NetSecu
NetSecu

www.theregister.co.uk
www.theregister.co.uk
Staples comes clean: Hackers swiped 1.16 MILLION bank cards • The Register
krebsonsecurity.com
krebsonsecurity.com
Staples: 6-Month Breach, 1.16 Million Cards — Krebs on Security
www.cleveland.com
www.cleveland.com
Cleveland OH Local News, Breaking News, Sports & Weather - cleveland.com
midsizeinsider.com
midsizeinsider.com
Firms Leaving Low-Hanging Fruit in Business Data Security ::Security & Resiliency:: Midsize Insider
www.securitytube.net
www.securitytube.net
Run Away If You Can: Persistent Jamming Attacks Against Channel Hopping Wi-Fi Devices In Dense Networks
map.ipviking.com
map.ipviking.com
Norse - IPViking Live
www.trendmicro.com
www.trendmicro.com
Threats at Sea: A Security Evaluation of AIS - Security News - Trend Micro USA
now.avg.com
now.avg.com
The Changing Landscape of BYOD
www.schneier.com
www.schneier.com
Schneier on Security: Friday Squid Blogging: Squid Beard
technet.microsoft.com
technet.microsoft.com
Microsoft Security Bulletin MS14-082 - Important
technet.microsoft.com
technet.microsoft.com
Microsoft Security Bulletin MS14-076 - Important
www.businesswire.com
www.businesswire.com
NAFCU: 1 Year After Target Data Breach Confirmed, Consumers Vulnerable as Ever | Business Wire
www.wsj.com
www.wsj.com
Staples: 1.16 Million Cards Hit by Data Breach - WSJ
edition.cnn.com
edition.cnn.com
Pew survey: Privacy vs. online convenience - CNN.com
www.scmagazine.com
www.scmagazine.com
Roughly 1.16 million payment cards may have been affected in Staples breach - SC Magazine
www.scmagazine.com
www.scmagazine.com
Solo attacker likely responsible for phishing campaign, delivering Zeus variant - SC Magazine
twitter.com
twitter.com
Juniper Networks sur Twitter : "Did he miss anything? #HappyHolidays http://t.co/zpurejX4yw"
www.theregister.co.uk
www.theregister.co.uk
Sony Pictures hack is Hollywood's 'Snowden moment' say infosec bods • The Register
www.theregister.co.uk
www.theregister.co.uk
ICANN stresses critical internet systems not hacked • The Register
www.zdnet.com
www.zdnet.com
Staples: 1.16 million cards possibly vulnerable in data attack | ZDNet
blog.trendmicro.com
blog.trendmicro.com
Comprehensive Analysis of the FBI Warnings and Sony Network Breach -
now.avg.com
now.avg.com
What does the Future hold for Women in Tech
www.cnbc.com
www.cnbc.com
Staples confirms data breach; up to 1.2M cards affected
www.marketwatch.com
www.marketwatch.com
Staples says data breach affected 1.16 million payment cards - MarketWatch
www.kb.cert.org
www.kb.cert.org
Vulnerability Note VU#561444 - Multiple broadband routers use vulnerable versions of Allegro RomPager
www.cio.com
www.cio.com
BYOD Brings Bah Humbug This Holiday Season | CIO
www.scmagazine.com
www.scmagazine.com
New ransomware named 'CryptoLocker' being spread via phishing emails - SC Magazine
www.healio.com
www.healio.com
PCI process measures may not correlate with 30-day mortality | Cardiology
www.bloomberg.com
www.bloomberg.com
This ETF Hacks Into Cyber-Security Spending - Bloomberg
www.bizjournals.com
www.bizjournals.com
The top trends in cyber security and data for 2014 - Birmingham Business Journal
www.scmagazine.com
www.scmagazine.com
Git client discloses critical security vulnerability - SC Magazine
www.emc.com
www.emc.com
RSA Adaptive Authentication - risk-based, fraud - EMC
twitter.com
twitter.com
Packet sur Twitter : "Racking @JuniperNetworks gear at @netaccesscorp for Packet's first production facility. Woot! http://t.co/XxARYcxAXb"
go.juniper.net
go.juniper.net
Juniper Networks
www.trendmicro.com
www.trendmicro.com
Backdoors: What They Are and How to Defend Networks against Them - Security News - Trend Micro USA
www.rsaconference.com
www.rsaconference.com
Register – RSA Conference
now.avg.com
now.avg.com
Technology is still a distraction for drivers
www.2600.com
www.2600.com
AN OFFER TO SONY FROM 2600 | 2600
www.wired.com
www.wired.com
Obama's Bold Sony Statement: Canceling The Interview Was a 'Mistake' | WIRED
www.zdnet.com
www.zdnet.com
Sony debacle shows how not to handle a hack | ZDNet
www.scmagazine.com
www.scmagazine.com
Obama promises U.S. response to Sony attack, says company made mistake - SC Magazine
www.securitytube.net
www.securitytube.net
Synthetic Data Generation And Defense In Depth Measurement Of Web Applications
support.kaspersky.com
support.kaspersky.com
Kaspersky Internet Security 15 для Mac
www.csoonline.com
www.csoonline.com
Trojan program based on ZeuS targets 150 banks, can hijack webcams | CSO Online
www.tripwire.com
www.tripwire.com
FBI Officially Blames North Korea in Sony Pictures Hack - The State of Security
www.theregister.co.uk
www.theregister.co.uk
FBI fingers Norks in Sony hack, Obama asks: HOW DO YOU SOLVE A PROBLEM LIKE KOREA? • The Register
www.symantec.com
www.symantec.com
The Gift that Keeps on Giving: 12 Ways Everyone Can Help IT This Holiday Season | Symantec Connect
itunes.apple.com
itunes.apple.com
The Hacker on the App Store on iTunes
now.avg.com
now.avg.com
Thoughts on Mobile Digital Parenting
www.radware.com
www.radware.com
State of the Union: Ecommerce Page Speed & Web Performance [Fall 2014]
forums.juniper.net
forums.juniper.net
Pizza Hut Makeover, Mass Customization and Cloud A... - J-Net Community
www.reuters.com
www.reuters.com
U.S. Homeland Security urges business, government cooperation on cyber security| Reuters
krebsonsecurity.com
krebsonsecurity.com
FBI: North Korea to Blame for Sony Hack — Krebs on Security
www.csoonline.com
www.csoonline.com
Questions remain after FBI charges North Korea with attack on Sony Pictures | CSO Online
virtualizationreview.com
virtualizationreview.com
Defining 'Software-Defined' Environments -- Virtualization Review
www.scmagazine.com
www.scmagazine.com
Impact of Linux bug 'grinch' spans servers, workstations, Android devices and more - SC Magazine
www.schneier.com
www.schneier.com
Schneier on Security: Lessons from the Sony Hack
www.theguardian.com
www.theguardian.com
Judge gives customers go-ahead to sue Target over data breach | US news | theguardian.com
www.scmagazine.com
www.scmagazine.com
40,000 federal employees impacted by contractor breach - SC Magazine
www.jdsupra.com
www.jdsupra.com
Congress Passes The Federal Information Security Modernization Act of 2014: Bringing Federal Agency Information Security into the New Millennium | Davis Wright Tremaine LLP - JDSupra
www.scmagazine.com
www.scmagazine.com
Barrett Brown sentencing delayed until January - SC Magazine
www.scmagazine.com
www.scmagazine.com
Spearfishing campaign compromises ICANN systems - SC Magazine
packetstormsecurity.com
packetstormsecurity.com
FBI Believes North Korea Is Behind The Sony Attack ≈ Packet Storm
www.fiercemobilegovernment.com
www.fiercemobilegovernment.com
Survey: Consumers in emerging markets use mobile Internet for personal advancement, education - FierceMobileGovernment
