Twitter exec Anthony Noto reveals secret company plans in DM goof | Naked Security
Google to TERMINATE Chrome support of old style plug-ins | Computerworld
Data breach developments in California (part 2) - Lexology
Zero-day hacking group resorts into UNICORN SMUT-SLINGING • The Register
GCHQ/NSA submarine cables spy operations: New Edward Snowden leak | BGR
The Stack
Business continuity briefs
Virus Bulletin - Well, That Escalated Quickly. From Penny-Stealing Malware To Multi-Million-Dollar Heists
Farmers, technology providers: Agreement on big data
‘Tis The Season … For Data Breaches And Data Analytics - Law360
Adobe Flash Player 14 Latest Download Allows Clear Viewing from Slant Angles
Sony Pictures breached – or was it? | Naked Security
Adobe urges users to implement critical out-of-band Flash Player update
Tricky Regin malware poses biggest threat outside US - CNE
Infoblox's (BLOX) CEO Robert Thomas on Q1 2015 Results - Earnings Call Transcript | Seeking Alpha
Antivirus Offers Steady Growth Opportunities - CRN India
Bugtraq: [ MDVSA-2014:228 ] phpmyadmin
South African organisations urged to meet PCI DSS v3.0 deadline as EMV penetration rate rises - World News Report
'Regin' stealth malware has been spying on governments for years | Alaska Dispatch
Falkirk tutor explains hacking risk - Falkirk Herald
Information Security News: Hackers suggest they had physical access during attack on Sony Pictures
Information Security News: Home Depot spent $43M on data breach in one quarter alone
The Impact of Collaboration in Cyber Risk Insurance
Palo Alto Land and Expand Strategy for Network Security Pays Off
Bitdefender BOX Offers Protection For All Your Devices
Let's Encrypt initiative to provide free encryption certificates - TechRepublic
IRISSCon 2014 Recap - OpenDNS Security Labs
Home Depot hit with “at least 44 civil lawsuits” due to data breach | Ars Technica
Journalist phone records given to UK police in data breach, AsiaOne Digital News
Adobe Releases Emergency Flash Player Update to Address Critical Vulnerability
Eric King sur Twitter : "Wow. Full list of undersea fibre optic cables GCHQ is accessing has been published."
Virus Bulletin - Hiding The Network Behind The Network. Botnet Proxy Business Model
Stack the Odds In Your Favor: Two Gartner IAM Conference Sessions Explain Why You Shouldn't Gamble With Access Risk - BWWGeeksWorld | Latest Philippine News for Filipinos
Proofpoint Gaining Traction In Cyber Security Sector - Proofpoint, Inc. (NASDAQ:PFPT) | Seeking Alpha
England has sufficient brownfield land for at least one million new homes, says CPRE report
IoTr, Raj Samani’s Personality Defect And The Crappy Side Of Human Development
Cyber security poised to be China's next social campaign|Technology|Business|
AV Is Not Enough for the Enterprise | Symantec Connect
Most people don’t feel safe when shopping online
Regin malware: Victims, implications and defence measures - IT Analysis from
iTWire - Cloud rolling in: Sophos's 'leapfrog' move
The Internet of Things (IoT) will fail if security has no context - SC Magazine
Operation Huyao: Unwrapping a New Phishing Technique before the Holidays - Security News - Trend Micro USA
U of C student’s threatening Facebook post not a hack, university says | WGN-TV
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds... • The Register
The rise of account takeovers
AVG Antivirus latest version now brings new features – adds additional security layers - The REM
US DOJ fines StealthGenie for selling Android, iOS spyware, demands source code
JPMorgan Data Breach Shows Need for Global Crackdown, ASIC Says - Businessweek
Banks, retailers to work together to stop data breaches | Project Economy - WBAL Home
Observer-Reporter | Data breaches put holiday shoppers at higher risk for fraud
New Malware Named 'Regin' Affects Certain Regions
Smart Cars Vulnerable To Hacker Attacks
10 Ways Security Gurus Give Thanks
If School Leaders Don't Get It, It's Not Going to Happen | Eric Sheninger
The failure of the antivirus industry - Security - Blogs -
Privacy bods Detekt FinFisher dressed as bookmark manager • The Register
SaaS deployments are now mission critical
Virus Bulletin - Methods Of Malware Persistence On Mac Os X
Some advisers moving to mobile payment systems to bill clients
Bugtraq: [security bulletin] HPSBUX03166 SSRT101489 rev.1 - HP-UX running PAM libpam_updbe, Remote Authentication Bypass
Bugtraq: [SECURITY] [DSA 3076-1] wireshark security update
Fitch Affirms HSBC and its UK and HK subsidiaries at 'AA-'; Outlook Stable| Reuters
Masque Attack: Why Your iPhone is Probably Safe - The Mac Observer
Breach Detection Versus Change Detection - The State of Security
7 great MOOCs for techies -- all free, starting soon! | CIO
Tim Shanahan Appointed as New Senior Vice President Sales for InteliSecure - MarketWatch
Cybercrime expert says hacker is just looking to gain publicity | Hack attack |
It’s Security Stupid! 5 Tips on How to Be More Vigilant About Online Security
Bugtraq: [security bulletin] HPSBGN03201 rev.1 - HP Asset Manager running SSLv3, Remote Disclosure of Information
Bugtraq: [security bulletin] HPSBGN03203 rev.1 - HP CMS: UCMDB Browser running OpenSSL, Remote Disclosure of Information
Home Depot Data Breach Sparks Dozens of Lawsuits | InvestorPlace
OS X Yosemite: How to Reset Your Administrator Password - The Mac Observer
University Of Chicago Says Racially Motivated Facebook Threat Was A Hoax
Sony Pictures network reportedly hit by hackers | SciTech | GMA News Online
Sony Pictures hackers reportedly had help from insiders
Palo Alto Networks Conference Call Highlights - (PANW) | Benzinga
Home Depot to face 44 data breach-related lawsuits in U.S, Canada - Proactiveinvestors (NA)
U of C: Student Admits to Facebook Hacking Stunt | NBC Chicago
Why are we still using Social Security numbers to identify ourselves? - Nov. 11, 2014
North Carolina continues to investigate Home Depot data breach - Triangle Business Journal
Google Launches Tool To Help You Stay "A Step Ahead" Of Hackers | Fast Company | Business + Innovation
Home Depot facing dozens of lawsuits after data breach - CBS News
Cybersecurity: Automakers looking to drive away car hackers - National News
Is the next Cisco out there? - MarketWatch
Websense - Will old source code open doors to new... | Facebook
CMPD Increases Patrols For Thanksgiving Day Shopping - Time Warner Cable News
JPMorgan Data Breach Shows Need for Global Crackdown, ASIC Says - Bloomberg
Cyber security to be promoted in China|Technology|Business|
Pew poll: U.S. Internet users have limited knowledge of Net Neutrality and privacy policy | PCWorld
NSA PRISM Violates Rights, Fails to Protect, Say Readers - Network Computing
Regin day 2: Sophisticated malware ID’d in NSA/GCHQ hack — Sony Pictures shuts down computers in wake of company hack - POLITICO Morning Cybersecurity -
Regulators Worry Hackers Have Learned to Hijack Cars
President Obama honored Wauwatosa's superintendent for technology integration
Wake Co. Launching 'Bring Your Own Device' Program in 13 Schools - Time Warner Cable News
Here’s everything we know about PRISM to date - The Washington Post
WTVC NewsChannel 9 :: News - Top Stories - How to Avoid Identity Theft
Ad exec: Online ad industry complicit in NSA PRISM datamining | ZDNet
The N.S.A.’s Prism Remains Opaque - The New Yorker
Malware Regin spied most on Russians, Saudis: Symantec
Home Depot spent $43 million on data breach in just one quarter | PCWorld
Sony Pictures hackers may have gotten inside help - The Next Web
Security seals clobbered ahead of Black Friday bonanza • The Register
Virus Bulletin - Exposing Android White Collar Criminals
Data Breaches Pose Risks Especially for Online Shoppers | Virtual-Strategy Magazine
iTWire - The Box will protect everything
Adobe tries to fix Flash vulnerability (again) | Computerworld
Home Depot spent $43M on data breach in one quarter alone | Computerworld
GOP hackers bring Sony Pictures to its knees with ransom demand- The Inquirer
Sony Pictures Computer System Remains in Hackers' Grip - TheWrap
DroidJack RAT: A tale of how budding entrepreneurism can turn to cybercrime | Symantec Connect
Cybersecurity for the holidays: A non-stop job
Agreement on Big Data privacy and security may accelerate technology adoption
The Durango Herald 11/24/2014 | Car computer hackers, begone!
