Technology is still a distraction for drivers
Thoughts on Mobile Digital Parenting
Seekonk location among Staples stores exposed in data breach - The Sun Chronicle : Local News
Boardroom or Baby? Why are there so few women in tech?
Unsupervised Anomaly-Based Malware Detection Using Hardware Features
Sony facing 2 suits by ex-workers over data breach - WTOP
Crazy Tech CEO Quotes: 2014 Edition - InformationWeek
Here’s To Second Acts
The Changing Landscape of BYOD
Zen and the Art of Cloud Database Security (Part 2) | SecurityWeek.Com
Staples confirms data breach at 2 Maine stores | Local News - WMTW Home
Protecting Web-Based Single Sign-On Protocols Against Relying Party Impersonation Attacks Through A Dedicated Bi-Directional Authenticated Secure Channel
In 2013 Ransomware Attacks Grew by 500% - Symantec ISTR - YouTube
Ubuntu Security Notice USN-2447-2 ≈ Packet Storm
Ubuntu Security Notice USN-2448-2 ≈ Packet Storm
Apple Security Advisory 2014-12-18-1 ≈ Packet Storm
How to Identify Yourself, Digitally
Heads up! If Tor VANISHES over the weekend, this is why • The Register
Cyber security expert warns U.S. response to North Korean... |
JCE-Tech 4.0 Cross Site Scripting ≈ Packet Storm
JasPer 1.900.1 Double-Free / Heap Overflow ≈ Packet Storm
GQ File Manager 0.2.5 Cross Site Scripting / SQL Injection ≈ Packet Storm
Disrupting the Internet in 2015
Cyber Security Experts Doubt FBI Conclusion On Sony Hack
Best Buys That Could Lead to the Worst Shams - Security News - Trend Micro USA
Gmail Google Drive and security features: Google updates email service | BGR
Cities Adopt Cloud-Based Approaches to Disaster Recovery
The Top 10, Top 10 Predictions for 2014
November 2014 Threats Report - Statistics Infographic
Dr. Cleaner: Trend Micro’s Free Utility App Will Optimize Your Mac’s Disk and Memory -
FBI — Update on Sony Investigation
Staples comes clean: Hackers swiped 1.16 MILLION bank cards • The Register
Staples: 6-Month Breach, 1.16 Million Cards — Krebs on Security
Cleveland OH Local News, Breaking News, Sports & Weather -
Firms Leaving Low-Hanging Fruit in Business Data Security ::Security & Resiliency:: Midsize Insider
Run Away If You Can: Persistent Jamming Attacks Against Channel Hopping Wi-Fi Devices In Dense Networks
Norse - IPViking Live
Threats at Sea: A Security Evaluation of AIS - Security News - Trend Micro USA
Schneier on Security: Friday Squid Blogging: Squid Beard
Microsoft Security Bulletin MS14-082 - Important
Microsoft Security Bulletin MS14-076 - Important
NAFCU: 1 Year After Target Data Breach Confirmed, Consumers Vulnerable as Ever | Business Wire
Staples: 1.16 Million Cards Hit by Data Breach - WSJ
Pew survey: Privacy vs. online convenience -
Roughly 1.16 million payment cards may have been affected in Staples breach - SC Magazine
Solo attacker likely responsible for phishing campaign, delivering Zeus variant - SC Magazine
Juniper Networks sur Twitter : "Did he miss anything? #HappyHolidays"
Sony Pictures hack is Hollywood's 'Snowden moment' say infosec bods • The Register
ICANN stresses critical internet systems not hacked • The Register
Staples: 1.16 million cards possibly vulnerable in data attack | ZDNet
Comprehensive Analysis of the FBI Warnings and Sony Network Breach -
What does the Future hold for Women in Tech
Staples confirms data breach; up to 1.2M cards affected
Staples says data breach affected 1.16 million payment cards - MarketWatch
Vulnerability Note VU#561444 - Multiple broadband routers use vulnerable versions of Allegro RomPager
BYOD Brings Bah Humbug This Holiday Season | CIO
New ransomware named 'CryptoLocker' being spread via phishing emails - SC Magazine
PCI process measures may not correlate with 30-day mortality | Cardiology
This ETF Hacks Into Cyber-Security Spending - Bloomberg
The top trends in cyber security and data for 2014 - Birmingham Business Journal
Git client discloses critical security vulnerability - SC Magazine
RSA Adaptive Authentication - risk-based, fraud - EMC
Packet sur Twitter : "Racking @JuniperNetworks gear at @netaccesscorp for Packet's first production facility. Woot!"