www.infosecisland.com
www.infosecisland.com
FBI Says North Korea Was Behind Sony Hack
www.zdnet.com
www.zdnet.com
ZeuS variant strikes 150 banks worldwide | ZDNet
www.informationweek.com
www.informationweek.com
6 IT Career Resolutions - InformationWeek
www.scmagazine.com
www.scmagazine.com
Sony investigation reveals North Korea behind cyber attack, FBI says - SC Magazine
blog.trendmicro.com
blog.trendmicro.com
Comprehensive Analysis of the “Destructive” Malware Behind FBI Warnings and Sony Hack -
www.trendmicro.com
www.trendmicro.com
Using 8 Backdoor Techniques, Attackers Steal Company Data - Security News - Trend Micro USA
boston.cbslocal.com
boston.cbslocal.com
Boston Children’s Hospital To Pay $40,000 Fine Over Data Breach « CBS Boston
www.bloomberg.com
www.bloomberg.com
Hack Attacks: Are Cyber Breaches the New Normal?: Video - Bloomberg
www.securitytube.net
www.securitytube.net
Why Is Csp Failing? Trends And Challenges In Csp Adoption
www.slideshare.net
www.slideshare.net
The Real Cost of Slow Time vs Downtime
betanews.com
betanews.com
How your data will be at risk in 2015
www.slideshare.net
www.slideshare.net
Netbackup Versus EMC
www.trendmicro.com
www.trendmicro.com
You Better Watch Out, You Better Not Click: Holiday Movie Threats - Security News - Trend Micro USA
redskyvision.wistia.com
redskyvision.wistia.com
Carl Leonard - Innovating Security in the Cloud - redskyvision
www.scpr.org
www.scpr.org
Cyber security: How to protect your data and what to do if your identity is compromised | Take Two | 89.3 KPCC
www.net-security.org
www.net-security.org
USBdriveby: Compromising computers with a $20 microcontroller
support.kaspersky.com
support.kaspersky.com
How to download Kaspersky Internet Security 2015
edition.cnn.com
edition.cnn.com
Government hacks and security breaches skyrocket - CNN.com
techcrunch.com
techcrunch.com
This Little USB Necklace Hacks Your Computer In No Time Flat | TechCrunch
forums.juniper.net
forums.juniper.net
Banking on automation and devops - J-Net Community
www.cbsnews.com
www.cbsnews.com
Phishing quiz: Can you spot a scam when you see one? Don't be so sure - CBS News
www.trendmicro.com
www.trendmicro.com
Virtualization Security - Server Virtualization - Deep Security - Trend Micro USA
www.trendmicro.com
www.trendmicro.com
IoE 101: How to Explain All Things Smart, Wearable, and IoE - Security News - Trend Micro USA
www.youtube.com
www.youtube.com
U Force - Broderbund - Nes - Famicom - TV Game Commercial - Retro Gaming - 1988 - YouTube
www.databreachtoday.com
www.databreachtoday.com
Sony's Action Called Dangerous Precedent - DataBreachToday
www.fierceenterprisecommunications.com
www.fierceenterprisecommunications.com
Spotlight: Nearly half surveyed say SDN may be too immature to be secure - FierceEnterpriseCommunications
uk.businessinsider.com
uk.businessinsider.com
Retailers Look At The Mobile Web Opportunity - Business Insider
seclists.org
seclists.org
Bugtraq: TWiki Security Advisory - XSS Vulnerability - CVE-2014-9325
seclists.org
seclists.org
Bugtraq: TWiki Security Advisory - XSS Vulnerability - CVE-2014-9367
money.cnn.com
money.cnn.com
Why North Korea's attack should leave every company scared stiff - Dec. 19, 2014
support.kaspersky.com
support.kaspersky.com
Kaspersky Total Security Multi-Device
english.ahram.org.eg
english.ahram.org.eg
Founding of state cyber-security body worries digital rights activists - Politics - Egypt - Ahram Online
www.csoonline.com
www.csoonline.com
What we know about North Korea's cyberarmy | CSO Online
www.inc.com
www.inc.com
Why Killing the Password Is the Next Billion-Dollar Industry | Inc.com
blogs.cisco.com
blogs.cisco.com
Cloudy with a Chance of Scalable Malware Protection
www.scmagazine.com
www.scmagazine.com
2014 Industry Innovators: Access Control - SC Magazine
packetstormsecurity.com
packetstormsecurity.com
Linux GRINCH Vuln Does Not Sound Too Horrific ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Webcam-Snooping Spawn Of ZeuS Hits 150 Banks Worldwide ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Microsoft Takes On Tech Support Scammers ≈ Packet Storm
www.kb.cert.org
www.kb.cert.org
Vulnerability Note VU#1680209 - AppsGeyser generates Android applications that fail to properly validate SSL certificates
blog.trendmicro.com
blog.trendmicro.com
The Ultimate Goal of Digital Attacks -
www.net-security.org
www.net-security.org
New Zeus variant targets users of 150 banks
seclists.org
seclists.org
Bugtraq: SEC Consult SA-20141219-0 :: XSS & Memory Disclosure vulnerabilities in NetIQ eDirectory NDS iMonitor
www.csoonline.com
www.csoonline.com
Critical vulnerability in Git clients puts developers at risk | CSO Online
www.csoonline.com
www.csoonline.com
Microsoft files suit against alleged tech support scammers | CSO Online
www.securitytube.net
www.securitytube.net
Evaluating The Effectiveness Of Current Anti-Rop Defenses
www.slideshare.net
www.slideshare.net
INFOGRAPHIC▶ Enable the Agile Data Center
www.telecompaper.com
www.telecompaper.com
Exponential-e improves disaster recovery service with Zerto - Telecompaper
www.standard-democrat.com
www.standard-democrat.com
Sikeston Standard Democrat: Local News: Extension approved for county's last disaster recovery project (12/19/14)
www.eweek.com
www.eweek.com
RSA Chairman on Security in 2014: 'Best of Times, Worst of Times'
www.rsaconference.com
www.rsaconference.com
Today's Challenge: Database Security in the Cloud – Blog Post – RSA Conference
www.net-security.org
www.net-security.org
Critical flaw on over 12M routers allows device hijacking, network compromise
www.tripwire.com
www.tripwire.com
Critical Git Vulnerability Allows for Remote Code Execution
minnesota.cbslocal.com
minnesota.cbslocal.com
Federal Judge Allows Lawsuits Over Target Data Breach « CBS Minnesota
www.zdnet.com
www.zdnet.com
Zero Day Weekly: ICANN hacked, critical GitHub vuln, too much Sony drama | ZDNet
thehackernews.com
thehackernews.com
Hackers Can Read Your Private SMS and Listen to Phone Calls - Hacker News
www.csoonline.com
www.csoonline.com
Major Chinese smartphone manufacturer installed backdoor on up to 10 million devices | CSO Online
thehackernews.com
thehackernews.com
Router Vulnerability Puts 12 Million Home and Business Routers at Risk - Hacker News
www.schneier.com
www.schneier.com
Schneier on Security: SS7 Vulnerabilities
www.tripwire.com
www.tripwire.com
Sony & North Korea: A Call to Cyber Arms or Better Defense? - The State of Security
thehackernews.com
thehackernews.com
Critical Git Client vulnerability Allows Malicious Remote Code Execution - Hacker News
www.npr.org
www.npr.org
Successful Tech Requires An Old-Fashioned Skill: Organizing People : All Tech Considered : NPR
www.net-security.org
www.net-security.org
Critical Git flaw allows attackers to compromise developers' machines
www.net-security.org
www.net-security.org
Cybercriminals won’t take a vacation this holiday season
