NetSecu

www.vulnerability-lab.com
www.vulnerability-lab.com
iTransfer
thehackernews.com
thehackernews.com
'The Pirate Bay' Co-Founder Found Guilty in Denmark's Largest Hacking Case
seclists.org
seclists.org
WebApp Sec: [Deadline Extension] CFP COMCOM, Elsevier: SI on Security and Privacy in Unified Communications: Challenges and Solutions, Manuscript Due November 21, 2014
www.businessweek.com
www.businessweek.com
Hackers Probing the Financial System Show Reason to Worry - Businessweek
www.infosecurity-magazine.com
www.infosecurity-magazine.com
Cyber-Warfare: Who’s Afraid of the Big Red Button? - Infosecurity Magazine
www.computerworlduk.com
www.computerworlduk.com
Sencha melds desktop and smartphone management with Space - ComputerworldUK.com
www.youtube.com
www.youtube.com
Happy Halloween from Kaspersky Lab - YouTube
www.itbusinessnet.com
www.itbusinessnet.com
Newly Revised Corporate Information Security Policy Templates Available from the Cyber Security Experts at myinformationsecuritypolicy.com
eandt.theiet.org
eandt.theiet.org
Mobile data more accurate than census, says study - E & T Magazine
www.huffingtonpost.com
www.huffingtonpost.com
Here's How the New Chip-and-PIN Credit Cards Could Be DOA | Adam Levin
www.redorbit.com
www.redorbit.com
Cyber Attacks Could Increase Over The Next Decade: Pew Poll - Technology News - redOrbit
www.net-security.org
www.net-security.org
Most orgs unprepared to handle a cyber incident
www.net-security.org
www.net-security.org
The security threat of unsanctioned file sharing
www.cio-today.com
www.cio-today.com
Report: Data Breaches Plague California - Network Security on CIO Today
hamptonroads.com
hamptonroads.com
Police can require cellphone fingerprint, not pass code | HamptonRoads.com | PilotOnline.com
www.theregister.co.uk
www.theregister.co.uk
Microsoft patches GroupMe 'full account' hijack hole • The Register
smartdatacollective.com
smartdatacollective.com
Where Do You Draw the Line Between Relevancy and Privacy? | SmartData Collective
indiatoday.intoday.in
indiatoday.intoday.in
China turns back at US, accuses of cyber attacks : News, News - India Today
www.malaysiandigest.com
www.malaysiandigest.com
Hackers Are Using Gmail Drafts To Update Their Malware And Steal Data
timesofindia.indiatimes.com
timesofindia.indiatimes.com
Gartner highlights the top 10 cloud myths - The Times of India
www.biztechafrica.com
www.biztechafrica.com
BlackBerry Passport unveiled in Nigeria | BiztechAfrica Mobile,Technology & IT News Africa
www.theregister.co.uk
www.theregister.co.uk
Free government-penned crypto can swipe identities • The Register
www.krollontrack.co.uk
www.krollontrack.co.uk
Understanding disaster recovery terminology
www.symantec.com
www.symantec.com
The 5 Most Frightful Viruses Terrorizing Computer Users Everywhere | Symantec Connect
www.philly.com
www.philly.com
Snowden in a hotel room after alarming the world
blog.credit.com
blog.credit.com
Are the New, ‘Safer’ Credit Cards Already Vulnerable? | Credit.com
www.cio-today.com
www.cio-today.com
IBM Rolls Out Analytics-Based Security Solution - Big Data on CIO Today
www.independent.co.ug
www.independent.co.ug
Government inaugurates information security advisory team
symantecevents.verite.com
symantecevents.verite.com
Symantec Event Registration System
www.cio-today.com
www.cio-today.com
IBM Rolls Out Analytics-Based Security Solution - Network Security on CIO Today
www.brisbanetimes.com.au
www.brisbanetimes.com.au
Disaster funding slash 'absolutely revolting': Crisafulli
www.jrn.com
www.jrn.com
Cyber security breaches, Tucson expert has the answer - KGUN9
www.forbes.com
www.forbes.com
Here's How the New Chip-and-PIN Credit Cards Could Be DOA - Forbes
www.theregister.co.uk
www.theregister.co.uk
Google heads out the back with rifle, puts down POODLE • The Register
www.thesuntimes.com
www.thesuntimes.com
Possible data breach at ASU - News - The Sun-Times - Heber Springs, AR - Heber Springs, AR
www.securitytube.net
www.securitytube.net
Bsides Dc 2014 - What Does It Actually Take To Start A Security Product Company?
daily.bhaskar.com
daily.bhaskar.com
White House computer hacking causes temporary outage - daily.bhaskar.com
www.siliconrepublic.com
www.siliconrepublic.com
Hackers break into White House network, Russian hackers blamed - Enterprise - | siliconrepublic.com - Ireland's Technology News Service
www.seattlesportsnut.com
www.seattlesportsnut.com
Hackers are testing the financialsystem’s cyber defenses, and they can... - News - Seattle Sports Nut
www.bloomberg.com
www.bloomberg.com
Hackers Probing the Financial System Show Reason to Worry - Bloomberg
www.bostonherald.com
www.bostonherald.com
‘Citizenfour’ exposes Edward Snowden’s message | Boston Herald
phys.org
phys.org
New intelligence analytics uncover hidden criminal activity in just seconds
www.destinationcrm.com
www.destinationcrm.com
IBM Expands the IBM Cloud Data Services Portfolio - CRM Magazine
www.bloomberg.com
www.bloomberg.com
5 Questions For Cybersecurity Expert Bruce Schneier After the Latest White House Hacking - Bloomberg Politics
www.itworld.com
www.itworld.com
Gigamon says it can analyze attacker SSL traffic without hitting performance | ITworld
campustechnology.com
campustechnology.com
How Will Campus Networks Handle the Internet of Things' 26 Billion Devices? -- Campus Technology
www.huffingtonpost.com
www.huffingtonpost.com
Only Top Congressional Leaders Were Notified Of The White House Computer Attack
www.thelegalintelligencer.com
www.thelegalintelligencer.com
Credit Card Information Security Issues in Franchising | The Legal Intelligencer
www.tripwire.com
www.tripwire.com
Anything You Post Can and Will Be Used Against You - The State of Security
www.tripwire.com
www.tripwire.com
Restoring Digital Consumers' Confidence - Part II - The State of Security
www.mcafee.com
www.mcafee.com
Malware Threat Detection and Malware Block Effectiveness – Reviews | McAfee
www.marketwatch.com
www.marketwatch.com
IBM Brings Broad Portfolio of Big Data and Analytics Capabilities to the IBM Cloud Marketplace - MarketWatch
triblive.com
triblive.com
Hackers' new Dyre malware infects W.Pa. computers, vexes FBI cyber agents | TribLIVE
outsidelens.scmagazine.com
outsidelens.scmagazine.com
Watch "FTC sues AT&T for slowing internet connection speeds" Video at SCMagazine
firstlook.org
firstlook.org
Secret Manuals Show the Spyware Sold to Despots and Cops Worldwide - The Intercept
www.computerworlduk.com
www.computerworlduk.com
Twitter, IBM form partnership around analytic apps - ComputerworldUK.com
www.eweek.com
www.eweek.com
IBM Intros New Analytics Software to Battle Cyber-Crime
time.com
time.com
Hackers Keep Stealing Your Personal Data
chinadigitaltimes.net
chinadigitaltimes.net
China's Cyberspace Minister Accuses U.S. of Hacking - China Digital Times (CDT)
www.computerworlduk.com
www.computerworlduk.com
Big data professionals rake in almost a quarter more than IT - ComputerworldUK.com
www.securitytube.net
www.securitytube.net
Bsides Dc 2014 - How Headlines Make Heads Roll: The Media's Impact On Security
www.emergencymgmt.com
www.emergencymgmt.com
'Widespread Harm' Likely from Cyberattack in Next Decade
betanews.com
betanews.com
What's your password backup plan?
chronicle.augusta.com
chronicle.augusta.com
U.S. Army, Cyber Security and Business Against a Common Foe conference set for Wednesday | The Augusta Chronicle
www.themandarin.com.au
www.themandarin.com.au
The enemy within: seven strategies to stop cyber breaches - The MandarinThe Mandarin
www.stuff.co.nz
www.stuff.co.nz
'Major' hacking attack in US looms: survey | Stuff.co.nz
healthitsecurity.com
healthitsecurity.com
PHI ‘Mishandling’ by Montana VA Leads to Possible Data Breach | HealthITSecurity.com
www.itworldcanada.com
www.itworldcanada.com
Federal data breaches up again | IT World Canada News
www.newswire.ca
www.newswire.ca
Office of the Privacy Commissioner of Canada | Annual Report: RCMP review highlights need for better record keeping
newsinfo.inquirer.net
newsinfo.inquirer.net
How to secure your homes during ‘Undas’ | Inquirer News
www.americanbanker.com
www.americanbanker.com
There Will Be Battles. Some Will Be Lost - American Banker Article
gadgets.ndtv.com
gadgets.ndtv.com
China's Internet Chief Accuses US of Hacking but Says Talks 'Unhindered' | NDTV Gadgets
www.660news.com
www.660news.com
Disaster recovery assistance available for S.W. Alta. | 660News
investor.juniper.net
investor.juniper.net
Juniper Networks - Investor Day 2014
campaign.trendmicro.com
campaign.trendmicro.com
Trend Micro
www.rsaconference.com
www.rsaconference.com
Peer2Peer Facilitators – RSA Conference
www.jdsupra.com
www.jdsupra.com
Privacy in the Cloud: A Legal Framework for Moving Personal Data to the Cloud | Morrison & Foerster LLP - Social Media - JDSupra
bgr.com
bgr.com
Samsung ‘Find My Mobile’ security exploit discovered | BGR
www.theregister.co.uk
www.theregister.co.uk
Danish court finds Pirate Bay cofounder guilty of hacking CSC servers • The Register
www.virusbtn.com
www.virusbtn.com
Virus Bulletin : Blog - Paper: Invading the core: iWorm's infection vector and persistence mechanism
blog.fortinet.com
blog.fortinet.com
Android/Emmental: adding cheese in emmental holes | Fortinet Blog
www.cioinsight.com
www.cioinsight.com
Do We Need a CDC for Cybersecurity?
arstechnica.com
arstechnica.com
Pirate Bay co-founder convicted in Denmark’s “largest hacking case” ever | Ars Technica
www.modernreaders.com
www.modernreaders.com
Guilty! Pirate Bay’s Gottfrid Svartholm Could Spend Six Years in Jail for Hacking
www.thestate.com
www.thestate.com
Latest local breaking news by The State Newspaper in Columbia, SC | The State
www.theinquirer.net
www.theinquirer.net
Pirate Bay's Svartholm found guilty in Danish hacking case- The Inquirer
www.bbc.co.uk
www.bbc.co.uk
BBC News - Pirate Bay founder Gottfrid Warg faces lengthy jail term
en.ria.ru
en.ria.ru
Pirate Bay Founder Guilty of Hacking, Facing Six Years in Prison | Society | RIA Novosti
talkincloud.com
talkincloud.com
Gartner Debunks Top 10 Cloud Myths | Cloud Computing content from Talkin' Cloud
phys.org
phys.org
Pirate Bay co-founder guilty in Danish hacking case
www.tctmd.com
www.tctmd.com
Chronic Vitamin K Antagonist Use Ups In-Hospital Bleeding Among Primary PCI Patients - Journal News - TCTMD
www.securitytube.net
www.securitytube.net
Bsides Dc 2014 - Doctor Docker: Building Your Infrastructure's Immune System
windowsitpro.com
windowsitpro.com
Assessing Your Windows Server 2003 deployment | Windows Server 2003 End of Support content from Windows IT Pro
www.esecurityplanet.com
www.esecurityplanet.com
IBM Boosts Cyber Security Education Efforts - eSecurity Planet
packetstormsecurity.com
packetstormsecurity.com
F5 Big-IP 11.3.0.39.0 XML External Entity Injection #1 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Red Hat Security Advisory 2014-1744-01 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Debian Security Advisory 3059-1 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Ubuntu Security Notice USN-2392-1 ≈ Packet Storm
www.trendmicro.com
www.trendmicro.com
National Cyber Security Month - Trend Micro USA
www.globbtv.com
www.globbtv.com
Entrevista exclusiva a Raj Samani durante #McAfeeFOCUS en Las Vegas : by @GlobbTV
www.foreignpolicy.com
www.foreignpolicy.com
West Africa's Financial Immune Deficiency
keranews.org
keranews.org
Hackers Attack Cleburne Servers, Which May Be Linked To Controversial Dog Shooting | KERA News
www.pcworld.in
www.pcworld.in
CurrentC won't let email hack delay launch as it explores NFC | PC World India
www.scmagazine.com
www.scmagazine.com
Operators disable firewall features to increase network performance, survey finds - SC Magazine
www.crn.com
www.crn.com
CEO Kovacs Recasts AVG As Cloud Player - Page: 1 | CRN
docs.google.com
docs.google.com
Satisfaction Survey
packetstormsecurity.com
packetstormsecurity.com
Comments ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Pirate Bay Founder Guilty In Historic Hacker Case ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Vizensoft Admin Panel Bypass / Backdoor / Upload / XSS / SQL Injection ≈ Packet Storm
www.youtube.com
www.youtube.com
Partners for the Networking Lifecycle - YouTube
www.internetretailer.com
www.internetretailer.com
E-Payments & Security - How to prevent fraud with tokenization - Internet Retailer
www.washingtonpost.com
www.washingtonpost.com
How one man’s private files ended up on Apple’s iCloud without his consent - The Washington Post
www.bostonglobe.com
www.bostonglobe.com
Review of ‘Citizenfour,’ documentary about Edward Snowden - Movies - The Boston Globe
abcnews.go.com
abcnews.go.com
How to Get Half a Million More From Uncle Sam for Your Retirement - ABC News
www.forbes.com
www.forbes.com
How To Fix Your 401(k) Before You Retire - Forbes
www.symantec.com
www.symantec.com
Driving Change against Cyberbullying | Symantec Connect
www.scmagazine.com
www.scmagazine.com
Beware of the malware walking dead - SC Magazine
www.scmagazine.com
www.scmagazine.com
Hackers grab email addresses of CurrentC pilot participants - SC Magazine
www.juniper.net
www.juniper.net
Example: Configuring Basic Layer 2 Switching on MX Series - Technical Documentation - Support - Juniper Networks
www.whatech.com
www.whatech.com
Discover Global wireless network security market that is expected to reach $15.55 billion by 2019 - WhaTech
www.smh.com.au
www.smh.com.au
Pirate Bay co-founder Svartholm Warg found guilty of hacking
www.miamiherald.com
www.miamiherald.com
Correction: Apple Pay-Retail Skirmish story | The Miami Herald
www.wired.com
www.wired.com
Pirate Bay Founder Convicted on Hacking Charges | WIRED
www.nextgov.com
www.nextgov.com
Government’s Sustainability Efforts Present ‘Big Data Opportunity’ - Nextgov.com
www.virtual-strategy.com
www.virtual-strategy.com
Comprehensive 2014 Information Security Policy Manual Available for Instant Download from North America’s Cyber Security Specialists at myinformationsecuritypolicy.com | Virtual-Strategy Magazine
thehackernews.com
thehackernews.com
Xiaomi Data Breach — "Exposing Xiaomi" Talk Pulled from Hacking Conference
forums.juniper.net
forums.juniper.net
Seamless Guides: The Recipe for Easier Learning - J-Net Community
www.csoonline.com
www.csoonline.com
Petition targets Apple over ‘spyware’ in OS X Yosemite | CSO Online
www.csoonline.com
www.csoonline.com
Vulnerabilities found in more command-line tools, wget and tnftp get patches | CSO Online
www.scmagazine.com
www.scmagazine.com
PCI publishes guidance on security awareness programs - SC Magazine
www.scmagazine.com
www.scmagazine.com
HackingTeam spying manuals posted online - SC Magazine
www.youtube.com
www.youtube.com
Tales from the Encrypt - YouTube
blog.trendmicro.com
blog.trendmicro.com
Keep Cybercriminals Guessing with Unique Passwords -
www.cnbc.com
www.cnbc.com
Apple Pay competitor CurrentC just says customer email addresses were hacked
www.hhnmag.com
www.hhnmag.com
Cybersecurity Expert Warns of Data Breaches
www.sans.org
www.sans.org
Cyber Threat Intelligence Summit (Washington, DC)
blogs.wsj.com
blogs.wsj.com
Executives Now More Worried About External Hackers than Insider Threat - The CIO Report - WSJ
www.nationaldefensemagazine.org
www.nationaldefensemagazine.org
Former Obama Officials: U.S. Unable to Cope With Complex Security Challenges - Blog
www.pharmacytimes.com
www.pharmacytimes.com
QS/1 Partners with ANX, a Leading PCI Protection Company
www.securitytube.net
www.securitytube.net
Louisville Infosec 2014 - Closing Ceremony
krebsonsecurity.com
krebsonsecurity.com
Chip & PIN vs. Chip & Signature — Krebs on Security
adtmag.com
adtmag.com
IBM Goes Big on Data in the Cloud -- ADTmag
www.cio.com.au
www.cio.com.au
Office 365 admins get spreadsheet search help - CIO
www.cbsnews.com
www.cbsnews.com
FBI investigating leaker of national security information - CBS News
www.scnow.com
www.scnow.com
Sheheen hammers Haley over data breach, DSS deaths - SCNow: Politics
www.natlawreview.com
www.natlawreview.com
FCC Issues $10 Million Fine in Data Breach-Federal Communications Commission | The National Law Review
www.toptechnews.com
www.toptechnews.com
Report: Data Breaches Plague California - CIO Issues on Top Tech News
www.heraldonline.com
www.heraldonline.com
Local news from Rock Hill, SC | The Herald
www.csoonline.com
www.csoonline.com
What you need to know about the Drupal vulnerability CVE-2014-3704 | CSO Online
www.wired.com
www.wired.com
How Facebook Could End Up Controlling Everything You Watch and Read Online | WIRED
openstacksummitnovember2014paris.sched.org
openstacksummitnovember2014paris.sched.org
OpenStack Summit November 2014 Paris: Creating a Carrier-Grade Virtualized Net...
