Sony quietly POODLE-proofs Playstations • The Register
Driverless cars at risk from hackers and software glitches - IT News from
Media Release: New Generation of WatchGuard Firewalls Enable Mid-Size Enterprises to Keep Pace with Explosive Growth in Encrypted Traffic
10 ways in which Android Lollipop outshines Android KitKat - Tech2
Toronto Police Service website down after DDoS attack | Metro
Microsoft Lumia 535 may arrive in India this Wednesday
Nations Ponder How to Handle European Fighters Returning From Jihad
Interview: Microsoft Country Manager Talks About Office 365 | PC Tech Magazine
Human rights organizations launch free tool to detect spyware
Top-tier espionage malware 'Regin' has been spying on targets since 2008 - TechSpot
Hong Kong wins e-Government Prize at global WeGO Awards 2014 | Enterprise Innovation
Symantec reseachers find 'Regin' malware, label it the new Stuxnet • The Register
Bugtraq: Exploit for stealing backups on WP sites with WP-DB-Backup v2.2.4 plugin
Bill Whittle: A Crash in the Mojave | FrontPage Magazine
NYU News : Warrantless spying must be debated openly
Can iPad conquer the enterprise? Only if Apple has the guts to license iOS | ZDNet
HR takes the lead: Flexible work arrangements and smart mobile devices
Google’s Internet-Beaming Balloons Keep Crashing | Motherboard
Sophisticated REGIN Spying Malware Instigated By U.S.? : World : Chinatopix
Has this advanced malware been spying on you for years? | New York Post
Usenix Security '14 - Static Detection Of Second-Order Vulnerabilities In Web Applications
WebApp Sec: Re: Social Security Number in Hidden field
Sophisticated ‘state-sponsored’ spying tool targeted govts, infrastructure for years — RT News
Symantec discovers Regin malware, which has spied on businesses and governments since 2008 - Tech2
Retailers beefing up security to prevent customer data breaches
Sun News : Hackers pledge more attacks
Security boosted in Ferguson ahead of grand jury decision | PBS NewsHour
Security Slice: Deep Darkhotel - The State of Security
Why Aren’t More Companies Purchasing Cyber Insurance?
Complex cyber-spying malware uncovered by researchers - E & T Magazine
10 Things Android Lollipop can do but Android KitKat cannot - Tech2
Hackers vow 'complete rape' of cop site | Ottawa & Region | News | Ottawa Sun
'Regin' malware described as 'groundbreaking and almost peerless' | Home - Home
Target: Retailer Owes No Duty to Banks in Data Breach
Crypto protocols held back by legacy, says ENISA • The Register
Malware spied on companies and governments in 10 countries since 2008 | Technology | The Guardian
Military Suicides Decline, But Continued Failures Hold Lessons for Future Wars - Defense One
580 CFRA News Talk Radio :: Dad of accused in 'swatting' case says hackers provided evidence in support of son :: News - Article
New Regin malware has all the earmarks of international espionage, Symantec says | General News
Mobility is a Mess, Change is Perpetual, and One Ring to Rule Them All
Man says hackers targeting police, gov't websites want to clear son’s name | CTV News
New Generation of WatchGuard Firewalls Enable Mid-Size Enterprises to Keep Pace with Explosive Growth in Encrypted Traffic - Media Releases - CSO | The Resource for Data Security Executives
Regin: Top-tier espionage tool enables stealthy surveillance | Symantec Connect
Cyber espionage Malware Identified by Symantec | Wall Street OTC
Ireland 'among worst hit by PC spying virus' -
Series of data breaches put holiday shoppers at higher risk... |
Usenix Security '14 - Battling Human Trafficking With Big Data
Hacking was 'classic Anonymous', expert says
Filling the Blanks in Snowden’s ‘Citizenfour’ | Consortiumnews
Yes, Your Pacemaker Can Get Hacked -
Apple iOS bug makes devices vulnerable to attack: experts| Reuters
Security Conferences - Security Events - Trend Micro USA - Trend Micro USA
Symantec uncovers malware with stealth features infecting systems since 2008 | Uncover California
'Regin' malware described as 'groundbreaking and almost peerless' | Stocks -
How to reduce your risk of a cyber security breach - The Business Journals
New Zealand, China expand research agreements | Enterprise Innovation
Symantec outs Regin, a stealthy and modular spy tool - CSO | The Resource for Data Security Executives
Traces of Regin malware may date back to 2006 | Computerworld
'Regin' Spy Malware is Significant Threat, Symantec Says : News : Headlines & Global News
Driverless Cars Vulnerable to Hacking, Possible Use in Terror Attack: Experts : FUTURE TECH : Tech Times
Annie’s Mailbox: Beware of Internet hackers - News - Rockford Register Star - Rockford, IL
Cybersecurity lapses leave U.S. government agencies vulnerable to hackers, reports show - Washington Times
HP Helps Schools Fend Off Mounting Cyber Threats - Network Security on CIO Today
Symantec IDs sophisticated 'Regin' malware | Computerworld
'Regin' malware described as 'groundbreaking and almost peerless' | Project Economy - KCCI Home
Foreign powers steal data on critical U.S. infrastructure, NSA chief says - The Washington Post
Scoop - New Zealand News
Singapore gov't IT spending to reach $3.2 B in 2014 | Enterprise Innovation
Hackers Now Targeting Cars and Driver Data - Mobile Tech on Top Tech News
Challenge 5: Digest Authentication Attack
183 million accounts compromised in Q3 2014
Group claiming responsibility for hacking City of Ottawa site to hold press conference | Metro
One-year after Target breach, customers’ data security still a hot topic - Rick Kupchella's –
Hacking was 'classic Anonymous' | Ottawa & Region | News | Ottawa Sun
California man sentenced to 18 months for hacking into cash registers at Subway sandwich shops
Apple: Want a PATCH for iOS Masque attack? TOUGH LUCK, FANBOI • The Register