www.theregister.co.uk
www.theregister.co.uk
Linux 'GRINCH' vuln is AWFUL. Except, er, maybe it isn't • The Register
seclists.org
seclists.org
Bugtraq: [oCERT-2014-012] JasPer input sanitization errors
seclists.org
seclists.org
Bugtraq: APPLE-SA-2014-12-18-1 Xcode 6.2 beta 3
www.enisa.europa.eu
www.enisa.europa.eu
ENISA CERT training programme now available online — ENISA
www.security-faqs.com
www.security-faqs.com
Philip Lieberman On The Sony Hack: “This Scenario Will Play Out Again And In Even Worse Forms”
www.patentlyapple.com
www.patentlyapple.com
Apple Invents New Touch ID Virtual Combination Unlock Feature - Patently Apple
www.security-faqs.com
www.security-faqs.com
Sony Hack: The ‘Finger We Are Pointing At North Korea Should Be Pointing At Ourselves’
www.securitytube.net
www.securitytube.net
Eyes Of A Human, Eyes Of A Program: Leveraging Different Views Of The Web For Analysis And Detection
www.theregister.co.uk
www.theregister.co.uk
Webcam-snooping spawn of ZeuS hits 150 banks worldwide • The Register
www.security-faqs.com
www.security-faqs.com
Consumers Dubious of Mobile Payment Security, Prefer Third Party Services Such As PayPal
www.net-security.org
www.net-security.org
Smart grid security certification in Europe
www.net-security.org
www.net-security.org
Top 5 social media security predictions for 2015
www.net-security.org
www.net-security.org
Your email, your data, your control
www.privacyandsecuritymatters.com
www.privacyandsecuritymatters.com
On The Eighth Day of Privacy, Health Care Systems (Over)Shared Data | Privacy & Security Matters
www.extremetech.com
www.extremetech.com
HP reveals more details about The Machine: Linux++ OS coming 2015, prototype in 2016 | ExtremeTech
miami.cbslocal.com
miami.cbslocal.com
Tips To Increase Your Holiday Cyber-Shopping Security « CBS Miami
www.theregister.co.uk
www.theregister.co.uk
Movie industry's evil plan to destroy the internet is going precisely nowhere • The Register
www.securitytube.net
www.securitytube.net
Some Vulnerabilities Are Di Erent Than Others Studying Vulnerabilities And Attack Surfaces In The Wild
www.theatlantic.com
www.theatlantic.com
Sneaky Impersonator Robots Are Taking Over the Web - The Atlantic
github.com
github.com
Vulnerability announced: update your Git clients · GitHub
www.theregister.co.uk
www.theregister.co.uk
Hack hijacks electric skateboards, dumps hipsters in the gutter • The Register
www.azcentral.com
www.azcentral.com
Arizona Local News - Phoenix Arizona News - Phoenix Breaking News - azcentral.com
www.networkworld.com
www.networkworld.com
Human error root cause of November Microsoft Azure outage | Network World
www.securitytube.net
www.securitytube.net
Quantitative Evaluation Of Dynamic Platform Techniques As A Defensive Mechanism
www.tripwire.com
www.tripwire.com
Security Slice: The Sony Pictures Breach – Part Two
www.tripwire.com
www.tripwire.com
The Syrian Electronic Army strikes again! International Business Times hacked
www.theregister.co.uk
www.theregister.co.uk
Kiwi hacker 'menace' pops home detention tracker cuffs • The Register
www.nevadaappeal.com
www.nevadaappeal.com
Good cyber security habits essential for holidays | NevadaAppeal.com
www.macworld.com
www.macworld.com
Forensic software gets around Apple's iCloud security features | Macworld
www.scmagazine.com
www.scmagazine.com
2014 Industry Innovators - SC Magazine
www.gulf-daily-news.com
www.gulf-daily-news.com
Gulf Daily News » Business News » Key training for Batelco's staff
www.mcafee.com
www.mcafee.com
Downloader
blog.trendmicro.com
blog.trendmicro.com
How Cybercriminals Dodge Email Authentication
www.securityweek.com
www.securityweek.com
Zen and the Art of Cloud Database Security (Part 1) | SecurityWeek.Com
www.newindianexpress.com
www.newindianexpress.com
India Should Strive for Fool-proof Cyber Security -The New Indian Express
packetstormsecurity.com
packetstormsecurity.com
E-Journal CMS SQL Injection / Privilege Escalation ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Red Hat Security Advisory 2014-2021-01 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Red Hat Security Advisory 2014-2023-01 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Red Hat Security Advisory 2014-2010-01 ≈ Packet Storm
www.securitytube.net
www.securitytube.net
Dynamic Reconstruction Of Relocation Information For Stripped Binaries
www.linkedin.com
www.linkedin.com
Why every CIO needs a Kevin McCallister in 2015 | Scott Spiker | LinkedIn
www.wsj.com
www.wsj.com
McAfee: Cyberattacks Will Not Slow in 2015
arstechnica.com
arstechnica.com
Some 100,000 or more WordPress sites infected by mysterious malware | Ars Technica
www.trendmicro.com
www.trendmicro.com
Best Buys That Could Lead to the Worst Shams - Security News - Trend Micro USA
www.itnews.com.au
www.itnews.com.au
Beyond ACORN: Cracking the infosec skills nut - Security - Blogs - iTnews.com.au
www.zdnet.com
www.zdnet.com
All aboard the internet of things infosec hype train | ZDNet
www.businesscomputingworld.co.uk
www.businesscomputingworld.co.uk
IT Force Field: Preventing The Risk Of Viruses In Business | BCW
www.theregister.co.uk
www.theregister.co.uk
Experts: ISIS loonies use 'digital AK-47' malware to hunt victims • The Register
blog.spiderlabs.com
blog.spiderlabs.com
Alina POS malware "sparks" off a new variant - SpiderLabs Anterior
www.welivesecurity.com
www.welivesecurity.com
Cybercrime predictions for 2015
www.law360.com
www.law360.com
Target Data Breach Suit Left Largely Intact - Law360
www.healthcareitnews.com
www.healthcareitnews.com
Medical records exposed in massive Sony hack | Healthcare IT News
blog.trendmicro.com
blog.trendmicro.com
Comprehensive Analysis of the “Destructive” Malware Behind FBI Warnings -
www.scmagazine.com
www.scmagazine.com
California nonprofit sues San Diego Police Department over stingray documents - SC Magazine
www.scmagazine.com
www.scmagazine.com
'Spark' shares traits with Alina, JackPOS, uses AutoIt differently - SC Magazine
twitter.com
twitter.com
Lauren Hasenhuttl sur Twitter : "Participating in @JuniperNetworks Hour of Code for kids. Future Junos coder! http://t.co/LSSeJoI2DY"
twitter.com
twitter.com
Lauren Hasenhuttl sur Twitter : "Thx @Beaker for teaching the kids about coding @JuniperNetworks @codeorg "hardware powered by software" http://t.co/rGKtVldHL4"
www.securitytube.net
www.securitytube.net
Measuring Drive-By Download Defense In Depth
www.itbusiness.ca
www.itbusiness.ca
Top 5 High-Profile Cyber Security Breaches | IT Business Blog
www.washingtonpost.com
www.washingtonpost.com
2014 is ending, but this wave of technology disruptions is just beginning - The Washington Post
www.scmagazine.com
www.scmagazine.com
White House calls Sony hack a "serious national security matter," gov't mulls proper response - SC Magazine
blog.trendmicro.com
blog.trendmicro.com