www.660news.com
www.660news.com
Government commits to disaster recovery assistance for SW Alberta | 660News
blog.trendmicro.com
blog.trendmicro.com
Global Partner Summit Honors Top Channel Partners -
blogs.wsj.com
blogs.wsj.com
The Morning Download: IBM, Twitter Developing Tools to Analyze Social Data - The CIO Report - WSJ
www.eweek.com
www.eweek.com
Verizon Adds FireEye Cyber-Security Tools for Business Users
www.jdsupra.com
www.jdsupra.com
How to Respond to SEC Inquiries Concerning Data Breach and Data Security Policies | BakerHostetler - JDSupra
www.tripwire.com
www.tripwire.com
Europe Holds Biggest Ever Cyber Security Incident Response Exercise Simulating 2,000 Threats - The State of Security
www.csoonline.com
www.csoonline.com
Hurricane fails to stir Bacardi's business continuity plan | CSO Online
www.csoonline.com
www.csoonline.com
IT pros turn a blind eye to file sharing practices, report says | CSO Online
www.independent.co.uk
www.independent.co.uk
Mirror Group faces further investigation into phone-hacking - Crime - UK - The Independent
www.livemint.com
www.livemint.com
IBM, Twitter data deal will help Indian firms cut costs - Livemint
www.scmagazine.com
www.scmagazine.com
How to build a secure fortress - SC Magazine
www.khaleejtimes.com
www.khaleejtimes.com
No Page Found - Khaleej Times
en.ria.ru
en.ria.ru
EU Carrying Out Biggest Ever Cybersecurity Exercise: Information Security Agency | Society | RIA Novosti
www.symantec.com
www.symantec.com
Scammers pose as company execs in wire transfer spam campaign | Symantec Connect
www.scmagazine.com
www.scmagazine.com
Phishing campaign passes off Pony Stealer trojan as 'overdue invoice' - SC Magazine
www.scmagazine.com
www.scmagazine.com
Assume Drupal 7 sites are compromised, unless patched or updated to 7.32 within hours - SC Magazine
twitter.com
twitter.com
Juniper IR sur Twitter : "Great start to #Juniper Investor Day this morning with a whiteboarding session led by Pradeep Sindhu! http://t.co/GS0NaRsVGu"
thatguy.trendmicro.com
thatguy.trendmicro.com
Full Security and Privacy Tip Sheet - Trend Micro
www.networkworld.com
www.networkworld.com
Just where are the world's hackers located?
www.marketwatch.com
www.marketwatch.com
Mobile/Micro Data Center Market by Applications (Instant & Retrofit, Disaster Recovery, High Density Networks, Remote Office, Mobile Computing), Rack Size, Organization Size and Verticals - Global Advancements, Worldwide Forecast & Analysis (2014-2019) - MarketWatch
www.bizjournals.com
www.bizjournals.com
Maryland's cyber security strategy: Avoid boneheaded mistakes - Baltimore Business Journal
twitter.com
twitter.com
Symantec sur Twitter : "What are the reasons you would NOT allow employee-owned devices in the enterprise? Why would you? #DirtyTopics #BYOD http://t.co/s86GC6Ou0n"
www.scmagazine.com
www.scmagazine.com
Pirate Bay co-founder found guilty for hacking IT service provider - SC Magazine
www.channelpartnersonline.com
www.channelpartnersonline.com
My Digital Shield Releases 'Shield Test' Free for SMBs
www.fiercegovernmentit.com
www.fiercegovernmentit.com
Report: Nation state cyber conflict will become the norm - FierceGovernmentI
www.itproportal.com
www.itproportal.com
Hackers using Gmail drafts to steal data and update malware | ITProPortal.com
www.cutimes.com
www.cutimes.com
Home Depot Breach Costs CUs $60M
thehill.com
thehill.com
Home Depot breach costs doubled Target's | TheHill
www.telesurtv.net
www.telesurtv.net
FBI Seeks New Surveillance Powers | News | teleSUR
www.salon.com
www.salon.com
Presidential “pixie dust”: How a quiet new rule can wipe away your basic rights - Salon.com
www.taz.de
www.taz.de
Protest gegen NSA-Überwachung: Schmerzhafte Trennung - taz.de
mobileenterprise.edgl.com
mobileenterprise.edgl.com
Top 10 Cloud Myths | News | Mobile Enterprise(ME)
www.housingwire.com
www.housingwire.com
Home Depot breach cost credit unions almost $60M | 2014-10-30 | HousingWire
www.liverpoolecho.co.uk
www.liverpoolecho.co.uk
Judges reject senior Merseyside cop's appeal against data breach convictions - Liverpool Echo
www.chicagotribune.com
www.chicagotribune.com
Citizenfour review - Chicago Tribune
www.itworld.com
www.itworld.com
IT spending reality check: 2014's mixed message | ITworld
www.scmagazine.com
www.scmagazine.com
Report: Stolen card data is crime that concerns Americans most - SC Magazine
www.net-security.org
www.net-security.org
What's jeopardizing the safety of your datacenter?
www.securityweek.com
www.securityweek.com
Complexity for Retailers Creates Opportunities for Attackers | SecurityWeek.Com
www.mcafee.com
www.mcafee.com
Downloader
nakedsecurity.sophos.com
nakedsecurity.sophos.com
Millions of Drupal websites at risk from failure to patch | Naked Security
twitter.com
twitter.com
Symantec sur Twitter : "Welcome to the #DirtyTopics chat! Today we'll be discussing productivity and security in a BYOD program. http://t.co/9x6EzX7HCx"
twitter.com
twitter.com
Symantec sur Twitter : "Are there benefits to having a #BYOD policy at your organization? #DirtyTopics http://t.co/ajwofewawp"
www.whistleblower.org
www.whistleblower.org
49 Orgs Call on Congress to Restore Whistleblower Rights for Intelligence Contractors | GAP
mashable.com
mashable.com
Pirate Bay cofounder found guilty of hacking
bgr.com
bgr.com
Yosemite Wi-Fi issues: fix dropped connection and slow Internet | BGR
www.njlawjournal.com
www.njlawjournal.com
IT Starter Plan for Bring Your Own Devices | New Jersey Law Journal
eandt.theiet.org
eandt.theiet.org
China says cyber talks ‘unhindered’ despite US hacking - E & T Magazine
support.liveoffice.com
support.liveoffice.com
Current Status | LiveOffice Support Center
m.wsj.com
m.wsj.com
Computer Spies Target Control Systems Made by GE, Siemens - WSJ - WSJ
www.securitytube.net
www.securitytube.net
Louisville Infosec 2014 - Where Does Data Security Fit Into The Data Quality Strategy?
www.lifehacker.co.uk
www.lifehacker.co.uk
How to Improve Your Mobile Security in 3 Simple Steps | Lifehacker UK
www.wired.com
www.wired.com
Five Ways to Move Your Big Data Projects Into the Cloud | WIRED
www.scmagazine.com
www.scmagazine.com
Your data's gone mobile: Keep it secure - SC Magazine
nakedsecurity.sophos.com
nakedsecurity.sophos.com
Epidemic of medical data breaches leaking our most sensitive information | Naked Security
krebsonsecurity.com
krebsonsecurity.com
‘Replay’ Attacks Spoof Chip Card Charges — Krebs on Security
www.net-security.org
www.net-security.org
Cyber crime tool automates monetization of stolen payment cards
www.symantec.com
www.symantec.com
Dirty Topic Tweet Chat 10/30 – Securing Mobile Devices In The Workplace | Symantec Connect
dailycaller.com
dailycaller.com
Paris Hilton Phone Hacker Sentenced To Prison For Hacking Police, College Computers | The Daily Caller
uk.reuters.com
uk.reuters.com
China's Internet chief accuses U.S. of hacking but says talks 'unhindered'| Reuters
blog.executivebiz.com
blog.executivebiz.com
Pat Calhoun: McAfee Report Shows Trade-Off Between Network Security, Performance | ExecutiveBiz
www.toptechnews.com
www.toptechnews.com
Report: Data Breaches Plague California - Network Security on Top Tech News
www.mcafee.com
www.mcafee.com
McAfee Threat Intelligence Exchange | McAfee Products
blogs.cisco.com
blogs.cisco.com
Ensuring Security and Trust Stewardship and Accountability
www.techtimes.com
www.techtimes.com
Meet APT28, Russian-backed malware for gathering intelligence from governments, militaries: Report : LIFE : Tech Times
www.technologyreview.com
www.technologyreview.com
Voice Control Could Help Hackers Mount Attacks | MIT Technology Review
economictimes.indiatimes.com
economictimes.indiatimes.com
Expert claims hacking Xiaomi server, firm calls it hoax - The Economic Times
www.infoq.com
www.infoq.com
Microsoft Azure Gets a New Marketplace, Advanced Networking Features and Batch Processing
www.theregister.co.uk
www.theregister.co.uk
BIGGEST THREAT to Europe’s cybersecurity? Hint: not hackers • The Register
abcnews.go.com
abcnews.go.com
EU Holds Largest-Ever Cyber Security Exercise - ABC News
www.businessinsider.com
www.businessinsider.com
CurrentC Hacked - Business Insider
www.scmagazine.com
www.scmagazine.com
About 60K transactions possibly affected in Cape May-Lewes Ferry breach - SC Magazine
www.cnet.com
www.cnet.com
​Google on Android Lollipop security: Set it and forget it - CNE
www.allgov.com
www.allgov.com
California and the Nation - Data Breaches Affect Nearly Half of California’s Residents - Ca - News
www.techweekeurope.co.uk
www.techweekeurope.co.uk
Hackers Target Apple Pay Rival CurrentC
www.hitfix.com
www.hitfix.com
Theory of Everything writer to tackle George Clooney’s phone hacking scandal docudrama
time.com
time.com
About Apple's OS X Yosemite: Everything You Need to Know
www.itpro.co.uk
www.itpro.co.uk
Office 365 to get MDM capabilities baked in | IT PRO
www.pcpro.co.uk
www.pcpro.co.uk
How to get the Windows 10 Technical Preview, plus release date, features and latest news | News | PC Pro
www.reuters.com
www.reuters.com
China's Internet chief accuses U.S. of hacking but says talks unhindered| Reuters
www.slate.com
www.slate.com
Netizen Report: Hungarians reject “Internet tax” with protests, motherboards.
www.providencejournal.com
www.providencejournal.com
Jordan's Furniture Moves Into More Bandwidth and Greater Cost Savings With Comcast Business | Business - Press Releases | providencejournal.com | The Providence Journal
www.broadwayworld.com
www.broadwayworld.com
PrivacyScan 1.7 Privacy for Apple's Yosemite Released - BWWGeeksWorld
reason.com
reason.com
After Massive Outrage, Houston Pulls Plug on Pastor Subpoenas - Hit & Run : Reason.com
www.theregister.co.uk
www.theregister.co.uk
Carders offer malware with the human touch to defeat fraud detection • The Register
seclists.org
seclists.org
Information Security News: Did Drupal Drop The Ball? Users Who Didn't Update Within 7 Hours 'Should Assume They've Been Hacked'
seclists.org
seclists.org
Information Security News: Security Firms Tie Russian Government to Utilities Hacks
www.computerdealernews.com
www.computerdealernews.com
Business continuity is not just about backup
twitter.com
twitter.com
Symantec sur Twitter : "What does it take to build an Agile Data Center? Visit us at #NTAPinsight booth 530 and learn how! #ADC #SDDC http://t.co/XJaNyDmazr"
www.democracynow.org
www.democracynow.org
Denmark: Pirate Bay Founder Found Guilty of Hacking | Democracy Now!
antirez.com
antirez.com
Redis latency spikes and the 99th percentile - Antirez weblog
www.electronicsweekly.com
www.electronicsweekly.com
Smart meter hacking risk | Electronics Weekly
www.adlawaccess.com
www.adlawaccess.com
The Year of the Breach: California Attorney General Releases 2013 Data Breach Report | Ad Law Access
www.iol.co.za
www.iol.co.za
Hackers breach White House network - sources - IOL SciTech | IOL.co.za
www.standardmedia.co.ke
www.standardmedia.co.ke
Standard Digital News - Kenya : Hackers breach White House computer system, Russia suspected
www.forbes.com
www.forbes.com
IDC To CIOs: 60 Percent Of You Will Be Supplanted By Chief Digital Officers By 2020 - Forbes
www.politico.com
www.politico.com
White House notified Congressional “gang of eight” about breach - NIST framework: the view from Tampa - POLITICO Morning Cybersecurity - POLITICO.com
www.theregister.co.uk
www.theregister.co.uk
The ULTIMATE CRUELTY: Sandworm uses PowerPoint against Swiss bank customers • The Register
www.net-security.org
www.net-security.org
CurrentC mobile payment system hacked, user info stolen
blogs.cisco.com
blogs.cisco.com
#CiscoPublicSafety Series: Redefining Public Safety and Justice through IoE
seclists.org
seclists.org
Bugtraq: [slackware-security] wget (SSA:2014-302-01)
seclists.org
seclists.org
Bugtraq: Call for Papers - WorldCIST'15 - Azores, Deadline: November 23
support.kaspersky.com
support.kaspersky.com
How to install and configure Kaspersky Safe Browser (iOS)
buffalo.twcnews.com
buffalo.twcnews.com
Students Test Cyber Security Skills - Time Warner Cable News
blog.trendmicro.com
blog.trendmicro.com
Shellshock–Related Attacks Continue, Targets SMTP Servers | Security Intelligence Blog | Trend Micro
packetstormsecurity.com
packetstormsecurity.com
Mozilla Releases Geolocating WiFi Sniffer For Android ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Europe Hosts Its Biggest Ever Cyber Security Exercise ≈ Packet Storm
www.securitytube.net
www.securitytube.net
Louisville Infosec 2014 - Are You Really Pci Dss Compliant? Case Studies Of Pci Dss Failure!"
phys.org
phys.org
What's causing the recent string of data breaches?
