Amit Mital – Speaker – RSA Conference
Should businesses worry about wearables?
ICANN systems breached via spear-phishing emails
US Congress member calls Rajnath over terrorism and cyber security - Firstpost
North Korea probably not behind Sony Pictures hack, says cyber security expert - video | Technology | The Guardian
How to Identify Yourself, Digitally
Bugtraq: Apple iOS v8.x - Message Context & Privacy Vulnerability
Global Internet Authority ICANN Has Been Hacked - Hacker News
100Mbps Internet available to 59% of US, while gigabit still at just 3% | Ars Technica
CoolReaper pre-installed malware creates backdoor on Chinese Androids • The Register
Phishing Scams & Identity Theft Protection – Don’t be that Guy – Trend Micro
Ars Technica readers urged to change passwords in wake of hack
Gmail Google Drive and security features: Google updates email service | BGR
Pivot3's Hyper-Converged Disaster Recovery Appliance
Cuba Is Getting the Internet | Motherboard
Boardroom or Baby? Why are there so few women in tech?
Hackers rejoice: Sony pulls Korea film, bows to criminal pressure | ZDNet
Apps, not malware, should be your biggest mobile concern -- GCN
Information Security News: Why the Sony hack is unlikely to be the work of North Korea.
Information Security News: ICANN HACKED: Intruders poke around global DNS innards
UC Berkeley hack: Personal data on 1,600 people possibly compromised - LA Times
Data Loss Prevention: Data In Motion Lab
Connected cars: a cyber-security nightmare on wheels | News | TechRadar
The Changing Landscape of BYOD
3 OpenStack Predictions For 2015 - InformationWeek
TorrentLocker ransomware pestilence plagues Europe, bags $500k • The Register
Tulsi Gabbard, Rajnath discuss terrorism, cyber security
The Evidence That North Korea Hacked Sony Is Flimsy | WIRED
Geers: , 18 December 2014
What does the Future hold for Women in Tech
Pivot3 Simplifies Backup And Disaster Recovery With Hyper-Converged Infrastructure Appliance
'CoolReaper' backdoor uncovered in CoolPad Android devices - Computer Business Review
Most IT Pros Ill-Prepared to Deal With Breaches
Delta security flaw let passengers access others' boarding passes
Built-In Backdoor Found in Popular Chinese Android Smartphones - Hacker News
The FBI Used the Web's Favorite Hacking Tool to Unmask Tor Users | WIRED
Thoughts on Mobile Digital Parenting
Technology is still a distraction for drivers
Dll Injection
Geers: "You can find traces of its real-world conflicts in cyberspace", 18 December 2014
Angelina Jolie Has a Cyber-Security Team To Protect Her Kids Online
Ex-Sony employees sue, claim company failed to protect data| Reuters
Python Forensics Review
How employees put your company at risk during the holidays
Social sniffer predicts which Nigerian prince has the best chance of scamming you • The Register
Only 1% of consumers feel safe using mobile payments
Wiper Malware – A Detection Deep Dive
10 Notorious Cyber Criminals Brought to Justice - #8
Nsc - Alex Ionescu - "Breaking Protected Processes"
Sony Pictures: The Data Breach And How The Criminals Won - Forbes
HP Blogs - 2014 Tape Market State of the Union - The HP Blog Hub
Four key areas of security solutions Singapore companies need to invest in | Networks Asia
Bugtraq: Jease CMS v2.11 - Persistent UI Web Vulnerability
Anonymous hacks Swedish govt emails over seizure of Pirate Bay servers — RT News
The Storage Industry Is Due For A Shake Up | BCW
Watch "James Bond 'Spectre' script stolen in Sony hack" Video at SCMagazine
Could Sony Hack Scare Other Companies Into Beefing Up Cybersecurity? - NBC News
Nsc - Andrea Barisani - Forging The Usb Armory
Seattle-based attorneys suing Sony Pictures over data breach |
10 Important Factors That Make Symantec™ SSL Certificates #1
No theaters, no VOD for 'The Interview'
Sony Hack: 3 Reasons People Think North Korea Did It
URL LOL: Delta splats web flight boarding pass snoop bug • The Register
Sony cancels The Interview flick launch amid terror threats • The Register
ARN Storage Roundtable - Ensuring business continuity and building opportunities - ARN
Red Hat Security Advisory 2014-2008-01 ≈ Packet Storm
Red Hat Security Advisory 2014-2009-01 ≈ Packet Storm
Fwknop Port Knocking Utility 2.6.5 ≈ Packet Storm
Angelina Jolie and Brad Pitt Hired a Cyber Security Team for Their Kids
PCI Geomatics Announces Student Licensing availability via Partnership with Studica Academic Reseller |
WSCED: Top 5 Online Holiday Safety Tips for Cousin Eddie -
No laughing matter: Why your company’s IT security isn’t a joke | Windows IT Pro Guest Blogs
Juniper Networks
Nsc - Andrea Allievi - "Understanding And Defeating Windows 8.1 Patch Protections"