Four Steps To An Effective Targeted Attack Response | Security Intelligence Blog | Trend Micro
www.cbronline.com
www.cbronline.com
6 issues surrounding IoT Security in 2015 - Computer Business Review
www.pastemagazine.com
www.pastemagazine.com
Hacked in 2014: The Year of the Data Breach :: Tech :: Features :: Paste
www.zdnet.com
www.zdnet.com
Sony attack linked to North Korea, theaters bail over terrorism threat | ZDNet
now.avg.com
now.avg.com
What’s Booming In Small Business
www.bloomberg.com
www.bloomberg.com
Sony Asks Media to Destroy Hacked Data: Do They Have a Case?: Video - Bloomberg
www.scmagazine.com
www.scmagazine.com
RSA details new Boleto malware family - SC Magazine
www.scmagazine.com
www.scmagazine.com
Researchers find 'CoolReaper' backdoor in CoolPad devices - SC Magazine
www.theregister.co.uk
www.theregister.co.uk
Misfortune Cookie crumbles router security: '12 MILLION+' in hijack risk • The Register
blogs.cisco.com
blogs.cisco.com
My Internet of Everything Holiday Wish List
fcw.com
fcw.com
Managing a cyber crime scene -- FCW
www.scmagazine.com
www.scmagazine.com
Critical 'Misfortune Cookie' bug puts millions of internet-connected routers at risk - SC Magazine
twitter.com
twitter.com
McAfee sur Twitter : "Choose comfort and joy this holiday season. Watch out for bogus online offers. #12Scams. http://t.co/LQ9KWxng2l"
www.pcworld.com
www.pcworld.com
How to train your staff on cyber security (and make it stick) | PCWorld
clarion.circdata-solutions.co.uk
clarion.circdata-solutions.co.uk
Forensics Europe Expo 2015 - Visitor
www.youtube.com
www.youtube.com
A Decade of Fraud and Cybercrime - YouTube
motherboard.vice.com
motherboard.vice.com
Reaction to the Sony Hack Is 'Beyond the Realm of Stupid' | Motherboard
now.avg.com
now.avg.com
Thoughts on Workplace Privacy
www.slideshare.net
www.slideshare.net
2014 State of the Union for Mobile Performance
www.usatoday.com
www.usatoday.com
No 'Interview' ... on any platform
www.securitytube.net
www.securitytube.net
Goldeneye: Efficiently And Effectively Unveiling Malware’S Targeted Environment
www.kaspersky.com
www.kaspersky.com
Data Security Breach Prevention Guide Download | Kaspersky Lab
www.esecurityplanet.com
www.esecurityplanet.com
PCI Compliance: Preparing for Version 3.0 - eSecurity Planet
midsizeinsider.com
midsizeinsider.com
Do Employees Pose the Biggest Threat to Information Security? ::Security & Resiliency:: Midsize Insider
abcnews.go.com
abcnews.go.com
2 More Former Sony Workers Sue Over Data Breach - ABC News
www.symantec.com
www.symantec.com
Mobile spyware makers are on shaky ground as the law begins to catch up with them | Symantec Connect
cyber-defense.sans.org
cyber-defense.sans.org
Cybersecurity & Cyber Defense | Implementing the 20 Critical Controls on a Low-Cost Budget: Do It, Dont Worry About It! | SANS Institute
now.avg.com
now.avg.com
Mobile banking, the safe way
world.einnews.com
world.einnews.com
Business must support staff training, says IT Governance as UK Government announces new cyber skills projects - World News Report
magazine.vulnerability-db.com
magazine.vulnerability-db.com
IBackup v10.0.0.45 suffers from a local Privilege Escalation Vulnerability | VULNERABILITY MAGAZINE - Bug Bounties, Acknoweldgements & Security Research
www.utsandiego.com
www.utsandiego.com
2 more former Sony workers sue over data breach | UTSanDiego.com
www.scmagazine.com
www.scmagazine.com
Reboot 25: Thought leaders - SC Magazine
forums.juniper.net
forums.juniper.net
Does NFV and Virtualisation Herald the End of Blac... - J-Net Community
www.theatlantic.com
www.theatlantic.com
How to Fool a Computer With Optical Illusions - The Atlantic
now.avg.com
now.avg.com
Boardroom or Baby? Why are there so few women in tech?
blog.radware.com
blog.radware.com
The “Easy Button” for Cyber-Attack Mitigation: Introducing Radware’s Attack Mitigation Service | Radware Blog
www.scmagazine.com
www.scmagazine.com
Jeans and blazers will feature RFID blocking fabric - SC Magazine
www.csoonline.com
www.csoonline.com
Organized criminals targeting individual iPhone, Android users | CSO Online
www.csoonline.com
www.csoonline.com
Point-of-sale malware creators still in business with Spark, an Alina spinoff | CSO Online
www.cbronline.com
www.cbronline.com
6 facts about mobile connectivity in developing and developed countries - Computer Business Review
now.avg.com
now.avg.com
Here’s To Second Acts
www.inquisitr.com
www.inquisitr.com
Brad Pitt & Angelina Jolie Get Cyber Security For Their Six Kids
blog.trendmicro.com
blog.trendmicro.com
Dr. Cleaner: Trend Micro’s Free Utility App Will Optimize Your Mac’s Disk and Memory -
www.net-security.org
www.net-security.org
HIPAA security compliance: How risk tolerant are you?
www.independent.co.uk
www.independent.co.uk
Pirate Bay resurrected by rival, as hackers leak government emails in response to Swedish raid - News - Gadgets and Tech - The Independent
www.creditcards.com
www.creditcards.com
7 high-tech holiday scams
twitter.com
twitter.com
Security Tube sur Twitter : "My SDR Demo kit - HackRF, RTL-SDRs, CBR Radios, microphone system, caregiver pagers etc. Thanks @michaelossmann ! http://t.co/DL0AwbWiPP"
www.radware.com
www.radware.com
Radware 2014 Global Network and Application Security Report
www.prnewswire.com
www.prnewswire.com
Calgary Welcomes Cyber Security for Oil and Gas Summit -- CALGARY, Alberta, Dec. 18, 2014 /PRNewswire/ --
forums.juniper.net
forums.juniper.net
Introducing our Juniper Fan-of-the-Month for Decem... - J-Net Community
blog.trendmicro.com
blog.trendmicro.com
Doubts Raised About "Grinch" Linux Vulnerability
www.securitytube.net
www.securitytube.net
Towards A Masquerade Detection System Based On User's Tasks
www.techtimes.com
www.techtimes.com
Quantum Cryptography May Make Future Credit Cards Hack-Proof : SCIENCE : Tech Times
www.theregister.co.uk
www.theregister.co.uk
Security SEE-SAW: $3 MEEELLION needed to fight a $100k hack • The Register
www.schneier.com
www.schneier.com
Schneier on Security: ISIS Cyberattacks
twitter.com
twitter.com
Cisco Security sur Twitter : "#TBT --- In 1995, Cisco introduced Private Internet eXchange, a popular IP firewall and NAT appliance #Cisco30 http://t.co/4nG4Yke5Ly"
www.tripwire.com
www.tripwire.com
Executive Cyber Intelligence Report: December 18, 2014 - The State of Security
www.infosecisland.com
www.infosecisland.com
Should I Use “SIEM X” or “MSSP Y”?
www.zdnet.com
www.zdnet.com
NY bank regulator's cybersecurity plan has strong authentication, identity | ZDNet
www.heraldonline.com
www.heraldonline.com
Local news from Rock Hill, SC | The Herald
www.convergedigest.com
www.convergedigest.com
Blueprint: How NFV is Shifting Service Provider Culture ~ Converge! Network Digest
smartdatacollective.com
smartdatacollective.com
Cyber Securit Application Portfolio Network | SmartData Collective
www.net-security.org
www.net-security.org
Corporate data: Protected asset or a ticking time bomb?
