Bsides Columbus 2015 - Common Sense Security Framework
UK watchdog grills big biz: So HOW do you use their 'consumer data'? • The Register
Cable’s next step: Offer “virtual” cellular service — Tech News and Analysis
Internet of Things: A security threat to business by the backdoor? | ZDNet
How to determine if insiders should be your primary concern
Nearly half of all DDoS attacks uses multiple attack vectors
Unvalidated Redirects: Security through Obscurity!
Generate Mozilla Security Recommended Web Server Configuration Files
Information Security News: 3 things CSOs can learn from CPOs
Information Security News: What every utility should know about the new physical security standard
Using Customer Data? Start With Clean Data
Super Bowl: costly spectacle amid heightened security and surveillance | Naked Security
Outlook for iOS does security STUPIDLY says dev • The Register
What IT workplace issues keep CIOs awake at night?
How people perceive online privacy
Positive Research Center: GHOST(dot)WEB: The First Blood
Malware don't need Coffee: CVE-2015-0311 (Flash up to integrating Exploit Kits
Bsides Columbus 2015 - Owasp Mobile Top Ten - Why They Matter And What We Can Do
New 'f0xy' malware is intelligent - employs cunning stealth & trickery
MSIL/Agent.PYO: Have botnet, will travel
GHOST gethostbyname() heap overflow in glibc (CVE-2015-0235) - SpiderLabs Anterior
Facebook patched flaw within 9hours - XML Cross Domain Vulnerability | VULNERABILITY MAGAZINE - Bug Bounties, Acknoweldgements & Security Research
Bugtraq: NEW VMSA-2015-0002 VMware vSphere Data Protection product update addresses a certificate validation vulnerability
Bugtraq: [SECURITY] [DSA 3144-1] openjdk-7 security update
Ghost Flaw Still Haunting Linux Despite Patching Efforts : PERSONAL TECH : Tech Times
A docket, tweet and selfie can reveal your identity, boffins find • The Register
Pentesting Windows Endpoints: Automatic Outbound Open Port Detection
Beware the Unwitting Insider Threat -
OAS hails Jamaica's cyber security efforts - News -
Clearing the Air with Gogo Inflight Internet
Bsides Columbus 2015 - Got Software? Need A Security Test Plan? Got You Covered.
Microsoft's decision to ditch Surface is a long-overdue mercy killing for Windows R
Threats and technologies of a shifting data security landscape
2015: Trends in network performance measurement and application virtualization - SC Magazine
Big insurer groups push Senate on cyber security bill | Business Insurance
Habits Are Formed By Repetition, Not Reminders
Security of Home Surveillance Cameras | Security Intelligence Blog | Trend Micro
Samsung's $100 Million Internet of Things Bet Is Even Crazier Than You Think | Fast Company | Business + Innovation
Sony hack serves as wake-up call, boosts interest in cyber security protocol | Business Insurance
Data Privacy Day: Why Data Privacy Awareness Is Important - Security News - Trend Micro USA
We take bots down, but they get up again – you're never going to keep them down • The Register
Bsides Columbus 2015 - Corporate Wide Ssl Interception And Inspection
iTunes Connect does developer shuffle • The Register
Insider Threat Alert as Spokesman Allegedly Leaks Private Data - Infosecurity Magazine
Kaspersky Lab sur Twitter : "Time to #TestYourBrain! Do you know the answer?"
5 Critical Cloud Security Practices - InformationWeek
3 things CSOs can learn from CPOs | CSO Online
Superbowl XLIX Hype Deflated by Spam - Security News - Trend Micro USA
POS Terminals Rich Vein for Gold-Digging Hackers | Cybersecurity | TechNewsWorld
Cisco 2015 Annual Security Report: Top Takeaways - YouTube
Challenge 19: HTML Injection IV Solution
Luna smart mattress will turn off lights when you go to sleep, get coffee ready when you’re waking up - News - Gadgets and Tech - The Independent
Not So Spooky: Linux "Ghost" Vulnerability
Bsides Columbus 2015 - How To Rapidly Prototype Machine Learning Solutions To Solve Security Problems
Companies That Take Social Media Security Lightly Won't Be Able To Hack It In 2015 01/28/2015
Ransomware: Refusing to Negotiate with Attackers
Trend Micro at VMware Partner Exchange 2015 - Local News in Norwalk, Wilton, Westport, Weston, Stamford
Winnti trojan may help set stage for Skeleton Key attacks, analysts say - SC Magazine
How to Detect the GHOST glibc Vulnerability
The end for 1024-bit SSL certificates is near, Mozilla kills a few more | CSO Online
Local news from Rock Hill, SC | The Herald
FTC settles with revenge porn site operator - SC Magazine
Celebrity hacks – why do they continue?
