Boston Children’s Hospital To Pay $40,000 Fine Over Data Breach « CBS Boston
Hack Attacks: Are Cyber Breaches the New Normal?: Video - Bloomberg
Why Is Csp Failing? Trends And Challenges In Csp Adoption
The Real Cost of Slow Time vs Downtime
How your data will be at risk in 2015
Netbackup Versus EMC
You Better Watch Out, You Better Not Click: Holiday Movie Threats - Security News - Trend Micro USA
Carl Leonard - Innovating Security in the Cloud - redskyvision
Cyber security: How to protect your data and what to do if your identity is compromised | Take Two | 89.3 KPCC
USBdriveby: Compromising computers with a $20 microcontroller
How to download Kaspersky Internet Security 2015
Government hacks and security breaches skyrocket -
This Little USB Necklace Hacks Your Computer In No Time Flat | TechCrunch
Banking on automation and devops - J-Net Community
Phishing quiz: Can you spot a scam when you see one? Don't be so sure - CBS News
Virtualization Security - Server Virtualization - Deep Security - Trend Micro USA
IoE 101: How to Explain All Things Smart, Wearable, and IoE - Security News - Trend Micro USA
U Force - Broderbund - Nes - Famicom - TV Game Commercial - Retro Gaming - 1988 - YouTube
Sony's Action Called Dangerous Precedent - DataBreachToday
Spotlight: Nearly half surveyed say SDN may be too immature to be secure - FierceEnterpriseCommunications
Retailers Look At The Mobile Web Opportunity - Business Insider
Bugtraq: TWiki Security Advisory - XSS Vulnerability - CVE-2014-9325
Bugtraq: TWiki Security Advisory - XSS Vulnerability - CVE-2014-9367
Why North Korea's attack should leave every company scared stiff - Dec. 19, 2014
Kaspersky Total Security Multi-Device
Founding of state cyber-security body worries digital rights activists - Politics - Egypt - Ahram Online
What we know about North Korea's cyberarmy | CSO Online
Why Killing the Password Is the Next Billion-Dollar Industry |
Cloudy with a Chance of Scalable Malware Protection
2014 Industry Innovators: Access Control - SC Magazine
Linux GRINCH Vuln Does Not Sound Too Horrific ≈ Packet Storm
Webcam-Snooping Spawn Of ZeuS Hits 150 Banks Worldwide ≈ Packet Storm
Microsoft Takes On Tech Support Scammers ≈ Packet Storm
Vulnerability Note VU#1680209 - AppsGeyser generates Android applications that fail to properly validate SSL certificates
The Ultimate Goal of Digital Attacks -
New Zeus variant targets users of 150 banks
Bugtraq: SEC Consult SA-20141219-0 :: XSS & Memory Disclosure vulnerabilities in NetIQ eDirectory NDS iMonitor
Critical vulnerability in Git clients puts developers at risk | CSO Online
Microsoft files suit against alleged tech support scammers | CSO Online
Evaluating The Effectiveness Of Current Anti-Rop Defenses
INFOGRAPHIC▶ Enable the Agile Data Center
Exponential-e improves disaster recovery service with Zerto - Telecompaper
Sikeston Standard Democrat: Local News: Extension approved for county's last disaster recovery project (12/19/14)
RSA Chairman on Security in 2014: 'Best of Times, Worst of Times'
Today's Challenge: Database Security in the Cloud – Blog Post – RSA Conference
Critical flaw on over 12M routers allows device hijacking, network compromise
Critical Git Vulnerability Allows for Remote Code Execution
Federal Judge Allows Lawsuits Over Target Data Breach « CBS Minnesota
Zero Day Weekly: ICANN hacked, critical GitHub vuln, too much Sony drama | ZDNet
Hackers Can Read Your Private SMS and Listen to Phone Calls - Hacker News
Major Chinese smartphone manufacturer installed backdoor on up to 10 million devices | CSO Online
Router Vulnerability Puts 12 Million Home and Business Routers at Risk - Hacker News
Schneier on Security: SS7 Vulnerabilities
Sony & North Korea: A Call to Cyber Arms or Better Defense? - The State of Security
Critical Git Client vulnerability Allows Malicious Remote Code Execution - Hacker News
Successful Tech Requires An Old-Fashioned Skill: Organizing People : All Tech Considered : NPR
Critical Git flaw allows attackers to compromise developers' machines
