NetSecu
NetSecu

seclists.org
seclists.org
Bugtraq: NEW VMSA-2015-0002 VMware vSphere Data Protection product update addresses a certificate validation vulnerability
seclists.org
seclists.org
Bugtraq: [SECURITY] [DSA 3144-1] openjdk-7 security update
www.techtimes.com
www.techtimes.com
Ghost Flaw Still Haunting Linux Despite Patching Efforts : PERSONAL TECH : Tech Times
www.theregister.co.uk
www.theregister.co.uk
A docket, tweet and selfie can reveal your identity, boffins find • The Register
www.pentesteracademy.com
www.pentesteracademy.com
Pentesting Windows Endpoints: Automatic Outbound Open Port Detection
www.nextgov.com
www.nextgov.com
Beware the Unwitting Insider Threat - Nextgov.com
www.jamaicaobserver.com
www.jamaicaobserver.com
OAS hails Jamaica's cyber security efforts - News - JamaicaObserver.com
www.tripwire.com
www.tripwire.com
Clearing the Air with Gogo Inflight Internet
www.securitytube.net
www.securitytube.net
Bsides Columbus 2015 - Got Software? Need A Security Test Plan? Got You Covered.
betanews.com
betanews.com
Microsoft's decision to ditch Surface is a long-overdue mercy killing for Windows R
www.net-security.org
www.net-security.org
Threats and technologies of a shifting data security landscape
www.scmagazine.com
www.scmagazine.com
2015: Trends in network performance measurement and application virtualization - SC Magazine
www.businessinsurance.com
www.businessinsurance.com
Big insurer groups push Senate on cyber security bill | Business Insurance
www.tripwire.com
www.tripwire.com
Habits Are Formed By Repetition, Not Reminders
blog.trendmicro.com
blog.trendmicro.com
Security of Home Surveillance Cameras | Security Intelligence Blog | Trend Micro
www.fastcompany.com
www.fastcompany.com
Samsung's $100 Million Internet of Things Bet Is Even Crazier Than You Think | Fast Company | Business + Innovation
www.businessinsurance.com
www.businessinsurance.com
Sony hack serves as wake-up call, boosts interest in cyber security protocol | Business Insurance
www.trendmicro.com
www.trendmicro.com
Data Privacy Day: Why Data Privacy Awareness Is Important - Security News - Trend Micro USA
www.theregister.co.uk
www.theregister.co.uk
We take bots down, but they get up again – you're never going to keep them down • The Register
www.securitytube.net
www.securitytube.net
Bsides Columbus 2015 - Corporate Wide Ssl Interception And Inspection
www.theregister.co.uk
www.theregister.co.uk
iTunes Connect does developer shuffle • The Register
www.infosecurity-magazine.com
www.infosecurity-magazine.com
Insider Threat Alert as Spokesman Allegedly Leaks Private Data - Infosecurity Magazine
twitter.com
twitter.com
Kaspersky Lab sur Twitter : "Time to #TestYourBrain! Do you know the answer? http://t.co/sUvkfjstSa"
www.informationweek.com
www.informationweek.com
5 Critical Cloud Security Practices - InformationWeek
www.csoonline.com
www.csoonline.com
3 things CSOs can learn from CPOs | CSO Online
www.trendmicro.com
www.trendmicro.com
Superbowl XLIX Hype Deflated by Spam - Security News - Trend Micro USA
community.websense.com
community.websense.com
New 'f0xy' malware is intelligent - employs cunning stealth & trickery
www.technewsworld.com
www.technewsworld.com
POS Terminals Rich Vein for Gold-Digging Hackers | Cybersecurity | TechNewsWorld
www.youtube.com
www.youtube.com
Cisco 2015 Annual Security Report: Top Takeaways - YouTube
www.pentesteracademy.com
www.pentesteracademy.com
Challenge 19: HTML Injection IV Solution
www.independent.co.uk
www.independent.co.uk
Luna smart mattress will turn off lights when you go to sleep, get coffee ready when you’re waking up - News - Gadgets and Tech - The Independent
blog.trendmicro.com
blog.trendmicro.com
Not So Spooky: Linux "Ghost" Vulnerability
www.securitytube.net
www.securitytube.net
Bsides Columbus 2015 - How To Rapidly Prototype Machine Learning Solutions To Solve Security Problems
www.mediapost.com
www.mediapost.com
Companies That Take Social Media Security Lightly Won't Be Able To Hack It In 2015 01/28/2015
www.tripwire.com
www.tripwire.com
Ransomware: Refusing to Negotiate with Attackers
blog.trendmicro.com
blog.trendmicro.com
Trend Micro at VMware Partner Exchange 2015 -
www.thehour.com
www.thehour.com
Thehour.com: Local News in Norwalk, Wilton, Westport, Weston, Stamford
www.scmagazine.com
www.scmagazine.com
Winnti trojan may help set stage for Skeleton Key attacks, analysts say - SC Magazine
www.tripwire.com
www.tripwire.com
How to Detect the GHOST glibc Vulnerability
www.csoonline.com
www.csoonline.com
The end for 1024-bit SSL certificates is near, Mozilla kills a few more | CSO Online
www.heraldonline.com
www.heraldonline.com
Local news from Rock Hill, SC | The Herald
www.scmagazine.com
www.scmagazine.com
FTC settles with revenge porn site operator - SC Magazine
now.avg.com
now.avg.com
Celebrity hacks – why do they continue?
windowsitpro.com
windowsitpro.com
High Availability and Disaster Recovery with SQL Server 2014 AlwaysOn Availability Groups | Windows IT Pro
www.trendmicro.com
www.trendmicro.com
Facebook, Instagram, and Tinder Were Down: What This Means for You - Security News - Trend Micro USA
twitter.com
twitter.com
Jacob Cord 程信哲 on Twitter: "@2600 I got blocked by @TENenthusiast for this one tweet last year: http://t.co/XxYImyt4GV"
archive.org
archive.org
Shmoocon 2015 Videos: Playlist Version : Free Download & Streaming : Internet Archive
www.telegraph.co.uk
www.telegraph.co.uk
Facebook and Instagram deny being hacked - Telegraph
www.bbc.com
www.bbc.com
BBC News - Office puts chips under staff's skin
www.scmagazine.com
www.scmagazine.com
Obama talks cybersecurity legislation in State of the Union - SC Magazine
blog.trendmicro.com
blog.trendmicro.com
It’s Baaacck: Ransomware Returns with a Vengeance -
www.securitytube.net
www.securitytube.net
Bsides Columbus 2015 - A Basic Guide To Advanced Incident Response
blogs.cisco.com
blogs.cisco.com
Cisco Email Security Stays Ahead of Current Threats by Adding Stronger Snowshoe Spam Defense, AMP Enhancements, and More…
us.etrade.com
us.etrade.com
Investing, Trading and Retirement - E*TRADE Financial
thehackernews.tradepub.com
thehackernews.tradepub.com
5 Tricks That Fraudsters Use to Target eGaming Operators Free Playbook
www.theregister.co.uk
www.theregister.co.uk
What do China, FBI and UK have in common? All three want backdoors in Western technology • The Register
www.beckershospitalreview.com
www.beckershospitalreview.com
TRH Health Plan notifies 80,000 members of potential data breach
www.bbc.co.uk
www.bbc.co.uk
BBC News - Data from death inquiries lost by Ministry of Justice
www.trendmicro.com
www.trendmicro.com
Be Aware of Your Privacy and Security When Shopping Online - Security News - Trend Micro USA
twitter.com
twitter.com
Hoff sur Twitter : "Yeah. Two giant brains of networking and @JuniperNetworks #BGP #MPLS #CIDR #VPLS http://t.co/rwYFNPplrd"
twitter.com
twitter.com
Matt Stephenson sur Twitter : "@ScottSpiker @ChristianMcM the calm cool head of the C-Suite #dirtytopics http://t.co/KjMqCJDm4f"
www.wired.com
www.wired.com
Prosecutors Trace $13.4M in Bitcoins From the Silk Road to Ulbricht's Laptop | WIRED
www.scmagazine.com
www.scmagazine.com
StealthGenie spyware goes kaput following court ruling - SC Magazine
www.microsoft.com
www.microsoft.com
It takes more than compliance to protect against cybercriminals
learningportal.juniper.net
learningportal.juniper.net
Activity Info
twitter.com
twitter.com
Symantec sur Twitter : "Welcome to #DirtyTopics chat about forming a strong #CIO #CFO partnership. We'll be discussing #ITbudget & IT ROI. http://t.co/H2VuUld1gD"
packetstormsecurity.com
packetstormsecurity.com
Fortinet FortiOS Denial Of Service / Man-In-The-Middle ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
ManageEngine File Download / Content Disclosure / SQL Injection ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Slackware Security Advisory - glibc Updates ≈ Packet Storm
www.igadgetware.com
www.igadgetware.com
