Phishing quiz: Can you spot a scam when you see one? Don't be so sure - CBS News
Virtualization Security - Server Virtualization - Deep Security - Trend Micro USA
IoE 101: How to Explain All Things Smart, Wearable, and IoE - Security News - Trend Micro USA
U Force - Broderbund - Nes - Famicom - TV Game Commercial - Retro Gaming - 1988 - YouTube
Sony's Action Called Dangerous Precedent - DataBreachToday
Spotlight: Nearly half surveyed say SDN may be too immature to be secure - FierceEnterpriseCommunications
Retailers Look At The Mobile Web Opportunity - Business Insider
Bugtraq: TWiki Security Advisory - XSS Vulnerability - CVE-2014-9325
Bugtraq: TWiki Security Advisory - XSS Vulnerability - CVE-2014-9367
Why North Korea's attack should leave every company scared stiff - Dec. 19, 2014
Kaspersky Total Security Multi-Device
Founding of state cyber-security body worries digital rights activists - Politics - Egypt - Ahram Online
What we know about North Korea's cyberarmy | CSO Online
Why Killing the Password Is the Next Billion-Dollar Industry |
Cloudy with a Chance of Scalable Malware Protection
2014 Industry Innovators: Access Control - SC Magazine
Linux GRINCH Vuln Does Not Sound Too Horrific ≈ Packet Storm
Webcam-Snooping Spawn Of ZeuS Hits 150 Banks Worldwide ≈ Packet Storm
Microsoft Takes On Tech Support Scammers ≈ Packet Storm
Vulnerability Note VU#1680209 - AppsGeyser generates Android applications that fail to properly validate SSL certificates
The Ultimate Goal of Digital Attacks -
New Zeus variant targets users of 150 banks
Bugtraq: SEC Consult SA-20141219-0 :: XSS & Memory Disclosure vulnerabilities in NetIQ eDirectory NDS iMonitor
Critical vulnerability in Git clients puts developers at risk | CSO Online
Microsoft files suit against alleged tech support scammers | CSO Online
Evaluating The Effectiveness Of Current Anti-Rop Defenses
INFOGRAPHIC▶ Enable the Agile Data Center
Exponential-e improves disaster recovery service with Zerto - Telecompaper
Sikeston Standard Democrat: Local News: Extension approved for county's last disaster recovery project (12/19/14)
RSA Chairman on Security in 2014: 'Best of Times, Worst of Times'
Today's Challenge: Database Security in the Cloud – Blog Post – RSA Conference
Critical flaw on over 12M routers allows device hijacking, network compromise
Critical Git Vulnerability Allows for Remote Code Execution
Federal Judge Allows Lawsuits Over Target Data Breach « CBS Minnesota
Zero Day Weekly: ICANN hacked, critical GitHub vuln, too much Sony drama | ZDNet
Hackers Can Read Your Private SMS and Listen to Phone Calls - Hacker News
Major Chinese smartphone manufacturer installed backdoor on up to 10 million devices | CSO Online
Router Vulnerability Puts 12 Million Home and Business Routers at Risk - Hacker News
Schneier on Security: SS7 Vulnerabilities
Sony & North Korea: A Call to Cyber Arms or Better Defense? - The State of Security
Critical Git Client vulnerability Allows Malicious Remote Code Execution - Hacker News
Successful Tech Requires An Old-Fashioned Skill: Organizing People : All Tech Considered : NPR
Critical Git flaw allows attackers to compromise developers' machines
Cybercriminals won’t take a vacation this holiday season
Linux 'GRINCH' vuln is AWFUL. Except, er, maybe it isn't • The Register
Bugtraq: [oCERT-2014-012] JasPer input sanitization errors
Bugtraq: APPLE-SA-2014-12-18-1 Xcode 6.2 beta 3
ZeuS variant strikes 150 banks worldwide | ZDNet
ENISA CERT training programme now available online — ENISA
Philip Lieberman On The Sony Hack: “This Scenario Will Play Out Again And In Even Worse Forms”
Apple Invents New Touch ID Virtual Combination Unlock Feature - Patently Apple
Sony Hack: The ‘Finger We Are Pointing At North Korea Should Be Pointing At Ourselves’
Eyes Of A Human, Eyes Of A Program: Leveraging Different Views Of The Web For Analysis And Detection
Webcam-snooping spawn of ZeuS hits 150 banks worldwide • The Register
Consumers Dubious of Mobile Payment Security, Prefer Third Party Services Such As PayPal
Smart grid security certification in Europe
Top 5 social media security predictions for 2015
Your email, your data, your control
On The Eighth Day of Privacy, Health Care Systems (Over)Shared Data | Privacy & Security Matters
