Hacking Wi-Fi is child's play
Entanglement On a Chip - IEEE Spectrum
Spreading the Disease and Selling the Cure — Krebs on Security
Lizard Squad Hacks Malaysia Airlines Website, Warns of ‘Dumping’ User Data
Report: Most U.S. weapons programs contain 'significant vulnerabilities' - SC Magazine
The New Year Security Checklist: Security Resolutions for 2015 - Security News - Trend Micro USA
The dangers of relying on our smart devices
Banks Want Merchants to Chip in After a Data Breach | Corporate Counsel
20 million users' information compromised on Russian dating site - SC Magazine
Virtual Chassis Fabric: Automatic Software Upgrades - YouTube
How we can each fight cybercrime with smarter habits
Risk Management Framework: Four Things to Like | Core Security | Core Security Blog
Cisco 2015 Annual Security Report Overview - YouTube
Albany health system notifies more than 5,000 patients of data breach - SC Magazine
Trend Micro Safe Mobile Workforce - Trend Micro USA - image uploaded by @DataPrivacyDay
CISOs Need a Board Coach – Blog Post – RSA Conference
Using Ansible to deploy Juniper configurations | MyTeneo!!!
Presidential Proposals and Good Governance - Websense Insights
Who's Using Cyberthreat Intelligence and How? Part 2: Best Practices to Improve Incident Detection and Response - SANS Institute
Automating Defenses Against Increasingly Sophisticated DDoS Attacks
Rise Of The Data Force: The Emergence Of The Chief Data Officer | BCW
Breakthrough Promises Secure Communications & Faster Computers - image uploaded by @STOPTHNKCONNEC
From Inside the Cloud: What commitments does Microsoft make when you subscribe to Office 365? - Office Blogs
SANS Institute
What makes phishing emails so successful?
Adobe gets second Flash zero-day patch ready 2 days early! | Naked Security
Eleventh Circuit dismisses LabMD motion questioning FTC authority - SC Magazine
The 3 biggest networking shifts, from the new Juniper CEO | Digital News Asia
Rooted Con 2014 - Raul Siles – Ios: Back To The Future
Secure Remote Access During Holidays
Study: Executives Unconcerned About the Risks IoT Poses to Their Networks
Hacked or Spoofed: Digging into the Malaysia Airlines Website Compromise - Security News - Trend Micro USA
VPN services blocked by China's Great Firewall
What Is the Main Difference Between Mobile Web Optimization and Desktop Optimization - Radware - YouTube
Brits need chutzpah to copy Israeli cyberspies' tech creche – ex-spooks • The Register
Ransomware 101: What It Is and How It Works - Security News - Trend Micro USA
Hoax Caller Chats With David Cameron By Posing As GCHQ Boss ≈ Packet Storm
Millions Of PSN Hack Victims Finally Get Compensated ≈ Packet Storm
Adobe Rushes Fix For Second Flash Player Zero-Day ≈ Packet Storm
Mouse-Box — An Entire Computer inside a Mouse - Hacker News
WDET Shows - Detroit Today - Why Cyber Security Is Important For The Government And At Home
The State of Obama Cybercare
WikiLeaks demands answers after Google hands staff emails to US government | Technology | The Guardian
Eugene Kaspersky: Cybersecurity Criminals 'Are Getting More And More Professional'
How GitHub is redefining software development
Kaspersky Think Security Guide - Data Privacy Day 2015
Three Reasons Big Companies Should Work With Security Startups - Forbes
Entanglement on a chip: Breakthrough promises secure communications and faster computers
Consumer Support Contacts
How to improve computer performance by configuring Kaspersky Internet Security 2015
The Supply, Demand, and Cost of Your Data - Security News - Trend Micro USA
Myth 1: Dispelling The Myths around Software Tokens - YouTube
Police ransomware scam drives UK teen to suicide
Task 5: Social Engineering
Stealth Mode: Lying in Wait Inside the White House’s Network
Symantec sources claim exec teams in place by April Fools' Day • The Register
Rooted Con 2014 - Chema Alonso – Playing And Hacking With Digital Latches
Maximizing Business Continuity Success
Calgary to host cyber security summit for energy industry | News Talk 770 (CHQR)
The Pirate Bay Updated With Phoenix Image and Set to return on 1 February - Hacker News
Google defends policy that leaves most Android devices unpatched | CSO Online
Adobe updates Flash Player again, plugs 0-day exploited by Angler
Cybersecurity startup scene in Boston is 'frothy,' RSA exec says - Boston Business Journal
20 Million Credentials Stolen From Russian Dating Site 'Topface' - Hacker News
More Than Just a Pretty Dashboard – Cisco ISE and Splunk Turn Event Data Analysis into Action
Malaysia Airlines attacked, big data dump threatened | CSO Online
Hackers can Spoof AT&T; Phone Messages to steal your Information - Hacker News