Cybercriminals won’t take a vacation this holiday season
Linux 'GRINCH' vuln is AWFUL. Except, er, maybe it isn't • The Register
Bugtraq: [oCERT-2014-012] JasPer input sanitization errors
Bugtraq: APPLE-SA-2014-12-18-1 Xcode 6.2 beta 3
ZeuS variant strikes 150 banks worldwide | ZDNet
ENISA CERT training programme now available online — ENISA
Philip Lieberman On The Sony Hack: “This Scenario Will Play Out Again And In Even Worse Forms”
Apple Invents New Touch ID Virtual Combination Unlock Feature - Patently Apple
Sony Hack: The ‘Finger We Are Pointing At North Korea Should Be Pointing At Ourselves’
Eyes Of A Human, Eyes Of A Program: Leveraging Different Views Of The Web For Analysis And Detection
Webcam-snooping spawn of ZeuS hits 150 banks worldwide • The Register
Consumers Dubious of Mobile Payment Security, Prefer Third Party Services Such As PayPal
Smart grid security certification in Europe
Top 5 social media security predictions for 2015
Your email, your data, your control
On The Eighth Day of Privacy, Health Care Systems (Over)Shared Data | Privacy & Security Matters
HP reveals more details about The Machine: Linux++ OS coming 2015, prototype in 2016 | ExtremeTech
Tips To Increase Your Holiday Cyber-Shopping Security « CBS Miami
Movie industry's evil plan to destroy the internet is going precisely nowhere • The Register
Some Vulnerabilities Are Di Erent Than Others Studying Vulnerabilities And Attack Surfaces In The Wild
Sneaky Impersonator Robots Are Taking Over the Web - The Atlantic
Vulnerability announced: update your Git clients · GitHub
Hack hijacks electric skateboards, dumps hipsters in the gutter • The Register
Arizona Local News - Phoenix Arizona News - Phoenix Breaking News -
Human error root cause of November Microsoft Azure outage | Network World
Quantitative Evaluation Of Dynamic Platform Techniques As A Defensive Mechanism
Security Slice: The Sony Pictures Breach – Part Two
The Syrian Electronic Army strikes again! International Business Times hacked
Kiwi hacker 'menace' pops home detention tracker cuffs • The Register
Good cyber security habits essential for holidays |
Forensic software gets around Apple's iCloud security features | Macworld
2014 Industry Innovators - SC Magazine
Gulf Daily News » Business News » Key training for Batelco's staff
How Cybercriminals Dodge Email Authentication
Zen and the Art of Cloud Database Security (Part 1) | SecurityWeek.Com
India Should Strive for Fool-proof Cyber Security -The New Indian Express
E-Journal CMS SQL Injection / Privilege Escalation ≈ Packet Storm
Red Hat Security Advisory 2014-2021-01 ≈ Packet Storm
Red Hat Security Advisory 2014-2023-01 ≈ Packet Storm
Red Hat Security Advisory 2014-2010-01 ≈ Packet Storm
Dynamic Reconstruction Of Relocation Information For Stripped Binaries
Why every CIO needs a Kevin McCallister in 2015 | Scott Spiker | LinkedIn
McAfee: Cyberattacks Will Not Slow in 2015
Some 100,000 or more WordPress sites infected by mysterious malware | Ars Technica
Best Buys That Could Lead to the Worst Shams - Security News - Trend Micro USA
Beyond ACORN: Cracking the infosec skills nut - Security - Blogs -
All aboard the internet of things infosec hype train | ZDNet
Backdoors: What They Are and How to Defend Networks against Them - Security News - Trend Micro USA
IT Force Field: Preventing The Risk Of Viruses In Business | BCW
Experts: ISIS loonies use 'digital AK-47' malware to hunt victims • The Register
Alina POS malware "sparks" off a new variant - SpiderLabs Anterior
Cybercrime predictions for 2015
Target Data Breach Suit Left Largely Intact - Law360
Medical records exposed in massive Sony hack | Healthcare IT News
Comprehensive Analysis of the “Destructive” Malware Behind FBI Warnings -
California nonprofit sues San Diego Police Department over stingray documents - SC Magazine
'Spark' shares traits with Alina, JackPOS, uses AutoIt differently - SC Magazine
Lauren Hasenhuttl sur Twitter : "Participating in @JuniperNetworks Hour of Code for kids. Future Junos coder!"