Juniper Networks
Backdoors: What They Are and How to Defend Networks against Them - Security News - Trend Micro USA
Register – RSA Conference
Obama's Bold Sony Statement: Canceling The Interview Was a 'Mistake' | WIRED
Sony debacle shows how not to handle a hack | ZDNet
Obama promises U.S. response to Sony attack, says company made mistake - SC Magazine
Synthetic Data Generation And Defense In Depth Measurement Of Web Applications
Kaspersky Internet Security 15 для Mac
Trojan program based on ZeuS targets 150 banks, can hijack webcams | CSO Online
FBI Officially Blames North Korea in Sony Pictures Hack - The State of Security
FBI fingers Norks in Sony hack, Obama asks: HOW DO YOU SOLVE A PROBLEM LIKE KOREA? • The Register
The Gift that Keeps on Giving: 12 Ways Everyone Can Help IT This Holiday Season | Symantec Connect
The Hacker on the App Store on iTunes
State of the Union: Ecommerce Page Speed & Web Performance [Fall 2014]
Pizza Hut Makeover, Mass Customization and Cloud A... - J-Net Community
U.S. Homeland Security urges business, government cooperation on cyber security| Reuters
FBI: North Korea to Blame for Sony Hack — Krebs on Security
Questions remain after FBI charges North Korea with attack on Sony Pictures | CSO Online
Defining 'Software-Defined' Environments -- Virtualization Review
Impact of Linux bug 'grinch' spans servers, workstations, Android devices and more - SC Magazine
Schneier on Security: Lessons from the Sony Hack
Judge gives customers go-ahead to sue Target over data breach | US news |
40,000 federal employees impacted by contractor breach - SC Magazine
Congress Passes The Federal Information Security Modernization Act of 2014: Bringing Federal Agency Information Security into the New Millennium | Davis Wright Tremaine LLP - JDSupra
Barrett Brown sentencing delayed until January - SC Magazine
Spearfishing campaign compromises ICANN systems - SC Magazine
FBI Believes North Korea Is Behind The Sony Attack ≈ Packet Storm
Survey: Consumers in emerging markets use mobile Internet for personal advancement, education - FierceMobileGovernment
FBI Says North Korea Was Behind Sony Hack
ZeuS variant strikes 150 banks worldwide | ZDNet
6 IT Career Resolutions - InformationWeek
Sony investigation reveals North Korea behind cyber attack, FBI says - SC Magazine
Comprehensive Analysis of the “Destructive” Malware Behind FBI Warnings and Sony Hack -
Using 8 Backdoor Techniques, Attackers Steal Company Data - Security News - Trend Micro USA
Boston Children’s Hospital To Pay $40,000 Fine Over Data Breach « CBS Boston
Hack Attacks: Are Cyber Breaches the New Normal?: Video - Bloomberg
Why Is Csp Failing? Trends And Challenges In Csp Adoption
The Real Cost of Slow Time vs Downtime
How your data will be at risk in 2015
Netbackup Versus EMC
You Better Watch Out, You Better Not Click: Holiday Movie Threats - Security News - Trend Micro USA
Carl Leonard - Innovating Security in the Cloud - redskyvision
Cyber security: How to protect your data and what to do if your identity is compromised | Take Two | 89.3 KPCC
USBdriveby: Compromising computers with a $20 microcontroller
How to download Kaspersky Internet Security 2015
Government hacks and security breaches skyrocket -
This Little USB Necklace Hacks Your Computer In No Time Flat | TechCrunch
Banking on automation and devops - J-Net Community
Phishing quiz: Can you spot a scam when you see one? Don't be so sure - CBS News
Virtualization Security - Server Virtualization - Deep Security - Trend Micro USA
IoE 101: How to Explain All Things Smart, Wearable, and IoE - Security News - Trend Micro USA
U Force - Broderbund - Nes - Famicom - TV Game Commercial - Retro Gaming - 1988 - YouTube
Sony's Action Called Dangerous Precedent - DataBreachToday
Spotlight: Nearly half surveyed say SDN may be too immature to be secure - FierceEnterpriseCommunications
Retailers Look At The Mobile Web Opportunity - Business Insider
Bugtraq: TWiki Security Advisory - XSS Vulnerability - CVE-2014-9325
Bugtraq: TWiki Security Advisory - XSS Vulnerability - CVE-2014-9367
Why North Korea's attack should leave every company scared stiff - Dec. 19, 2014
Kaspersky Total Security Multi-Device
Founding of state cyber-security body worries digital rights activists - Politics - Egypt - Ahram Online
What we know about North Korea's cyberarmy | CSO Online
Why Killing the Password Is the Next Billion-Dollar Industry |
Cloudy with a Chance of Scalable Malware Protection
2014 Industry Innovators: Access Control - SC Magazine
Linux GRINCH Vuln Does Not Sound Too Horrific ≈ Packet Storm