High Availability and Disaster Recovery with SQL Server 2014 AlwaysOn Availability Groups | Windows IT Pro
Facebook, Instagram, and Tinder Were Down: What This Means for You - Security News - Trend Micro USA
Jacob Cord 程信哲 on Twitter: "@2600 I got blocked by @TENenthusiast for this one tweet last year:"
Shmoocon 2015 Videos: Playlist Version : Free Download & Streaming : Internet Archive
Facebook and Instagram deny being hacked - Telegraph
BBC News - Office puts chips under staff's skin
Obama talks cybersecurity legislation in State of the Union - SC Magazine
It’s Baaacck: Ransomware Returns with a Vengeance -
Bsides Columbus 2015 - A Basic Guide To Advanced Incident Response
Cisco Email Security Stays Ahead of Current Threats by Adding Stronger Snowshoe Spam Defense, AMP Enhancements, and More…
Investing, Trading and Retirement - E*TRADE Financial
5 Tricks That Fraudsters Use to Target eGaming Operators Free Playbook
What do China, FBI and UK have in common? All three want backdoors in Western technology • The Register
TRH Health Plan notifies 80,000 members of potential data breach
BBC News - Data from death inquiries lost by Ministry of Justice
Be Aware of Your Privacy and Security When Shopping Online - Security News - Trend Micro USA
Hoff sur Twitter : "Yeah. Two giant brains of networking and @JuniperNetworks #BGP #MPLS #CIDR #VPLS"
Matt Stephenson sur Twitter : "@ScottSpiker @ChristianMcM the calm cool head of the C-Suite #dirtytopics"
Prosecutors Trace $13.4M in Bitcoins From the Silk Road to Ulbricht's Laptop | WIRED
StealthGenie spyware goes kaput following court ruling - SC Magazine
It takes more than compliance to protect against cybercriminals
Activity Info
Symantec sur Twitter : "Welcome to #DirtyTopics chat about forming a strong #CIO #CFO partnership. We'll be discussing #ITbudget & IT ROI."
Fortinet FortiOS Denial Of Service / Man-In-The-Middle ≈ Packet Storm
ManageEngine File Download / Content Disclosure / SQL Injection ≈ Packet Storm
Slackware Security Advisory - glibc Updates ≈ Packet Storm
Latest Gadgets | Mobiles | Tablets | Android apps | Social Media | Tech News: Google Fiber Launched In Four Cities Coming With 1GBPS Internet
Bugtraq: Reflected XSS vulnarbility in Asus RT-N10 Plus Router
Bugtraq: Unauthenticated Reflected XSS vulnarbility in Asus RT-N10 Plus router
Phishing quiz: Can you spot a scam when you see one? Don't be so sure - CBS News
Admin Alert: Kaspersky Lab Reports Twice as Many Digital Certificates Used to Sign Malware in 2014 | Kaspersky Lab US
FTC's "Things" report has too much faith in present to secure future | ZDNet
The (ISC)²® Board of Directors Elects 2015 Officers | Business Wire
New Chinese cybersecurity policies require U.S. companies to hand over source code - SC Magazine
CVE-2014-4113 Windows Privilege Escalation Analysis ≈ Packet Storm
VSAT SAILOR SAT COM 900 Password Change ≈ Packet Storm
Exim ESMTP GHOST Denial Of Service ≈ Packet Storm
The Importance of Effective Information Sharing | Cyber Trust Blog
Customer Story - Rush University Medical Center - Trend Micro USA
What the Sony Hack Means for Critical Infrastructure – Blog Post – RSA Conference
USF awarded grant to study cybersecurity
Make sure ex-employees don’t walk out the door with your data | CSO Online
SCO presents rules of information security to UN | Vestnik Kavkaza
Upatre, Dyre used in Univ. of Florida attack - SC Magazine
GitHub raises max bug bounty award to $10K - SC Magazine
Are Your Passwords At Risk?
go-junos & Junos Space
Digital Reputation: Can’t Buy it, Gotta Earn It
Canada's spy agency monitors file downloads around the world
Wisconsin chiropractic clinic notifies 3,000 patients of insider breach - SC Magazine
The Internet of Dangerous Things — Krebs on Security
Data Privacy and Online Gaming: Why Gamers Make for Ideal Targets - Security News - Trend Micro USA
Two-Factor Authentication Transforms Even ‘123456’ Into a Secure Password
SymantecVoice: The "Unicorn" Budget: Can CIOs And CFOs Agree On IT Spending? - Forbes
The State of Security this Past Year is a Just a Glimpse of What’s to Come in 2015 | SecurityWeek.Com
Card Breach Hints at Lingering Concerns - BankInfoSecurity
Bsides Columbus 2015 - Supply And Demand: Solving The Infosec Talent Shortage
Email Turns 44 in 2015 [Infographic]
Business continuity briefs
Interview with Accuvant co-founder Dan Wilson
The Hacker News sur Twitter : "#Security #php #SQLi and yes, #Concerned"
SANS Institute to Bring Cybersecurity Training to Houston | SANS Institute: Press
SupportCenter Plus 7.9 Cross Site Scripting ≈ Packet Storm
Asterisk Project Security Advisory - AST-2015-001 ≈ Packet Storm
Microsoft Windows Server 2003 SP2 Arbitrary Write Privilege Escalation ≈ Packet Storm
Adobe Flash 0-Day Vulnerability Serves Up Bedep Malware on Adult Website
It's Not Easy to Determine Costs of Data Breach - eSecurity Planet
New business collaboration platform secures data with personalized cryptography
3 Simple Steps to improve your Company’s Security DNA | AlienVault
Bugtraq: Blubrry PowerPress Security Advisory - XSS Vulnerability - CVE-2015-1385
