How technology will change the way we behave in 2015
Recon 2013 - Reconstructing Gapz: Position-Independent Code Analysis Problem
Week in review: ICANN systems breached, critical Git and SOHO router flaws
Hackers pop German steel mill, wreck furnace • The Register
Congressman Kind: "Use savings from Pentagon waste cutting to improve cyber-security." - News - WTAQ News Talk 97.5FM and 1360AM
Will 2015 be the year of risk-based security?
ID theft from data breach can lead to months of hassles - The Denver Post
Recon 2013 - Wardriving From Your Pocket
Five things you should know about PCI DSS - SC Magazine UK
[tor-talk] Warning: Do NOT use my mirrors/services until I have reviewed the situation
Bugtraq: VP-2014-004 SysAid Server Arbitrary File Disclosure
Actions to strengthen your defense minimize damage
STAY AWAY: Popular Tor exit relays look raided • The Register
Bugtraq: [SECURITY] [DSA 3107-2] subversion regression update
Bugtraq: [SECURITY] [DSA 3109-1] firebird2.5 security update
Cybercrime will continue to evolve
Recon 2013 - Apple Icloud Services Reversed Inside Out
Indicators of Compromise for Malware Used by Sony Attackers
The 12 Hacks of Christmas: Part 2
Dangerous NTP hole ruins your Chrissy lunch • The Register
Sony plans to release ‘The Interview’ on Crackle for free | New York Post
Recon 2013 - Many More Tamagotchis Were Harmed In The Making Of This Presentation
DigitalJewels, NIBSS Partner on Information Security, Articles | THISDAY LIVE
North Korea and the attack on Sony Pictures Entert... - HP Enterprise Business Community
contagio mobile: DroidJack RAT - Androrat - Android - Sample
FireEye predictions for cybersecurity in 2015 | ZDNet
Consumers get go-ahead in lawsuit against Target in data breach - Rick Kupchella's –
Recon 2013 - Reversing And Auditing Android's Proprietary Bits
2014 Security Review: The Year in Breaches, Hacks and Exploits -- Redmond Channel Partner
UK Spy Agency Makes Cryptography App for Children
Tech support scam targets Mac users | SecTechno
Watch "Steve Carell North Korea film cancelled following Sony hack" Video at SCMagazine
Network Virtualization...and Reality. Juniper Services to Help You Plan - YouTube
Security Tips for the Holidays - Security News - Trend Micro USA
Recon 2013 - Hiding @ Depth
Kaspersky Cyberstat
Why You Need Antivirus Software
The Industry's First Carrier-Grade Virtualized Rou... - J-Net Community
PuttyRider- Tool to hijack putty sessions | SecTechno
Best Buys That Could Lead to the Worst Shams - Security News - Trend Micro USA
Now Obama seeks China's help to halt alleged Nork HACK ATTACKS • The Register
Cyber-security expert offers 10 tips to safeguard your information - Your Houston News: Living
Sony case underlines cyber security needs for India - Hindustan Times
The Ultimate Goal of Digital Attacks -
NEW Infosec Pro Weekend Bootcamp – OH YOU GOTTA SEE THIS!!!!
Recon 2013 - Teridian Soc Exploitation: Exploration Of Harvard Architecture Smart Grid Systems
Phishing Scams & Identity Theft Protection – Don’t be that Guy – Trend Micro
Martin Roesch – Speaker – RSA Conference
You Better Watch Out, You Better Not Click: Holiday Movie Threats - Security News - Trend Micro USA
An epic ride: A look back at the ever-changing information security industry - Print Article - SC Magazine
2014's Top Malware: Less Money, Mo' Problems
Staples data breach unlikely to dampen holiday shopping
Recon 2013 - Hardware Reverse Engineering Tools
Mobily's Solutions for Business Continuity Enables the Business Sector to Recover from Technical Disasters within Few Minutes - Zawya
Pillarbox: Combating Next-Generation Malware With Fast Forward-Secure Logging
7 Tips: Work Fitness Into The Workday - InformationWeek
Ensuring business continuity and building opportunities | Networks Asia
Permission. File Permissions. - Imgur
Top News, Latest headlines, Latest News, World News & U.S News -
Formal Analysis Of Security Procedures In Lte - A Feasibility Study Noomene Ben Henda; Karl Norrman
+The Backup of Destiny [Official Trailer] | Symantec - YouTube
Hackfest 2014: Renderman Aka Brad Haines Presented "They Are Doing What! With Air Traffic Control?"