Webcam-Snooping Spawn Of ZeuS Hits 150 Banks Worldwide ≈ Packet Storm
Microsoft Takes On Tech Support Scammers ≈ Packet Storm
Vulnerability Note VU#1680209 - AppsGeyser generates Android applications that fail to properly validate SSL certificates
The Ultimate Goal of Digital Attacks -
New Zeus variant targets users of 150 banks
Bugtraq: SEC Consult SA-20141219-0 :: XSS & Memory Disclosure vulnerabilities in NetIQ eDirectory NDS iMonitor
Critical vulnerability in Git clients puts developers at risk | CSO Online
Microsoft files suit against alleged tech support scammers | CSO Online
Evaluating The Effectiveness Of Current Anti-Rop Defenses
INFOGRAPHIC▶ Enable the Agile Data Center
Exponential-e improves disaster recovery service with Zerto - Telecompaper
Sikeston Standard Democrat: Local News: Extension approved for county's last disaster recovery project (12/19/14)
RSA Chairman on Security in 2014: 'Best of Times, Worst of Times'
Today's Challenge: Database Security in the Cloud – Blog Post – RSA Conference
Critical flaw on over 12M routers allows device hijacking, network compromise
Critical Git Vulnerability Allows for Remote Code Execution
Federal Judge Allows Lawsuits Over Target Data Breach « CBS Minnesota
Zero Day Weekly: ICANN hacked, critical GitHub vuln, too much Sony drama | ZDNet
Hackers Can Read Your Private SMS and Listen to Phone Calls - Hacker News
Major Chinese smartphone manufacturer installed backdoor on up to 10 million devices | CSO Online
Router Vulnerability Puts 12 Million Home and Business Routers at Risk - Hacker News
Schneier on Security: SS7 Vulnerabilities
Sony & North Korea: A Call to Cyber Arms or Better Defense? - The State of Security
Critical Git Client vulnerability Allows Malicious Remote Code Execution - Hacker News
Successful Tech Requires An Old-Fashioned Skill: Organizing People : All Tech Considered : NPR
Critical Git flaw allows attackers to compromise developers' machines
Cybercriminals won’t take a vacation this holiday season
Linux 'GRINCH' vuln is AWFUL. Except, er, maybe it isn't • The Register
Bugtraq: [oCERT-2014-012] JasPer input sanitization errors
Bugtraq: APPLE-SA-2014-12-18-1 Xcode 6.2 beta 3
ENISA CERT training programme now available online — ENISA
Philip Lieberman On The Sony Hack: “This Scenario Will Play Out Again And In Even Worse Forms”
Apple Invents New Touch ID Virtual Combination Unlock Feature - Patently Apple
Sony Hack: The ‘Finger We Are Pointing At North Korea Should Be Pointing At Ourselves’
Eyes Of A Human, Eyes Of A Program: Leveraging Different Views Of The Web For Analysis And Detection
Webcam-snooping spawn of ZeuS hits 150 banks worldwide • The Register
Consumers Dubious of Mobile Payment Security, Prefer Third Party Services Such As PayPal
Smart grid security certification in Europe
Top 5 social media security predictions for 2015
Your email, your data, your control
On The Eighth Day of Privacy, Health Care Systems (Over)Shared Data | Privacy & Security Matters
HP reveals more details about The Machine: Linux++ OS coming 2015, prototype in 2016 | ExtremeTech
Tips To Increase Your Holiday Cyber-Shopping Security « CBS Miami
Movie industry's evil plan to destroy the internet is going precisely nowhere • The Register
Some Vulnerabilities Are Di Erent Than Others Studying Vulnerabilities And Attack Surfaces In The Wild
Sneaky Impersonator Robots Are Taking Over the Web - The Atlantic
Vulnerability announced: update your Git clients · GitHub
Hack hijacks electric skateboards, dumps hipsters in the gutter • The Register
Arizona Local News - Phoenix Arizona News - Phoenix Breaking News -
Human error root cause of November Microsoft Azure outage | Network World
Quantitative Evaluation Of Dynamic Platform Techniques As A Defensive Mechanism
Security Slice: The Sony Pictures Breach – Part Two
The Syrian Electronic Army strikes again! International Business Times hacked
Kiwi hacker 'menace' pops home detention tracker cuffs • The Register
Good cyber security habits essential for holidays |
Forensic software gets around Apple's iCloud security features | Macworld
2014 Industry Innovators - SC Magazine
Gulf Daily News » Business News » Key training for Batelco's staff
How Cybercriminals Dodge Email Authentication
Zen and the Art of Cloud Database Security (Part 1) | SecurityWeek.Com
India Should Strive for Fool-proof Cyber Security -The New Indian Express
E-Journal CMS SQL Injection / Privilege Escalation ≈ Packet Storm
Red Hat Security Advisory 2014-2021-01 ≈ Packet Storm
Red Hat Security Advisory 2014-2023-01 ≈ Packet Storm