Cisco Seminar Series 2015 North America Roadshow
Breaches are a personal nightmare for corporate security pros - ARN
Federal cyber security rules should learn from industry guidelines
WordPress Photo Gallery 1.2.8 SQL Injection ≈ Packet Storm
Cracking The Hadoop User Experience ≈ Packet Storm
WordPress Photo Gallery 1.2.8 Cross Site Scripting ≈ Packet Storm
Uncommon Sense Security: RSA Conference’s new crowdsourced submissions program
Cyber sleuths find 'smoking gun' linking British spy agency to Regin malware
Bugtraq: CVE-2014-8779: SSH Host keys on Pexip Infinity
Suits and Spooks DC 2015: The Agenda - Last Chance to Register
Worst passwords of 2014
Swiss bank on safe haven label to become world's data vault
Lawmakers offer bipartisan data security bill | TheHill
US military explores biometric replacement for passwords | ZDNet
US Tech Firms Ask China To Postpone 'Intrusive' Rules ≈ Packet Storm
Red Hat Security Advisory 2015-0100-01 ≈ Packet Storm
Dutch Judge Allows Russian Hacker To Be Sent To US ≈ Packet Storm
Bugtraq: Cisco Security Advisory: GNU glibc gethostbyname Function Buffer Overflow Vulnerability
Bugtraq: [The ManageOwnage Series, part XII]: Multiple vulnerabilities in FailOverServlet (OpManager, AppManager, IT360)
Intel Security to Deliver Keynote at ITEXPO Miami 2015
Measuring the impact of government cyber security initiatives on enterprise | Information Age
Coast Guard holds cyber security exercise at UH Manoa - Washington Times
The (ISC)²® Foundation Opens Application Period for 2015 Women’s Information Security Scholarships and Faculty Exam Vouchers | Virtual-Strategy Magazine
Mantis BugTracker 1.2.19 Open Redirect ≈ Packet Storm
House Subcommittee Hears Testimony On Data Breach Law ≈ Packet Storm
FreeBSD Security Advisory - Kernel Memory Disclosure / Corruption ≈ Packet Storm
A Global Black Market for Stolen Personal Data
Snowden reveals LEVITATION technique of Canada’s spies • The Register
Contact Information | Contact Us | Kaspersky Lab AU
Criminals holding compromised websites for ransom | CSO Online
Bsides Columbus 2015 - Do We Still Need Pen Testing?
المتجر الالكتروني. اشتر برامج مكافحة الفيروسات كاسبرسكي عبر الموقع
Android in the Enterprise Part 1: Challenges of Android | Symantec Connect
The GHOST vulnerability – what you need to know | Naked Security
Hackers blackmailed Silk Road underground | ZDNet
CSR Impact Story: CyberPatriot Networking United States @ Cisco
Data breach loss capped at $500,000
OnX Managed Services and BTB Security Partner for Enhanced Security Solutions - Yahoo Finance UK
Athena and Intrinsic-ID Team to Deliver the Dragon-QT Security Processor Offering Flexible, Scalable Security for Hardware Root of Trust Applications
Top 10 Security Vendors To Watch In 2015 - Page: 5 | CRN
RSA Conference sur Twitter : "#TBT to the #cryptographers' panel at #RSAC 2014. RT if you were there!"
Capella University Offers New Graduate Certificates in Digital Forensics and Network Defense | Virtual-Strategy Magazine
AVG Technologies to Announce Financial Results | AVG Now Blog
Schneier on Security: Canada Spies on Internet Downloads
IBM punts cryptotastic cloudy ID verification services • The Register
Click-fraud ZeroAccess botnet rises from the ashes | ZDNet
Three key (business continuity) questions that CEOs need to ask - ITWeb Africa
These Are the Hottest New Open Source Projects Right Now | WIRED
Hotels that block personal Wi-Fi hotspots will get busted, says FCC | Naked Security
17-Year-Old Found Bugs in WhatsApp Web and Mobile App - Hacker News
Cisco Security sur Twitter : "Come check out these beauties at the #security booth! #CLEUR"
Data breach loss capped at $500,000 | Business Insurance
Dallas, TX PCI QSA Services Now Offered by the Texas Payments Experts at NDB Advisory
Comprehensive Global PCI Security Policies Packet Offered for Instant Download from the PCI DSS Specialists at | Virtual-Strategy Magazine
Can your disaster recovery plan save your business? | Information Age
Cop who stole nude photos from arrested women’s phones escapes jail | Naked Security
Why data privacy and security should be a boardroom issue | Information Age
US Military wants “cognitive fingerprints” to replace passwords | Naked Security
Weaving the Web from the Crowd Could Make It More Resilient | MIT Technology Review
Email scammers stole $215M from businesses in 14 months
Google says it fought gag orders in WikiLeaks investigation - The Washington Post
Bsides Columbus 2015 - Trolling Attackers For Fun &Amp; Profit
SSCC 183 – It’s Data Privacy Day! Do something! [PODCAST] | Naked Security
Guidance to improve risk management and Io
Cisco Security sur Twitter : "At #CLEUR? Stop by our booth to talk with our #security experts! @CiscoLiveEurope"
Could Your Apps Be Putting Your Smartphone At Risk?
Data Protection Starts with Everyone - Infosecurity Magazine
Want to spy on your wife? Change your grades? Hire a hacker! | Ars Technica
Crossword Cybersecurity Plc: Commercialisation Agreement with Bristol University Cryptography & Information Security Group
How much can a DDoS attack cost your organization?
