Bsides Winnipeg - Michael Legary - Nfc And Rfid Harvesting For Redacted
eDiscovery Exchange | Symantec
Scientists create quantum entanglement on a silicon chip — Tech News and Analysis
WikiLeaks requests information on staffers search warrant data requests - SC Magazine
SymantecVoice: The "Unicorn" Budget: Can CIOs And CFOs Agree On IT Spending? - Forbes
Secret Service on alert after drone CRASHES into White House • The Register
Sony accepting claims on 2011 PSN data breach settlement | Joystiq
AT&T; texts can be faked to hack you - Jan. 23, 2015
North is becoming a cyber-security hub as firms win important contracts
CyberWar Games: Do you have what it takes to win? | Symantec Connect
CTB-Locker ransomware variant being distributed in spam campaign - SC Magazine
Challenge 12: Decrypting SSL Traffic
White House cybersecurity plan a step in right direction, but needs work - FierceHealthI
Bham IT experts warn of software taking computers hostage - Birmingham Business Journal
Don’t let IoT hype distract from security fundamentals, experts say | SiliconANGLE
Bsides Winnipeg - Adrien De Beaupre - Making Pen-Testing Analysis Sexy
Google reveals Mac security holes before Apple's fix is ready
Pilgrim pushes for data retention breach notices - Security - News -
Microsoft Business - Microsoft SMB Blog
High Availability and Disaster Recovery with SQL Server 2014 AlwaysOn Availability Groups | SQL Server Pro
Hacked or Spoofed: Digging into the Malaysia Airlines Website Compromise - Security News - Trend Micro USA
Deconstructing an IRS Phishing scam | CSO Online
Looking for current, former or potential Symantec Backup Exec customers!!! - Spiceworks
Over a Decade and Still Running: Targeted Attack Tool Hides Windows Tasks
Cyber Risk Report: January 19-25, 2015
Using Prioritized Analyst Workflows to Improve Incident Response with RSA Security Analytics & ECAT - YouTube
Microsoft cloud and devices momentum highlights second quarter results | News Center
Malaysia Airlines attacked, big data dump threatened | CSO Online
This is What Technology In North Korea Looks Like
Data Breach Notification Law Even Applies to You, California Employer | Sherman Law Corporation - JDSupra
Banks Want Merchants to Chip In After a Data Breach | Corporate Counsel
Java is the biggest vulnerability for US computers | CSO Online
Schneier on Security: Defending Against Liar Buyer Fraud
Schneier on Security: When Thinking Machines Break the Law
Schneier on Security: Friday Squid Blogging: Giggling Squid Restaurant
Cyber security experts set for 20% pay rise in 2015 as businesses crave protection | Information Age
'Sexy Girls' wallpaper app in Google Play store accessed account info - SC Magazine
Uninstall AVG Toolbar, home page and Secure Sear... | AVG
DLL Injection using AppInit_DLLs Part 1
Hackers to Target Smart TV Sets After Phones, Kaspersky Predicts - Businessweek
5 things you can do to limit your exposure to insider threats | CSO Online
Spoof page credits 'Official Cyber Caliphate' with Malaysia Airlines hack - SC Magazine
Rooted Con 2014 - Aladdin Gurbanov - Magnetic Road
Hacking Wi-Fi is child's play
Entanglement On a Chip - IEEE Spectrum
Spreading the Disease and Selling the Cure — Krebs on Security
Lizard Squad Hacks Malaysia Airlines Website, Warns of ‘Dumping’ User Data
Report: Most U.S. weapons programs contain 'significant vulnerabilities' - SC Magazine
The New Year Security Checklist: Security Resolutions for 2015 - Security News - Trend Micro USA
The dangers of relying on our smart devices
Banks Want Merchants to Chip in After a Data Breach | Corporate Counsel
20 million users' information compromised on Russian dating site - SC Magazine
Virtual Chassis Fabric: Automatic Software Upgrades - YouTube
How we can each fight cybercrime with smarter habits
Risk Management Framework: Four Things to Like | Core Security | Core Security Blog
Cisco 2015 Annual Security Report Overview - YouTube
Albany health system notifies more than 5,000 patients of data breach - SC Magazine
Trend Micro Safe Mobile Workforce - Trend Micro USA - image uploaded by @DataPrivacyDay
CISOs Need a Board Coach – Blog Post – RSA Conference
Using Ansible to deploy Juniper configurations | MyTeneo!!!