www.infosecisland.com
www.infosecisland.com
5 Effective Ways to Raise Privacy Awareness
www.independent.co.uk
www.independent.co.uk
Sony asks media not to publish leaked emails, as hackers threaten ‘Christmas gift’ of new leaks - News - Gadgets and Tech - The Independent
www.kaspersky.com
www.kaspersky.com
Forever Lost: 44% of People Could not Recover Money Stolen as a Result of Fraud | Kaspersky Lab
thehackernews.com
thehackernews.com
Google Releases Chrome Extension for End-To-End Email Encryption - Hacker News
www.net-security.org
www.net-security.org
Researcher publishes JavaScript DoS tool
www.technewsworld.com
www.technewsworld.com
FIDO Pursues Vision of a Password-Free World | Cybersecurity | TechNewsWorld
www.net-security.org
www.net-security.org
Malware peddlers take advantage of Sony's decision to pull controversial film
blog.radware.com
blog.radware.com
The Rise of Thingbots | Radware Blog
blog.radware.com
blog.radware.com
Transformation of the Data Center & Building the Private Cloud (Part 1) | Radware Blog
seclists.org
seclists.org
Bugtraq: E-Journal CMS (ID) - Multiple Web Vulnerabilities
seclists.org
seclists.org
Bugtraq: iTwitter v0.04 WP Plugin - XSS & CSRF Web Vulnerability
www.businesscomputingworld.co.uk
www.businesscomputingworld.co.uk
Who Has Access To Your Company Data? | BCW
packetstormsecurity.com
packetstormsecurity.com
Bots Now Outnumber Humans On The Web ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Beware CoolReaper Malware On Chinese Android Phones ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
'Angry' Snapchat Embroiled In Sony Pictures Hack ≈ Packet Storm
blog.coresecurity.com
blog.coresecurity.com
451 Research Report: “Core Security gives customers the ability to descramble vulnerability management noise” | Core Security Blog
www.slideshare.net
www.slideshare.net
Cisco Adds FirePOWER Capabilities to ASA Firewalls
www.laptopmag.com
www.laptopmag.com
Kaspersky Anti-Virus 2015 Review - PC Antivirus Software
krebsonsecurity.com
krebsonsecurity.com
Complex Solutions to a Simple Problem — Krebs on Security
www.youtube.com
www.youtube.com
Nintendo PowerGlove Commercial - YouTube
www.youtube.com
www.youtube.com
Finding an Unknown Threat with RSA Security Analytics and RSA ECAT - YouTube
www.schneier.com
www.schneier.com
Schneier on Security: The Limits of Police Subterfuge
www.securitytube.net
www.securitytube.net
Data Loss Prevention: Databases And Web
www.tripwire.com
www.tripwire.com
The Sony Hack – A Lesson in Cyber Terrorism
www.rsaconference.com
www.rsaconference.com
Amit Mital – Speaker – RSA Conference
now.avg.com
now.avg.com
Should businesses worry about wearables?
www.net-security.org
www.net-security.org
ICANN systems breached via spear-phishing emails
www.firstpost.com
www.firstpost.com
US Congress member calls Rajnath over terrorism and cyber security - Firstpost
www.theguardian.com
www.theguardian.com
North Korea probably not behind Sony Pictures hack, says cyber security expert - video | Technology | The Guardian
now.avg.com
now.avg.com
How to Identify Yourself, Digitally
seclists.org
seclists.org
Bugtraq: Apple iOS v8.x - Message Context & Privacy Vulnerability
thehackernews.com
thehackernews.com
Global Internet Authority ICANN Has Been Hacked - Hacker News
arstechnica.com
arstechnica.com
100Mbps Internet available to 59% of US, while gigabit still at just 3% | Ars Technica
www.theregister.co.uk
www.theregister.co.uk
CoolReaper pre-installed malware creates backdoor on Chinese Androids • The Register
thatguy.trendmicro.com
thatguy.trendmicro.com
Phishing Scams & Identity Theft Protection – Don’t be that Guy – Trend Micro
www.net-security.org
www.net-security.org
Ars Technica readers urged to change passwords in wake of hack
bgr.com
bgr.com
Gmail Google Drive and security features: Google updates email service | BGR
www.securityinfowatch.com
www.securityinfowatch.com
Pivot3's Hyper-Converged Disaster Recovery Appliance
motherboard.vice.com
motherboard.vice.com
Cuba Is Getting the Internet | Motherboard
www.zdnet.com
www.zdnet.com
Hackers rejoice: Sony pulls Korea film, bows to criminal pressure | ZDNet
gcn.com
gcn.com
Apps, not malware, should be your biggest mobile concern -- GCN
seclists.org
seclists.org
Information Security News: Why the Sony hack is unlikely to be the work of North Korea.
seclists.org
seclists.org
Information Security News: ICANN HACKED: Intruders poke around global DNS innards
www.latimes.com
www.latimes.com
UC Berkeley hack: Personal data on 1,600 people possibly compromised - LA Times
www.securitytube.net
www.securitytube.net
Data Loss Prevention: Data In Motion Lab
www.techradar.com
www.techradar.com
Connected cars: a cyber-security nightmare on wheels | News | TechRadar
www.informationweek.com
www.informationweek.com
3 OpenStack Predictions For 2015 - InformationWeek
www.theregister.co.uk
www.theregister.co.uk
TorrentLocker ransomware pestilence plagues Europe, bags $500k • The Register
www.deccanherald.com
www.deccanherald.com
Tulsi Gabbard, Rajnath discuss terrorism, cyber security
www.wired.com
www.wired.com
The Evidence That North Korea Hacked Sony Is Flimsy | WIRED
www.turkishweekly.net
www.turkishweekly.net
Geers: , 18 December 2014
www.bsminfo.com
www.bsminfo.com
Pivot3 Simplifies Backup And Disaster Recovery With Hyper-Converged Infrastructure Appliance
www.cbronline.com
www.cbronline.com
'CoolReaper' backdoor uncovered in CoolPad Android devices - Computer Business Review
www.cioinsight.com
www.cioinsight.com
Most IT Pros Ill-Prepared to Deal With Breaches
mashable.com
mashable.com
Delta security flaw let passengers access others' boarding passes
thehackernews.com
thehackernews.com
Built-In Backdoor Found in Popular Chinese Android Smartphones - Hacker News
www.wired.com
www.wired.com
The FBI Used the Web's Favorite Hacking Tool to Unmask Tor Users | WIRED
www.securitytube.net
www.securitytube.net
Dll Injection
www.turkishweekly.net
www.turkishweekly.net
Geers: "You can find traces of its real-world conflicts in cyberspace", 18 December 2014
time.com
time.com
Angelina Jolie Has a Cyber-Security Team To Protect Her Kids Online
www.reuters.com
www.reuters.com
Ex-Sony employees sue, claim company failed to protect data| Reuters
www.net-security.org
www.net-security.org
Python Forensics Review
www.net-security.org
www.net-security.org
How employees put your company at risk during the holidays
www.theregister.co.uk
www.theregister.co.uk
Social sniffer predicts which Nigerian prince has the best chance of scamming you • The Register
www.net-security.org
www.net-security.org
Only 1% of consumers feel safe using mobile payments
blogs.cisco.com
blogs.cisco.com
Wiper Malware – A Detection Deep Dive
www.tripwire.com
www.tripwire.com
10 Notorious Cyber Criminals Brought to Justice - #8
www.securitytube.net
www.securitytube.net