Google’s SHA-1 Deprecation Plan for Chrome | Symantec Connect
Apple wins class-action lawsuit over iPod copyright management - SC Magazine
North Korea Almost Certainly Did Not Hack Sony | WIRED
IoE 101: How to Explain All Things Smart, Wearable, and IoE - Security News - Trend Micro USA
Phishing email contains Word doc, enabling macros leads to malware infection - SC Magazine
Landmark HIPAA settlement confirms push to firm up patching schedules - SC Magazine
Former employees sue Sony, theaters drop 'The Interview' - SC Magazine
How Secure Are Temporary Messaging Apps for Work? | Re/code
Mobile RAT Xsser continues to threaten Android, iOS device security - SC Magazine
10 cybersecurity predictions for 2015 | CSO Online
New York establishes new cyber security examination process for financial institutions - Lexology
Cisco Global Cloud Index: Global Data Generated Annually by Internet of Everything (IoE) Devices - YouTube
Setting the wrong precedent: Top theater chains drop Sony's 'The Interview' after threats | CSO Online
40% rise in vulnerabilities: OpenSSL, Google Chrome and IBM worst offenders - SC Magazine UK
NIST drafts new cloud metrics guide - SC Magazine
What Network Security Lessons Can We Learn from the Sony Attack?
Uninstall AVG PC TuneUp | AVG
EdgeWave nets additional $2 million in funding |
AWS re:Invent Round Up -
Why compliance matters - SC Magazine
2014 Industry Innovators: Access Control - SC Magazine
Tis the Season for…Financial Crime - Websense Insights
AntiVirus Security - FREE - Android Apps on Google Play
UPDATED: 18 Questions (and Answers) About Google, Site Speed, and SEO | Radware Blog
Nsc - Sebastien Dudek - Homeplugav Plc: Practical Attacks And Backdooring
Angelina Jolie Hired a Cyber Security Team for Her Kids | Cambio
(IN)SECURE Magazine
Phishing quiz: Can you spot a scam when you see one? Don't be so sure - CBS News
70% of Employees Admit Having Unnecessary Access to Confidential DataThe State of Security
2014 Was the Year of the Data Breach, But 2015 Could Be Worse
What You Googled in 2014: Robin Williams, ‘Flappy Bird,’ ‘Frozen’ - Digits - WSJ
Best Buys That Could Lead to the Worst Shams - Security News - Trend Micro USA
Blue Coat Cloud Security Service and Threat Intelligence Solutions Win Information Security 2014 Readers' Choice Awards
An epic ride: A look back at the ever-changing information security industry - Print Article - SC Magazine
Quantum physics behind 'unhackable' security authentication - SC Magazine UK
Threats at Sea: A Security Evaluation of AIS - Security News - Trend Micro USA
HP Security Bulletin HPSBMU03221 1 ≈ Packet Storm
HP Security Bulletin HPSBOV03225 1 ≈ Packet Storm
HP Security Bulletin HPSBOV03226 1 ≈ Packet Storm
Grinch Bug Could be Worse Than Shellshock, Says Experts
10 changes you can make to achieve security serenity now! | CSO Online
New ransomware avoids hitting the same victim twice | CSO Online
ICANN targeted by Spear Phishing attack, several systems impacted | CSO Online
Linux 'grinch' vulnerability could put a hole in your security stocking | PCWorld
Skimming at Virginia ATMs, more than 3,000 Union debit cards compromised - SC Magazine
ICANN hackers sniff around global DNS root zone system • The Register
Ars was briefly hacked yesterday; here’s what we know | Ars Technica
HP Selects Trend Micro Deep Discovery to Help Fight Targeted Attacks -
Dr. Cleaner: Trend Micro’s Free Utility App Will Optimize Your Mac’s Disk and Memory -
Current connections not up to standard: Juniper Networks | ZDNet
Infonetics Report
Delta Airlines Patches Boarding Pass URL BugThe State of Security
Sony Ex-Workers File Suits Against Company Over Data Breach : Tech : News Every Day
Experts discover TorLocker variant targeting Japanese speakers - SC Magazine
Angelina Jolie, other stars slammed in hacked Sony emails – The Lead with Jake Tapper - Blogs
Nsc - Richard Johnson - "Fuzzing And Patch Analysis Sagely Advice"
Attack Mitigation Service: Cyber Security Just Got Easier
Dutch DPA fine over privacy violations could cost Google $18.6M - SC Magazine
Chris Crowley sur Twitter : "#sanscdi #sec575 #Ctf underway. #gas. @joswr1ght"
Kaspersky Lab Survey: Half of Companies Put Themselves at Risk by Undervaluing DDoS Countermeasures | Kaspersky Lab US
PCI Synthesis Sponsors New England CRO/CMO Council
Raising Your Threat Intelligence - The State of SecurityThe State of Security
The Dawn of the Flying Smartphone | Motherboard
Bugtraq: Morfy CMS v1.05 - Command Execution Vulnerability
McAfee sur Twitter : "Oh hackers, oh hackers—thy tricks are so unchanging. Don't fall for these #12Scams."
