
CUPP Computing to Demonstrate Mobile Security Engine Technology at MWC 15
Death of Avijit Roy: A sign of fundamentalism in Bangladesh - The Economic Times
Sigourney Weaver wants hackers to leave J-Law alone | Irish Examiner
Leave Lawrence alone, says Weaver -
Rebekah Brooks about to be rehired by Rupert Murdoch for US operation | Media | The Guardian
BlackBerry to broaden its cross-platform strategy |
Device use puts data control in spotlight - The Scotsman
Can Samsung resharpen its edge against the competition? | ZDNet
「カード決済&セキュリティのすべて」 « ペイメントナビ - カード決済、PCI DSS、ICカード・ポイントカードの啓蒙ポータルサイト
Samsung Pay takes on Apple Pay as mobile payments war heats up - CNE
Lenovo to offer free McAfee LiveSafe security software to users whose laptops were shipped with Superfish - IBNLive
Сноуден: Обама развивает то, от чего обещал отказаться
New York job lures Rebekah Brooks after new offer from Rupert Murdoch | Daily Mail Online
Why Google Is Offering Hackers an ‘Infinity Million Dollars’ | KTIC Radio Hacked, but Soon Restored After Intervention by CloudFlare
Rupert Murdoch to rehire editor acquitted in phone-hacking scandal
Uber Technologies Inc. Reveals Data Breach That Targeted 50,000 Drivers Nearly A Year Later
Merchant e-Solutions Selects ControlScan for Data Security and Compliance Partnership | Business Wire
IBM targets $40 billion in cloud, related revs in 2018| Reuters
Book Claims Terrorists Using eBay, Reddit, Porn to Plot Attacks
Personal data on 50,000 Uber drivers exposed in breach | CSO Online
Samsung hopes not to fall off cliff edge with skinny Galaxy S6 and S6 Edge BIG REVEAL • The Register
Samsung Unveils Galaxy S6, S6 Edge at Mobile World Congress 2015
The San Francisco company says it has changed the access protocols for its database to prevent similar breaches
Lenovo stops pre-loading 'bloatware' on PCs - Security - News -
HTC Vive is SteamVR, a virtual reality headset set to change the market entirely | PC Pro
House Republicans Vow to Continue Battle Against Immigration Measures - WSJ
Las Vegas' Grand Bazaar Shops targets millennials
Republican: No pledge to Democrats on Homeland Security vote | |
Apple Watch demo area being built for March 9 event - SlashGear
Boehner: GOP infighting an "argument over tactics" - CBS News
BlackBerry to broaden its cross-platform strategy | Brantford Expositor
BlackBerry to broaden its cross-platform strategy
COMMUNITY BRIEFS: Celebrate St. Patrick’s Day at American Legion Post 667
Leonard Nimoy: Mr. Spock is my IT hero. How about you? | ZDNet
HTC One M9 arrives along with Vive VR headset and Grip smart band | The Financial Express
HTC And Under Armour Are Doing A Fitness Wearable | TechCrunch
Hackers steal £650m – 10 ways to protect your bank account - Telegraph
BlackBerry to broaden its cross-platform strategy | Simcoe Reformer
BlackBerry to broaden its cross-platform strategy | Sudbury Star
Corporate Watch: News Digest - WSJ
Damon Carson: Google-hacking, part two - Longmont Times-Call
What Healthcare Boards Need to Know About Hacking - Health Data Management Magazine Article | Health Data Management
ASPG Enables Multi-Factor Authentication for z/OS Security Systems
3-D Printing DNA: Hacking Life's Code and Creating New Organisms - Hit & Run :
BlackBerry to broaden its cross-platform strategy| Reuters
HTC takes aim at Fitbit and Jawbone with the Grip exercise tracker
Samsung Galaxy S6 launch live from Barcelona - The Times of India
BlackBerry to broaden its cross-platform strategy | Sault Star
Samsung's new Galaxy S6 and S6 Edge put design first | The Verge
The stereo curve! Samsung unveils the Galaxy S6 edge - it's real and it's here!