S&T; CIO to keynote Bring-Your-Own-Device summit - News - The Rolla Daily News - Rolla, MO - Rolla, MO
United States farm data agreement raises questions among Australian farmers about privacy and security - Rural News - ABC Rural (Australian Broadcasting Corporation)
Keeping Your Cell Phone Safe From Hackers
Hackers take down Sony Pictures' computer system - CBS News
Top Retirement Strategies For Government Employees
Spy Malware Deployed Against Russia by Unknown Nation | The St. Petersburg Times | The leading English-language newspaper in St. Petersburg
Adobe tries again to fix Flash vulnerability -
What we know about 'Regin,' the powerful malware that could be the work of NSA
As Hackers Hit Customers, Retailers Keep Quiet About Security : All Tech Considered : NPR
APT3 Group Using Windows OLE Vulnerability: FireEye | SecurityWeek.Com
Backdoors: What They Are and How to Defend Networks against Them - Security News - Trend Micro USA
How to wipe your phone or tablet before you sell it - CNE
Home Depot data breach lawsuits rise to 44 - Dallas Business Journal
Home Depot faces dozens of lawsuits related to data breach - LA Times
Bloomberg View Op-ed: U.S. has gone on the cyberwar offensive | The Salt Lake Tribune
Challenge 12: Decrypting SSL Traffic
Adobe tries again to fix Flash vulnerability | PCWorld
Phone data of 1,700 Murdoch staff probed: Vodafone handed over data to police despite request for details of only one reporter who had been arrested | Daily Mail Online
New data-breach research lab at UAlbany - WRGB CBS6 - Top Stories
Symantec Uncovers 'Regin,' Advanced Hacking Spyware - Computing on CIO Today
Automakers trying to drive away car computer hackers - SFGate
New CointVault Ransomware Offers Victims A ‘Free Decrypt’
The branded bug: Meet the people who name vulnerabilities | ZDNet
RSA Conference sur Twitter : "Who was the biggest info security turkey this year? #infosec"
Hacking Group Threatens Extortion of Sony Pictures for Inequlity
Regin malware targeting Russia detected on the Internet | Russia Beyond The Headlines
Virus Bulletin - Dnssec - How Far Have We Come?
Home Depot data breach lawsuits rise to 44
Update: Teen at centre of hacking confrontations set for trial June 16 (with video)
Home Depot data breach sparks more than 40 lawsuits - San Jose Mercury News
Sony Pictures data breach may have been an inside job: Report
Regin Is ‘Groundbreaking’ Malware Used by UK Spooks | Motherboard
Watch "Europe delays Google antitrust investigation" Video at SCMagazine
Google launches security dashboard and wizard - SC Magazine
Staying Safe from Online Threats This Thanksgiving - Security News - Trend Micro USA
DDoS attacks grew in size, threats became more complex, Q3 reports say - SC Magazine
Watch "Dark web makes up 96 percent of the internet" Video at SCMagazine
Home Depot faces 44 lawsuits post-breach - SC Magazine
Second time's a charm: Adobe has another go at killing Flash hijack bug • The Register
Allan Massie: Taking advantage of terrorism fear - The Scotsman
Airport Nightmares: Fighting the Thick Thanksgiving Crowds Every Day - MainStreet
Hacker claiming ties to Anonymous targets Toronto, Ottawa Police with DDoS attack |
History, Travel, Arts, Science, People, Places | Smithsonian
Data Storage Solutions: How to Put a Lock on Your Cloud
Manufacturers Must Prepare for the Inevitable Data Breach | Technology content from IndustryWeek
Man gets 18 months in prison for accessing Subway POS devices, loading up gift cards - SC Magazine
Time To Turn The Tables On Attackers
The Hyper-Converged IT Professional - Network Computing
Substantial Variation in Post-PCI Bleeding Observed Across US Hospitals - Journal News - TCTMD
Fear of car hacking drives industry | The Journal Gazette
Mobility: Enabling productivity efficiencies and changing how and where we work. | IT World Canada Sponsor Content
Regin Malware: This Time It's Not Russia or China - Network Security on Top Tech News
Automakers trying to drive away car computer hackers - San Francisco Chronicle
Don’t Throw The Data Out With The Bathwater Why BYOD MDM Security Policies Need A Revamp
Google for Work Puts Security in the Hands of Employees
Google Introduces New Security Dashboard and Wizard for Google Apps Users
Google Apps Users Gain More Control of Account Security
US, UK can access majority of Internet traffic | TheHill
How mature is your mobility? | Information Age
Sony Pictures computer system down after reported hack| Reuters
How to Win Israeli Friends, Chuck Hagel Edition
Why Competitors Should Collaborate More on Cyber Security Issues
How the World's First Computer Was Rescued From the Scrap Heap | WIRED
DroidJack RAT hits hacker forums, comes from legitimate app developers - SC Magazine
Tech Digest Powered by Dark Reading - 057TD_digital_final
Activity Info
How Vetting Mobile Apps Works for App Stores and Its Users - Security News - Trend Micro USA
Cisco Unveils Small Biz Communications Platform
Attorney General: How to shop online safely
Subway Franchisee Sentenced For Hacking Registers, Stealing $40K In Gift Cards – Consumerist
Enterprise SaaS Goes Mission Critical: Gartner - Datamation
Healthcare Data Breach Drama Continues for UMass Memorial |
Hackers suggest they had physical access during attack on Sony Pictures | CSO Online
WordPress: Bug Could Enable Compromise - BankInfoSecurity
Regin: Top-tier espionage tool enables stealthy surveillance
CA Data Classification product review | SC Magazine
Download a Free Trial of Log & Event Manager from SolarWinds
Before Masque and WireLurker: iOS Threats That Cracked the Walled Garden - Security News - Trend Micro USA
Virus Bulletin - Back In Blackenergy: 2014 Targeted Attacks In The Ukraine And Poland
The Complete Guide to Hacking In-Flight Wi-Fi | Map Happy
Sony Pictures computer system down after reported hack - Technology & Science - CBC News
On-ground security poor, say experts
Three trends driving IT sales at Tech Data for Christmas and beyond - Tampa Bay Business Journal
Sony Pictures hacked, data held for ransom - CNE
Home Depot data breach lawsuits rise to 44 - Atlanta Business Chronicle
Bugtraq: [security bulletin] HPSBST03148 rev.1 - HP StoreOnce Gen 2 Backup Systems running Bash Shell, Remote Code Execution
Bugtraq: Slider Revolution/Showbiz Pro shell upload exploit
IT Pros Prefer Open Source for Continuity, Control
POS malware: Potent threat remains for retailers | Symantec Connect
5 online scams to watch out for this Black Friday and Cyber Monday | Naked Security
Adobe urges users to patch critical Flash Player flaw - Security - News -
'Elegant' Regin Malware Linked to Brits, NSA | Malware | TechNewsWorld
University at Albany Business School to host cyber security and data breach lab - Albany Business Review
Sony attacked, investigating 'an IT matter,' according to reports - SC Magazine
Ten Shopping Tips For Cyber Monday
Bugtraq: [security bulletin] HPSBMU03214 rev.1 - HP Systinet running SSLv3, Remote Disclosure of Information
Bring Your Own Disruption: Why NZ security execs must be stronger - Computerworld New Zealand
A Flock of Tasty Sources on How to Start Learning High Scalability - High Scalability -
lambdash: AWS Lambda Shell Hack -
ITelagen Provides Game-Changing Disaster Recovery Service for MU2 Measures
The GRC Metrics Survey Report - OCEG
The Future of Cable Business Services - Agenda | Online Registration by Cvent
The Brazilian Underground: A Market for Cybercriminal Wannabes? - Security News - Trend Micro USA
Bitdefender security appliance for home networks seeks to replace end-point antivirus - Techworld
'Expendables 3' Hacking Case: Two Suspects Arrested in UK - TheWrap
Bitdefender security appliance for home networks seeks to replace end-point antivirus - CSO | The Resource for Data Security Executives
Beth Israel Agrees To Pay $100K To Settle 2012 Data Breach Case - iHealthBeat
Adobe Pushes Critical Flash Patch — Krebs on Security
What exactly did security software companies know of Regin, the latest malware disclosed by Symantec this weekend? - 25 Nov 2014 - Computing Analysis
Security predictions for 2015: Shining some light on the invisible threats | News | TechRadar
Guarding against terrorism, hackers and disease is worth £7.9bn to the UK economy a year - Telegraph
Privacy Tuesday - November 2014 #2 | Mintz Levin - Privacy & Security Matters - JDSupra
Suit Alleges ADT Wireless Security Systems ‘Easily Hacked’ - Spotlight Article from CE Pro
Symantec Uncovers 'Regin,' Advanced Hacking Spyware - Network Security on Top Tech News
Bitdefender security appliance for home networks seeks to replace end-point antivirus | Network World
New Snowden docs: GCHQ’s ties to telco gave spies global surveillance reach | Ars Technica
Hackers hold Sony Pictures to ransom by taking over its whole computer system - News - Gadgets and Tech - The Independent
Businesses warned over telephone system hackers - RTÉ News
Newly Revealed Cyber Espionage Attack 'More Complex' Than Stuxnet, Flame
MicroBilt announces commitment to PCI DSS 3.0 | Business - Press Releases | | The Providence Journal
Easily exploitable bug in Wordpress | CSO Online
Sony Pictures Computer Network Hacked | News & Opinion |
Unofficial Starbucks Instagram account aims to scam followers - SC Magazine
Cyber Experts Offer Holiday Shopping Security Tips « CBS Chicago
UAlbany to host cyber data breach lab - The Buzz: Business news
Juniper Networks sur Twitter : "Announcing our December 5th #JuniperTrivia! It’s time to show-off your Service Provider skillset."