The Problem With the Plan to Give Internet Access to the Whole World - The Atlantic
Your Friendly North Korean Network Observer by nknetobserver
Hackfest 2014: Jason Gillam Presented "Web Penetration Testing With Burp And Co2"
7 high-tech holiday scams
Watch Symantec's Vine "Symantec Mobility Solutions. Empower your employees. #GoEmpower"
Watch "Security firm Norton and clothing designer Betabrand join forces to create RFID-blocking clothes" Video at SCMagazine
Threats at Sea: A Security Evaluation of AIS - Security News - Trend Micro USA
Hackfest 2014: Ian Amit Presented "Red White And Blue. Making Sense Of Red Teaming For Good"
Did You Get the Security Memo? Symantec Endpoint Protection 11 EOSL | Symantec Connect
Boardroom or Baby? Why are there so few women in tech?
Here’s To Second Acts
Backdoors: What They Are and How to Defend Networks against Them - Security News - Trend Micro USA
Staples data breach bigger than expected | News - Home
Staples: 6-Month Breach, 1.16 Million Cards — Krebs on Security
Staples Inc. Data Breach: Company Says Over 1 Million Credit Cards Compromised
Weekend news review: December 15-19
NORKS: FBI's Sony Pictures' hacking allegations are 'groundless slander' • The Register
Cisco Security sur Twitter : "‘Tis the season to meet under the mistletoe! #HappyHolidays"
Hackfest 2014: Theo De Raadt Presented "Arc4random - Randomization For All Occasions"
US Homeland Security urges business, government cooperation on cyber security | SciTech | GMA News Online
Bank of Tokyo-Mitsubishi to set up disaster recovery centre
BBC - Future - Infographic: Ultimate limits of nature and humanity
Exploits, mobile and cloud storage threats will plague users in 2015 - SC Magazine
EMC Store Products - EMC Store
NE Universities Showcase Networking & Programming ... - J-Net Community
Law Number 1: Don’t Box Me In - J-Net Community
Comprehensive Analysis of the FBI Warnings and Sony Network Breach -
Choose, but Choose Wisely: What Skills Does a CISO Really Need? – Blog Post – RSA Conference
Cyber Defense | Is the Offense #Winning? | SANS Institute
Technology is still a distraction for drivers
The Changing Landscape of BYOD
Geoff Collins sur Twitter : "My happy place"
Top Malware Families Turn Point-of-Sale Into Point-of-Theft | CIO
On Emulation-Based Network Intrusion Detection Systems
7 Ways to Prevent Holiday Shopping Identity Theft |
Consumers Can Sue Target Corp Over Data Breach: Judge
IoE 101: How to Explain All Things Smart, Wearable, and IoE - Security News - Trend Micro USA
2 stores in metro Atlanta tied to Staples data breach
How to Identify Yourself, Digitally
Possible upcoming attempts to disable the Tor network | The Tor Blog
A Lightweight Formal Approach For Analyzing Security Of Web Protocols; Apurva Kumar
Making the Internet a utility—what’s the worst that could happen? | Ars Technica
UC Berkeley hack: Personal data on 1,600 people possibly compromised - LA Times
Cyber Security Risks During Online Holiday Shopping - Time Warner Cable News
What does the Future hold for Women in Tech
You Can't Be Me: Enabling Trusted Paths And User Sub-Origins In Web Browsers
Thoughts on Mobile Digital Parenting
Seekonk location among Staples stores exposed in data breach - The Sun Chronicle : Local News
Unsupervised Anomaly-Based Malware Detection Using Hardware Features
Sony facing 2 suits by ex-workers over data breach - WTOP
Crazy Tech CEO Quotes: 2014 Edition - InformationWeek
Zen and the Art of Cloud Database Security (Part 2) | SecurityWeek.Com
Staples confirms data breach at 2 Maine stores | Local News - WMTW Home
Protecting Web-Based Single Sign-On Protocols Against Relying Party Impersonation Attacks Through A Dedicated Bi-Directional Authenticated Secure Channel
In 2013 Ransomware Attacks Grew by 500% - Symantec ISTR - YouTube
Ubuntu Security Notice USN-2447-2 ≈ Packet Storm
Ubuntu Security Notice USN-2448-2 ≈ Packet Storm
Apple Security Advisory 2014-12-18-1 ≈ Packet Storm
Heads up! If Tor VANISHES over the weekend, this is why • The Register
Cyber security expert warns U.S. response to North Korean... |
JCE-Tech 4.0 Cross Site Scripting ≈ Packet Storm
JasPer 1.900.1 Double-Free / Heap Overflow ≈ Packet Storm
GQ File Manager 0.2.5 Cross Site Scripting / SQL Injection ≈ Packet Storm