Why you should celebrate Data Protection Day 2015
Companies need to be custodians of customer data, not owners
Market share of antivirus vendors and products
Swiss users inundated with malware-laden spam
Top smut site Flashes visitors, leaves behind nasty virus • The Register
Will 2015 Data Security Be Different Than 2014? | SecTechno
Bsides Columbus 2015 - Inurl:Robots.Txt-What Are You Hiding?
Survey finds increasing demand for disaster recovery solutions amongst US small and medium sized businesses
NLSIU wants cyber security lessons in schools, colleges - The Economic Times
A Manifesto for Cyber Resilience
Local banks react to data breach - Temple Daily Telegram: News
» Cloud Connections Bolster In-Vehicle Systems Navigant Research
contagio mobile: Android Hideicon malware samples
Marco Ramilli's Blog: Romantic Cyber Attack Process
ZeroAccess botnet resumes click-fraud activity after six-month break | Dell SecureWorks Security and Compliance Blog
Quantum Entanglement Now On-a-Chip | EE Times
Mozilla dusts off old servers, lights up Tor relays • The Register
UH hosts national cyber security exercise - Ka Leo O Hawaii: News
Bsides Columbus 2015 - Malware Development As The Evolution Of Parasites
Linux GHOST vulnerability (CVE-2015-0235) is not as scary as it looks | Symantec Connect
How GitHub is redefining software development
Business Continuity: 4 Core Principles to Be Successful | Patrick Duroseau
GHOST glibc gethostbyname() vulnerability CVE-2015-0235 - YouTube
CVE-2015-0235: A GHOST in the Machine
Netflix is upgrading its cloud architecture for scale | Business Cloud News
McAfee January #SecChat on Thu, Jan 29 @ 11am. #SecChat
Researcher says Aussie spooks help code Five Eyes mega malware • The Register
Making improved authentication second nature to users - SC Magazine
Bsides Columbus 2015 - Snort Beyond Ids: Open Source Application And File Control
Turning Mobility to a Winning Advantage | Symantec Connect
World's Largest DDoS Attack Reached 400Gbps, says Arbor Networks | CIO
Privacy Tips |
Password Practices at Businesses Fall Short of Secure
UH to host national cyber security exercise - Ka Leo O Hawaii: News
A Heroin Dealer Tells the Silk Road Jury What It Was Like to Sell Drugs Online | WIRED
Mobile Virtualization: Solving the BYOD Problem - Security News - Trend Micro USA
Course Introduction
Apple iOS 8.1.3 Release Will Again Anger Users - Forbes
FTC calls on IoT vendors to protect privacy | PCWorld
7 Smart Ways to Ensure Data Privacy - J-Net Community
What I'll Do With My Parents' Facebook After They Die - The Atlantic
Installation Tutorial - Waidps - Wireless Auditing Intrusion Detection And Prevention System On Kali
Google Cloud Platform Blog
Malware infects payment card system at French Lick Resort - SC Magazine
Could the Sony breach have been prevented? - SC Magazine
Don’t be Shellshocked by GHOST | The State of Security
FTC publishes security recommendations for IoT device makers - SC Magazine
How Vetting Mobile Apps Works for App Stores and Its Users - Security News - Trend Micro USA
Highly critical “Ghost” allowing code execution affects most Linux systems | Ars Technica
House subcommittee hears testimony on data breach law - SC Magazine
'GHOST' bug in Linux library enables remote takeover of victim's system - SC Magazine
SANS 575 Review | Digital Forensics Tips
Businesses warned about new espionage campaigns from of China | CSO Online
CABG linked to better outcomes than PCI, but at higher price | Cardiology
Mandatory PCI DSS 3.0 Updates for Businesses Accepting Credit Cards - Record
SANS 2015 Enterprise Mobile Workspace Survey
Search Like A Boss
GHOST Vulnerability and its Patch History
How organizations can prepare for 2015 data privacy legislation - SC Magazine
Stop, think, connect: safeguarding your online reputation - Lumia Conversations
Researchers Tie Qwerty Keylogger to Regin Malware Platform | SecurityWeek.Com
8 ways to celebrate Data Privacy Day securely - Computer Business Review
It's Data Privacy Day--do you know where your info is?
