EU to demand 2-factor for online payments by August 2015? | Naked Security
North Korean malware that infected Sony network is well-known and 'simplistic,' says Cisco - FierceITSecurity
Malicious links: Spammers change malware delivery tactics | Symantec Connect
Def Con 22 From Root To Special Pwning Ibm Mainframes
Report: SS7 flaws enable listening to cell phone calls, reading texts - SC Magazine
Gang Hacked ATMs from Inside Banks — Krebs on Security
Northwestern Memorial HealthCare laptop stolen, patient data at risk - SC Magazine
The future of wearable technology in 2015
China condemns cyberattacks, but says no proof North Korea hacked Sony| Reuters
Linux Malware vs Phishing Schemes - Datamation
Nuke operator in S. Korea undertaking cyber preparedness drills following hack - SC Magazine
Edu-apps may be STALKING YOUR KIDS, feds warn • The Register
Sony Pictures Entertainment Hack – Truly motion picture worthy
Sony hackers lingered in network before unleashing malware - SC Magazine
Six cloud security predictions for 2015 - SC Magazine
Pathfinder - Juniper Networks
The Art of Cyber War [From Black Hat Brazil 2014]
North Korean Internet connection hit by outages | CSO Online
American in Uganda charged in counterfeiting scheme - SC Magazine
Best Buys That Could Lead to the Worst Shams - Security News - Trend Micro USA
Hackers pop German steel mill, wreck furnace • The Register
North Korea's internet access unstable - SC Magazine
Cyber Risk Report: December 15-21, 2014
Recon - 2014 - Exploring The Impact Of A Hard Drive Backdoor (Jonas Zaddach)
Staples says 1.6M cards affected during data breach | CSO Online
New York State Police Academy, IIA and ISACA to host cyber security conference - Albany Business Review
BBC News - Sony hack: China tells US it opposes cyber attacks
What Is Wrong With 'Legal Malware'? - Forbes
Have you been naughty or nice? Find out if Santa knows. - YouTube
Finding an Unknown Threat with RSA Security Analytics and RSA ECAT - YouTube
Innovation Starts With 'I' - J-Net Community
Christopher Young – Speaker – RSA Conference
McAfee sur Twitter : "Santa Claus is coming to town—know those shipping and return policies to ensure a smooth delivery. #12Scams"
Cybercrime group steals millions from Russian banks, targets US and European retailers | CSO Online
Protect yourself from online attacks with these must-have Cyber Security Deals | BGR
Security Tips for the Holidays - Security News - Trend Micro USA
Check your Control Plane - The blog of David Roy
SANS Institute
White House nudges Congress to revisit controversial 'CISPA-style' laws after Sony attack | ZDNet
The Top U.S. Healthcare Story For 2014: Cybersecurity - Forbes
Trend Micro Security Predictions | The Invisible Becomes Visible
Continuous Protection on the Endpoint: Show Me
Bradenton Local News | Bradenton Herald & Lakewood Ranch Herald
Gentoo Linux Security Advisory 201412-32 ≈ Packet Storm
Red Hat Security Advisory 2014-2024-01 ≈ Packet Storm
Pierre-Yves Maunier sur Twitter : "So it's a newcomer in my @JuniperNetworks books family :-) cc @jawider"
App “Component” Downloads Apps Onto Devices | Security Intelligence Blog | Trend Micro
Recon 2014 25 - Exploit Tips And Techniques (William Peteroy)
Dangerous NTP Hole Ruins Your Christmas Lunch ≈ Packet Storm
Multi-Million Dollar Russian Banking Scam Uncovered ≈ Packet Storm
STAY AWAY: Popular Tor Exit Relays Look Raided ≈ Packet Storm
Improve Information Security and Privacy Now!