Presidential Proposals and Good Governance - Websense Insights
Who's Using Cyberthreat Intelligence and How? Part 2: Best Practices to Improve Incident Detection and Response - SANS Institute
Automating Defenses Against Increasingly Sophisticated DDoS Attacks
Rise Of The Data Force: The Emergence Of The Chief Data Officer | BCW
Breakthrough Promises Secure Communications & Faster Computers - image uploaded by @STOPTHNKCONNEC
From Inside the Cloud: What commitments does Microsoft make when you subscribe to Office 365? - Office Blogs
SANS Institute
What makes phishing emails so successful?
Adobe gets second Flash zero-day patch ready 2 days early! | Naked Security
Eleventh Circuit dismisses LabMD motion questioning FTC authority - SC Magazine
The 3 biggest networking shifts, from the new Juniper CEO | Digital News Asia
Rooted Con 2014 - Raul Siles – Ios: Back To The Future
Secure Remote Access During Holidays
Study: Executives Unconcerned About the Risks IoT Poses to Their Networks
VPN services blocked by China's Great Firewall
What Is the Main Difference Between Mobile Web Optimization and Desktop Optimization - Radware - YouTube
Brits need chutzpah to copy Israeli cyberspies' tech creche – ex-spooks • The Register
Ransomware 101: What It Is and How It Works - Security News - Trend Micro USA
Hoax Caller Chats With David Cameron By Posing As GCHQ Boss ≈ Packet Storm
Millions Of PSN Hack Victims Finally Get Compensated ≈ Packet Storm
Adobe Rushes Fix For Second Flash Player Zero-Day ≈ Packet Storm
Mouse-Box — An Entire Computer inside a Mouse - Hacker News
WDET Shows - Detroit Today - Why Cyber Security Is Important For The Government And At Home
The State of Obama Cybercare
WikiLeaks demands answers after Google hands staff emails to US government | Technology | The Guardian
Eugene Kaspersky: Cybersecurity Criminals 'Are Getting More And More Professional'
How GitHub is redefining software development
Kaspersky Think Security Guide - Data Privacy Day 2015
Three Reasons Big Companies Should Work With Security Startups - Forbes
Entanglement on a chip: Breakthrough promises secure communications and faster computers
Consumer Support Contacts
How to improve computer performance by configuring Kaspersky Internet Security 2015
The Supply, Demand, and Cost of Your Data - Security News - Trend Micro USA
Myth 1: Dispelling The Myths around Software Tokens - YouTube
Police ransomware scam drives UK teen to suicide
Task 5: Social Engineering
Stealth Mode: Lying in Wait Inside the White House’s Network
Symantec sources claim exec teams in place by April Fools' Day • The Register
Rooted Con 2014 - Chema Alonso – Playing And Hacking With Digital Latches
Maximizing Business Continuity Success
Calgary to host cyber security summit for energy industry | News Talk 770 (CHQR)
The Pirate Bay Updated With Phoenix Image and Set to return on 1 February - Hacker News
Google defends policy that leaves most Android devices unpatched | CSO Online
Adobe updates Flash Player again, plugs 0-day exploited by Angler
Cybersecurity startup scene in Boston is 'frothy,' RSA exec says - Boston Business Journal
20 Million Credentials Stolen From Russian Dating Site 'Topface' - Hacker News
More Than Just a Pretty Dashboard – Cisco ISE and Splunk Turn Event Data Analysis into Action
Hackers can Spoof AT&T; Phone Messages to steal your Information - Hacker News
Google explains why it's not fixing web security in old Android phones
Lizard Squad threatens Malaysia Airlines with data dump: We DID TOO hack your site • The Register
Apple readies fix for Thunderstrike bootkit exploit in next OS X release | Ars Technica
Challenge 6: Digest Authentication Reloaded
Experian Data Breach Resolution and BillGuard collaborate to transform data breach response with launch of an active fraud surveillance and identity theft resolution offering
NDB Advisory Announces Comprehensive PCI DSS QSA Consulting and Compliance Services for South Florida Merchants and Service Providers – Press Release Rocket
Hoaxer posing as GCHQ boss prank-calls PM Cameron • The Register
How the Internet of Things impacts enterprise security
Florida Colleges Rushing to Offer Degrees in Cybersecurity
Rooted Con 2014 - Roberto Baratta - Security Monetization: More With Less To More With Nothing
Open source software for quantum information
Google Chairman Eric Schmidt: "The Internet Will Disappear" - The Hollywood Reporter
Website Defacement - Definition - Trend Micro USA
Analyzing CVE-2015-0311: Flash Zero Day Vulnerability
'Smart' keyboard knows you - Technology News - redOrbit
BRIEF-Bluedon Information Security Technologies gets regulatory approval for assets acquisition| Reuters
Google Play Store Host Application That Steal Users Account | SecTechno
Day-Con IX 2015
APTs: Minimizing losses with early detection
Cartero- E-Mail phishing framework | SecTechno
‘An Inside Look at Disaster Recovery Planning’
What is Assembly Language?