Disrupting the Internet in 2015
Cyber Security Experts Doubt FBI Conclusion On Sony Hack
Gmail Google Drive and security features: Google updates email service | BGR
Cities Adopt Cloud-Based Approaches to Disaster Recovery
The Top 10, Top 10 Predictions for 2014
November 2014 Threats Report - Statistics Infographic
Dr. Cleaner: Trend Micro’s Free Utility App Will Optimize Your Mac’s Disk and Memory -
FBI — Update on Sony Investigation
Staples comes clean: Hackers swiped 1.16 MILLION bank cards • The Register
Cleveland OH Local News, Breaking News, Sports & Weather -
Firms Leaving Low-Hanging Fruit in Business Data Security ::Security & Resiliency:: Midsize Insider
Run Away If You Can: Persistent Jamming Attacks Against Channel Hopping Wi-Fi Devices In Dense Networks
Norse - IPViking Live
Schneier on Security: Friday Squid Blogging: Squid Beard
Microsoft Security Bulletin MS14-082 - Important
Microsoft Security Bulletin MS14-076 - Important
NAFCU: 1 Year After Target Data Breach Confirmed, Consumers Vulnerable as Ever | Business Wire
Staples: 1.16 Million Cards Hit by Data Breach - WSJ
Pew survey: Privacy vs. online convenience -
Roughly 1.16 million payment cards may have been affected in Staples breach - SC Magazine
Solo attacker likely responsible for phishing campaign, delivering Zeus variant - SC Magazine
Juniper Networks sur Twitter : "Did he miss anything? #HappyHolidays"
Sony Pictures hack is Hollywood's 'Snowden moment' say infosec bods • The Register
ICANN stresses critical internet systems not hacked • The Register
Staples: 1.16 million cards possibly vulnerable in data attack | ZDNet
Staples confirms data breach; up to 1.2M cards affected
Staples says data breach affected 1.16 million payment cards - MarketWatch
Vulnerability Note VU#561444 - Multiple broadband routers use vulnerable versions of Allegro RomPager
BYOD Brings Bah Humbug This Holiday Season | CIO
New ransomware named 'CryptoLocker' being spread via phishing emails - SC Magazine
PCI process measures may not correlate with 30-day mortality | Cardiology
This ETF Hacks Into Cyber-Security Spending - Bloomberg
The top trends in cyber security and data for 2014 - Birmingham Business Journal
Git client discloses critical security vulnerability - SC Magazine
RSA Adaptive Authentication - risk-based, fraud - EMC
Packet sur Twitter : "Racking @JuniperNetworks gear at @netaccesscorp for Packet's first production facility. Woot!"
Juniper Networks
Register – RSA Conference
Obama's Bold Sony Statement: Canceling The Interview Was a 'Mistake' | WIRED
Sony debacle shows how not to handle a hack | ZDNet
Obama promises U.S. response to Sony attack, says company made mistake - SC Magazine
Synthetic Data Generation And Defense In Depth Measurement Of Web Applications
Kaspersky Internet Security 15 для Mac
Trojan program based on ZeuS targets 150 banks, can hijack webcams | CSO Online
FBI Officially Blames North Korea in Sony Pictures Hack - The State of Security
FBI fingers Norks in Sony hack, Obama asks: HOW DO YOU SOLVE A PROBLEM LIKE KOREA? • The Register
The Gift that Keeps on Giving: 12 Ways Everyone Can Help IT This Holiday Season | Symantec Connect
The Hacker on the App Store on iTunes
State of the Union: Ecommerce Page Speed & Web Performance [Fall 2014]
Pizza Hut Makeover, Mass Customization and Cloud A... - J-Net Community
U.S. Homeland Security urges business, government cooperation on cyber security| Reuters
FBI: North Korea to Blame for Sony Hack — Krebs on Security
Questions remain after FBI charges North Korea with attack on Sony Pictures | CSO Online
Defining 'Software-Defined' Environments -- Virtualization Review
Impact of Linux bug 'grinch' spans servers, workstations, Android devices and more - SC Magazine
Schneier on Security: Lessons from the Sony Hack
Judge gives customers go-ahead to sue Target over data breach | US news |
40,000 federal employees impacted by contractor breach - SC Magazine
Congress Passes The Federal Information Security Modernization Act of 2014: Bringing Federal Agency Information Security into the New Millennium | Davis Wright Tremaine LLP - JDSupra
Barrett Brown sentencing delayed until January - SC Magazine
Spearfishing campaign compromises ICANN systems - SC Magazine
FBI Believes North Korea Is Behind The Sony Attack ≈ Packet Storm