HP reveals more details about The Machine: Linux++ OS coming 2015, prototype in 2016 | ExtremeTech
Tips To Increase Your Holiday Cyber-Shopping Security « CBS Miami
Movie industry's evil plan to destroy the internet is going precisely nowhere • The Register
Some Vulnerabilities Are Di Erent Than Others Studying Vulnerabilities And Attack Surfaces In The Wild
Sneaky Impersonator Robots Are Taking Over the Web - The Atlantic
Vulnerability announced: update your Git clients · GitHub
Hack hijacks electric skateboards, dumps hipsters in the gutter • The Register
Arizona Local News - Phoenix Arizona News - Phoenix Breaking News -
Human error root cause of November Microsoft Azure outage | Network World
Quantitative Evaluation Of Dynamic Platform Techniques As A Defensive Mechanism
Security Slice: The Sony Pictures Breach – Part Two
The Syrian Electronic Army strikes again! International Business Times hacked
Kiwi hacker 'menace' pops home detention tracker cuffs • The Register
Good cyber security habits essential for holidays |
Forensic software gets around Apple's iCloud security features | Macworld
2014 Industry Innovators - SC Magazine
Gulf Daily News » Business News » Key training for Batelco's staff
How Cybercriminals Dodge Email Authentication
Zen and the Art of Cloud Database Security (Part 1) | SecurityWeek.Com
India Should Strive for Fool-proof Cyber Security -The New Indian Express
E-Journal CMS SQL Injection / Privilege Escalation ≈ Packet Storm
Red Hat Security Advisory 2014-2021-01 ≈ Packet Storm
Red Hat Security Advisory 2014-2023-01 ≈ Packet Storm
Red Hat Security Advisory 2014-2010-01 ≈ Packet Storm
Dynamic Reconstruction Of Relocation Information For Stripped Binaries
Why every CIO needs a Kevin McCallister in 2015 | Scott Spiker | LinkedIn
McAfee: Cyberattacks Will Not Slow in 2015
Some 100,000 or more WordPress sites infected by mysterious malware | Ars Technica
Best Buys That Could Lead to the Worst Shams - Security News - Trend Micro USA
Beyond ACORN: Cracking the infosec skills nut - Security - Blogs -
All aboard the internet of things infosec hype train | ZDNet
Backdoors: What They Are and How to Defend Networks against Them - Security News - Trend Micro USA
IT Force Field: Preventing The Risk Of Viruses In Business | BCW
Experts: ISIS loonies use 'digital AK-47' malware to hunt victims • The Register
Alina POS malware "sparks" off a new variant - SpiderLabs Anterior
Cybercrime predictions for 2015
Target Data Breach Suit Left Largely Intact - Law360
Medical records exposed in massive Sony hack | Healthcare IT News
Comprehensive Analysis of the “Destructive” Malware Behind FBI Warnings -
California nonprofit sues San Diego Police Department over stingray documents - SC Magazine
'Spark' shares traits with Alina, JackPOS, uses AutoIt differently - SC Magazine
Lauren Hasenhuttl sur Twitter : "Participating in @JuniperNetworks Hour of Code for kids. Future Junos coder!"
Lauren Hasenhuttl sur Twitter : "Thx @Beaker for teaching the kids about coding @JuniperNetworks @codeorg "hardware powered by software""
Measuring Drive-By Download Defense In Depth
Top 5 High-Profile Cyber Security Breaches | IT Business Blog
2014 is ending, but this wave of technology disruptions is just beginning - The Washington Post
White House calls Sony hack a "serious national security matter," gov't mulls proper response - SC Magazine
Four Steps To An Effective Targeted Attack Response | Security Intelligence Blog | Trend Micro
6 issues surrounding IoT Security in 2015 - Computer Business Review
Hacked in 2014: The Year of the Data Breach :: Tech :: Features :: Paste
Sony attack linked to North Korea, theaters bail over terrorism threat | ZDNet
What’s Booming In Small Business
Sony Asks Media to Destroy Hacked Data: Do They Have a Case?: Video - Bloomberg
RSA details new Boleto malware family - SC Magazine
Researchers find 'CoolReaper' backdoor in CoolPad devices - SC Magazine
Misfortune Cookie crumbles router security: '12 MILLION+' in hijack risk • The Register
My Internet of Everything Holiday Wish List
Managing a cyber crime scene -- FCW
Critical 'Misfortune Cookie' bug puts millions of internet-connected routers at risk - SC Magazine
McAfee sur Twitter : "Choose comfort and joy this holiday season. Watch out for bogus online offers. #12Scams."