Latest Gadgets | Mobiles | Tablets | Android apps | Social Media | Tech News: Google Fiber Launched In Four Cities Coming With 1GBPS Internet
seclists.org
seclists.org
Bugtraq: Reflected XSS vulnarbility in Asus RT-N10 Plus Router
seclists.org
seclists.org
Bugtraq: Unauthenticated Reflected XSS vulnarbility in Asus RT-N10 Plus router
www.cbsnews.com
www.cbsnews.com
Phishing quiz: Can you spot a scam when you see one? Don't be so sure - CBS News
usa.kaspersky.com
usa.kaspersky.com
Admin Alert: Kaspersky Lab Reports Twice as Many Digital Certificates Used to Sign Malware in 2014 | Kaspersky Lab US
www.zdnet.com
www.zdnet.com
FTC's "Things" report has too much faith in present to secure future | ZDNet
www.businesswire.com
www.businesswire.com
The (ISC)²® Board of Directors Elects 2015 Officers | Business Wire
www.scmagazine.com
www.scmagazine.com
New Chinese cybersecurity policies require U.S. companies to hand over source code - SC Magazine
packetstormsecurity.com
packetstormsecurity.com
CVE-2014-4113 Windows Privilege Escalation Analysis ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
VSAT SAILOR SAT COM 900 Password Change ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Exim ESMTP GHOST Denial Of Service ≈ Packet Storm
blogs.microsoft.com
blogs.microsoft.com
The Importance of Effective Information Sharing | Cyber Trust Blog
cloudsecurity.trendmicro.com
cloudsecurity.trendmicro.com
Customer Story - Rush University Medical Center - Trend Micro USA
www.rsaconference.com
www.rsaconference.com
What the Sony Hack Means for Critical Infrastructure – Blog Post – RSA Conference
www.wtsp.com
www.wtsp.com
USF awarded grant to study cybersecurity
www.csoonline.com
www.csoonline.com
Make sure ex-employees don’t walk out the door with your data | CSO Online
vestnikkavkaza.net
vestnikkavkaza.net
SCO presents rules of information security to UN | Vestnik Kavkaza
www.scmagazine.com
www.scmagazine.com
Upatre, Dyre used in Univ. of Florida attack - SC Magazine
www.scmagazine.com
www.scmagazine.com
GitHub raises max bug bounty award to $10K - SC Magazine
passwordsarerisky.emc.webcontentor.com
passwordsarerisky.emc.webcontentor.com
Are Your Passwords At Risk?
sdubs.org
sdubs.org
go-junos & Junos Space
www.infosecisland.com
www.infosecisland.com
Digital Reputation: Can’t Buy it, Gotta Earn It
www.net-security.org
www.net-security.org
Canada's spy agency monitors file downloads around the world
www.scmagazine.com
www.scmagazine.com
Wisconsin chiropractic clinic notifies 3,000 patients of insider breach - SC Magazine
krebsonsecurity.com
krebsonsecurity.com
The Internet of Dangerous Things — Krebs on Security
www.trendmicro.com
www.trendmicro.com
Data Privacy and Online Gaming: Why Gamers Make for Ideal Targets - Security News - Trend Micro USA
www.infosecisland.com
www.infosecisland.com
Two-Factor Authentication Transforms Even ‘123456’ Into a Secure Password
www.forbes.com
www.forbes.com
SymantecVoice: The "Unicorn" Budget: Can CIOs And CFOs Agree On IT Spending? - Forbes
www.2600.com
www.2600.com
SOURCE INTERLINK (THE ENTHUSIAST NETWORK) SETTLEMENT OFFERED TO 2600 | 2600
www.securityweek.com
www.securityweek.com
The State of Security this Past Year is a Just a Glimpse of What’s to Come in 2015 | SecurityWeek.Com
www.bankinfosecurity.com
www.bankinfosecurity.com
Card Breach Hints at Lingering Concerns - BankInfoSecurity
www.securitytube.net
www.securitytube.net
Bsides Columbus 2015 - Supply And Demand: Solving The Infosec Talent Shortage
www.business2community.com
www.business2community.com
Email Turns 44 in 2015 [Infographic]
continuitycentral.com
continuitycentral.com
Business continuity briefs
www.infosecisland.com
www.infosecisland.com
Interview with Accuvant co-founder Dan Wilson
twitter.com
twitter.com
The Hacker News sur Twitter : "#Security #php #SQLi and yes, #Concerned http://t.co/vgYSlXlmib"
www.sans.org
www.sans.org
SANS Institute to Bring Cybersecurity Training to Houston | SANS Institute: Press
packetstormsecurity.com
packetstormsecurity.com
SupportCenter Plus 7.9 Cross Site Scripting ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Asterisk Project Security Advisory - AST-2015-001 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Microsoft Windows Server 2003 SP2 Arbitrary Write Privilege Escalation ≈ Packet Storm
www.tripwire.com
www.tripwire.com
Adobe Flash 0-Day Vulnerability Serves Up Bedep Malware on Adult Website
www.esecurityplanet.com
www.esecurityplanet.com
It's Not Easy to Determine Costs of Data Breach - eSecurity Planet
betanews.com
betanews.com
New business collaboration platform secures data with personalized cryptography
www.alienvault.com
www.alienvault.com
3 Simple Steps to improve your Company’s Security DNA | AlienVault
seclists.org
seclists.org
Bugtraq: Blubrry PowerPress Security Advisory - XSS Vulnerability - CVE-2015-1385
go.sourcefire.com
go.sourcefire.com
Cisco Seminar Series 2015 North America Roadshow
www.arnnet.com.au
www.arnnet.com.au
Breaches are a personal nightmare for corporate security pros - ARN
betanews.com
betanews.com
Federal cyber security rules should learn from industry guidelines
packetstormsecurity.com
packetstormsecurity.com
WordPress Photo Gallery 1.2.8 SQL Injection ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Cracking The Hadoop User Experience ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
WordPress Photo Gallery 1.2.8 Cross Site Scripting ≈ Packet Storm
blog.uncommonsensesecurity.com
blog.uncommonsensesecurity.com
Uncommon Sense Security: RSA Conference’s new crowdsourced submissions program
mashable.com
mashable.com
Cyber sleuths find 'smoking gun' linking British spy agency to Regin malware
seclists.org
seclists.org
Bugtraq: CVE-2014-8779: SSH Host keys on Pexip Infinity
www.infosecisland.com
www.infosecisland.com
Suits and Spooks DC 2015: The Agenda - Last Chance to Register
now.avg.com
now.avg.com
Worst passwords of 2014
phys.org
phys.org
Swiss bank on safe haven label to become world's data vault
thehill.com
thehill.com
Lawmakers offer bipartisan data security bill | TheHill
www.zdnet.com
www.zdnet.com
US military explores biometric replacement for passwords | ZDNet
packetstormsecurity.com
packetstormsecurity.com
US Tech Firms Ask China To Postpone 'Intrusive' Rules ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Red Hat Security Advisory 2015-0100-01 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Dutch Judge Allows Russian Hacker To Be Sent To US ≈ Packet Storm
seclists.org
seclists.org
Bugtraq: Cisco Security Advisory: GNU glibc gethostbyname Function Buffer Overflow Vulnerability
seclists.org
seclists.org
Bugtraq: [The ManageOwnage Series, part XII]: Multiple vulnerabilities in FailOverServlet (OpManager, AppManager, IT360)
itexpo.tmcnet.com
itexpo.tmcnet.com
Intel Security to Deliver Keynote at ITEXPO Miami 2015
www.information-age.com
www.information-age.com
Measuring the impact of government cyber security initiatives on enterprise | Information Age
www.washingtontimes.com
www.washingtontimes.com
Coast Guard holds cyber security exercise at UH Manoa - Washington Times
www.virtual-strategy.com
www.virtual-strategy.com
The (ISC)²® Foundation Opens Application Period for 2015 Women’s Information Security Scholarships and Faculty Exam Vouchers | Virtual-Strategy Magazine
packetstormsecurity.com
packetstormsecurity.com
Mantis BugTracker 1.2.19 Open Redirect ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
House Subcommittee Hears Testimony On Data Breach Law ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
FreeBSD Security Advisory - Kernel Memory Disclosure / Corruption ≈ Packet Storm
www.trendmicro.com
www.trendmicro.com
A Global Black Market for Stolen Personal Data
www.theregister.co.uk
www.theregister.co.uk
Snowden reveals LEVITATION technique of Canada’s spies • The Register
www.kaspersky.com
www.kaspersky.com
Contact Information | Contact Us | Kaspersky Lab AU
www.csoonline.com
www.csoonline.com
Criminals holding compromised websites for ransom | CSO Online
www.securitytube.net
www.securitytube.net
Bsides Columbus 2015 - Do We Still Need Pen Testing?