Survey: Consumers in emerging markets use mobile Internet for personal advancement, education - FierceMobileGovernment
FBI Says North Korea Was Behind Sony Hack
ZeuS variant strikes 150 banks worldwide | ZDNet
6 IT Career Resolutions - InformationWeek
Sony investigation reveals North Korea behind cyber attack, FBI says - SC Magazine
Comprehensive Analysis of the “Destructive” Malware Behind FBI Warnings and Sony Hack -
Using 8 Backdoor Techniques, Attackers Steal Company Data - Security News - Trend Micro USA
Boston Children’s Hospital To Pay $40,000 Fine Over Data Breach « CBS Boston
Hack Attacks: Are Cyber Breaches the New Normal?: Video - Bloomberg
Why Is Csp Failing? Trends And Challenges In Csp Adoption
The Real Cost of Slow Time vs Downtime
How your data will be at risk in 2015
Netbackup Versus EMC
Carl Leonard - Innovating Security in the Cloud - redskyvision
Cyber security: How to protect your data and what to do if your identity is compromised | Take Two | 89.3 KPCC
USBdriveby: Compromising computers with a $20 microcontroller
How to download Kaspersky Internet Security 2015
Government hacks and security breaches skyrocket -
This Little USB Necklace Hacks Your Computer In No Time Flat | TechCrunch
Banking on automation and devops - J-Net Community
Phishing quiz: Can you spot a scam when you see one? Don't be so sure - CBS News
Virtualization Security - Server Virtualization - Deep Security - Trend Micro USA
U Force - Broderbund - Nes - Famicom - TV Game Commercial - Retro Gaming - 1988 - YouTube
Sony's Action Called Dangerous Precedent - DataBreachToday
Spotlight: Nearly half surveyed say SDN may be too immature to be secure - FierceEnterpriseCommunications
Retailers Look At The Mobile Web Opportunity - Business Insider
Bugtraq: TWiki Security Advisory - XSS Vulnerability - CVE-2014-9325
Bugtraq: TWiki Security Advisory - XSS Vulnerability - CVE-2014-9367
Why North Korea's attack should leave every company scared stiff - Dec. 19, 2014
Kaspersky Total Security Multi-Device
Founding of state cyber-security body worries digital rights activists - Politics - Egypt - Ahram Online
What we know about North Korea's cyberarmy | CSO Online
Why Killing the Password Is the Next Billion-Dollar Industry |
Cloudy with a Chance of Scalable Malware Protection
2014 Industry Innovators: Access Control - SC Magazine
Linux GRINCH Vuln Does Not Sound Too Horrific ≈ Packet Storm
Webcam-Snooping Spawn Of ZeuS Hits 150 Banks Worldwide ≈ Packet Storm
Microsoft Takes On Tech Support Scammers ≈ Packet Storm
Vulnerability Note VU#1680209 - AppsGeyser generates Android applications that fail to properly validate SSL certificates
New Zeus variant targets users of 150 banks
Bugtraq: SEC Consult SA-20141219-0 :: XSS & Memory Disclosure vulnerabilities in NetIQ eDirectory NDS iMonitor
Critical vulnerability in Git clients puts developers at risk | CSO Online
Microsoft files suit against alleged tech support scammers | CSO Online
Evaluating The Effectiveness Of Current Anti-Rop Defenses
INFOGRAPHIC▶ Enable the Agile Data Center
Exponential-e improves disaster recovery service with Zerto - Telecompaper
Sikeston Standard Democrat: Local News: Extension approved for county's last disaster recovery project (12/19/14)
RSA Chairman on Security in 2014: 'Best of Times, Worst of Times'
Today's Challenge: Database Security in the Cloud – Blog Post – RSA Conference
Critical flaw on over 12M routers allows device hijacking, network compromise
Critical Git Vulnerability Allows for Remote Code Execution
Federal Judge Allows Lawsuits Over Target Data Breach « CBS Minnesota
Zero Day Weekly: ICANN hacked, critical GitHub vuln, too much Sony drama | ZDNet
Hackers Can Read Your Private SMS and Listen to Phone Calls - Hacker News
Major Chinese smartphone manufacturer installed backdoor on up to 10 million devices | CSO Online
Router Vulnerability Puts 12 Million Home and Business Routers at Risk - Hacker News
Schneier on Security: SS7 Vulnerabilities
Sony & North Korea: A Call to Cyber Arms or Better Defense? - The State of Security
Critical Git Client vulnerability Allows Malicious Remote Code Execution - Hacker News
Successful Tech Requires An Old-Fashioned Skill: Organizing People : All Tech Considered : NPR