Samsung reveals sixth-generation Galaxy S6 and curved Galaxy S6 Edge | PCWorld
A mobile payment battle is blazing | Computerworld
PHOTOS: MWC 2015: Check out the HTC Grip smart band in just 8 slides | The Indian Express
The Story Behind Samsung’s Galaxy S6 And S6 Edge Design Departure | TechCrunch
This Week in GameTech - Valve Enters VR; Net Neutrality Begins; Nvidia Faces Lawsuit - GameSpot
Dems call GOP Homeland Security strategy a political blunder - US News
Say hi to the new HTC: One M9 phone, fitness band, VR headset - CNE
News from Macon and Warner Robins, GA, and beyond | The Telegraph
Data breaches fuel new era of tax fraud | TheHill
MWC underway: LG & Huawei unveil smartwatches, HTC & Valve announce 'Vive' virtual reality headset - TechSpot
Chinese surveillance camera supplier confirms hacking loophole | South China Morning Post
HTC Vive: Virtual reality headset built in partnership with Valve | BGR
​Huawei brings analog style to its first digital smartwatch - CNE
Hands On: HTC Grip Activity Tracker | News & Opinion |
Identifying the 'things' in the Internet of Things - Computer Business Review
Republican: No Pledge to Democrats on Homeland Security Vote - ABC News
HTC One M9 First Impressions: Do the Evolution | NDTV Gadgets
Alcatel OneTouch Idol 3 can take phone calls even when upside down
HTC Grip Review, Pt. 1: Hands on with the HTC Grip | BGR
HTC One M9: The devil is in the details (hands-on) - Pocket-lint
Blog: Republicans need to learn how to turn the tables on the MSM
Susquehanna Independent Weekender | | Serving Montrose, Pa. and surrounding communities » Susquehanna considers ‘BYOD’
Uber data breach compromises IDs of 50,000 drivers
HTC One M9 release date, specs announced at MWC 2015 | BGR
Information security goes mainstream - KMWorld Magazine
Why Homeland Security crisis is about much more than John Boehner -
Hacker in a day: why you should learn how to hack a system - London Life - Life & Style - London Evening Standard
Dems not alone in criticizing GOP Homeland Security strategy | The Columbian
Big Brother 2.0: 160,000 Facebook pages are hacked a day | New York Post
IBM Outlines Profit Plan Focusing on Cloud, Analytics, Security - Enterprise Software on CIO Today
Anthem hack offers big lessons for business, consumers
Kaspersky Lab Boosts Support for its Partners and Targets Growth in the Enterprise Sector - Zawya
Terrorists using eBay and Reddit to send coded messages: Mossad | New York Post
Republicans’ Homeland Security move called political blunder | WANE
ManageEngine Adds Traffic Shaping, PCI DSS 3.0 Compliance to Network Management Solutions | Technuter
Asavie and zvelo Bring Security and Cost Control to the Mobile Web | Business Wire
Telecoms firm TWL Voice and Data hires business development manager - Wales Online
Edward Snowden film wins Oscar - Common Ground | Common Ground
Lenovo PCs ship with adware that puts computers at risk | CIO
How Lenovo's Superfish 'Malware' Works And What You Can Do To Kill It - Forbes
Banks 'lose millions to hackers' -
vXchnge Exceeds Auditing Standards for Multiple Data Center Security Certifications; Continues to Provide Best-In-Class Security Measures to Customers
Uber under fire over data breach for up to 50,000 drivers
‘Be My Eyes’ app: A solution in sight – The Express Tribune
Prominent US blogger hacked to death in Bangladesh in front of wife | News Nation
A Cryptographer Vision For Protecting Freedom In The Cyberwar Era
TSC hacking, secularism and silent police
Superfish fallout: Lenovo to give free McAfee subscription - The Times of India
Hackers Said to Remain Active in U.S. State Department E-Mails - Bloomberg Business
