Researcher Denied Flight After Tweet Poking United Security - ABC News
Researcher who joked about hacking a jet plane barred from United flight | Ars Technica
Failed Apple Rootpipe Fix Leaves Backdoor On All Macs, Researchers Claim - Forbes
Microsoft’s voice assistant Cortana ported to Android by hackers - SlashGear
Russian hackers exploit flaws in Adobe Flash and Windows OS to target machines in the US - Tech2
Bitcoin Could Be Stored Securely as a Hardware Wallet on Your Phone
Pelosi: We 'need answers' on gyrocopter | TheHill
Data Breach Security Bill Passes Amid Concerns |
A Mailman's Flight of Fancy - : Marsha Mercer
The Pentagon's new cyber attack plan: 'Blunt force trauma' - Philip Ewing - POLITICO
Top cyber officials warn of limited capabilities
Israel military networks breached by hackers |
Tech News: Hackers rip Microsoft
Russian hackers use Zero-Days malware to try to get US sanctions data |
Russians are using undiscovered exploits to hack the US government
Russian hacking campaign exploited unknown security flaws
Could forensic technology be the answer to data breaches and infections? |
Computer Security News, Advice and Research | Naked Security | Page 2
MIDEAST STOCKS - Factors to watch - April 19 | Reuters
Chromium Blog: A QUIC update on Google’s experimental transport
IDF officer discharged for leaking security information - Israel News - Jerusalem Post
Russian cyber attackers used two unknown flaws: security company | Politics | World
Tombstone of Hillary Clinton's father toppled - Nick Gass - POLITICO
License to hack? - Ethical hacking - Infosecurity Magazine
US government whistleblowers left vulnerable to eavesdropping | Naked Security
Google competes in enterprise mobility space with Android for Work
Is Cloud Application Control the silver lining that any next-gen web security solution needs? |
Hackers striking across the North East bring down Durham police site in status attack - Chronicle Live : Raytheon to buy network security company Websense $1.9 bn deal
ISSA-LA Holds Seventh Annual Information Security Summit on Cybercrime Solutions | Virtual-Strategy Magazine
Cybersecurity Expert John Popolizio Joins DB Networks Board of Advisors | NewsFactor Network
Homeland chief: Gyrocopter came in 'under the radar'
Chinese-sponsored group snooping on India for a decade: Report - timesofindia-economictimes
iPad mini 2 iOS 8.3 Review
Dot Hill Systems Corporation Is Transitioning Into Higher Profits - Dot Hill Systems Corporation (NASDAQ:HILL) | Seeking Alpha
Tech Tips from Eric Geier of On Spot Techs |
Metro State data breach proves substantial | Lillie Suburban Newspapers -
IBM releases hive mind of cyber threat information to save us all- The Inquirer
Should We Kill the Social Security Number? - ABC News
DailyNews Online Edition - Cyber security firm awarded patent for innovative security methods
'Gyrocopter' Landing Reignites Debate Over Capitol Security - NBC News
Times Editorial - More, better tech at CHS is welcome news, because ‘BYOD’ has come up short - Opinion - Crookston Times - Crookston, MN - Crookston, MN
Alleged Russia-Backed Hackers Target US Gov't via Adobe, Windows - FireEye / Sputnik International
Israel Defense Forces Reportedly Infiltrated By Arab Hackers
5 years later, enhancements in rig safety
Startups take cloud-based tech savvy to legal realm | 2015-04-18 | Indianapolis Business Journal |
Cybersecurity Expert John Popolizio Joins DB Networks Board of Advisors - Press Releases on Top Tech News
Income Wise Week gives 'speed dating' for company owners
FBI Accosts Security Researcher Over Fear That He Hacked His Flight | Gizmodo Australia
Use of several contractors could leave oil, gas operators open to hackers
Use of multiple contractors could leave oil, gas operators open to hackers | TribLIVE
Use of numerous contractors could leave oil, gas operators open to hackers
Tech News Recap: EVIDENCE of alien colonies, Putin memes made ILLEGAL and Windows HACKED | Tech | Life & Style | Daily Express
Russian cyber attackers used two unknown flaws: security company | TODAYonline
Hackers cash in on online payday loans | TribLIVE
Investigators: Hackers Hit Diplomatic Targets Via Software Flaws
Sony Attorney Warns Media After WikiLeaks Hacked E-Mail Rehash | Deadline
Google takes on real-time big data analysis with new cloud services | PCWorld
Why Social Security Reform Will Never Happen (And Why That Shouldn't Worry You)
WikiLeaks posts searchable database of Sony e-mails, documents - The Washington Post
Sefko: How do Mavericks go about facing daunting duo of Harden, Howard in playoffs? | Dallas Morning News
If the Deep Web becomes searchable, is it still deep? 60 Sec Security | Naked Security
Grant application seeks to help homeless in Pittsburg - Joplin Globe: Local News
Chris Roberts of One World Labs and Fox pulled off flight by FBI after revealing security flaws | Daily Mail Online
FBI Accosts Security Researcher Over Fear That He Hacked His Flight | Gizmodo India
Four-year-old child causes White House lockdown | Daily Mail Online
Homeland chief: Gyrocopter came in 'under the radar' - The Star Democrat - Easton, Maryland: State
Agile proves to be a big help in keeping up with fickle users | ZDNet
Russian Hackers Use Zero-Days to Try to Get Sanctions Data - Bloomberg Business
IDF network reportedly infiltrated by hackers | The Times of Israel
Russian cyber attackers used two unknown flaws: security company | Reuters
Check Point CEO Hustles to Stay on Top Amid Cyber Stock Surge - Bloomberg Business
Apple FileVault 2: Full disk encryption software overview
Software Company Anahata Announce Introduction of Ubuntu 14.04 for Java Developers | Benzinga
FBI Accosts Security Researcher More than Worry That He Hacked His Flight
DCF suffers major security breach | News - Home
Michael Nozzolio announces senate cyber terrorism committee hearings - News - Wayne Post - Wayne County, NY
Marine leaders fight to bolster cyber capabilities
The Jewish Press » » Hackers Reportedly Infiltrate IDF Computer Network
Cybersecurity bill could let companies trade info on hackers - San Antonio Express-News
Inflight entertainment exposes airliners to hackers: US report - Tech News | The Star Online