HP and Symantec announce Disaster Recovery beta program | Computer Dealer News
Black Hat Usa 2014 - Appsec: Building Safe Systems At Scale Lessons From Six Months At Yahoo
Sophisticated 'state-sponsored' Regin spy tool discovered
'Regin' malware described as 'groundbreaking and almost peerless' - Nov. 23, 2014
The White House breach and the evolving attack surface | Government Security News
Alert! Computer spying malware with ‘stealth’ features uncovered | Tech/Gadgets | Malay Mail Online
Stealth malware 'Regin' stalks victims |
Meet Regin, Super Spyware That's Been Attacking Computers for Years | Gizmodo India
DerpTrolling leaks PSN, 2K, Windows Live customer logins - CNE
SandWorm thrived thanks to botched MSFT patch says HP • The Register
IBM Rolls Out Analytics-Based Security Solution - Network Security on CIO Today
WebApp Sec: Social Security Number in Hidden field
Challenge 33: XSS 14
Sun News : Ottawa hacking was 'classic Anonymous': Expert
Australian baby monitors and webcams hacked as footage appears on a Russian website
Hackers vow 'complete rape' of Ottawa cop website | Sault Star
Nation state spying malware revealed | ZDNet
Why is Microsoft updating Windows PCs for a security bug on the server? - Computerworld
New Malware Infecting Telecom, Energy, Airline Industries
Espionage Malware Identified by Symantec - Utah People's Post
NSA chief warns Chinese cyber attacks could shut U.S. infrastructure| Reuters
7 Tech Trends for 2015 | NBC 5 Dallas-Fort Worth
Chicagoist Weekend Theater: The Max Headroom Hacking Incident : Chicagoist
Sun News : Hackers vow 'complete rape' of Ottawa cop website
Do Kiwi firms know antivirus is not a replacement for patch management software? - Computerworld New Zealand
7 Tech Trends for 2015 | NBC 7 San Diego
Symantec Uncovers Sophisticated, Stealthy Computer Spying Tool | Re/code
Stealth malware found spying on telecoms, energy sectors - CNE
“Want To Know Who’s Watching You?” is a Facebook scam | SecTechno
Staying Safe from Online Threats This Thanksgiving - Security News - Trend Micro USA
Regin stealth malware targets energy companies, other infrastructure
Highly Sophisticated Government Spying Bug Hidden For Six Years Discovered - Capable Of Siphoning Data
BBC News - Regin, new computer spying bug, discovered by Symantec
Regin: Newly uncovered malicious software snooping since 2008 'was developed by a nation state' - News - Gadgets and Tech - The Independent
Highly advanced backdoor trojan cased high-profile targets for years | Ars Technica
Computer spying malware uncovered with 'stealth' features - Symantec| Reuters
Symantec has uncovered a stealthy spying malware 'Regin'
Private images among hundreds available on Russian website  | Daily Mail Online
Task 16: Extracting CSRF Tokens
Black Hat Usa 2014 - Appsec: Attacking Mobile Broadband Modems Like A Criminal Would
Hacker Calendars
Sophos serves cloud-managed security portfolio on a plate for NZ businesses - Reseller News
A Peek Inside a POS Scammer’s Toolbox | Security Intelligence Blog | Trend Micro
POS malware: Potent threat remains for retailers | Symantec Connect
Financial Tips After Your Divorce
How a Russian Web site peers into your home, and your baby’s room, by hacking webcams - The Washington Post
Regin: Top-tier espionage tool enables stealthy surveillance
Annie’s Mailbox: Beware of Internet hackers - News - Journal Standard - Freeport, IL
Spycam Hacking Shock | Graham Welch
Raising awareness quickly: Holiday tips and tricks | CSO Online
‘Travel hacking’ can slash hotel, airline costs | Travel | The Seattle Times
Bad year for cybersecurity, consumers, but security industry booming
NIST revealing next steps to bolster cyber security | Business Insurance
JPMorgan Hacking Raises Alarm About Banks’ Cyber Defences
Adobe Flash Player 15 Latest Version Addresses Seven Bug Fixes
The Brazilian Underground: A Market for Cybercriminal Wannabes? - Security News - Trend Micro USA
Microsoft Robot Guards Keep Campus Safe
Hope X - Ethical Questions And Best Practices For Service Providers In The Post Snowden Era
Telegram Messaging: Chat Securely and with High Speed on your Mobile or PC | The Fuse Joplin
Citizenfour: An Unprecendented Look Into Snowden’s NSA Leaks | Long Island News from the Long Island Press
Latest Adobe Flash Player 13 Download for Windows and Mac OS X | The Fuse Joplin
Lois Lerner emails — as many as 30,000 — may have been found, investigators say - Washington Times
Parrot Security OS- Cloud friendly Security Testing Operating System | SecTechno
Install Chrome 39 for OS X for 64-bit Web browsing - CNE
How Vetting Mobile Apps Works for App Stores and Its Users - Security News - Trend Micro USA
Anonymous pledges more attacks in Canada | Edmonton Examiner
Hackers Now Targeting Cars and Driver Data - Mobile Tech on CIO Today
Password protected document spreads banking malware | SecTechno
Benjamin Delpy sur Twitter : "You can now "Pass-the-cache" with #mimikatz. Dump tickets from Mac/Linux/...then pass them! -"
Hope X - Elevator Hacking: From The Pit To The Penthouse
Kaspersky Antivirus vs G Data Total Protection - Which Takes Care Of Your System Best? | The Fuse Joplin
The Power To Protect | Kaspersky Lab
Symantec SSL Resources – What is SSL? | Symantec
American Dreams: How Bush Shaped Our Reading of Roth’s ‘The Plot Against America’ - The Daily Beast
Target will ask judge to toss bank suits over breach - Dallas Business Journal
US man sentenced for hacking POS systems at Subway - PC World Australia
Hacking for nude pics on the rise, say experts | Ottawa & Region | News | Ottawa
Hope X - Prism Proof Email: Why Email Is Insecure And How We Are Fixing It
Thanksgiving tech support: Replace older browsers