How to train your staff on cyber security (and make it stick) | PCWorld
Forensics Europe Expo 2015 - Visitor
A Decade of Fraud and Cybercrime - YouTube
Reaction to the Sony Hack Is 'Beyond the Realm of Stupid' | Motherboard
Thoughts on Workplace Privacy
2014 State of the Union for Mobile Performance
No 'Interview' ... on any platform
Goldeneye: Efficiently And Effectively Unveiling Malware’S Targeted Environment
Data Security Breach Prevention Guide Download | Kaspersky Lab
PCI Compliance: Preparing for Version 3.0 - eSecurity Planet
Do Employees Pose the Biggest Threat to Information Security? ::Security & Resiliency:: Midsize Insider
2 More Former Sony Workers Sue Over Data Breach - ABC News
Mobile spyware makers are on shaky ground as the law begins to catch up with them | Symantec Connect
Cybersecurity & Cyber Defense | Implementing the 20 Critical Controls on a Low-Cost Budget: Do It, Dont Worry About It! | SANS Institute
Mobile banking, the safe way
Business must support staff training, says IT Governance as UK Government announces new cyber skills projects - World News Report
IBackup v10.0.0.45 suffers from a local Privilege Escalation Vulnerability | VULNERABILITY MAGAZINE - Bug Bounties, Acknoweldgements & Security Research
2 more former Sony workers sue over data breach |
Reboot 25: Thought leaders - SC Magazine
Does NFV and Virtualisation Herald the End of Blac... - J-Net Community
How to Fool a Computer With Optical Illusions - The Atlantic
Boardroom or Baby? Why are there so few women in tech?
The “Easy Button” for Cyber-Attack Mitigation: Introducing Radware’s Attack Mitigation Service | Radware Blog
Jeans and blazers will feature RFID blocking fabric - SC Magazine
Organized criminals targeting individual iPhone, Android users | CSO Online
Point-of-sale malware creators still in business with Spark, an Alina spinoff | CSO Online
6 facts about mobile connectivity in developing and developed countries - Computer Business Review
Here’s To Second Acts
Brad Pitt & Angelina Jolie Get Cyber Security For Their Six Kids
Dr. Cleaner: Trend Micro’s Free Utility App Will Optimize Your Mac’s Disk and Memory -
HIPAA security compliance: How risk tolerant are you?
Pirate Bay resurrected by rival, as hackers leak government emails in response to Swedish raid - News - Gadgets and Tech - The Independent
7 high-tech holiday scams
Security Tube sur Twitter : "My SDR Demo kit - HackRF, RTL-SDRs, CBR Radios, microphone system, caregiver pagers etc. Thanks @michaelossmann !"
Radware 2014 Global Network and Application Security Report
Calgary Welcomes Cyber Security for Oil and Gas Summit -- CALGARY, Alberta, Dec. 18, 2014 /PRNewswire/ --
Introducing our Juniper Fan-of-the-Month for Decem... - J-Net Community
Doubts Raised About "Grinch" Linux Vulnerability
Towards A Masquerade Detection System Based On User's Tasks
Quantum Cryptography May Make Future Credit Cards Hack-Proof : SCIENCE : Tech Times
The Changing Landscape of BYOD
Security SEE-SAW: $3 MEEELLION needed to fight a $100k hack • The Register
Schneier on Security: ISIS Cyberattacks
Cisco Security sur Twitter : "#TBT --- In 1995, Cisco introduced Private Internet eXchange, a popular IP firewall and NAT appliance #Cisco30"
Executive Cyber Intelligence Report: December 18, 2014 - The State of Security
Should I Use “SIEM X” or “MSSP Y”?
NY bank regulator's cybersecurity plan has strong authentication, identity | ZDNet
Local news from Rock Hill, SC | The Herald
Blueprint: How NFV is Shifting Service Provider Culture ~ Converge! Network Digest
Cyber Securit Application Portfolio Network | SmartData Collective
Corporate data: Protected asset or a ticking time bomb?
5 Effective Ways to Raise Privacy Awareness
Sony asks media not to publish leaked emails, as hackers threaten ‘Christmas gift’ of new leaks - News - Gadgets and Tech - The Independent
Forever Lost: 44% of People Could not Recover Money Stolen as a Result of Fraud | Kaspersky Lab
Google Releases Chrome Extension for End-To-End Email Encryption - Hacker News
Researcher publishes JavaScript DoS tool
FIDO Pursues Vision of a Password-Free World | Cybersecurity | TechNewsWorld
Malware peddlers take advantage of Sony's decision to pull controversial film
The Rise of Thingbots | Radware Blog
Transformation of the Data Center & Building the Private Cloud (Part 1) | Radware Blog
Bugtraq: E-Journal CMS (ID) - Multiple Web Vulnerabilities
Bugtraq: iTwitter v0.04 WP Plugin - XSS & CSRF Web Vulnerability
Who Has Access To Your Company Data? | BCW
Bots Now Outnumber Humans On The Web ≈ Packet Storm
Beware CoolReaper Malware On Chinese Android Phones ≈ Packet Storm
'Angry' Snapchat Embroiled In Sony Pictures Hack ≈ Packet Storm
Technology is still a distraction for drivers
451 Research Report: “Core Security gives customers the ability to descramble vulnerability management noise” | Core Security Blog
Cisco Adds FirePOWER Capabilities to ASA Firewalls
Kaspersky Anti-Virus 2015 Review - PC Antivirus Software
Complex Solutions to a Simple Problem — Krebs on Security
Nintendo PowerGlove Commercial - YouTube
Finding an Unknown Threat with RSA Security Analytics and RSA ECAT - YouTube
Threats at Sea: A Security Evaluation of AIS - Security News - Trend Micro USA
Schneier on Security: The Limits of Police Subterfuge
Data Loss Prevention: Databases And Web
The Sony Hack – A Lesson in Cyber Terrorism
Amit Mital – Speaker – RSA Conference
Should businesses worry about wearables?