NUKE HACK fears prompt S Korea cyber-war exercise • The Register
Cisco Firewall Security Specialist - Cisco Systems
Stock Market - Business News, Market Data, Stock Analysis - TheStreet
Judge: Shoppers can sue Target over data breach - Wichita Business Journal
Trend Micro Consumer Security is the Sole Leader in Real-World Testing Done by Independent Organization -
Alleged Counterfeiter “Willy Clock” Arrested — Krebs on Security
Integrated Network Security Architecture: Threat-focused Next-generat…
Cyber Security Just Got Easier - YouTube Home
You Better Watch Out, You Better Not Click: Holiday Movie Threats - Security News - Trend Micro USA
Security firm IOActive to expand Vehicle Security Service program - SC Magazine
The Muddled State of Security Standards – Blog Post – RSA Conference
Russian hackers stole millions from banks, ATMs
Every Day Is Cyber Monday. Is Your Site Delivering the Best Possible User Experience? | Radware Blog
Bugtraq: [oCERT-2014-010] SoX input sanitization errors
Bugtraq: [oCERT-2014-011] UnZip input sanitization errors
Telecommunications companies on the line with FTC, FCC for cramming schemes - SC Magazine
Phishing schemes: Don’t take the bait! -
Pwning Beacon Frames
Recon 2014 - Power Analysis And Clock Glitching With The Open-Source Chipwhisperer Platform
Exploits for dangerous network time protocol vulnerabilities can compromise systems | CSO Online
Schneier on Security: Reacting to the Sony Hack
The Gift that Keeps on Giving: 12 Ways Everyone Can Help IT This Holiday Season | Symantec Connect
Is Britain backing N. Korean hackers? Pyongyang students win £28K UK cyber security bursaries — RT UK
Home -
How To Become a CISO: Top Tips
How a Hacking Gang Has Stolen $17 Million Since 2013
Power Plant Plans Cyber Attack Drills In Wake of Threats
Tor Warns of Possible Attempts to Disable Anonymity Network | SecurityWeek.Com
Sneaky Russian hackers slurped $15 MILLION from banks • The Register
Find out where you are on the Cyberthreat map / Узнай, где сейчас кипит кибервойна
How technology will change the way we behave in 2015
Recon 2013 - Reconstructing Gapz: Position-Independent Code Analysis Problem
Week in review: ICANN systems breached, critical Git and SOHO router flaws
Congressman Kind: "Use savings from Pentagon waste cutting to improve cyber-security." - News - WTAQ News Talk 97.5FM and 1360AM
Will 2015 be the year of risk-based security?
ID theft from data breach can lead to months of hassles - The Denver Post
Recon 2013 - Wardriving From Your Pocket
Five things you should know about PCI DSS - SC Magazine UK
[tor-talk] Warning: Do NOT use my mirrors/services until I have reviewed the situation
Bugtraq: VP-2014-004 SysAid Server Arbitrary File Disclosure
Actions to strengthen your defense minimize damage
STAY AWAY: Popular Tor exit relays look raided • The Register
Bugtraq: [SECURITY] [DSA 3107-2] subversion regression update
Bugtraq: [SECURITY] [DSA 3109-1] firebird2.5 security update
Cybercrime will continue to evolve
Recon 2013 - Apple Icloud Services Reversed Inside Out
Indicators of Compromise for Malware Used by Sony Attackers
The 12 Hacks of Christmas: Part 2
Dangerous NTP hole ruins your Chrissy lunch • The Register
Sony plans to release ‘The Interview’ on Crackle for free | New York Post
Recon 2013 - Many More Tamagotchis Were Harmed In The Making Of This Presentation
DigitalJewels, NIBSS Partner on Information Security, Articles | THISDAY LIVE
North Korea and the attack on Sony Pictures Entert... - HP Enterprise Business Community
contagio mobile: DroidJack RAT - Androrat - Android - Sample
FireEye predictions for cybersecurity in 2015 | ZDNet
Consumers get go-ahead in lawsuit against Target in data breach - Rick Kupchella's –
Recon 2013 - Reversing And Auditing Android's Proprietary Bits
2014 Security Review: The Year in Breaches, Hacks and Exploits -- Redmond Channel Partner
UK Spy Agency Makes Cryptography App for Children
Tech support scam targets Mac users | SecTechno
Watch "Steve Carell North Korea film cancelled following Sony hack" Video at SCMagazine
Network Virtualization...and Reality. Juniper Services to Help You Plan - YouTube
Recon 2013 - Hiding @ Depth
Kaspersky Cyberstat
Why You Need Antivirus Software
The Industry's First Carrier-Grade Virtualized Rou... - J-Net Community
PuttyRider- Tool to hijack putty sessions | SecTechno
Now Obama seeks China's help to halt alleged Nork HACK ATTACKS • The Register
Cyber-security expert offers 10 tips to safeguard your information - Your Houston News: Living
Sony case underlines cyber security needs for India - Hindustan Times
The Ultimate Goal of Digital Attacks -
NEW Infosec Pro Weekend Bootcamp – OH YOU GOTTA SEE THIS!!!!