Red Hat Security Advisory 2014-2010-01 ≈ Packet Storm
Dynamic Reconstruction Of Relocation Information For Stripped Binaries
Why every CIO needs a Kevin McCallister in 2015 | Scott Spiker | LinkedIn
McAfee: Cyberattacks Will Not Slow in 2015
Some 100,000 or more WordPress sites infected by mysterious malware | Ars Technica
Beyond ACORN: Cracking the infosec skills nut - Security - Blogs -
All aboard the internet of things infosec hype train | ZDNet
IT Force Field: Preventing The Risk Of Viruses In Business | BCW
Experts: ISIS loonies use 'digital AK-47' malware to hunt victims • The Register
Alina POS malware "sparks" off a new variant - SpiderLabs Anterior
Cybercrime predictions for 2015
Target Data Breach Suit Left Largely Intact - Law360
Medical records exposed in massive Sony hack | Healthcare IT News
Comprehensive Analysis of the “Destructive” Malware Behind FBI Warnings -
California nonprofit sues San Diego Police Department over stingray documents - SC Magazine
'Spark' shares traits with Alina, JackPOS, uses AutoIt differently - SC Magazine
Lauren Hasenhuttl sur Twitter : "Participating in @JuniperNetworks Hour of Code for kids. Future Junos coder!"
Lauren Hasenhuttl sur Twitter : "Thx @Beaker for teaching the kids about coding @JuniperNetworks @codeorg "hardware powered by software""
Measuring Drive-By Download Defense In Depth
Top 5 High-Profile Cyber Security Breaches | IT Business Blog
2014 is ending, but this wave of technology disruptions is just beginning - The Washington Post
White House calls Sony hack a "serious national security matter," gov't mulls proper response - SC Magazine
Four Steps To An Effective Targeted Attack Response | Security Intelligence Blog | Trend Micro
6 issues surrounding IoT Security in 2015 - Computer Business Review
Hacked in 2014: The Year of the Data Breach :: Tech :: Features :: Paste
Sony attack linked to North Korea, theaters bail over terrorism threat | ZDNet
What’s Booming In Small Business
Sony Asks Media to Destroy Hacked Data: Do They Have a Case?: Video - Bloomberg
RSA details new Boleto malware family - SC Magazine
Researchers find 'CoolReaper' backdoor in CoolPad devices - SC Magazine
Misfortune Cookie crumbles router security: '12 MILLION+' in hijack risk • The Register
My Internet of Everything Holiday Wish List
Managing a cyber crime scene -- FCW
Critical 'Misfortune Cookie' bug puts millions of internet-connected routers at risk - SC Magazine
McAfee sur Twitter : "Choose comfort and joy this holiday season. Watch out for bogus online offers. #12Scams."
How to train your staff on cyber security (and make it stick) | PCWorld
Forensics Europe Expo 2015 - Visitor
A Decade of Fraud and Cybercrime - YouTube
Reaction to the Sony Hack Is 'Beyond the Realm of Stupid' | Motherboard
Thoughts on Workplace Privacy
2014 State of the Union for Mobile Performance
No 'Interview' ... on any platform
Goldeneye: Efficiently And Effectively Unveiling Malware’S Targeted Environment
Data Security Breach Prevention Guide Download | Kaspersky Lab
PCI Compliance: Preparing for Version 3.0 - eSecurity Planet
Do Employees Pose the Biggest Threat to Information Security? ::Security & Resiliency:: Midsize Insider
2 More Former Sony Workers Sue Over Data Breach - ABC News
Mobile spyware makers are on shaky ground as the law begins to catch up with them | Symantec Connect
Cybersecurity & Cyber Defense | Implementing the 20 Critical Controls on a Low-Cost Budget: Do It, Dont Worry About It! | SANS Institute
Mobile banking, the safe way
Business must support staff training, says IT Governance as UK Government announces new cyber skills projects - World News Report
IBackup v10.0.0.45 suffers from a local Privilege Escalation Vulnerability | VULNERABILITY MAGAZINE - Bug Bounties, Acknoweldgements & Security Research
2 more former Sony workers sue over data breach |
Reboot 25: Thought leaders - SC Magazine
Does NFV and Virtualisation Herald the End of Blac... - J-Net Community
How to Fool a Computer With Optical Illusions - The Atlantic
The “Easy Button” for Cyber-Attack Mitigation: Introducing Radware’s Attack Mitigation Service | Radware Blog
Jeans and blazers will feature RFID blocking fabric - SC Magazine
Organized criminals targeting individual iPhone, Android users | CSO Online
Point-of-sale malware creators still in business with Spark, an Alina spinoff | CSO Online
6 facts about mobile connectivity in developing and developed countries - Computer Business Review
Brad Pitt & Angelina Jolie Get Cyber Security For Their Six Kids
HIPAA security compliance: How risk tolerant are you?