me.kaspersky.com
me.kaspersky.com
المتجر الالكتروني. اشتر برامج مكافحة الفيروسات كاسبرسكي عبر الموقع
www.symantec.com
www.symantec.com
Android in the Enterprise Part 1: Challenges of Android | Symantec Connect
nakedsecurity.sophos.com
nakedsecurity.sophos.com
The GHOST vulnerability – what you need to know | Naked Security
www.zdnet.com
www.zdnet.com
Hackers blackmailed Silk Road underground | ZDNet
csr.cisco.com
csr.cisco.com
CSR Impact Story: CyberPatriot Networking United States @ Cisco
www.freshplaza.com
www.freshplaza.com
Data breach loss capped at $500,000
uk.finance.yahoo.com
uk.finance.yahoo.com
OnX Managed Services and BTB Security Partner for Enhanced Security Solutions - Yahoo Finance UK
www.marketwired.com
www.marketwired.com
Athena and Intrinsic-ID Team to Deliver the Dragon-QT Security Processor Offering Flexible, Scalable Security for Hardware Root of Trust Applications
www.crn.com
www.crn.com
Top 10 Security Vendors To Watch In 2015 - Page: 5 | CRN
twitter.com
twitter.com
RSA Conference sur Twitter : "#TBT to the #cryptographers' panel at #RSAC 2014. RT if you were there! http://t.co/n7CX92UO1R"
www.virtual-strategy.com
www.virtual-strategy.com
Capella University Offers New Graduate Certificates in Digital Forensics and Network Defense | Virtual-Strategy Magazine
now.avg.com
now.avg.com
AVG Technologies to Announce Financial Results | AVG Now Blog
www.schneier.com
www.schneier.com
Schneier on Security: Canada Spies on Internet Downloads
www.theregister.co.uk
www.theregister.co.uk
IBM punts cryptotastic cloudy ID verification services • The Register
www.zdnet.com
www.zdnet.com
Click-fraud ZeroAccess botnet rises from the ashes | ZDNet
www.itwebafrica.com
www.itwebafrica.com
Three key (business continuity) questions that CEOs need to ask - ITWeb Africa
www.wired.com
www.wired.com
These Are the Hottest New Open Source Projects Right Now | WIRED
nakedsecurity.sophos.com
nakedsecurity.sophos.com
Hotels that block personal Wi-Fi hotspots will get busted, says FCC | Naked Security
thehackernews.com
thehackernews.com
17-Year-Old Found Bugs in WhatsApp Web and Mobile App - Hacker News
twitter.com
twitter.com
Cisco Security sur Twitter : "Come check out these beauties at the #security booth! #CLEUR http://t.co/rKMNmRbuiE"
www.businessinsurance.com
www.businessinsurance.com
Data breach loss capped at $500,000 | Business Insurance
www.prweb.com
www.prweb.com
Dallas, TX PCI QSA Services Now Offered by the Texas Payments Experts at NDB Advisory
www.virtual-strategy.com
www.virtual-strategy.com
Comprehensive Global PCI Security Policies Packet Offered for Instant Download from the PCI DSS Specialists at Pcipolicyportal.com | Virtual-Strategy Magazine
www.information-age.com
www.information-age.com
Can your disaster recovery plan save your business? | Information Age
nakedsecurity.sophos.com
nakedsecurity.sophos.com
Cop who stole nude photos from arrested women’s phones escapes jail | Naked Security
www.information-age.com
www.information-age.com
Why data privacy and security should be a boardroom issue | Information Age
nakedsecurity.sophos.com
nakedsecurity.sophos.com
US Military wants “cognitive fingerprints” to replace passwords | Naked Security
www.technologyreview.com
www.technologyreview.com
Weaving the Web from the Crowd Could Make It More Resilient | MIT Technology Review
www.net-security.org
www.net-security.org
Email scammers stole $215M from businesses in 14 months
www.washingtonpost.com
www.washingtonpost.com
Google says it fought gag orders in WikiLeaks investigation - The Washington Post
www.securitytube.net
www.securitytube.net
Bsides Columbus 2015 - Trolling Attackers For Fun &Amp; Profit
nakedsecurity.sophos.com
nakedsecurity.sophos.com
SSCC 183 – It’s Data Privacy Day! Do something! [PODCAST] | Naked Security
www.net-security.org
www.net-security.org
Guidance to improve risk management and Io
twitter.com
twitter.com
Cisco Security sur Twitter : "At #CLEUR? Stop by our booth to talk with our #security experts! @CiscoLiveEurope http://t.co/TceqhVwqSF"
www.techweekeurope.co.uk
www.techweekeurope.co.uk
Could Your Apps Be Putting Your Smartphone At Risk?
www.infosecurity-magazine.com
www.infosecurity-magazine.com
Data Protection Starts with Everyone - Infosecurity Magazine
arstechnica.com
arstechnica.com
Want to spy on your wife? Change your grades? Hire a hacker! | Ars Technica
www.marketwired.com
www.marketwired.com
Crossword Cybersecurity Plc: Commercialisation Agreement with Bristol University Cryptography & Information Security Group
www.net-security.org
www.net-security.org
How much can a DDoS attack cost your organization?
now.avg.com
now.avg.com
Why you should celebrate Data Protection Day 2015
www.net-security.org
www.net-security.org
Companies need to be custodians of customer data, not owners
www.net-security.org
www.net-security.org
Market share of antivirus vendors and products
www.net-security.org
www.net-security.org
Swiss users inundated with malware-laden spam
www.theregister.co.uk
www.theregister.co.uk
Top smut site Flashes visitors, leaves behind nasty virus • The Register
www.sectechno.com
www.sectechno.com
Will 2015 Data Security Be Different Than 2014? | SecTechno
www.securitytube.net
www.securitytube.net
Bsides Columbus 2015 - Inurl:Robots.Txt-What Are You Hiding?