How to Become a CISO - Dark Reading
NorthStar Controller, explained by an English Scho... - J-Net Community
Paul Kocher – Speaker – RSA Conference
Can't stop Home Depot-style card pwning, but suppliers will feel PCI regulation pain • The Register
Former Sony employees sue studio over 'nightmare' data breach | The Japan Times
Bugtraq: Cross-Site Scripting (XSS) in Revive Adserver
Bugtraq: Bird Feeder v1.2.3 WP Plugin - CSRF & XSS Vulnerability
Kaspersky Internet Security 2015 | Kaspersky Lab US
Kaspersky Internet Security - Multi-Device 2015 | Kaspersky Lab US
Onapsis Appoints Enterprise Information Security Expert Renee Guttmann to Board of Advisors - MarketWatch
The biggest challenges faced by CIOs/CISOs heading into 2015 | CSO Online
Anonymous Hacks Swedish Government in Revenge for 'Pirate Bay' Takedown - Hacker News
Revolutionary Quiz - Juniper Networks
Backdoors: What They Are and How to Defend Networks against Them - Security News - Trend Micro USA
Google starts blocking badly behaving Gmail extensions
Bluster, bravado and breaches: Today's 'terrorist' players in cybersecurity | ZDNet
Constant attack a growing reality - SC Magazine UK
Local news from Rock Hill, SC | The Herald
2015 predictions: The always-on business, cloud, security, data explosion and IoT | Enterprise Innovation
Researchers warn of new OphionLocker ransomware - SC Magazine
Sony Sued By Ex-Staff Over Draft Security, Leaked Privates ≈ Packet Storm
Sony Cancels Premiere Of The Interview After Hacker Terrorist Threats ≈ Packet Storm
London Teen Pleads Guilty To Spamhaus DDoS ≈ Packet Storm
Malware peddlers turn again to malicious links
What's New in Exploit Kits in 2014 | Security Intelligence Blog | Trend Micro
Nsc - Renaud Lifchitz - "Quantum Computing In Practice"
Google's work on full encryption chugs along, with Yahoo's help | CSO Online
Google: Mark HTTP pages as insecure | ZDNet
ICANN falls for spear phishing attack | ZDNet
Cloud Adoption Driven by Reliability, Business Continuity
Angelina Jolie And Brad Pitt Hire Cyber Security Team To Monitor Content Their Kids Encounter Online : Entertainment : Design & Trend
The Gift that Keeps on Giving: 12 Ways Everyone Can Help IT This Holiday Season | Symantec Connect
2014 Security Review: The Year in Breaches, Hacks and Exploits -- Redmond Channel Partner
Download this infographic that reveals how customers truly feel.
Researchers confirm multiple Google App Engine security sandbox bypasses
Schneier on Security: How the FBI Unmasked Tor Users
Four trends that will change mobile in 2015
VULNERABILITY LAB sur Twitter : "[BUG BOUNTY AWARD] The award trophy of the best bug bounty- and best upcoming bug bounty -program award arrived today"
What Banks Don t Know About the Security Hazards of Cloud Computing - American Banker Article
Sony hackers threaten company and movie-goers
Tackling the growing web of data residency and privacy regulations
Bugtraq: secuvera-SA-2014-01: Reflected XSS in W3 Total Cache
Tech Giants Rally Around Microsoft to Protect Your Data Overseas | WIRED
Quantum Encryption Makes Credit Cards Fraud-Proof - Hacker News
Do senior executives understand their role in data security?