Can't wait for Docker on Windows? Try Spoon | InfoWorld
NSA: Foreign hackers could crash utility systems | Utility Dive
Bitdefender Unveils IoT Security Appliance | News & Opinion |
Bitdefender security appliance for home networks seeks to replace end-point antivirus | CIO
Sony Pictures hackers say they want 'equality,' worked with staff to break in | The Verge
Bitdefender's BOX hardware protects your entire home network, not just your PC | PCWorld
Commercial Real Estate News (CRE) & Property Resource -
Malwarebytes forum hacked, users forced to change passwords - SC Magazine
Virus Bulletin - The Evolution Of Webinjects
Microsoft: Windows Live hacking rumors are nothing else but a hoax
Local news from Rock Hill, SC | The Herald
Why SaaS deployments are now "mission critical" - Reseller News
Unidentified country likely behind spying software | Business & Technology | The Seattle Times
'The new Stuxnet' - is GCHQ linked to Regin hacking campaign? | Geoff White on Technology
New Line of Cyberattacks: Automakers Aim to Thwart Car Hackers |
Palo Alto Networks Strong Q1 Results Bring Target Price Boost PANW -
Data Breach - Executive Watch Article -
Flash Player update beefs up older fix | ZDNet
Adobe updates Flash Player, further addresses old vulnerability - SC Magazine
Watch Symantec's Vine "Empower your team with Symantec Mobility Solutions. #GoEmpower"
Watch "'Regin' malware discovered" Video at SCMagazine
Your Actions Matter: Keeping Your Company Safe - YouTube
Can the Social Security Trust Fund Survive?
6 Years After Hurricane Ike, Texas Coast Remains Vulnerable
Second serious bug in three months puts internet in Shellshock | Briefings | The Lawyer
Ranked! Here's the safest minivan on the road, and the 4 that fall short | PropertyCasualty360
Free anti-virus, malware and security software for your PC or Mac | One Page |
Managed Threat Defense - YouTube
Life Lessons: Avoid holiday hacking | Life Lessons - Home
M/A-COM Thrives In A Multi-OS World With MobileIron -- MOUNTAIN VIEW, Calif., Nov. 25, 2014 /PRNewswire/ --
Pulse Secure to Speak at Gartner’s Data Center, Infrastructure & Operations Management Conference | Virtual-Strategy Magazine
Monster snow: How Buffalo-area businesses kept things going in the storm | CSO Online - UAlbany selected to host cyber security lab
Virtual money and user's identity
MEF GEN14: NFV Needs FOCACA - J-Net Community
EMC Corporation
Mandriva Linux Security Advisory 2014-227 ≈ Packet Storm
Ubuntu Security Notice USN-2418-1 ≈ Packet Storm
Ubuntu Security Notice USN-2416-1 ≈ Packet Storm
Regin: A Malicious Platform Capable Of Spying on GSM Networks
Peer2Peer Facilitators – RSA Conference
Free Antivirus - Features and Why It’s a Viable Option — Ordoh
Home Depot Faces Data Breach Lawsuits « CBS Dallas / Fort Worth
Wristband Heads Off Password Headaches | Cybersecurity | TechNewsWorld
Greg Smith to keynote Bring-Your-Own-Device summit
Holiday checklist: Keeping information safe from data breaches | Northland's NewsCenter: News, Weather, Sports | NBC, CBS, MyNetworkTV, and The CW for Duluth MN / Superior WI | Local News
Data Management Vs. Data Loss Prevention: Vive La Difference!
Santa tool tells naughty files from nice ones - Computer Business Review
Why Analysts Keep Chasing Palo Alto Higher After Earnings - Palo Alto Networks (NYSE:PANW) - 24/7 Wall St.
Kaspersky Lab :: Barclays FAQ
Sony is the victim of a breach yet again | CSO Online
Ubuntu Security Notice USN-2415-1 ≈ Packet Storm
Mandriva Linux Security Advisory 2014-225 ≈ Packet Storm
Mandriva Linux Security Advisory 2014-226 ≈ Packet Storm
Bugtraq: [ MDVSA-2014:227 ] ffmpeg
Briefs: Ford probe; Mazda recall; Home Depot data breach lawsuits -
Best Free Antivirus Panda Tops AV Protection Results
Local | Fort Mill Times
Google's elves work on Santa to rein(deer) in grinchware • The Register
Beth Israel Deaconess to pay $100K in fines for 2012 data breach - FierceHealthI
Pulse Secure to Speak at Gartner’s Data Center, Infrastructure & Operations Management Conference | Business Wire
Popular security suites open to attack | ZDNet
Regin Malware Is The Work Of Western Intelligence Agencies ≈ Packet Storm
3 Internet of Things Security Nuances You May Not Have Considered
Hacker Lexicon: What Is End-to-End Encryption? | WIRED
ITelagen Provides Game-Changing Disaster Recovery Service for MU2 Measures
Regin: A Sophisticated Surveillance Malware On Par With Stuxnet
Sony Pictures Has Been Hacked ≈ Packet Storm
How Secure Is Docker? If You're Not Running Version 1.3.2, Not Very ≈ Packet Storm
Hacker Lexicon: What Is End-To-End Encryption? ≈ Packet Storm
A Guide to Avoiding Cyber Monday Scams on Mobile - Security News - Trend Micro USA
In B2B, Windows Mobile Taking On New Life |
Regin spy malware was used in Belgacom, EU government hacks
Task 5: Social Engineering
Brucon 0x06 - Stealing A Mobile Using Wormholes - Markus Vervier
Port of Los Angeles nets award for standing guard against hackers
What Healthcare Can Learn From CHS Data Breach - InformationWeek
Information Security Professionals Focus on Firefighting Rather Than Strategic Security Priorities, Research Shows
Google's Devices and Activity Dashboard — A New Account Security Wizard
Schneier on Security: Regin: Another Military-Grade Malware
New Benchmark Report: Proving NetBackup is the King of Scale – Part Two | Symantec
Choose, but Choose Wisely: What Skills Does a CISO Really Need? – Blog Post – RSA Conference
Adobe Flash Player 13 Gets New Emergency Updates
Credit Suisse Raises Palo Alto Networks Price Target - (PANW) | Benzinga
How to prevent wearable devices from ruining your information security - FierceCIO
Thousands Protest Nationwide After Ferguson Grand Jury Decision
Could Digital Currency Make Our Money More Secure? - Forbes
Retailer Home Depot faces dozens of lawsuits over data breach that hit debit and credit cards - 11/25/2014 7:58:56 AM | Newser
Home Depot faces dozens of lawsuits over data breach | CTV News
Research and Markets: Global Enterprise Firewall Market by Types (Next Generation, Application, Conventional), Appliances & Professional Services Forecasts and Opportunities 2014-2019 | Business Wire
Old Adobe Flash Player Versions Blocked on Mac OS X Due to Security Concerns | Master Herald
Toronto police website targeted by hackers |
Microsoft releases 'new' build 9879 for all Windows 10 Technical Preview machines | InfoWorld
Canada government sites taken over by hackers - Washington Times
‘Going Postal’ over data breach response: union files failure-to-bargain charge with NLRB against USPS - Lexology
Tiffany, Campbell Soup, Palo Alto Networks - MarketWatch
Top Free Antivirus Software – Some of the Industry Leaders
Which Antivirus Products Are Best at Protecting Themselves?