ICANN systems breached via spear-phishing emails
US Congress member calls Rajnath over terrorism and cyber security - Firstpost
North Korea probably not behind Sony Pictures hack, says cyber security expert - video | Technology | The Guardian
How to Identify Yourself, Digitally
Bugtraq: Apple iOS v8.x - Message Context & Privacy Vulnerability
Global Internet Authority ICANN Has Been Hacked - Hacker News
100Mbps Internet available to 59% of US, while gigabit still at just 3% | Ars Technica
CoolReaper pre-installed malware creates backdoor on Chinese Androids • The Register
Phishing Scams & Identity Theft Protection – Don’t be that Guy – Trend Micro
Ars Technica readers urged to change passwords in wake of hack
Gmail Google Drive and security features: Google updates email service | BGR
Pivot3's Hyper-Converged Disaster Recovery Appliance
Cuba Is Getting the Internet | Motherboard
Hackers rejoice: Sony pulls Korea film, bows to criminal pressure | ZDNet
Apps, not malware, should be your biggest mobile concern -- GCN
Information Security News: Why the Sony hack is unlikely to be the work of North Korea.
Information Security News: ICANN HACKED: Intruders poke around global DNS innards
UC Berkeley hack: Personal data on 1,600 people possibly compromised - LA Times
Data Loss Prevention: Data In Motion Lab
Connected cars: a cyber-security nightmare on wheels | News | TechRadar
3 OpenStack Predictions For 2015 - InformationWeek
TorrentLocker ransomware pestilence plagues Europe, bags $500k • The Register
Tulsi Gabbard, Rajnath discuss terrorism, cyber security
The Evidence That North Korea Hacked Sony Is Flimsy | WIRED
Geers: , 18 December 2014
What does the Future hold for Women in Tech
Pivot3 Simplifies Backup And Disaster Recovery With Hyper-Converged Infrastructure Appliance
'CoolReaper' backdoor uncovered in CoolPad Android devices - Computer Business Review
Most IT Pros Ill-Prepared to Deal With Breaches
Delta security flaw let passengers access others' boarding passes
Built-In Backdoor Found in Popular Chinese Android Smartphones - Hacker News
The FBI Used the Web's Favorite Hacking Tool to Unmask Tor Users | WIRED
Thoughts on Mobile Digital Parenting
Dll Injection
Geers: "You can find traces of its real-world conflicts in cyberspace", 18 December 2014
Angelina Jolie Has a Cyber-Security Team To Protect Her Kids Online
Ex-Sony employees sue, claim company failed to protect data| Reuters
Python Forensics Review
How employees put your company at risk during the holidays
Social sniffer predicts which Nigerian prince has the best chance of scamming you • The Register
Only 1% of consumers feel safe using mobile payments
Wiper Malware – A Detection Deep Dive
10 Notorious Cyber Criminals Brought to Justice - #8
Nsc - Alex Ionescu - "Breaking Protected Processes"
Sony Pictures: The Data Breach And How The Criminals Won - Forbes
HP Blogs - 2014 Tape Market State of the Union - The HP Blog Hub
Four key areas of security solutions Singapore companies need to invest in | Networks Asia
Bugtraq: Jease CMS v2.11 - Persistent UI Web Vulnerability
Anonymous hacks Swedish govt emails over seizure of Pirate Bay servers — RT News
The Storage Industry Is Due For A Shake Up | BCW
Watch "James Bond 'Spectre' script stolen in Sony hack" Video at SCMagazine
Could Sony Hack Scare Other Companies Into Beefing Up Cybersecurity? - NBC News
Nsc - Andrea Barisani - Forging The Usb Armory
Seattle-based attorneys suing Sony Pictures over data breach |
10 Important Factors That Make Symantec™ SSL Certificates #1
No theaters, no VOD for 'The Interview'
Sony Hack: 3 Reasons People Think North Korea Did It
URL LOL: Delta splats web flight boarding pass snoop bug • The Register
Sony cancels The Interview flick launch amid terror threats • The Register
ARN Storage Roundtable - Ensuring business continuity and building opportunities - ARN
Red Hat Security Advisory 2014-2008-01 ≈ Packet Storm
Red Hat Security Advisory 2014-2009-01 ≈ Packet Storm
Fwknop Port Knocking Utility 2.6.5 ≈ Packet Storm
Angelina Jolie and Brad Pitt Hired a Cyber Security Team for Their Kids
PCI Geomatics Announces Student Licensing availability via Partnership with Studica Academic Reseller |
WSCED: Top 5 Online Holiday Safety Tips for Cousin Eddie -