Preparing for the Social Internet of Things – AVG – mefminute
London teen pleads guilty to Spamhaus DDoS • The Register
Coalfire’s Navis RapidSAQ™ Updated to New PCI Standards | Business Wire
Avast blog » South Korea hit with banking malware using VPN connection
Nsc - Nicolas Collignon - "Google Apps Engine Security"
Bugtraq: [REVIVE-SA-2014-002] Revive Adserver 3.0.6 and 3.1.0 fix multiple vulnerabilities
Bugtraq: FreeBSD Security Advisory FreeBSD-SA-14:30.unbound
UC Berkeley warns 1,600 of personal data breach |
New Norton Mobile Security warns of privacy problems | ZDNet
Business continuity briefs
2015 Forecast: The Sun is Out for Cloud Computing
Retailers must not ignore security alerts, court says | CSO Online
What are the keys to effective information security? | IT News Africa- Africa's Technology News Leader
Sony Hackers Threaten 9/11 Type Attack at Theaters Showing 'The Interview' Movie - Hacker News
A brief history of Mac malware
Sony sued by ex-staff over daft security, leaked privates • The Register
Top 5 malware attacks: 35 reused components
Protecting the underground electronic communications infrastructure
Nsc - Peter Hlavaty - "Attack On The Core"
Top Ten Private Cloud Risks
Kronos: decrypting the configuration file and injects - Weblog Lexsi
StorageCraft releases backup, disaster recovery tool for use with VMware, Microsoft System Center - WhaTech
Farewell, <em>Dr. Dobb's</em> | Dr Dobb's
TorLocker ransomware variant designed to target Japanese users | Symantec Connect
UC Berkeley warns 1,600 of personal data breach | News - KCRA Home
Bugtraq: [security bulletin] HPSBOV03226 rev.1 - HP TCP/IP Services for OpenVMS, BIND 9 Resolver, Multiple Remote Vulnerabilities
Bugtraq: [security bulletin] HPSBMU03217 rev.1 - HP Vertica Analytics Platform running Bash Shell, Remote Code Execution
Fraud-proof credit cards possible with quantum physics
Nsc - Guillaume Valadon, Nicolas Vivet - "Detecting Bgp Hijacks In 2014"
Bugtraq: Elefant CMS v1.3.9 - Persistent Name Update Vulnerability
Bugtraq: Konakart v7.3.0.1 CMS - CS Cross Site Web Vulnerability
The 12 Hacks of Christmas: Part 1The State of Security
Is POODLE Back for Another Byte? « Threat Research | FireEye Inc
New York Establishes New Cyber Security Examination Process for Financial Institutions | Ropes & Gray LLP - JDSupra
EMV Among the Missing Pieces of PCI DSS 3.0
The Steel Rooms Helping Cops Fight Cyber Crime | Motherboard
Bugtraq: iWifi for Chat v1.1 iOS - Denial of Service Vulnerability
Sony Facing 2 Suits by Ex-Workers Over Data Breach - ABC News
Coming Together for AWS Customers: Cloudnexa, AppDynamics, Sumo Logic and Trend Micro |
Passwords Are The New DataThe State of Security
Of Course You Hear What I Hear — Christmas Music Season Is Totally Data-Driven | FiveThirtyEight
Google bakes W3C malware-buster into Gmail • The Register
Creative defense: Crowdsource your hackers
Reboot 25: Threat seekers - SC Magazine
Ursnif malware variant detected in global spike - SC Magazine
Nsc - Braden Thomas - "Reverse Engineering Msp430 Device"
Malicious links: Spammers change malware delivery tactics | Symantec Connect
2014 in security: The biggest hacks, leaks, and data breaches | ZDNet
Angelina Jolie Hires Cyber Security to Protect Her Kids Online - Angelina Jolie, Brad Pitt :
McAfee: Cyberattacks Will Not Slow in 2015 - AOL On
How Ethernet Can Secure The Connected Car - Network Computing
Infographic: Holiday Shopping - The 12 Ways of Shopping Safely & Staying Cybertheft-free | Internet Security Infographics | Kaspersky Lab US
Sony Asks Media to Destroy Hacked Data: Do They Have a Case?: Video - Bloomberg
SoakSoak malware leaves 11,000 WordPress sites blacklisted by Google | Technology | The Guardian
RSAC Speaker Submissions Reveal What the Industry Cares About – Blog Post – RSA Conference
RStickets! 1.0.0 Remote Shell Upload ≈ Packet Storm
RSform!Pro 1.3.0 Remote Shell Upload ≈ Packet Storm
Konakart Cross Site Scripting ≈ Packet Storm
Chrome Plans to Mark All 'HTTP' Traffic as Insecure from 2015 - Hacker News
Mandriva Linux Security Advisory 2014-252 ≈ Packet Storm
Debian Security Advisory 3104-1 ≈ Packet Storm
Debian Security Advisory 3105-1 ≈ Packet Storm
D-Link DCS-2103 Brute Force / Cross Site Scripting ≈ Packet Storm
Sony Hackers Threaten 9/11 Attack On Movie Theaters ≈ Packet Storm
RelateIQ Mail Encoding Script Code Injection ≈ Packet Storm
Everyone starts somewhere…More than 20 million students participate in’s Hour of Code | News Center
Register – RSA Conference
Nsc - Benjamin Delpy - "Mimikatz"
Do Sony employees have the right to sue over data breach?