Home Depot facing at least 44 civil suits in data breach
Home Depot facing lawsuits in Canada, U.S. over data breach - The Globe and Mail
Home Depot faces dozens of breach-related lawsuits - San Francisco Chronicle
Morningstar – Independent Investment Research
The World's First Computer Has Finally Been Resurrected | WIRED
Sophos Techknow – Dealing with Ransomware [PODCAST] | Naked Security
Security Conferences - Security Events - Trend Micro USA - Trend Micro USA
KREA Enhances Network Capabilities with Clavister - BWWGeeksWorld
A year after Target data breach, aftershocks finally end
BBC News - Sony Pictures computer system hacked in online attack
Social Security Q&A: How Can I Know if My Retirement or Ex-Spouse's Benefit Is Larger? - Forbes
Android 5.0 Lollipop: 10 new features you won't find on KitKat - Tech2
New Docker version solves critical bugs, update immediately
Google reaches settlement with troll victim | Naked Security
Bugtraq: [ MDVSA-2014:225 ] ruby
Bugtraq: [ MDVSA-2014:226 ] imagemagick
PI fined for unlawfully obtaining garda data - RTÉ News
Counter-Strike hacker-spotting guide
Survey Suggests Half of Americans Won't Shop at Stores Experiencing Data Breaches
Home Depot facing at least 44 civil suits in data breach - MarketWatch
A3, Advanced Adaptive Applications: The end of server vulnerability?
Sony Pictures 'paralysed' by data breach |
Sony Pictures Hacked and Blackmailed : Tech : Chinatopix
Sony Pictures hacked, blackmailed
Challenge 6: Digest Authentication Reloaded
Craigslist back up and running after DNS hijack | Naked Security
The UK's leading source for Hardware and Games reviews |
Brucon 0x06 - Data Transforming Your Sewage Into Signatures - Adam Schoeman
Fire Phone, Galaxy S5, iPad Mini 3, and more: 15 major mobile flops of 2014 | InfoWorld
Local & North Carolina state news from Raleigh, NC |
Automakers aim to drive away car computer hackers - San Francisco Chronicle
Hack at Sony Pictures shuts computer system - LA Times
Anna Kendrick on Feminism, #GamerGate, and the Celebrity Hacking Attack - The Daily Beast
Today's CIO @ The C Suite - Retailers Urged to Shore Up Cyber Defences Ahead of Black Friday Spree
Plan B survey looks at IT disaster recovery trends
Regin: Sophisticated Malware, But Not Without Precedent
New Linux malware plays ping pong with its C&C server — Dr.Web - innovation anti-virus security technologies. Comprehensive protection from Internet threats.
UK government to refresh 10 Steps To Cyber Security - SC Magazine UK
Global Cyber Security Market Trends, U.S. BFSI Cybersecurity 2020 Forecasts in New Research... -- DALLAS, November 25, 2014 /PRNewswire/ --
Microsoft: Competing AV vendors need to remember who the bad guys are -
SaaS deployments are now mission critical - Gartner | Information Age
Cisco perkenalkan Threat-Focused Next-Generation Firewall - ANTARA News
Attacks KO Toronto police, Ottawa police websites | Toronto Star
Beth Israel Deaconess Medical Center says IT security bolstered after recently-fined data breach - Boston Business Journal
After Ferguson threat, Anonymous removes the KKK’s hoods. Effective? (+video) -
Sony Corp. Computers Said Hacked in Possible Blackmail - Bloomberg
Mobile Data Protection Market Worth $3.54 Billion by 2019 | News | Hospitality Magazine (HT)
Automakers aim to drive away car hackers by fortifying cyber defense | TribLIVE
Kazakhstan's information security is feeble: expert. Politics.
Secret Malware in European Union Attack Linked to U.S. and British Intelligence - The Intercept
Firewalls are the cornerstone of security - IT-Online | IT-Online
Automakers aim to drive away car computer hackers - Business - The Boston Globe
Bugtraq: [oCERT 2014-008] libFLAC multiple issues
The context-aware security lifecycle and the cloud
Credit Union investigator fined €5k over data breach -
KKK threatened with public 'unhooding' after Ferguson threats |
Sony Pictures Hacked, All Computers Reportedly Unusable
Caution urged after PI data breaches - RTÉ News
Sony Pictures in IT lock-down after alleged hacker hosing • The Register
KREA Enhances Network Capabilities with Clavister | Virtual-Strategy Magazine
UK cyber-security expert warns self-driving cars could be hacked
What is Assembly Language?
Why you should protect your wireless connection
Brucon 0x06 - Thunderbolts And Lightning - Snare
Leaked screenshots show next Windows kernel to be a perfect 10 • The Register
How to Bring a Pumpkin Pie on the Plane | Map Happy
Sony Pictures Entertainment hacked
How I Became A CISO: Mark Potter, Danya International
PSA Security Announces Agenda for Cybersecurity Congress
Android Lollipop: Get All the Sweet Without the Sour -- What Enterprises Need to Know - Innovation Insights
Who's been writing in my apps? Googlilocks builds new apps-tracker • The Register
Former SC judge Prasad to succeed Katju as PCI chief - The Times of India
'Hacked by #GOP': staff at Sony Pictures resort to paper and pen after hack shuts computer system
IT news, reviews and analysis for UK IT professionals -
KREA Enhances Network Capabilities with Clavister | Business Wire
ISO 27001: An overview of ISMS implementation process Kenya: Cyberoam Tailors Security Appliance for Small Offices
As computer hackers dissect cars, automakers react | News - Home
Automakers aim to drive car computer hackers away
Hacking RFID payment cards made possible with Android app
Sony Pictures Targeted by Apparent Hack Attack to Corporate Systems | Variety
Microsoft makes massive jump with Windows 10, switches to kernel number 10 | Latest Tech News, Video & Photo Reviews at BGR India
Biz Break: Workday, Palo Alto Networks slide despite strong earnings reports - San Jose Mercury News
Craigslist pushes punters to YouTube, hacker site • The Register
Brucon 0x06 - Security Model Bedfellows - Noel Dunne &Amp; Paco Hope
The rise of big data in ASEAN manufacturing | Enterprise Innovation
Palo Alto Networks' [PANW] CEO Mark McLaughlin on Q1 2015 Earnings Results - Earnings Call Transcript | Seeking Alpha
Lessons Learned A Year After Massive Retail Data Breach | Politics - WCVB Home
Privacy Monday – November 24, 2014 | The National Law Review
Fort Bragg paratroopers return from Afghanistan as national security landscape changes |
Home Depot Vs. Lowe's: Who Looks Better After Earnings? | Seeking Alpha
Costs related to its data breach may include liabilities to payment card networks for reimbursements of credit card fraud and card reissuance costs
Westcon enhances NZ security portfolio through Palo Alto distie deal - Reseller News
The Ten Most Wanted Hackers by The FBI – No. 2
Bugtraq: Docker 1.3.2 - Security Advisory [24 Nov 2014]
Vigilance is key to thwart ID theft - News - - Middletown, NY
Hacker group taunts Ottawa police, targets government websites | CTV News
Hackers target Sony Pictures Entertainment | General News
Regin Cyber-Spy Malware Cast Wide Net for Telecom Phone Call Data
Stay With STEM: Why We Need To Keep Women As Engineering Majors In College - Forbes
craigslist DNS Outage | craigslist blog
Big data will enhance healthcare, but to whose benefit? - TechRepublic
Hacking cars: Automakers put high priority on cybersecurity - San Jose Mercury News