DDOS attack size up 50-fold over past decade | CSO Online
Azimuth Security: BlackPwn: BlackPhone SilentText Type Confusion Vulnerability
In 2015, Omnichannel And Big Data Will Bring Channel Marketing To The Next Level | Channel Marketer Report
Cybersecurity is a mess, but Obama can learn a few things from Estonia – and Eugene Kaspersky – Quartz
Hacking Exposed Computer Forensics Blog
Automating the Incident Response Process - SANS Institute
Wireless Auditing Intrusion Detection And Prevention System - Switching Of Display Information
Short, sharp spam attacks aiming to spread Dyre financial malware | Symantec Connect
Bugtraq: [SECURITY] [DSA 3143-1] virtualbox security update
Canada Joins World Powers in Spying on Smartphone and Download Data | WIRED
Instant Anonymity: Are Ephemeral Apps Really Safe? - Security News - Trend Micro USA
TEN: The Enthusiast Network - Wikipedia, the free encyclopedia
4 obstacles keeping traditional IT from moving to cloud - Thoughts on Cloud
Nonprofit Brings Technology To Disaster Recovery - Forbes
Dutch judge OKs alleged Russian hacker extradition to U.S. - SC Magazine
Data Privacy and Convenience: Can We Have Both? - J-Net Community
Light Reading
Targeted Scam Cost Businesses $215 Million Using Fraudulent Wire Transfers
GHOST in the Linux Machine – CVE-2015-0235
Data Privacy Day in a World of Cloud Computing | Cyber Trust Blog
Ransomware 101: What It Is and How It Works - Security News - Trend Micro USA
SANS Institute Returns to Northern Virginia for Cybersecurity Training Event | SANS Institute: Press
Thought Experiment: Mandatory Online Banking Security Standards
Four Basic Steps to Protecting Your Digital Privacy in 2015 | Internet Society
SXSW 2015: The Challenges Facing Women in Tech
Two-Factor Authentication Transforms Even ‘123456’ Into a Secure Password  « VPN Haus
How To Conduct An Information Security Gap Analysis | CIO
Researcher commandeers drone through Maldrone backdoor - SC Magazine
Watch "Silent Circle asks consumers about mobile privacy" Video at SCMagazine
Bugtraq: Multiple vulnerabilities in MantisB
A peek inside Apple’s R&D wish list. TV reimagined? | Toronto Star
ClearDATA to Provide Disaster Recovery and HIPAA-Compliant Cloud Solution for Henry Schein's Dentrix Enterprise Practice Management Software
Massive DEA license plate reader program tracks millions of Americans | Naked Security
Improving Your Privacy on Social Networks - Security News - Trend Micro USA
CyLon aims to help London-based security startups - SC Magazine
Watch "FTC releases in-depth IoT report" Video at SCMagazine
VPO Press Release - PAM4 Analysis, USB 3.1 Compliance, DDR Debug, PCI Express Link Equalization, and 100 GHz Oscilloscope Capabilities Showcased at DesignCon 2015
Data Privacy Day 2015 – Putting people in control - Microsoft on the Issues
Bsides Winnipeg - Michael Zapp - Ssd Security Risks
Bugtraq: [CVE-2015-1393] Photo Gallery (Wordpress Plugin) - SQL Injection in Version 1.2.8
Bugtraq: Two XSS Vulnerabilities in SupportCenter Plus
Convicting the Silk Road founder won't stop the booming digital drug trade | Mike Power | Comment is free | The Guardian
A Single DDoS Attack Can Cost A Company More Than $400,000 | Kaspersky Lab US
Old arguments may bog down US data breach notification legislation | ITworld
RSA Conference sur Twitter : ""
Radware Integrates Platforms with Cisco Application-Centric Infrastructure
Bugtraq: [CORE-2015-0003] - FreeBSD Kernel Multiple Vulnerabilities
Bugtraq: NEW VMSA-2015-0001 - VMware vCenter Server, ESXi, Workstation, Player, and Fusion updates address resolve security issues
ClearDATA to Provide Disaster Recovery and HIPAA-Compliant Cloud Solution for Henry Schein's Dentrix Enterprise Practice Management Software - MarketWatch
Day One Posters — Juniper Networks
Defeat The Casual Attacker First!!
Data Privacy Day on Livestream
IR Event Log Analysis - SANS Institute
Lack of encryption makes official NFL mobile app a spear phisher’s dream | Ars Technica - image uploaded by @DataPrivacyDay
International Privacy Day: Protect Your Digital Footprint | Stewart Wolpin
New Veritas Name Blends our History and Vision for Tomorrow’s Data Challenges | Symantec Connect
2600 Magazine as DRM-free Kindle, PDF ebooks - Boing Boing
Vormetric sur Twitter : "We are thrilled to present Encrypto @RSAConference this year #DataDefenseLeague #DefenderofData #RSAC"
From Point Solutions to Application Centric Services: Cisco ACI and Radware | Radware Blog
Value Investing | Market Insight of Investment Gurus
Spy Ghana News-Latest News, Breaking News, Ghana Business, Sports, Politics News
Today's CIO @ The C Suite - Information Security: The 3 Key Governance Challenges of the CIO
The New Year Security Checklist: Security Resolutions for 2015 - Security News - Trend Micro USA
Microsoft’s big task: Replicating Windows-Office success in cloud — Tech News and Analysis
Cosentry Teams With EMC and 451 Research for Disaster Recovery Webinar
Facebook’s privacy class action lawsuit to be heard on 9 April | Naked Security
Schneier on Security: Subconscious Keys
PCI Council Champions Global Data Privacy Day | Business Wire
Ghost Linux Bug Haunting Red Hat And Ubuntu Systems ≈ Packet Storm
Scouts Take Down Database Due To Security Vulnerabilities ≈ Packet Storm
Hacker For Hire Site Surfaces, Has Trouble Staying Up ≈ Packet Storm
The Practical Guide to HIPAA Privacy and Security Compliance – Blog Post – RSA Conference
Reactions to the serious vulnerability found in Glibc
Scouts take down database due to 'security vulnerabilities' • The Register
Critical BlackPhone bug allows attackers to spy on users
Cisco Security sur Twitter : "Have you stopped by our #CLEUR booth yet? Find out the latest in #security from our experts!"