continuitycentral.com
continuitycentral.com
Survey finds increasing demand for disaster recovery solutions amongst US small and medium sized businesses
economictimes.indiatimes.com
economictimes.indiatimes.com
NLSIU wants cyber security lessons in schools, colleges - The Economic Times
www.slideshare.net
www.slideshare.net
A Manifesto for Cyber Resilience
www.tdtnews.com
www.tdtnews.com
Local banks react to data breach - Temple Daily Telegram: News
www.navigantresearch.com
www.navigantresearch.com
» Cloud Connections Bolster In-Vehicle Systems Navigant Research
contagiominidump.blogspot.fr
contagiominidump.blogspot.fr
contagio mobile: Android Hideicon malware samples
marcoramilli.blogspot.fr
marcoramilli.blogspot.fr
Marco Ramilli's Blog: Romantic Cyber Attack Process
www.secureworks.com
www.secureworks.com
ZeroAccess botnet resumes click-fraud activity after six-month break | Dell SecureWorks Security and Compliance Blog
www.eetimes.com
www.eetimes.com
Quantum Entanglement Now On-a-Chip | EE Times
www.theregister.co.uk
www.theregister.co.uk
Mozilla dusts off old servers, lights up Tor relays • The Register
www.kaleo.org
www.kaleo.org
UH hosts national cyber security exercise - Ka Leo O Hawaii: News
www.securitytube.net
www.securitytube.net
Bsides Columbus 2015 - Malware Development As The Evolution Of Parasites
www.symantec.com
www.symantec.com
Linux GHOST vulnerability (CVE-2015-0235) is not as scary as it looks | Symantec Connect
www.net-security.org
www.net-security.org
How GitHub is redefining software development
www.huffingtonpost.com
www.huffingtonpost.com
Business Continuity: 4 Core Principles to Be Successful | Patrick Duroseau
www.youtube.com
www.youtube.com
GHOST glibc gethostbyname() vulnerability CVE-2015-0235 - YouTube
blogs.cisco.com
blogs.cisco.com
CVE-2015-0235: A GHOST in the Machine
www.businesscloudnews.com
www.businesscloudnews.com
Netflix is upgrading its cloud architecture for scale | Business Cloud News
www.sccongress.com
www.sccongress.com
None
vite.io
vite.io
McAfee January #SecChat on Thu, Jan 29 @ 11am. #SecChat
www.theregister.co.uk
www.theregister.co.uk
Researcher says Aussie spooks help code Five Eyes mega malware • The Register
www.scmagazine.com
www.scmagazine.com
Making improved authentication second nature to users - SC Magazine
www.securitytube.net
www.securitytube.net
Bsides Columbus 2015 - Snort Beyond Ids: Open Source Application And File Control
www.symantec.com
www.symantec.com
Turning Mobility to a Winning Advantage | Symantec Connect
www.cio.com
www.cio.com
World's Largest DDoS Attack Reached 400Gbps, says Arbor Networks | CIO
staysafeonline.org
staysafeonline.org
Privacy Tips | StaySafeOnline.org
www.eweek.com
www.eweek.com
Password Practices at Businesses Fall Short of Secure
www.kaleo.org
www.kaleo.org
UH to host national cyber security exercise - Ka Leo O Hawaii: News
www.wired.com
www.wired.com
A Heroin Dealer Tells the Silk Road Jury What It Was Like to Sell Drugs Online | WIRED
www.trendmicro.com
www.trendmicro.com
Mobile Virtualization: Solving the BYOD Problem - Security News - Trend Micro USA
www.pentesteracademy.com
www.pentesteracademy.com
Course Introduction
www.forbes.com
www.forbes.com
Apple iOS 8.1.3 Release Will Again Anger Users - Forbes
www.pcworld.com
www.pcworld.com
FTC calls on IoT vendors to protect privacy | PCWorld
forums.juniper.net
forums.juniper.net
7 Smart Ways to Ensure Data Privacy - J-Net Community
www.theatlantic.com
www.theatlantic.com
What I'll Do With My Parents' Facebook After They Die - The Atlantic
www.securitytube.net
www.securitytube.net
Installation Tutorial - Waidps - Wireless Auditing Intrusion Detection And Prevention System On Kali
googlecloudplatform.blogspot.ca
googlecloudplatform.blogspot.ca
Google Cloud Platform Blog
www.scmagazine.com
www.scmagazine.com
Malware infects payment card system at French Lick Resort - SC Magazine
www.scmagazine.com
www.scmagazine.com
Could the Sony breach have been prevented? - SC Magazine
www.tripwire.com
www.tripwire.com
Don’t be Shellshocked by GHOST | The State of Security
www.scmagazine.com
www.scmagazine.com
FTC publishes security recommendations for IoT device makers - SC Magazine
www.trendmicro.com
www.trendmicro.com
How Vetting Mobile Apps Works for App Stores and Its Users - Security News - Trend Micro USA
arstechnica.com
arstechnica.com
Highly critical “Ghost” allowing code execution affects most Linux systems | Ars Technica
www.scmagazine.com
www.scmagazine.com
House subcommittee hears testimony on data breach law - SC Magazine
www.scmagazine.com
www.scmagazine.com
'GHOST' bug in Linux library enables remote takeover of victim's system - SC Magazine
digitalforensicstips.com
digitalforensicstips.com
SANS 575 Review | Digital Forensics Tips
www.csoonline.com
www.csoonline.com
Businesses warned about new espionage campaigns from of China | CSO Online
www.healio.com
www.healio.com
CABG linked to better outcomes than PCI, but at higher price | Cardiology
www.newsrecord.co
www.newsrecord.co
Mandatory PCI DSS 3.0 Updates for Businesses Accepting Credit Cards - Record
www.surveymonkey.com
www.surveymonkey.com
SANS 2015 Enterprise Mobile Workspace Survey
www.slideshare.net
www.slideshare.net
Search Like A Boss
www.tripwire.com
www.tripwire.com
GHOST Vulnerability and its Patch History
www.scmagazine.com
www.scmagazine.com
How organizations can prepare for 2015 data privacy legislation - SC Magazine
lumiaconversations.microsoft.com
lumiaconversations.microsoft.com
Stop, think, connect: safeguarding your online reputation - Lumia Conversations
s1.securityweek.com
s1.securityweek.com
Researchers Tie Qwerty Keylogger to Regin Malware Platform | SecurityWeek.Com
www.cbronline.com
www.cbronline.com
8 ways to celebrate Data Privacy Day securely - Computer Business Review
www.usatoday.com
www.usatoday.com
It's Data Privacy Day--do you know where your info is?
www.websense.com
www.websense.com
TRITON AP-DATA — Websense.com
www.csoonline.com
www.csoonline.com
DDOS attack size up 50-fold over past decade | CSO Online
blog.azimuthsecurity.com
blog.azimuthsecurity.com
Azimuth Security: BlackPwn: BlackPhone SilentText Type Confusion Vulnerability
channelmarketerreport.com
channelmarketerreport.com
In 2015, Omnichannel And Big Data Will Bring Channel Marketing To The Next Level | Channel Marketer Report
qz.com
qz.com
Cybersecurity is a mess, but Obama can learn a few things from Estonia – and Eugene Kaspersky – Quartz
hackingexposedcomputerforensicsblog.blogspot.fr
hackingexposedcomputerforensicsblog.blogspot.fr
Hacking Exposed Computer Forensics Blog
www.sans.org
www.sans.org
Automating the Incident Response Process - SANS Institute
www.securitytube.net
www.securitytube.net
Wireless Auditing Intrusion Detection And Prevention System - Switching Of Display Information
www.symantec.com
www.symantec.com
Short, sharp spam attacks aiming to spread Dyre financial malware | Symantec Connect
seclists.org
seclists.org
Bugtraq: [SECURITY] [DSA 3143-1] virtualbox security update
www.wired.com
www.wired.com
Canada Joins World Powers in Spying on Smartphone and Download Data | WIRED
www.trendmicro.com
www.trendmicro.com
Instant Anonymity: Are Ephemeral Apps Really Safe? - Security News - Trend Micro USA
en.wikipedia.org
en.wikipedia.org
TEN: The Enthusiast Network - Wikipedia, the free encyclopedia
thoughtsoncloud.com
thoughtsoncloud.com
4 obstacles keeping traditional IT from moving to cloud - Thoughts on Cloud
www.forbes.com
www.forbes.com
Nonprofit Brings Technology To Disaster Recovery - Forbes
www.scmagazine.com
www.scmagazine.com
Dutch judge OKs alleged Russian hacker extradition to U.S. - SC Magazine
forums.juniper.net
forums.juniper.net
Data Privacy and Convenience: Can We Have Both? - J-Net Community
www.lightreading.com
www.lightreading.com
Light Reading
www.tripwire.com
www.tripwire.com
Targeted Scam Cost Businesses $215 Million Using Fraudulent Wire Transfers
www.tripwire.com
www.tripwire.com
GHOST in the Linux Machine – CVE-2015-0235
blogs.microsoft.com
blogs.microsoft.com
Data Privacy Day in a World of Cloud Computing | Cyber Trust Blog
www.trendmicro.com
www.trendmicro.com
Ransomware 101: What It Is and How It Works - Security News - Trend Micro USA