What It Takes to Kill a Grizzly Bear - The Daily Beast
Everything your users ever need to know about BYOD • The Register
Adobe Flash Player 14 Delivers Users a Rich Web Experience | The Fuse Joplin
What you'll love and hate about Windows 10 | InfoWorld
Tips and Tricks On How To Secure Your E-mail Address | The Fuse Joplin
As Cyberthreats Increase, Big Money Chases Solutions - NBC News
Golis: Addicted to our devices | The Press Democrat
NSA Chief: Matter of Time Before Enemies Hack US Power Grid
Anonymous pledges more attacks in Canada | Chatham Daily News
Globes English - Treasury: Fitch outlook downgrade no surprise
Module 2: NOT Encoder
Hope X - Cultures Of Open Source: A Cross Cultural Analysis
Is Ransomware poised for growth? | Symantec Connect
Hackers to probe cybercrime defenses at British banks | The Japan Times
Anonymous targets Ku Klux Klan during latest operation | CSO Online
Basic Authentication and Form Bruteforcing (Intermediate)
City of Ottawa says confident no sensitive details leaked after website hacked | CityNews
Sun News : City of Ottawa website hacked, replaced with cryptic message to cop
Man gets 18 months for hacking into Subway registers Republican American
Ottawa police, Supreme Court websites down after possible hack - Ottawa - CBC News
Anonymous pledges more attacks in Canada | Sudbury Star
PCI Outlines Priorities for Fall NAIC National Meeting
Hope X - North Korea – Gathering Information In The World's Most Restrictive Nation
Hillstone Networks Certifies Next-Generation Firewall With Trend Micro Deep Discovery | Virtual-Strategy Magazine
Ex-Truman sailor gets 2 years in Navy hacking case | |
9 hottest technologies of 2015 »
How to balance freedom with anti-terrorism surveillance: Forum | Canada | News |
Updating Security Operations For The Cloud
Hackers claim responsibility for cyberattack on city of Ottawa website | CTV News
‘No one is safe’: Hacking threat
Hope X - Blinding The Surveillance State
Hacking, hitmen and high stakes in biggest ever cyberwar exercise | The Times
Presenting XKeyscore: What the N.S.A. Is Still Hiding - The New Yorker
TASS: World - British troops banned from using gadgets due to fear of Russian hackers — media
TECH BYTES: The U.S. Senate voted to oppose freedom - Your Houston News: Blogs
Series of data breaches put holiday shoppers at higher risk... |
City of Ottawa website back after almost 24 hours following apparent hacker attack | Ottawa Citizen
Anonymous Release New Video Warning Ferguson Police And KKK: ‘We Are The Law Now'
Series of data breaches put holiday shoppers at higher risk... |
Apple Pay Rival and Walmart-backed MCX Hacked, User Emails Snatched - Forbes
Challenge 34: XSS 15
The Multimillion ‘Clairvoyance by Mail’ Scam - The Daily Beast
Anonymous pledges more attacks in Canada | Timmins Press
The Savvy Security Leader: Using Guerrilla Tactics to ID Security Pro…
Home Depot Falls After Failing to Raise Forecasts - Bloomberg
Ottawa says no sensitive information leaked in hacking of city website
Update: Purported City of Ottawa website hacker returns to social media | Ottawa Citizen
Hope X - Privacy Friendly Hypertext? Do Not Track, Privacy Badger, And The Advertising Funded Web
F5 Networks' Product Refresh Will Be a Catalyst -
Fraud fighters offer tips to thwart ever-smarter thieves | The Wichita Eagle
Task 4: Modify Form Fields
TECH BYTES: The U.S. Senate voted to oppose freedom - Your Houston News: Opinion
Happy Holidays (for the bad guys, maybe not for you) -
Attackers Trading Malware for Privilege | CIO
Snowden: NSA collects mass data on New Zealanders - World - NZ Herald News
What you need to know about the Home Depot data breach | CSO Online
Task 17: CSRF Token Stealing
nogotofail- Blackbox network traffic security testing tool | SecTechno
Owasp Appsecusa 2014 - Project Monterey Or How I Learned To Stop Worrying And Love The Cloud
580 CFRA News Talk Radio :: City of Ottawa website hackers threaten to 'deface' Ottawa Police, Supreme Court websites :: News - Article
Kaspersky Lab Careers | Facebook
IDC Spotlight: PBBAs Tap into Key Data Protection Trends to Drive St…
RSA Conference sur Twitter : "If you're planning to attend #RSAC in San Francisco this year, where will you be coming from?"
Review: Cyberoam’s CR10iNG Unified Threat Management appliance | HumanIPO
Expired Antivirus Software No Better Than No Antivirus Software, Study Shows
Motley Fool: Bear case for 'Internet of things"
Can a hacker stop your car?
The US's gun laws are failing its children |
Getting to Know Docker for Distributing and Running Applications
Harry Chats With Ginger Spice Geri At F1 In Abu Dhabi - The Daily Beast
Hacking for nude pics on the rise: Experts | Timmins Press
The Internet of Things (IoT) will fail if security has no context - SC Magazine
The Home Depot Announces Third Quarter Results; Reaffirms Fiscal Year 2014 Guidance - MarketWatch
Hackers pledge more attacks | Ottawa & Region | News | Ottawa Sun
Owasp Appsecusa 2014 - Anatomy Of Memory Scraping Credit Card Stealing Pos Malware
“That’s not a hack…” – 60 Sec Security [VIDEO] | Naked Security
How Constantly Connected Cooks Get Ready for Thanksgiving – Think with Google
Juniper Networks Announces Virtual MX - J-Net Community
Your webcam is being broadcast in Russia! Check this list of hacked cameras | SiliconANGLE
Big Data is the New Oil Sand
DoubleDirect MitM Attack Targets Android, iOS and OS X Users
Five Practical Ways to Reduce Your Branch Costs - Cisco Online Seminar - Cisco Systems
The Stacks: Pauline Kael's Talking Heads Obsession - The Daily Beast
Mac vs. PC: Answer is still ‘it depends’
Every Company Needs A Chief Digital Officer | TechCrunch
PLA set up 'PRISM' monitoring in HK: Kanwa - The China Post
What Does The NSA Think Of Cryptographers?