No laughing matter: Why your company’s IT security isn’t a joke | Windows IT Pro Guest Blogs
Juniper Networks
Nsc - Andrea Allievi - "Understanding And Defeating Windows 8.1 Patch Protections"
Google’s SHA-1 Deprecation Plan for Chrome | Symantec Connect
Apple wins class-action lawsuit over iPod copyright management - SC Magazine
North Korea Almost Certainly Did Not Hack Sony | WIRED
Phishing email contains Word doc, enabling macros leads to malware infection - SC Magazine
Landmark HIPAA settlement confirms push to firm up patching schedules - SC Magazine
Former employees sue Sony, theaters drop 'The Interview' - SC Magazine
How Secure Are Temporary Messaging Apps for Work? | Re/code
Mobile RAT Xsser continues to threaten Android, iOS device security - SC Magazine
10 cybersecurity predictions for 2015 | CSO Online
New York establishes new cyber security examination process for financial institutions - Lexology
Cisco Global Cloud Index: Global Data Generated Annually by Internet of Everything (IoE) Devices - YouTube
Setting the wrong precedent: Top theater chains drop Sony's 'The Interview' after threats | CSO Online
40% rise in vulnerabilities: OpenSSL, Google Chrome and IBM worst offenders - SC Magazine UK
NIST drafts new cloud metrics guide - SC Magazine
What Network Security Lessons Can We Learn from the Sony Attack?
Uninstall AVG PC TuneUp | AVG
EdgeWave nets additional $2 million in funding |
AWS re:Invent Round Up -
Why compliance matters - SC Magazine
Tis the Season for…Financial Crime - Websense Insights
AntiVirus Security - FREE - Android Apps on Google Play
UPDATED: 18 Questions (and Answers) About Google, Site Speed, and SEO | Radware Blog
Nsc - Sebastien Dudek - Homeplugav Plc: Practical Attacks And Backdooring
Angelina Jolie Hired a Cyber Security Team for Her Kids | Cambio
(IN)SECURE Magazine
70% of Employees Admit Having Unnecessary Access to Confidential DataThe State of Security
2014 Was the Year of the Data Breach, But 2015 Could Be Worse
What You Googled in 2014: Robin Williams, ‘Flappy Bird,’ ‘Frozen’ - Digits - WSJ
Blue Coat Cloud Security Service and Threat Intelligence Solutions Win Information Security 2014 Readers' Choice Awards
An epic ride: A look back at the ever-changing information security industry - Print Article - SC Magazine
Quantum physics behind 'unhackable' security authentication - SC Magazine UK
HP Security Bulletin HPSBMU03221 1 ≈ Packet Storm
HP Security Bulletin HPSBOV03225 1 ≈ Packet Storm
HP Security Bulletin HPSBOV03226 1 ≈ Packet Storm
Grinch Bug Could be Worse Than Shellshock, Says Experts
10 changes you can make to achieve security serenity now! | CSO Online
New ransomware avoids hitting the same victim twice | CSO Online
ICANN targeted by Spear Phishing attack, several systems impacted | CSO Online
Linux 'grinch' vulnerability could put a hole in your security stocking | PCWorld
Skimming at Virginia ATMs, more than 3,000 Union debit cards compromised - SC Magazine
ICANN hackers sniff around global DNS root zone system • The Register
Ars was briefly hacked yesterday; here’s what we know | Ars Technica
HP Selects Trend Micro Deep Discovery to Help Fight Targeted Attacks -
Current connections not up to standard: Juniper Networks | ZDNet
Infonetics Report
Delta Airlines Patches Boarding Pass URL BugThe State of Security
Sony Ex-Workers File Suits Against Company Over Data Breach : Tech : News Every Day
Experts discover TorLocker variant targeting Japanese speakers - SC Magazine
Angelina Jolie, other stars slammed in hacked Sony emails – The Lead with Jake Tapper - Blogs
Nsc - Richard Johnson - "Fuzzing And Patch Analysis Sagely Advice"
Attack Mitigation Service: Cyber Security Just Got Easier
Dutch DPA fine over privacy violations could cost Google $18.6M - SC Magazine
Chris Crowley sur Twitter : "#sanscdi #sec575 #Ctf underway. #gas. @joswr1ght"
Kaspersky Lab Survey: Half of Companies Put Themselves at Risk by Undervaluing DDoS Countermeasures | Kaspersky Lab US
PCI Synthesis Sponsors New England CRO/CMO Council
Raising Your Threat Intelligence - The State of SecurityThe State of Security
The Dawn of the Flying Smartphone | Motherboard
Bugtraq: Morfy CMS v1.05 - Command Execution Vulnerability
McAfee sur Twitter : "Oh hackers, oh hackers—thy tricks are so unchanging. Don't fall for these #12Scams."