www.sans.org
www.sans.org
SANS Institute Returns to Northern Virginia for Cybersecurity Training Event | SANS Institute: Press
www.infosecisland.com
www.infosecisland.com
Thought Experiment: Mandatory Online Banking Security Standards
www.internetsociety.org
www.internetsociety.org
Four Basic Steps to Protecting Your Digital Privacy in 2015 | Internet Society
now.avg.com
now.avg.com
SXSW 2015: The Challenges Facing Women in Tech
vpnhaus.ncp-e.com
vpnhaus.ncp-e.com
Two-Factor Authentication Transforms Even ‘123456’ Into a Secure Password  « VPN Haus
www.cio.com
www.cio.com
How To Conduct An Information Security Gap Analysis | CIO
www.scmagazine.com
www.scmagazine.com
Researcher commandeers drone through Maldrone backdoor - SC Magazine
outsidelens.scmagazine.com
outsidelens.scmagazine.com
Watch "Silent Circle asks consumers about mobile privacy" Video at SCMagazine
seclists.org
seclists.org
Bugtraq: Multiple vulnerabilities in MantisB
www.thestar.com
www.thestar.com
A peek inside Apple’s R&D wish list. TV reimagined? | Toronto Star
www.broadwayworld.com
www.broadwayworld.com
ClearDATA to Provide Disaster Recovery and HIPAA-Compliant Cloud Solution for Henry Schein's Dentrix Enterprise Practice Management Software
nakedsecurity.sophos.com
nakedsecurity.sophos.com
Massive DEA license plate reader program tracks millions of Americans | Naked Security
www.trendmicro.com
www.trendmicro.com
Improving Your Privacy on Social Networks - Security News - Trend Micro USA
www.scmagazine.com
www.scmagazine.com
CyLon aims to help London-based security startups - SC Magazine
outsidelens.scmagazine.com
outsidelens.scmagazine.com
Watch "FTC releases in-depth IoT report" Video at SCMagazine
ae.rsaconference.com
ae.rsaconference.com
Survey
www.virtualpressoffice.com
www.virtualpressoffice.com
VPO Press Release - PAM4 Analysis, USB 3.1 Compliance, DDR Debug, PCI Express Link Equalization, and 100 GHz Oscilloscope Capabilities Showcased at DesignCon 2015
blogs.microsoft.com
blogs.microsoft.com
Data Privacy Day 2015 – Putting people in control - Microsoft on the Issues
www.securitytube.net
www.securitytube.net
Bsides Winnipeg - Michael Zapp - Ssd Security Risks
seclists.org
seclists.org
Bugtraq: [CVE-2015-1393] Photo Gallery (Wordpress Plugin) - SQL Injection in Version 1.2.8
seclists.org
seclists.org
Bugtraq: Two XSS Vulnerabilities in SupportCenter Plus
www.theguardian.com
www.theguardian.com
Convicting the Silk Road founder won't stop the booming digital drug trade | Mike Power | Comment is free | The Guardian
usa.kaspersky.com
usa.kaspersky.com
A Single DDoS Attack Can Cost A Company More Than $400,000 | Kaspersky Lab US
www.itworld.com
www.itworld.com
Old arguments may bog down US data breach notification legislation | ITworld
twitter.com
twitter.com
RSA Conference sur Twitter : "http://t.co/xpTtlOvdne"
it.tmcnet.com
it.tmcnet.com
Radware Integrates Platforms with Cisco Application-Centric Infrastructure
seclists.org
seclists.org
Bugtraq: [CORE-2015-0003] - FreeBSD Kernel Multiple Vulnerabilities
seclists.org
seclists.org
Bugtraq: NEW VMSA-2015-0001 - VMware vCenter Server, ESXi, Workstation, Player, and Fusion updates address resolve security issues
www.marketwatch.com
www.marketwatch.com
ClearDATA to Provide Disaster Recovery and HIPAA-Compliant Cloud Solution for Henry Schein's Dentrix Enterprise Practice Management Software - MarketWatch
www.juniper.net
www.juniper.net
Day One Posters — Juniper Networks
www.infosecisland.com
www.infosecisland.com
Defeat The Casual Attacker First!!
new.livestream.com
new.livestream.com
Data Privacy Day on Livestream
www.sans.org
www.sans.org
IR Event Log Analysis - SANS Institute
arstechnica.com
arstechnica.com
Lack of encryption makes official NFL mobile app a spear phisher’s dream | Ars Technica
ow.ly
ow.ly
Ow.ly - image uploaded by @DataPrivacyDay
www.huffingtonpost.com
www.huffingtonpost.com
International Privacy Day: Protect Your Digital Footprint | Stewart Wolpin
www.symantec.com
www.symantec.com
New Veritas Name Blends our History and Vision for Tomorrow’s Data Challenges | Symantec Connect
boingboing.net
boingboing.net
2600 Magazine as DRM-free Kindle, PDF ebooks - Boing Boing
twitter.com
twitter.com
Vormetric sur Twitter : "We are thrilled to present Encrypto @RSAConference this year #DataDefenseLeague #DefenderofData #RSAC http://t.co/AIs7PxpRlZ"
blog.radware.com
blog.radware.com
From Point Solutions to Application Centric Services: Cisco ACI and Radware | Radware Blog
www.gurufocus.com
www.gurufocus.com
Value Investing | Market Insight of Investment Gurus
www.spyghana.com
www.spyghana.com
Spy Ghana News-Latest News, Breaking News, Ghana Business, Sports, Politics News
www.thecsuite.co.uk
www.thecsuite.co.uk
Today's CIO @ The C Suite - Information Security: The 3 Key Governance Challenges of the CIO
www.trendmicro.com
www.trendmicro.com
The New Year Security Checklist: Security Resolutions for 2015 - Security News - Trend Micro USA
gigaom.com
gigaom.com
Microsoft’s big task: Replicating Windows-Office success in cloud — Tech News and Analysis
www.marketwired.com
www.marketwired.com
Cosentry Teams With EMC and 451 Research for Disaster Recovery Webinar
nakedsecurity.sophos.com
nakedsecurity.sophos.com
Facebook’s privacy class action lawsuit to be heard on 9 April | Naked Security
www.schneier.com
www.schneier.com
Schneier on Security: Subconscious Keys
www.businesswire.com
www.businesswire.com
PCI Council Champions Global Data Privacy Day | Business Wire
packetstormsecurity.com
packetstormsecurity.com
Ghost Linux Bug Haunting Red Hat And Ubuntu Systems ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Scouts Take Down Database Due To Security Vulnerabilities ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Hacker For Hire Site Surfaces, Has Trouble Staying Up ≈ Packet Storm
www.rsaconference.com
www.rsaconference.com
The Practical Guide to HIPAA Privacy and Security Compliance – Blog Post – RSA Conference
www.net-security.org
www.net-security.org
Reactions to the serious vulnerability found in Glibc
www.theregister.co.uk
www.theregister.co.uk
Scouts take down database due to 'security vulnerabilities' • The Register
www.net-security.org
www.net-security.org
Critical BlackPhone bug allows attackers to spy on users
twitter.com
twitter.com
Cisco Security sur Twitter : "Have you stopped by our #CLEUR booth yet? Find out the latest in #security from our experts! http://t.co/qj8MUfVjW2"
www.securitytube.net
www.securitytube.net
Bsides Winnipeg - Yvan Boily - Security In The Open
www.reuters.com
www.reuters.com
Spying program leaked by Snowden is tied to campaign in many countries| Reuters
www.cyber-resilient.com
www.cyber-resilient.com
Symantec Cyber-Resilent Enterprise
isleofman.com
isleofman.com
isleofman.com
www.thelawyer.com
www.thelawyer.com
The new norm — PCI DSS v3.0 takes effect | Briefings | The Lawyer
staysafeonline.org
staysafeonline.org
About | StaySafeOnline.org
thehackernews.com
thehackernews.com
Ultra-secure Blackphone Vulnerability lets Hackers Decrypt Texts - Hacker News
www.csoonline.com
www.csoonline.com
Old arguments may bog down US data breach notification legislation | CSO Online
nakedsecurity.sophos.com
nakedsecurity.sophos.com
Bughunter cracks “absolute privacy” Blackphone – by sending it a text message | Naked Security
www.zdnet.com
www.zdnet.com
Search Google without being tracked: Abine adds Private Search to Blur | ZDNet
www.zdnet.com
www.zdnet.com
Infamous Regin malware linked to spy tools used by NSA, Five Eyes intelligence | ZDNet
www.theregister.co.uk
www.theregister.co.uk
I ain't afraid of no GHOST – securo-bods • The Register
www.computerworld.com
www.computerworld.com
Google defends policy that leaves most Android devices unpatched | Computerworld
www.wired.com
www.wired.com
No, Department of Justice, 80 Percent of Tor Traffic Is Not Child Porn | WIRED
www.gizmodo.co.uk
www.gizmodo.co.uk
Turns Out Apple Pay Can't Solve Credit Card Fraud | Gizmodo UK
www.csoonline.com
www.csoonline.com
'Ghost' vulnerability poses high risk to Linux distributions | CSO Online
www.net-security.org
www.net-security.org
How important is online privacy?