Bsides Winnipeg - Yvan Boily - Security In The Open
Spying program leaked by Snowden is tied to campaign in many countries| Reuters
Symantec Cyber-Resilent Enterprise
The new norm — PCI DSS v3.0 takes effect | Briefings | The Lawyer
About |
Ultra-secure Blackphone Vulnerability lets Hackers Decrypt Texts - Hacker News
Old arguments may bog down US data breach notification legislation | CSO Online
Bughunter cracks “absolute privacy” Blackphone – by sending it a text message | Naked Security
Search Google without being tracked: Abine adds Private Search to Blur | ZDNet
Infamous Regin malware linked to spy tools used by NSA, Five Eyes intelligence | ZDNet
I ain't afraid of no GHOST – securo-bods • The Register
Google defends policy that leaves most Android devices unpatched | Computerworld
No, Department of Justice, 80 Percent of Tor Traffic Is Not Child Porn | WIRED
Turns Out Apple Pay Can't Solve Credit Card Fraud | Gizmodo UK
'Ghost' vulnerability poses high risk to Linux distributions | CSO Online
How important is online privacy?
New OS X Yosemite version fixes critical security issues, including Thunderstrike
Cisco Security sur Twitter : "#CLEUR | Join @mroesch today at 15:30 for his session on Embracing the Open-Source Model #security"
CVE-2015-0235 - how to handle the "GHOST" vulnerability affecting Linux distributions
Security vulnerability in Blackphone service exposed | ZDNet
The “Dirty Dozen” SPAMPIONSHIP: Who’s the biggest? Who’s the worst? | Naked Security
Ubisoft yanks keys for online games purchased via unauthorised parties | Naked Security
5 things you can do to limit your exposure to insider threats | CSO Online
Hijacking drones with malware
New Legislation on Threat Intelligence Sharing May Have a Chance
Information Security News: World's largest DDoS attack reached 400Gbps,says Arbor Networks
Information Security News: Northrop Grumman Foundation Congratulates Top 28 Teams Advancing to CyberPatriot National Finals Competition
Join Symantec at LegalTech NY | February 3-5, 2015 | Symantec Connect
Industry Leading 2015 Information Security Policies and Procedures Now Available for Immediate Download from the Cyber Security Experts at – Press Release Rocket
Links Found between NSA, Regin Spy tool and QWERTY Keylogger - Hacker News
Bsides Winnipeg - Closing Ceremonies Bsides Winnipeg 2013
Rising Tide Of Malware Alerts Proving Costly, Study Finds - Page: 1 | CRN
Sutter Health California Pacific Medical Center audit uncovers data breach | CSO Online
Industry Leading 2015 Information Security Policies and Procedures Now Available for Immediate Download from the Cyber Security Experts at | Virtual-Strategy Magazine
Be prepared for the breach that’s headed your way | Computerworld
Multiple vulnerabilities in the FreeBSD kernel code
4 tips to make data protection everyone's business
The Internet of Things just got a watchdog: FTC issues official report | Ars Technica
House Debates Federal Data Breach Legislation | The National Law Review
Landing Page |
Challenge 31: XSS XII
Five Top Disaster Recovery Services Announced in January 2015 by
Critical GHOST vulnerability affects most Linux Systems - Hacker News
IBM's sophisticated cryptographic algorithm protects your identity
Regin super-malware has Five Eyes fingerprints all over it says Kaspersky • The Register
Bsides Winnipeg - Kyle Geske - Internet Bots For Fun And No Profit
IoT security and privacy best practices
CVE-2015-0016: Escaping the Internet Explorer Sandbox
Malware makers try to cash in with fake YouTube views — Tech News and Analysis
Taylor Swift's Twitter and Instagram Accounts Hacked - Hacker News
Big data is a privacy minefield | Business Spectator
Bsides Winnipeg - Sergii Polishcuk - Arp Attack On Ixp Infrastructure
How the Internet of Things impacts enterprise security
VERT Alert: GHOST - glibc overflow | The State of Security
Click-fraud malware brings thousands of dollars to YouTube scammers
Building A Cybersecurity Program: 3 Tips
oss-security - Qualys Security Advisory CVE-2015-0235 - GHOST: glibc gethostbyname buffer overflow
The Big Data Mistake In The Internet Of Things - Forbes
Thought Experiment: Mandatory On-line Banking Security Standards.