How to Become a CISO - Dark Reading
NorthStar Controller, explained by an English Scho... - J-Net Community
Paul Kocher – Speaker – RSA Conference
Can't stop Home Depot-style card pwning, but suppliers will feel PCI regulation pain • The Register
Former Sony employees sue studio over 'nightmare' data breach | The Japan Times
Bugtraq: Cross-Site Scripting (XSS) in Revive Adserver
Bugtraq: Bird Feeder v1.2.3 WP Plugin - CSRF & XSS Vulnerability
Kaspersky Internet Security 2015 | Kaspersky Lab US
Kaspersky Internet Security - Multi-Device 2015 | Kaspersky Lab US
Onapsis Appoints Enterprise Information Security Expert Renee Guttmann to Board of Advisors - MarketWatch
The biggest challenges faced by CIOs/CISOs heading into 2015 | CSO Online
Anonymous Hacks Swedish Government in Revenge for 'Pirate Bay' Takedown - Hacker News
Revolutionary Quiz - Juniper Networks
Google starts blocking badly behaving Gmail extensions
Bluster, bravado and breaches: Today's 'terrorist' players in cybersecurity | ZDNet
Constant attack a growing reality - SC Magazine UK
2015 predictions: The always-on business, cloud, security, data explosion and IoT | Enterprise Innovation
Researchers warn of new OphionLocker ransomware - SC Magazine
Sony Sued By Ex-Staff Over Draft Security, Leaked Privates ≈ Packet Storm
Sony Cancels Premiere Of The Interview After Hacker Terrorist Threats ≈ Packet Storm
London Teen Pleads Guilty To Spamhaus DDoS ≈ Packet Storm
Malware peddlers turn again to malicious links
What's New in Exploit Kits in 2014 | Security Intelligence Blog | Trend Micro
Nsc - Renaud Lifchitz - "Quantum Computing In Practice"
Google's work on full encryption chugs along, with Yahoo's help | CSO Online
Google: Mark HTTP pages as insecure | ZDNet
ICANN falls for spear phishing attack | ZDNet
Cloud Adoption Driven by Reliability, Business Continuity
Angelina Jolie And Brad Pitt Hire Cyber Security Team To Monitor Content Their Kids Encounter Online : Entertainment : Design & Trend
The Gift that Keeps on Giving: 12 Ways Everyone Can Help IT This Holiday Season | Symantec Connect
2014 Security Review: The Year in Breaches, Hacks and Exploits -- Redmond Channel Partner
Download this infographic that reveals how customers truly feel.
Researchers confirm multiple Google App Engine security sandbox bypasses
Schneier on Security: How the FBI Unmasked Tor Users
Four trends that will change mobile in 2015
VULNERABILITY LAB sur Twitter : "[BUG BOUNTY AWARD] The award trophy of the best bug bounty- and best upcoming bug bounty -program award arrived today"
What Banks Don t Know About the Security Hazards of Cloud Computing - American Banker Article
Sony hackers threaten company and movie-goers
Tackling the growing web of data residency and privacy regulations
Bugtraq: secuvera-SA-2014-01: Reflected XSS in W3 Total Cache
Tech Giants Rally Around Microsoft to Protect Your Data Overseas | WIRED
Quantum Encryption Makes Credit Cards Fraud-Proof - Hacker News
Do senior executives understand their role in data security?