Lauren Hasenhuttl sur Twitter : "Thx @Beaker for teaching the kids about coding @JuniperNetworks @codeorg "hardware powered by software""
Measuring Drive-By Download Defense In Depth
Top 5 High-Profile Cyber Security Breaches | IT Business Blog
2014 is ending, but this wave of technology disruptions is just beginning - The Washington Post
White House calls Sony hack a "serious national security matter," gov't mulls proper response - SC Magazine
Four Steps To An Effective Targeted Attack Response | Security Intelligence Blog | Trend Micro
6 issues surrounding IoT Security in 2015 - Computer Business Review
Hacked in 2014: The Year of the Data Breach :: Tech :: Features :: Paste
Sony attack linked to North Korea, theaters bail over terrorism threat | ZDNet
What’s Booming In Small Business
Sony Asks Media to Destroy Hacked Data: Do They Have a Case?: Video - Bloomberg
RSA details new Boleto malware family - SC Magazine
Researchers find 'CoolReaper' backdoor in CoolPad devices - SC Magazine
Misfortune Cookie crumbles router security: '12 MILLION+' in hijack risk • The Register
My Internet of Everything Holiday Wish List
Managing a cyber crime scene -- FCW
Critical 'Misfortune Cookie' bug puts millions of internet-connected routers at risk - SC Magazine
McAfee sur Twitter : "Choose comfort and joy this holiday season. Watch out for bogus online offers. #12Scams."
How to train your staff on cyber security (and make it stick) | PCWorld
Forensics Europe Expo 2015 - Visitor
A Decade of Fraud and Cybercrime - YouTube
Reaction to the Sony Hack Is 'Beyond the Realm of Stupid' | Motherboard
Thoughts on Workplace Privacy
2014 State of the Union for Mobile Performance
No 'Interview' ... on any platform
Goldeneye: Efficiently And Effectively Unveiling Malware’S Targeted Environment
Data Security Breach Prevention Guide Download | Kaspersky Lab
PCI Compliance: Preparing for Version 3.0 - eSecurity Planet
Do Employees Pose the Biggest Threat to Information Security? ::Security & Resiliency:: Midsize Insider
2 More Former Sony Workers Sue Over Data Breach - ABC News
Mobile spyware makers are on shaky ground as the law begins to catch up with them | Symantec Connect
Cybersecurity & Cyber Defense | Implementing the 20 Critical Controls on a Low-Cost Budget: Do It, Dont Worry About It! | SANS Institute
Mobile banking, the safe way
Business must support staff training, says IT Governance as UK Government announces new cyber skills projects - World News Report
IBackup v10.0.0.45 suffers from a local Privilege Escalation Vulnerability | VULNERABILITY MAGAZINE - Bug Bounties, Acknoweldgements & Security Research
2 more former Sony workers sue over data breach |
Reboot 25: Thought leaders - SC Magazine
Does NFV and Virtualisation Herald the End of Blac... - J-Net Community
How to Fool a Computer With Optical Illusions - The Atlantic
Boardroom or Baby? Why are there so few women in tech?
The “Easy Button” for Cyber-Attack Mitigation: Introducing Radware’s Attack Mitigation Service | Radware Blog
Jeans and blazers will feature RFID blocking fabric - SC Magazine
Organized criminals targeting individual iPhone, Android users | CSO Online
Point-of-sale malware creators still in business with Spark, an Alina spinoff | CSO Online
6 facts about mobile connectivity in developing and developed countries - Computer Business Review
Here’s To Second Acts
Brad Pitt & Angelina Jolie Get Cyber Security For Their Six Kids
Dr. Cleaner: Trend Micro’s Free Utility App Will Optimize Your Mac’s Disk and Memory -
HIPAA security compliance: How risk tolerant are you?
Pirate Bay resurrected by rival, as hackers leak government emails in response to Swedish raid - News - Gadgets and Tech - The Independent
7 high-tech holiday scams
Security Tube sur Twitter : "My SDR Demo kit - HackRF, RTL-SDRs, CBR Radios, microphone system, caregiver pagers etc. Thanks @michaelossmann !"
Radware 2014 Global Network and Application Security Report
Calgary Welcomes Cyber Security for Oil and Gas Summit -- CALGARY, Alberta, Dec. 18, 2014 /PRNewswire/ --
Introducing our Juniper Fan-of-the-Month for Decem... - J-Net Community
Doubts Raised About "Grinch" Linux Vulnerability
Towards A Masquerade Detection System Based On User's Tasks
Quantum Cryptography May Make Future Credit Cards Hack-Proof : SCIENCE : Tech Times
The Changing Landscape of BYOD
Security SEE-SAW: $3 MEEELLION needed to fight a $100k hack • The Register
Schneier on Security: ISIS Cyberattacks
Cisco Security sur Twitter : "#TBT --- In 1995, Cisco introduced Private Internet eXchange, a popular IP firewall and NAT appliance #Cisco30"
Executive Cyber Intelligence Report: December 18, 2014 - The State of Security
Should I Use “SIEM X” or “MSSP Y”?
NY bank regulator's cybersecurity plan has strong authentication, identity | ZDNet
Local news from Rock Hill, SC | The Herald
Blueprint: How NFV is Shifting Service Provider Culture ~ Converge! Network Digest
Cyber Securit Application Portfolio Network | SmartData Collective
Corporate data: Protected asset or a ticking time bomb?