Google explains why it's not fixing web security in old Android phones
Lizard Squad threatens Malaysia Airlines with data dump: We DID TOO hack your site • The Register
Apple readies fix for Thunderstrike bootkit exploit in next OS X release | Ars Technica
Challenge 6: Digest Authentication Reloaded
Experian Data Breach Resolution and BillGuard collaborate to transform data breach response with launch of an active fraud surveillance and identity theft resolution offering
NDB Advisory Announces Comprehensive PCI DSS QSA Consulting and Compliance Services for South Florida Merchants and Service Providers – Press Release Rocket
Deconstructing an IRS Phishing scam | CSO Online
Hoaxer posing as GCHQ boss prank-calls PM Cameron • The Register
How the Internet of Things impacts enterprise security
Florida Colleges Rushing to Offer Degrees in Cybersecurity
Rooted Con 2014 - Roberto Baratta - Security Monetization: More With Less To More With Nothing
Open source software for quantum information
Google Chairman Eric Schmidt: "The Internet Will Disappear" - The Hollywood Reporter
Website Defacement - Definition - Trend Micro USA
Analyzing CVE-2015-0311: Flash Zero Day Vulnerability
'Smart' keyboard knows you - Technology News - redOrbit
BRIEF-Bluedon Information Security Technologies gets regulatory approval for assets acquisition| Reuters
Google Play Store Host Application That Steal Users Account | SecTechno
Day-Con IX 2015
APTs: Minimizing losses with early detection
Cartero- E-Mail phishing framework | SecTechno
‘An Inside Look at Disaster Recovery Planning’
What is Assembly Language?
Rooted Con 2014 - Joaquín Moreno - Low Level Forensics On Mac Os X
BEST Practices for a Secure Android Phone | SecTechno
Microsoft wants Windows 10 everywhere, including on your head, starting in 2015
Mozilla Wants To Bring Virtual Reality To The Browser | TechCrunch
SCADA programmers? Time for security by default! 60 Sec Security | Naked Security
A Weekend on Bitcoin | MIT Technology Review
Rooted Con 2014 - Borja Berástegui - Handware Hacking: If No Input No Danger
Blackhat – A Tale of Cyber Security Buffoonery and ‘Human Error’
Vulnerability Scoring 103
The future of machines with feelings
Rooted Con 2014 - Hugo Teso - Going Deeper On Aviation Security
WTF! It Should Not Be Illegal to Hack Your Own Car's Computer | WIRED
John Matherly sur Twitter : "This sort of advice is why control systems are on the Internet (cc @PatStave)"
Privilege Escalation via DLL Hijacking
Your Small Business Checklist for PCI Compliance,
Endpoint Security: Protecting against the Next Generation of Attacks -
Rooted Con 2014 - Juan Vázquez And Julian Vilas - Kicking With My Scada
iCloud is a major weakness: will Apple ever fix it? | Cloud Services News | TechRadar
Challenge 32: XSS XIII
Watch "Police arrest man suspected of hacking Madonna's computer" Video at SCMagazine
Trend Micro sur Twitter : "Growth of malicious and high-risk apps in 2014"
The Hacker News sur Twitter : "Wish u all a very very Happy 66th Republic Day. #India #26January #RepublicDay #JaiHind #JaiHo #ObamaInIndia"
Tighter Control Over Your Referrers | Mozilla Security Blog
Task 15: Data Exfiltration with XMLHttpRequest
Rooted Con 2014 - Manu Quintans &Amp; Frank Ruiz - 50 Shades Of Crimeware
3 key data security issues HITRUST needs to consider | Healthcare Dive
Adobe patches 2nd Flash Player Zero-day Vulnerability - Hacker News
Wireless Lan Security Megaprimer Part 6: Pwning Hidden Ssids
Job Market Newbies: Lock down your social media profile -
Do you want to be the next networking super-power?... - J-Net Community
Data Encryption On The Rise - Network Computing
PC Users Group meeting and talk on cyber security at library | Trumbull Times
Tina Dupuy: Choosing weed policy over cyber security
lcamtuf's blog: Looking back at three months of afl-fuzz
Rooted Con 2014 - José Pico And David Perez - Attacking 3g
Microsoft's HoloLens explained: How it works and why it's different - CNE
Six ways identity will take center stage in 2015 - SC Magazine
From Infection to Extortion: Watch TorrentLocker In Action - Security News - Trend Micro USA
#ChatDPD Twitter Chat: Things You Should Know About Your Privacy On the Go (with images, tweets) · StaySafeOnline · Storify
Business Continuity Plans + Notifications = Business Value | BrightTALK
Module 1: Introduction to Python and Setting up an Environment
Symantec cyber-resilience
News, sports and weather for Tacoma, WA| The News Tribune &
Cisco Security sur Twitter : "Attending #CLEUR in Milan this week? Make sure to stop by the #security booth to check out our live demos!"