Google speeds up data transfers with Quick UDP Internet connections | ZDNet
IDF denies army networks compromised after hacking | i24news - See beyond
Red94 Playoff Preview Roundtable - Red94 | Houston Rockets news and musings
Attorney General: Anthem breach, tax fraud spike not connected
IT competence is not optional - The Manila Times OnlineThe Manila Times Online
Chinese hackers target Southeast Asia, India, researchers say | Latest News & Updates at Daily News & Analysis
Researchers Say Arab Hackers Attacked IDF Systems - Defense/Security - News - Arutz Sheva
Hackers port Microsoft’s Cortana voice assistant to Android | Mobile |
Oh, The Places You Will Go With Hackers | TechCrunch
How NZ and US agents plotted to spy on China - National - NZ Herald News
Report: 29 million healthcare records compromised in past four years
Target Settles MasterCard Data Breach Lawsuit for $19 Million - Tech Trends on CIO Today
No shield for corals in storms | Inquirer News
How to run Android apps on any laptop or desktop - The Times of India
ISC Cloud & Big Data Keynote to Focus on IT Transformation at DZ Bank - insideHPC
Net Politics » Cyber Week in Review: April 17, 2015
Inflight Wi-Fi Makes Planes Vulnerable to Cyberattacks From Terrorists
OrangeSec Italian hacker group claims to have brought Microsoft's Cortana to Android
Windows 10 Universal Apps Update Coming To Phones - InformationWeek
Top stories of the week
Security Concerns Raised In DC After Gyrocopter Lands On Capitol Lawn | NewsRadio KFBK
Top iOS news of the week: Halo, WWDC, Apple buys keyboard | ZDNet
7 Deadly Sins That Get Users Hacked - Dark Reading
Mumbai to have a local CERT unit to fight cyber crimes - The Times of India
UPDATE: Target Confirms It Has Negotiated A $19 Million Data Breach Settlement With MasterCard | Mintz Levin - Privacy & Security Matters - JDSupra
Top Android news of the week: Cyanogen, Verizon on security, install apps in search | ZDNet
3 things to know: Thursday, April 16, 2015
Symantec: Beware insider cyber attacks, malwares and spam mails threats
Cartoon: The Insider Threat - Dark Reading
Harnessing The Power Of Cyber Threat Intelligence - Dark Reading
Multiple Jonesboro physicians, dentists affected by nationwide d - KAIT Jonesboro, AR - Region 8 News, weather, sports
Google Chrome extends Windows XP support |
PayPal Wants You to Inject Your Username and Eat Your Password - Digits - WSJ
Give your iPhone or iPad a storage boost | ZDNet
Community stepping up to cybersecurity threat - San Antonio Express-News
Kerugian Akibat Malware Pencuri Uang Rp 130 Miliar Sebulan
Target reveals $19m data breach settlement with Mastercard - Essential Retail
Data breaches exposed 29 million US health records in 4 years
SSCC 194 – Patch early? Patch often? This time, “Patch NOW!” [PODCAST] | Naked Security
Business Briefs: Sprinklr Acquires SF-Based Get Satisfaction - India West: Business
Security analytics can help marketers to spot data breaches effectively
UniKey Raises Oversubscribed $10 Million Round For Smart Lock Technology - Forbes
PressTV-Hackers infiltrate Israel army networks
The Tech Take: 3 Big Skills of the Future-Ready Firm | Accounting Technology
Hacking into your home: TVs, refrigerators could be portal to most sensitive info | Fox News
Cybersecurity Expert John Popolizio Joins DB Networks Board of Advisors - Press Releases on CIO Today
Israeli military networks breached by hackers: researchers | TODAYonline
Nozzolio announces public hearings to address cyber crime - News - Brighton-Pittsford Post - Brighton, NY
The 2016 election cyber war is well underway - News - - Portsmouth, NH
Another Voice: Seventy years after the liberations of Hitler’s death camps, the threat of genocide remains - The Buffalo News
Iran poses growing cyber threat to US interests, study says - The China Post
Washington Amends its State Data Breach Notification Law | Reed Smith - JDSupra
House Panel OK's Cyberthreat Info Sharing Bill
Cybersecurity pros slam threat information-sharing bills -
Microsoft unveils touch-friendly Office apps for Windows phones - Business Today
Stock Update (NASDAQ:SYMC): Symantec CEO says pressing ahead with Veritas spin-off
The suicide bomber in cyber crime law
Teaching tech: Educators embrace digital media in classroom - Valley Morning Star : Local News
SCAM ALERT: Hackers make their rounds on computers in Texoma - - No One Gets You Closer
Another Voice: Seventy years after the liberations of Hitler’s death camps, the threat of genocide remains - Opinion - The Buffalo News
Rockets vulnerable to hacking strategy - Houston Chronicle
FBI pulls security expert from United flight | Business - Home
New technology leads to burglary arrest - Crime & Courts
Microsoft finally brings touch-friendly Office apps to Windows phones - IBNLive
Anthem subsidiaries face Missouri lawsuit over data breach - News - The Rolla Daily News - Rolla, MO - Rolla, MO
Wife of Florida gyrocopter pilot speaks about his arrest - | Continuous News Coverage | Acadiana-Lafayette - Homeland chief: Gyrocopter came in 'under the radar'
Microsoft's SharePoint Server 2016 Beta to Arrive in Q4
TigerText bringing HIPAA compliant messaging to Apple Watch
Android for Work Comes to Google Play - Enterprise Software on CIO Today
FBI pulls security expert from United flight | Money - WAPT Home
Hackers could hijack aeroplanes through passenger Wi-Fi, report warns
Ini Modus Pembobolan Rekening Nasabah Melalui "e-Banking" -
Judge Preliminarily Approves Settlement of $10 Million in Target Consumer Data Breach Action | Butler Snow LLP - JDSupra
Rethinking The Cyber Domain And Deterrence - Analysis - Eurasia Review
Mom calls for tougher DWI laws after daughter’s death |
Juniper Boosts Speed of SRX5800 Security Gateway
Cyber compliance does not always equal risk management, Deloitte report finds
San Francisco Bay View » Less than one lifetime: Eyewitness to nuclear development, from Hunters Point to Chernobyl and Fukushima, issues a warning
Apple Pay coming to Canada this fall | Cult of Mac
An Error has Occurred
Terrorists' cyber-threat to the world - Technology - NZ Herald News
Debating the Iranian cyber threat -- FCW
Do you need a wearable device policy?