Avast Software Introduces "Avast for Business" for Small and Medium-sized Businesses
Pioneer Press, St. Paul, Minn., Rubén Rosario column
Dems call GOP homeland security strategy political blunder
360 Total Security vs AVG vs Avira vs Avast – Four Of The Best Antivirus Software
IBM Outlines Profit Plan Focusing on Cloud, Analytics, Security - Tech Trends on CIO Today
ManageEngine Adds Traffic Shaping, PCI DSS 3.0 Compliance to Network Management Solutions - Zawya
Sprint, T-Mobile not meeting all cell phone unlocking policy commitments, advocate says - FierceWireless
The truth about Apple Mac security, and it's not good | One Page |
China’s latest cyberwar: the battle for New Year train tickets - The Malaysian Insider
Uber announces data breach 9 months after incident -
Facebook's 2014 Bug Bounty Program Awarded $1.3M - Network Security on CIO Today
Homeland Security panned for passing on bio-threat technology | TribLIVE
KM infrastructure for the life sciences virtual organization - KMWorld Magazine
Facebook's 2014 Bug Bounty Program Awarded $1.3M | Sci-Tech Today
India flagged most number of Facebook bugs in 2014 | The Indian Express
Burning Man got killed by hackers and Grover Norquist. What’s next? - San Francisco Chronicle
Republican Congress struggles for stable footing as funding standoff continues - LA Times
Va. labs, businesses engineer ways to fight hackers | |
Apple Likely Building Apple Watch Demo Area at Yerba Buena Center - Mac Rumors
Nerd Chick Adventures: Lenovo pre-installed adware breaks secure Internet connections - Redding
Uber says data breach affected 50,000 drivers
Lenovo to Allay Security Concerns With Free McAfee LiveSafe Subscriptions | NDTV Gadgets
Report: Lenovo only collected $250,000 from Superfish installations
Apple constructing outdoor building next to Yerba Buena, likely demo area for Watch event on March 9th | 9to5Mac
Family Things to Do: Sunday, March 1 to Saturday March 7 - The Herald Journal: Allaccess
Apple Watch release date, price & specs: Unveiling expected at 9 March event | IT PRO
Uber announces data breach 9 months after incident -
U.S. DOJ indicts man on hacking charges, identity theft for stealing pre-release films back in 2010 - AfterDawn
Tim Cook to governments: Lay off our privacy - CNE
Rubén Rosario: Who's safe from risk of identity theft? No one -
Morgan Stanley Probe Said to Examine If Adviser Hacked - Bloomberg Business
Uber says data breach affects 50,000 drivers - Launches PCI Policy Templates Packet for the Hotel and Lodging Industry for Helping Achieve Compliance with Version 3.0 Standards. | Virtual-Strategy Magazine
Lenovo cuts pre-installed software, offers free anti-virus following Superfish disaster | The latest news from the Computer and IT Industry | PC Retail
ASPG Enables Multi-Factor Authentication for z/OS Security Systems
Uber says it got hacked — over nine months ago | New York Post
Uber under fire over data breach for up to 50,000 drivers |
Uber says database containing driver info was breached | and The Tampa Tribune
Millions Of Georgians Impacted By Insurance Company Data Breach « CBS Atlanta
50,000 Uber driver names, license plate numbers exposed in a data breach | Ars Technica
Report: 5 billion Google Android apps are vulnerable to cyberattack
Windows Server 2003's Critical Deadline Is Fast Approaching --
Symantec Corp.'s CyberWar Games - Silicon Valley Business Journal
How Much Did The Target, Home Depot Breaches Really Cost? |
Dems: GOP Homeland Security strategy a political blunder
Gartner’s 2014 eDiscovery Magic Quadrant & the Quest for the Holy Grail | Symantec Connect
How data from fitness trackers, medical devices could affect health insurance.