www.independent.ie
www.independent.ie
FBI raids home of 'second Snowden' whistleblower in US - Independent.ie
money.cnn.com
money.cnn.com
Jordan's Furniture Moves Into More Bandwidth and Greater Cost Savings With Comcast Business
betanews.com
betanews.com
The NHS is still clinging on to Windows XP
www.marketplace.org
www.marketplace.org
In-flight entertainment's future may be on your tablet | Marketplace.org
www.information-age.com
www.information-age.com
Does depleting privacy equate to the end of liberty? Why every business must watch this Edward Snowden documentary | Information Age
thehill.com
thehill.com
FBI wants expanded hacking authority | TheHill
www.nextgov.com
www.nextgov.com
Are the White House Hackers Gone? - Nextgov.com
www.cio.com
www.cio.com
Mobility/BYOD = Power to the People | CIO
www.cloudwedge.com
www.cloudwedge.com
A Layman’s Reading of Gartner’s Top 10 Cloud Myths | CloudWedge
www.itpro.co.uk
www.itpro.co.uk
Careless employees with mobiles biggest security threat | IT PRO
www.seattlesportsnut.com
www.seattlesportsnut.com
Hackers breached a mobile payment system... - BREAKING NEWS - Seattle Sports Nut
www.forbes.com
www.forbes.com
IDC's 2015 CIO Predictions: Demand For Analytics Continues To Skyrocket - Forbes
recode.net
recode.net
As HomeKit Launch Draws Near, the Internet of Things Still Faces a Major Obstacle | Re/code
packetstormsecurity.com
packetstormsecurity.com
Apple Pay Rival CurrentC Hit By Hackers ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Drupalocalypse! Dev Says Your CMS Is Probably Owned ≈ Packet Storm
blogs.wsj.com
blogs.wsj.com
The Biggest Mistake Companies Make With Security Breaches - The Experts - WSJ
home.mcafee.com
home.mcafee.com
Antivirus Software and Internet Security For Your PC or Mac | McAfee
www.broadwayworld.com
www.broadwayworld.com
Axcient and Business Continuity Institute to Host Complimentary Webinar Series on Disaster Recovery and Business Continuity Initiatives - BWWGeeksWorld
nakedsecurity.sophos.com
nakedsecurity.sophos.com
3 ways to make your Gmail account safer | Naked Security
th115.infusionsoft.com
th115.infusionsoft.com
5 Mistakes You're Probably Making Selling Security - And How To Fix Them! - Powered by Infusionsoft
go.juniper.net
go.juniper.net
Juniper Networks
www.rsaconference.com
www.rsaconference.com
Update on charity:water Efforts in Nepal – Blog Post – RSA Conference
www.websense.com
www.websense.com
Websense 2015 Security Predictions Report
browser.yandex.ru
browser.yandex.ru
Скачать Яндекс.Браузер (бета)
www.marketwatch.com
www.marketwatch.com
Barracuda Extends Email Management Capabilities for Microsoft Azure Customers - MarketWatch
keranews.org
keranews.org
Hackers Attack Cleburne Servers, May Be Linked To Controversial Dog Shooting | KERA News
www.philly.com
www.philly.com
Right message, wrong messenger
triblive.com
triblive.com
Judge orders hacking case against Chinese military officers put on hold | TribLIVE
www.biztechmagazine.com
www.biztechmagazine.com
What Are Next-Generation Firewalls? — BizTech
www.theregister.co.uk
www.theregister.co.uk
UK smart meters arrive in 2020. Hackers have ALREADY found a flaw • The Register
www.bbc.co.uk
www.bbc.co.uk
BBC News - White House computer network 'hacked'
globalgrind.com
globalgrind.com
Russian Hackers Suspected In Recent White House Computer Breach | Global Grind
www.net-security.org
www.net-security.org
Biggest ever cyber security exercise in Europe is underway
seclists.org
seclists.org
Bugtraq: [SECURITY] [DSA 3059-1] dokuwiki security update
www.pcworld.com
www.pcworld.com
Pirate Bay co-founder found guilty of hacking in Denmark | PCWorld
money.cnn.com
money.cnn.com
Barracuda Extends Email Management Capabilities for Microsoft Azure Customers
news.thomasnet.com
news.thomasnet.com
AVG Technologies Announces New Managed Workplace® Enhancements to Partners at Cloud Summit
www.toptechnews.com
www.toptechnews.com
IBM Rolls Out Analytics-Based Security Solution - Big Data on Top Tech News
www.marketwatch.com
www.marketwatch.com
Next-Generation Connected Wearable, Samsung Gear S, Arrives at Sprint Nov. 7 - MarketWatch
www.gurufocus.com
www.gurufocus.com
Securing Your Portfolio with Network Security Company - GuruFocus.com
www.themorningbulletin.com.au
www.themorningbulletin.com.au
The Mirror journalists to face phone-hacking charges | Rockhampton Morning Bulletin
www.itproportal.com
www.itproportal.com
If next generation firewalls don't evolve, they'll soon be irrelevant | ITProPortal.com
www.marketwired.com
www.marketwired.com
Axcient and Business Continuity Institute to Host Complimentary Webinar Series on Disaster Recovery and Business Continuity Initiatives
twitter.com
twitter.com
Trend Micro sur Twitter : "Trend Micro CEO, Eva Chen, kicks off the TrendMicro 2014 industry analyst conference #TrendInsight in Boston http://t.co/wamBS4ThDx"
www.prweb.com
www.prweb.com
Comprehensive CIP, NERC, and FERC Information Security Policies and Procedures Now Available for Download from North America’s Cyber Security Leaders at flatirontech.org
www.fedtechmagazine.com
www.fedtechmagazine.com
Are You Putting Your Agency’s Networks at Risk? | FedTech Magazine
martinfowler.com
martinfowler.com
The Architecture of Morrisons OrderPad
abc13.com
abc13.com
Hackers Breach White House's Unclassified Computer Network | abc13.com
www.infopackets.com
www.infopackets.com
Most Users Don't Use Windows Update Properly: Report | www.infopackets.com
articles.economictimes.indiatimes.com
articles.economictimes.indiatimes.com
White House computer system breached by hackers: Report - Economic Times
www.net-security.org
www.net-security.org
Assume your Drupal 7 site has been compromised
www.androidheadlines.com
www.androidheadlines.com
Americans Fear Hacking (Much) More Than Murder | Androidheadlines.com
abc7.com
abc7.com
Hackers Breach White House's Unclassified Computer Network | abc7.com
www.cloudwedge.com
www.cloudwedge.com
Gartner Report Reveals Cloud Computing's Top Myths | CloudWedge
www.csoonline.com
www.csoonline.com
Social Engineers work in teams to harness the power of information | CSO Online
www.zdnet.com
www.zdnet.com
Apple Pay rival CurrentC hacked | ZDNet
www.zdnet.com
www.zdnet.com
Drupal Security Team gives ominous news | ZDNet
www.theregister.co.uk
www.theregister.co.uk
UK consumers particularly prone to piss-poor patching • The Register
www.csoonline.com
www.csoonline.com
Advisory says to assume all Drupal 7 websites are compromised | CSO Online
nakedsecurity.sophos.com
nakedsecurity.sophos.com
White House networks hacked | Naked Security
talkincloud.com
talkincloud.com
SMB Fall Housekeeping: 5 Security Concerns to Discuss with Customers | Talkin Cloud Blog
readwrite.com
readwrite.com
None
www.claimsjournal.com
www.claimsjournal.com
More Than 18.5M California Residents' Information Was Exposed Last Year
bgr.com
bgr.com
White House cyber attack breach of computer network confirmed | BGR
www.telesurtv.net
www.telesurtv.net
Hackers Breach White House Computers | News | teleSUR
www.businessweek.com
www.businessweek.com
Tim Cook: "I'm Proud to be Gay" - Businessweek
www.thelocal.dk
www.thelocal.dk
Pirate Bay founder guilty in historic hacker case - The Local
cphpost.dk
cphpost.dk
Pirate Bay founder found guilty in historic hacker case - News - The Copenhagen Post
siliconangle.com
siliconangle.com
MCX speaks out over CurrentC hack and their position on Apple Pay | SiliconANGLE
europa.eu
europa.eu
European Commission - PRESS RELEASES - Press release - Biggest ever cyber security exercise in Europe today
www.securitytube.net
www.securitytube.net
Louisville Infosec 2014 - Creating The Department Of How: Security Awareness That Makes Your Company Like You.
www.csmonitor.com
www.csmonitor.com
Apple Pay disabled at Rite Aid, CVS. Building their own system? - CSMonitor.com
www.techradar.com
www.techradar.com
The data breach detection system will eclipse $1bn by 2018 | News | TechRadar
www.fairfieldcitizenonline.com
www.fairfieldcitizenonline.com
Calif. AG: 18.5 million residents' info exposed - Fairfield Citizen
www.retaildive.com
www.retaildive.com
California tallies retail data breaches | Retail Dive
www.itpro.co.uk
www.itpro.co.uk
Microsoft Office 16 release date revealed as H2 2015 | IT PRO
www.rsaconference.com
www.rsaconference.com
Making the Security Super Human: How to Effectively Train Anyone/Anything – Video – RSA Conference
www.windytan.com
www.windytan.com
absorptions: Visualizing hex bytes with Unicode emoji
www.kansascity.com
www.kansascity.com
Correction: Apple Pay-Retail Skirmish story | The Kansas City Star
www.net-security.org
www.net-security.org
Photo gallery: McAfee FOCUS 14
nakedsecurity.sophos.com
nakedsecurity.sophos.com
Snapchat escapes Australian cyberbullying crackdown, for now | Naked Security
www.net-security.org
www.net-security.org
NIST Guide to Cyber Threat Information Sharing open for comments
www.net-security.org
www.net-security.org
Post Snowden, most users have changed Internet habits
www.kmbz.com
www.kmbz.com
White House Still Impacted By 'Inconveniences' Following Breach Of Computer System - KMBZ
www.lexology.com
www.lexology.com
California Attorney General releases 2014 data breach report and recommendations, finding more of the same. - Lexology
www.itpro.co.uk
www.itpro.co.uk
Windows 10: Microsoft's plan to win over the enterprise | IT PRO
www.cmswire.com
www.cmswire.com
Office 365 Strengthens Mobile Device Management #TEE14
continuitycentral.com
continuitycentral.com
Business continuity briefs
www.delcotimes.com
www.delcotimes.com
Opinion: Congress must act on consumer data breaches
www.net-security.org
www.net-security.org
Dynamic endpoint protection by McAfee and ForeScout
www.net-security.org
www.net-security.org
Over a third of orgs have no real-time insight on cyber risks
www.reuters.com
www.reuters.com
BRIEF-China's Pci-Suntek Tech wins bid for project worth 108 mln yuan| Reuters
www.itproportal.com
www.itproportal.com
UK government faces £5.5m bill as NHS clings on to Windows XP | ITProPortal.com
torrentfreak.com
torrentfreak.com
Gottfrid Svartholm Found Guilty in Hacking Trial | TorrentFreak
www.zdnet.com
www.zdnet.com
IDC has blind faith in chief digital officers | ZDNet
www.cnet.com
www.cnet.com
Windows 10 Technical Preview updated, boasts 7,000 changes and fixes - CNE
www.tripwire.com
www.tripwire.com
Drupal PSA: If You Didn't Patch Within 7 Hours Consider Your Site Compromised - The State of Security
www.youtube.com
www.youtube.com
Sue Oliva - Juniper Networks talks to Total Telecom - YouTube
www.technologyreview.com
www.technologyreview.com
Startup Semprius Fights to Bring Breakthrough Solar Tech to Market | MIT Technology Review
abc7news.com
abc7news.com
Hackers Breach White House's Unclassified Computer Network | abc7news.com
www.itworld.com
www.itworld.com
How to figure out if a data breach is a hoax | ITworld
www.rawstory.com
www.rawstory.com
Hackers break into White House computer network
www.vanityfair.com
www.vanityfair.com
Cyber Attack Hits White House, Causing Outages | Vanity Fair
www.freep.com
www.freep.com
Was Russia involved in White House cyber attacks?
www.cnet.com
www.cnet.com
How to control Touch ID on the iPhone and iPad - CNE
www.govtech.com
www.govtech.com
Data Breaches Jump in California and are Expected to Keep Climbing
www.natlawreview.com
www.natlawreview.com
FCC: The New Data Security Sheriff In Town | The National Law Review
digital.asiaone.com
digital.asiaone.com
Apple says 'Shellshock' no risk to vast majority of Mac users, AsiaOne Digital News
www.scmagazine.com
www.scmagazine.com
California data breach report reveals spike in incidents - SC Magazine
www.cnet.com
www.cnet.com
How to fix Text Message Forwarding issues on iOS 8.1 - CNE
www.krollontrack.co.uk
www.krollontrack.co.uk
Common cloud myths revealed
www.wired.com
www.wired.com
Why So Many American Retailers Are Fighting to Freeze Out Apple Pay | WIRED
www.njspotlight.com
www.njspotlight.com
Practice Makes Imperfect: Why Do We Keep Getting Disaster Recovery Wrong? - NJ Spotlight
www.macrumors.com
www.macrumors.com
MCX Confirms Retailer Exclusivity for CurrentC Mobile Payments, but No Fines for Leaving Consortium - Mac Rumors
www.cio-today.com
www.cio-today.com
Microsoft Offers Office 365 Users Free, Unlimited OneDrive Storage - Data Storage on CIO Today
www.cio-today.com
www.cio-today.com
Android's Surprising Next Big Competitor: Google - Mobile Tech on CIO Today
abcnews.go.com
abcnews.go.com
What We Know Now About CurrentC, the Apple Pay Competitor - ABC News
www.mis-asia.com
www.mis-asia.com
MIS-Asia - Office 365 admins get spreadsheet search help
blog.phonebloks.com
blog.phonebloks.com
PHONEBLOKS.COM • VIDEO: PROJECT ARA UPDATE By Dave Hakkens,...
www.macobserver.com
www.macobserver.com
MCX Holds Press Conference, Does Itself No Favors - The Mac Observer
www.bizjournals.com
www.bizjournals.com
White House computer network reportedly breached by Russian hackers - Silicon Valley Business Journal
www.informationweek.in
www.informationweek.in
Gartner busts top 10 cloud myths - InformationWeek – IT news & articles
www.cso.com.au
www.cso.com.au
Information-security implications feared as Parliament weighs data retention - CSO | The Resource for Data Security Executives
fox5sandiego.com
fox5sandiego.com
18.5m Californians vulnerable to fraud | FOX5 San Diego – San Diego news, weather, traffic, sports from KSWB
vator.tv
vator.tv
Apple Pay competitor CurrentC suffers e-mail breach | VatorNews
www.cso.com.au
www.cso.com.au
Adopters of Australian Azure must remember security, governance obligations - CSO | The Resource for Data Security Executives
www.cso.com.au
www.cso.com.au
Breakthrough in MPC Cryptography makes Cloud and Online computing more secure - Media Releases - CSO | The Resource for Data Security Executives
www.pcworld.com
www.pcworld.com
Attack campaign infects industrial control systems with BlackEnergy malware | PCWorld
www.theregister.co.uk
www.theregister.co.uk
Mozilla releases geolocating WiFi sniffer for Android • The Register
www.wired.com
www.wired.com
A Neuroscientist's Radical Theory of How Networks Become Conscious | WIRED
www.dailymail.co.uk
www.dailymail.co.uk
Facebook, Twitter, Instagram AND trolls will be charged over hate-filled posts | Daily Mail Online
www.drupal.org
www.drupal.org
Drupal Core - Highly Critical - Public Service announcement - PSA-2014-003 | Drupal.org
thenextweb.com
thenextweb.com
CurrentC, an Apple Pay Rival, Has Been Hacked
www.theregister.co.uk
www.theregister.co.uk
Big Retail's Apple Pay killer CurrentC HACKED, tester info stolen • The Register
www.macworld.com
www.macworld.com
CurrentC won’t let email hack delay launch as it explores NFC | Macworld
www.theguardian.com
www.theguardian.com
GCHQ views data without a warrant, government admits | UK news | The Guardian
www.tripwire.com
www.tripwire.com
Security Slice: Internet Privacy Realities - The State of Security
www.tripwire.com
www.tripwire.com
Fidelity National employees hacked after targeted phishing attack
www.tripwire.com
www.tripwire.com
Beyond a Major, To Be Successful In Security You Need To Select The Right Minor - The State of Security
www.theregister.co.uk
www.theregister.co.uk
Drupalocalypse! Devs say it's best to assume your CMS is owned • The Register
www.rsaconference.com
www.rsaconference.com
Security in the Cloud? Your Questions and Cloud Resources – Blog Post – RSA Conference
www.microsoft.com
www.microsoft.com
Microsoft Band, the smart band powered by Microsoft Health
www.nbcdfw.com
www.nbcdfw.com
Computer Hackers Attack Cleburne After Dog Shooting | NBC 5 Dallas-Fort Worth
www.eweek.com
www.eweek.com
Microsoft Tightens the Lid on Office 365 Data
www.theregister.co.uk
www.theregister.co.uk
Big Retail: We don't hate Apple, just the credit card companies • The Register
whnt.com
whnt.com
Cyber security experts warn Rocket City is top target for hackers | WHNT.com
www.listener.co.nz
www.listener.co.nz
Fire Brand - Profile - The Listener
mashable.com
mashable.com
Leaked employee passwords open up Fortune 500 companies to hackers
www.eweek.com
www.eweek.com
Research Suggests Backoff Malware Still Widely Infecting POS Systems
gizmodo.com
gizmodo.com
FM Radio Hack Allows Data To Be Routed Out of Isolated Networks
www.csoonline.com
www.csoonline.com
How to figure out if a data breach is a hoax | CSO Online
www.theatlantic.com
www.theatlantic.com
Did Russia Just Hack the White House? - The Atlantic
www.bostonglobe.com
www.bostonglobe.com
JPMorgan data breach affected 76 million households - Business - The Boston Globe
www.networkworld.com
www.networkworld.com
What IBM can learn from its own cybersecurity business | Network World
www.630wpro.com
www.630wpro.com
White House Still Impacted by ‘Inconveniences’ Following Breach of Computer System | WPRO-AM
www.karnnewsradio.com
www.karnnewsradio.com
KARN News Radio 102.9 FM / 920 AM - Some White House Computer Networks Breached by Hackers [From ABC News]
in.reuters.com
in.reuters.com
Suspicious cyber activity at White House detected, addressed| Reuters
www.dailytech.com
www.dailytech.com
DailyTech - The Usual Suspects: Russia or China Suspected in White House Data Breach
www.mercedsunstar.com
www.mercedsunstar.com
Merced community news from Merced Sun-Star in Merced, CA | MercedSunStar.com
www.wallstreetotc.com
www.wallstreetotc.com
Russian Hackers Suspected For Breaching White House Computers | Wall Street OTC
www.ledger-enquirer.com
www.ledger-enquirer.com
Local News | Columbus Ledger Enquirer
www.smh.com.au
www.smh.com.au
White House hack just the beginning: experts say major cyberattack coming soon
www.techtimes.com
www.techtimes.com
White House detects, addresses sustained cyberattack. Who is the culprit? : LIFE : Tech Times
www.latinpost.com
www.latinpost.com
White House Cyberattack: Officials Confirm Computer Network Hit by Sustained Cyberattack : US News : Latin Post
www.linuxinsider.com
www.linuxinsider.com
The Long and Winding Road to Shellshock Recovery | Enterprise | LinuxInsider
www.thecalifornian.com
www.thecalifornian.com
Supes campaigns show slight shifts in focus
www.huffingtonpost.com
www.huffingtonpost.com
U.S. Health Care System Woefully Unprepared For Ebola
www.computerworld.co.nz
www.computerworld.co.nz
Office 365 admins get spreadsheet search help - Computerworld New Zealand
www.wired.com
www.wired.com
Hackers Are Using Gmail Drafts to Update Their Malware and Steal Data | WIRED
blog.trendmicro.com
blog.trendmicro.com
Shared Responsibility Examples: The Re:Boot -
packetstormsecurity.com
packetstormsecurity.com
Red Hat Security Advisory 2014-1726-01 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Red Hat Security Advisory 2014-1727-01 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Red Hat Security Advisory 2014-1728-01 ≈ Packet Storm
www.eweek.com
www.eweek.com
Hackers Reportedly Breached White House Network
www.punchng.com
www.punchng.com
Cyber breaches put 18.5 million Californians’ data at risk
www.natlawreview.com
www.natlawreview.com
California Attorney General’s Second Annual Data Breach Report Finds Dramatic Increase in Number of Data Breaches | The National Law Review
packetstormsecurity.com
packetstormsecurity.com
Mandriva Linux Security Advisory 2014-211 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Red Hat Security Advisory 2014-1725-01 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Debian Security Advisory 3050-2 ≈ Packet Storm
www.sddt.com
www.sddt.com
San Diego Source > Technology > Cybersecurity tops SPAWAR concerns
www.philly.com
www.philly.com
Internet experts: 'Widespread harm' likely from cyber attack in next decade
www.nst.com.my
www.nst.com.my
Options to curb terror | New Straits Times
www.pcworld.com
www.pcworld.com
How to figure out if a data breach is a hoax | PCWorld
news.techworld.com
news.techworld.com
How to figure out if a data breach is a hoax - Techworld.com
www.csoonline.com
www.csoonline.com
BSides Toronto 2014 | CSO Online
recode.net
recode.net
Nico Sell of Wickr: Privacy Is the New Fame | Re/code
redteams.net
redteams.net
Rappelling off a roof — Red Teams
www.sddt.com
www.sddt.com
San Diego Source > News > Cybersecurity tops SPAWAR concerns
www.reuters.com
www.reuters.com
Wal-Mart and allies in face-off with Apple Pay over mobile payments| Reuters
www.theregister.co.uk
www.theregister.co.uk
The NO-NAME vuln: wget mess patched without a fancy brand • The Register
twitter.com
twitter.com
Juniper Networks sur Twitter : "Spooky week! http://t.co/sQXgjIkcqa"
www.forbes.com
www.forbes.com
Walgreens Exec On Why They're Backing Apple Pay - Forbes
www.star-telegram.com
www.star-telegram.com
Cleburne’s computer systems under attack by hackers | Local News | News from Fort...