Contra Costa Times editorial: Attack on U.S. from cyberspace a real possibility -
Geo-inference attacks: how the websites you visit can tell hackers where you are
Hackers use new geo inference attacks to identify your exact location - TechSpot
Barracuda Eyes Bigger Bite Of Cybersecurity Market -
Data protection authorities 'facing considerable resource challenges' due to digital boom - 17 Apr 2015 - Computing News
Advocates march for change in DWI laws - MyFoxAustin | KTBC | Fox 7 Austin | News Weather Sports
Microsoft brings its new Maps app to Windows 10 preview for phones | VentureBeat | Mobile | by Jordan Novet
Symantec, Intel, Cisco share biggest security issues in 2015 - Silicon Valley Business Journal
Doug Hughes flew gyrocopter to protest campaign financing - The Morning Call
Pro hacker removed from flight by FBI at Hancock Airport : News :
90% of security incidents trace back to PEBKAC and ID10T errors | Computerworld
Verizon Report Shows 'Sizable Gaps' In Cybersecurity Measures
Android for Work Comes to Google Play - Mobile Tech on Top Tech News
Sony Pictures condemns Wikileaks release of documents from hackers - The Economic Times
Russian-linked hackers went after Obama's YouTube interviewers | TheHill
Calling all hackers: AT&T wants you! | Malled!
FBI pulls computer security expert off flight, after he tweets about hacking its systems - CNE
TidBITS: Keeping Up with the Snoops 9: Junk in the PRISM Trunk
Barracuda Eyes Bigger Bite Of Cybersecurity Market CUDA IBM CHKP -
2016 BMW 7 Series Prototype First Drive
Fearing United plane was hacked, FBI pulls security expert off flight - Apr. 17, 2015
Hackers keep trying new targets in search of easy data : News :
Why businesses are still vulnerable to cyberattacks - Jacksonville Business Journal
Microsoft Promises ‘Universal’ Office App For Phones Running Windows 10 This Month | TechCrunch
How To Enable Stealth Mode in Yosemite - The Mac Observer
Canadian Bankers Balk at 'Onerous' Apple Pay Terms - The Mac Observer
Google to support Chrome browser on Windows XP till the end of 2015 | Maine News Online
Google Chrome To Support Windows XP Till End Of 2015
How to run Android apps on any laptop or desktop | TechRadar
What Surprises Dell Research Has in Its Five-Year Product Plan
Perry Focuses On Border Security In New Hampshire | The Daily Caller
Target Settles MasterCard Data Breach Lawsuit for $19 Million - Customer Data on Top Tech News
Homeland Security chief: Florida mailman flew gyrocopter to Capitol 'under the radar' | Tampa Bay Times
Schneier on Security: Friday Squid Blogging: Squid Hoodie
Former IT manager faces seven charges in federal indictment - SC Magazine
Cybersecurity bills move forward on Capitol Hill - SC Magazine
New Laws for New Threats Like Drones and Bioterrorism - WSJ
APT Group 'Pawn Storm' Ratchets Up Attacks
Study: Average organization has 4,000 instances of exposed credentials stored in the cloud - SC Magazine
Flash EK leveraged in potentially widespread malvertising attack - SC Magazine
It is Time for a Cyber FDIC | Dante Disparte
China suspends tech requirements that drew global concern - SC Magazine
'Money Smart Week' - Petoskey News-Review: Community
Canadian banks play hard ball with Apple Pay's moving north | Computerworld
Mobile ID World | AppHawk Offers Enterprise-Level Security for Employees’ Mobile Devices
Medical Records Under Threat from Data Breaches - Health on Top Tech News
'Islamic State Hackers' target Ithaca real estate blogThe Ithaca Voice
Timothy H. Edgar | Reforming The NSA | Foreign Affairs
Cyber Advanced Warning System sounds the alarm on security threats - TechRepublic
Six Clicks for Linux beginners: Ubuntu 15.04, Vivid Vervet | ZDNet
Hacker in serious trouble with authorities for tweeting about 'playing' with the plane communications mid-flight
Pengguna Internet Bangking Sasaran Hacker - Kalteng Pos
Anthem customers say stolen personal data used to file fraudulent tax returns | FOX C
Anthem data breach possibly linked to tax return fraud -
Hands-On With Microsoft's New Windows 10 Office Apps
Member of group that hacked Farmers Insurance, DirecTV, sentenced to 3 years - SC Magazine
Snowden: "Dopo Charlie Hebdo sempre più sorvegliati. Rischiamo il più grande sistema di oppressione della storia" -
Google fixes potential revenue-stealing “comment cloning” YouTube bug | Naked Security
PCI DSS 3.1 Reinforces Payment Security Compliance
Failure to Maintain PCI Compliance Exposes Online Retailers to Security Breaches
Researchers: Israeli military networks breached by hackers - Israel News, Ynetnews
Pat Calhoun, Author at McAfee
Breaking Beebone: Global Takedown, Local Shut Down - McAfee
Google Updates Docs, Sheets, Slides, And Drive With New Features On Android Devices |
FBR Capital Markets gives Apple trillion-dollar valuation with $185 price target
Android for Work Comes to Google Play - Mobile Tech on CIO Today
7 Deadly Sins That Get Users Hacked
Gurucul identifies cloud threats based on identity, behaviors | CIO
8 cloud companies to watch following MONSTER funding week | Network World
Gurucul - Predictive Security Analytics
Oracle Releases 14 Java Security Patches, Last Patch Update for Java 7 -- ADTmag
Will Check Point (CHKP) Surprise Q1 Earnings Estimates? - Analyst Blog -
Call Center Threats Grow
Naval Academy wins cyber competition against NSA hackers, other schools - Baltimore Sun
Hackers allegedly bring Microsoft's Cortana to Android | VentureBeat | Dev | by Emil Protalinski
Hackers increasingly target banks and their employees, not customers | Business Insurance
Teenagers suspected of hacking Belgian and French websites - Europe News & Top Stories - The Straits Times
What's inside the 2015 Verizon DBIR?