Industry Innovators 2014 - SC Magazine
Watch Symantec's Vine "Drop a beat! Great work is its own reward in The Backup of Destiny! Check out the full experience on YouTube:"
Network Security: No need to drop, cover, and hold... - HP Enterprise Business Community
New Phishing Emails Descend On GoDaddy CustomersThe State of Security
Impact of Linux bug 'grinch' spans servers, workstations, Android devices and more - SC Magazine
Websense Now a Member of Cloud Security Alliance’s Security, Trust and Assurance Registry (STAR) Registry - Websense Insights
Sony sued by ex-staff: Crap security, leaked privates and little help, claims suit • The Register
Sony warns employees of potential fraud - SC Magazine
Microsoft appeal over customer email warrant draws support - SC Magazine
The Evolution of Point-of-Sale (PoS) Malware - Security News - Trend Micro USA
Firefox, IE11 zero-day bugs possibly targeted in 'SoakSoak' WordPress malware attacks - SC Magazine
FOCUS: Technology Transformation | The Network
Performance Calendar » Images Are King: An Image Optimization Checklist for Everyone in Your Organization
IT Security Stories to Watch: WordPress Malware, Malwarebytes Study | Managed Security Services content from MSPmentor
Former Employees Are Suing Sony Over 'Epic Nightmare' Hack | WIRED
Nsc - Anthony Zboralski - "No Such Security" (Keynote)
Hacking WLAN Authentication
Union First Market data breach affects more than 3,000 debit cards - Roanoke Times: News
Witnesses against Silk Road creator to be kept under wraps until days before trial - SC Magazine
Keeping the Lights On, Networks Safe – Blog Post – RSA Conference
Ex-Sony Employees Sue Studio Over ‘Nightmare’ Data Breach - Bloomberg
GCN: Technology, Tools, and Tactics for Public Sector IT -- GCN
Suffolk U Adds Data Colocation for Disaster Recovery -- Campus Technology
How will the Data Centre look in 2020? - J-Net Community
Progressive Image Rendering: Good or Evil?
Bugtraq: [SECURITY] [DSA 3104-1] bsd-mailx security update
Bugtraq: [SECURITY] [DSA 3105-1] heirloom-mailx security update
Ex-LulzSec hacker Hector Monsegur talks family, FBI work - CNE
URL flaw discovered for airline mobile boarding passes - SC Magazine
Reading the Tea Leaves of the RSAC Submissions - YouTube
A Circular Problem in Current Information Security Principles
Hackers hint at terror attacks, release more data from Sony Pictures | CSO Online
Govt beefs up cyber-security after website attacks - Latest News -
Bugtraq: W3TotalFail: W3 Total Cache v 0.9.4 CSRF Vulnerability that Leads to Full Deface
Using Endpoint Visibility to Protect Your Enterprise with RSA Security Analytics and RSA ECAT - YouTube
December 2014 Microsoft Patch Tuesday Summary - J-Net Community
Banks: Park-n-Fly Online Card Breach — Krebs on Security
Working remotely? Always ensure your data gets onto the network
Top 10 Phishing Attacks of 2014
7 Resolutions Online Businesses Should Make for 2015 | CIO
31C3 Call for Participation (EN) « CCC Event Weblog
Security Awareness Blog | Failing a Phishing Test - Rite of Passage
Schneier on Security: Fake Cell Towers Found in Norway
Peder Jungck: How Mobility's Scale Has Redefined Service Assurance
Apple iOS v8.x - Message Context & Privacy Vulnerability demonstrated in Wickr App | VULNERABILITY MAGAZINE - Bug Bounties, Acknoweldgements & Security Research
Black market tactics mirror those of legit business - SC Magazine
UC Berkeley data breach impacts about 1,600 individuals - SC Magazine
Juniper: Mobile Users in Developing Countries More Satisfied ~ Converge! Network Digest
Bugtraq: [Onapsis Security Advisory 2014-034] SAP Business Objects Search Token Privilege Escalation via CORBA
The Most Tech Savvy States in America (According to #Twitter) [INFOGRAPHIC] - AllTwitter
FBI op, leading to child porn convictions, used Metasploit - SC Magazine
Asia Pacific 2015
How much IT security budget is adequate? | ITWeb
Debunking The Biggest Cyber Security Myths for Businesses
Cisco Security sur Twitter : "RT if you know this #Cisco30 Factoid: John Chambers was named CEO in 1995 - that's 2/3 of Cisco's history!"