www.net-security.org
www.net-security.org
New OS X Yosemite version fixes critical security issues, including Thunderstrike
twitter.com
twitter.com
Cisco Security sur Twitter : "#CLEUR | Join @mroesch today at 15:30 for his session on Embracing the Open-Source Model #security http://t.co/87zM5sypHs"
community.websense.com
community.websense.com
CVE-2015-0235 - how to handle the "GHOST" vulnerability affecting Linux distributions
www.zdnet.com
www.zdnet.com
Security vulnerability in Blackphone service exposed | ZDNet
nakedsecurity.sophos.com
nakedsecurity.sophos.com
The “Dirty Dozen” SPAMPIONSHIP: Who’s the biggest? Who’s the worst? | Naked Security
nakedsecurity.sophos.com
nakedsecurity.sophos.com
Ubisoft yanks keys for online games purchased via unauthorised parties | Naked Security
www.csoonline.com
www.csoonline.com
5 things you can do to limit your exposure to insider threats | CSO Online
www.net-security.org
www.net-security.org
Hijacking drones with malware
www.infosecisland.com
www.infosecisland.com
New Legislation on Threat Intelligence Sharing May Have a Chance
seclists.org
seclists.org
Information Security News: World's largest DDoS attack reached 400Gbps,says Arbor Networks
seclists.org
seclists.org
Information Security News: Northrop Grumman Foundation Congratulates Top 28 Teams Advancing to CyberPatriot National Finals Competition
www.symantec.com
www.symantec.com
Join Symantec at LegalTech NY | February 3-5, 2015 | Symantec Connect
www.pressreleaserocket.net
www.pressreleaserocket.net
Industry Leading 2015 Information Security Policies and Procedures Now Available for Immediate Download from the Cyber Security Experts at myinformationsecuritypolicy.com – Press Release Rocket
thehackernews.com
thehackernews.com
Links Found between NSA, Regin Spy tool and QWERTY Keylogger - Hacker News
www.securitytube.net
www.securitytube.net
Bsides Winnipeg - Closing Ceremonies Bsides Winnipeg 2013
www.crn.com
www.crn.com
Rising Tide Of Malware Alerts Proving Costly, Study Finds - Page: 1 | CRN
www.csoonline.com
www.csoonline.com
Sutter Health California Pacific Medical Center audit uncovers data breach | CSO Online
www.virtual-strategy.com
www.virtual-strategy.com
Industry Leading 2015 Information Security Policies and Procedures Now Available for Immediate Download from the Cyber Security Experts at myinformationsecuritypolicy.com | Virtual-Strategy Magazine
www.computerworld.com
www.computerworld.com
Be prepared for the breach that’s headed your way | Computerworld
www.net-security.org
www.net-security.org
Multiple vulnerabilities in the FreeBSD kernel code
www.net-security.org
www.net-security.org
4 tips to make data protection everyone's business
arstechnica.com
arstechnica.com
The Internet of Things just got a watchdog: FTC issues official report | Ars Technica
www.natlawreview.com
www.natlawreview.com
House Debates Federal Data Breach Legislation | The National Law Review
staysafeonline.org
staysafeonline.org
Landing Page | StaySafeOnline.org
www.pentesteracademy.com
www.pentesteracademy.com
Challenge 31: XSS XII
www.marketwired.com
www.marketwired.com
Five Top Disaster Recovery Services Announced in January 2015 by topcreditcardprocessors.com
thehackernews.com
thehackernews.com
Critical GHOST vulnerability affects most Linux Systems - Hacker News
www.net-security.org
www.net-security.org
IBM's sophisticated cryptographic algorithm protects your identity
www.theregister.co.uk
www.theregister.co.uk
Regin super-malware has Five Eyes fingerprints all over it says Kaspersky • The Register
www.securitytube.net
www.securitytube.net
Bsides Winnipeg - Kyle Geske - Internet Bots For Fun And No Profit
www.net-security.org
www.net-security.org
IoT security and privacy best practices
blog.trendmicro.com
blog.trendmicro.com
CVE-2015-0016: Escaping the Internet Explorer Sandbox
gigaom.com
gigaom.com
Malware makers try to cash in with fake YouTube views — Tech News and Analysis
thehackernews.com
thehackernews.com
Taylor Swift's Twitter and Instagram Accounts Hacked - Hacker News
www.businessspectator.com.au
www.businessspectator.com.au
Big data is a privacy minefield | Business Spectator
www.securitytube.net
www.securitytube.net
Bsides Winnipeg - Sergii Polishcuk - Arp Attack On Ixp Infrastructure
www.net-security.org
www.net-security.org
How the Internet of Things impacts enterprise security
www.tripwire.com
www.tripwire.com
VERT Alert: GHOST - glibc overflow | The State of Security
www.net-security.org
www.net-security.org
Click-fraud malware brings thousands of dollars to YouTube scammers
www.darkreading.com
www.darkreading.com
Building A Cybersecurity Program: 3 Tips
www.openwall.com
www.openwall.com
oss-security - Qualys Security Advisory CVE-2015-0235 - GHOST: glibc gethostbyname buffer overflow
www.forbes.com
www.forbes.com
The Big Data Mistake In The Internet Of Things - Forbes
www.tripwire.com
www.tripwire.com
Thought Experiment: Mandatory On-line Banking Security Standards.
www.fireeye.com
www.fireeye.com
A Different Exploit Angle on Adobe's Recent Zero-Day « Threat Research | FireEye Inc
newsroom.cisco.com
newsroom.cisco.com
Security in a Connected Home | The Network
thehackernews.tradepub.com
thehackernews.tradepub.com
4 Promising Linux Distros To Look Forward To In 2015 Free eGuide
www.theregister.co.uk
www.theregister.co.uk
Oz spooks hack, wreck Middle East 'cooling system': report • The Register
www.forbes.com
www.forbes.com
Maldrone: Watch Malware That Wants To Spread Its Wings Kill A Drone Mid-Flight - Forbes
www.scmagazine.com
www.scmagazine.com
Size and frequency of DDoS attacks increasing, annual report shows - SC Magazine
www.securitytube.net
www.securitytube.net
Bsides Winnipeg - Theo Baschak - Infosec From An Isp Perspective
www.symantec.com
www.symantec.com
NetBackup 7.6.1 Highlights | Symantec Connect
www.csoonline.com
www.csoonline.com
Twenty-eight percent of security spending wasted on shelfware | CSO Online
www.symantec.com
www.symantec.com
Symantec partners with Global Fund for Women to help close gender gap in STEM | Symantec Connect
blog.trendmicro.com
blog.trendmicro.com
In-Depth Look: APT Tools of the Trade | TrendLabs Security Intelligence Blog
nakedsecurity.sophos.com
nakedsecurity.sophos.com
Pinterest to sell ads based on what you’re thinking of buying | Naked Security
nakedsecurity.sophos.com
nakedsecurity.sophos.com
Google asked to muzzle Waze ‘police-stalking’ app | Naked Security
nakedsecurity.sophos.com
nakedsecurity.sophos.com
Lizard Squad took down Facebook and Instagram! Believe it! Or not… | Naked Security
www.net-security.org
www.net-security.org
Evidence shows Regin spy malware is used by Five Eyes intelligence
www.techrepublic.com
www.techrepublic.com
Apple preparing fix for Thunderstrike malware in upcoming OS X 10.10.2 release - TechRepublic
packetstormsecurity.com
packetstormsecurity.com
Clam AntiVirus Toolkit 0.98.6 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
FreeBSD Kernel Crash / Code Execution / Disclosure ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Ubuntu Security Notice USN-2486-1 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Red Hat Security Advisory 2015-0087-01 ≈ Packet Storm
www.theregister.co.uk
www.theregister.co.uk
'Boozed up' US drone spook CRASHED UFO into US White House • The Register
www.sans.org
www.sans.org
SANS Institute
www.youtube.com
www.youtube.com
Embed Cloud Security - YouTube
www.pentesteracademy.com
www.pentesteracademy.com
DLL Injection using AppInit_DLLs Part 2
fcw.com
fcw.com