New bill would protect security research hacking | TheHill
Iran Stepping Up Its Hacking Activities Against US, Study Says
Cyber spies hacked Israeli army networks, security researchers say - Diplomacy and Defense - Israel News | Haaretz
Pawn Storm cyberespionage group increases activity, targets NATO - Reseller News
Cyber Legislation On The Move: Data Breach Bill Passes Out Of Committee - Data Protection - United States
Anthem customers in Connecticut say stolen personal data used to file fraudulent tax returns
Senators Propose Data Breach National Standards - Law360
What to Expect from Fortinet (FTNT) this Earnings Season? - Analyst Blog -
Windows 10 Universal Office Apps for Phones Coming This Month | News & Opinion |
Office Universal preview arriving for Windows 10 Mobile this month | Windows 10 content from SuperSite for Windows
ISIS online strategies and recruiting techniques | CIO
Google to support Chrome on Windows XP until end of this year - CNE
The Morning Risk Report: Compliance Won’t Prevent Hacks - Risk & Compliance - WSJ
PCI DSS Version 3.1 - What's New? - BankInfoSecurity
Homeland chief: Gyrocopter came in 'under the radar' - WNCN: News, Weather, Raleigh, Durham, Fayetteville
Startup TruStar Platform Lets Enterprises Anonymously Share Security Breaches
Phishing and hacking represents 70% of cyber attacks
Critical Windows vulnerability affects at least 70 million websites | Netcraft
Verizon Data Breach Investigation Report: 10 Common Vulnerabilities Exposed | Managed Security Services content from MSPmentor
Pawn Storm cyberspy group targets NATO, other gov't agencies | Computerworld
These key restrictions won't help Google in the EC's Android antitrust probe | ZDNet
Could Sony hack take place to a lot more businesses?
HSBC mortgage customer info was publicly accessible on the internet - SC Magazine
Github publishes first transparency report - SC Magazine
Cyber War Can Be Real War.
Apple Inc. (AAPL) Superior Ecosystem Will Drive Valuation To $1 Trillion: FBR Capital
5 Ways Digital Work Will Change Data Centers
Will Check Point (CHKP) Surprise Q1 Earnings Estimates? - April 17, 2015 -
Israel military networks breached by hackers: researchers | Reuters
Medical records vulnerable to hackers study finds
NPR’s Gas Pains » CounterPunch: Tells the Facts, Names the Names
Cyber Thieves Hacking Your Files for Ransom
Troy, New York hacking event part of AT&T civic app challenge - Albany Business Review
WikiLeaks publishes huge searchable archive of hacked Sony documents | Naked Security
What's next for Microsoft's 'universal' Office apps | ZDNet
Anthem Data Breach Victims Urged To Sign Up For Free Credit Monitoring « CBS New York
Target Announces $19M Data Breach Settlement With MasterCard
What to Expect from Fortinet (FTNT) this Earnings Season? - April 17, 2015 -
OptioLabs Unveils New Anti-Malware Product, OptioGrizzly, at RSA
Report: Apple planning Apple Pay launch in Canada for November | 9to5Mac
Apple Planning November Launch of Apple Pay in Canada - Mac Rumors
OS X Server 4.1: Change log - potential problems and solutions - TechRepublic
Chinese mPayment Platform Gets Gov't Advice on Biometrics - FindBiometrics
Windows 7 Or Windows 8.1: Should You Upgrade? – MotoringCrunch
IT's cloud security concerns do not correlate to actual failures | InfoWorld
Hawk Defense Partners With FireHost to Provide Advanced Threat Detection Services | Virtual-Strategy Magazine
Chris Christie says his Social Security plan hurts the rich, but it really hurts the poor - Vox
Dennis Fisher and Mike Mimoso Discuss the Windows HTTP.sys Vulnerability and More | Threatpost | The first stop for security news
Google Moving Toward Encrypted Ad Services | Threatpost | The first stop for security news
Point Of Sale Payment Processing And Data Collection News From March 2015
Target Settles MasterCard Data Breach Lawsuit for $19 Million - Network Security on CIO Today
Homeland chief: Gyrocopter came in 'under the radar' - SFGate
Minecraft security vulnerability found, allows users to crash servers remotely
Top 10 smart home gadgets and appliances | ZDNet
Climbing the career ladder: What do you need on your CV to make it to the top in tech? | ZDNet
A time to lead | The Indian Express
'Arab hackers believed to have breached Israeli military networks' - Arab-Israeli Conflict - Jerusalem Post
Active DoS Exploits for MS15-034 Under Way | Threatpost | The first stop for security news
How Ionic Says It Makes Data Breaches Irrelevant - Dark Reading
Google launches Android for Work on Google Play to bolster BYOD endeavors : Software/OS : iTech Post
Apple Inc. On Path To Be A Trillion Dollar Company: Analyst
Why BYOD Could Lead To Lawsuits For Employers - Employment and HR - United States
Marble Security Seeks Mobile Intelligence Partners | Network Security and Data Protection Software Solutions content from The VAR Guy
Smaller Businesses Drive Big Data's Growth | Seeking Alpha
Gartner: Security analytics could be crucial for breach detection
Google's Chrome just got better on your iPhone or iPad | ZDNet
Dr. Chase Cunningham - Authors & Columnists - Dark Reading
Inside the 4 Most Common Threat Actor Tools
Google Play User Says Hackers Stole Thousands In Purchases - Law360
Apple Inc. Is Catching Up to Its Most Powerful Rival (AAPL)
Elastica nabs another Palo Alto Networks big shot - 17 Apr 2015 - CRN UK News
Internet hacking group explains actions after in-custody death in Vineland - News
Sony hacking scandal far from over - NBC News
Pawn Storm cyberespionage group increases activity, targets NATO | PCWorld
Twin Cities Business | Recent News
New technology leads to lone burglary arrest - Crime & Courts
OptioLabs Unveils New Anti-Malware Product, OptioGrizzly, at RSA | SYS-CON MEDIA
Insufficient SMB security among major issues highlighted by reports
Defending the corporate network from cybercrime - New Hampshire Business Review - April 17 2015
Microsoft Pushes Back SharePoint 2016 Release to Next Year -- Redmond Channel Partner
Microsoft pushes back next SharePoint Server release to Q2 2016 | ZDNet
PC Magazine Cloud Channel |
Major Apple TV Update Planned For WWDC 2015 on June 8 | TechBeat
How to Build a Portfolio of Tech Stocks
Google Gives Windows XP Users a Chrome Reprieve | Windows XP content from Windows IT Pro