5 Effective Ways to Raise Privacy Awareness
Sony asks media not to publish leaked emails, as hackers threaten ‘Christmas gift’ of new leaks - News - Gadgets and Tech - The Independent
Forever Lost: 44% of People Could not Recover Money Stolen as a Result of Fraud | Kaspersky Lab
Google Releases Chrome Extension for End-To-End Email Encryption - Hacker News
Researcher publishes JavaScript DoS tool
FIDO Pursues Vision of a Password-Free World | Cybersecurity | TechNewsWorld
Malware peddlers take advantage of Sony's decision to pull controversial film
The Rise of Thingbots | Radware Blog
Transformation of the Data Center & Building the Private Cloud (Part 1) | Radware Blog
Bugtraq: E-Journal CMS (ID) - Multiple Web Vulnerabilities
Bugtraq: iTwitter v0.04 WP Plugin - XSS & CSRF Web Vulnerability
Who Has Access To Your Company Data? | BCW
Bots Now Outnumber Humans On The Web ≈ Packet Storm
Beware CoolReaper Malware On Chinese Android Phones ≈ Packet Storm
'Angry' Snapchat Embroiled In Sony Pictures Hack ≈ Packet Storm
Technology is still a distraction for drivers
451 Research Report: “Core Security gives customers the ability to descramble vulnerability management noise” | Core Security Blog
Cisco Adds FirePOWER Capabilities to ASA Firewalls
Kaspersky Anti-Virus 2015 Review - PC Antivirus Software
Complex Solutions to a Simple Problem — Krebs on Security
Nintendo PowerGlove Commercial - YouTube
Finding an Unknown Threat with RSA Security Analytics and RSA ECAT - YouTube
Threats at Sea: A Security Evaluation of AIS - Security News - Trend Micro USA
Schneier on Security: The Limits of Police Subterfuge
Data Loss Prevention: Databases And Web
The Sony Hack – A Lesson in Cyber Terrorism
Amit Mital – Speaker – RSA Conference
Should businesses worry about wearables?
ICANN systems breached via spear-phishing emails
US Congress member calls Rajnath over terrorism and cyber security - Firstpost
North Korea probably not behind Sony Pictures hack, says cyber security expert - video | Technology | The Guardian
How to Identify Yourself, Digitally
Bugtraq: Apple iOS v8.x - Message Context & Privacy Vulnerability
Global Internet Authority ICANN Has Been Hacked - Hacker News
100Mbps Internet available to 59% of US, while gigabit still at just 3% | Ars Technica
CoolReaper pre-installed malware creates backdoor on Chinese Androids • The Register
Phishing Scams & Identity Theft Protection – Don’t be that Guy – Trend Micro
Ars Technica readers urged to change passwords in wake of hack
Gmail Google Drive and security features: Google updates email service | BGR
Pivot3's Hyper-Converged Disaster Recovery Appliance
Cuba Is Getting the Internet | Motherboard
Hackers rejoice: Sony pulls Korea film, bows to criminal pressure | ZDNet
Apps, not malware, should be your biggest mobile concern -- GCN
Information Security News: Why the Sony hack is unlikely to be the work of North Korea.
Information Security News: ICANN HACKED: Intruders poke around global DNS innards
UC Berkeley hack: Personal data on 1,600 people possibly compromised - LA Times
Data Loss Prevention: Data In Motion Lab
Connected cars: a cyber-security nightmare on wheels | News | TechRadar
3 OpenStack Predictions For 2015 - InformationWeek
TorrentLocker ransomware pestilence plagues Europe, bags $500k • The Register
Tulsi Gabbard, Rajnath discuss terrorism, cyber security
The Evidence That North Korea Hacked Sony Is Flimsy | WIRED
Geers: , 18 December 2014
What does the Future hold for Women in Tech
Pivot3 Simplifies Backup And Disaster Recovery With Hyper-Converged Infrastructure Appliance
'CoolReaper' backdoor uncovered in CoolPad Android devices - Computer Business Review