Worried About Superfish? Worry More About Komodia SSL Hole And Here's Why : PERSONAL TECH : Tech Times
Central PA Local News, Breaking News, Sports & Weather -
Tor Browser 4.0.4 Released - Hacker News
WhatsApp Web Client Now Available on Firefox and Opera Browsers - Hacker News
offthehook | 2600
Intelligence Driven Governance, Risk and Compliance - YouTube
5 things consumers should do about the Anthem hack - MarketWatch
FreeBSD Security Advisory - BIND Denial Of Service ≈ Packet Storm
Secure rm 1.2.15 ≈ Packet Storm
D-Link / TRENDnet ncc2 CSRF / Unauthenticated Access ≈ Packet Storm
The U.S. Doesn't Like It When China Needs To Construct Encryption Backdoors
Madonna hacking suspect indicted Launches PCI Policy Templates Packet for the Hotel and Lodging Industry for Helping Achieve Compliance with Version 3.0 Standards. – Press Release Rocket
Vulnerability Note VU#366544 - Adtrustmedia PrivDog fails to validate SSL certificates
Connected Data Expands Product Portfolio | NewsFactor Network
Jeff Jones sur Twitter : "Listening to General Keith Alexander talk about cyber threat at #microsoft #fedforum15"
Transforming Government
Juniper Networks sur Twitter : "Since it's #eweek15, we decided to have 2 winners! Congrats @pedubra @nupur_kanoi! Thanks for playing #JuniperTrivia"
Daily Video: Juniper Unveils New Routers for Mobile Networks
Medical identity theft affected two million victims in 2014
CloudFlare crypto gets faster on old mobes • The Register
Paranoid Android Kaymera smartmobe takes on Blackphone • The Register
Trend Micro awarded “Best Protection” by AV-Test Institute -
Police probe video of possible data hack at the National Archives | TheHill
Please, DO Sweat the Small Stuff! -
'Human OS' Plays Big Role in Social Engineering Risk
3 Things We Learned About the IoE in 2014 - Security News - Trend Micro USA
Arid Viper Update: Attacks Ongoing, Threat Actors on the Move
U.S. offers its largest bounty for Zeus hacker Borgachev - SC Magazine
Florida law enforcement docs show widespread stingray use, secrecy - SC Magazine
California dentist announces theft of server containing patient information - SC Magazine
RSA Conference Proudly Expands Into Abu Dhabi! – Blog Post
The Library of Sparta: Applying Military Doctrine to CyberSecurity – Session – RSA Conference
Moxie Marlinspike >> Blog >> GPG And Me
Web Security - TRITON AP-WEB —
Burning Man says hackers cut line for coveted tickets - SFGate
Games, Music and Shopping Apps Hit Smartphones Hardest | AVG Now Blog
16 year old teen hacks Department of Educations websites and alters his grade
New Dorp High School students call for leniency for classmate who hacked into records |
New York teen allegedly hacked school's network to adjust grades
Teenager Hacks High School To Improve Grades
Congress passes one-week stopgap Homeland Security bill -
Veilige toegang tot de Cloud | Business & IT Security | Computable
Julie Jason: Check to see if you and Social Security agree - Connecticut Post
Uber reports months-old data breach that affected 50,000 drivers
Benecard employees say fraudulent tax returns filed through data breach |
Latin America: Washington’s Prying Eyes
Uber breach could affect the data of 50K drivers - CNE
The Best 5 Free Antivirus Programs for your Android Device
WatchGuard M500 Appliance Alleviates HTTPS Performance Woes
How to protect your patients from fraudsters | Optician
Galaxy S6, S6 Edge revealed in new leaked image - CNE
Uber Was Hacked Last May | News & Opinion |
Congress passes one-week Homeland Security bill - Capital Press
US Lawmakers Extend Domestic Security Funding for a Week
Uber reveals that they were hacked | National Monitor
Democrats call Republican's Homeland Security strategy a political blunder - The Portland Press Herald / Maine Sunday Telegram
Some Bitdefender products break HTTPS certificate revocation | CIO
Android for Work Brings Container Security to Google Play Apps | CIO
Europol and security vendors disrupt massive Ramnit botnet | CIO
Lenovo's Brand 'Buzz' Score Takes Hit After Superfish Crapware Flap | CIO
Trustwave: Smart Security On Demand
New Forescout CEO Wants to Make Partners an Offer They Can’t Refuse | CIO
Google Scrubs Pwnium Hack Contest | CIO
How to remove bloatware from your PC
Like Google in Vietnam, Lenovo tripped up by a DNS attack | CIO
Kaspersky Lab Unveils Cybersecurity Startup Accelerator | CIO
Lenovo Vows to Stop Shipping PCs with Third-Party Bloatware After Superfish Fiasco | CIO
Dtex Software Fights Insider Threats | CIO
The Upload: Your tech news briefing for Thursday, February 26 | CIO