Spent 15 minutes with five Apple Watch bands, left Apple Store and ordered a Garmin Vivoactive | ZDNet
Popular Home Automation System Backdoored Via Unpatched Flaw
Popular Home Automation System Backdoored Via Unpatched Flaw - Dark Reading
Vormetric Announces Cloud Encryption Gateway - Protects Data Within AWS S3 and Box
EY Sees Barriers to Use of Big Data for Audits -
Symantec, Intel, Cisco and other security companies share tips - Silicon Valley Business Journal
Target Settles MasterCard Data Breach Lawsuit for $19 Million - Network Security on Top Tech News
AirDroid app fixes severe authentication vulnerability - PC World New Zealand
Security expert pulled off flight by FBI after exposing airline tech vulnerabilities | Fox News
Pawn Storm cyberespionage group increases activity, targets NATO | ITworld
Email Phishing Attacks Take Just Minutes to Hook Recipients | WIRED
Russian-linked hackers target White House & Nato, says Trend Micro - Computer Business Review
How Corporations and Law Enforcement Are Spying on Environmentalists
Cyberterrorism : is there a European response ? | euronews, u talk
Cyber crime bill is all set for final approval from NA | The News Teller
How Twitter is fighting trolls while balancing freedom of speech | ZDNet
Pawn Storm cyberespionage group increases activity, targets NATO | CIO
The future of SCADA-control security | CSO Online
Attacks against industrial control systems double | CIO
Operation Pawn Storm Ramps up its Activities; Targets NATO, White House | Trend Micro Security Intelligence Blog
Duo Security Expands Beyond Two-Factor Authentication With $30 Million In Series C Funding - Forbes
'Game of Thrones' Offers Strategy Model for Enterprise Mobility World
Home Automation Systems - A Consumer Checklist
WikiLeaks Publishes Over 30,000 Documents From Sony Hack | Rolling Stone
Sony Pictures condemns Wikileaks release of documents from hackers | Reuters
3 arrested for hacking UPPCL online billing system | Business Standard News
Juniper Networks Introduces its Fastest Firewall | News |
Cyberoam Awarded Patent for Innovative Layer-8 Security Method | News |
Update Me
The Upload: Your tech news briefing for Friday, April 17 | CIO
Update: Wikileaks publishes searchable database of hacked Sony docs | Computerworld
Hacker In Trouble With Feds After Tweeting About 'Playing' With Plane Comms Mid-Flight - Forbes
Three arrested for hacking UPPCL online billing system | Zee News
Ternyata, Pembobol Tiga Bank Besar di Indonesia Bukan Orang Indonesia - Tribun Pontianak
Microsoft pulls Windows 10 preview for low-end Lumias after 'bricking' reports' | ZDNet
Zero Day Weekly: Active Microsoft zero-day, Oracle kills Java, D-Link snafu, more DHS cyber-negligence | ZDNet
Dems fear late add could blow up cyber push | TheHill
ICO probed 173 law firms last year over data breach fears - Computer Business Review
OptioLabs Unveils New Anti-Malware Product, OptioGrizzly, at RSA | Business Wire
Could a hacker *really* bring down a plane from a phone in seat 12C? | Naked Security
Schneier on Security: Blog Entries Tagged no-fly list
Schneier on Security: The No-Fly List and Due Process
Dropbox launches bug bounty program - SC Magazine
Ransomware: Pay it or fight it?
Cyber extortion: A growth industry | CIO
Cloud shopping: Is iCloud Photo Library the best value for your dollar? | Macworld
Google Chrome on Windows XP support extends until the end of 2015
Google, WordPress, LastPass, Salesforce - new USB token secures them all | Security | Techworld
Boston Police Use Marathon Security To Expand Video Surveillance Network | WBUR
UN asks if robots should be allowed to kill humans | Naked Security
Kenya rights group shutdown 'harming counter-terrorism efforts' | The Guardian Nigeria
How to password-protect your Mac--and keep other people from using it | Macworld
Target’s settlement with MasterCard costs retailer $19 million | Naked Security
Samsung Galaxy S6 review: Superb screen and great camera make it the best Android yet | ZDNet
Another French TV Station is Hacked as Attackers Steal Personal Data - Infosecurity Magazine
3DIcon Well-Positioned as Interest Grows for Cyber Technologies
Tampering with US voting machine as easy as ‘abcde’, audit finds | Naked Security
Internet @ - News, Features and Essential Information for IT professionals
Hackers attack Huron County Sheriff's Office | Norwalk Reflector
New Dark-Web Market Is Selling Zero-Day Exploits to Hackers | WIRED
New Report Reveals That Iran Is Quickly Becoming a Significant Cybersecurity Threat | Business Wire
Google extends Chrome support for 'millions' still on Windows XP | ZDNet
Practical IT: What you need to know about email encryption | Naked Security
Open for business: Android for Work shows up on Google Play | ZDNet
Begini Cara Perampok Curi Uang Anda Lewat Antivirus dan Internet - Tribun Timur
Gawat! Malware di Komputer Nasabah tak Bisa Dihapus -
Public-Facing Web Assets Expose Banks to Greater Risk - Infosecurity Magazine
Maine dairy farmers divided on raw milk sales restrictions - Brattleboro Reformer
Avionics Magazine :: Cockpit Avionics at Risk, GAO Report Says
Google extends Chrome support for Windows XP to the end of 2015
Google extends support for Chrome on Windows XP | Expert Reviews
Memex – DARPA’s search engine for the Dark Web | Naked Security
Lost your Android? Now you can Google it! | Naked Security
Prioritizing Health Care Data Security :: Security & Resiliency | SYS-CON MEDIA
Boston Marathon Surveillance Raises Privacy Concerns Long After Bombing : NPR
Google boosts cloud-based big data services | Business Cloud News
Somali Shebab University Massacre Gunmen Were Kenyans: Report
Somansa Announces New Global Channel Reseller Partner Program | Benzinga
Homeland chief: Gyrocopter came in 'under the radar' - WCIV-TV | ABC News 4 - Charleston News, Sports, Weather
No Cookies | Perth Now
Playing Host to the Hacker - Infosecurity Magazine
Securosis Blog |
Securosis Blog | LAST CHANCE! Register for the Disaster Recovery Breakfast
Chef aims to create the secret recipe for DevOps success | ZDNet
How enterprise architecture can deliver business value from IoT: Gartner
Wikileaks publishes Sony's hacked email for anyone to go through | PCWorld