AVG Antivirus latest update now helps scan files faster – adds additional security layers - The REM
Cyber-Breach & NISPOM Conforming Change 2 – It’s What’s on the Inside That Counts (National Industrial Security Program Operating Manual) | The National Law Review
Citizenfour « The Boar The Boar
Ex-US Navy Administrator Sentenced for Hacking | Public Radio Tulsa
$120M in tech support scams shut down by FTC - Redding
Feminist Hacker Barbie Is Just What Our Little Girls Need ≈ Packet Storm
The 12 Scams Of Christmas ≈ Packet Storm
Hackers Leak Thousands Of Possible Gamer Passwords ≈ Packet Storm
Weekend news review: November 17-21
Metasploit: Weekly Metasploit Wrapup: Exploitin... | SecurityStreet
What To Do When Your Email Gets Hacked
Owasp Appsecusa 2014 - Ieee Computer Societys Center For Secure Design
The US's gun laws are failing its children
Watch Out! Your Webcam May Have Been Hacked by a Russian : PERSONAL TECH : Tech Times
Creating a Lasting Impact on STEM Education with Boys & Girls Clubs of America | Symantec Connect
Why is Microsoft updating Windows PCs for a security bug on the server? -
Hacking trees in security zones a mysterious crime - The Times of India
Feminist Hacker Barbie Is Just What Our Little Girls Need | WIRED
The Outrageous Celibacy Requirement for Gay Blood Donors - The Daily Beast
Valérie Trierweiler: hell hath no fury | The Times
Tracking Activity in the Chinese Mobile Underground | Security Intelligence Blog | Trend Micro
Wake County Schools To Ask Students To Bring Electronic Devices | WUNC
x86_64 Assembly Language and Shellcoding on Linux
Wireless Developer Network
Microsoft patches 19-year-old Windows bug - CNE
Florida colleges re-examine security - National/World
HTTP Basic Authentication Attack (Easy)
Owasp Appsecusa 2014 - Red Phish, Blue Phish: Improved Phishing Detection Using Perceptual Hashing
Hacking Highway is no joke in Pike Co. - News - - Stroudsburg, PA
Avast antivirus hangs and slows down computers after Windows 8.1 update |
9 hottest technologies of 2015- The Times of India
Woodstown-Pilesgrove BOE addresses parents' questions on armed security |
Footage from seven hacked Birmingham webcams posted online - can you help alert the owners? - Birmingham Mail
How to live for a month in virtual reality | The Verge
PCI Offers Insurance Tips and Advice to Avoid Roof Collapses as Western New York Digs Out from Major Snowstorms
Is CISSP certification worth the effort? | InfoWorld
Colleges review security after Florida State shooting
PSN, 2K, and Windows Live hack claims by DerpTrolling are reportedly a hoax | Latest Tech News, Video & Photo Reviews at BGR India
CipherCloud Closes $50 Million in Financing to Extend Cloud Security Leadership - Media Releases - CSO | The Resource for Data Security Executives
Icon Labs Announces the Internet of Secure Things Initiative
Usenix Security '14 - Phone Phreaks: What We Can Learn From The First Network Hackers?
Is there any hope against the hackers? - Telegraph
Ex-US Navy administrator sentenced for hacking -
Beth Israel to pay $100,000 fine over data breach - Business - The Boston Globe
Lynx Introduces New PCI Express Cards
EPA with statins may reduce periprocedural MI in PCI | Cardiology
Man sentenced for role in hacking into financial institutions computers - Business -
CipherCloud Closes $50 Million in Financing to Extend Cloud Security Leadership -- SAN JOSE, Calif., Nov. 19, 2014 /PRNewswire/ --
Security breach reveals personal data on Prince George’s school employees - The Washington Post
Potential Data Breach for the PlayStation Network, Windows Live, and 2K Gaming - mxdwn Games | mxdwn Games News
Convicted ID Thief, Tax Fraudster Now Fugitive — Krebs on Security
Usenix Security '14 - Lightning Talks For The One-Track Mind
Holy Trinity tech director wins national education award
Dell Unveils a Slew of New Enterprise Systems - Communications on Top Tech News
Schools grapple with increased threats | Springfield, OH News |
MIS-Asia - Office 365 admins get spreadsheet search help
Hacking for nude pics on the rise, say experts | Canada | News | Calgary Sun
Hackers work to turn holiday shopping boom into boon for data thieves | KRQE News 13
Houston Dynamo riding "wave of the future" by embracing sports science, data analytics |
Hacking for nude pics on the rise, say experts | Canada | News | Toronto Sun
Google Sends Android to Work with Divide BYOD App - Datamation
California man sentenced to 18 months for hacking into cash registers at Subway sandwich shops - Winnipeg Free Press
Pro CS:GO players get caught hacking, handed VAC bans just before annual tournament - Neoseeker
Vallejo Disaster Recovery Center to Close November 25th
Survey Roundup: Optimistic Outlook on Cyberattacks - Risk & Compliance - WSJ
How to keep the world's eyes out of your webcam
Media Release: CipherCloud Closes $50 Million in Financing to Extend Cloud Security Leadership
WebApp Sec: Re: concurrent logins
Lois Lerner Email Messages Recovered, Investigators Say -- 30k Documents Backed Up On Disaster Recovery Tapes
Ex-US Navy administrator sentenced for hacking - Richmond Times-Dispatch: Ap
Ransom malware attacks underscore limitations of anti-virus software | CIO
Usenix Security '14 - Xray: Enhancing The Web’S Transparency With Differential Correlation
Hacked video of sleeping Aussie babies appears on Russian website -
Target Continues Push To Nix Consumer Data Breach Suits - Law360
Russian hackers hijacked webcams included Lexington home
Hackers Just Exposed Thousands Of Gamer Passwords From Sony, Microsoft, And 2K | Business Insider India
Catching up with Yahoo CISO Alex Stamos - SC Magazine
The Evolution of and Need for Secure Network Access
Taking A Bolder Approach To Protect Identities And Endpoints | Symantec Connect
Digital Transformation and IT: The CIO´s balancing act | ZDNet
Why is Microsoft updating Windows PCs for a security bug on the server? | PCWorld
THUNK! News - Awesome Holiday Gifts And Tips From A Pro
Budding Brazilian Hackers Get Online Training from $46 - Infosecurity Magazine
Mobile Data Protection Market Worth $3.54 Billion by 2019 -- DALLAS, November 21, 2014 /PR Newswire UK/ --
Protecting critical healthcare data in the era of 'big data'
Ex-US Navy administrator sentenced for hacking
Don't Worry, Your PSN Account Details Probably Haven't Been Leaked - Push Square
NSA Chief Warns Chinese Cyberattacks Could Shut U.S. Infrastructure - NBC News
Why is Microsoft updating Windows PCs for a security bug on the server? - Techworld
Kaspersky Lab sur Twitter : "Time to #TestYourBrain... do you know the answer?"