Preparing for the Social Internet of Things – AVG – mefminute
London teen pleads guilty to Spamhaus DDoS • The Register
Coalfire’s Navis RapidSAQ™ Updated to New PCI Standards | Business Wire
Avast blog » South Korea hit with banking malware using VPN connection
Nsc - Nicolas Collignon - "Google Apps Engine Security"
Bugtraq: [REVIVE-SA-2014-002] Revive Adserver 3.0.6 and 3.1.0 fix multiple vulnerabilities
Bugtraq: FreeBSD Security Advisory FreeBSD-SA-14:30.unbound
UC Berkeley warns 1,600 of personal data breach |
New Norton Mobile Security warns of privacy problems | ZDNet
Business continuity briefs
2015 Forecast: The Sun is Out for Cloud Computing
Retailers must not ignore security alerts, court says | CSO Online
What are the keys to effective information security? | IT News Africa- Africa's Technology News Leader
Sony Hackers Threaten 9/11 Type Attack at Theaters Showing 'The Interview' Movie - Hacker News
A brief history of Mac malware
Sony sued by ex-staff over daft security, leaked privates • The Register
Top 5 malware attacks: 35 reused components
Protecting the underground electronic communications infrastructure
Nsc - Peter Hlavaty - "Attack On The Core"
Top Ten Private Cloud Risks
Kronos: decrypting the configuration file and injects - Weblog Lexsi
StorageCraft releases backup, disaster recovery tool for use with VMware, Microsoft System Center - WhaTech
Farewell, <em>Dr. Dobb's</em> | Dr Dobb's
TorLocker ransomware variant designed to target Japanese users | Symantec Connect
UC Berkeley warns 1,600 of personal data breach | News - KCRA Home
Bugtraq: [security bulletin] HPSBOV03226 rev.1 - HP TCP/IP Services for OpenVMS, BIND 9 Resolver, Multiple Remote Vulnerabilities
Bugtraq: [security bulletin] HPSBMU03217 rev.1 - HP Vertica Analytics Platform running Bash Shell, Remote Code Execution
Fraud-proof credit cards possible with quantum physics
Nsc - Guillaume Valadon, Nicolas Vivet - "Detecting Bgp Hijacks In 2014"
Bugtraq: Elefant CMS v1.3.9 - Persistent Name Update Vulnerability
Bugtraq: Konakart v7.3.0.1 CMS - CS Cross Site Web Vulnerability
The 12 Hacks of Christmas: Part 1The State of Security
Is POODLE Back for Another Byte? « Threat Research | FireEye Inc
New York Establishes New Cyber Security Examination Process for Financial Institutions | Ropes & Gray LLP - JDSupra
EMV Among the Missing Pieces of PCI DSS 3.0
The Steel Rooms Helping Cops Fight Cyber Crime | Motherboard
Bugtraq: iWifi for Chat v1.1 iOS - Denial of Service Vulnerability
Sony Facing 2 Suits by Ex-Workers Over Data Breach - ABC News
Coming Together for AWS Customers: Cloudnexa, AppDynamics, Sumo Logic and Trend Micro |
Passwords Are The New DataThe State of Security
Of Course You Hear What I Hear — Christmas Music Season Is Totally Data-Driven | FiveThirtyEight
Google bakes W3C malware-buster into Gmail • The Register
Creative defense: Crowdsource your hackers
Reboot 25: Threat seekers - SC Magazine
Ursnif malware variant detected in global spike - SC Magazine
Nsc - Braden Thomas - "Reverse Engineering Msp430 Device"
Malicious links: Spammers change malware delivery tactics | Symantec Connect
2014 in security: The biggest hacks, leaks, and data breaches | ZDNet
Angelina Jolie Hires Cyber Security to Protect Her Kids Online - Angelina Jolie, Brad Pitt :
McAfee: Cyberattacks Will Not Slow in 2015 - AOL On
How Ethernet Can Secure The Connected Car - Network Computing
Infographic: Holiday Shopping - The 12 Ways of Shopping Safely & Staying Cybertheft-free | Internet Security Infographics | Kaspersky Lab US
SoakSoak malware leaves 11,000 WordPress sites blacklisted by Google | Technology | The Guardian
RSAC Speaker Submissions Reveal What the Industry Cares About – Blog Post – RSA Conference
RStickets! 1.0.0 Remote Shell Upload ≈ Packet Storm
RSform!Pro 1.3.0 Remote Shell Upload ≈ Packet Storm
Konakart Cross Site Scripting ≈ Packet Storm
Chrome Plans to Mark All 'HTTP' Traffic as Insecure from 2015 - Hacker News
Mandriva Linux Security Advisory 2014-252 ≈ Packet Storm
Debian Security Advisory 3104-1 ≈ Packet Storm
Debian Security Advisory 3105-1 ≈ Packet Storm
D-Link DCS-2103 Brute Force / Cross Site Scripting ≈ Packet Storm
Sony Hackers Threaten 9/11 Attack On Movie Theaters ≈ Packet Storm
RelateIQ Mail Encoding Script Code Injection ≈ Packet Storm
Everyone starts somewhere…More than 20 million students participate in’s Hour of Code | News Center
Register – RSA Conference
Nsc - Benjamin Delpy - "Mimikatz"
Do Sony employees have the right to sue over data breach?