www.news10.net
www.news10.net
Tips for protecting yourself against cyber attacks
www.azcentral.com
www.azcentral.com
The Attkisson hacking incident: Vexed by Vox
www.virtual-strategy.com
www.virtual-strategy.com
Just Announced 2014 Corporate Information Security Policy Manual Available for Download from the Compliance Leaders at myinformationsecuritypolicy.com | Virtual-Strategy Magazine
outsidelens.scmagazine.com
outsidelens.scmagazine.com
Watch "Android malware leverages Tor" Video at SCMagazine
twitter.com
twitter.com
Juniper Networks sur Twitter : "Enact #security solutions to fight today’s threats. #NCSAM http://t.co/e3lNvMLCc8"
www.forbes.com
www.forbes.com
Find Out Whether This Unkillable Tracker Is On Your Smartphone - Forbes
www.darkreading.com
www.darkreading.com
Georgia Tech Releases 2015 Emerging Cyber Threats Report
mainisusuallyafunction.blogspot.fr
mainisusuallyafunction.blogspot.fr
main is usually a function: A taste of Rust (yum) for C/C++ programmers
www.orlandosentinel.com
www.orlandosentinel.com
OPD, OCSO mishandled Carline Brumaire Jean case, internal reviews show - Orlando Sentinel
www.truth-out.org
www.truth-out.org
"Citizenfour" Directly Confronts the Intelligence Apparatus' Subversion of Democracy
time.com
time.com
Why You Should Care That the White House Got Hacked
blog.trendmicro.com
blog.trendmicro.com
Flash Pack Exploit Leads to New Family of Malware
ottawacitizen.com
ottawacitizen.com
Cyber security a non-stop headache for federal government, conference hears | Ottawa Citizen
www.scmagazine.com
www.scmagazine.com
Virtualization advancements focus on protecting data at the source, not on the device - SC Magazine
globenewswire.com
globenewswire.com
ForeScout Partners With McAfee to Deliver Dynamic Endpoint Protection
www.cnet.com
www.cnet.com
Apple Pay rival CurrentC hit by hackers - CNE
www.cnet.com
www.cnet.com
Retail group MCX says it's not telling merchants to block Apple Pay - CNE
www.healthtechzone.com
www.healthtechzone.com
University of Rochester Medical Center Installs ForeScout Security
talkincloud.com
talkincloud.com
RackWare, NetApp Partner for Cloud-based Disaster Recovery | Cloud Companies content from Talkin' Cloud
www.frasercoastchronicle.com.au
www.frasercoastchronicle.com.au
Disaster recovery funds must continue: councillor | Fraser Coast Chronicle
mspmentor.net
mspmentor.net
6 Backup and Disaster Recovery (BDR) Lessons From October | InfoCenter BDR content from MSPmentor
venturebeat.com
venturebeat.com
Whisper, Secret, and Snapchat leaks show that fake privacy is almost worse than no privacy at all | VentureBeat | Security | by Ruth Reader
whnt.com
whnt.com
WHNT.com
www.rsaconference.com
www.rsaconference.com
A Whole New Way to Spot Malware Before It Spots You – Blog Post – RSA Conference
duartes.org
duartes.org
What Does an Idle CPU Do? - Gustavo Duarte
www.stltoday.com
www.stltoday.com
AP IMPACT: US health care unprepared for Ebola : News
www.therecorder.com
www.therecorder.com
AG Says 18 Million in State Touched by Data Breaches Last Year | The Recorder
www.computerworld.com
www.computerworld.com
Apple Pay rival MCX defends security after hackers steal emails | Computerworld
www.medpagetoday.com
www.medpagetoday.com
Munchausen by Proxy: A Case Study of Abuse
www.nytimes.com
www.nytimes.com
Hacking Sexism in the Tech Industry - Room for Debate - NYTimes.com
www.dailymail.co.uk
www.dailymail.co.uk
AP IMPACT: If Ebola batters US, we are not ready | Daily Mail Online
www.huffingtonpost.ca
www.huffingtonpost.ca
More Surveillance Punishes Canadians, Not Terrorists | Tom Henheffer
time.com
time.com
Apple Pay: Apple Pay Competitor CurrentC Has Already Been Hacked
arstechnica.com
arstechnica.com
Of course blocking instant messaging at work makes sense | Ars Technica
www.gamerheadlines.com
www.gamerheadlines.com
A Review of the Avast Antivirus After 25 Years
www.google.co.uk
www.google.co.uk
About Google - Products
www.symantec.com
www.symantec.com
Activate Symantec’s “Disarm” Feature to Sanitize Infected PowerPoint Attachments | Symantec Connect
www.channelnomics.com
www.channelnomics.com
Time to step up: vendors missing the mark on IoT - from Channelnomics.com
www.theregister.co.uk
www.theregister.co.uk
Australian E-Health records breached twice in the last year • The Register
twitter.com
twitter.com
McAfee Inc. sur Twitter : "Pop culture's biggest icons are a cause for online search concern—beware of the #RiskyCeleb Top 10: http://t.co/WaWORtYOtO"
www.wpxi.com
www.wpxi.com
Data breach victimizes local woman; Info you need to know | www.wpxi.com
blog.trendmicro.com
blog.trendmicro.com
Modern Day Dillinger Gangs -
blog.getbootstrap.com
blog.getbootstrap.com
Bootstrap 3.3.0 released · Bootstrap Blog
www.csoonline.com
www.csoonline.com
California reports huge jump in data breaches | CSO Online
www.tweaktown.com
www.tweaktown.com
'State sponsored' Russian hacker group is attacking geographic rivals
www.goodgearguide.com.au
www.goodgearguide.com.au
Gigamon says it can analyze attacker SSL traffic without hitting performance - Good Gear Guide Australia
www.darkreading.com
www.darkreading.com
Keep Calm & Verify: How To Spot A Fake Online Data Dump
www.usatoday.com
www.usatoday.com
Apple Pay competitor confirms email breach
www.weeklystandard.com
www.weeklystandard.com
Russian Hackers Take White House? | The Weekly Standard
money.cnn.com
money.cnn.com
White House hacked - Oct. 29, 2014
www.phonenews.com
www.phonenews.com
CurrentC Platform Suffers Security Breach During Pilot Program, MCX Group Attempts To Save Face
theweek.com
theweek.com
White House computers attacked by suspected Russian hackers - The Week
www.itproportal.com
www.itproportal.com
FOCUS 14 live: Obama needs to win back trust after Snowden revelations, says Condoleezza Rice | ITProPortal.com
ktla.com
ktla.com
Best Of: Free Antivirus Software | KTLA
www.computerworlduk.com
www.computerworlduk.com
Office 365 admins get spreadsheet search help - ComputerworldUK.com
6abc.com
6abc.com
Hackers Breach White House's Unclassified Computer Network | 6abc.com
www.lexology.com
www.lexology.com
How to respond to SEC inquiries concerning data breach and data security policies - Lexology
www.phoenixvillenews.com
www.phoenixvillenews.com
Collegeville-based Just Chimneys cleaning service fulfills growing need
www.chron.com
www.chron.com
Gallup: More Americans worried about hacking than murder - Houston Chronicle
www.gympietimes.com.au
www.gympietimes.com.au
The Mirror journalists to face phone-hacking charges | Gympie Times
www.phoenixnewtimes.com
www.phoenixnewtimes.com
Citizenfour's Laura Poitras Explains Why Edward Snowden Did It | Phoenix New Times
www.crn.com
www.crn.com
SVP Young: Intel Security Has No Need To Poach Symantec Partners - Page: 1 | CRN
resources.csoonline.com
resources.csoonline.com
Next Generation Firewall: CSO Webcast
www.scmagazine.com
www.scmagazine.com
Popular Science served up Rig Exploit Kit on its website - SC Magazine
www.eweek.com
www.eweek.com
SMBs See IoT Potential, Wary of Possible Challenges
www.scmagazine.com
www.scmagazine.com
Attack on White House systems breached unclassified networks - SC Magazine
blogs.microsoft.com
blogs.microsoft.com
Now available – "Windows Server 2012 Security from End to Edge and Beyond" | Cyber Trust Blog
www.theverge.com
www.theverge.com
The FBI created a fake malware-spreading newspaper article to trace a bomb threat | The Verge
www.theverge.com
www.theverge.com
Email addresses stolen from CurrentC in security breach | The Verge
www.sunshinecoastdaily.com.au
www.sunshinecoastdaily.com.au
The Mirror journalists to face phone-hacking charges | Sunshine Coast Daily
www.statetechmagazine.com
www.statetechmagazine.com
How Governments Can Mitigate Data Risks | StateTech Magazine
www.scmagazineuk.com
www.scmagazineuk.com
'Sophisticated' Chinese hackers launched attacks against 43,000 computer systems - SC Magazine UK
www.macrumors.com
www.macrumors.com
How to Use AirDrop to Share Files Between Macs and iOS Devices - Mac Rumors
www.neowin.net
www.neowin.net
Panda Free Antivirus 15.0.3 - Neowin
www.washingtonpost.com
www.washingtonpost.com
Retail industry’s Apple Pay rival has experienced a data breach - The Washington Post
virtualizationreview.com
virtualizationreview.com
Are Containers the Beginning of the End of Virtual Machines? -- Virtualization Review
www.tripwire.com
www.tripwire.com
Apple Pay Competitor CurrentC Reports Breach By 'Unauthorized Third-Parties' - The State of Security
www.scmagazine.com
www.scmagazine.com
Deloitte releases paper on vetting leaks, avoiding costly hoax - SC Magazine
www.androidorigin.com
www.androidorigin.com
Apple Mac OS X Yosemite Update: Wi-Fi Bug
www.techradar.com
www.techradar.com
How to protect your business hardware | News | TechRadar
www.pcworld.com
www.pcworld.com
Microsoft's new Office 365 search tool is like Minesweeper for Excel spreadsheets | PCWorld
www.insurancejournal.com
www.insurancejournal.com
PCI Elects Erie's Cavanaugh As Chair
www.theregister.co.uk
www.theregister.co.uk
Bad dog: Redmond's new IE tool KILLS POODLE with one shot • The Register
www.csoonline.com
www.csoonline.com
Apple Pay rival CurrentC suffers pre-launch compromise | CSO Online
Independentherald.com
Independentherald.com
Independent Herald - independentherald.com
www.theguardian.com
www.theguardian.com
FBI demands new powers to hack into computers and carry out surveillance | US news | theguardian.com
www.scpr.org
www.scpr.org
Apple Pay competitor CurrentC reports data breach | 89.3 KPCC
www.wxyz.com
www.wxyz.com
FCC: Telecom customers' data may have been exposed in cybercrime havens abroad - DecodeDC Story
www.nextgov.com
www.nextgov.com
NSA Chief Warns Companies Against Revenge Hacking - Nextgov.com
www.lexology.com
www.lexology.com
FCC enters new area of privacy and data security regulation with proposed $10 million fine - Lexology
www.independent.co.uk
www.independent.co.uk
Criminal phone-hacking charges against up to nine Mirror Group journalists 'imminent' - Crime - UK - The Independent
virtualizationreview.com
virtualizationreview.com
Gartner Explodes 10 Cloud Myths -- Virtualization Review
www.zdnet.com
www.zdnet.com
Microsoft releases anti-POODLE Fix It | ZDNet
www.kb.cert.org
www.kb.cert.org
Vulnerability Note VU#973460 - drchrono Electronic Health Record (EHR) web applications vulnerable to cross-site scripting and cross-site request forgery
staysafeonline.org
staysafeonline.org
StaySafeOnline.org
blogs.microsoft.com
blogs.microsoft.com
Microsoft’s Perspective on the Cybersecurity Framework: Next Steps for Incentives and International Harmonization | Cyber Trust Blog
www.infosecisland.com
www.infosecisland.com
Compliance-Based Infosec Vs Threat-Based Infosec
www.crn.com
www.crn.com
Hexis, Others Put Security Response On Autopilot - Page: 1 | CRN
www.bsminfo.com
www.bsminfo.com
The BYOD Disconnect Complying With Mobile Device Security At Work
bgr.com
bgr.com
Google Gmail drafts malware attack discovered | BGR
www.bloomberg.com
www.bloomberg.com
CurrentC, an Apple Pay Rival, Gets Hit by Hackers - Bloomberg
newsinfo.inquirer.net
newsinfo.inquirer.net
AFP mulls filing disbarment case vs Laude family lawyer Harry Roque | Inquirer News
phys.org
phys.org
'Major' hacking attack in US looms: expert survey
seclists.org
seclists.org
Bugtraq: CVE-2014-8399 SQL Injection in NuevoLabs flash player for clipshare
www.net-security.org
www.net-security.org
White House network breach was likely nation-sponsored
www.autonet.ca
www.autonet.ca
Dispelling car hacking fears | Autonet.ca
www.bizjournals.com
www.bizjournals.com
N.J. close to passing tougher regulation on data breaches - Philadelphia Business Journal
www.forbes.com
www.forbes.com
Blocking Apple Pay Is A Terrible Strategy For CurrentC Merchants - Forbes
www.businessweek.com
www.businessweek.com
CurrentC's Data Breach Adds to Awful Week for Apple Pay Rival - Businessweek
www.govexec.com
www.govexec.com
NSA Chief Warns Companies Against Revenge Hacking - Defense - GovExec.com
www.straitstimes.com
www.straitstimes.com
'Major' hacking attack looming in US: Expert survey
twitter.com
twitter.com
McAfee Inc. sur Twitter : ".@condoleezzarice and @youngdchris have an informal chat about the current landscape of #cybersecurity at #FOCUS14 http://t.co/dKAU8EynIC"
blogs.cisco.com
blogs.cisco.com
#CiscoChampion Radio S1|Ep 38. Threat Focused Firewall
seclists.org
seclists.org
Bugtraq: SEC Consult SA-20141029-0 :: Multiple critical vulnerabilities in Vizensoft Admin Panel
seclists.org
seclists.org
Bugtraq: SEC Consult SA-20141029-1 :: Persistent cross site scripting in Confluence RefinedWiki Original Theme
twitter.com
twitter.com
Patrick Flynn sur Twitter : "McAfee's DXL Digital Exchange Layer #FOCUS14 http://t.co/RkJQGUtdiA"
www.csoonline.com
www.csoonline.com
Attack campaign infects industrial control systems with BlackEnergy malware | CSO Online
twitter.com
twitter.com
Juniper Networks sur Twitter : "A new day, a new quiz question. Show off your chops in today’s certification quiz. http://t.co/sYVKVH55py"
www.infosecisland.com
www.infosecisland.com
Cracking wifi passwords with Kali Linux
mspmentor.net
mspmentor.net
Kaspersky Lab: 94% of Companies Are Dealing with Cybersecurity Issues | Managed Security Services content from MSPmentor
thehill.com
thehill.com
Samsung fixes bug that let hackers lock phones | TheHill
arstechnica.com
arstechnica.com
Hackers swipe e-mail addresses from Apple Pay-competitor CurrentC | Ars Technica
www.iol.co.za
www.iol.co.za
Credit-card hacking 'is top crime worry' - IOL SciTech | IOL.co.za
thehill.com
thehill.com
Rival to Apple Pay is breached by hackers | TheHill
www.nfcworld.com
www.nfcworld.com
MCX suffers email address data breach • NFC World+
siliconangle.com
siliconangle.com