Leveraging Healthcare Big Data to Improve Population Health
Mayor" City knows how website hacked | Ottawa & Region | News | Ottawa
Bring Your Own Disruption: Why NZ security execs must be stronger - Reseller News
Four-year-old comment security bug affects 86 percent of WordPress sites | Ars Technica
Cisco Coverage for ‘Regin’ Campaign
Brucon 0x06 - Investigating Powershell Attacks - Matt Hastings &Amp; Ryan Kazanciyan
Possible blackmail in hacking of Sony Corp’s computers | Tech/Gadgets | Malay Mail Online
Local news from Bellingham, Whatcom County, WA |
Cybersecurity for cars? Yes, hackers could kill a car's engine -
IT news, careers, business technology, reviews | ITworld
Studio interview: Cyber security is part of China's national strategy - CCTV News - English
Cyber Security Week hopes to raise risk awareness - CCTV News - English
Watch Symantec's Vine "Symantec Mobility Solutions. Empower your employees. #GoEmpower"
Don't Move: An innovative security tool to safeguard your stuff - TechRepublic
Hacking happens at all cyber levels
5 PCI Compliance Gaps | CIO
How To Plan For Retirement With A Pension | Times Record
Cary |
Retiring? Here's how to get an extra month of Social Security benefits for free | Making Sen$e | PBS NewsHour
Police raid webcam hackers in Europe | Business Standard News
U of C: Facebook Threat Was Not Hacking | NBC Chicago
NSA Privacy Director says fears of government spying are unwarranted
39% Tried To Improve Their Privacy Following Snowden Reports [Survey]
Digital crime thrives in Brazil | ZDNet
CryptoPHP - Backdoor in Thousands of CMS Plugins & Themes Used to Hijack Web Servers
APT Operation 'Double Tap' Exploits Serious Windows OLE Bug ≈ Packet Storm
Craigslist DNS Hijacked, Redirected For Hours ≈ Packet Storm
Deep Dive Into ROP Payload Analysis ≈ Packet Storm
Red Hat Security Advisory 2014-1891-01 ≈ Packet Storm
Red Hat Security Advisory 2014-1892-01 ≈ Packet Storm
WordPress › WordPress 4.0.1 Security Release
Apple surges in on the BYOD wave • The Register
WATCH | Hackers claim attack on Cleveland's Web site
Lawyer says rookie Cleveland cop shot, killed 12-year-old - CBS News
Malware don't need Coffee: CVE-2014-6332 (Internet Explorer) and Exploits Kits
CodeMeter Weak Service Permissions ≈ Packet Storm
How secure is Docker? If you're not running version 1.3.2, NOT VERY • The Register
The Regin Espionage Toolkit - F-Secure Weblog : News from the Lab
Regin: Top-tier espionage tool enables stealthy surveillance | Symantec Connect
WebApp Sec: RE: [EXT] RE: Social Security Number in Hidden field
PlayStation Network and Windows Live hack was a hoax, companies say | Technology | The Guardian
2 get prison time, ordered to pay restitution in hacking case : Journal Star Breaking News
What the Pentagon's secret dictionary on cyberwarfare reveals about military hacking - The Week
Sony: “No evidence” of PSN intrusion | VG247
Why Windows 10 isn’t version 6 any more and why it will probably work | Ars Technica
Rouge Valley hospital clerk charged with misusing confidential patients records | Metro
Malicious SMS circulating via Android phones: SingCERT - Channel NewsAsia
Magnitude Exploit Kit Backend Infrastructure Insight - Part II - SpiderLabs Anterior
5 PCI Compliance gaps | CSO Online
A Peek Inside a POS Scammer’s Toolbox | Security Intelligence Blog | Trend Micro
Websense Security Labs Reveals Predictions for 2015
Hackers shut down Sony Pictures' corporate network | 89.3 KPCC
Palo Alto Networks' Costs Raise Worry After Strong Q1 PANW SYMC -
Health IT Success Hinges on CIO-Business Collaboration | CIO
System admin sentenced for hacking Navy database | Federal Times |
Operation Double Tap « Threat Research | FireEye Inc
FLARE On Challenge Solutions: Part 2 of 2 « Threat Research | FireEye Inc
Brucon 0x06 - Using Superpowers For Hw Reverse Engineering - Joe Grand
Lessons Learned A Year After Massive Retail Data Breach | Politics - KCRA Home
Sony Pictures computer network commandeered by hackers - News - Trusted Reviews
Sony Pictures Has Been Hacked, Hackers Post Their Demands | Ubergizmo
Google releases enterprise anti-malware tool for Macs - Security - News -
Rouge Valley hospital clerk charged with misusing confidential patients records | Toronto Star
Hello Flowers, Bye-Bye Stray Dogs: Nepal Preps For South Asian Summit | NCPR News
Russian Website Hacks Nanny Cams and Baby Monitors | Video - ABC News
Watch "Phone devices' automatic encryption stirs government outcry" Video at SCMagazine
Big data: managing the legal and regulatory risks | Information Age
A year after Target data breach, aftershocks finally end -
Hackers claim attack on Cleveland's website
Symantec Uncovers 'Regin,' Advanced Hacking Spyware - Viruses & Malware on Top Tech News
Sony Pictures Targeted by Widespread Hack
Cisco open sources security | Network World
Regin ... the super-powerful spyware the security industry has been silent about • The Register
APT operation 'Double Tap' exploits serious Windows OLE bug - SC Magazine
Regin: nation-state possibly behind the stealthy modular spying malware - SC Magazine
Challenge 32: XSS XIII
Sony just got hacked, doxxed, and shut down | News |
Hackers shut down Sony Pictures' computers and are blackmailing the studio | The Verge
J C Penny Company Inc (NYSE:JCP) News Analysis: Can A Data Breach Mark The End of JC Penney's Turnaround Story?
Fear and Loathing in Onion Land: The Deep Web | The Cryptosphere
Spiceworks: Mobile Security is Lacking Among IT Departments | Mobile Device Management Software Solutions content from The VAR Guy
CoinVault changes up traditional ransomware techniques - SC Magazine
Judge unseals documents related to police dept. stingray use - SC Magazine
WebApp Sec: RE: Social Security Number in Hidden field
Report: Sony Pictures facing full network compromise | CSO Online
Five arrested in UK for using RATs - SC Magazine
Why Should I Upgrade My Android Smartphone From Kitkat to Lollipop? -
Hackers shut down Cleveland website after shooting
Egyptian Cyber Hackers Target ISIS, Muslim Brotherhood
Today's CIO @ The C Suite - Cracking the C-Suite's Silicon Ceiling
How to Keep Your Credit or Debit Card Information Secure
Craigslist felled by hackers | TheHill
Do Companies Still Need a CIO? Introducing the IT Services Supermarket | Don Tapscott
Radio World: Lynx Releases PCI Express Cards
C.K. Prasad next PCI chief - The Hindu
Congrats to J-Net Members that moved up the ranks! - J-Net Community
Schneier on Security: The Security Underpinnnings of Cryptography
580 CFRA News Talk Radio :: City of Ottawa website offline again :: News - Article
Norton Security 2015 - Full Review and Bench
Classified Platform Craigslist Hacked! Who’s the Culprit? Craigslist CEO Responds [VIDEO + REPORT] : Trending News : Jobs & Hire
Cyber Risk Report: November 17-23, 2014
Why SSL Certs Are Important and How to Strengthen Your Website’s Security
Juniper Networks sur Twitter : "MT @KevinCrossman: Playing w Painteresque app. Photo of @ramirahim at @JuniperNetworks last week < cool image Kevin!"
McAfee sur Twitter : "200 million malware samples in the wild. 12 million suspect URLs every quarter. One #SMB solution."