Fed data at risk in attacks on university computers -- FCW
techcrunch.com
techcrunch.com
Europe Gets A Cyber Security Incubator | TechCrunch
www.tripwire.com
www.tripwire.com
Data Privacy Day Raises Awareness on Consumer Privacy, Cybersecurity Best Practice
www.cso.com.au
www.cso.com.au
Australian information security posture weak by world standards: Cisco - CSO | The Resource for Data Security Executives
ow.ly
ow.ly
Ow.ly - image uploaded by @TheHackersNews (The Hacker News™)
www.securitytube.net
www.securitytube.net
Bsides Winnipeg - Josh More - Security Metaphors: Discussing Problems With Others While Avoiding Arguments
thehackernews.com
thehackernews.com
Apple Releases iOS 8.1.3 - Hacker News
www.scmagazine.com
www.scmagazine.com
Firm finds link between Regin spy tool and QWERTY keylogger - SC Magazine
www.trendmicro.com
www.trendmicro.com
Trend Micro Safe Mobile Workforce - Trend Micro USA
www.scmagazine.com
www.scmagazine.com
Insider threats changing security spending, report says - SC Magazine
www.scmagazine.com
www.scmagazine.com
Insurer sues web designer in bank breach - SC Magazine
www.theregister.co.uk
www.theregister.co.uk
'Super-secure' BlackPhone pwned by super-silly txt msg bug • The Register
seclists.org
seclists.org
Bugtraq: APPLE-SA-2015-01-27-3 Safari 8.0.3, Safari 7.1.3, and Safari 6.2.3
seclists.org
seclists.org
Bugtraq: APPLE-SA-2015-01-27-4 OS X 10.10.2 and Security Update 2015-001
www.kaspersky.co.uk
www.kaspersky.co.uk
Contact Kaspersky Via Phone or Email | Kaspersky Lab GB
economictimes.indiatimes.com
economictimes.indiatimes.com
India’s cyber-security budget 'woefully inadequate': Experts - The Economic Times
www.scmagazine.com
www.scmagazine.com
Marriott fixes Android app issue that may have exposed personal data - SC Magazine
www.theregister.co.uk
www.theregister.co.uk
BOO! Grave remote-code exec bug in GNU C Library haunts Linux • The Register
www.theregister.co.uk
www.theregister.co.uk
FUMBLE! NFL app drops privacy ball in time for Superbowl Sunday • The Register
www.theverge.com
www.theverge.com
The Internet of Things is going to be a legal nightmare | The Verge
www.scmagazine.com
www.scmagazine.com
New attack uses ransomware to drop trojans and keyloggers - SC Magazine
www.mrt.com
www.mrt.com
Data Privacy Day raises focus on need to protect personal data - MRT.com: Business
www.jamaicaobserver.com
www.jamaicaobserver.com
National Cyber Security Strategy to be launched - Latest News - JamaicaObserver.com
www.law360.com
www.law360.com
Retail Groups Want Data Breach Law With Broad Preemption - Law360
investor.juniper.net
investor.juniper.net
Juniper Networks - Q4 2014 Financial Results Conference Call
securityledger.com
securityledger.com
Why Network Segmentation is Imperative on the Internet of Things | The Security Ledger
investor.juniper.net
investor.juniper.net
Juniper Networks - Juniper Networks Reports Preliminary Fourth Quarter and Fiscal Year 2014 Financial Results
www.theregister.co.uk
www.theregister.co.uk
FTC to Internet of Stuff: Security, motherf****r, do you speak it? • The Register
giphy.com
giphy.com
Lizard Animated GIF
www.trendmicro.com
www.trendmicro.com
Hacked or Spoofed: Digging into the Malaysia Airlines Website Compromise - Security News - Trend Micro USA
pages.email.rsaconference.com
pages.email.rsaconference.com
Watch "Reading the Tea Leaves of the RSAC Submissions" webcast
twitter.com
twitter.com
AVGFree sur Twitter : "Which is your favorite AVG product? If you could change one thing about that product, what would it be? http://t.co/06WYe2ul51"
www.theregister.co.uk
www.theregister.co.uk
Another day, yet another emergency Adobe Flash patch. Because that's how we live now • The Register
www.pentesteracademy.com
www.pentesteracademy.com
Module 3: Programming with Scapy
www.infosecisland.com
www.infosecisland.com
Google Says It’s Not Practical to Fix Flaws in Pre-KitKat Android
www.securitytube.net
www.securitytube.net
Bsides Winnipeg - Mark Jenkins - Auditable Offline Bitcoin Wallet Implementation
packetstormsecurity.com
packetstormsecurity.com
SEANux 1.0 Remote Code Execution ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Red Hat Security Advisory 2015-0092-01 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Qualys Security Advisory - glibc gethostbyname Buffer Overflow ≈ Packet Storm
www.net-security.org
www.net-security.org
High severity vulnerability found in Linux GNU C library
www.scmagazine.com
www.scmagazine.com
Adobe releases another Flash zero-day fix - SC Magazine
packetstormsecurity.com
packetstormsecurity.com
Apache Qpid 0.30 Crash ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Apache Qpid 0.30 Anonymous Action Prevention ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
BSides SF 2015 Call For Papers ≈ Packet Storm
www.scmagazine.com
www.scmagazine.com
Sony begins accepting claims in proposed PSN settlement - SC Magazine
rooksecurity.com
rooksecurity.com
CISOs Need a Board Coach - Rook Security
www.schneier.com
www.schneier.com
Schneier on Security: Police Using Radar that Sees Through Walls
www.youtube.com
www.youtube.com
Cisco Security Manifesto - YouTube
www.theguardian.com
www.theguardian.com
Judith Rodin's warning for the world: 'Crisis is becoming the new normal' | Cities | The Guardian
www.csoonline.com
www.csoonline.com
Report: Organizations concerned about risk from insider attacks | CSO Online
www.scmagazine.com
www.scmagazine.com
Apple readies Thunderstrike fix for upcoming OS X release - SC Magazine
www.cnbc.com
www.cnbc.com
Cyberterrorists to target critical infrastructure
lpportal.com
lpportal.com
RILA Outlines Key Elements of Data Breach Legislation at Energy & Commerce Subcommittee Hearing | LP Magazine
www.csoonline.com
www.csoonline.com
'Mastermind' hacker steals 20 million credentials from dating website | CSO Online
www.youtube.com
www.youtube.com
Junos Space Log Director Installation - YouTube
www.infosecisland.com
www.infosecisland.com
Do You Want “Security Analytics” Or Do You Just Hate Your SIEM?
hbr.org
hbr.org
The Strategic Value of APIs - HBR
thehill.com
thehill.com
Lawmakers see momentum for legislation on data breaches | TheHill
www.scmagazine.com
www.scmagazine.com
Former California pharmacist employee accessed data without business or treatment purpose - SC Magazine
packetstormsecurity.com
packetstormsecurity.com
Debian Security Advisory 3141-1 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Debian Security Advisory 3142-1 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Ubuntu Security Notice USN-2485-1 ≈ Packet Storm
seclists.org
seclists.org
Bugtraq: Qualys Security Advisory CVE-2015-0235 - GHOST: glibc gethostbyname buffer overflow
www.smallbusinesscomputing.com
www.smallbusinesscomputing.com
Top 3 Small Business Tech Trends for 2015
www.cbronline.com
www.cbronline.com
Northrop Grumman to provide cyber security to UK Gov't - Computer Business Review
spectrum.ieee.org
spectrum.ieee.org
Rooting Out Malware With a Side-Channel Chip Defense System - IEEE Spectrum
www.securitytube.net
www.securitytube.net
Bsides Winnipeg - Jared Bater And Chris Kluka - Canadian Cyber Defence Challenge: Building A War Zone
blogs.cisco.com
blogs.cisco.com
Reducing the Attack Surface: Takeaways from the 2015 Annual Security Report
www.networkworld.com
www.networkworld.com
PCI DSS 3.0 went into effect Jan. 1. Are you in compliance? | Network World
www.perezstart.com
www.perezstart.com
PerezStart - Video Gaming and Movies on Xbox 360, PS3, Wii and Atari! Anime, Otaku and Cosplay.