Most IT Pros Ill-Prepared to Deal With Breaches
Delta security flaw let passengers access others' boarding passes
Built-In Backdoor Found in Popular Chinese Android Smartphones - Hacker News
The FBI Used the Web's Favorite Hacking Tool to Unmask Tor Users | WIRED
Thoughts on Mobile Digital Parenting
Dll Injection
Geers: "You can find traces of its real-world conflicts in cyberspace", 18 December 2014
Angelina Jolie Has a Cyber-Security Team To Protect Her Kids Online
Ex-Sony employees sue, claim company failed to protect data| Reuters
Python Forensics Review
How employees put your company at risk during the holidays
Social sniffer predicts which Nigerian prince has the best chance of scamming you • The Register
Only 1% of consumers feel safe using mobile payments
Wiper Malware – A Detection Deep Dive
10 Notorious Cyber Criminals Brought to Justice - #8
Nsc - Alex Ionescu - "Breaking Protected Processes"
Sony Pictures: The Data Breach And How The Criminals Won - Forbes
HP Blogs - 2014 Tape Market State of the Union - The HP Blog Hub
Four key areas of security solutions Singapore companies need to invest in | Networks Asia
Bugtraq: Jease CMS v2.11 - Persistent UI Web Vulnerability
Anonymous hacks Swedish govt emails over seizure of Pirate Bay servers — RT News
The Storage Industry Is Due For A Shake Up | BCW
Watch "James Bond 'Spectre' script stolen in Sony hack" Video at SCMagazine
Could Sony Hack Scare Other Companies Into Beefing Up Cybersecurity? - NBC News
Nsc - Andrea Barisani - Forging The Usb Armory
Seattle-based attorneys suing Sony Pictures over data breach |
10 Important Factors That Make Symantec™ SSL Certificates #1
No theaters, no VOD for 'The Interview'
Sony Hack: 3 Reasons People Think North Korea Did It
URL LOL: Delta splats web flight boarding pass snoop bug • The Register
Sony cancels The Interview flick launch amid terror threats • The Register
ARN Storage Roundtable - Ensuring business continuity and building opportunities - ARN
Red Hat Security Advisory 2014-2008-01 ≈ Packet Storm
Red Hat Security Advisory 2014-2009-01 ≈ Packet Storm
Fwknop Port Knocking Utility 2.6.5 ≈ Packet Storm
Angelina Jolie and Brad Pitt Hired a Cyber Security Team for Their Kids
PCI Geomatics Announces Student Licensing availability via Partnership with Studica Academic Reseller |
WSCED: Top 5 Online Holiday Safety Tips for Cousin Eddie -
No laughing matter: Why your company’s IT security isn’t a joke | Windows IT Pro Guest Blogs
Juniper Networks
Nsc - Andrea Allievi - "Understanding And Defeating Windows 8.1 Patch Protections"
Google’s SHA-1 Deprecation Plan for Chrome | Symantec Connect
Apple wins class-action lawsuit over iPod copyright management - SC Magazine
North Korea Almost Certainly Did Not Hack Sony | WIRED
Phishing email contains Word doc, enabling macros leads to malware infection - SC Magazine
Landmark HIPAA settlement confirms push to firm up patching schedules - SC Magazine
Former employees sue Sony, theaters drop 'The Interview' - SC Magazine
How Secure Are Temporary Messaging Apps for Work? | Re/code
Mobile RAT Xsser continues to threaten Android, iOS device security - SC Magazine
10 cybersecurity predictions for 2015 | CSO Online
New York establishes new cyber security examination process for financial institutions - Lexology
Cisco Global Cloud Index: Global Data Generated Annually by Internet of Everything (IoE) Devices - YouTube
Setting the wrong precedent: Top theater chains drop Sony's 'The Interview' after threats | CSO Online
40% rise in vulnerabilities: OpenSSL, Google Chrome and IBM worst offenders - SC Magazine UK
NIST drafts new cloud metrics guide - SC Magazine
What Network Security Lessons Can We Learn from the Sony Attack?