Sony Pictures Network Hacked - The State of Security
Spam Nation Book Tour Highlights — Krebs on Security
TRENDING NOW: Staff Picks: Recent Additions to the... - J-Net Community
OSC lays charges in hospital records case - The Globe and Mail
Africa Inspires A Health Care Experiment In New York | NCPR News
Winning the war against bots - TechRepublic
BYOD’s saga continues - Banking Exchange
Online hacker claims to have duped technician before defacing | Metro
Task 15: Data Exfiltration with XMLHttpRequest
Symantec, HP Partner on Disaster Recovery as a Service
Brucon 0x06 - The Project Of Prototype This - Joe Grand &Amp; Zoz
Annie’s Mailbox: Beware of Internet hackers - News - Journal Standard - Freeport, IL
VA has yet to Mitigate Information Security Vulnerabilities, Says GAO | FEDweek I
Symantec Intelligence Report - October
Ottawa police, city websites hacked amid claims teen suspect is being framed | CTV News
‘Going Postal’ Over Data Breach Response: Union Files Failure-to-Bargain Charge With NLRB Against USPS | BakerHostetler - JDSupra
Facebook says those in lawsuit ‘not legally capable’
No data breached in City of Ottawa website hack, mayor says - Ottawa - CBC News
Juniper Among the Leaders in Gartner’s Carrier-Cla... - J-Net Community
Magna connects with 2015 Consumer Electronics Show -- AURORA, ON, Nov. 24, 2014
The Cybersecurity Myths That Small Companies Still Believe - Businessweek
Gartner: Biometrics can help banks beat digital upstarts | Planet Biometrics News
Ready to Talk Security on Turkey Day | Core Security Blog
Breach impacts about 10,000 employees in Maryland school system - SC Magazine
International commission to create recommendations on internet governance - SC Magazine
DHS, FBI sound alert on holiday cyber scams - SC Magazine
Innovation Can Come From Anywhere
Thanksgiving tech support survival kit (2014 edition) | ZDNet
Beth Israel Hospital to Pay $100k for Patient Data Breach
Craigslist website taken down by cyber attack - 23ABC News
Automakers aim to drive away car computer hackers
Why didn't police taze him? Slain Cleveland boy's father, Anonymous ask -
Sony Denies PSN Was Hacked - GameSpot
Latest Snowden leak shows UK, US behind Regin malware, attacked European Union | ZDNet
Retailers only have a year to catch up on smartcard technology
Malicious Flash Files Gain the Upper Hand With New Obfuscation Techniques | Security Intelligence Blog | Trend Micro
Remote Access Trojan hacking arrests draw in Europeans - Computer Business Review
Google Brings Open Source Security Gifts - eSecurity Planet
Craigslist was down: a short interview with the hacker blamed for it - SlashGear
Poll: What do you think of limiting the length of motel stays? - The Colonie blog
Cybercrime and punishment: the Russian hacking threat revealed | Citywire
4 Ways To Make BYOD Security Easy For The User
BBC News - Owner of site streaming webcam feeds 'seeks new job'
Regin nation state malware research revealed by security companies | ZDNet
'Less' means more to malware authors targeting Linux users | CSO Online
Healthcare Security Breach Hits Washington Hospitals |
Special Report: Why metro Houston fears the next big storm| Reuters
Craigslist website taken down by cyber attack - 7NEWS Denver
Internet of Things - when problems can be hidden in a billion places
Santa delivers the gift of Mac anti-malware, with help from Google- The Inquirer
Making the Internet of Things a business reality | Information Age
Beth Israel Deaconess Fined for 2012 Data Breach - HDM Top Stories Article | Health Data Management
Ministry of Defence warms to BYOD to gain digital flexibility -
Unlocking a locked AVG MyAccount | AVG
Brucon 0x06 - Brucon 0x06 - Hacking Driverless Vehicles - Zoz
CYREN: Still Waiting For New Product Uptake - CYREN Ltd. (NASDAQ:CYRN) | Seeking Alpha
Advanced cyberspying tool dates from 2008 - Channel NewsAsia
Bugtraq: CVE-2014-8419 - CodeMeter Weak Service Permissions
Mitigating Mobile Risk: It's Time for Action | Insurance & Technology
Coverage Implications Related to a Data Breach
eSports athletes caught doping – Pro CS:GO players banned for hacking | SiliconANGLE
Three CS:GO pro players banned just days before DreamHack Winter | Lazygamer .:: The Worlds Best Video Game News ::.
Thousands of Personal Webcams Hacked, Images Published Online | Video - ABC News
Juniper shrinks its MX monster router onto a USB stick • The Register
Antivirus Software and Internet Security For Your PC or Mac | McAfee
EthicalHackerSoc sur Twitter : "A shout out to ITBPrime for winning the CTF @irisscert and of course HACK4CRAIC for coming 2nd"
Regin malware used to spy on governments: Symantec | The London Free Press
Meet Regin, The Sophisticated Malware That Spies On Telco Networks - Forbes
Detekt Is Free Software That Spots Computer Spyware - Businessweek
Analysts: Windows Phone will surpass Android in the enterprise | SiliconANGLE
Study: IT pros are overly confident that they know how to prevent data breaches | PC World India
Why is Microsoft updating Windows PCs for a security bug on the server? | ITworld
Detekt tool finds the Hacking Team's secret surveillance malware on PC | Computerworld
Amnesty launches app to protect from government spying
Scammers used fake product listings to steal from Walmart
Google Contributor: would you pay to remove ads on websites? [POLL] | Naked Security
OS X Yosemite Tips And Tricks: Bring Handoff to your old Mac | BGR
DHS Set to Destroy Governmentwide Network Surveillance Records -
A Match Made Somewhere: Big Data and the Internet of Things - Forbes
IT News Online > PR Newswire - New Generation of WatchGuard Firewalls Enable Mid-Size Enterprises to Keep Pace with Explosive Growth in Encrypted Traffic
'Less' means more to malware authors targeting Linux users | PCWorld
Ebola, Anarchy, and Failing States: The Crisis in West Africa -
PCI 3.0: The good, the changes and why it's not ugly - SC Magazine
Founder Rejoins EdgeWave to Lead Cyber Security Innovation -- SAN DIEGO, Nov. 24, 2014 /PRNewswire/ --
Hackers Exfiltrating Data with Video Steganography via Cloud Services
Confessions of a smartphone thief - CNE
SANS Digital Forensics and Incident Response Blog | Kerberos in the Crosshairs: Golden Tickets, Silver Tickets, MITM, and More | SANS Institute
Avoiding the Bait: Helpful Tips to Protect Yourself Against Phishing Scams
Automakers aim to block threat of vehicle hacking | CTV News | Autos
Automakers aim to drive away car computer hackers - Tulsa World: Ap
Why metro Houston fears the next big storm | Daily Mail Online
Hackers claim attack on Cleveland's websites
Schiphol adopts Good BYOD software - Telecompaper
Tips to avoid online scammers this holiday season
Cyber Security Needs Its Ralph Nader
What protection can be offered from sophisticated malware such as Regin?
Webcam hackers arrested in Europe-wide raids - The Times of India
DESCRIBED AS WORLD"S MOST ADVANCED HACKING SPYWARE<br>The Regin bug has been stealing state secrets for years | BREAKING NEWS | Sky Valley Chronicle Washington State News
As computer hackers dissect cars, automakers react
Barracuda Offers Consolidated Network, Content Security Platform
Global Digital Solutions, Inc. (GDSI) and NEAH Global Energy Solutions (GES) Sign Term Sheet Providing a $5 Million Strategic Investment in GDSI in Exchange for GDSI $1 C - BWWGeeksWorld
BPCL to deploy speed boat for security of SPM terminal - The Economic Times
Automakers aim to drive away car computer hackers |
Unauthorized File Sharing a Major Threat to Businesses
WordPress issues critical security fixes, closing remote anonymous compromise bug and more | Naked Security
Automakers Aim to Drive Away Car Computer Hackers - ABC News
Stuxnet-like espionage tool discovered by researchers - SC Magazine
Belgin backdoor: Sophisticated, stealthy, state-sponsored?
Hackers Can Delete Surveillance DVRs Remotely ≈ Packet Storm
SandWorm Thrived Thanks To Botched MSFT Patch Says HP ≈ Packet Storm
Researchers Uncover Government Spy Tool Used To Hack Telecoms And Belgian Cryptographer ≈ Packet Storm
Craigslist Down For Hours After DNS Attack Forced Domain Hijacking
Hackers Shut Down City of Cleveland's Website After Shooting Death of Tamir Rice | Scene and Heard: Scene's News Blog | Cleveland Scene
The Morning Risk Report: Responding to the Activist - Risk & Compliance - WSJ
Stealthy Regin malware is a 'top-tier espionage tool' - CNE
Regin malware used to spy on governments: Symantec | Welland Tribune
Module 1: Introduction to Python and Setting up an Environment
Researchers Uncover Government Spy Tool Used to Hack Telecoms and Belgian Cryptographer | WIRED
Virus Bulletin - Sweeping The Ip Space: The Hunt For Evil On The Internet
‘Let the war begin’: Anonymous knocks hate sites offline as KKK ‘hoods off’ campaign continues
The Morning Download: Cyberattacks Could Complicate Shift to Mobile Computing - The CIO Report - WSJ
Stock Watch: Symantec Corporation (NASDAQ:SYMC) | Street Report
Powerful new cyber-spying program discovered - MarketWatch
NRC must beef up information systems security practices, processes, IG says - FierceGovernmentI
New CryptoLocker variant emerges in Czech Republic
Android 5.0 Lollipop embraces the enterprise | ZDNet
New Benchmark Report: Proving NetBackup is the King of Scale - Part One | Symantec
Network Intrusion: NIDS and Detection – Blog Post – RSA Conference
Regin malware used to spy on governments: Symantec | Chatham Daily News
Stealthy, sophisticated 'Regin' malware has been infecting computers since 2008 | PCWorld
Recent data breaches make shoppers more diligent -- COSTA MESA, Calif., Nov. 24, 2014 /PRNewswire/ --
Protecting Private Webcams From Hackers
No Page Found - Khaleej Times
Global Digital Solutions, Inc. (GDSI) and NEAH Global Energy Solutions (GES) Sign Term Sheet Providing a $5 Million Strategic Investment in GDSI in Exchange for GDSI $1 Convertible Preferred Stock and Warrants, Subject to Due Diligence and Closing - MarketWatch
Hacker claiming ties to Anonymous forces Toronto police website offline for hours - Toronto - CBC News
BBC News - 'Sophisticated' Regin spyware spotted
Cyberoam tailors security appliance for small offices | Capital Business
Craigslist Down After DNS Attack
Rambus Cryptography Research Division Licenses Security Technologies to Cisco | Business Wire
Schneier on Security: New Kryptos Clue
A virus so smart, only a government could've created it |
Regin Malware May Have Been Spying on Computers Since 2008: How Did It Escape Detection? : PERSONAL TECH : Tech Times
Consumers Less Concerned About Retail Hacks |
Cyber Security Week Held in Beijing
Symantec uncovers state-controlled Regin surveillance malware - IT News from
Security Experts Uncover New, Stuxnet-Like Cyber-Espionage Trojan - Technology News - redOrbit
Ottawa police probe website’s hacking, say systems ‘remain secure’ - The Globe and Mail
Traces of Regin malware may date back to 2006 | CSO Online
Black Friday and Cyber Monday will put retailers under pressure
Imperva: 48% Of All Web Application Attacks Target Retail
Survey Finds Mobile Devices Lure Us Into Working Longer, But No One Objects Much
Google releases enterprise malware watchdog for Mac OS | ZDNet
Craigslist Hack Knocks Site Offline: Who's Behind It?