Pirate Bay resurrected by rival, as hackers leak government emails in response to Swedish raid - News - Gadgets and Tech - The Independent
7 high-tech holiday scams
Security Tube sur Twitter : "My SDR Demo kit - HackRF, RTL-SDRs, CBR Radios, microphone system, caregiver pagers etc. Thanks @michaelossmann !"
Radware 2014 Global Network and Application Security Report
Calgary Welcomes Cyber Security for Oil and Gas Summit -- CALGARY, Alberta, Dec. 18, 2014 /PRNewswire/ --
Introducing our Juniper Fan-of-the-Month for Decem... - J-Net Community
Doubts Raised About "Grinch" Linux Vulnerability
Towards A Masquerade Detection System Based On User's Tasks
Quantum Cryptography May Make Future Credit Cards Hack-Proof : SCIENCE : Tech Times
Security SEE-SAW: $3 MEEELLION needed to fight a $100k hack • The Register
Schneier on Security: ISIS Cyberattacks
Cisco Security sur Twitter : "#TBT --- In 1995, Cisco introduced Private Internet eXchange, a popular IP firewall and NAT appliance #Cisco30"
Executive Cyber Intelligence Report: December 18, 2014 - The State of Security
Should I Use “SIEM X” or “MSSP Y”?
NY bank regulator's cybersecurity plan has strong authentication, identity | ZDNet
Local news from Rock Hill, SC | The Herald
Blueprint: How NFV is Shifting Service Provider Culture ~ Converge! Network Digest
Cyber Securit Application Portfolio Network | SmartData Collective
Corporate data: Protected asset or a ticking time bomb?
5 Effective Ways to Raise Privacy Awareness
Sony asks media not to publish leaked emails, as hackers threaten ‘Christmas gift’ of new leaks - News - Gadgets and Tech - The Independent
Forever Lost: 44% of People Could not Recover Money Stolen as a Result of Fraud | Kaspersky Lab
Google Releases Chrome Extension for End-To-End Email Encryption - Hacker News
Researcher publishes JavaScript DoS tool
FIDO Pursues Vision of a Password-Free World | Cybersecurity | TechNewsWorld
Malware peddlers take advantage of Sony's decision to pull controversial film
The Rise of Thingbots | Radware Blog
Transformation of the Data Center & Building the Private Cloud (Part 1) | Radware Blog
Bugtraq: E-Journal CMS (ID) - Multiple Web Vulnerabilities
Bugtraq: iTwitter v0.04 WP Plugin - XSS & CSRF Web Vulnerability
Who Has Access To Your Company Data? | BCW
Bots Now Outnumber Humans On The Web ≈ Packet Storm
Beware CoolReaper Malware On Chinese Android Phones ≈ Packet Storm
'Angry' Snapchat Embroiled In Sony Pictures Hack ≈ Packet Storm
451 Research Report: “Core Security gives customers the ability to descramble vulnerability management noise” | Core Security Blog
Cisco Adds FirePOWER Capabilities to ASA Firewalls
Kaspersky Anti-Virus 2015 Review - PC Antivirus Software
Complex Solutions to a Simple Problem — Krebs on Security
Nintendo PowerGlove Commercial - YouTube
Finding an Unknown Threat with RSA Security Analytics and RSA ECAT - YouTube
Schneier on Security: The Limits of Police Subterfuge
Data Loss Prevention: Databases And Web
The Sony Hack – A Lesson in Cyber Terrorism
Amit Mital – Speaker – RSA Conference
Should businesses worry about wearables?