Samsung users vulnerable to DDoS attacks via Find My Mobile service | SiliconANGLE
www.techweekeurope.co.uk
www.techweekeurope.co.uk
NHS Trusts Are Still Struggling On With Windows XP, FOI Request Finds
www.washingtontimes.com
www.washingtontimes.com
White House won't confirm Russian hacking connection - Washington Times
www.cultofmac.com
www.cultofmac.com
Apple Pay’s biggest competitor has already been hacked | Cult of Mac
www.marketwired.com
www.marketwired.com
StrikeForce Technologies, Inc. Announces Cino Ltd. as a Global Cyber Security Distributor
seclists.org
seclists.org
Bugtraq: [security bulletin] HPSBUX03159 SSRT101785 rev.1 - HP-UX kernel, Local Denial of Service (DoS)
seclists.org
seclists.org
Bugtraq: [ MDVSA-2014:211 ] wpa_supplicant
abc30.com
abc30.com
Hackers Breach White House's Unclassified Computer Network | abc30.com
www.itproportal.com
www.itproportal.com
FireEye uncovers Russian malware with hint of government backing | ITProPortal.com
www.pcpro.co.uk
www.pcpro.co.uk
Five smartwatch features we’ll see by 2015 | Features | PC Pro
www.pcworld.idg.com.au
www.pcworld.idg.com.au
Gigamon says it can analyze attacker SSL traffic without hitting performance - PC World Australia
appadvice.com
appadvice.com
Apple Pay competitor CurrentC suffers its first data breach -- AppAdvice
www.wral.com
www.wral.com
AP IMPACT: US health care unprepared for Ebola :: WRAL.com
www.cbsnews.com
www.cbsnews.com
​Samsung phones vulnerable to hacking - CBS News
techcrunch.com
techcrunch.com
Retailer-Backed Apple Pay Rival CurrentC Has Been Hacked, Testers’ Email Addresses Stolen | TechCrunch
www.mynews4.com
www.mynews4.com
Panel teaches small business how to secure technology - My News 4 - KRNV, Reno, NV
twitter.com
twitter.com
Gavin Struthers sur Twitter : "#FOCUS14 #intelsecurity @MichaelFeyCTO 2014 marks the death of security by obscurity http://t.co/g9EDRUG2ba"
www.scmagazine.com
www.scmagazine.com
Hacker Lacroix apologizes, gets four years in federal prison - SC Magazine
play.google.com
play.google.com
AntiVirus PRO Android Security - Android Apps on Google Play
blogs.technet.com
blogs.technet.com
MSRC - Site Home - TechNet Blogs
store.digitalriver.com
store.digitalriver.com
Kaspersky Lab eStore
my.kaspersky.com
my.kaspersky.com
My Kaspersky
www.channelbiz.co.uk
www.channelbiz.co.uk
SMB Disaster Recovery Toolkit Released By DatabarracksChannelBiz UK
www.scmagazine.com
www.scmagazine.com
Securonix taps former BofA exec for chief scientist role - SC Magazine
www.bankinfosecurity.com
www.bankinfosecurity.com
Espionage Hacks Tied To Russians - BankInfoSecurity
sprout.hp.com
sprout.hp.com
Sprout | HP® Official Site
www.mbtmag.com
www.mbtmag.com
Walk, Don’t Run: A Security Framework For Midsize Organizations
www.huffingtonpost.com
www.huffingtonpost.com
Why Credit Card Companies Couldn't Stop Hacks At Target And Home Depot
www.sanluisobispo.com
www.sanluisobispo.com
Latest local news from San Luis Obispo, CA | The Tribune
www.siliconbeat.com
www.siliconbeat.com
Survey finds many experts fear worsening cyber attacks | SiliconBeat
news.sky.com
news.sky.com
White House Computers Breached By Hackers
www.usatoday.com
www.usatoday.com
Experts: Major cyberattack will hit in next 11 years
www.buzzfeed.com
www.buzzfeed.com
White House Computers Breached By Suspected Russian Hackers
www.theguardian.com
www.theguardian.com
White House’s unclassified computer network hacked | US news | The Guardian
www.net-security.org
www.net-security.org
Fake "Online Ebola Alert Tool" delivers Trojan, unwanted apps
www.net-security.org
www.net-security.org
Orgs choose network performance over security
www.scmagazine.com
www.scmagazine.com
MPAA urges USTR to put pirate sites on 'Notorious Markets' list - SC Magazine
newsroom.juniper.net
newsroom.juniper.net
Juniper Networks - press-releases
www.reporternews.com
www.reporternews.com
Hacking is the crime Americans worry about most, Gallup poll shows - DecodeDC Story
www.pewinternet.org
www.pewinternet.org
Cyber Attacks Likely to Increase | Pew Research Center's Internet & American Life Project
www.nydailynews.com
www.nydailynews.com
Russia may have hacked White House computers: report  - NY Daily News
blogs.cisco.com
blogs.cisco.com
The Value of Endpoint and Network Protection Together
www.youtube.com
www.youtube.com
Securing Your Online Reputation - YouTube
www.npr.org
www.npr.org
Can Authorities Cut Off Utilities And Pose As Repairmen To Search A Home? : NPR
www.virtual-strategy.com
www.virtual-strategy.com
Voxer Appliance Enables Self-Contained, Secure, Real-Time Voice and Instant Messaging Deployments for Government Organizations | Virtual-Strategy Magazine
www.insidetrade.co
www.insidetrade.co
Easy Network Security with Palo Alto Networks | InsideTrade
www.trutower.com
www.trutower.com
Voxer Appliance Brings Secure, Real-time Voice, Instant Messaging Deployments to Government Organizations | TruTower
www.therem.org
www.therem.org
Chrome update vs Firefox download with security armor for Mac OS X and Windows 8.1 - The REM
www.sourcewire.com
www.sourcewire.com
Check Point Launches Capsule: Mobile Security that Goes Wherever Users Go
www.fedtechmagazine.com
www.fedtechmagazine.com
Four Strategies for Successful Next-Generation Firewall Deployment | FedTech Magazine
time.com
time.com
Know Right Now: Russian Hackers Take on the White House
www.aegindia.org
www.aegindia.org
Cost Of Data Breach Detection System Rising; Will Be Over $1bn By 2018 | AEG India
www.northcountrypublicradio.org
www.northcountrypublicradio.org
Emory Hospital Shares Lessons Learned On Ebola Care | NCPR News
time.com
time.com
Americans Are More Afraid of Being Hacked Than Getting Murdered
www.techworld.com
www.techworld.com
Anti-virus is no longer enough - new apps show how vulnerability scanning is becoming a must - Blogs - Techworld.com
www.itbusinessedge.com
www.itbusinessedge.com
Five Ways Automation Speeds Up Big Data Deployments
nakedsecurity.sophos.com
nakedsecurity.sophos.com
TeamDigi7al US navy hacker sentenced to 2 years in jail | Naked Security
krebsonsecurity.com
krebsonsecurity.com
How to Tell Data Leaks from Publicity Stunts — Krebs on Security
nakedsecurity.sophos.com
nakedsecurity.sophos.com
The “Dirty Dozen” SPAMPIONSHIP – who’s got the biggest zombie problem? | Naked Security
www.bankinfosecurity.com
www.bankinfosecurity.com
Banks' Concerns About Cyberthreats Grow - BankInfoSecurity
www.infoworld.com
www.infoworld.com
The big one: The makings of a global cyber attack | InfoWorld
www.utsandiego.com
www.utsandiego.com
More Californians exposed to data breaches, says state Attorney General | UTSanDiego.com
www.techrepublic.com
www.techrepublic.com
Microsoft's Android moment has arrived - TechRepublic
www.thestar.com.my
www.thestar.com.my
Lollipop's new features sweeten the Android experience - Tech Opinion | The Star Online
redmondmag.com
redmondmag.com
Top Security Threats Still Plaguing Enterprise Cloud Adoption -- Redmondmag.com
www.biznews.com
www.biznews.com
How hackers access sensitive information: cybersecurity report
www.itproportal.com
www.itproportal.com
How to make your Windows 8.1 PC run faster | ITProPortal.com
www.businessinsider.com
www.businessinsider.com
Hackers Use 'Find My Mobile' To Wipe Any Samsung Phone - Business Insider
seclists.org
seclists.org
Information Security News: Hackers breach some White House computers
www.zdnet.com
www.zdnet.com
Lite-On EP1 Series SSDs deliver PCI Express speeds in M.2 format | ZDNet
nakedsecurity.sophos.com
nakedsecurity.sophos.com
SSCC 171 – Are you SURE that “1234” is a bad password? [PODCAST] | Naked Security
twitter.com
twitter.com
RSA sur Twitter : "Remember, what you do online can potentially affect everyone. Practice good #online habits! #NCSAM http://t.co/jTOieJikT2"
www.securitytube.net
www.securitytube.net
Louisville Infosec 2014 - Changing What Game- One Future For Information Security
www.aplaceformom.com
www.aplaceformom.com
6 Ways Ambient Assisted Living Improves Quality of Life
www.pcmag.com
www.pcmag.com
Seagate NAS 2-Bay Review & Rating | PCMag.com
www.politico.com
www.politico.com
Russia-linked hackers allegedly penetrated unclassified White House networks - Sun, surf and the NIST framework - POLITICO Morning Cybersecurity - POLITICO.com
www.zdnet.com
www.zdnet.com
BYOD: Why the biggest security worry is the fool within rather than the enemy without | ZDNet
www.cpifinancial.net
www.cpifinancial.net
CPI Financial | Jobs | Business Continuity Manager
thatguy.trendmicro.com
thatguy.trendmicro.com
Password Manager – Online Account protection – Don’t be that Guy
www.facebook.com
www.facebook.com
SANS Institute - Photos du journal | Facebook
www.reuters.com
www.reuters.com
Studies find fast traders get data from SEC seconds early: WSJ| Reuters
www.businesswire.com
www.businesswire.com
McAfee Report Reveals Organizations Choose Network Performance Over Advanced Security Features | Business Wire
time.com
time.com
White House Hacked: Computer Networks Breached, Reportedly By Russians
www.tribuneindia.com
www.tribuneindia.com
The Tribune, Chandigarh, India - Latest News
blogs.wsj.com
blogs.wsj.com
Israeli Accelerator UpWest Helps Startups Move to Silicon Valley - Venture Capital Dispatch - WSJ
mspmentor.net
mspmentor.net
MSPs Can Help SMB Customers Pursue BYOD -- Safely | MSPmentor Blog
theweek.com
theweek.com
Why the defense industry is ripe picking for hackers - The Week
www.usatoday.com
www.usatoday.com
White House hacked (Russia involved?)
www.zawya.com
www.zawya.com
Growing BYOD Trend in Middle East Requires Ramped Up Data Center Security - Zawya
www.information-age.com
www.information-age.com
Why even compliant enterprises can be vulnerable in today’s threat landscape | Information Age
www.whatech.com
www.whatech.com
New report looks into Global bring your own device (BYOD) market that is expected to grow to $83.76 billion by 2019 - WhaTech
www.dailymail.co.uk
www.dailymail.co.uk
Samsung Find My Mobile bug lets hackers remotely lock devices | Daily Mail Online
www.idtheftcenter.org
www.idtheftcenter.org
Identity Theft Resource Center - TOLL-FREE NO COST ASSISTANCE at 888-400-5530
packetstormsecurity.com
packetstormsecurity.com
White House Computer Network 'Hacked' ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
BlackEnergy Malware Has Compromised Systems For 2 Years ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Hackers Are Using Gmail Drafts To Update Their Malware And Steal Data ≈ Packet Storm
www.csoonline.com
www.csoonline.com
Hackers target unclassified White House network | CSO Online
keithp.com
keithp.com
Goodbye-Barnes-and-Noble
www.computerworlduk.com
www.computerworlduk.com
For big raises in IT, look to mobile, security, big data - ComputerworldUK.com
www.darkreading.com
www.darkreading.com
Security Companies Team Up, Take Down Chinese Hacking Group
phys.org
phys.org
Walk through buildings from your own device
www.cloudcomputing-news.net
www.cloudcomputing-news.net
How software defined networking and cloud computing pave the way towards a digital society - Cloud Tech News
www.theguardian.com
www.theguardian.com
The FBI says to be wary of hackers ... and to let the FBI hack what it wants | Trevor Timm | Comment is free | theguardian.com
www.theregister.co.uk
www.theregister.co.uk
WHITE HOUSE network DOWN: Nation-sponsored attack likely • The Register
www.bloombergview.com
www.bloombergview.com
The Link You Just Clicked May Not Be Real - Bloomberg View
www.cbronline.com
www.cbronline.com
Why networks 'are being sacrificed for security' - Computer Business Review
www.theguardian.com
www.theguardian.com
'State sponsored' Russian hacker group linked to cyber attacks on neighbours | Technology | theguardian.com
blogs.wsj.com
blogs.wsj.com
Fortune 500 Companies at Risk with Exposure of Employee Passwords - The CIO Report - WSJ
www.today.com
www.today.com
Data Breaches? Bah, humbug! We're going to shop - Money - TODAY.com
www.theverge.com
www.theverge.com
Americans are more afraid of being hacked than of all other crimes, including murder | The Verge
www.nbcnews.com
www.nbcnews.com
Unwitting Workers Give Hackers Keys to Fortune 500 Firms' Networks: Study - NBC News
www.marketwired.com
www.marketwired.com
Sanovi and 3Qube Partner to Provide Business Continuity in the Cloud
www.zdnet.com
www.zdnet.com
Hackers infiltrate White House network | ZDNet
www.forbes.com
www.forbes.com
SymantecVoice: How To Hire The Best IT Security Team For Your Business - Forbes
sizeof.io
sizeof.io
Snap webcam photos whenever your app crashes
www.bakersfieldnow.com
www.bakersfieldnow.com
Attorney general: 18.5 million Californians had info hacked, stolen or exposed | Local & Regional News | Bakersfield Now - News, Weather and Sports
www.washingtonpost.com
www.washingtonpost.com
How you would fix Social Security: Sooner rather than later - The Washington Post
www.qsrweb.com
www.qsrweb.com
HMSHost deploys WatchGuard firewall system | QSRWeb
www.darkreading.com
www.darkreading.com
Cyber Espionage Attacks Attributed To Russian Government
www.inquisitr.com
www.inquisitr.com
Hacked! Russian Hackers Breached White House Computer Networks
uncovermichigan.com
uncovermichigan.com
FireEye report provides a view into Russia's cyber-espionage tactics | Uncover Michigan
www.net-security.org
www.net-security.org
US ICS operators under attack by crims wielding BlackEnergy malware
seclists.org
seclists.org
Information Security News: Army fitness standards for fat ‘cyber warriors’ may change as U.S. waistlines grow
nakedsecurity.sophos.com
nakedsecurity.sophos.com
Arrests made after ‘specialist malware’ used in £1.6 million ATM heist | Naked Security
www.prweb.com
www.prweb.com
FISMA and NIST Information Security Policies and Procedures Available for Instant Download from the Security Experts from Flat Iron Technologies, LLC