Boeing rejects fears computer hackers could take over jets | Plane Talking
OJK: Pembobolan Internet Banking Hanya Rp 5 Miliar -
Diretipideksus Usut Kasus Pembobolan Rekening Nasabah Tiga Bank
Manfaatkan Aplikasi Antivirus, Sindikat Kuras Uang Nasabah E-Banking - Banjarmasin Post
Horizon Avoids Data Breach Class Action For Lack Of Standing | King & Spalding - JDSupra
Massive Data Breach: Target Settles Suit With MasterCard |
Protocols, Security, and The IoT | SYS-CON MEDIA
The Economics of Persistent Cyber Attacks - Forbes
Homeland chief: Gyrocopter came in 'under the radar' : News
Verizon Releases 2015 Data Breach Investigation Report
Hackers Using Old Tricks To Snare Victims in Their Cyber Traps | Sci-Tech Today
Verizon 2015 Data Breach Investigations Report Finds Cyberthreats Are Increasing in Sophistication | Technuter
Verizon's yearly reminder that we're still useless at infosec | ZDNet
NBN Co reshuffles executive team after Telstra deal | ZDNet
Data is Coming: Game of Thrones meets Business Intelligence | SmartData Collective
Still waiting for your tax refund? It could be hackers |
WikiLeaks posts documents stolen by Sony hackers - NBC News
Threat from hackers and cybercriminals growing in Canada: reports
Government Agency Warns Airplanes At Risk of Hacking - Techlicious
Ransomware: What you need to know -
Target announces $19 million data breach settlement with MasterCard | Business Insurance
Hackers move from retail to health care, may target education next, say security researchers
ChannelLife NZ - Cloud security: What enterprises of today require
Apple seeds first OS X 10.10.4 beta to developers for testing
NewSat falls into administration | ZDNet
Guns on airplanes: TSA outlines how to legally carry gun with airline luggage | Local News | Times Free Press
4 no-bull facts about Microsoft's HTTP.sys vulnerability | InfoWorld
Symantec computer security report highlights the biggest vulnerability issues of 2014 - Silicon Valley Business Journal - Stocks to Watch
wearable devices in enterprise
Wearables Gaining Popularity In Business
UPDATE 1-Sony Pictures condemns Wikileaks release of documents from hackers | Reuters
The NSA's Fight To Keep Its Best Hackers - Defense One
VMware announces EVO:Rail partners for Asean | ZDNet
Police confirm car hacking is occurring in Australia
Suspicion strong that Aussie teen wiz hacked Metro State website | Star Tribune
How Terrorists Are Turning Robots Into Weapons - Defense One
Expert: Terrorists Hacking Into Robots, Drones to Use as Weapons
Official: Commercial IT fuels DOD information environment - The Fort Campbell Courier: News
Chris Back's animal protection bill vital to protect against radical activism: Agribusiness lawyer - Beef Central
Comodo Updates Next Generation Data Loss Prevention Solution -- CLIFTON, N.J., April 16, 2015 /PRNewswire/ --
New Zealand link to hardline forces - Politics - NZ Herald News
Target will settle with MasterCard for $19 million following 2013 security breach - AfterDawn
College security breaches: Where they’ve happened and how to prevent them | USA TODAY College
Patch Wednesday: Adobe Flash Player update for IE10 and IE11 rolling out | Patch Tuesday content from Windows IT Pro
Just-released Minecraft exploit makes it easy to crash game servers | Ars Technica
Telstra's restructure exec to retire | ZDNet
Iran poses growing cyber threat | Bangkok Post: tech
WikiLeaks republishes hacked Sony data in searchable database - CNE
Oakland Tribune editorial: Attack on U.S. from cyberspace a real possibility -
Wikileaks publishes searchable database of hacked Sony emails - Apr. 16, 2015
Sony: The Sequel, as WikiLeaks wades into hacking fray
ISIS sympathizers linked to hacking of Leeds nonprofit site | WIAT 42
HSBC Notifies US Customers Of Data Breach
Data breaches inevitable, endangering students, families
Computer hacker likely exposed data of 160,000 at Metropolitan State University | Star Tribune
Google to pull Chrome plug on Windows XP at year's end | Computerworld
Microsoft Releases 4 'Critical' Bulletins for April's Security Update -- Microsoft Certified Professional Magazine Online
IBM unbolts vast threat database to fight cybercrimes | Network World
IBM to release 20 years worth of cyberthreat data
IT Help Wanted, Especially Security Experts
Gyrocopter Pilot in Court Video - ABC News
Mailman in Capitol gyrocopter landing charged and ordered to home detention | US news | The Guardian
HSBC Notifies Consumers of Mortgage Information Breach - Infosecurity Magazine
Sony execs lobbied Netflix to stop VPN users | ZDNet
Some taxpayers affected by Anthem security breach face frustrating journey to file returns |
Critcal Adobe Flash Player patches include fix for exploited zero day flaw | PCWorld
Minecraft vulnerability leaves servers exposed to forced crashes - PC Gamer
Safe internet wanted, but security issues require data: GCCS kicks off - NL Times
National Assembly body approves controversial cyber-crime bill | Business Recorder
NA body approves bill against electronic crimes
Apple heading to $1 trillion in a year: Analyst
Next SharePoint Server Product Now Expected in Q2 2016 --
Inflight systems vulnerable to hackers: report - Taipei Times
Ransomware is a scary and lucrative tool for hackers - San Jose Mercury News
Study – Iran poses growing cyber threat to US - The Times of Israel
'Heartbleed' bug in OpenSSL leaves encrypted communications at risk | Computerworld
Experts boost threat level, call for patching critical Windows bug ASAP | CIO
Is SSL Hurting More Than Helping Middle East Organizations | MENAFN.COM
WikiLeaks makes Sony's hacked emails searchable - Business - CBC News
Class action lawyer blasts Target’s data breach deal with MasterCard
Target to Pay MasterCard Banks $19M to Settle Data Breach Claim
Remarks by President Obama in Working Mothers Town Hall
Puerto Rico exports its addicts to Chicago | THE GATE Newspaper
Apple Seeds OS X Yosemite 10.10.4 Beta | Ubergizmo
Dropbox integrates with Office Online: News tech leaders need to know | Financial Post
Big data, analytics, & DaaS market trends & 2019 forecast report just published - WhaTech
Big Data Technology for Manufacturing - insideBIGDATA
Google takes on real-time big data analysis with new cloud services - PC World Australia