Rooted Con 2014 - Joaquín Moreno - Low Level Forensics On Mac Os X
BEST Practices for a Secure Android Phone | SecTechno
Microsoft wants Windows 10 everywhere, including on your head, starting in 2015
Mozilla Wants To Bring Virtual Reality To The Browser | TechCrunch
SCADA programmers? Time for security by default! 60 Sec Security | Naked Security
A Weekend on Bitcoin | MIT Technology Review
Rooted Con 2014 - Borja Berástegui - Handware Hacking: If No Input No Danger
Blackhat – A Tale of Cyber Security Buffoonery and ‘Human Error’
Vulnerability Scoring 103
The future of machines with feelings
Rooted Con 2014 - Hugo Teso - Going Deeper On Aviation Security
WTF! It Should Not Be Illegal to Hack Your Own Car's Computer | WIRED
John Matherly sur Twitter : "This sort of advice is why control systems are on the Internet (cc @PatStave)"
Privilege Escalation via DLL Hijacking
Your Small Business Checklist for PCI Compliance,
Endpoint Security: Protecting against the Next Generation of Attacks -
Rooted Con 2014 - Juan Vázquez And Julian Vilas - Kicking With My Scada
iCloud is a major weakness: will Apple ever fix it? | Cloud Services News | TechRadar
Challenge 32: XSS XIII
Watch "Police arrest man suspected of hacking Madonna's computer" Video at SCMagazine
Trend Micro sur Twitter : "Growth of malicious and high-risk apps in 2014"
The Hacker News sur Twitter : "Wish u all a very very Happy 66th Republic Day. #India #26January #RepublicDay #JaiHind #JaiHo #ObamaInIndia"
Tighter Control Over Your Referrers | Mozilla Security Blog
Task 15: Data Exfiltration with XMLHttpRequest
Rooted Con 2014 - Manu Quintans &Amp; Frank Ruiz - 50 Shades Of Crimeware
3 key data security issues HITRUST needs to consider | Healthcare Dive
Adobe patches 2nd Flash Player Zero-day Vulnerability - Hacker News
Wireless Lan Security Megaprimer Part 6: Pwning Hidden Ssids
Job Market Newbies: Lock down your social media profile -
Do you want to be the next networking super-power?... - J-Net Community
Data Encryption On The Rise - Network Computing
PC Users Group meeting and talk on cyber security at library | Trumbull Times
Tina Dupuy: Choosing weed policy over cyber security
lcamtuf's blog: Looking back at three months of afl-fuzz
Rooted Con 2014 - José Pico And David Perez - Attacking 3g
Microsoft's HoloLens explained: How it works and why it's different - CNE
Six ways identity will take center stage in 2015 - SC Magazine
From Infection to Extortion: Watch TorrentLocker In Action - Security News - Trend Micro USA
#ChatDPD Twitter Chat: Things You Should Know About Your Privacy On the Go (with images, tweets) · StaySafeOnline · Storify
Business Continuity Plans + Notifications = Business Value | BrightTALK
Module 1: Introduction to Python and Setting up an Environment
Symantec cyber-resilience
News, sports and weather for Tacoma, WA| The News Tribune &
Cisco Security sur Twitter : "Attending #CLEUR in Milan this week? Make sure to stop by the #security booth to check out our live demos!"