Coming soon: Slow, heavy, shrieking, autonomous robot rent-a-cops | Ars Technica
What We Mean by Maturity Models for Security - Dark Reading
ACCES I/O Products Releases Rugged Mini PCI Express Isolated RS232 Serial Communication Cards with Tru-Iso™ Isolation and Extended Temperature | Virtual-Strategy Magazine
Target Corporation (NYSE:TGT) News Analysis: How Target (TGT) Recovered From Last Year's Credit-Card Breach
Man gets 18 months for Subway cash register hacks | FOX10 News |
Swedish appeals court nixes Assange's plea - SC Magazine
Marcio Barbado, Jr. sur Twitter : "@2600 Can you tell potentially dangerous human beings from embodied in-course cataclysms?"
Switzerland May Give Every Citizen $2,600 a Month | Motherboard
Avoid becoming a victim to webcam hackers |
US man sentenced for hacking POS systems at Subway | Network World
Facing up to a water crisis – Global Public Square - Blogs
Protecting your home cameras from hackers
Holiday shoppers nervous about hacking
Court Sends Subway Restaurant Hacker to Jail for 18 Months | WHAV
Soonr Inks Distribution Deal With Nuvotera To Boost Workplace File Sync Product - Page: 1 | CRN
Researchers craft molecule that works as flash storage | Ars Technica
VIDEO: Hackers Snooping on Unsecure Webcams | Video |
PSN, Windows Live, 2K Games & Other Services Hacked By Hacker Group DerpTrolling, Customers Login Details Leaked
In a cloud outage, no one can hear you scream | InfoWorld
ifty sur Twitter : "Relaxing after a hard week including a most excellent CTF/conference @irisscert"
Usenix Security '14 - On The Feasibility Of Large-Scale Infections Of Ios Devices
Man gets 18 months for hacking into Subway and stealing more than $40,000 in gift cards |
USB Armory is the Swiss army knife of security devices | ITworld
Ex-Navy administrator sentenced for hacking
Anonymous proves: Take hacks seriously - Northern Star Online: Scene
Firefox maker remains 'utterly confident' as revenue growth sputters - CNE
Dell Unveils a Slew of New Enterprise Systems - Cloud Computing on Top Tech News
Why Do People Keep Getting Pushed onto Subway Tracks? | VICE | United States
Hundreds of baby monitors and CCTVs hacked: how to keep your cameras safe - News - Gadgets and Tech - The Independent
Ex-US Navy administrator sentenced for hacking - San Francisco Chronicle
Russian Website Hacks Nanny Cams and Baby Monitors | Video - ABC News
Study: Third of employees use company devices for social media and online shopping - SC Magazine
Critical XSS vulnerability addressed in WordPress - SC Magazine
3 Questions to Ask Vendors When Securing POS - BankInfoSecurity
'DoubleDirect' MitM attack affects iOS, Android and OS X users - SC Magazine
The Brazilian Underground Market -
Preventing Another Holiday Season Data Breach – Blog Post – RSA Conference
Experts Predict Retailers Will Face Holiday Hacking Surge - The CIO Report - WSJ
Man gets 18 months for Subway cash register hacks - San Francisco Chronicle
UCF Police increase campus security following FSU shooting
New Malware, NSA Director Statements Shine Spotlight on Mobile Security - The CIO Report - WSJ
IT Departments across EMEA Still Not Ready for the Internet of Things, Finds ISACA Survey | Business Wire
Ransom malware attacks underscore limitations of anti-virus software | CSO Online
Northeast Florida campus security plans in place, yet students likely to still feel unsafe |
FSU shooting prompts review of security in Florida colleges - Sun Sentinel
NSA director states China can shut down U.S. electric grids, report indicates - SC Magazine
Web Shell: PHP Meterpreter
Beth Israel fined $100,000 for patient data breach - Business - The Boston Globe
DerpTrolling Leaks Thousands of Logins for PSN, Windows Live, 2K | SegmentNext
California man sentenced to 18 months for hacking into cash registers at Subway shops
South Florida must lead on climate change - Sun Sentinel
Schneier on Security: Friday Squid Blogging: Cephalopod Cognition
Being Refused CABG a Sign of Extra Risk for PCI Patients With Left Main, Multivessel Disease - Journal News - TCTMD
Has the PlayStation Network really been hacked? Should you change your password? | Naked Security
What SMBs Need to Know About Disaster Recovery as a Service
The Elevation of Privilege (EOP) Card Game
A Quick Look at MS14-068 | BeyondTrust
How to Position IT Security as an Enterprise Profit Center
News Story - Silver Surfer Today
Andy Coulson Walks From Prison After Five Months
USB Armory is the Swiss army knife of security devices - PC World New Zealand
Former Subway Franchise Owner Sentenced to 18 Months in Prison for Gift Card Hacking Scheme at Subway Restaurants
Which Retailers will Profit the Most This Holiday Shopping Season? -
US man sentenced for hacking POS systems at Subway | PCWorld
Kaspersky Internet Security for Android Proves Most Effective in PC Security Labs Test | Kaspersky Lab US
3 Internet of Things Security Nuances You May Not Have Considered
Privacyware Privatefirewall 7.0 Privilege Escalation ≈ Packet Storm
Corporate Call for National Data Breach Standards | Legal Times
PCI-DSS 3.0's Focus on the Data Security Practices of Service Providers | Snell & Wilmer - JDSupra
WordPress SP Client Document Manager 2.4.1 SQL Injection ≈ Packet Storm
Supr Shopsystem 5.1.0 Cross Site Scripting ≈ Packet Storm
Mandriva Linux Security Advisory 2014-223 ≈ Packet Storm
AWS Partner Story: Trend Micro
Registration is Now OPEN for RSA Conference 2015! – Blog Post
PSN, Windows Live, 2K Games User Accounts Leaked By Hacking Group
Google Launches Chrome 39, the 64-Bit Version Mac's OSX : Trending News : Latinos Health
UK National Crime Agency Arrests Hackers Using Remote Access Trojans
Fitch Upgrades Picard BondCo's Senior Notes to 'BB', Affirms IDR at 'B+'| Reuters
Chrysler, Nissan minivans earn 'dire' crash test results, says IIHS [w/video] - Autoblog
Bugtraq: [security bulletin] HPSBUX03087 SSRT101413 rev.2 - HP-UX CIFS Server (Samba), Remote Denial of Service (DoS), Execution of Arbitrary Code, Unauthorized Access
Feds Laud UMaine System as Cyber-Security Education Leader | Maine Public Broadcasting
Just Released 2015 Information Security Policy Documents Available for Download from the Compliance Leaders at | Virtual-Strategy Magazine
Juniper Networks sur Twitter : "Love it when the network surprises us with haikus."