Transformation of the Data Center & Building the Private Cloud, Part 2 | Radware Blog
Union First Market data issue affects more than 3,000 debit cards - Richmond Times-Dispatch: Business & Economic News
App launched to boost pupils' cyber security skills - Teaching Personnel
FireEye predictions for cybersecurity in 2015 | ZDNet
Evaluating the Security of Cyber-Physical Systems - AIS | Security Intelligence Blog | Trend Micro
PROTECT Centre’s VIBRANT approach to cyber security skills
11 predictions for security in 2015 | CSO Online
Africa’s take-off into the Technological Future - J-Net Community
A Guide to Facebook Privacy Basics
Sony details employee data compromised in GOP hack
Datalink Upgrades City of Riverside’s Storage & Disaster Recovery Infrastructure - MarketWatch
Websense Listed as 'Champion' for Data Loss Prevention -- AUSTIN, Texas, Dec. 16, 2014 /PRNewswire/ --
Transforming Security Into an Enabler: The Validated Best of Breed Certification Paradigm | SecurityWeek.Com
Benchmarking 3 Israeli Cyber Security Vendors: Check Point, Imperva And CyberArk | Seeking Alpha
Tech - Support Engineer
This Linux grinch could put a hole in your security stocking | CSO Online
Data breaches lead long line of reasons for apologies this year | CSO Online
Worm exploits nasty Shellshock bug to commandeer network storage systems | Ars Technica
Senate and House pass cybersecurity bill - SC Magazine
Snowden Spying Leaks Prompt Millions To Protect Data ≈ Packet Storm
Delta Flaw Allows Theft Of Boarding Passes ≈ Packet Storm
Websense Cybersecurity Predictions Released For 2015
Vormetric Announces Detailed Coalfire Guidance for PCI DSS 3.0 Within VMware... -- SAN JOSE, Calif., Dec. 16, 2014 /PRNewswire/ --
CA LISA Release Automation Security Notice ≈ Packet Storm
Senator: Backdoor For The Feds Is A Backdoor For Hackers ≈ Packet Storm
The FBI Used Metasploit To Unmask Tor Users ≈ Packet Storm
Customer Testimonial – Cisco Advanced Malware Protection for Endpoints - YouTube
Atandt Chief Security Officer Ed Amoroso Interviews Grace Hopper, Albert Einstein, And Richard Feynman
How to diagnose update issues in Kaspersky Internet Security 2015
Robert Turner named chief information security officer at UW-Madison
TorrentLocker exposed: Investigation and analysis
FBI Used Metasploit Hacking Tool in ‘Operation Torpedo’The State of Security
Malware Exploits SHELLSHOCK Vulnerability to Hack NAS Devices - Hacker News
Christofer Hoff – Speaker – RSA Conference
BlueSnap streamlines PCI 3.0 compliance for merchants -- WALTHAM, Mass., Dec. 16, 2014 /PRNewswire/ --
RSA Chairman on Security in 2014: 'Best of Times, Worst of Times'
Is lack of trust limiting the potential for new online services?