A Different Exploit Angle on Adobe's Recent Zero-Day « Threat Research | FireEye Inc
Security in a Connected Home | The Network
4 Promising Linux Distros To Look Forward To In 2015 Free eGuide
Oz spooks hack, wreck Middle East 'cooling system': report • The Register
Maldrone: Watch Malware That Wants To Spread Its Wings Kill A Drone Mid-Flight - Forbes
Size and frequency of DDoS attacks increasing, annual report shows - SC Magazine
Bsides Winnipeg - Theo Baschak - Infosec From An Isp Perspective
NetBackup 7.6.1 Highlights | Symantec Connect
Twenty-eight percent of security spending wasted on shelfware | CSO Online
Symantec partners with Global Fund for Women to help close gender gap in STEM | Symantec Connect
In-Depth Look: APT Tools of the Trade | TrendLabs Security Intelligence Blog
Pinterest to sell ads based on what you’re thinking of buying | Naked Security
Google asked to muzzle Waze ‘police-stalking’ app | Naked Security
Lizard Squad took down Facebook and Instagram! Believe it! Or not… | Naked Security
Evidence shows Regin spy malware is used by Five Eyes intelligence
Apple preparing fix for Thunderstrike malware in upcoming OS X 10.10.2 release - TechRepublic
Clam AntiVirus Toolkit 0.98.6 ≈ Packet Storm
FreeBSD Kernel Crash / Code Execution / Disclosure ≈ Packet Storm
Ubuntu Security Notice USN-2486-1 ≈ Packet Storm
Red Hat Security Advisory 2015-0087-01 ≈ Packet Storm
'Boozed up' US drone spook CRASHED UFO into US White House • The Register
SANS Institute
Embed Cloud Security - YouTube
DLL Injection using AppInit_DLLs Part 2
Fed data at risk in attacks on university computers -- FCW
Europe Gets A Cyber Security Incubator | TechCrunch
Data Privacy Day Raises Awareness on Consumer Privacy, Cybersecurity Best Practice
Australian information security posture weak by world standards: Cisco - CSO | The Resource for Data Security Executives - image uploaded by @TheHackersNews (The Hacker News™)
Bsides Winnipeg - Josh More - Security Metaphors: Discussing Problems With Others While Avoiding Arguments
Apple Releases iOS 8.1.3 - Hacker News
Firm finds link between Regin spy tool and QWERTY keylogger - SC Magazine
Trend Micro Safe Mobile Workforce - Trend Micro USA
Insider threats changing security spending, report says - SC Magazine
Insurer sues web designer in bank breach - SC Magazine
'Super-secure' BlackPhone pwned by super-silly txt msg bug • The Register
Bugtraq: APPLE-SA-2015-01-27-3 Safari 8.0.3, Safari 7.1.3, and Safari 6.2.3
Bugtraq: APPLE-SA-2015-01-27-4 OS X 10.10.2 and Security Update 2015-001
Contact Kaspersky Via Phone or Email | Kaspersky Lab GB
India’s cyber-security budget 'woefully inadequate': Experts - The Economic Times
Marriott fixes Android app issue that may have exposed personal data - SC Magazine
BOO! Grave remote-code exec bug in GNU C Library haunts Linux • The Register
FUMBLE! NFL app drops privacy ball in time for Superbowl Sunday • The Register
The Internet of Things is going to be a legal nightmare | The Verge
New attack uses ransomware to drop trojans and keyloggers - SC Magazine
Data Privacy Day raises focus on need to protect personal data - Business
National Cyber Security Strategy to be launched - Latest News -
Retail Groups Want Data Breach Law With Broad Preemption - Law360
Juniper Networks - Q4 2014 Financial Results Conference Call
Why Network Segmentation is Imperative on the Internet of Things | The Security Ledger
Juniper Networks - Juniper Networks Reports Preliminary Fourth Quarter and Fiscal Year 2014 Financial Results
FTC to Internet of Stuff: Security, motherf****r, do you speak it? • The Register
Lizard Animated GIF
Hacked or Spoofed: Digging into the Malaysia Airlines Website Compromise - Security News - Trend Micro USA
Watch "Reading the Tea Leaves of the RSAC Submissions" webcast
AVGFree sur Twitter : "Which is your favorite AVG product? If you could change one thing about that product, what would it be?"
Another day, yet another emergency Adobe Flash patch. Because that's how we live now • The Register
Module 3: Programming with Scapy
Google Says It’s Not Practical to Fix Flaws in Pre-KitKat Android
Bsides Winnipeg - Mark Jenkins - Auditable Offline Bitcoin Wallet Implementation
SEANux 1.0 Remote Code Execution ≈ Packet Storm
Red Hat Security Advisory 2015-0092-01 ≈ Packet Storm
Qualys Security Advisory - glibc gethostbyname Buffer Overflow ≈ Packet Storm
High severity vulnerability found in Linux GNU C library
Adobe releases another Flash zero-day fix - SC Magazine
Apache Qpid 0.30 Crash ≈ Packet Storm
Apache Qpid 0.30 Anonymous Action Prevention ≈ Packet Storm
BSides SF 2015 Call For Papers ≈ Packet Storm
Sony begins accepting claims in proposed PSN settlement - SC Magazine
CISOs Need a Board Coach - Rook Security
Schneier on Security: Police Using Radar that Sees Through Walls
Cisco Security Manifesto - YouTube
Judith Rodin's warning for the world: 'Crisis is becoming the new normal' | Cities | The Guardian
Report: Organizations concerned about risk from insider attacks | CSO Online
Apple readies Thunderstrike fix for upcoming OS X release - SC Magazine
Cyberterrorists to target critical infrastructure
RILA Outlines Key Elements of Data Breach Legislation at Energy & Commerce Subcommittee Hearing | LP Magazine
'Mastermind' hacker steals 20 million credentials from dating website | CSO Online
Junos Space Log Director Installation - YouTube
Do You Want “Security Analytics” Or Do You Just Hate Your SIEM?