Uninstall AVG PC TuneUp | AVG
EdgeWave nets additional $2 million in funding |
AWS re:Invent Round Up -
Why compliance matters - SC Magazine
Tis the Season for…Financial Crime - Websense Insights
AntiVirus Security - FREE - Android Apps on Google Play
UPDATED: 18 Questions (and Answers) About Google, Site Speed, and SEO | Radware Blog
Nsc - Sebastien Dudek - Homeplugav Plc: Practical Attacks And Backdooring
Angelina Jolie Hired a Cyber Security Team for Her Kids | Cambio
(IN)SECURE Magazine
70% of Employees Admit Having Unnecessary Access to Confidential DataThe State of Security
2014 Was the Year of the Data Breach, But 2015 Could Be Worse
What You Googled in 2014: Robin Williams, ‘Flappy Bird,’ ‘Frozen’ - Digits - WSJ
Blue Coat Cloud Security Service and Threat Intelligence Solutions Win Information Security 2014 Readers' Choice Awards
An epic ride: A look back at the ever-changing information security industry - Print Article - SC Magazine
Quantum physics behind 'unhackable' security authentication - SC Magazine UK
HP Security Bulletin HPSBMU03221 1 ≈ Packet Storm
HP Security Bulletin HPSBOV03225 1 ≈ Packet Storm
HP Security Bulletin HPSBOV03226 1 ≈ Packet Storm
Grinch Bug Could be Worse Than Shellshock, Says Experts
10 changes you can make to achieve security serenity now! | CSO Online
New ransomware avoids hitting the same victim twice | CSO Online
ICANN targeted by Spear Phishing attack, several systems impacted | CSO Online
Linux 'grinch' vulnerability could put a hole in your security stocking | PCWorld
Skimming at Virginia ATMs, more than 3,000 Union debit cards compromised - SC Magazine
ICANN hackers sniff around global DNS root zone system • The Register
Ars was briefly hacked yesterday; here’s what we know | Ars Technica
HP Selects Trend Micro Deep Discovery to Help Fight Targeted Attacks -
Current connections not up to standard: Juniper Networks | ZDNet
Infonetics Report
Delta Airlines Patches Boarding Pass URL BugThe State of Security
Sony Ex-Workers File Suits Against Company Over Data Breach : Tech : News Every Day
Experts discover TorLocker variant targeting Japanese speakers - SC Magazine
Angelina Jolie, other stars slammed in hacked Sony emails – The Lead with Jake Tapper - Blogs
Nsc - Richard Johnson - "Fuzzing And Patch Analysis Sagely Advice"
Attack Mitigation Service: Cyber Security Just Got Easier
Dutch DPA fine over privacy violations could cost Google $18.6M - SC Magazine
Chris Crowley sur Twitter : "#sanscdi #sec575 #Ctf underway. #gas. @joswr1ght"
Kaspersky Lab Survey: Half of Companies Put Themselves at Risk by Undervaluing DDoS Countermeasures | Kaspersky Lab US
PCI Synthesis Sponsors New England CRO/CMO Council
Raising Your Threat Intelligence - The State of SecurityThe State of Security
The Dawn of the Flying Smartphone | Motherboard
Bugtraq: Morfy CMS v1.05 - Command Execution Vulnerability
McAfee sur Twitter : "Oh hackers, oh hackers—thy tricks are so unchanging. Don't fall for these #12Scams."
How to Become a CISO - Dark Reading
NorthStar Controller, explained by an English Scho... - J-Net Community
Paul Kocher – Speaker – RSA Conference
Can't stop Home Depot-style card pwning, but suppliers will feel PCI regulation pain • The Register
Former Sony employees sue studio over 'nightmare' data breach | The Japan Times
Bugtraq: Cross-Site Scripting (XSS) in Revive Adserver
Bugtraq: Bird Feeder v1.2.3 WP Plugin - CSRF & XSS Vulnerability
Kaspersky Internet Security 2015 | Kaspersky Lab US
Kaspersky Internet Security - Multi-Device 2015 | Kaspersky Lab US
Onapsis Appoints Enterprise Information Security Expert Renee Guttmann to Board of Advisors - MarketWatch
The biggest challenges faced by CIOs/CISOs heading into 2015 | CSO Online
Anonymous Hacks Swedish Government in Revenge for 'Pirate Bay' Takedown - Hacker News
Revolutionary Quiz - Juniper Networks
Google starts blocking badly behaving Gmail extensions
Bluster, bravado and breaches: Today's 'terrorist' players in cybersecurity | ZDNet
Constant attack a growing reality - SC Magazine UK
2015 predictions: The always-on business, cloud, security, data explosion and IoT | Enterprise Innovation
Researchers warn of new OphionLocker ransomware - SC Magazine
Sony Sued By Ex-Staff Over Draft Security, Leaked Privates ≈ Packet Storm
Sony Cancels Premiere Of The Interview After Hacker Terrorist Threats ≈ Packet Storm
London Teen Pleads Guilty To Spamhaus DDoS ≈ Packet Storm
Malware peddlers turn again to malicious links
What's New in Exploit Kits in 2014 | Security Intelligence Blog | Trend Micro
Nsc - Renaud Lifchitz - "Quantum Computing In Practice"
Google's work on full encryption chugs along, with Yahoo's help | CSO Online
Google: Mark HTTP pages as insecure | ZDNet
ICANN falls for spear phishing attack | ZDNet
Cloud Adoption Driven by Reliability, Business Continuity
Angelina Jolie And Brad Pitt Hire Cyber Security Team To Monitor Content Their Kids Encounter Online : Entertainment : Design & Trend
The Gift that Keeps on Giving: 12 Ways Everyone Can Help IT This Holiday Season | Symantec Connect
2014 Security Review: The Year in Breaches, Hacks and Exploits -- Redmond Channel Partner
Download this infographic that reveals how customers truly feel.