GCHQ Releases 'Cryptoy' App for Kids to Teach Encryption - Hacker News
10 mistakes companies make after a data breach | CSO Online
Attackers worm their way into QNAP NAS devices through Shellshock hole
James Bond 'Spectre' Script Allegedly Stolen in Sony Pictures Hack Video - ABC News
New Research on Cyber-Attack Trends: Radware 2014-2015 Global Application & Network Security Report | Radware Blog
Microsemi Announces Successful Completion of Nine NIST Cryptographic Algorithm Validation Program Certifications
Help wanted: Diligent vigilance | CSO Online
Phishing spam gets 'Big Box Retailer' holiday makeover | CSO Online
Bugtraq: "Ettercap 8.0 - 8.1" multiple vulnerabilities
Cyber Threats Timeline 2014 - SC Magazine
Illinois hospital reports data blackmail | CSO Online
The Internet of Things: Three Concerns for Midsize Business ::Mobile:: Midsize Insider
Atandt Cyber Security Conference: Mobile Security Incidents And Trends
Log and Event Manager now with File Integrity Monitoring - Hacker News
Apple iOS v8.0, v8.1.2 & v8.0.2 - Message Context & Privacy Vulnerability - YouTube
Pirate Bay team talk seizure, scams, future plans | ZDNet
Targeted Attacks: A Defender's Playbook
76% of organizations have suffered a DNS attack
Four 2015 HIT Security Predictions - Health Data Management Blogs Article
Are we heading in the 'wrong direction' on cloud apps? - SC Magazine UK
Bugtraq: [SE-2014-02] Google App Engine Java security sandbox bypasses (status update)
Blackhat – Upcoming Cyber Thriller Movie - Hacker News
Makarov: Belarus needs national law on information security | SCIENCE. TECHNOLOGY. INNOVATIONS | NPP Belarus – Nuclear power industry – News Belarus – Technologies - BelTA
Government strengthening cyber and information security - News - The Copenhagen Post
3 Scary Smart Ways Stores Use Your Personal Information |
Information Security News: The US Needs To Stop Pretending The Sony Hack Is Anything Less Than An Act Of War
Atandt Cyber Security Conference: At&Amp;T'S Security Incident Response Team
GUC talks cyber security in wake of Sony attack
Sony Pictures Data Breach And The PR Nightmare - Forbes
Information Security News: Is Iran is the new China? FBI warning suggests it's not faroff
Ontario Government website hijacked | CSO Online
Help Google design the Open Web of Things
1 in 5 employees going rogue with corporate data
Information Security News: Roll up, come see the BOOMING HACKER BAZAAR!
Information Security News: Ekoparty Isn’t The Next Defcon (& It Doesn’t Want To Be)
Sony Hackers Threaten to Release a Huge 'Christmas Gift' of Secrets | WIRED
FBI warns hacker groups are targeting US energy firms
Mark Cuban warns that emails can become part of a data breach
Atandt Cyber Security Conference: Detecting Mobile Malware
Are you on the backfoot? - CSO Bloggers - CSO | The Resource for Data Security Executives
Why Hackers Love Passwords - Forbes
Jake Williams sur Twitter : "Wow - really impressed with the scores here at #DFIR netwars here at #SANSCDI"
Sony hackers dump more chunks of stolen data, promise another 'Christmas gift' • The Register
Bugtraq: [ MDVSA-2014:252 ] nss
Bugtraq: CA20141215-01: Security Notice for CA LISA Release Automation
Debunking The Biggest Cyber Security Myths for BusinessesThe State of Security
Chrome devs hatch plan to mark all HTTP traffic insecure • The Register
Welcome to Cisco - Timeline - Cisco
ISSUU - Private Lender by American Association of Private Lenders
Atandt Cyber Security Conference: Advanced Persistent Threat Detection Frameworks
Cyber Security Audit: Washington Agencies Not In Full Compliance | Northwest Public Radio
StorageCraft releases backup, disaster recovery tool for use with VMware, Microsoft System Center - Media Releases - CSO | The Resource for Data Security Executives
Cyber Security Audit: Washington Agencies Not In Full Compliance | Boise State Public Radio
Boies Schiller Confronts Media on Sony Data Breach | The American Lawyer
Five Lessons About Disaster Recovery From Hurricane Sandy
Media Release: StorageCraft releases backup, disaster recovery tool for use with VMware, Microsoft System Center
Vulnerability Note VU#343060 - CA LISA Release Automation contains multiple vulnerabilities
OpenClos - Juniper Networks TechWiki
Websense 2015 Security Predictions Report
Intrexx Professional 6.0 / 5.2 Remote Code Execution ≈ Packet Storm
Red Hat Security Advisory 2014-1995-01 ≈ Packet Storm
ActualAnalyzer 'ant' Cookie Command Execution ≈ Packet Storm
Sony Pictures admits HIPAA data might have been compromised during breach | CSO Online
Gentoo Linux Security Advisory 201412-18 ≈ Packet Storm
Gentoo Linux Security Advisory 201412-28 ≈ Packet Storm
Gentoo Linux Security Advisory 201412-29 ≈ Packet Storm
Atandt Cyber Security Conference - P2p Botnets
CMS Papoo 6.0.0 Revision 4701 Cross Site Scripting ≈ Packet Storm
Why You Shouldn't Trust Verizon's New Encrypted Calling App ≈ Packet Storm
Roll up, come see the BOOMING HACKER BAZAAR! • The Register
Researcher identifies XSS vulnerability affecting Citibank website - SC Magazine
Google Chrome Exploitation – A Case Study - Palo Alto Networks BlogPalo Alto Networks Blog
NBC News - Breaking News & Top Stories - Latest World, US & Local News
As leaks continue, Sony's legal team tells media to destroy 'stolen info' - SC Magazine
Stolen EMCOR Services laptop contained Social Security numbers, other data - SC Magazine
Sony Pictures hackers promise a 'Christmas gift' of 'more interesting' spoils - Dec. 14, 2014
Cyber Risk Report: December 8-14, 2014
Senator: Backdoor for the Feds is a backdoor for hackers • The Register
Plan B becomes Business Continuity Institute Corporate Partner - Reseller News
Finding an Unknown Threat with RSA Security Analytics and RSA ECAT - YouTube
Atandt Cyber Security Conference - Mitigating Mobile Malware
Getting Started
Rick Holland sur Twitter : "Here is the 2015 #RSAC word cloud."