nrf.com
nrf.com
Retailers Reiterate Support for Federal Data Breach Notification Standard | NRF
www.trendmicro.com
www.trendmicro.com
From Infection to Extortion: Watch TorrentLocker In Action - Security News - Trend Micro USA
thehackernews.com
thehackernews.com
Apple OS X Yosemite 10.10.2 Update to Patch years-old Thunderstrike vulnerability - Hacker News
seclists.org
seclists.org
Bugtraq: [SECURITY] [DSA 3141-1] wireshark security update
seclists.org
seclists.org
Bugtraq: [SECURITY] [DSA 3142-1] eglibc security update
www.microsoft.com
www.microsoft.com
Reengineering the tech platform for the new era of manufacturing
gregorydevans.com
gregorydevans.com
April 20 – 24, 2015- RSA Conference United States 2015 - Gregory D. Evans | Worlds No. 1 Security Consultant | By Gregory Evans
www.net-security.org
www.net-security.org
Why Google won't be updating pre-KitKat WebKit anymore
seclists.org
seclists.org
Bugtraq: [SYSS-2014-013] FancyFon FAMOC - Use of a One-Way Hash without a Salt
seclists.org
seclists.org
Bugtraq: [SECURITY] [DSA 3140-1] xen security update
blog.radware.com
blog.radware.com
Results Rely on Security Confidence | Radware Blog
www.tweaktown.com
www.tweaktown.com
Kaspersky: 32% of users don't take precautions when sharing devices
www.business2community.com
www.business2community.com
How CRM Changed Cloud and Cloud Changed CRM
www.virtual-strategy.com
www.virtual-strategy.com
Historic Blizzard or an Opportunity to Test Your Business Continuity Plan? | Virtual-Strategy Magazine
packetstormsecurity.com
packetstormsecurity.com
Red Hat Security Advisory 2015-0085-01 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Apple Patch Shields Macs From Thunderstrike ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Red Hat Security Advisory 2015-0086-01 ≈ Packet Storm
www.infosecisland.com
www.infosecisland.com
End of Life
www.net-security.org
www.net-security.org
Supposedly clean Office documents download malware
www.theregister.co.uk
www.theregister.co.uk
Anonymous: Snap on that Guy Fawkes mask, we're marching against child sex abuse • The Register
www.tripwire.com
www.tripwire.com
Give01Day and IASME Partner to Secure UK Charities
packetstormsecurity.com
packetstormsecurity.com
Ubuntu Security Notice USN-2484-1 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Spies Track Mobile Users With BADASS Tracker ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Ubuntu Security Notice USN-2483-1 ≈ Packet Storm
www.securitytube.net
www.securitytube.net
Bsides Winnipeg - Richard Rodd And Chris Otto - Usb: A Look Inside
www.einnews.com
www.einnews.com
Robust information security proven to reduce data breach costs - EIN News
krebsonsecurity.com
krebsonsecurity.com
Yet Another Emergency Flash Player Patch — Krebs on Security
www.broadwayworld.com
www.broadwayworld.com
New Collaboration Platform Witkit Introduces Personalized Cryptography to Prevent Data Breaches
securitywatch.pcmag.com
securitywatch.pcmag.com
Windows 10: What's New in Security?
www.theage.com.au
www.theage.com.au
US scrambling to hire enough cyber security agents to protect itself
www.net-security.org
www.net-security.org
APT gear: Custom Windows task hiding tool
www.theregister.co.uk
www.theregister.co.uk
Meat puppet security sucks... let machines find your flaws • The Register
now.avg.com
now.avg.com
Will 2015 be the biggest yet for Cybersecurity?
www.schneier.com
www.schneier.com
Schneier on Security: The IDEA Encryption Algorithm with a 128-bit Block Length
twitter.com
twitter.com
Cisco Security sur Twitter : "#CLEUR | Don't miss our #Security Keynote with SVP David Goeckeler TODAY at 16:45! http://t.co/OX8otuOauZ"
www.csoonline.com
www.csoonline.com
Link between NSA and Regin cyberespionage malware becomes clearer | CSO Online
www.cbronline.com
www.cbronline.com
CEO's must become fluent in language of cyber security - Computer Business Review
www.ubergizmo.com
www.ubergizmo.com
Marriott’s Android App Found To Have Exposed Customers Credit Card Data
www.prweb.com
www.prweb.com
Austin, TX PCI QSA Services Now Offered by the North American Payments Experts at NDB Advisory
www.zdnet.com
www.zdnet.com
Maldrone: Malware which hijacks your personal drone | ZDNet
www.securitytube-training.com
www.securitytube-training.com
Python for Pentesters and Hackers « SecurityTube Trainings
www.csoonline.com
www.csoonline.com
China signals censors will continue to crack down on VPN services | CSO Online
www.csoonline.com
www.csoonline.com
Startup finds malware intrusions by keeping an eye on processor radio frequencies | CSO Online
www.tripwire.com
www.tripwire.com
Marriott Customers' Personal Details Exposed by Simple Web Flaw
www.arnnet.com.au
www.arnnet.com.au
US startup finds malware intrusions by keeping an eye on processor radio frequencies - ARN
www.theregister.co.uk
www.theregister.co.uk
Facebook pours cold water on Lizard Squad: Takedown? YOU WISH! • The Register
www.theregister.co.uk
www.theregister.co.uk
Keylogger: Somebody STOP ME! Oh hang on, I just did • The Register
www.prnewswire.com
www.prnewswire.com
Northrop Grumman Awarded Cyber Security Contract by UK Government -- LONDON, Jan. 27, 2015 /PRNewswire/ --
thehackernews.com
thehackernews.com
Entangled Photons on Silicon Chip: Secure Communications & Ultrafast Computers - Hacker News
www.cio.com
www.cio.com
5 Myths (Debunked) About Security and Privacy for Internet of Things | CIO
www.pentesteracademy.com
www.pentesteracademy.com
The Stack
www.nationaljournal.com
www.nationaljournal.com
Will Congress Answer Obama’s Call for Data-Breach Law? - NationalJournal.com
www.wired.com
www.wired.com
Silicon Valley Has Lost Its Way. Can Skateboarding Legend Rodney Mullen Help It? | WIRED
community.websense.com
community.websense.com
Flash forward – Angler, here we come
www.reuters.com
www.reuters.com
Singapore ups the ante in cyber security fight| Reuters
globenewswire.com
globenewswire.com
Northrop Grumman Awarded Cyber Security Contract by UK Government NYSE:NOC
www.net-security.org
www.net-security.org
Android Wi-Fi Direct DoS vulnerability discovered
www.crn.com
www.crn.com
Data Breaches Drive Investments In Security Response, Data Protection - Page: 1 | CRN
thehackernews.com
thehackernews.com
Android Wi-Fi Direct Vulnerability Lets Hackers to Kick your Devices OFF - Hacker News
www.securitytube.net
www.securitytube.net
Bsides Winnipeg - Leslie Bester - Voip And Voip Related Fraud
www.darkreading.com
www.darkreading.com
Gas Stations Urged To Secure Exposed Fuel Tank Devices
www.einnews.com
www.einnews.com
IT Governance becomes first in the UK with CISSP CBK 2015 training course - EIN News
www.csoonline.com
www.csoonline.com
Facebook says that outage was technical, not DDoS related | CSO Online
thehackernews.com
thehackernews.com
MalDrone — First Ever Backdoor Malware for Drones - Hacker News
seclists.org
seclists.org
Bugtraq: CVE-2015-0224: qpidd can be crashed by unauthenticated user
seclists.org
seclists.org
Bugtraq: CVE-2015-0223: anonymous access to qpidd cannot be prevented
seclists.org
seclists.org
Information Security News: The tooth gnashing you hear is from Flash users installing a new 0day patch
www.channelnewsasia.com
www.channelnewsasia.com
Government to set up Cyber Security Agency - Channel NewsAsia
www.newelectronics.co.uk
www.newelectronics.co.uk
Micro ring could hasten the adoption of quantum cryptography
www.net-security.org
www.net-security.org
The impact of new EU security legislation
www.theregister.co.uk
www.theregister.co.uk
Apple patch shields Macs from Thunderstrike • The Register
insurancenewsnet.com
insurancenewsnet.com
IDT911 Consulting Grows Cybersecurity and Breach Expertise with Addition of Privacy, Security and Information Governance Advisors
continuitycentral.com
continuitycentral.com
Information security: why we should talk about incident response
www.net-security.org
www.net-security.org
Video: Bruce Schneier talks to Edward Snowden
www.net-security.org
www.net-security.org
Employees would sell passwords for $150
www.theregister.co.uk
www.theregister.co.uk
Jellybean upgrade too hard for Choc Factory, but not for YOU • The Register
www.securitytube.net
www.securitytube.net
Bsides Winnipeg - Brandon Enright - Detecting Malicious Activity And Malware On A Large Network
www.pcworld.com
www.pcworld.com
Success! Hardly anyone uses 'password' as their password anymore | PCWorld
www.natlawreview.com
www.natlawreview.com
House Subcommittee to Hold Hearing and Begin Drafting Data Breach Bill | The National Law Review