Rooted Con 2014 - C. Lorenzana &Amp; J. Rodriguez - Why Call Apt's, When What They Mean Is Money
Proposed CFAA revisions agitate IT security community - SC Magazine
Game over? Sony FINALLY offers compensation to MEELLIONS of PSN hack victims • The Register
Module 6: Daemons and Backdoors
Job STEM-ulation - The Killeen Daily Herald: News
Rooted Con 2014 - Jose L. Verdeguer &Amp; Víctor Seva – Secure Communications System
Insertion Encoder
Rooted Con 2014 - Jorge Ramió - Rsa Turns 36 Years And Its Youth Card Has Expired
US Gas Stations Exposed to Cyberattacks: Researchers | SecurityWeek.Com
Flash 0-day Exploited by Angler Exploit Kit
Family finances: when to worry about a data breach - Tulsa World: Money Power
Rooted Con 2014 - Miguel Tarasco - Native Wifi Analysis Under Windows
Apple's OS X 10.10.2 to Fix Security Vulnerabilities Exposed by Google's Project Zero - Mac Rumors
Biden Unveils $25 Million Grant to Support Cyber Security Education : News : ISchoolGuide
Rooted Con 2014 - Andrés Tarasco – Targeted Attacks With Wi-Fi Apts
Future of IT Podcast: Becoming Cyber Resilient in Today’s Internet of…
Backtrack 5 Wireless pen testing: Book Review - YouTube
Challenge 5: Digest Authentication Attack
Digital Doomsday Coming? ~ Sunday, 25th January 2015 from 4Hoteliers
Rooted Con 2014 - Jeremy Brown &Amp; David Seidman - Microsoft Vulnerability Research
How Origami Might Soon Be Used to Power the Internet of Things | Motherboard
Strong Authentication and the Trusted Mobile Device - YouTube
Challenge 33: XSS 14
A Guide for CISOs Concerned About Data Collection – Blog Post – RSA Conference
Rooted Con 2014 - Francisco J Gómez And Carlos J Diaz - Sinfonier
Cyber Threat Detection and Incident Response
Appie – Android Pentesting Portable Integrated Environment | Aditya Agrawal
Clues, code-breaking, and cruciverbalists: the language of crosswords | OUPblog
Police Using High-Tech Device to See Through Walls Warrantlessly - Hacker News
IANS - CISO Impact Center
Lawsuits, Legal News & Issues, Lawsuit Settlements, Class Action Lawsuits
Choosing Weed Policy Over Cyber Security | UK Progressive
JavaScript for Pentesters Archives - Securethelock
Rooted Con 2014 - Alfonso Muñoz – Hiding Communications In Natural Language
What Government Can (And Can't) Do About Cybersecurity
Weekend news review: January 20-23
Watch "Reading the Tea Leaves of the RSAC Submissions" webcast
PentestingSkills sur Twitter : "Solved! First GDB test(easy) @securitytube SLAE64 course "Welcome to SLAE64 course""
x86_64 Assembly Language and Shellcoding on Linux
Here's the Secret Silk Road Journal From the Laptop of Ross Ulbricht | WIRED
Rooted Con 2014 - Pau Oliva – Bypassing Wifi Pay-Walls With Android
CyberWar Games- Video 2 Title: Tools and Concepts - nmap and Metasploit Framework - YouTube
9 Lethal Linux Commands You Should Never Run Free Guide
malwaRE- Malware repository framework | SecTechno
2015 Enterprise Dev Predictions, Part 3: Digital Transformation and Lifecycle Virtualization -- ADTmag - St. Peter's Health Partners warns of possible data breach
Rooted Con 2014 - Antonio Ramos – Agility: The Road To Security
Module 2: NOT Encoder
SAN BERNARDINO: Community matters to Cyber Security Center - Press Enterprise
Rooted Con 2014 - Pablo Gonzalez And Juan Antonio Calles – Cyberwar: Looking For… Touchdown!