Nsc - Alex Ionescu - "Breaking Protected Processes"
www.forbes.com
www.forbes.com
Sony Pictures: The Data Breach And How The Criminals Won - Forbes
h30507.www3.hp.com
h30507.www3.hp.com
HP Blogs - 2014 Tape Market State of the Union - The HP Blog Hub
www.networksasia.net
www.networksasia.net
Four key areas of security solutions Singapore companies need to invest in | Networks Asia
seclists.org
seclists.org
Bugtraq: Jease CMS v2.11 - Persistent UI Web Vulnerability
rt.com
rt.com
Anonymous hacks Swedish govt emails over seizure of Pirate Bay servers — RT News
www.businesscomputingworld.co.uk
www.businesscomputingworld.co.uk
The Storage Industry Is Due For A Shake Up | BCW
outsidelens.scmagazine.com
outsidelens.scmagazine.com
Watch "James Bond 'Spectre' script stolen in Sony hack" Video at SCMagazine
www.nbcnews.com
www.nbcnews.com
Could Sony Hack Scare Other Companies Into Beefing Up Cybersecurity? - NBC News
www.securitytube.net
www.securitytube.net
Nsc - Andrea Barisani - Forging The Usb Armory
www.kirotv.com
www.kirotv.com
Seattle-based attorneys suing Sony Pictures over data breach | www.kirotv.com
www.thesslstore.com
www.thesslstore.com
10 Important Factors That Make Symantec™ SSL Certificates #1
www.usatoday.com
www.usatoday.com
No theaters, no VOD for 'The Interview'
time.com
time.com
Sony Hack: 3 Reasons People Think North Korea Did It
www.theregister.co.uk
www.theregister.co.uk
URL LOL: Delta splats web flight boarding pass snoop bug • The Register
www.theregister.co.uk
www.theregister.co.uk
Sony cancels The Interview flick launch amid terror threats • The Register
www.arnnet.com.au
www.arnnet.com.au
ARN Storage Roundtable - Ensuring business continuity and building opportunities - ARN
packetstormsecurity.com
packetstormsecurity.com
Red Hat Security Advisory 2014-2008-01 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Red Hat Security Advisory 2014-2009-01 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Fwknop Port Knocking Utility 2.6.5 ≈ Packet Storm
www.celebuzz.com
www.celebuzz.com
Angelina Jolie and Brad Pitt Hired a Cyber Security Team for Their Kids
gisuser.com
gisuser.com
PCI Geomatics Announces Student Licensing availability via Partnership with Studica Academic Reseller | GISuser.com
blog.trendmicro.com
blog.trendmicro.com
WSCED: Top 5 Online Holiday Safety Tips for Cousin Eddie -
windowsitpro.com
windowsitpro.com
No laughing matter: Why your company’s IT security isn’t a joke | Windows IT Pro Guest Blogs
www.securitytube.net
www.securitytube.net
Nsc - Andrea Allievi - "Understanding And Defeating Windows 8.1 Patch Protections"
www.symantec.com
www.symantec.com
Google’s SHA-1 Deprecation Plan for Chrome | Symantec Connect
www.scmagazine.com
www.scmagazine.com
Apple wins class-action lawsuit over iPod copyright management - SC Magazine
www.wired.com
www.wired.com
North Korea Almost Certainly Did Not Hack Sony | WIRED
www.scmagazine.com
www.scmagazine.com
Phishing email contains Word doc, enabling macros leads to malware infection - SC Magazine
www.scmagazine.com
www.scmagazine.com
Landmark HIPAA settlement confirms push to firm up patching schedules - SC Magazine
www.scmagazine.com
www.scmagazine.com
Former employees sue Sony, theaters drop 'The Interview' - SC Magazine
recode.net
recode.net
How Secure Are Temporary Messaging Apps for Work? | Re/code
www.kaspersky.com
www.kaspersky.com
TOP 5 PRACTICAL TIPS FOR MOBILE SECURITY & BYOD
www.scmagazine.com
www.scmagazine.com
Mobile RAT Xsser continues to threaten Android, iOS device security - SC Magazine
www.csoonline.com
www.csoonline.com
10 cybersecurity predictions for 2015 | CSO Online
www.lexology.com
www.lexology.com
New York establishes new cyber security examination process for financial institutions - Lexology
www.youtube.com
www.youtube.com
Cisco Global Cloud Index: Global Data Generated Annually by Internet of Everything (IoE) Devices - YouTube
www.csoonline.com
www.csoonline.com
Setting the wrong precedent: Top theater chains drop Sony's 'The Interview' after threats | CSO Online
www.scmagazineuk.com
www.scmagazineuk.com
40% rise in vulnerabilities: OpenSSL, Google Chrome and IBM worst offenders - SC Magazine UK
www.scmagazine.com
www.scmagazine.com
NIST drafts new cloud metrics guide - SC Magazine
www.infosecisland.com
www.infosecisland.com
What Network Security Lessons Can We Learn from the Sony Attack?
support.avg.com
support.avg.com
Uninstall AVG PC TuneUp | AVG
www.utsandiego.com
www.utsandiego.com
EdgeWave nets additional $2 million in funding | UTSanDiego.com
blog.trendmicro.com
blog.trendmicro.com
AWS re:Invent Round Up -
www.scmagazine.com
www.scmagazine.com
Why compliance matters - SC Magazine
community.websense.com
community.websense.com
Tis the Season for…Financial Crime - Websense Insights
play.google.com
play.google.com
AntiVirus Security - FREE - Android Apps on Google Play
blog.radware.com
blog.radware.com
UPDATED: 18 Questions (and Answers) About Google, Site Speed, and SEO | Radware Blog
www.securitytube.net
www.securitytube.net
Nsc - Sebastien Dudek - Homeplugav Plc: Practical Attacks And Backdooring
www.cambio.com
www.cambio.com
Angelina Jolie Hired a Cyber Security Team for Her Kids | Cambio
www.net-security.org
www.net-security.org
(IN)SECURE Magazine
www.tripwire.com
www.tripwire.com
70% of Employees Admit Having Unnecessary Access to Confidential DataThe State of Security
www.techzone360.com
www.techzone360.com
2014 Was the Year of the Data Breach, But 2015 Could Be Worse
blogs.wsj.com
blogs.wsj.com
What You Googled in 2014: Robin Williams, ‘Flappy Bird,’ ‘Frozen’ - Digits - WSJ
www.marketwired.com
www.marketwired.com
Blue Coat Cloud Security Service and Threat Intelligence Solutions Win Information Security 2014 Readers' Choice Awards
www.scmagazine.com
www.scmagazine.com
An epic ride: A look back at the ever-changing information security industry - Print Article - SC Magazine
www.scmagazineuk.com
www.scmagazineuk.com
Quantum physics behind 'unhackable' security authentication - SC Magazine UK
packetstormsecurity.com
packetstormsecurity.com
HP Security Bulletin HPSBMU03221 1 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
HP Security Bulletin HPSBOV03225 1 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
HP Security Bulletin HPSBOV03226 1 ≈ Packet Storm
www.infosecisland.com
www.infosecisland.com
Grinch Bug Could be Worse Than Shellshock, Says Experts
www.csoonline.com
www.csoonline.com
10 changes you can make to achieve security serenity now! | CSO Online
www.csoonline.com
www.csoonline.com
New ransomware avoids hitting the same victim twice | CSO Online
www.csoonline.com
www.csoonline.com
ICANN targeted by Spear Phishing attack, several systems impacted | CSO Online
www.pcworld.com
www.pcworld.com
Linux 'grinch' vulnerability could put a hole in your security stocking | PCWorld
www.scmagazine.com
www.scmagazine.com