Researchers confirm multiple Google App Engine security sandbox bypasses
Schneier on Security: How the FBI Unmasked Tor Users
Four trends that will change mobile in 2015
VULNERABILITY LAB sur Twitter : "[BUG BOUNTY AWARD] The award trophy of the best bug bounty- and best upcoming bug bounty -program award arrived today"
What Banks Don t Know About the Security Hazards of Cloud Computing - American Banker Article
Sony hackers threaten company and movie-goers
Tackling the growing web of data residency and privacy regulations
Bugtraq: secuvera-SA-2014-01: Reflected XSS in W3 Total Cache
Tech Giants Rally Around Microsoft to Protect Your Data Overseas | WIRED
Quantum Encryption Makes Credit Cards Fraud-Proof - Hacker News
Do senior executives understand their role in data security?
Preparing for the Social Internet of Things – AVG – mefminute
London teen pleads guilty to Spamhaus DDoS • The Register
Coalfire’s Navis RapidSAQ™ Updated to New PCI Standards | Business Wire
Avast blog » South Korea hit with banking malware using VPN connection
Nsc - Nicolas Collignon - "Google Apps Engine Security"
Bugtraq: [REVIVE-SA-2014-002] Revive Adserver 3.0.6 and 3.1.0 fix multiple vulnerabilities
Bugtraq: FreeBSD Security Advisory FreeBSD-SA-14:30.unbound
UC Berkeley warns 1,600 of personal data breach |
New Norton Mobile Security warns of privacy problems | ZDNet
Business continuity briefs
2015 Forecast: The Sun is Out for Cloud Computing
Retailers must not ignore security alerts, court says | CSO Online
What are the keys to effective information security? | IT News Africa- Africa's Technology News Leader
Sony Hackers Threaten 9/11 Type Attack at Theaters Showing 'The Interview' Movie - Hacker News
A brief history of Mac malware
Sony sued by ex-staff over daft security, leaked privates • The Register
Top 5 malware attacks: 35 reused components
Protecting the underground electronic communications infrastructure
Nsc - Peter Hlavaty - "Attack On The Core"
Top Ten Private Cloud Risks
Kronos: decrypting the configuration file and injects - Weblog Lexsi
StorageCraft releases backup, disaster recovery tool for use with VMware, Microsoft System Center - WhaTech
Farewell, <em>Dr. Dobb's</em> | Dr Dobb's
TorLocker ransomware variant designed to target Japanese users | Symantec Connect
UC Berkeley warns 1,600 of personal data breach | News - KCRA Home
Bugtraq: [security bulletin] HPSBOV03226 rev.1 - HP TCP/IP Services for OpenVMS, BIND 9 Resolver, Multiple Remote Vulnerabilities
Bugtraq: [security bulletin] HPSBMU03217 rev.1 - HP Vertica Analytics Platform running Bash Shell, Remote Code Execution
Fraud-proof credit cards possible with quantum physics
Nsc - Guillaume Valadon, Nicolas Vivet - "Detecting Bgp Hijacks In 2014"
Bugtraq: Elefant CMS v1.3.9 - Persistent Name Update Vulnerability
Bugtraq: Konakart v7.3.0.1 CMS - CS Cross Site Web Vulnerability
The 12 Hacks of Christmas: Part 1The State of Security
Is POODLE Back for Another Byte? « Threat Research | FireEye Inc
New York Establishes New Cyber Security Examination Process for Financial Institutions | Ropes & Gray LLP - JDSupra
EMV Among the Missing Pieces of PCI DSS 3.0
The Steel Rooms Helping Cops Fight Cyber Crime | Motherboard
Bugtraq: iWifi for Chat v1.1 iOS - Denial of Service Vulnerability
Sony Facing 2 Suits by Ex-Workers Over Data Breach - ABC News
Coming Together for AWS Customers: Cloudnexa, AppDynamics, Sumo Logic and Trend Micro |
Passwords Are The New DataThe State of Security
Of Course You Hear What I Hear — Christmas Music Season Is Totally Data-Driven | FiveThirtyEight
Google bakes W3C malware-buster into Gmail • The Register
Creative defense: Crowdsource your hackers
Reboot 25: Threat seekers - SC Magazine
Ursnif malware variant detected in global spike - SC Magazine
Nsc - Braden Thomas - "Reverse Engineering Msp430 Device"
Malicious links: Spammers change malware delivery tactics | Symantec Connect
2014 in security: The biggest hacks, leaks, and data breaches | ZDNet
Angelina Jolie Hires Cyber Security to Protect Her Kids Online - Angelina Jolie, Brad Pitt :
McAfee: Cyberattacks Will Not Slow in 2015 - AOL On
How Ethernet Can Secure The Connected Car - Network Computing
Infographic: Holiday Shopping - The 12 Ways of Shopping Safely & Staying Cybertheft-free | Internet Security Infographics | Kaspersky Lab US
SoakSoak malware leaves 11,000 WordPress sites blacklisted by Google | Technology | The Guardian
RSAC Speaker Submissions Reveal What the Industry Cares About – Blog Post – RSA Conference
RStickets! 1.0.0 Remote Shell Upload ≈ Packet Storm
RSform!Pro 1.3.0 Remote Shell Upload ≈ Packet Storm
Konakart Cross Site Scripting ≈ Packet Storm
Chrome Plans to Mark All 'HTTP' Traffic as Insecure from 2015 - Hacker News
Mandriva Linux Security Advisory 2014-252 ≈ Packet Storm
Debian Security Advisory 3104-1 ≈ Packet Storm
Debian Security Advisory 3105-1 ≈ Packet Storm
D-Link DCS-2103 Brute Force / Cross Site Scripting ≈ Packet Storm
Sony Hackers Threaten 9/11 Attack On Movie Theaters ≈ Packet Storm
RelateIQ Mail Encoding Script Code Injection ≈ Packet Storm
Everyone starts somewhere…More than 20 million students participate in’s Hour of Code | News Center
Register – RSA Conference
Nsc - Benjamin Delpy - "Mimikatz"
Do Sony employees have the right to sue over data breach?