Merkle Response Management Group Achieves PCI DSS 3.0 Level 1 Compliance | Business Wire
IBM Launches Open Threat Intelligence Platform - Infosecurity Magazine
Homeland chief: Gyrocopter came in 'under the radar' | The Kansas City Star The Kansas City Star
Data breach notification bill could weaken consumer protections | Computerworld
GAO: Newer aircraft vulnerable to hacking | Politics - WESH Home
Adobe patches 22 vulnerabilities in Flash Player plus ColdFusion and Flex flaws | Security | Techworld
Adobe Security Bulletin addresses Flash Player, ColdFusion, Flex vulnerabilities
China backs away from banning foreign tech companies from banking sector |
Public-private partnerships a way to tackle well-organized and sophisticated cyber criminals
Nozzolio announces public hearings to address cyber crime - News - Irondequoit Post - Irondequoit, NY
PCI Security Standards Council Revises PCI DSS V. 3.1 - Infosecurity Magazine
ServiceNow delivers strong Q1, but Q2 outlook light | ZDNet
FBR Capital Starts Apple (AAPL) at Outperform
FBR: Apple Worth $1 Trillion - Apple Inc. (NASDAQ:AAPL) | Benzinga
Making the Case for Cloud Security in Government | CSO Online
Sony Pictures condemns WikiLeaks' release of hacked material - LA Times
Sony condemns WikiLeaks release of documents stolen by hackers — Nation — Bangor Daily News — BDN Maine
Iran poses growing cyber threat to US | Daily Mail Online
Hacking group explains actions after in-custody death in Vineland - News
IT manager accused of hacking into ex-Northbrook employer's emails - Lake County News-Sun
Sony Pictures hit by WikiLeaks document dump | New York Post
Report: Iranian Hackers Eye U.S. Grid - The Daily Beast
Vulnerable Dell support tool now detected as risky software - PC Advisor
Protecting consumers from ID theft goal of Blunt's new bill : News
Target to Pay MasterCard $19M to Settle Data Breach Lawsuit - April 16, 2015 -
Homeland Security Today: Legislation Reintroduced to Protect Consumers from Identity Theft, Fraud
Sony to plough cash into Brazilian mobile market | ZDNet
When Should You Outsource Security? - Health Data Management Blogs Article
How 1 Meter of Orange Plastic Tape Could Change Your Security Business - Article from CE Pro
TechBits: Analyzing medical data, breaking smartphones - WKOW 27: Madison, WI Breaking News, Weather and Sports
First OS X Yosemite 10.10.4 beta for Mac developers now available | 9to5Mac
Apple Releases 10.10.3 Supplemental Update - The Mac Observer
Apple Seeds First OS X 10.10.4 Yosemite Beta to Developers - Mac Rumors
Cyanogen Announces Strategic Partnership With Microsoft
Google Extends Chrome Updates for Windows XP Users | News & Opinion |
Resolution1 lays off global marketing team, focuses on customers, R&D; - SC Magazine
POS threat 'Punkey' allows additional malware download for greater access - SC Magazine
Yikes: 10,000 IRS impersonation scam calls are placed every week | Network World
IBM unbolts vast threat database to fight cybercrimes | CIO
Big Data Looms as Next Battle in Europe - WSJ
IBM Security Opens Up Library of Malware and Threat Intelligence | Xconomy
Cybersecurity, Data Science and Machine Learning: Is All Data Equal?
This New Interactive Film Shows Who's Watching You Online - Forbes
How to maximize your Social Security benefits
Researchers identify new targets in 'Operation Pawn Storm' campaign - SC Magazine
Banking industry security protocol falters in third-party vendor contracts - SC Magazine
Small businesses in UK battling wave of card breaches, says Worldpay -
FBI, Homeland Security officials' addresses leaked
Reddit User Finds Security Flaw In Burlington Electric Online Payment System | Vermont Public Radio
Just because it's virtual, doesn't mean it's not real: digital extortion is on the rise | Al Bawaba
Unmasking the Masque attack: Inside the iOS security flaw
Israeli Cyber Expert: Next 9/11 Will Happen Without Suicide Terrorists Aboard the Plane | SYS-CON MEDIA
Iran poses growing cyber threat to US: Study | Zee News
Study: Iranian Cyber Warfare Capabilities Increasing Exponentially - Breitbart
Redbooth's Award-Winning Collaboration Platform Named as Gartner's "Cool Vendor" in Unified Communications
Sonasoft's Move into Banking Could Pay Big Dividends - MarketWatch
Cybersecurity expert Keren Elazari lauds 'good hackers' at Halifax conference - Nova Scotia - CBC News
WikiLeaks Publishes Sony Documents, Opening New Phase of Hacking - Bloomberg Business
UPDATED: Sony Slams WikiLeaks Document Dump; Do We Need A Sequel? | Deadline
WikiLeaks republishes all documents from Sony hacking scandal | Technology | The Guardian
Target settles with MasterCard for $19M over data breach - CNE
Target offers $19 million to MasterCard issuers to settle 2013 data breach
Verizon Data Breach Investigations Report: over 1 out of 10 people fall for phishing attempts
Gardening: Making it to rainy season - Marco Eagle
What Prospective Homebuyers Should Look for When Evaluating Homes to Purchase | The National Law Review
Skyhigh Networks Announces Security Intelligence Platform for Sanctioned Cloud Services | SYS-CON MEDIA
Skyhigh upgrades cloud security platform to detect security breaches in cloud storage accounts - FierceCIO
Skyhigh Turns Its Mind To The Security Of Sanctioned Applications - Forbes
Audit finds unsecured docs at most desks in five DHS orgs - SC Magazine
PCI SSC releases version 3.1, eschews SSL, early TLS - SC Magazine
Shaping your content management strategy around mobility
Cyanogen and Microsoft Android Apps: Bing, Skype, Office and OneDrive | BGR
Docker ships 1.6 with a faster registry and more for sysadmins | ZDNet
Google Expands Access to Big Data Tool -- ADTmag
Your Employees Are Your Biggest Security Risk | 2015-04-16 |
Google adds real-time big data analysis to two of its cloud services | Computerworld
The new debate about Social Security | LifeHealthPro
The Short Case For Target: Are Target's Latest Cyber-Security Efforts Too Little, Too Late? - Target Corporation (NYSE:TGT) | Seeking Alpha
Breach Defense Playbook - Dark Reading
Ryan Vela - Authors & Columnists - Dark Reading
Lawyer: Malware located on drive | NWADG
Target Settles MasterCard Data Breach Lawsuit for $19 Million - Data Security on Top Tech News
Editorial: China’s ‘Great Cannon’