Gartner Says Apple Pay Security Not Being Fully Used |
House Veterans' Affairs Committee Hearing
'We are just getting started': Hackers vow to escalate cyberattacks on Canadian websites | CTV News
STEALTHbits Technologies to Address Unstructured Data Governance and Security at Gartner Identity & Access Management Summit - BWWGeeksWorld
BBC News - Is Regin 'most sophisticated' computer spying bug?
Network security needs big data | Computerworld
16 webcam hijacking suspects arrested in wake of bedroom-peeping | Naked Security
Hacking trees in security zones a mysterious crime - The Times of India
World's most advanced hacking spyware let loose
Report: IT pros are overly confident that they know how to prevent data breaches | PCWorld
Symantec identifies sophisticated, stealthy 'Regin' malware | CSO Online
How to create seamless mobile security for employees | Computerworld
APAC firms keenest on IoT | Enterprise Innovation
Symantec Discovers Sophisticated Regin Spyware Virus
Happiest Minds' Integrated Security as a Service [iSaaS] Platform Receives... -- BANGALORE and NEW JERSEY, November 24, 2014 /PRNewswire/ --
Case Study, IBM CIO Office | Information Age
Advanced Cyberspying Tool Dates from 2008
Symantec Discovers Regin Malware That Has Been Lurking For Years
How to restore customer’s trust in data security | Information Age
A virus so smart, only a government could've created it | Irish Examiner
How to weed out the next Heartbleed bug: ENISA details crypto worries | ZDNet
Suspected creators of WireLurker iOS malware arrested in China, website hosting malware taken down - TechSpot
Regin: 'State-sponsored' malware spying since 2008 or 2006 | Computerworld
Module 6: Daemons and Backdoors
Dirt-cheap PS4 Amazon listings in Walmart price-match scam | Naked Security
Virus Bulletin - Optimized Mal-Ops. Hack The Ad Network Like A Boss
STEALTHbits Technologies to Address Unstructured Data Governance and Security at Gartner Identity & Access Management Summit
Who created the world’s most sophisticated hacking spyware? | News |
Minivans Disappoint In Latest Round of IIHS Crash Tests [Video] - autoevolution
Information Security News: Finally, a New Clue to Solve the CIA’s Mysterious Kryptos Sculpture
Information Security News: Highly advanced backdoor trojan cased high-profile targets for years
WebApp Sec: Re: Social Security Number in Hidden field
Monday review – the hot 24 stories of the week | Naked Security
Webcam snooper now looking for a job | CSO Online
FUD: E-Cig chargers said to be delivering malware | CSO Online
'Regin' - 'State-Sponsored' Spying Tool Targeted Govts, Infrastructures for Years
CERT develops Azerbaijani antivirus program - AzerNews
Russia, Saudi Arabia 'main targets of new Stuxnet malware' | Daily Mail Online
World's most advanced hacking spyware uncovered: 'Extraordinary' Regin bug has been stealing state secrets for six years  | Daily Mail Online
Bring your own wearable? Not so fast, execs warned - Enterprise Apps Tech News
Sophisticated malware bug Regin detected - Telegraph
TASS: World - New computer spying virus targeting Russia, Saudi Arabia uncovered — media
Malware used for 'state' espionage uncovered - Americas - Al Jazeera English
New malware used for surveillance in 10 countries, Symantec says - Livemint
Parrot Security OS- Cloud friendly Security Testing Operating System | SecTechno
Hacking RFID Payment Cards Made Possible with Android App | Security Intelligence Blog | Trend Micro
Marines with government-issued mobile devices about to become fewer, prouder -
10 reasons Android Lollipop surpasses Android KitKat - Tech2
Week in review: Critical WP bug allows site hijacking, WhatsApp gets end-to-end encryption
China Voice: Cyber security should avoid becoming Achilles' heel | Shanghai Daily
V3 Technology Awards 2014: Good Technology sheds light on mobility and BYOD trends - IT Interview from
You stupid BRICK! PCs running Avast AV can't handle Windows fixes • The Register
Android.Fakebanco | Symantec
Symantec exposes Regin, the most sophisticated and smartest malware ever identified |The Westside Story
People are hacking electronic transport tickets to score free rides
Fighting malware, emerging threats and AI
Insertion Encoder
ENISA guidelines on cryptographic solutions
Usenix Security '14 - Hulk: Eliciting Malicious Behavior In Browser Extensions
Symantec discovers 'most sophisticated' spying bug used by nations for cyber espionage | Zee News
10 amazing things Android Lollipop can do which Android KitKat cannot - Tech2
Sony quietly POODLE-proofs Playstations • The Register
Driverless cars at risk from hackers and software glitches - IT News from
Media Release: New Generation of WatchGuard Firewalls Enable Mid-Size Enterprises to Keep Pace with Explosive Growth in Encrypted Traffic
10 ways in which Android Lollipop outshines Android KitKat - Tech2
Toronto Police Service website down after DDoS attack | Metro
Microsoft Lumia 535 may arrive in India this Wednesday
Nations Ponder How to Handle European Fighters Returning From Jihad
Interview: Microsoft Country Manager Talks About Office 365 | PC Tech Magazine
Human rights organizations launch free tool to detect spyware
Top-tier espionage malware 'Regin' has been spying on targets since 2008 - TechSpot
Hong Kong wins e-Government Prize at global WeGO Awards 2014 | Enterprise Innovation
Symantec reseachers find 'Regin' malware, label it the new Stuxnet • The Register
Bugtraq: Exploit for stealing backups on WP sites with WP-DB-Backup v2.2.4 plugin
Bill Whittle: A Crash in the Mojave | FrontPage Magazine
NYU News : Warrantless spying must be debated openly
Can iPad conquer the enterprise? Only if Apple has the guts to license iOS | ZDNet
HR takes the lead: Flexible work arrangements and smart mobile devices
Google’s Internet-Beaming Balloons Keep Crashing | Motherboard
Sophisticated REGIN Spying Malware Instigated By U.S.? : World : Chinatopix
Has this advanced malware been spying on you for years? | New York Post
Usenix Security '14 - Static Detection Of Second-Order Vulnerabilities In Web Applications
Sophisticated ‘state-sponsored’ spying tool targeted govts, infrastructure for years — RT News
Symantec discovers Regin malware, which has spied on businesses and governments since 2008 - Tech2
Retailers beefing up security to prevent customer data breaches
Sun News : Hackers pledge more attacks
Security boosted in Ferguson ahead of grand jury decision | PBS NewsHour
Security Slice: Deep Darkhotel - The State of Security
Why Aren’t More Companies Purchasing Cyber Insurance?