Industry Innovators 2014 - SC Magazine
Watch Symantec's Vine "Drop a beat! Great work is its own reward in The Backup of Destiny! Check out the full experience on YouTube:"
Network Security: No need to drop, cover, and hold... - HP Enterprise Business Community
New Phishing Emails Descend On GoDaddy CustomersThe State of Security
Impact of Linux bug 'grinch' spans servers, workstations, Android devices and more - SC Magazine
Websense Now a Member of Cloud Security Alliance’s Security, Trust and Assurance Registry (STAR) Registry - Websense Insights
Sony sued by ex-staff: Crap security, leaked privates and little help, claims suit • The Register
Sony warns employees of potential fraud - SC Magazine
Microsoft appeal over customer email warrant draws support - SC Magazine
The Evolution of Point-of-Sale (PoS) Malware - Security News - Trend Micro USA
Firefox, IE11 zero-day bugs possibly targeted in 'SoakSoak' WordPress malware attacks - SC Magazine
FOCUS: Technology Transformation | The Network
Performance Calendar » Images Are King: An Image Optimization Checklist for Everyone in Your Organization
IT Security Stories to Watch: WordPress Malware, Malwarebytes Study | Managed Security Services content from MSPmentor
Former Employees Are Suing Sony Over 'Epic Nightmare' Hack | WIRED
Nsc - Anthony Zboralski - "No Such Security" (Keynote)
Hacking WLAN Authentication
Union First Market data breach affects more than 3,000 debit cards - Roanoke Times: News
Witnesses against Silk Road creator to be kept under wraps until days before trial - SC Magazine
Keeping the Lights On, Networks Safe – Blog Post – RSA Conference
Ex-Sony Employees Sue Studio Over ‘Nightmare’ Data Breach - Bloomberg
GCN: Technology, Tools, and Tactics for Public Sector IT -- GCN
Suffolk U Adds Data Colocation for Disaster Recovery -- Campus Technology
How will the Data Centre look in 2020? - J-Net Community
Progressive Image Rendering: Good or Evil?
Bugtraq: [SECURITY] [DSA 3104-1] bsd-mailx security update
Bugtraq: [SECURITY] [DSA 3105-1] heirloom-mailx security update
Ex-LulzSec hacker Hector Monsegur talks family, FBI work - CNE
URL flaw discovered for airline mobile boarding passes - SC Magazine
Reading the Tea Leaves of the RSAC Submissions - YouTube
A Circular Problem in Current Information Security Principles
Hackers hint at terror attacks, release more data from Sony Pictures | CSO Online
Govt beefs up cyber-security after website attacks - Latest News -
Bugtraq: W3TotalFail: W3 Total Cache v 0.9.4 CSRF Vulnerability that Leads to Full Deface
Using Endpoint Visibility to Protect Your Enterprise with RSA Security Analytics and RSA ECAT - YouTube
December 2014 Microsoft Patch Tuesday Summary - J-Net Community
Banks: Park-n-Fly Online Card Breach — Krebs on Security
Working remotely? Always ensure your data gets onto the network
Top 10 Phishing Attacks of 2014
7 Resolutions Online Businesses Should Make for 2015 | CIO
31C3 Call for Participation (EN) « CCC Event Weblog
Security Awareness Blog | Failing a Phishing Test - Rite of Passage