Questioning North Korean Sony Breach Involvement
Schneier on Security: Understanding Zero-Knowledge Proofs
More than 100K WordPress sites compromised by malware due to plugin vulnerability - SC Magazine
Blogs |
South Florida nonprofit Family Central reports data breach - South Florida Business Journal
New report sheds light on National Research Council breach - SC Magazine
Ancient Mac Site Harbors Botnet that Exploits IE Vulnerability
​Hacking after Sony: What companies need to know - CBS News
Internet of Things: beware the legal pitfalls - 15 Dec 2014 - Computing Opinion
The Impending FIPS 140-2, Random Number Generator ... - J-Net Community
Securing Patient Portals: What You Need to Know to Comply With HIPAA and Meaningful Use
Poll:When did you install or configure your fir... | Cisco Communities
Bugtraq: [ MDVSA-2014:253 ] apache-mod_wsgi
London teen pleads guilty to SpamHaus DDoS attack - SC Magazine
Three essential tips for new Android devices
Sony's Crackle Postpones James Caan, Kevin Dillon Hacker Movie 'The Throwaways' Due to Its Cyber Attack (Exclusive) - TheWrap
Happy Holidays becomes 'Happy Data Breaches' | TheHill
100k+ WP websites compromised by SoakSoak malware
Banking Trojan Targets South Korean Banks; Uses Pinterest as C&C; Channel
Defcamp 2014 - A Look Into Bullet Proof Hosting
McAfee sur Twitter : "There's room for everyone on the "nice list," but some e-tailers aren't making the cut. #12Scams"
Integrating Threat Detection and Prevention with Tripwire and Check Point - The State of SecurityThe State of Security
Seyran Ohanyan and Microsoft Corporation representative discuss information security issues | ARMENPRESS Armenian News Agency
Why You Should Care About Juniper Winning the 2014... - J-Net Community
Symantec Intelligence Report: November
How To Exit an MSSP Relationship?
Three Reasons Why Employees Chafe at Security Policies – Blog Post – RSA Conference
Key Considerations for Threat-Based Security Programs
Cyber security - Lexology
Time to act on Corporate Data Protection* - Websense Insights
GOP hackers announce more Sony data leaks for Christmas
Microsoft issues fresh update to fix bugs caused by December Patch Tuesday- The Inquirer
Kaspersky Internet Security License and Subscription Information | Kaspersky Lab US
Makarov: Belarus needs national law on information security | Society | Headlines
Delaware cyber security website honored as best in the nation - - Covering Delaware's Cape Region - Inland Bays, Atlantic Ocean, Rehoboth Beach, Lewes, Milton, Dewey Beach, USA
Bugtraq: Persistent XSS Vulnerability in CMS Papoo Light v6.0.0 Rev. 4701
The Hacker News — Hacking, Cyber and Internet Security
'SoakSoak' Malware Compromises 100,000 WordPress Websites - Hacker News
LulzSec FBI Informant Sabu Talks Family, FBI Work ≈ Packet Storm
Sony Hackers Pinch Early Version Of James Bond Spectre Script ≈ Packet Storm
Amazon Glitch Leads To Items Being Sold For Almost Nothing ≈ Packet Storm
Security Awareness Blog | Aligning HR With Secure Behaviors
Next gen ransomware: Elliptic cryptic, talks on Tor, demands Bitcoin • The Register
Defcamp 2014 - Pyrotechnic Composition: Fireworks, Embedded Wireless And Insecurity-By-Design
Breach insurance might not cover losses at Sony Pictures | CSO Online
ICANN: data breaches not due to new top-level domains | CSO Online
SANS 2015 Survey on Insider Threats
Dealing with data breach from the inside | Healthcare Dive
Reading the Tea Leaves of the RSAC Submissions – Video – RSA Conference