Twitter adds more reporting tools to curb abuse and improve safety | CIO
Personal data on 50,000 Uber drivers exposed in breach | CIO
Researchers Uncover Signs of Superfish-Style Attacks | CIO
D-Link remote access vulnerabilities remain unpatched | CIO
Hackers exploit router flaws in unusual pharming attack | CIO
Facebook fixed 61 high-severity flaws last year through its bug bounty program | CIO
Is Your Security Software Sitting Unused on the Shelf? | CIO
Lenovo website hacked in wake of Superfish debacle | CIO
Uber reveals hacking, 50K drivers may have been exposed | VatorNews
Uber discloses data breach | Bangkok Post: tech
Mobile World Congress: Great Expectations
Hackers Steal up to $1 Billion From Banks, Security Co. Says - ABC News
How to Remove Lenovo Superfish/Visual Discovery
Like Google in Vietnam, Lenovo tripped up by a DNS attack | ITworld
Lenovo releases tool to purge Superfish 'crapware' | Computerworld
Google Online Security Blog: Pwnium V: the never-ending* Pwnium
Beware the insider threat
Some Lenovo PCs ship with adware that puts users at risk | Computerworld
Anthem's latest breach estimate says 78.8 million were affected | Network World
Senator quizzes Samsung, LG on smart TV privacy | Computerworld
Twitter takes small steps to finally deal with its harassment problem | PCWorld
In a post Superfish world, it's time to hold PC vendors more accountable for adware | PCWorld
Google patches $310K worth of Chrome, Chrome OS bugs | Computerworld
Phish pharm: Cybercriminals use phishing to exploit router vulnerabilities and carry out man-in-the-middle attacks | Proofpoint - Enterprise Email Security, Email Archiving, and Privacy Protection Solutions
Samsung faces complaint in US FTC over Smart TV 'surveillance' | ITworld
Lenovo website hacked in wake of Superfish debacle | Computerworld
Iran hacked a US casino, US says | Money - KETV Home
Dems call GOP Homeland Security strategy a political blunder ::
Uber Confirms Database Breach Exposed Information For 50,000 Drivers
Local News | The News Tribune
Hackers stole from 100 banks and rigged ATMs to spew cash |
Gemalto Sees No Significant Impact from Hacking Issue - NBC News
Bring Your Own Device To Work Programs: Regulatory and Legal Risks and How To Minimize Them | The National Law Review
Uber discloses data breach, numbers theft | SBS News
Taking down cyber-hackers - Winnipeg Free Press
Democrats to the Rescue: Congress Averts Shutdown for One More Week -
Dems Call GOP Homeland Security Strategy a Political Blunder - ABC News
IWF - Net Neutrality Will Become the Internet’s ObamaCare
ForeScout Appoints Former Intel Security President Michael DeCesare as CEO
WD Adds New High-Performance My Cloud Network Drives | Digital Trends
Uber discloses data breach affecting about 50,000 drivers | PropertyCasualty360
Iran hacked a US casino, US says | Project Economy - WMUR Home
Julie Jason: Check to see if you and Social Security agree - StamfordAdvocate
Android for Work Brings Google Back to the Office | Digital Trends
Half of companies have no mobile device management policy | Tablets News | TechRadar
Uber hack leaves 50,000 drivers looking vulnerable | Digital Trends
Fork me! Uber hauls GitHub into court to find who hacked database of 50,000 drivers • The Register
Iran hacked a US casino, US says | Money - Home
Conrad Black: Alarm bells must ring in response to the government’s new anti-terror bill | National Post
How to get the most from Social Security - MarketWatch
Charge Your Phone By, Um, Wanking - The Daily Beast
The US Helped Create International Law, Now We Just Ignore It | Mother Jones
US-based Bangla blogger hacked to death in Dhaka - The Times of India
Google to launch new payment API Android Pay | ZDNet
Anthem: Non-customers may have been hit by hack - CNE Releases its All New PCI Policies and Procedures Packet for eCommerce Merchants & Online Payment Processing Websites Seeking Compliance with PCI DSS Version 3.0 - Press Release - Digital Journal
IBM Aims For $40 Billion Annual Revenue From Cloud, Big Data, Security, And Mobile : BIZ TECH : Tech Times
Lenovo set to 'signifcantly reduce' preloaded applications after Superfish - from
House fails to pass funding bill for homeland security
Lenovo's Superfish screwup highlights biggest problem in software - CNE
Data Breach At Uber May Affect Up To 50,000 Drivers - BuzzFeed News
Google may separate Hangouts and Photos from Google+ |
Uber data breach may have exposed 50,000 drivers across U.S. - NY Daily News
New 2015 MacBook Air Release Date: Unveil on March 9 Alongside Apple Watch? : Tech : Latin Post