www.securitytube.net
www.securitytube.net
Louisville Infosec 2014 - Practical Interception Of Mobile Device Traffic
www.computerworld.com
www.computerworld.com
Gigamon says it can analyze attacker SSL traffic without affecting performance | Computerworld
www.wtop.com
www.wtop.com
BYOD: How to keep the boss out of your business - WTOP.com
www.cnbc.com
www.cnbc.com
Data breach: Most holiday shoppers undeterred
news.techworld.com
news.techworld.com
NHS Trusts struggling with Windows XP migration, FoI request finds - Techworld.com
www.computerworld.com
www.computerworld.com
Tech support’s NSFW problem
www.zdnet.com
www.zdnet.com
Enterprise network security takes backseat to speed: McAfee | ZDNet
www.itv.com
www.itv.com
White House computers 'breached by hackers' - ITV News
nakedsecurity.sophos.com
nakedsecurity.sophos.com
Placemeter monitors streets from apartment windows: time to don a mask? | Naked Security
swtimes.com
swtimes.com
ASU-Beebe Warns Campuses Of Possible Data Breach | Times Record
archive.org
archive.org
Internet Archive: Digital Library of Free Books, Movies, Music & Wayback Machine
www.cio-today.com
www.cio-today.com
Microsoft Offers Office 365 Users Free, Unlimited OneDrive Storage - Cloud Computing on CIO Today
www.v3.co.uk
www.v3.co.uk
Google upgrades Android Lollipop security with encryption - IT News from V3.co.uk
www.smh.com.au
www.smh.com.au
How to keep emails private and avoid embarrassing leaks
www.infoworld.com
www.infoworld.com
Azure expands, while security, storage, APIs lift Office 365 | InfoWorld
seclists.org
seclists.org
Information Security News: BlackEnergy crimeware coursing through US control systems
seclists.org
seclists.org
Information Security News: Research links massive cyber spying ring to Russia
hitconsultant.net
hitconsultant.net
New Rulings Protect Hospitals Against Security Data Breaches
www.cmswire.com
www.cmswire.com
Securing Social Business in Office 365
safety.blr.com
safety.blr.com
10 steps to a safe driving program
phys.org
phys.org
South Korea spy agency says North hacking smartphones
www.prweb.com
www.prweb.com
Newly Revised 2014 Cyber Security Policies and Procedures Available for Instant Download from the Experts at myinformationsecuritypolicy.com
www.net-security.org
www.net-security.org
10% of employees unaware if they have an IT department or not
symantecevents.verite.com
symantecevents.verite.com
Enterprise Data Protection Simplified & Enhanced with NetBackup 5330 | Symantec
antirez.com
antirez.com
This is why I can’t have conversations using Twitter - Antirez weblog
www.kyivpost.com
www.kyivpost.com
Washington Post: Russia suspected to be behind White House hack
www.reuters.com
www.reuters.com
Cyber breaches put 18.5 million Californians' data at risk in 2013: report| Reuters
www.rferl.org
www.rferl.org
White House Detects Suspicious Cyber Activity, Report Blames Russia
www.wjactv.com
www.wjactv.com
National Stories - WJAC WJACTV.com
www.marketwatch.com
www.marketwatch.com
Gigamon Announces New Solutions for SSL Visibility and Enhancements for Multi-Tiered Security - MarketWatch
www.independent.ie
www.independent.ie
Russians accused of hacking White House computer network - Independent.ie
thejournal.com
thejournal.com
Report: Security Pressures Making Older Firewalls Obsolete -- THE Journal
www.foreignpolicyjournal.com
www.foreignpolicyjournal.com
The Death Squad Dilemma: Counterinsurgency Policy and the Salvadoran Model - Foreign Policy Journal
www.businesswire.com
www.businesswire.com
Allied Telesis Selects Emerging Threats’ ETPro® and IQRisk® Products for New Range of Next-Generation Firewalls | Business Wire
www.net-security.org
www.net-security.org
IT is losing the battle on security in the cloud
thehackernews.com
thehackernews.com
Sony Xperia Devices Secretly Sending User Data to Servers in China
www.virtual-strategy.com
www.virtual-strategy.com
TITUS Recognized by McAfee as Most Valuable Partner of the Year | Virtual-Strategy Magazine
www.symantec.com
www.symantec.com
EMEA CR Awareness Event: Drumming Up EMEA’s Corporate Responsibility Initiatives | Symantec Connect
www.rsaconference.com
www.rsaconference.com
Turning Medical Device Hacks into Tools for Defenders – Podcast – RSA Conference
www.kansascity.com
www.kansascity.com
Seoul: N. Korea's Kim Jong Un had ankle surgery | The Kansas City Star
www.digitaljournal.com
www.digitaljournal.com
PhishLine Recognized as a Visionary in Gartner 2014 Magic Quadrant for Security Awareness Computer-Based Training - Press Release - Digital Journal
goldrushcam.com
goldrushcam.com
Attorney General Kamala D. Harris Releases Data Breach Report; 18.5 Million Californians’ Personal Information Put at Risk
www.securitytube.net
www.securitytube.net
Louisville Infosec 2014 - Building An Enterprise Ddos Mitigation Strategy
www.virtual-strategy.com
www.virtual-strategy.com
SC Magazine Awards PFU iNetSec Smart Finder 5-Star Rating for Features, Ease of Use, Performance, Support and Value | Virtual-Strategy Magazine
smartdatacollective.com
smartdatacollective.com
How Governments Can (and should) Use Hadoop | SmartData Collective
www.theregister.co.uk
www.theregister.co.uk
BlackEnergy crimeware coursing through US control systems • The Register
www.terravion.com
www.terravion.com
Careers - TerrAvion
www.cnet.com
www.cnet.com
Russian government gathers intelligence with malware: report - CNE
www.ndtv.com
www.ndtv.com
South Korea Spy Agency Says North Hacking Smartphones
www.usnews.com
www.usnews.com
California AG Says 18.5 Million Residents' Info Exposed - US News
thehackernews.com
thehackernews.com
Cryptography Hacks - Hash Encryption using DuckDuckGo Search Engine
www.symantec.com
www.symantec.com
Enable the Agile Data Center | Symantec
www.net-security.org
www.net-security.org
Fixing the broken windows of software security
www.prweb.com
www.prweb.com
PhishLine Recognized as a Visionary in Gartner 2014 Magic Quadrant for Security Awareness Computer-Based Training
www.finances.com
www.finances.com
Citrix Positioned for the Eighth Consecutive Year in the Leaders Quadrant for Application Delivery Controllers MQ - Finances
www.retail-week.com
www.retail-week.com
Comment: Retailers are too complacent about data security | Comment | Retail Week
gadgets.ndtv.com
gadgets.ndtv.com
US Urges More Government-Business Cooperation on Cyber-Security | NDTV Gadgets
www.marketwatch.com
www.marketwatch.com
New Personal Trading Instruments (PCI) from IFC Markets are Now Available for Trading - MarketWatch
www.computerworlduk.com
www.computerworlduk.com
Microsoft leans on data-center strength to get cloud edge - ComputerworldUK.com
triblive.com
triblive.com
Charleroi to review school security plan | TribLIVE
www.sfgate.com
www.sfgate.com
Personal data of more than 18.5 million Californians exposed - SFGate
www.power-eng.com
www.power-eng.com
Gartner Recognizes FishNet Security for Computer-Based Security Awareness Training - Power Engineering
edition.cnn.com
edition.cnn.com
North Korea: Stop sending it luxury goods (Opinion) - CNN.com
firstlook.org
firstlook.org
Ed Snowden Taught Me To Smuggle Secrets Past Incredible Danger. Now I Teach You. - The Intercept
www.ihealthbeat.org
www.ihealthbeat.org
Warnings Issued About Fake Ebola Treatments, Malware Scams - iHealthBeat
priceonomics.com
priceonomics.com
The Man Who Writes His Dissenting Opinion in ALL CAPS
www.cbsnews.com
www.cbsnews.com
Maine nurse who treated Ebola patients will not observe quarantine - CBS News
www.thedailybeast.com
www.thedailybeast.com
Hackers Breach White House Computers - The Daily Beast
www.kpbs.org
www.kpbs.org
Personal Info Of 18.5M Californians Exposed In 2013 | KPBS
www.marketwatch.com
www.marketwatch.com
McAfee Report Reveals Organizations Choose Network Performance Over Advanced Security Features - MarketWatch
www.latimes.com
www.latimes.com
Data breaches jump in California and are expected to keep climbing - LA Times
www.miamiherald.com
www.miamiherald.com
Seoul: N. Korea's Kim Jong Un had ankle surgery | The Miami Herald
www.sci-tech-today.com
www.sci-tech-today.com
IBM Rolls Out Analytics-Based Security Solution | Sci-Tech Today
www.csoonline.com
www.csoonline.com
White House officials confirm breach on unclassified network | CSO Online
www.securitytube.net
www.securitytube.net
Louisville Infosec 2014 - A Crosswalk Of The Department Of Defense (Dod) Information Assurance Certification And Accreditation Process (Diacap)
abcnews.go.com
abcnews.go.com
Kaci Hickox Won't Follow Maine Ebola Quarantine Rule, Lawyer Says - ABC News
www.pcworld.co.nz
www.pcworld.co.nz
Gigamon says it can analyze attacker SSL traffic without hitting performance - PC World New Zealand
zeenews.india.com
zeenews.india.com
US eyes cyber `deterrence` to stop hackers
www.argusleader.com
www.argusleader.com
Boe Forum speaker: Protection from hackers a top priority
yubanet.com
yubanet.com
AG Kamala D. Harris Releases Data Breach Report; 18.5 Million Californians' Personal Information Put at Risk
www.fresnobee.com
www.fresnobee.com
Local News | FresnoBee.com
mybroadband.co.za
mybroadband.co.za
US military to secure cyberspace
www.theregister.co.uk
www.theregister.co.uk
Cisco: We made UCS secure but need your help to finish the job • The Register
www.businessinsurance.com
www.businessinsurance.com
Outgoing PCI chair wins President's Award | Business Insurance
www.businessinsurance.com
www.businessinsurance.com
New PCI chairman monitors federal regulatory posture | Business Insurance
www.scmagazine.com
www.scmagazine.com
US-CERT warns of phishing campaign spreading Dyre - SC Magazine
www.atvn.org
www.atvn.org
Data Breaches Plague California | ATVN
abcnews.go.com
abcnews.go.com
Hackers Breach White House's Unclassified Computer Network - ABC News
www.pcworld.com
www.pcworld.com
California reports huge jump in data breaches | PCWorld
www.theregister.co.uk
www.theregister.co.uk
Find My Phone does just one thing but Samsung's messed it up • The Register
www.washingtonpost.com
www.washingtonpost.com
Calif. AG: 18.5 million residents’ info exposed - The Washington Post
www.computerworld.com
www.computerworld.com
California reports huge jump in data breaches | Computerworld
abc7.com
abc7.com
Data breaches affected 18.5 million Californians last years | abc7.com
www.itnews.com.au
www.itnews.com.au
Hackers breach White House network - Security - News - iTnews.com.au
www.crn.com
www.crn.com
Intel Exec Tells Partners Missed Security Services Opportunity 'Criminal' - Page: 1 | CRN
www.computerdealernews.com
www.computerdealernews.com
New Intel Security boss asks the big question | Computer Dealer News
www.thestar.com
www.thestar.com
Has the mystery behind Kim Jong Un’s disappearance been solved? | Toronto Star
english.chosun.com
english.chosun.com
The Chosun Ilbo (English Edition): Daily News from Korea - N.Korea Hacks 20,000 S.Korean Smartphones
thevarguy.com
thevarguy.com
McAfee Overhauls Partner Program | Information Technology Channel Partner Programs content from The VAR Guy
www.stripes.com
www.stripes.com
Report: Russian hackers thought to breach White House network - News - Stripes
www.kolotv.com
www.kolotv.com
Businesses Learn Cyber Security
www.businesswire.com
www.businesswire.com
McAfee Report Reveals Organizations Choose Network Performance Over Advanced Security Features
pwc.blogs.com
pwc.blogs.com
Additional indicators relating to Sofacy (APT28) phishing - Cyber security updates
malware.dontneedcoffee.com
malware.dontneedcoffee.com
Malware don't need Coffee: The worst of Windows "Police Locker" is also available on Android
www.pcworld.com
www.pcworld.com
Security vendor coalition cleans 43,000 malware infections used for cyberespionage | PCWorld
cxsecurity.com
cxsecurity.com
MacOS X 10.10 & FreeBSD10 ftp Remote Comand Execution - CXSecurity.com
www.gurufocus.com
www.gurufocus.com
Microsoft's Innovation Can Take It Higher - GuruFocus.com
www.latimes.com
www.latimes.com
White House computer network is hacked, official says - LA Times
www.independent.ie
www.independent.ie
How an ankle brought Kim to heel - Independent.ie
www.seattlepi.com
www.seattlepi.com
Seattle FBI admits to faking news report to drop spyware on teen's computer - seattlepi.com
english.vietnamnet.vn
english.vietnamnet.vn
Social News 29/10 - News VietNamNet
blogs.technet.com
blogs.technet.com
The dangers of opening suspicious emails: Crowti ransomware - Microsoft Malware Protection Center - Site Home - TechNet Blogs
blogs.cisco.com
blogs.cisco.com
Threat Spotlight: Group 72, Opening the ZxShell
pentesteracademylab.appspot.com
pentesteracademylab.appspot.com
Pentester Academy Lab
www.ndtv.com
www.ndtv.com
North Korean Leader Kim Jong Un Had Ankle Surgery: Officials
english.yonhapnews.co.kr
english.yonhapnews.co.kr
N. Korea attempts to hack into S. Koreans' smartphones: NIS
www.pcworld.com
www.pcworld.com
Gigamon says it can analyze attacker SSL traffic without hitting performance | PCWorld
www.tripwire.com
www.tripwire.com
The Ten Most Wanted Hackers By The FBI – #9 and #8 - The State of Security
www.tripwire.com
www.tripwire.com
300,000 Social Security Numbers, driving licenses and more private data leaked after being left on publicly accessible server
thehill.com
thehill.com
Chip-based cards targeted after Home Depot hack | TheHill
www.securitytube.net
www.securitytube.net
Louisville Infosec 2014 - Issa Awards
www.voanews.com
www.voanews.com
Suspicious Activity Detected on White House Computer Network
www.reuters.com
www.reuters.com
UPDATE 2-Suspicious cyber activity at White House detected, addressed| Reuters
www.itbusiness.ca
www.itbusiness.ca
How Qualys tackles an incident response | IT Business
betanews.com
betanews.com
Google for Work scores 45,000 new users -- should Microsoft worry?