Preparing for the Social Internet of Things
Usenix Security '14 - Security Analysis Of A Full-Body Scanner
Fitch Revises Ibercaja Banco's Outlook to Positive; Affirms IDR at 'BB+'| Reuters
Corporate Call for National Data Breach Standards | Corporate Counsel
(ISC)²® Opens Call for Speakers for Third Annual CyberSecureGov Training Event | Virtual-Strategy Magazine
Dell, Intel Open Doors to New IoT Solutions Lab
TidBITS: Keeping Up with the Snoops 7: Too Many Snoops
TECHNICAL WHITE PAPER▶The Cyber Resilient Enterprise - Harnessing You…
Angus King touts Maine University System’s role in preventing cyber ‘Pearl Harbor’ — Education — Bangor Daily News — BDN Maine
Target to judge: Banks’ losses in our card breach aren’t our problem | Ars Technica
Extracting Insight from Unstructured Data
ENTER PASSWORD_: A supercut of ‘90s cinema hackers · Great Job, Internet! · The A.V. Club
RSA Cloud Identity and Access Management for All of Your Applications - YouTube
Press Release: Russian webcam hackers-authority available for comment
Webcam hacking website based in Cocos Islands prompts warning from privacy commissioner - ABC News (Australian Broadcasting Corporation)
Homeland Security Today: Destructive Malware Evades Detection to Cause Multi-million Dollar Losses
HACKERS can DELETE SURVEILLANCE DVRS remotely – report • The Register
Kent man held in international computer hacking raids | Meridian - ITV News
Car-hacked: Cyber-criminals could target driverless vehicles, cause chaos – expert — RT UK
What tops Target's holiday wish list? Bringing back 'Tarjay'
Tech Data Partners Get Cisco Cybersecurity Solutions
Surveillance Camera Flaw Leaves Hackers in Control - Infosecurity Magazine
Computer hackers arrested in international operation by police - Telegraph
Critical XSS flaws patched in WordPress and popular plug-in | CSO Online
Why Mozilla is scared of Google | The Verge
iX Pro Tip: Using the PR Search Database - J-Net Community
Security is a People Problem, Training is the Solution | SecurityWeek.Com
6 tips for protecting your Internet-connected devices
DoubleDirect: Hackers Redirect High-Traffic Sites Via New MITM Attack
Amazon's AppStream can now stream any Windows application | ZDNet
Using a password manager on Android? It may be wide open to sniffing attacks | Ars Technica
Bugtraq: [ MDVSA-2014:223 ] wireshark
Bugtraq: [ MDVSA-2014:224 ] krb5
Bugtraq: [ MDVSA-2014:219 ] srtp
Bugtraq: [ MDVSA-2014:220 ] qemu
BillGuard And Experian Partner For Consumer Protection - Forbes
Advisory meeting has a melt-down | All Point Bulletin
Cyberwar is bullshit | The Verge
A bad year for cybersecurity, but a great one for business
Internet to Hit 3 Billion Users in 2015 - eMarketer
FTC shuts down operations of computer repair scammers - SC Magazine
Brigham Young University-Idaho student hacks transcript, earns $7k in scholarships - SC Magazine
DoubleDirect Hackers Snag Device Traffic ≈ Packet Storm
Computer Hijacking Arrests In UK And Across Europe ≈ Packet Storm
PayPal Takes 18 Months To Patch Critical Remote Code Execution Hole ≈ Packet Storm
The Emerging Moral Obligation You Have to People L... - J-Net Community
Executive Cyber Intelligence Report: November 21, 2014
Social Privacy - Online Reputation Protection – Don’t be that Guy
Privacy, rights groups support gov't spyware detection tool - SC Magazine
ACLU requests info on gov't spy program using 'dirtboxes' - SC Magazine
FTC Kills Tech Support Scam Firms That Raked In $120m ≈ Packet Storm
PlayStation Network and Windows Live hack could be a hoax, experts say | Technology | The Guardian
Pro tip: Fixes for common Active Directory connectivity issues on OS X - TechRepublic
Mobile Data Protection Market Worth $3.54 Billion by 2019 -- DALLAS, November 21, 2014 /PRNewswire/ --
Citadel variant targets master passwords, authentication solutions - SC Magazine
VirusBulletin tests 48 antivirus scanner for Windows 8.1 – Avast doesn’t pass |
Android Lollipop: Get All the Sweet Without the Sour -- What Enterprises Need to Know - Innovation Insights
Millions of WordPress websites in danger due to easily exploitable bug
IRISSCON 2014: Security Tales from the Emerald Isle - Infosecurity Magazine
The CRM Lottery
After Decent Quarter, Target's Strategy For The Next Carries Risk - Forbes
Three Wire Systems Buys Hardware Hosting Cage in San Diego | ExecutiveBiz
Incapsula estimates DDoS attacks cost $40,000 per hour | Network World
Family Internet Safety using a Secure Home Internet Gateway: How to Make Your Home Safe for Kids and from Malware | ওয়াশিংটন বাংলা রেডিও Washington Bangla Radio USA
Hackers leak logins from PSN, Windows Live, and 2K Games | SiliconANGLE
Kaspersky Lab sur Twitter : "@thisisdebasish There are a few reasons, which are explained in the article. More about privacy than being unsecure."