Chinese Hackers Target Southeast Asia, India
China's 'Great Cannon' Redirects U.S. Traffic for Censorship - US News
San Bernardino County sheriff's deputies, His bail is set at $100,000
China’s ‘Great Cannon’ Uses DDoS Style Redirects for Censorship | SocialTimes
5 Cyberwar Threats Worth Watching - InformationWeek
Attention officers: Sign up soon for cyber transfers
Col. Derek Harvey: US Vulnerable to a 'Cyber 9/11'
Iran poses growing cyber threat to US: Study - United States News & Top Stories - The Straits Times
Youth, Apathy, And Salary Dictate Mobile Threats To Business - Dark Reading
New Rulings Address BYOD Policies | WeComply, a Thomson Reuters business - JDSupra
Duo Security Introduces Platform Edition -- the Most Effective Way to Prevent Data Breaches - Press Release - Digital Journal
Duo Security: (Big) New Money, New Platform, New Offices | Xconomy
SCED's speech at Internet of Things Symposium 2015
IBM Earnings Preview: Revenues To Decline As Business Environment Remains Challenging -- Trefis
Singtel looks to acquisitions, partnerships to grow enterprise base - Channel NewsAsia
Hackers Using Old Tricks To Snare Victims in Their Cyber Traps - Network Security on Top Tech News
Gangs of hackers cause cyber breaches to spike 23%
Ransomware Teslacrypt Still Targeting Gamers | Threatpost | The first stop for security news
IBM X-Force Exchange
IBM opens up its threat data as part of new security intelligence sharing platform | CIO
These voting machines are disturbingly easy to hack
Seculert Research Finds Critical Gaps in Gateway Solutions | Virtual-Strategy Magazine
New Data Center and Endpoint Solutions Make Fortinet the Only Network Security Provider to Protect Enterprises Against Threats at Every Possible Entry Point - MarketWatch
Minnesota university breach update, 160K students affected - SC Magazine
Report: DEA contract supplied agency with Hacking Team spyware - SC Magazine
US Drug Enforcement Agency buying spyware from an Italian company
Lawfare › On Hacking A Passenger Airliner (GAO report)
Banking malware using a variety of tricks to evade detection | CSO Online
Trustlook Antivirus & Mobile Security Ranked Top in AV-TEST With Best Score
Server-crashing Minecraft exploit published after game maker "failed to act" | ZDNet
Data breach notification bill could weaken consumer protections | PCWorld
Jeff Gelles: Is Congress taking wrong direction on data privacy?
Virginia Voting Machines Exposed to Low-Level, Election Altering Hacks Since 2004 | Threatpost | The first stop for security news
IT News Online > PR Newswire - CipherCloud Research Reveals Enterprises' Cloud Security Requirements
Skyhigh Networks Announces Security Intelligence Platform for Sanctioned Cloud Services | Business Wire
CISOs struggling to contain 'shadow' universe of consumer cloud apps -
Camgian Recognized as Pioneer in Edge Analytics for the Internet of Things | SYS-CON MEDIA
Google takes on real-time big data analysis with new cloud services | CIO
Intel, IoT And The Case For Commerce |
USmax awarded Prime Contract worth $17.9 Million with U.S. Agency for International... -- FAIRFAX, Va., April 16, 2015 /PRNewswire/ --
Cyber-security pros blame breaches on skills gap - SC Magazine UK
GitHub issues first transparency report; 40 accounts affected | ZDNet
Chris Christie's stuck in the middle on Social Security and Medicare reform | Mulshine |
How to bring clarity and urgency to Social Security reporting - Columbia Journalism Review
Fix Social Security by spending less on huge military budget : News
Anthem Health Coverage Data Security Breach : Webster Today
Data breach notification bill could weaken consumer protections | Network World
Senator calls for investigation into gyrocopter breach
Authorities Take Down Malware-Distributing Simda Botnet - Dark Reading
Forever 21 denies pirating Adobe software, strikes back | CIO
Complaint v Forever 21
AirDroid fixes flaw that could grant hackers full control of your phone | PCWorld
FireEye Earns Top Honors for Advanced Threat Detection and Threat Intelligence From SANS Institute
3DIcon Well-Positioned as Interest Grows for Cyber Technologies - Press Release - Digital Journal
Microsoft Zero-Day Bug Being Exploited In The Wild
Andrei Ravkov: Cyber wars are no longer launched by lone hackers | Politics | Headlines
UT Press Review: Financial Times on Russia's silent war - watch on -
L.A. school district may seek millions in refunds for iPad curriculum | ZDNet
iconnect007 :: Article
Small business advice: What you need to know about shadow IT - The Washington Post
IoT device explosion challenges data center security
Predictive Analytics: The Future Is Now - McAfee
Cyber attacks to rise, but competent security talent scarce, study says - SC Magazine
Hackers keep trying new targets in search of easy data : Business
El Moujahidin hackers target Staffordshire country pub's website - Telegraph
In-flight Wi-Fi could be hacked to take control of planes - B
Voting machine password hacks as easy as 'abcde', details Virginia state report | US news | The Guardian
Hacking US electronic voting machines was extremely easy |
ECI Telecom Completes Development of Its NFV Security Solution -- PETACH TIKVA, Israel, April 16, 2015 /PRNewswire/ --
Zscaler Experts to Speak on Cloud Security Best Practices at RSA Conference 2015 | Virtual-Strategy Magazine
Local Beat: Learning About Messy Data Through Hacking at Hack Jersey 2.0 |
GAO raises wi-fi hacking concerns | MRO Network
Revealed: Pentagon, DEA Secretly Bought Spyware From Front Company / Sputnik International
Antivirus Security DU Master Download | ZDNet
Antivirus competitors join arms to take down a huge botnet
Trustlook Antivirus & Mobile Security Ranked Top in AV-TEST With Best Score
10 reasons to buy a Windows tablet for work instead of an iPad or Android | ZDNet
HSBC Finance Notifies Mortgage Customers of Data Breach | American Banker
Sentors introduce bipartisan data breach legislation | TheHill
Target Corporation Makes Partial Data Breach Settlement With Mastercard Users
Is SSL hurting more than helping Middle East organisations?
Consumer Protection and Your Business | Thomas Fox - JDSupra
Zscaler Experts to Speak on Cloud Security Best Practices at RSA Conference 2015 - Press Release - Digital Journal