news.asiaone.com
news.asiaone.com
Suspicious cyber activity detected by technicians at the White House, AsiaOne World News
www.tomsguide.com
www.tomsguide.com
Apple Addresses 'Shellshock' Bug as More Attacks Appear
www.digitaljournal.com
www.digitaljournal.com
McAfee Delivers New Product Portfolio for Small and Medium-Sized Businesses - Press Release - Digital Journal
www.telegram.com
www.telegram.com
Cyber attacks enrich security specialists - Worcester Telegram & Gazette - telegram.com
www.heraldscotland.com
www.heraldscotland.com
NHS Greater Glasgow and Clyde issue apology after confidentiality breach | Herald Scotland
a16z.com
a16z.com
Mobile Is Eating the World | Andreessen Horowitz
www.ctvnews.ca
www.ctvnews.ca
White House says it has handled suspicious hacker activity | CTV News
en.ria.ru
en.ria.ru
Former NSA Official Warns Companies Against Cyber-Retaliation or ‘Hacking Back’ | Military & Intelligence | RIA Novosti
www.eturbonews.com
www.eturbonews.com
IATA launches Aviation Cyber Security Toolkit - eTurboNews.com
edition.cnn.com
edition.cnn.com
The world of 'hackonomics' - CNN.com Video
www.power-eng.com
www.power-eng.com
Prometric Expands Industry Leadership for Systems Security and Management - Power Engineering
www.washingtonpost.com
www.washingtonpost.com
Hackers breach some White House computers - The Washington Post
www.powerlineblog.com
www.powerlineblog.com
Is the Washington Press Corps Covering Up Another Obama Administration Fiasco? [Updated] | Power Line
www.issaquahpress.com
www.issaquahpress.com
Local issues, national candidates in Nov. 4 general election : The Issaquah Press – News, Sports, Classifieds and More in Issaquah, WA
carnegieeurope.eu
carnegieeurope.eu
A New Ambition for Europe: A Memo to the European Union Foreign Policy Chief - Carnegie Europe
www.scmagazine.com
www.scmagazine.com
FBI uncovers second person leaking government documents - SC Magazine
www.scmagazine.com
www.scmagazine.com
FireEye identifies cyber espionage group possibly tied to Russian government - SC Magazine
www.rsaconference.com
www.rsaconference.com
Avoiding BYOD? Why Setting BYOD Policies Is Increasingly Critical – Video – RSA Conference
www.latimes.com
www.latimes.com
Hacks on Californians shot up last year, more are expected this year - LA Times
abc7news.com
abc7news.com
California Attorney General Kamala Harris: 18.5 million residents' information exposed | abc7news.com
www.techtimes.com
www.techtimes.com
Hackers hit data of 18.5M Californians in mostly retail breaches : PERSONAL TECH : Tech Times
www.youtube.com
www.youtube.com
MFE PS14 Highlight - YouTube
www.theregister.co.uk
www.theregister.co.uk
'GCHQ's surveillance data gulp is BULKY and WARRANTLESS', human rights groups moan • The Register
www.techtimes.com
www.techtimes.com
Find My Phone glitch lets hackers lock up Samsung handsets : PERSONAL TECH : Tech Times
azdailysun.com
azdailysun.com
Potential data breach for 44,000 Arizona retirees
www.computerworlduk.com
www.computerworlduk.com
Office 365 is getting management features for iOS, Android and Windows Phone - ComputerworldUK.com
www.scmagazine.com
www.scmagazine.com
Amit Yoran promoted to RSA president - SC Magazine
www.islandpacket.com
www.islandpacket.com
Latest breaking news from Hilton Head & Beaufort, SC | The Island Packet
www.trendmicro.com
www.trendmicro.com
Pawn Storm Espionage Attacks Use Decoys, Deliver SEDNIT - Security News - Trend Micro USA
consumerist.com
consumerist.com
Survey: The Crime Americans Worry About Most? Credit Card Hack Attacks – Consumerist
www.scmagazine.com
www.scmagazine.com
Coalition sheds more light on Hikit threat, Axiom spy group - SC Magazine
duckduckhack.com
duckduckhack.com
DuckDuckHack
www.newsworks.org
www.newsworks.org
Data breach at Cape May-Lewes Ferry — NewsWorks
www.miamiherald.com
www.miamiherald.com
ASU-Beebe warns campuses of possible data breach | The Miami Herald
www.cso.com.au
www.cso.com.au
Gigamon announces new solutions for SSL visibility and enhancements for multi-tiered security - Media Releases - CSO | The Resource for Data Security Executives
www.scmagazine.com
www.scmagazine.com
'Cash out' crew member sentenced to 21 months in prison - SC Magazine
www.darkreading.com
www.darkreading.com
SuperValu Reports Second Cyberattack
www.securitytube.net
www.securitytube.net
Louisville Infosec 2014 - What Your Web Vulnerability Scanners Aren't Telling You
news.stv.tv
news.stv.tv
Health board apology to 86 transgender patients over privacy breach | Glasgow & West | News
www.newser.com
www.newser.com
Calif. AG: Personal data hacked, exposed from 18.5 million Calif. accounts in 2013, up 600 pct - 10/28/2014 12:37:03 PM | Newser
kjzz.org
kjzz.org
AZ State Retirment System Responds To Potential Data Breach | KJZZ
www.digitaljournal.com
www.digitaljournal.com
WatchGuard Technologies Delivers a Leading Combination of Security and Value in NSS Labs' Analysis of Next Generation Firewall Appliances - Press Release - Digital Journal
www.mymotherlode.com
www.mymotherlode.com
State Hacking Hike | myMotherLode.com
www.newsobserver.com
www.newsobserver.com
Local & North Carolina state news from Raleigh, NC | NewsObserver.com
healthitsecurity.com
healthitsecurity.com
Unencrypted Discs with PHI Create Potential Health Data Breach | HealthITSecurity.com
www.sonicscoop.com
www.sonicscoop.com
Review: Batch Commander for Pro Tools, from Slate Media Technology | SonicScoop - Creative, Technical & Business Connections For NYC’s Music & Sound Community
www.vox.com
www.vox.com
The evidence that Sharyl Attkisson got her laptop hacked seems weak - Vox
www.mycentraljersey.com
www.mycentraljersey.com
Man charged with hacking into Clinton's computers
www.newsmax.com
www.newsmax.com
Report: Russian Government in on Hacking Schemes
www.watoday.com.au
www.watoday.com.au
The grinch who hacked Telethon's Instagram account
www.scmagazine.com
www.scmagazine.com
Layering EMV chip, tokenization, encryption bolsters card payment security - SC Magazine
outsidelens.scmagazine.com
outsidelens.scmagazine.com
Watch "Hackers exploiting Microsoft PowerPoint to access computers" Video at SCMagazine
www.youtube.com
www.youtube.com
Providing Next-Gen Security for Today’s Healthcare - YouTube
blogs.microsoft.com
blogs.microsoft.com
Microsoft’s Commitment to Protect Customer Data through Encryption Continues | Cyber Trust Blog
www.nasa.gov
www.nasa.gov
NASA Television | NASA
www.nationaljournal.com
www.nationaljournal.com
NSA Chief Warns Companies Against Revenge Hackings - NationalJournal.com
www.emc.com
www.emc.com
Amit Yoran Named RSA President; Art Coviello Remains as RSA Executive Chairman
gizmodo.com
gizmodo.com
This Credit-Card-Size Cellphone Would Be the Ultimate Backup
rt.com
rt.com
​Watch your attachments: Microsoft Office bug lets hackers take over computers — RT USA
blogs.mcafee.com
blogs.mcafee.com
Gavin Struthers' Partner Summit 2014 Keynote Recap | McAfee
blogs.mcafee.com
blogs.mcafee.com
Partner Summit 2014 Wraps Up | McAfee
masterherald.com
masterherald.com
Is Jailbreaking Apple iPhone 6 and iOS 8 Legal? Let’s Find Out! | Master Herald
www.bloomberg.com
www.bloomberg.com
Hacking Group May Be Linked to Russian Government: Video - Bloomberg
www.breitbart.com
www.breitbart.com
More Evidence the Government Hacked Sharyl Attkisson's Computer
venturebeat.com
venturebeat.com
OneNote for iOS gets cloud storage attachments and Touch ID, OneNote for Mac gets SharePoint Server support | VentureBeat | News Briefs | by Emil Protalinski
techday.com
techday.com
Techday – Think you know all there is to know about the cloud? Think again
www.businessinsider.com
www.businessinsider.com
Cybersecurity Executives Raises Hacks - Business Insider
www.tripwire.com
www.tripwire.com
US-CERT Warns of Phishing Campaigns Spreading ‘Dyre’ Banking Trojan - The State of Security
www.bloomberg.com
www.bloomberg.com
Wall Street Beset by Hackers Raises Key Executive Pay - Bloomberg
windowsitpro.com
windowsitpro.com
Microsoft Launches TechEd Europe with Wave of Announcements | Cloud content from Windows IT Pro
www.kshb.com
www.kshb.com
Hacking is the crime Americans worry about most, Gallup poll shows - DecodeDC - KSHB.com
www.businessweek.com
www.businessweek.com
Wall Street Beset by Hackers Raises Key Executive Pay - Businessweek
arstechnica.com
arstechnica.com
Who knew? MPAA concerned online pirates are exposed to malware | Ars Technica
www.theguardian.com
www.theguardian.com
Tor users advised to check their computers for malware | Technology | theguardian.com
medievalbooks.nl
medievalbooks.nl
Hugging a Medieval Book | medievalbooks
www.federaltimes.com
www.federaltimes.com
Improving cybersecurity for small and medium-sized businesses | Federal Times | federaltimes.com
www.marketwired.com
www.marketwired.com
Cisco Unveils Industry's First Threat-Focused Next-Generation Firewall
www.govexec.com
www.govexec.com
Republican 2016 Contenders Have Taken Positions on NSA Reform. Where Does Hillary Clinton Stand? - Defense - GovExec.com
www.fastcompany.com
www.fastcompany.com
Why International Cybercrime Is Going To Keep Getting Worse | Fast Company | Business + Innovation
www.theregister.co.uk
www.theregister.co.uk
Security Avengers team up to take down Chinese hacking group • The Register
community.websense.com
community.websense.com
Official Website of Popular Science Compromised
twitter.com
twitter.com
Kaspersky Lab sur Twitter : "We'd like to extend a very big thank you to our sponsors today at the #KasperskyGSS Government Cybersecurity Forum: http://t.co/8LoFEB50fn"
www.securitytube.net
www.securitytube.net
Louisville Infosec 2014 - A Place At The Table
news.slashdot.org
news.slashdot.org
2600 Profiled: "A Print Magazine For Hackers" - Slashdot
www.smallbusinesscomputing.com
www.smallbusinesscomputing.com
Small Business Security: Hackers Dial Up Telephone Fraud
www.finextra.com
www.finextra.com
Finextra: Feedzai and Encap form security partnership
www.heraldnet.com
www.heraldnet.com
Lawyers in Seattle ask to move Russia hacking trial to May | HeraldNet.com - Northwest
www.itbusinessedge.com
www.itbusinessedge.com
Deliver Business Value Through Big Data: Make It Small
www.cnbc.com
www.cnbc.com
18.5M Californians' data breached last year: Report
www.dailytech.com
www.dailytech.com
DailyTech - Samsung's Remote Wipe Could Let Hackers Hold Your Phone Ransom
www.bellinghamherald.com
www.bellinghamherald.com
Local news from Bellingham, Whatcom County, WA | BellinghamHerald.com
www.powerengineeringint.com
www.powerengineeringint.com
Prometric Expands Industry Leadership for Systems Security and Management - Power Engineering International
twitter.com
twitter.com
McAfee Inc. sur Twitter : "At the Demonstrating Proxy on #NGFW Turbo Talk—looking at improved isolation between clients and servers. #FOCUS14 http://t.co/f2LDmCbecb"
www.kb.cert.org
www.kb.cert.org
Vulnerability Note VU#685996 - GNU wget Arbitrary Filesystem Access through FTP Symlinks
twitter.com
twitter.com
Juniper Networks sur Twitter : "Give this week's certification quiz your best guess, good luck! http://t.co/MLJAo9eTdT"
www.cio-today.com
www.cio-today.com
IBM Rolls Out Analytics-Based Security Solution - Computing on CIO Today
www.worldpoliticsreview.com
www.worldpoliticsreview.com
Out of the Shadows: Iran’s Evolving Approach to Drug Addiction
blogs.wsj.com
blogs.wsj.com
How to Make Your Money Last for a Longer Lifetime - Total Return - WSJ
www.computerworld.com
www.computerworld.com
Security vendor coalition cleans 43K malware infections used for cyberespionage | Computerworld
www.networkworld.com
www.networkworld.com
Microsoft: 42% of Americans endure daily or weekly attacks on personal data
www.theregister.co.uk
www.theregister.co.uk
FBI impersonated newspaper to finger school bomb threat suspect • The Register
www.surveymonkey.com
www.surveymonkey.com
EC Q4 2014: NFV/SDN Survey
www.businessinsider.com
www.businessinsider.com
Wal-Mart's War Against Apple Pay, The iPhone Payments System - Business Insider
www.tweaktown.com
www.tweaktown.com
Gallup poll: Americans fear hackers more than any other crime
www.philly.com
www.philly.com
Calif. AG: 18.5 million residents' info hacked
www.bloomberg.com
www.bloomberg.com
Hacking Group May Be Linked to Russian Government, Report Says - Bloomberg
www.arkansasbusiness.com
www.arkansasbusiness.com
ASU-Beebe Warns Campuses of Possible Data Breach | Arkansas Business News | ArkansasBusiness.com
www.darkreading.com
www.darkreading.com
Identifying Jailbroken iPhones/rooted Android Phones To Stop Fraud
www.powerengineeringint.com
www.powerengineeringint.com
Gartner Recognizes FishNet Security for Computer-Based Security Awareness Training - Power Engineering International
www.techtimes.com
www.techtimes.com
Which crime scares Americans the most? Poll says hacking : T-Lounge : Tech Times
phys.org
phys.org
US eyes cyber 'deterrence' to stop hackers
www.toptechnews.com
www.toptechnews.com
New Chinese Cyber-Espionage Group Exposed - Network Security on Top Tech News
www.pottsmerc.com
www.pottsmerc.com
RALPH R. REILAND: Can Obama Administration do anything right?
www.net-security.org
www.net-security.org
Russian-based cyber spies going after military, intelligence targets
www.symantec.com
www.symantec.com
Looking at the Threat Landscape to Improve Your Endpoint Security | Symantec Connect
packetstormsecurity.com
packetstormsecurity.com
Tuleap 7.2 XXE Injection ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Tuleap 7.4.99.5 Remote Command Execution ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
CUPS Filter Bash Environment Variable Code Injection ≈ Packet Storm
www.websense.com
www.websense.com
Careers Listing — Websense.com
www.bbc.com
www.bbc.com
BBC News - Google is developing cancer and heart attack detector
www.marketwired.com
www.marketwired.com
Gartner Recognizes FishNet Security for Computer-Based Security Awareness Training
losangeles.cbslocal.com
losangeles.cbslocal.com
Millions Of Californians Face Fraud Risk Due To Data Breaches « CBS Los Angeles
www.directionsmag.com
www.directionsmag.com
2014 Cybersecurity Leadership and Innovation Awards Announced - Directions Magazine
www.virtual-strategy.com
www.virtual-strategy.com
Cylance Introduces Threat Indicators to CylancePROTECT and CylanceV, Providing Context on Threats Before They Execute | Virtual-Strategy Magazine
www.net-security.org
www.net-security.org
ScanBox keylogging framework lurking on disparate watering holes
www.marketwired.com
www.marketwired.com
Prometric Expands Industry Leadership for Systems Security and Management
packetstormsecurity.com
packetstormsecurity.com
HP Security Bulletin HPSBMU03152 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
HP Security Bulletin HPSBST03157 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Debian Security Advisory 3058-1 ≈ Packet Storm
www.juniper.net
www.juniper.net
Example: Configuring BGP PIC Edge for MPLS Layer 3 VPNs - Technical Documentation - Support - Juniper Networks
www.centredaily.com
www.centredaily.com
Community | CentreDaily.com
www.scmagazineuk.com
www.scmagazineuk.com
95% of companies challenged by BYOD security - SC Magazine UK
www.networkworld.com
www.networkworld.com
Microsoft announcements: From TechEd Europe innovations to baking Skype into IE | Network World
www.nbcnews.com
www.nbcnews.com
New York Governor Lays Out Ebola Rules: Mandatory Home Quarantine - NBC News
www.dailytimes.com.pk
www.dailytimes.com.pk
WikiLeaks’ Julian Assange warns: Google is not what it seems
www.csoonline.com
www.csoonline.com
Security vendor coalition cleans 43,000 malware infections used for cyberespionage | CSO Online
www.highlandnews.net
www.highlandnews.net
Attorney General Kamala D. Harris Releases Data Breach Report - Highland Community News: Breaking News
www.globes.co.il
www.globes.co.il
Globes English - Export Institute to support cyber security sales
www.scmagazine.com
www.scmagazine.com
Unencrypted discs missing, Arizona State Retirement System notifies 44,000 - SC Magazine
www.sans.org
www.sans.org
Pen Test Hackfest (Washington, DC)
www.continuityforum.org
www.continuityforum.org
Government steps up resources for SME's on Cyber and Information Security risk | Continuity Forum
www.trendmicro.com
www.trendmicro.com
The New Security Features of iOS 8 and Android Lollipop - Security News - Trend Micro USA
business-technology.co.uk
business-technology.co.uk
Skills shortage tears holes in government security - Business Technology
www.ftc.gov
www.ftc.gov
FTC Says AT&T Has Misled Millions of Consumers with ‘Unlimited’ Data Promises | Federal Trade Commission
www.sfgate.com
www.sfgate.com
Calif. AG: 18.5 million residents' info exposed - SFGate
mashable.com
mashable.com
Hackers can use the Samsung Find My Mobile feature to attack phones
www.scmagazineuk.com
www.scmagazineuk.com
NATO and UK defence groups hit by Russian cyber-attack - SC Magazine UK
www.tennessean.com
www.tennessean.com
Cloud, mobile technologies boost bottom line
www.theregister.co.uk
www.theregister.co.uk
Microsoft unwraps new auto data-protection in Office 365 tools • The Register
www.natlawreview.com
www.natlawreview.com
FCC Issues First Data Security Fine - Federal Communications Commission | The National Law Review
www.scmagazineuk.com
www.scmagazineuk.com
FBI raids house of 'second Snowden' - SC Magazine UK
www.rgj.com
www.rgj.com
Calif. AG: 18.5 million residents’ info hacked
abcnews.go.com
abcnews.go.com
Calif. AG: 18.5 Million Residents' Info Exposed - ABC News
www.themoscowtimes.com
www.themoscowtimes.com
2nd Russian Hacker Group Accused of Targeting NATO | Business | The Moscow Times
www.huffingtonpost.com
www.huffingtonpost.com
Vladimir Putin Employs An Army Of Skilled Hackers, Report Finds
www.securitytube.net
www.securitytube.net
Louisville Infosec 2014 - Origin Of Cybersecurity Laws - An Insider's Story
twitter.com
twitter.com
Marcel Holsheimer sur Twitter : "Securing the Internet of Things. Renee James at #FOCUS14 #intelsecurity http://t.co/mabLSifLsv"
www.infosecisland.com
www.infosecisland.com
Healthcare Data Today: In Motion or Out of Control?