Number of cyber security jobs doubles as firms realise hacking threat
FACT SHEET: U.S. Assistance to Ukraine | The White House
Fitch Affirms Novartis AG at 'AA'; Outlook Stable| Reuters
A Forum to Spur America’s Return to Federalism
Ransom malware attacks underscore limitations of anti-virus software - CSO | The Resource for Data Security Executives
Hackers could pose the greatest threat to driverless cars | Concept - Car News Nov 2014 -
Linux Mint 17.1 finally makes MATE's fancy Compiz graphics easy to use | PCWorld
PSN, Windows Live and 2K Gaming networks ‘hacked’: experts recommend immediate password change, though release could be fake - News - Gadgets and Tech - The Independent
Fitch Downgrades AstraZenaca to 'A+'; Outlook Stable| Reuters
Computing Industry Pioneers Announce New Cybersecurity Venture | Business - Press Releases | | The Providence Journal
New Citadel Trojan Targets Your Password Managers
RSA TCO Calculator - EMC
Agenda – RSA Conference
Home Depot tops Street 3Q forecasts; breach costs hazy
The Pueblo Chieftain |Hackers breach webcam privacy
Will Black Friday Spawn Another Massive Data Breach? - Target (NYSE:TGT) - 24/7 Wall St.
Microsoft Azure Outage: What Went Wrong? | IaaS content from Talkin' Cloud
Video: Anonymous hacks Ku Klux Klan Twitter - Telegraph
CIA crypto-king offers new 'clock' clue to crack Kryptos code • The Register
Russians Hacking Webcams; FTC Ends Tech Scams; Tracking Comcast Techs | News & Opinion |
Is New Zealand Spying on Citizens? Greenwald vs Key | Top Secret Writers – Conspiracy Theory, Strange Stories and Truth
Apple Blocks Flash Player Over Security Issues - The Mac Observer
Driverless cars! They might get hacked! | BitterWallet
Russian webcam hacking website which shows feed apparently from Canterbury pub or bar
Homeland Security Today: Response Time is the Key to Mitigating Data Breaches, Survey Finds
Apple pushes Flash Player update to address security issues | 9to5Mac
What’s Missing from the Industrial Internet of Things Conversation? Software | WIRED
How to Protect From Webcam Hackers: Video - Bloomberg
Mark Fulford - Authors & Columnists - Dark Reading
Target customers and profits are back after hack | Money - WYFF Home
Top 8 enterprise network and security trends for 2015 - ITWeb Africa
Barracuda Offers Integrated Security; Boosts Portfolio with Consolidated Network and Content Security... -- CAMPBELL, Calif., Nov. 20, 2014 /PRNewswire/ --
Retail Security Not Getting Any Better, BitSight Study Finds
IBM Rolls Out Analytics-Based Security Solution - Big Data on CIO Today
Module 2: Class-Dump-Z
HP, Symantec team on Disaster Recovery as-a-Service offering based on Helion OpenStack
Norton Holiday Sale | Norton
3 Mobile Security Myths That Can Hurt You | FedTech Magazine
Usenix Security '14 - The Emperor’S New Password Manager: Security Analysis Of Web-Based Password Managers
Anonymous hackers to Ferguson police: 'We are the law now' - Washington Times
Facebook at Work: Here's what you need to know - TechRepublic
(ISC)²® Opens Call for Speakers for Third Annual CyberSecureGov Training Event
Four held in computer hacking probe | Daily Mail Online
Ventiv Technology's chief information security officer now reports to CEO - BWWGeeksWorld
RSA Security Analytics - EMC Store
Which Is It: Privacy vs. Security, or Privacy and Security? – Blog Post – RSA Conference
Distribution Watch: Accu-Tech, Synnex, Tech Data | Distribution Watch content from The VAR Guy
Four Held In UK Amid Crackdown On Hacking
Customers are over Target's 2013 holiday data breach - Albany Business Review
The Daily Tar Heel :: Tarheel Takeout data hacked
NSA Chief Concerned about Cyber Attacks on U.S Critical Infrastructure
Zero Day Weekly: WhatsApp, Blackphone, Citadel hits password managers | ZDNet
Britain urges Russia to shut down webcams
Australian baby monitors and webcams hacked as footage appears on a Russian website
Web Site Shows Feeds from Thousands of Private Webcams - Network Security on CIO Today
Experts: Home, baby cameras not secure worldwide - WTVQ
Hackers use webcams to spy on homes and businesses (From Daily Echo)
Man guilty in Hidalgo County attempted hacking - Houston Chronicle
Local news from Bellingham, Whatcom County, WA |
Hackers use webcams to spy inside homes of Middlesbrough families and broadcast video live to internet (From The Northern Echo)
Bugtraq: [ MDVSA-2014:218 ] asterisk
DoubleDirect hackers snaffle fandroid and iPhone-strokers' secrets • The Register
Video: How to protect yourselves from Russian webcam hackers - Telegraph
Target will ask judge to toss bank suits over breach - Minneapolis / St. Paul Business Journal
Want to beat auditors and adversaries? Think like an attacker | Government Health I
Website shows hacked private webcams, including several in Greensboro and High Point |
Britain urges Russia to shut down webcam spying site
Russians easily 'hack' webcams, like others have for YEARS | Computerworld
Australian baby monitors and webcams hacked |
Want to know how to shop safely on Black Friday and Cyber Monday? Join our Twitter chat! | Naked Security
Symantec Intelligence Report - October
Trend Micro Security Predictions | The Invisible Becomes Visible
Liverpool teen questioned by detectives as part of European-wide computer hacking investigation - Liverpool Echo
How to use an authenticator app to improve your online security | ZDNet