Rooted Con 2014 - C. Lorenzana &Amp; J. Rodriguez - Why Call Apt's, When What They Mean Is Money
Proposed CFAA revisions agitate IT security community - SC Magazine
Game over? Sony FINALLY offers compensation to MEELLIONS of PSN hack victims • The Register
Module 6: Daemons and Backdoors
Job STEM-ulation - The Killeen Daily Herald: News
Rooted Con 2014 - Jose L. Verdeguer &Amp; Víctor Seva – Secure Communications System
Insertion Encoder
Rooted Con 2014 - Jorge Ramió - Rsa Turns 36 Years And Its Youth Card Has Expired
US Gas Stations Exposed to Cyberattacks: Researchers | SecurityWeek.Com
Flash 0-day Exploited by Angler Exploit Kit
Family finances: when to worry about a data breach - Tulsa World: Money Power
Rooted Con 2014 - Miguel Tarasco - Native Wifi Analysis Under Windows
Apple's OS X 10.10.2 to Fix Security Vulnerabilities Exposed by Google's Project Zero - Mac Rumors
Biden Unveils $25 Million Grant to Support Cyber Security Education : News : ISchoolGuide
Rooted Con 2014 - Andrés Tarasco – Targeted Attacks With Wi-Fi Apts
Future of IT Podcast: Becoming Cyber Resilient in Today’s Internet of…
Backtrack 5 Wireless pen testing: Book Review - YouTube
Challenge 5: Digest Authentication Attack
Digital Doomsday Coming? ~ Sunday, 25th January 2015 from 4Hoteliers
Rooted Con 2014 - Jeremy Brown &Amp; David Seidman - Microsoft Vulnerability Research
How Origami Might Soon Be Used to Power the Internet of Things | Motherboard
Strong Authentication and the Trusted Mobile Device - YouTube
Challenge 33: XSS 14
A Guide for CISOs Concerned About Data Collection – Blog Post – RSA Conference
Rooted Con 2014 - Francisco J Gómez And Carlos J Diaz - Sinfonier
Cyber Threat Detection and Incident Response
Appie – Android Pentesting Portable Integrated Environment | Aditya Agrawal
Clues, code-breaking, and cruciverbalists: the language of crosswords | OUPblog
Police Using High-Tech Device to See Through Walls Warrantlessly - Hacker News
IANS - CISO Impact Center
Lawsuits, Legal News & Issues, Lawsuit Settlements, Class Action Lawsuits
Choosing Weed Policy Over Cyber Security | UK Progressive
JavaScript for Pentesters Archives - Securethelock
Rooted Con 2014 - Alfonso Muñoz – Hiding Communications In Natural Language
What Government Can (And Can't) Do About Cybersecurity
Weekend news review: January 20-23
Watch "Reading the Tea Leaves of the RSAC Submissions" webcast
PentestingSkills sur Twitter : "Solved! First GDB test(easy) @securitytube SLAE64 course "Welcome to SLAE64 course""
x86_64 Assembly Language and Shellcoding on Linux
Here's the Secret Silk Road Journal From the Laptop of Ross Ulbricht | WIRED
Rooted Con 2014 - Pau Oliva – Bypassing Wifi Pay-Walls With Android
CyberWar Games- Video 2 Title: Tools and Concepts - nmap and Metasploit Framework - YouTube
9 Lethal Linux Commands You Should Never Run Free Guide
malwaRE- Malware repository framework | SecTechno
2015 Enterprise Dev Predictions, Part 3: Digital Transformation and Lifecycle Virtualization -- ADTmag - St. Peter's Health Partners warns of possible data breach
Rooted Con 2014 - Antonio Ramos – Agility: The Road To Security
Module 2: NOT Encoder
SAN BERNARDINO: Community matters to Cyber Security Center - Press Enterprise
Rooted Con 2014 - Pablo Gonzalez And Juan Antonio Calles – Cyberwar: Looking For… Touchdown!
CyberWar Games Improves Security by Allowing Symantec Employees to Think Like a Hacker | Symantec Connect
Cough up your social media password or go to jail | CSO Online
We Should All Step Back from Security Journalism — The Message — Medium
Basic Authentication and Form Bruteforcing (Intermediate)
Rooted Con 2014 - Alberto Cita – Skype: An Analysis Of Security And Privacy
World's first 3D-printed apartment building constructed in China - CNE
What Poweliks tells us about our current state of security | VentureBeat | Security | by Pedro Bustamante, Malwarebytes
Cyber warfare: Capitol staffers aren’t ready - Tal Kopan - POLITICO
A Glimpse at the Latest Sandbox Evasion Techniques | SecurityWeek.Com
Panicked teen hanged himself after receiving ransomware scam email • The Register
​Ubuntu wants to be the OS for the Internet of Things | ZDNet
Chelsea Heights could see federal disaster-recovery funds - Atlantic City | Pleasantville | Brigantine