ICANN systems breached via spear-phishing emails
US Congress member calls Rajnath over terrorism and cyber security - Firstpost
North Korea probably not behind Sony Pictures hack, says cyber security expert - video | Technology | The Guardian
Bugtraq: Apple iOS v8.x - Message Context & Privacy Vulnerability
Global Internet Authority ICANN Has Been Hacked - Hacker News
100Mbps Internet available to 59% of US, while gigabit still at just 3% | Ars Technica
CoolReaper pre-installed malware creates backdoor on Chinese Androids • The Register
Phishing Scams & Identity Theft Protection – Don’t be that Guy – Trend Micro
Ars Technica readers urged to change passwords in wake of hack
Pivot3's Hyper-Converged Disaster Recovery Appliance
Cuba Is Getting the Internet | Motherboard
Hackers rejoice: Sony pulls Korea film, bows to criminal pressure | ZDNet
Apps, not malware, should be your biggest mobile concern -- GCN
Information Security News: Why the Sony hack is unlikely to be the work of North Korea.
Information Security News: ICANN HACKED: Intruders poke around global DNS innards
UC Berkeley hack: Personal data on 1,600 people possibly compromised - LA Times
Data Loss Prevention: Data In Motion Lab
Connected cars: a cyber-security nightmare on wheels | News | TechRadar
3 OpenStack Predictions For 2015 - InformationWeek
TorrentLocker ransomware pestilence plagues Europe, bags $500k • The Register
Tulsi Gabbard, Rajnath discuss terrorism, cyber security
The Evidence That North Korea Hacked Sony Is Flimsy | WIRED
Geers: , 18 December 2014
Pivot3 Simplifies Backup And Disaster Recovery With Hyper-Converged Infrastructure Appliance
'CoolReaper' backdoor uncovered in CoolPad Android devices - Computer Business Review
Most IT Pros Ill-Prepared to Deal With Breaches
Delta security flaw let passengers access others' boarding passes
Built-In Backdoor Found in Popular Chinese Android Smartphones - Hacker News
The FBI Used the Web's Favorite Hacking Tool to Unmask Tor Users | WIRED
Dll Injection
Geers: "You can find traces of its real-world conflicts in cyberspace", 18 December 2014
Angelina Jolie Has a Cyber-Security Team To Protect Her Kids Online
Ex-Sony employees sue, claim company failed to protect data| Reuters
Python Forensics Review
How employees put your company at risk during the holidays
Social sniffer predicts which Nigerian prince has the best chance of scamming you • The Register
Only 1% of consumers feel safe using mobile payments
Wiper Malware – A Detection Deep Dive
10 Notorious Cyber Criminals Brought to Justice - #8
Nsc - Alex Ionescu - "Breaking Protected Processes"
Sony Pictures: The Data Breach And How The Criminals Won - Forbes
HP Blogs - 2014 Tape Market State of the Union - The HP Blog Hub
Four key areas of security solutions Singapore companies need to invest in | Networks Asia
Bugtraq: Jease CMS v2.11 - Persistent UI Web Vulnerability
Anonymous hacks Swedish govt emails over seizure of Pirate Bay servers — RT News
The Storage Industry Is Due For A Shake Up | BCW
Watch "James Bond 'Spectre' script stolen in Sony hack" Video at SCMagazine
Could Sony Hack Scare Other Companies Into Beefing Up Cybersecurity? - NBC News
Nsc - Andrea Barisani - Forging The Usb Armory
Seattle-based attorneys suing Sony Pictures over data breach |
10 Important Factors That Make Symantec™ SSL Certificates #1
No theaters, no VOD for 'The Interview'
Sony Hack: 3 Reasons People Think North Korea Did It
URL LOL: Delta splats web flight boarding pass snoop bug • The Register
Sony cancels The Interview flick launch amid terror threats • The Register
ARN Storage Roundtable - Ensuring business continuity and building opportunities - ARN
Red Hat Security Advisory 2014-2008-01 ≈ Packet Storm
Red Hat Security Advisory 2014-2009-01 ≈ Packet Storm
Fwknop Port Knocking Utility 2.6.5 ≈ Packet Storm
Angelina Jolie and Brad Pitt Hired a Cyber Security Team for Their Kids
PCI Geomatics Announces Student Licensing availability via Partnership with Studica Academic Reseller |
WSCED: Top 5 Online Holiday Safety Tips for Cousin Eddie -
No laughing matter: Why your company’s IT security isn’t a joke | Windows IT Pro Guest Blogs
Nsc - Andrea Allievi - "Understanding And Defeating Windows 8.1 Patch Protections"
Google’s SHA-1 Deprecation Plan for Chrome | Symantec Connect
Apple wins class-action lawsuit over iPod copyright management - SC Magazine
North Korea Almost Certainly Did Not Hack Sony | WIRED
Phishing email contains Word doc, enabling macros leads to malware infection - SC Magazine
Landmark HIPAA settlement confirms push to firm up patching schedules - SC Magazine
Former employees sue Sony, theaters drop 'The Interview' - SC Magazine
How Secure Are Temporary Messaging Apps for Work? | Re/code
Mobile RAT Xsser continues to threaten Android, iOS device security - SC Magazine
10 cybersecurity predictions for 2015 | CSO Online
New York establishes new cyber security examination process for financial institutions - Lexology
Cisco Global Cloud Index: Global Data Generated Annually by Internet of Everything (IoE) Devices - YouTube
Setting the wrong precedent: Top theater chains drop Sony's 'The Interview' after threats | CSO Online
40% rise in vulnerabilities: OpenSSL, Google Chrome and IBM worst offenders - SC Magazine UK
NIST drafts new cloud metrics guide - SC Magazine
What Network Security Lessons Can We Learn from the Sony Attack?