CyberWar Games Improves Security by Allowing Symantec Employees to Think Like a Hacker | Symantec Connect
Cough up your social media password or go to jail | CSO Online
We Should All Step Back from Security Journalism — The Message — Medium
Basic Authentication and Form Bruteforcing (Intermediate)
Rooted Con 2014 - Alberto Cita – Skype: An Analysis Of Security And Privacy
World's first 3D-printed apartment building constructed in China - CNE
What Poweliks tells us about our current state of security | VentureBeat | Security | by Pedro Bustamante, Malwarebytes
Cyber warfare: Capitol staffers aren’t ready - Tal Kopan - POLITICO
A Glimpse at the Latest Sandbox Evasion Techniques | SecurityWeek.Com
Panicked teen hanged himself after receiving ransomware scam email • The Register
​Ubuntu wants to be the OS for the Internet of Things | ZDNet
Chelsea Heights could see federal disaster-recovery funds - Atlantic City | Pleasantville | Brigantine
Rooted Con 2014 - Jorge Bermudez – Hackers Are From Mars, Judges Are From Venus
Grill parts website experiences system intrusion, payment card breach - SC Magazine
New Apple iOS 8 Crisis Creates Chaos For Users - Forbes
A Game of Cat and Mouse: Malware Evasion Techniques | BrightTALK
SmartCMS 2 SQL Injection ≈ Packet Storm
SmartCMS 2 Cross Site Scripting ≈ Packet Storm
ferretCMS 1.0.4-alpha Cross Site Scripting / SQL Injection ≈ Packet Storm
Challenge 34: XSS 15
Researchers examine role of 'white hat' hackers in cyber warfare
Registry Study: Transradial Appears to Best Transfemoral PCI Regardless of Presentation - Journal News - TCTMD
New “Zero-day” in Adobe Flash: What You Need to Know -
Prevention and Protection: The Best Practices for Enterprises in 2015 - Security News - Trend Micro USA
Personal privacy, internet commerce and national security: can they co-exist? | Information Age
Blogs |
Rooted Con 2014 - Rootedpanel - Cyberweapons
This Small Box Will Stop Hackers from Turning Your Smart Home Against You | Motherboard
Aspiring Singer Arrested in Israel on Suspicion of Hacking Madonna | WIRED
Cybrary.IT’s Free Cybersecurity Training Set to Change Tech Ed
As Automotive Makers Accelerate at CES 2015, Time to Consider Cybersecurity -
Microsoft Security sur Twitter : "How can you make an impact on @DataPrivacyDay? Join us on 1/28 for guidance & resources! Use #DPD15"
Critical Flash Player hole plugged, another still unpatched and exploited
Task 4: Modify Form Fields
You’re Not Ready For Disaster Recovery, Despite What You May Think | CIO
Even When Sharing Top Billing with Edward Snowden, the NSA Is Unrepentant - The Intercept
CTB-Locker ransomware variant being distributed in spam campaign - SC Magazine
5 Things We Can Learn from 2014 Data Breaches - Security News - Trend Micro USA
Grading the President’s SOTU Cybersecurity Agenda | Network World
Fuel tank gauges vulnerable to attackers - SC Magazine
Due to hack, Sony requests financial filing extension - SC Magazine
Why Isn’t It Easier to Customize Enterprise Mobility and Guest Portals?
Critical Java updates fix 19 vulnerabilities, disable SSL 3.0 | InfoWorld
Phishing quiz: Can you spot a scam when you see one? Don't be so sure - CBS News
Analysts detail spying tool Regin's malicious modules - SC Magazine
Register – RSA Conference
Task 17: CSRF Token Stealing
US spy program has financial, security impacts, says Snowden | CSO Online
New framework helps companies quantify risk | CSO Online
Rooted Con 2014 - Jaime Sánchez And Pablo San Emeterio - Whatsapp: Lies And Videotapes
WHITE PAPER▶ Symantec Security Response Presents:The Waterbug Attack …