Industry Innovators 2014 - SC Magazine
Watch Symantec's Vine "Drop a beat! Great work is its own reward in The Backup of Destiny! Check out the full experience on YouTube:"
Network Security: No need to drop, cover, and hold... - HP Enterprise Business Community
New Phishing Emails Descend On GoDaddy CustomersThe State of Security
Impact of Linux bug 'grinch' spans servers, workstations, Android devices and more - SC Magazine
Websense Now a Member of Cloud Security Alliance’s Security, Trust and Assurance Registry (STAR) Registry - Websense Insights
Sony sued by ex-staff: Crap security, leaked privates and little help, claims suit • The Register
Sony warns employees of potential fraud - SC Magazine
Microsoft appeal over customer email warrant draws support - SC Magazine
The Evolution of Point-of-Sale (PoS) Malware - Security News - Trend Micro USA
Firefox, IE11 zero-day bugs possibly targeted in 'SoakSoak' WordPress malware attacks - SC Magazine
FOCUS: Technology Transformation | The Network
Performance Calendar » Images Are King: An Image Optimization Checklist for Everyone in Your Organization
IT Security Stories to Watch: WordPress Malware, Malwarebytes Study | Managed Security Services content from MSPmentor
Former Employees Are Suing Sony Over 'Epic Nightmare' Hack | WIRED
Nsc - Anthony Zboralski - "No Such Security" (Keynote)
Hacking WLAN Authentication
Union First Market data breach affects more than 3,000 debit cards - Roanoke Times: News
Witnesses against Silk Road creator to be kept under wraps until days before trial - SC Magazine
Keeping the Lights On, Networks Safe – Blog Post – RSA Conference
Ex-Sony Employees Sue Studio Over ‘Nightmare’ Data Breach - Bloomberg
GCN: Technology, Tools, and Tactics for Public Sector IT -- GCN
Suffolk U Adds Data Colocation for Disaster Recovery -- Campus Technology
How will the Data Centre look in 2020? - J-Net Community
Progressive Image Rendering: Good or Evil?
Bugtraq: [SECURITY] [DSA 3104-1] bsd-mailx security update
Bugtraq: [SECURITY] [DSA 3105-1] heirloom-mailx security update
Ex-LulzSec hacker Hector Monsegur talks family, FBI work - CNE
URL flaw discovered for airline mobile boarding passes - SC Magazine
Reading the Tea Leaves of the RSAC Submissions - YouTube
A Circular Problem in Current Information Security Principles
Hackers hint at terror attacks, release more data from Sony Pictures | CSO Online
Govt beefs up cyber-security after website attacks - Latest News -
Bugtraq: W3TotalFail: W3 Total Cache v 0.9.4 CSRF Vulnerability that Leads to Full Deface
Using Endpoint Visibility to Protect Your Enterprise with RSA Security Analytics and RSA ECAT - YouTube
December 2014 Microsoft Patch Tuesday Summary - J-Net Community
Banks: Park-n-Fly Online Card Breach — Krebs on Security
Working remotely? Always ensure your data gets onto the network
Top 10 Phishing Attacks of 2014
7 Resolutions Online Businesses Should Make for 2015 | CIO
31C3 Call for Participation (EN) « CCC Event Weblog
Security Awareness Blog | Failing a Phishing Test - Rite of Passage
Schneier on Security: Fake Cell Towers Found in Norway
Peder Jungck: How Mobility's Scale Has Redefined Service Assurance
Apple iOS v8.x - Message Context & Privacy Vulnerability demonstrated in Wickr App | VULNERABILITY MAGAZINE - Bug Bounties, Acknoweldgements & Security Research
Black market tactics mirror those of legit business - SC Magazine
UC Berkeley data breach impacts about 1,600 individuals - SC Magazine
Juniper: Mobile Users in Developing Countries More Satisfied ~ Converge! Network Digest
Bugtraq: [Onapsis Security Advisory 2014-034] SAP Business Objects Search Token Privilege Escalation via CORBA
The Most Tech Savvy States in America (According to #Twitter) [INFOGRAPHIC] - AllTwitter
FBI op, leading to child porn convictions, used Metasploit - SC Magazine
Asia Pacific 2015
How much IT security budget is adequate? | ITWeb
Debunking The Biggest Cyber Security Myths for Businesses
Cisco Security sur Twitter : "RT if you know this #Cisco30 Factoid: John Chambers was named CEO in 1995 - that's 2/3 of Cisco's history!"
Transformation of the Data Center & Building the Private Cloud, Part 2 | Radware Blog
Union First Market data issue affects more than 3,000 debit cards - Richmond Times-Dispatch: Business & Economic News
App launched to boost pupils' cyber security skills - Teaching Personnel
FireEye predictions for cybersecurity in 2015 | ZDNet
Evaluating the Security of Cyber-Physical Systems - AIS | Security Intelligence Blog | Trend Micro
PROTECT Centre’s VIBRANT approach to cyber security skills
11 predictions for security in 2015 | CSO Online
Africa’s take-off into the Technological Future - J-Net Community