Skimming at Virginia ATMs, more than 3,000 Union debit cards compromised - SC Magazine
www.theregister.co.uk
www.theregister.co.uk
ICANN hackers sniff around global DNS root zone system • The Register
arstechnica.com
arstechnica.com
Ars was briefly hacked yesterday; here’s what we know | Ars Technica
blog.trendmicro.com
blog.trendmicro.com
HP Selects Trend Micro Deep Discovery to Help Fight Targeted Attacks -
www.zdnet.com
www.zdnet.com
Current connections not up to standard: Juniper Networks | ZDNet
www.slideshare.net
www.slideshare.net
Infonetics Report
www.tripwire.com
www.tripwire.com
Delta Airlines Patches Boarding Pass URL BugThe State of Security
www.newseveryday.com
www.newseveryday.com
Sony Ex-Workers File Suits Against Company Over Data Breach : Tech : News Every Day
www.scmagazine.com
www.scmagazine.com
Experts discover TorLocker variant targeting Japanese speakers - SC Magazine
thelead.blogs.cnn.com
thelead.blogs.cnn.com
Angelina Jolie, other stars slammed in hacked Sony emails – The Lead with Jake Tapper - CNN.com Blogs
www.securitytube.net
www.securitytube.net
Nsc - Richard Johnson - "Fuzzing And Patch Analysis Sagely Advice"
www.radware.com
www.radware.com
Attack Mitigation Service: Cyber Security Just Got Easier
www.scmagazine.com
www.scmagazine.com
Dutch DPA fine over privacy violations could cost Google $18.6M - SC Magazine
twitter.com
twitter.com
Chris Crowley sur Twitter : "#sanscdi #sec575 #Ctf underway. #gas. @joswr1ght http://t.co/Bi5OU5aMbO"
usa.kaspersky.com
usa.kaspersky.com
Kaspersky Lab Survey: Half of Companies Put Themselves at Risk by Undervaluing DDoS Countermeasures | Kaspersky Lab US
www.pharmpro.com
www.pharmpro.com
PCI Synthesis Sponsors New England CRO/CMO Council
www.tripwire.com
www.tripwire.com
Raising Your Threat Intelligence - The State of SecurityThe State of Security
motherboard.vice.com
motherboard.vice.com
The Dawn of the Flying Smartphone | Motherboard
seclists.org
seclists.org
Bugtraq: Morfy CMS v1.05 - Command Execution Vulnerability
twitter.com
twitter.com
McAfee sur Twitter : "Oh hackers, oh hackers—thy tricks are so unchanging. Don't fall for these #12Scams. http://t.co/IE0ocLkRUJ"
www.darkreading.com
www.darkreading.com
How to Become a CISO - Dark Reading
forums.juniper.net
forums.juniper.net
NorthStar Controller, explained by an English Scho... - J-Net Community
www.rsaconference.com
www.rsaconference.com
Paul Kocher – Speaker – RSA Conference
www.theregister.co.uk
www.theregister.co.uk
Can't stop Home Depot-style card pwning, but suppliers will feel PCI regulation pain • The Register
www.japantimes.co.jp
www.japantimes.co.jp
Former Sony employees sue studio over 'nightmare' data breach | The Japan Times
seclists.org
seclists.org
Bugtraq: Cross-Site Scripting (XSS) in Revive Adserver
seclists.org
seclists.org
Bugtraq: Bird Feeder v1.2.3 WP Plugin - CSRF & XSS Vulnerability
usa.kaspersky.com
usa.kaspersky.com
Kaspersky Internet Security 2015 | Kaspersky Lab US
usa.kaspersky.com
usa.kaspersky.com
Kaspersky Internet Security - Multi-Device 2015 | Kaspersky Lab US
www.marketwatch.com
www.marketwatch.com
Onapsis Appoints Enterprise Information Security Expert Renee Guttmann to Board of Advisors - MarketWatch
www.csoonline.com
www.csoonline.com
The biggest challenges faced by CIOs/CISOs heading into 2015 | CSO Online
thehackernews.com
thehackernews.com
Anonymous Hacks Swedish Government in Revenge for 'Pirate Bay' Takedown - Hacker News
www.juniper.net
www.juniper.net
Revolutionary Quiz - Juniper Networks
www.net-security.org
www.net-security.org
Google starts blocking badly behaving Gmail extensions
www.zdnet.com
www.zdnet.com
Bluster, bravado and breaches: Today's 'terrorist' players in cybersecurity | ZDNet
grs.cisco.com
grs.cisco.com
Cisco
www.scmagazineuk.com
www.scmagazineuk.com
Constant attack a growing reality - SC Magazine UK
enterpriseinnovation.net
enterpriseinnovation.net
2015 predictions: The always-on business, cloud, security, data explosion and IoT | Enterprise Innovation
www.scmagazine.com
www.scmagazine.com
Researchers warn of new OphionLocker ransomware - SC Magazine
packetstormsecurity.com
packetstormsecurity.com
Sony Sued By Ex-Staff Over Draft Security, Leaked Privates ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Sony Cancels Premiere Of The Interview After Hacker Terrorist Threats ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
London Teen Pleads Guilty To Spamhaus DDoS ≈ Packet Storm
www.net-security.org
www.net-security.org
Malware peddlers turn again to malicious links
blog.trendmicro.com
blog.trendmicro.com
What's New in Exploit Kits in 2014 | Security Intelligence Blog | Trend Micro
www.securitytube.net
www.securitytube.net
Nsc - Renaud Lifchitz - "Quantum Computing In Practice"
www.csoonline.com
www.csoonline.com
Google's work on full encryption chugs along, with Yahoo's help | CSO Online
www.zdnet.com
www.zdnet.com
Google: Mark HTTP pages as insecure | ZDNet
www.zdnet.com
www.zdnet.com
ICANN falls for spear phishing attack | ZDNet
www.eweek.com
www.eweek.com
Cloud Adoption Driven by Reliability, Business Continuity
www.designntrend.com
www.designntrend.com
Angelina Jolie And Brad Pitt Hire Cyber Security Team To Monitor Content Their Kids Encounter Online : Entertainment : Design & Trend
rcpmag.com
rcpmag.com
2014 Security Review: The Year in Breaches, Hacks and Exploits -- Redmond Channel Partner
pages.email.rsaconference.com
pages.email.rsaconference.com
Download this infographic that reveals how customers truly feel.
www.net-security.org
www.net-security.org
Researchers confirm multiple Google App Engine security sandbox bypasses
www.schneier.com
www.schneier.com
Schneier on Security: How the FBI Unmasked Tor Users
now.avg.com
now.avg.com
Four trends that will change mobile in 2015
twitter.com
twitter.com
VULNERABILITY LAB sur Twitter : "[BUG BOUNTY AWARD] The award trophy of the best bug bounty- and best upcoming bug bounty -program award arrived today http://t.co/yzAV4JjYFH"
www.vulnerability-lab.com
www.vulnerability-lab.com
LIST of BUG BOUNTY PROGRAMS INTERNATIONAL 385+ & OFFICIAL - Bug Bounty Sheet VULNERABILITY LAB
www.americanbanker.com
www.americanbanker.com
What Banks Don t Know About the Security Hazards of Cloud Computing - American Banker Article
www.net-security.org
www.net-security.org
Sony hackers threaten company and movie-goers
www.net-security.org
www.net-security.org
Tackling the growing web of data residency and privacy regulations
seclists.org
seclists.org
Bugtraq: secuvera-SA-2014-01: Reflected XSS in W3 Total Cache
www.wired.com
www.wired.com
Tech Giants Rally Around Microsoft to Protect Your Data Overseas | WIRED
thehackernews.com
thehackernews.com
Quantum Encryption Makes Credit Cards Fraud-Proof - Hacker News
www.net-security.org
www.net-security.org
Do senior executives understand their role in data security?