www.itproportal.com
www.itproportal.com
Verizon: CIOs control over half of enterprise cloud spending | ITProPortal.com
www.prnewswire.com
www.prnewswire.com
New Managed Security Information and Event Management Service from Sungard AS Helps... -- LAS VEGAS, Oct. 28, 2014 /PRNewswire/ --
www.jdsupra.com
www.jdsupra.com
An Update on DOT’s Passenger Protection Rulemaking #3, NextGen, Ebola, Drones, Enforcement Actions, Security Fees and Other Aviation Regulatory Matters | Cozen O'Connor - JDSupra
www.techworld.com.au
www.techworld.com.au
Security vendor coalition cleans 43,000 malware infections used for cyberespionage - Techworld
www.natlawreview.com
www.natlawreview.com
FCC Expands Application of Customer Privacy Provisions with $10 Million Fine Against Carriers | The National Law Review
www.wsbtv.com
www.wsbtv.com
Calif. AG: 18.5 million residents' info hacked | www.wsbtv.com
www.zdnet.com
www.zdnet.com
Cloud computing: CIOs are taking back control, but it is already too late? | ZDNet
www.asicentral.com
www.asicentral.com
ASI - DMA Releases Data Breach Guide
windowsitpro.com
windowsitpro.com
Data Loss Prevention Expanded to Office 365 | Office 365 content from Windows IT Pro
www.cmswire.com
www.cmswire.com
IBM Security App Focuses on Multi-Dimensional Analysis
login.live.com
login.live.com
Sign In
www.baltimoresun.com
www.baltimoresun.com
Cyber club prepares high school students for future careers - Baltimore Sun
twitter.com
twitter.com
Symantec sur Twitter : "Microsoft Office 365 Gets Unlimited Cloud Storage http://t.co/odhDeIccYv"
www.net-security.org
www.net-security.org
Belgacom shares more details about alleged GCHQ breach
nakedsecurity.sophos.com
nakedsecurity.sophos.com
‘Al-Quida Free Terror Nettwork’ Wi-Fi hotspot grounds plane | Naked Security
www.csoonline.com
www.csoonline.com
Shellshock attacks against MTAs could leave SMBs exposed | CSO Online
techcrunch.com
techcrunch.com
DigitalOcean Partners With Mesosphere To Allow Developers To Focus On Apps, Not Servers | TechCrunch
thehill.com
thehill.com
Experts: Russian hackers targeting military secrets | TheHill
www.express.co.uk
www.express.co.uk
Microsoft warn Windows Office software bug allows hackers to take over your computer | Tech | Life & Style | Daily Express
www.telecompaper.com
www.telecompaper.com
Microsoft unveils new products TechEd Europe - Telecompaper
www.marketwatch.com
www.marketwatch.com
Introducing The Check Point Capsule: Groundbreaking Mobile Security That Goes Where You Go - MarketWatch
seclists.org
seclists.org
Bugtraq: [ MDVSA-2014:210 ] mariadb
seclists.org
seclists.org
Bugtraq: phpfusion (Search Page) Denial of Service Vulnerability
www.infosecisland.com
www.infosecisland.com
On MSSP SLAs
spectrum.ieee.org
spectrum.ieee.org
Feds Probe Cybersecurity Dangers in Medical Devices - IEEE Spectrum
www.business-standard.com
www.business-standard.com
Private-sector spying foils China-linked hacking | Business Standard News
www.dbta.com
www.dbta.com
Solutionary Releases Security Platform Leveraging Hadoop - Database Trends and Applications
indiatoday.intoday.in
indiatoday.intoday.in
Microsoft offers unlimited OneDrive storage to Office 365 users : News, News - India Today
www.myce.com
www.myce.com
Windows 7 no longer sold to consumers – all about Windows 8.1 now | Myce.com
www.nj.com
www.nj.com
Cape May-Lewes Ferry financial data breach affects bank card data | NJ.com
www.businessreviewusa.com
www.businessreviewusa.com
Concerned About Big Data Breaches? Technology Can Help | Technology | Business Review USA
www.cio.com
www.cio.com
In BYOD We Trust | CIO
www.cnbc.com
www.cnbc.com
Russian hackers target Nato, military secrets
www.forbes.com
www.forbes.com
What To Do When Your Big Data Isn't Big Enough - Forbes
business.asiaone.com
business.asiaone.com
Credit-card hacking is Americans' top crime worry: poll, News, News, AsiaOne Business News
www.computerworld.com
www.computerworld.com
Russia fingered in long-running spying campaign | Computerworld
blogs.cisco.com
blogs.cisco.com
File Security With the Click of a Button
twitter.com
twitter.com
McAfee Inc. sur Twitter : "Use the automation, Luke. Did you know that you can patch Java, Mozilla, Adobe Flash & Reader, all w/ ePO? #FOCUS14 http://t.co/uVMnEufKKb"
www.m2mnow.biz
www.m2mnow.biz
'Cyber Security Awareness month' comes to a close, but don't let your M2M guard down - M2M Now - News and expert opinions on the M2M industry, machine to machine magazine
forums.juniper.net
forums.juniper.net
The Tech Conundrum: White Hat vs. Black Hat - J-Net Community
www.rsaconference.com
www.rsaconference.com
Around the Web: Backoff, Online Payments, Security – Blog Post – RSA Conference
iq.intel.com
iq.intel.com
Jimmy Kimmel Is the Most Dangerous Cyber Celebrity of 2014 - iQ by Intel
www.computing.co.uk
www.computing.co.uk
US banks biggest target for phishing scams, reveals RSA - 29 Sep 2014 - Computing News
mashable.com
mashable.com
Researchers reveal new Chinese hacking group
www.computerworld.com
www.computerworld.com
Next Office for Mac leaks, shots of UI appear | Computerworld
seclists.org
seclists.org
Bugtraq: [security bulletin] HPSBHF03156 rev.1 - HP TippingPoint Intrusion Prevention System (IPS) Local Security Manager (LSM) running SSL, Remote Disclosure of Information
seclists.org
seclists.org
Bugtraq: [security bulletin] HPSBST03160 rev.1 - HP XP Command View Advanced Edition running Apache Struts, Remote Execution of Arbitrary Code
twitter.com
twitter.com
McAfee Inc. sur Twitter : "Monitor exploitable processes—tips & lessons learned for managing your ePO environment—tech deep dives #fFOCUS14 http://t.co/wNHigJ1VZX"
seekingalpha.com
seekingalpha.com
Flextronics' INS Division: Cheapest Way To Buy Into Cyber Security - Flextronics International Ltd. (NASDAQ:FLEX) | Seeking Alpha
www.newsworks.org
www.newsworks.org
NewsWorks: News and conversation for Philadelphia, Pennsylvania, New Jersey and Delaware
packetstormsecurity.com
packetstormsecurity.com
Defense And Military Cyber Attacks Traced Back To Russia ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Shellshock Over SMTP Attacks Mean You Can Now Ignore Your Email ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Camera Jacket Turns You Into A Walking Surveillance Station ≈ Packet Storm
blogs.microsoft.com
blogs.microsoft.com
Why businesses should care about cybersecurity this October | Cyber Trust Blog
www.techzim.co.zw
www.techzim.co.zw
How to deal with neighbourhood hackers: tips for securing your Wi-Fi - Techzim
www.marketwired.com
www.marketwired.com
Introducing The Check Point Capsule: Groundbreaking Mobile Security That Goes Where You Go
www.gmanetwork.com
www.gmanetwork.com
Hacking for a cause: Cybersecurity for the govt procurement system | SciTech | GMA News Online
www.marketwired.com
www.marketwired.com
Check Point's Third Annual Mobile Security Survey Highlights Careless Employees as Greatest Mobile Security Threat
www.crn.com
www.crn.com
Solution Providers Get Stealthy On Shadow IT - Page: 1 | CRN
www.marketwatch.com
www.marketwatch.com
Earnings Releases, Court Rulings, and Preliminary Quarterly Results - Research Reports on TSMC, Seagate, 3DS, Xerox and Check Point - MarketWatch
www.theregister.co.uk
www.theregister.co.uk
HDS flings cloud-in-a-box at EMC Vblock, NetApp FlexPod • The Register
sdtimes.com
sdtimes.com
Sencha Space 1.2 unifies enterprise application deployment and management - SD Times
twitter.com
twitter.com
McAfee Inc. sur Twitter : "Very informative deep dive into maximizing your SIEM. #FOCUS14 http://t.co/g9vhutTM97"
www.avangate.com
www.avangate.com
Customer support related to the order, payment or software delivery | Avangate
www.theregister.co.uk
www.theregister.co.uk
Feds seek potential 'second Snowden' gov doc leaker – report • The Register
seclists.org
seclists.org
Bugtraq: Apple iOS v8.0.2 - Silent Contact Denial of Service Vulnerability
seclists.org
seclists.org
Bugtraq: Folder Plus v2.5.1 iOS - Persistent Item Vulnerability
www.econtentmag.com
www.econtentmag.com
DMA Releases Data Breach Survival Guide, Gives Marketers Essentials - EContent Magazine
www.emergencymgmt.com
www.emergencymgmt.com
Merging Missions: Business Continuity and Emergency Management
joker.org
joker.org
Joker.org | .torrent -> streamable video
www.i-programmer.info
www.i-programmer.info
New Docker Engine
www.information-age.com
www.information-age.com
Cloud does NOT equal data centre: Gartner dispels the top 10 myths of cloud computing | Information Age
mspmentor.net
mspmentor.net
IT Security Stories to Watch: Did Hackers Attack, Infiltrate Staples? | Managed Security Services content from MSPmentor
www.zdnet.com
www.zdnet.com
Docker CTO: Why Microsoft's Docker plans for Windows will matter to you | ZDNet
www.net-security.org
www.net-security.org
Crooks use stolen magnetic payment card info to make fraudulent chip-enabled transactions
www.securitytube.net
www.securitytube.net
Louisville Infosec 2014 - Linking Users To Social Media Usage On Android Mobile Devices
www.zdnet.com
www.zdnet.com
Look for Windows 7 Mainstream Support to be extended | ZDNet
www.scmagazine.com
www.scmagazine.com
EFF files brief in response to Jewel v. NSA opposition - SC Magazine
now.avg.com
now.avg.com
MEF Appoints Judith Bitterli to Global Board of Directors
lj.libraryjournal.com
lj.libraryjournal.com
Reservation Management | Product Spotlight
www.cnet.com
www.cnet.com
My three favorite Windows laptop alternatives - CNE
www.politico.com
www.politico.com
ONC policy group examines Big Data questions — FTC’s Ramirez applauds HealthKit policies — FCC Commissioner has universal service fund in his sight - POLITICO Morning eHealth - POLITICO.com
www.virtual-strategy.com
www.virtual-strategy.com
Gigamon Announces New Solutions for SSL Visibility and Enhancements for Multi-Tiered Security | Virtual-Strategy Magazine
www.csmonitor.com
www.csmonitor.com
Who wins Senate in Election 2014? 3 reasons it could be mystery for weeks. - Failure to win a majority - CSMonitor.com
seclists.org
seclists.org
Bugtraq: [security bulletin] HPSBMU03152 rev.1 - HP Operations Orchestration running SSL, Remote Disclosure of Information
seclists.org
seclists.org
Bugtraq: [security bulletin] HPSBST03157 rev.1 - HP StoreEver ESL E-series Tape Library and HP Virtual Library System (VLS) running Bash Shell, Remote Code Execution
www.militaryaerospace.com
www.militaryaerospace.com
BAE Systems boosts expertise in cyber warfare and cyber security with acquisition of SilverSky
www.geek.com
www.geek.com
Dexmo is an exoskeleton glove that lets you feel virtual objects | News | Geek.com
www.iclarified.com
www.iclarified.com
iClarified - Apple News - OS X Yosemite is Now Available to Download!
www.bizjournals.com
www.bizjournals.com
California Supreme Court declines to review Sutter data-breach case - Sacramento Business Journal
www.bidnessetc.com
www.bidnessetc.com
Apple Inc. (NASDAQ:AAPL) News Analysis: How to Secure Your Apple iOS 8 Device
emcinformation.com
emcinformation.com
EMC Corporation
blogs.cisco.com
blogs.cisco.com
Cisco 2014 Annual Security Report: Cybercriminals Applying “Old” Techniques in New Ways
gadgets.ndtv.com
gadgets.ndtv.com
Microsoft Announces Unlimited OneDrive Storage for Office 365 Subscribers | NDTV Gadgets
www.moneycontrol.com
www.moneycontrol.com
'Cloud aids mobility of human experience across devices' - Moneycontrol.com
www.informationweek.com
www.informationweek.com
Chipmaker Disables Counterfeits With Software Update - InformationWeek
www.realwire.com
www.realwire.com
Watchful Software Announces Industry’s First Mac OS X Support for Microsoft RMS Classification and Data Protection
www.techradar.com
www.techradar.com
Microsoft unveils new Azure tools, opens up Office 365 with new APIs | News | TechRadar
www.theregister.co.uk
www.theregister.co.uk
EvilToss and Sourface hacker crew 'likely' backed by Kremlin – FireEye • The Register
money.cnn.com
money.cnn.com
Gigamon Announces New Solutions for SSL Visibility and Enhancements for Multi-Tiered Security
www.computing.co.uk
www.computing.co.uk
Microsoft reveals ramped-up security offerings for Windows 10 and Office 365 across multiple devices - 28 Oct 2014 - Computing News
www.cbronline.com
www.cbronline.com
Why CIOs 'should lead data breach responses' - Computer Business Review
www.breitbart.com
www.breitbart.com
Sharyl Attkisson's Computer was Bugged Using Government Software (Update)
www.cso.com.au
www.cso.com.au
Allied Telesis Selects Emerging Threats’ ETPro® and IQRisk® Products for New Range of Next-Generation Firewalls - Media Releases - CSO | The Resource for Data Security Executives
recombu.com
recombu.com
Samsung phones can be remotely hacked, warns NIST - Recombu
www.masslive.com
www.masslive.com
New Bedford man gets 4-year federal prison sentence for hacking into police computer servers, including chief's email account | masslive.com
indianexpress.com
indianexpress.com
What the world is reading: What were you thinking, Mr Nadella? | The Indian Express
www.realwire.com
www.realwire.com
ArmstrongAdams wins Imperva partner award
www.scmagazine.com
www.scmagazine.com
Targeted attacks on rise, costly, survey says - SC Magazine
www.igadgetware.com
www.igadgetware.com
Latest Gadgets | Mobiles | Tablets | Android apps | Social Media | Tech News: EBOLA Virus Is Affecting Fast Around 5000 People Died
www.zdnet.com
www.zdnet.com
Mobile app permissions: Who does it right? | ZDNet
www.androidheadlines.com
www.androidheadlines.com
Security Researcher Suggests Samsung's KNOX and Android 5.0 Lollipop Aren't All That Secure | Androidheadlines.com
it-online.co.za
it-online.co.za
Microsoft adds new cloud, mobility solutions - IT-Online | IT-Online
www.marketwired.com
www.marketwired.com
Watchful Software Announces Industry's First Mac OS X Support for Microsoft RMS Classification and Data Protection
www.net-security.org
www.net-security.org
246 percent spike in Apple-themed phishing scams
www.virtual-strategy.com
www.virtual-strategy.com
Sencha Space 1.2 Unifies Enterprise Application Deployment and Management | Virtual-Strategy Magazine
www.sunherald.com
www.sunherald.com
Community news from Biloxi and Gulfport, MS | Sun Herald
www.virtual-strategy.com
www.virtual-strategy.com
Thinspace CEO Advises Chinese Government IT Solutions Supplier of Desktop Virtualization Security Technologies | Virtual-Strategy Magazine
www.forbes.com
www.forbes.com
Sencha Rolls Out The Latest Flavor Of Its Cross-Platform Mobile Toolkit - Forbes
www.zacks.com
www.zacks.com
Fortinet Misses on Q3 Earnings, Revenues Beat, Shares Up - October 28, 2014 - Zacks.com
www.zdnet.com
www.zdnet.com
Military secrets theft hacking trail leads to Russia | ZDNet
delmarvapublicradio.net
delmarvapublicradio.net
Cape May-Lewes Ferry Data Breach | Delmarva Public Radio
www.techweekeurope.co.uk
www.techweekeurope.co.uk
Microsoft Office 365 Gets Unlimited Storage, MDM And APIs
www.techweekeurope.co.uk
www.techweekeurope.co.uk
Microsoft Azure Gains Big Data And Automation Tools
www.zdnet.com
www.zdnet.com
Cloud will never be fully secure, get over it | ZDNet
blogs.mcafee.com
blogs.mcafee.com
5 Ways to Curb Your Child's Chronic Texting | McAfee
www.net-security.org
www.net-security.org
Top 10 cloud myths
www.csoonline.com
www.csoonline.com
Clues point to Russia in long-running spying campaign | CSO Online
www.csoonline.com
www.csoonline.com
'ScanBox' keylogger targets Uyghurs, US think tank, hospitality industry | CSO Online
h14s.p5r.org
h14s.p5r.org
0x5f3759df | Hummus and Magnets
www.pinknews.co.uk
www.pinknews.co.uk
NHS Scotland accidentally leaks list of transgender patients · PinkNews.co.uk
www.itworld.com
www.itworld.com
For big raises in IT, look to mobile, security, big data | ITworld
www.thenewstribune.com
www.thenewstribune.com
Local News | The News Tribune
www.cmo.com.au
www.cmo.com.au
Media Release: Allied Telesis Selects Emerging Threats’ ETPro® and IQRisk® Products for New Range of Next-Generation Firewalls
money.cnn.com
money.cnn.com
Thinspace CEO Advises Chinese Government IT Solutions Supplier of Desktop Virtualization Security Technologies
www.slashgear.com
www.slashgear.com
Samsung Find My Mobile reported to be vulnerable to attack - SlashGear
blogs.wsj.com
blogs.wsj.com
Capital Journal Daybreak: Rare Sight in New England for GOP | Hacking Trail Leads to Russia | The Policy-Free Campaign of 2014 - Washington Wire - WSJ
www.prnewswire.com
www.prnewswire.com
Alert Logic Security Solutions Now Microsoft Azure Certified -- BARCELONA, Spain, Oct. 28, 2014 /PRNewswire/ --
www.shinyshiny.tv
www.shinyshiny.tv
An exploit in Samsung's 'Find My Mobile' service could remotely wipe your phone - Shiny Shiny
www.huffingtonpost.com
www.huffingtonpost.com
Americans Fear Hacking More Than Any Other Crime, Poll Finds
www.infosecurity-magazine.com
www.infosecurity-magazine.com
Hackers Used Online Video Site to Smuggle Data Out of Firm - Infosecurity Magazine
www.securitytube.net
www.securitytube.net
Louisville Infosec 2014 - Trash Talkin - It Audit Guide To Dumpster Diving
seclists.org
seclists.org
WebApp Sec: Re: Shameless plug: OWASP Board Elections
www.capitalfm.com
www.capitalfm.com
Drake Reveals Three Previously Unheard New Songs To Stop Hackers Leaking Them - Capital FM
www.csoonline.com
www.csoonline.com
The evolution of the CISO role and organizational readiness | CSO Online
www.virtual-strategy.com
www.virtual-strategy.com
NSS Labs Tests Show Next Generation Firewall Security Effectiveness Remains Strong | Virtual-Strategy Magazine
www.businesswire.com
www.businesswire.com
F5 Positioned as a Leader in the Magic Quadrant for Application Delivery Controllers for Eighth Consecutive Year | Business Wire
www.batesvilleheraldtribune.com
www.batesvilleheraldtribune.com
How to handle a data breach - The Herald-Tribune: Business
www.computerworld.com
www.computerworld.com
Microsoft opens Office 365 to programmers | Computerworld
www.prnewswire.co.uk
www.prnewswire.co.uk
Alert Logic Security Solutions Now Microsoft Azure Certified -- BARCELONA, Spain, Oct. 28, 2014 /PR Newswire UK/ --
nakedsecurity.sophos.com
nakedsecurity.sophos.com
Is Google Maps accurate? Ask the giant cat… | Naked Security
www.cio.com
www.cio.com
An Easy Way to Dramatically Improve iPhone (or Any Phone) Security | CIO
www.bbc.com
www.bbc.com
BBC News - Online harassment affects 40% of US adults, report says
www.nu.edu
www.nu.edu
Nationally-Recognized Cyber Security Program Adds Focus in Computer Forensics | National University
www.rsaconference.com
www.rsaconference.com
Navigating the Internet of Things – Video – RSA Conference