The Strategic Value of APIs - HBR
Lawmakers see momentum for legislation on data breaches | TheHill
Former California pharmacist employee accessed data without business or treatment purpose - SC Magazine
Debian Security Advisory 3141-1 ≈ Packet Storm
Debian Security Advisory 3142-1 ≈ Packet Storm
Ubuntu Security Notice USN-2485-1 ≈ Packet Storm
Bugtraq: Qualys Security Advisory CVE-2015-0235 - GHOST: glibc gethostbyname buffer overflow
Top 3 Small Business Tech Trends for 2015
Northrop Grumman to provide cyber security to UK Gov't - Computer Business Review
Rooting Out Malware With a Side-Channel Chip Defense System - IEEE Spectrum
Bsides Winnipeg - Jared Bater And Chris Kluka - Canadian Cyber Defence Challenge: Building A War Zone
Reducing the Attack Surface: Takeaways from the 2015 Annual Security Report
PCI DSS 3.0 went into effect Jan. 1. Are you in compliance? | Network World
PerezStart - Video Gaming and Movies on Xbox 360, PS3, Wii and Atari! Anime, Otaku and Cosplay.
Retailers Reiterate Support for Federal Data Breach Notification Standard | NRF
From Infection to Extortion: Watch TorrentLocker In Action - Security News - Trend Micro USA
Apple OS X Yosemite 10.10.2 Update to Patch years-old Thunderstrike vulnerability - Hacker News
Bugtraq: [SECURITY] [DSA 3141-1] wireshark security update
Bugtraq: [SECURITY] [DSA 3142-1] eglibc security update
Reengineering the tech platform for the new era of manufacturing
April 20 – 24, 2015- RSA Conference United States 2015 - Gregory D. Evans | Worlds No. 1 Security Consultant | By Gregory Evans
Why Google won't be updating pre-KitKat WebKit anymore
Bugtraq: [SYSS-2014-013] FancyFon FAMOC - Use of a One-Way Hash without a Salt
Bugtraq: [SECURITY] [DSA 3140-1] xen security update
Results Rely on Security Confidence | Radware Blog
Kaspersky: 32% of users don't take precautions when sharing devices
How CRM Changed Cloud and Cloud Changed CRM
Historic Blizzard or an Opportunity to Test Your Business Continuity Plan? | Virtual-Strategy Magazine
Red Hat Security Advisory 2015-0085-01 ≈ Packet Storm
Apple Patch Shields Macs From Thunderstrike ≈ Packet Storm
Red Hat Security Advisory 2015-0086-01 ≈ Packet Storm
End of Life
Supposedly clean Office documents download malware
Anonymous: Snap on that Guy Fawkes mask, we're marching against child sex abuse • The Register
Give01Day and IASME Partner to Secure UK Charities
Ubuntu Security Notice USN-2484-1 ≈ Packet Storm
Spies Track Mobile Users With BADASS Tracker ≈ Packet Storm
Ubuntu Security Notice USN-2483-1 ≈ Packet Storm
Bsides Winnipeg - Richard Rodd And Chris Otto - Usb: A Look Inside
Robust information security proven to reduce data breach costs - EIN News
Yet Another Emergency Flash Player Patch — Krebs on Security
New Collaboration Platform Witkit Introduces Personalized Cryptography to Prevent Data Breaches
Windows 10: What's New in Security?
US scrambling to hire enough cyber security agents to protect itself
APT gear: Custom Windows task hiding tool
Meat puppet security sucks... let machines find your flaws • The Register
Will 2015 be the biggest yet for Cybersecurity?
Schneier on Security: The IDEA Encryption Algorithm with a 128-bit Block Length
Cisco Security sur Twitter : "#CLEUR | Don't miss our #Security Keynote with SVP David Goeckeler TODAY at 16:45!"
Link between NSA and Regin cyberespionage malware becomes clearer | CSO Online
CEO's must become fluent in language of cyber security - Computer Business Review
Marriott’s Android App Found To Have Exposed Customers Credit Card Data
Austin, TX PCI QSA Services Now Offered by the North American Payments Experts at NDB Advisory
Maldrone: Malware which hijacks your personal drone | ZDNet
Python for Pentesters and Hackers « SecurityTube Trainings
China signals censors will continue to crack down on VPN services | CSO Online
Startup finds malware intrusions by keeping an eye on processor radio frequencies | CSO Online
Marriott Customers' Personal Details Exposed by Simple Web Flaw
US startup finds malware intrusions by keeping an eye on processor radio frequencies - ARN
Facebook pours cold water on Lizard Squad: Takedown? YOU WISH! • The Register
Keylogger: Somebody STOP ME! Oh hang on, I just did • The Register
Northrop Grumman Awarded Cyber Security Contract by UK Government -- LONDON, Jan. 27, 2015 /PRNewswire/ --
Entangled Photons on Silicon Chip: Secure Communications & Ultrafast Computers - Hacker News
5 Myths (Debunked) About Security and Privacy for Internet of Things | CIO
The Stack
Will Congress Answer Obama’s Call for Data-Breach Law? -
Silicon Valley Has Lost Its Way. Can Skateboarding Legend Rodney Mullen Help It? | WIRED
Flash forward – Angler, here we come
Singapore ups the ante in cyber security fight| Reuters
Northrop Grumman Awarded Cyber Security Contract by UK Government NYSE:NOC
Android Wi-Fi Direct DoS vulnerability discovered
Data Breaches Drive Investments In Security Response, Data Protection - Page: 1 | CRN
Android Wi-Fi Direct Vulnerability Lets Hackers to Kick your Devices OFF - Hacker News