mefminute.com
mefminute.com
Preparing for the Social Internet of Things – AVG – mefminute
www.theregister.co.uk
www.theregister.co.uk
London teen pleads guilty to Spamhaus DDoS • The Register
www.businesswire.com
www.businesswire.com
Coalfire’s Navis RapidSAQ™ Updated to New PCI Standards | Business Wire
blog.avast.com
blog.avast.com
Avast blog » South Korea hit with banking malware using VPN connection
www.securitytube.net
www.securitytube.net
Nsc - Nicolas Collignon - "Google Apps Engine Security"
seclists.org
seclists.org
Bugtraq: [REVIVE-SA-2014-002] Revive Adserver 3.0.6 and 3.1.0 fix multiple vulnerabilities
seclists.org
seclists.org
Bugtraq: FreeBSD Security Advisory FreeBSD-SA-14:30.unbound
abc7.com
abc7.com
UC Berkeley warns 1,600 of personal data breach | abc7.com
www.zdnet.com
www.zdnet.com
New Norton Mobile Security warns of privacy problems | ZDNet
continuitycentral.com
continuitycentral.com
Business continuity briefs
www.cmswire.com
www.cmswire.com
2015 Forecast: The Sun is Out for Cloud Computing
www.csoonline.com
www.csoonline.com
Retailers must not ignore security alerts, court says | CSO Online
www.itnewsafrica.com
www.itnewsafrica.com
What are the keys to effective information security? | IT News Africa- Africa's Technology News Leader
thehackernews.com
thehackernews.com
Sony Hackers Threaten 9/11 Type Attack at Theaters Showing 'The Interview' Movie - Hacker News
www.networkworld.com
www.networkworld.com
A brief history of Mac malware
www.theregister.co.uk
www.theregister.co.uk
Sony sued by ex-staff over daft security, leaked privates • The Register
www.net-security.org
www.net-security.org
Top 5 malware attacks: 35 reused components
www.net-security.org
www.net-security.org
Protecting the underground electronic communications infrastructure
www.securitytube.net
www.securitytube.net
Nsc - Peter Hlavaty - "Attack On The Core"
www.slideshare.net
www.slideshare.net
Top Ten Private Cloud Risks
www.lexsi-leblog.com
www.lexsi-leblog.com
Kronos: decrypting the configuration file and injects - Weblog Lexsi
www.whatech.com
www.whatech.com
StorageCraft releases backup, disaster recovery tool for use with VMware, Microsoft System Center - WhaTech
www.drdobbs.com
www.drdobbs.com
Farewell, <em>Dr. Dobb's</em> | Dr Dobb's
www.symantec.com
www.symantec.com
TorLocker ransomware variant designed to target Japanese users | Symantec Connect
www.kcra.com
www.kcra.com
UC Berkeley warns 1,600 of personal data breach | News - KCRA Home
seclists.org
seclists.org
Bugtraq: [security bulletin] HPSBOV03226 rev.1 - HP TCP/IP Services for OpenVMS, BIND 9 Resolver, Multiple Remote Vulnerabilities
seclists.org
seclists.org
Bugtraq: [security bulletin] HPSBMU03217 rev.1 - HP Vertica Analytics Platform running Bash Shell, Remote Code Execution
phys.org
phys.org
Fraud-proof credit cards possible with quantum physics
www.securitytube.net
www.securitytube.net
Nsc - Guillaume Valadon, Nicolas Vivet - "Detecting Bgp Hijacks In 2014"
seclists.org
seclists.org
Bugtraq: Elefant CMS v1.3.9 - Persistent Name Update Vulnerability
seclists.org
seclists.org
Bugtraq: Konakart v7.3.0.1 CMS - CS Cross Site Web Vulnerability
www.tripwire.com
www.tripwire.com
The 12 Hacks of Christmas: Part 1The State of Security
www.fireeye.com
www.fireeye.com
Is POODLE Back for Another Byte? « Threat Research | FireEye Inc
www.jdsupra.com
www.jdsupra.com
New York Establishes New Cyber Security Examination Process for Financial Institutions | Ropes & Gray LLP - JDSupra
www.eweek.com
www.eweek.com
EMV Among the Missing Pieces of PCI DSS 3.0
motherboard.vice.com
motherboard.vice.com
The Steel Rooms Helping Cops Fight Cyber Crime | Motherboard
seclists.org
seclists.org
Bugtraq: iWifi for Chat v1.1 iOS - Denial of Service Vulnerability
abcnews.go.com
abcnews.go.com
Sony Facing 2 Suits by Ex-Workers Over Data Breach - ABC News
aws.amazon.com
aws.amazon.com
Coming Together for AWS Customers: Cloudnexa, AppDynamics, Sumo Logic and Trend Micro |
www.tripwire.com
www.tripwire.com
Passwords Are The New DataThe State of Security
fivethirtyeight.com
fivethirtyeight.com
Of Course You Hear What I Hear — Christmas Music Season Is Totally Data-Driven | FiveThirtyEight
www.theregister.co.uk
www.theregister.co.uk
Google bakes W3C malware-buster into Gmail • The Register
www.infoworld.com
www.infoworld.com
Creative defense: Crowdsource your hackers
www.scmagazine.com
www.scmagazine.com
Reboot 25: Threat seekers - SC Magazine
www.scmagazine.com
www.scmagazine.com
Ursnif malware variant detected in global spike - SC Magazine
www.securitytube.net
www.securitytube.net
Nsc - Braden Thomas - "Reverse Engineering Msp430 Device"
www.symantec.com
www.symantec.com
Malicious links: Spammers change malware delivery tactics | Symantec Connect
www.zdnet.com
www.zdnet.com
2014 in security: The biggest hacks, leaks, and data breaches | ZDNet
www.people.com
www.people.com
Angelina Jolie Hires Cyber Security to Protect Her Kids Online - Angelina Jolie, Brad Pitt : People.com
on.aol.com
on.aol.com
McAfee: Cyberattacks Will Not Slow in 2015 - AOL On
www.networkcomputing.com
www.networkcomputing.com
How Ethernet Can Secure The Connected Car - Network Computing
usa.kaspersky.com
usa.kaspersky.com
Infographic: Holiday Shopping - The 12 Ways of Shopping Safely & Staying Cybertheft-free | Internet Security Infographics | Kaspersky Lab US
www.theguardian.com
www.theguardian.com
SoakSoak malware leaves 11,000 WordPress sites blacklisted by Google | Technology | The Guardian
www.rsaconference.com
www.rsaconference.com
RSAC Speaker Submissions Reveal What the Industry Cares About – Blog Post – RSA Conference
packetstormsecurity.com
packetstormsecurity.com
RStickets! 1.0.0 Remote Shell Upload ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
RSform!Pro 1.3.0 Remote Shell Upload ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Konakart 7.3.0.1 Cross Site Scripting ≈ Packet Storm
thehackernews.com
thehackernews.com
Chrome Plans to Mark All 'HTTP' Traffic as Insecure from 2015 - Hacker News
packetstormsecurity.com
packetstormsecurity.com
Mandriva Linux Security Advisory 2014-252 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Debian Security Advisory 3104-1 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Debian Security Advisory 3105-1 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
D-Link DCS-2103 Brute Force / Cross Site Scripting ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Sony Hackers Threaten 9/11 Attack On Movie Theaters ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
RelateIQ Mail Encoding Script Code Injection ≈ Packet Storm
news.microsoft.com
news.microsoft.com
Everyone starts somewhere…More than 20 million students participate in Code.org’s Hour of Code | News Center