Uninstall AVG PC TuneUp | AVG
EdgeWave nets additional $2 million in funding |
AWS re:Invent Round Up -
Why compliance matters - SC Magazine
Tis the Season for…Financial Crime - Websense Insights
AntiVirus Security - FREE - Android Apps on Google Play
UPDATED: 18 Questions (and Answers) About Google, Site Speed, and SEO | Radware Blog
Nsc - Sebastien Dudek - Homeplugav Plc: Practical Attacks And Backdooring
Angelina Jolie Hired a Cyber Security Team for Her Kids | Cambio
(IN)SECURE Magazine
70% of Employees Admit Having Unnecessary Access to Confidential DataThe State of Security
2014 Was the Year of the Data Breach, But 2015 Could Be Worse
What You Googled in 2014: Robin Williams, ‘Flappy Bird,’ ‘Frozen’ - Digits - WSJ
Blue Coat Cloud Security Service and Threat Intelligence Solutions Win Information Security 2014 Readers' Choice Awards
An epic ride: A look back at the ever-changing information security industry - Print Article - SC Magazine
Quantum physics behind 'unhackable' security authentication - SC Magazine UK
HP Security Bulletin HPSBMU03221 1 ≈ Packet Storm
HP Security Bulletin HPSBOV03225 1 ≈ Packet Storm
HP Security Bulletin HPSBOV03226 1 ≈ Packet Storm
Grinch Bug Could be Worse Than Shellshock, Says Experts
10 changes you can make to achieve security serenity now! | CSO Online
New ransomware avoids hitting the same victim twice | CSO Online
ICANN targeted by Spear Phishing attack, several systems impacted | CSO Online
Linux 'grinch' vulnerability could put a hole in your security stocking | PCWorld
Skimming at Virginia ATMs, more than 3,000 Union debit cards compromised - SC Magazine
ICANN hackers sniff around global DNS root zone system • The Register
Ars was briefly hacked yesterday; here’s what we know | Ars Technica
HP Selects Trend Micro Deep Discovery to Help Fight Targeted Attacks -
Current connections not up to standard: Juniper Networks | ZDNet
Infonetics Report
Delta Airlines Patches Boarding Pass URL BugThe State of Security
Sony Ex-Workers File Suits Against Company Over Data Breach : Tech : News Every Day
Experts discover TorLocker variant targeting Japanese speakers - SC Magazine
Angelina Jolie, other stars slammed in hacked Sony emails – The Lead with Jake Tapper - Blogs
Nsc - Richard Johnson - "Fuzzing And Patch Analysis Sagely Advice"
Attack Mitigation Service: Cyber Security Just Got Easier
Dutch DPA fine over privacy violations could cost Google $18.6M - SC Magazine
Chris Crowley sur Twitter : "#sanscdi #sec575 #Ctf underway. #gas. @joswr1ght"
Kaspersky Lab Survey: Half of Companies Put Themselves at Risk by Undervaluing DDoS Countermeasures | Kaspersky Lab US
PCI Synthesis Sponsors New England CRO/CMO Council
Raising Your Threat Intelligence - The State of SecurityThe State of Security
The Dawn of the Flying Smartphone | Motherboard
Bugtraq: Morfy CMS v1.05 - Command Execution Vulnerability
McAfee sur Twitter : "Oh hackers, oh hackers—thy tricks are so unchanging. Don't fall for these #12Scams."