Barracuda Offers Integrated Security; Boosts Portfolio with Consolidated Network and Content Security Solution - MarketWatch
How hacking the sounds in your head could be the key to happiness - Telegraph
Examining 1 billion transactions for fraud
Hikvision DVRs sporting bugs that allow device hijacking
Andy Coulson freed from prison after just five months | Daily Mail Online
Video: Three held in Leeds over international computer hacking UPDATED - Yorkshire Evening Post
Phone-hacking editor Andy Coulson out of prison after five months
Uber taken to task over anti-journalist privacy debacle | Naked Security
WebApp Sec: AW: concurrent logins
Technology News & Electronic Updates | Electronics Weekly
How to troubleshoot performance issues in SharePoint custom code on your own? Part 4 – Tools Summary - SharePoint Developer Support Team Blog - Site Home - TechNet Blogs
Three held in Leeds over international computer hacking - Yorkshire Post
Former News Of The World Editor Andy Coulson Released From Prison
You want driverless cars? We need to sort out hacking first | Irish Examiner
You want driverless cars? We need to sort out hacking first |
Hacking major threat to driverless vehicle adoption - E & T Magazine
Technology is still a distraction for drivers
WiDy: Motivation and Goal
Black Friday Themed Amazon Voucher Scam
FBI offers $1 million reward for anybody who can help catch online car scam fugitive | Naked Security
Paul Hearns sur Twitter : "Leon van der Eijk of the Honeynet Project demos user account hack at #irisscon"
Usenix Security '14 - Automatically Detecting Vulnerable Websites Before They Turn Malicious
Phone-hacking editor Andy Coulson released from open prison to serve home detention - Crime - UK - The Independent
Andy Coulson released from prison on electronic tag - Telegraph
Grocers, retailers gobble up Apple Pay in time for holidays | Computerworld
Techbytes: Russian Hackers Tap Into Nearly 5,000 US Web Cams | Video - ABC News
Microsoft Says Config. Change Caused Azure Outage | Data Center Knowledge
Four held in computer hacking probe -
Welcome back, Andy Coulson. Let me tell you about life after prison | Denis MacShane | Comment is free |
NDB Advisory Announces Expansion of Edmonton, Alberta PCI QSA Services for Canada Merchants and Service Providers
The 12 scams of Christmas | ZDNet
NotCompable sets new standards for mobile botnet sophistication | CSO Online
Governments act against webcam-snooping websites | CSO Online
Apple iOS Masque flaw dangers: Legitimate app infiltration discovered | ZDNet
Cyber PreCogs? What Do the Next 2-3 Years Hold For Us? -
Why CIOs Need to Embrace New Norms of the Hybrid Cloud | CIO
$120M in tech support scams shut down by FTC -
AVG Bloggers Brunch 2014
MIT, Stanford, Land Major Cyber-Security Funding Injection
WebApp Sec: RE: concurrent logins
Hackers Leak PSN, 2K, Windows Live Accounts, Reset Passwords Now
Android 5.0 Lollipop review - reviews for UK IT professionals -
$120M in tech support scams shut down by FTC -
BBC News - World Internet Conference: Has China overcome paranoia?
How to troubleshoot performance issues in SharePoint custom code on your own? Part 3- Slow - SharePoint Developer Support Team Blog - Site Home - TechNet Blogs
$120M in tech support scams shut down by FTC - 23ABC News
Hacking Group May Be Linked to Russian Government, Report Says - Businessweek
PSN and Windows LIVE passwords leaked, Twitter and Facebook may be next -
7 Questions About The President's Immigration Plan Answered | NCPR News
PSN, Windows Live and 2K accounts allegedly compromised – change your passwords | VG247
Users of Remote Access Trojans arrested in Europe
Detekt — Free Anti-Malware Tool To Detect Govt. Surveillance Malware West Africa: Testimony of Assistant Administrator Nancy Lindborg Before the Senate Committee On Homeland Security and Governmental Affairs
Business Continuity Institute publishes a ‘Working Paper’ about organizational resilience
Why Online Privacy Protection Is Not Just About the NSA | Sanjay Sanghoee Directory of Businesses Jobs Press Releases Products Services Articles - Find Companies
Sophos launches Cloud Server Protection - ARN
Russian hackers posting footage from hacked web cams - WWMT - News, Sports, Weather, Traffic
Hacking group leaks PSN, Windows Live customer data | Attack of the Fanboy
BBC News - Chinese authorities arrest three over iOS malware
Wake Co. Schools Asking Students to Bring Their Own Smart Device to School - Time Warner Cable News
Ebola, hackers drive word of the year: 'Exposure' - CNE
Researchers Shine Spotlight on OS X/iOS Masque Attack | Malware | TechNewsWorld
Using company devices for personal activities leads to data loss
ITIL and ISO 20000 problem management
Scenario Based Haccking - Powershell And Mimikatz And Meterpreter
ESG Lab Review: Protecting Virtual Environments with Symantec Backup Exec 2014 - ESG Research - Enterprise Strategy Group
Spy cable revealed: how telecoms firm worked with GCHQ - Channel 4 News
Russia Hacking Into Cameras Across the World
AM - Worldwide webcam hack by Russian site 21/11/2014
Android phones turned into slave armies by hackers - The Times of India
Thomas J. DeMayo, CISSP CIPP/US CPT CEH CHFI MCSE, Director, IT Audit and Consulting, O’Connor Davies, LLP to Speak at the Knowledge Group’s Cyber Security Plans Event -