Complex cyber-spying malware uncovered by researchers - E & T Magazine
10 Things Android Lollipop can do but Android KitKat cannot - Tech2
Hackers vow 'complete rape' of cop site | Ottawa & Region | News | Ottawa Sun
'Regin' malware described as 'groundbreaking and almost peerless' | Home - Home
Target: Retailer Owes No Duty to Banks in Data Breach
Crypto protocols held back by legacy, says ENISA • The Register
Malware spied on companies and governments in 10 countries since 2008 | Technology | The Guardian
Military Suicides Decline, But Continued Failures Hold Lessons for Future Wars - Defense One
580 CFRA News Talk Radio :: Dad of accused in 'swatting' case says hackers provided evidence in support of son :: News - Article
New Regin malware has all the earmarks of international espionage, Symantec says | General News
Mobility is a Mess, Change is Perpetual, and One Ring to Rule Them All
Man says hackers targeting police, gov't websites want to clear son’s name | CTV News
New Generation of WatchGuard Firewalls Enable Mid-Size Enterprises to Keep Pace with Explosive Growth in Encrypted Traffic - Media Releases - CSO | The Resource for Data Security Executives
Cyber espionage Malware Identified by Symantec | Wall Street OTC
Ireland 'among worst hit by PC spying virus' -
Series of data breaches put holiday shoppers at higher risk... |
Usenix Security '14 - Battling Human Trafficking With Big Data
Hacking was 'classic Anonymous', expert says
Filling the Blanks in Snowden’s ‘Citizenfour’ | Consortiumnews
Yes, Your Pacemaker Can Get Hacked -
Apple iOS bug makes devices vulnerable to attack: experts| Reuters
Symantec uncovers malware with stealth features infecting systems since 2008 | Uncover California
'Regin' malware described as 'groundbreaking and almost peerless' | Stocks -
How to reduce your risk of a cyber security breach - The Business Journals
New Zealand, China expand research agreements | Enterprise Innovation
Symantec outs Regin, a stealthy and modular spy tool - CSO | The Resource for Data Security Executives
Traces of Regin malware may date back to 2006 | Computerworld
'Regin' Spy Malware is Significant Threat, Symantec Says : News : Headlines & Global News
Driverless Cars Vulnerable to Hacking, Possible Use in Terror Attack: Experts : FUTURE TECH : Tech Times
Annie’s Mailbox: Beware of Internet hackers - News - Rockford Register Star - Rockford, IL
Cybersecurity lapses leave U.S. government agencies vulnerable to hackers, reports show - Washington Times
HP Helps Schools Fend Off Mounting Cyber Threats - Network Security on CIO Today
Symantec IDs sophisticated 'Regin' malware | Computerworld
'Regin' malware described as 'groundbreaking and almost peerless' | Project Economy - KCCI Home
Foreign powers steal data on critical U.S. infrastructure, NSA chief says - The Washington Post
Scoop - New Zealand News
Singapore gov't IT spending to reach $3.2 B in 2014 | Enterprise Innovation
Hackers Now Targeting Cars and Driver Data - Mobile Tech on Top Tech News
Challenge 5: Digest Authentication Attack
183 million accounts compromised in Q3 2014
Group claiming responsibility for hacking City of Ottawa site to hold press conference | Metro
One-year after Target breach, customers’ data security still a hot topic - Rick Kupchella's –
Hacking was 'classic Anonymous' | Ottawa & Region | News | Ottawa Sun
California man sentenced to 18 months for hacking into cash registers at Subway sandwich shops
Apple: Want a PATCH for iOS Masque attack? TOUGH LUCK, FANBOI • The Register
HP and Symantec announce Disaster Recovery beta program | Computer Dealer News
Black Hat Usa 2014 - Appsec: Building Safe Systems At Scale Lessons From Six Months At Yahoo
Sophisticated 'state-sponsored' Regin spy tool discovered
'Regin' malware described as 'groundbreaking and almost peerless' - Nov. 23, 2014
The White House breach and the evolving attack surface | Government Security News
Alert! Computer spying malware with ‘stealth’ features uncovered | Tech/Gadgets | Malay Mail Online
Stealth malware 'Regin' stalks victims |
Meet Regin, Super Spyware That's Been Attacking Computers for Years | Gizmodo India
DerpTrolling leaks PSN, 2K, Windows Live customer logins - CNE
SandWorm thrived thanks to botched MSFT patch says HP • The Register
IBM Rolls Out Analytics-Based Security Solution - Network Security on CIO Today
WebApp Sec: Social Security Number in Hidden field
Challenge 33: XSS 14
Sun News : Ottawa hacking was 'classic Anonymous': Expert
Australian baby monitors and webcams hacked as footage appears on a Russian website
Hackers vow 'complete rape' of Ottawa cop website | Sault Star
Nation state spying malware revealed | ZDNet
Why is Microsoft updating Windows PCs for a security bug on the server? - Computerworld
New Malware Infecting Telecom, Energy, Airline Industries
Espionage Malware Identified by Symantec - Utah People's Post
NSA chief warns Chinese cyber attacks could shut U.S. infrastructure| Reuters
7 Tech Trends for 2015 | NBC 5 Dallas-Fort Worth
Chicagoist Weekend Theater: The Max Headroom Hacking Incident : Chicagoist
Sun News : Hackers vow 'complete rape' of Ottawa cop website
Do Kiwi firms know antivirus is not a replacement for patch management software? - Computerworld New Zealand
7 Tech Trends for 2015 | NBC 7 San Diego
Symantec Uncovers Sophisticated, Stealthy Computer Spying Tool | Re/code
Stealth malware found spying on telecoms, energy sectors - CNE
“Want To Know Who’s Watching You?” is a Facebook scam | SecTechno
Regin stealth malware targets energy companies, other infrastructure
Highly Sophisticated Government Spying Bug Hidden For Six Years Discovered - Capable Of Siphoning Data
BBC News - Regin, new computer spying bug, discovered by Symantec
Regin: Newly uncovered malicious software snooping since 2008 'was developed by a nation state' - News - Gadgets and Tech - The Independent
Highly advanced backdoor trojan cased high-profile targets for years | Ars Technica
Computer spying malware uncovered with 'stealth' features - Symantec| Reuters
Symantec has uncovered a stealthy spying malware 'Regin'
Private images among hundreds available on Russian website  | Daily Mail Online
Task 16: Extracting CSRF Tokens
Black Hat Usa 2014 - Appsec: Attacking Mobile Broadband Modems Like A Criminal Would
Hacker Calendars
Sophos serves cloud-managed security portfolio on a plate for NZ businesses - Reseller News
Financial Tips After Your Divorce
How a Russian Web site peers into your home, and your baby’s room, by hacking webcams - The Washington Post
Spycam Hacking Shock | Graham Welch
Raising awareness quickly: Holiday tips and tricks | CSO Online
‘Travel hacking’ can slash hotel, airline costs | Travel | The Seattle Times
Bad year for cybersecurity, consumers, but security industry booming
NIST revealing next steps to bolster cyber security | Business Insurance
JPMorgan Hacking Raises Alarm About Banks’ Cyber Defences
Adobe Flash Player 15 Latest Version Addresses Seven Bug Fixes
Microsoft Robot Guards Keep Campus Safe
Hope X - Ethical Questions And Best Practices For Service Providers In The Post Snowden Era
Telegram Messaging: Chat Securely and with High Speed on your Mobile or PC | The Fuse Joplin
Citizenfour: An Unprecendented Look Into Snowden’s NSA Leaks | Long Island News from the Long Island Press
Latest Adobe Flash Player 13 Download for Windows and Mac OS X | The Fuse Joplin
Lois Lerner emails — as many as 30,000 — may have been found, investigators say - Washington Times
Install Chrome 39 for OS X for 64-bit Web browsing - CNE
Anonymous pledges more attacks in Canada | Edmonton Examiner
Hackers Now Targeting Cars and Driver Data - Mobile Tech on CIO Today
Password protected document spreads banking malware | SecTechno
Benjamin Delpy sur Twitter : "You can now "Pass-the-cache" with #mimikatz. Dump tickets from Mac/Linux/...then pass them! -"
Hope X - Elevator Hacking: From The Pit To The Penthouse
Kaspersky Antivirus vs G Data Total Protection - Which Takes Care Of Your System Best? | The Fuse Joplin
The Power To Protect | Kaspersky Lab
Symantec SSL Resources – What is SSL? | Symantec
American Dreams: How Bush Shaped Our Reading of Roth’s ‘The Plot Against America’ - The Daily Beast
Target will ask judge to toss bank suits over breach - Dallas Business Journal
US man sentenced for hacking POS systems at Subway - PC World Australia
Hacking for nude pics on the rise, say experts | Ottawa & Region | News | Ottawa