How to Become a CISO - Dark Reading
NorthStar Controller, explained by an English Scho... - J-Net Community
Paul Kocher – Speaker – RSA Conference
Can't stop Home Depot-style card pwning, but suppliers will feel PCI regulation pain • The Register
Former Sony employees sue studio over 'nightmare' data breach | The Japan Times
Bugtraq: Cross-Site Scripting (XSS) in Revive Adserver
Bugtraq: Bird Feeder v1.2.3 WP Plugin - CSRF & XSS Vulnerability
Kaspersky Internet Security 2015 | Kaspersky Lab US
Kaspersky Internet Security - Multi-Device 2015 | Kaspersky Lab US
Onapsis Appoints Enterprise Information Security Expert Renee Guttmann to Board of Advisors - MarketWatch
The biggest challenges faced by CIOs/CISOs heading into 2015 | CSO Online
Anonymous Hacks Swedish Government in Revenge for 'Pirate Bay' Takedown - Hacker News
Revolutionary Quiz - Juniper Networks
Google starts blocking badly behaving Gmail extensions
Bluster, bravado and breaches: Today's 'terrorist' players in cybersecurity | ZDNet
Constant attack a growing reality - SC Magazine UK
2015 predictions: The always-on business, cloud, security, data explosion and IoT | Enterprise Innovation
Researchers warn of new OphionLocker ransomware - SC Magazine
Sony Sued By Ex-Staff Over Draft Security, Leaked Privates ≈ Packet Storm
Sony Cancels Premiere Of The Interview After Hacker Terrorist Threats ≈ Packet Storm
London Teen Pleads Guilty To Spamhaus DDoS ≈ Packet Storm
Malware peddlers turn again to malicious links
What's New in Exploit Kits in 2014 | Security Intelligence Blog | Trend Micro
Nsc - Renaud Lifchitz - "Quantum Computing In Practice"
Google's work on full encryption chugs along, with Yahoo's help | CSO Online
Google: Mark HTTP pages as insecure | ZDNet
ICANN falls for spear phishing attack | ZDNet
Cloud Adoption Driven by Reliability, Business Continuity
Angelina Jolie And Brad Pitt Hire Cyber Security Team To Monitor Content Their Kids Encounter Online : Entertainment : Design & Trend
2014 Security Review: The Year in Breaches, Hacks and Exploits -- Redmond Channel Partner
Download this infographic that reveals how customers truly feel.
Researchers confirm multiple Google App Engine security sandbox bypasses
Schneier on Security: How the FBI Unmasked Tor Users
Four trends that will change mobile in 2015
VULNERABILITY LAB sur Twitter : "[BUG BOUNTY AWARD] The award trophy of the best bug bounty- and best upcoming bug bounty -program award arrived today"
What Banks Don t Know About the Security Hazards of Cloud Computing - American Banker Article
Sony hackers threaten company and movie-goers
Tackling the growing web of data residency and privacy regulations
Bugtraq: secuvera-SA-2014-01: Reflected XSS in W3 Total Cache
Tech Giants Rally Around Microsoft to Protect Your Data Overseas | WIRED
Quantum Encryption Makes Credit Cards Fraud-Proof - Hacker News
Do senior executives understand their role in data security?
Preparing for the Social Internet of Things – AVG – mefminute
London teen pleads guilty to Spamhaus DDoS • The Register
Coalfire’s Navis RapidSAQ™ Updated to New PCI Standards | Business Wire
Avast blog » South Korea hit with banking malware using VPN connection
Nsc - Nicolas Collignon - "Google Apps Engine Security"
Bugtraq: [REVIVE-SA-2014-002] Revive Adserver 3.0.6 and 3.1.0 fix multiple vulnerabilities
Bugtraq: FreeBSD Security Advisory FreeBSD-SA-14:30.unbound
UC Berkeley warns 1,600 of personal data breach |
New Norton Mobile Security warns of privacy problems | ZDNet
Business continuity briefs
2015 Forecast: The Sun is Out for Cloud Computing
Retailers must not ignore security alerts, court says | CSO Online
What are the keys to effective information security? | IT News Africa- Africa's Technology News Leader
Sony Hackers Threaten 9/11 Type Attack at Theaters Showing 'The Interview' Movie - Hacker News
A brief history of Mac malware
Sony sued by ex-staff over daft security, leaked privates • The Register
Top 5 malware attacks: 35 reused components
Protecting the underground electronic communications infrastructure
Nsc - Peter Hlavaty - "Attack On The Core"