Recon 2013 - Teridian Soc Exploitation: Exploration Of Harvard Architecture Smart Grid Systems
Phishing Scams & Identity Theft Protection – Don’t be that Guy – Trend Micro
Martin Roesch – Speaker – RSA Conference
An epic ride: A look back at the ever-changing information security industry - Print Article - SC Magazine
2014's Top Malware: Less Money, Mo' Problems
Staples data breach unlikely to dampen holiday shopping
Recon 2013 - Hardware Reverse Engineering Tools
Mobily's Solutions for Business Continuity Enables the Business Sector to Recover from Technical Disasters within Few Minutes - Zawya
Pillarbox: Combating Next-Generation Malware With Fast Forward-Secure Logging
7 Tips: Work Fitness Into The Workday - InformationWeek
Ensuring business continuity and building opportunities | Networks Asia
Permission. File Permissions. - Imgur
Top News, Latest headlines, Latest News, World News & U.S News -
Formal Analysis Of Security Procedures In Lte - A Feasibility Study Noomene Ben Henda; Karl Norrman
+The Backup of Destiny [Official Trailer] | Symantec - YouTube
Hackfest 2014: Renderman Aka Brad Haines Presented "They Are Doing What! With Air Traffic Control?"
The Problem With the Plan to Give Internet Access to the Whole World - The Atlantic
Your Friendly North Korean Network Observer by nknetobserver
Hackfest 2014: Jason Gillam Presented "Web Penetration Testing With Burp And Co2"
7 high-tech holiday scams
Watch Symantec's Vine "Symantec Mobility Solutions. Empower your employees. #GoEmpower"
Watch "Security firm Norton and clothing designer Betabrand join forces to create RFID-blocking clothes" Video at SCMagazine
Threats at Sea: A Security Evaluation of AIS - Security News - Trend Micro USA
Hackfest 2014: Ian Amit Presented "Red White And Blue. Making Sense Of Red Teaming For Good"
Did You Get the Security Memo? Symantec Endpoint Protection 11 EOSL | Symantec Connect
Boardroom or Baby? Why are there so few women in tech?
Here’s To Second Acts
Backdoors: What They Are and How to Defend Networks against Them - Security News - Trend Micro USA
Staples data breach bigger than expected | News - Home
Staples: 6-Month Breach, 1.16 Million Cards — Krebs on Security
Staples Inc. Data Breach: Company Says Over 1 Million Credit Cards Compromised
Weekend news review: December 15-19
NORKS: FBI's Sony Pictures' hacking allegations are 'groundless slander' • The Register
Cisco Security sur Twitter : "‘Tis the season to meet under the mistletoe! #HappyHolidays"
Hackfest 2014: Theo De Raadt Presented "Arc4random - Randomization For All Occasions"
US Homeland Security urges business, government cooperation on cyber security | SciTech | GMA News Online
Bank of Tokyo-Mitsubishi to set up disaster recovery centre
BBC - Future - Infographic: Ultimate limits of nature and humanity
Exploits, mobile and cloud storage threats will plague users in 2015 - SC Magazine
EMC Store Products - EMC Store
NE Universities Showcase Networking & Programming ... - J-Net Community
Law Number 1: Don’t Box Me In - J-Net Community
Comprehensive Analysis of the FBI Warnings and Sony Network Breach -
Choose, but Choose Wisely: What Skills Does a CISO Really Need? – Blog Post – RSA Conference
Cyber Defense | Is the Offense #Winning? | SANS Institute
Technology is still a distraction for drivers
The Changing Landscape of BYOD
Geoff Collins sur Twitter : "My happy place"
Top Malware Families Turn Point-of-Sale Into Point-of-Theft | CIO
On Emulation-Based Network Intrusion Detection Systems
7 Ways to Prevent Holiday Shopping Identity Theft |
Consumers Can Sue Target Corp Over Data Breach: Judge
IoE 101: How to Explain All Things Smart, Wearable, and IoE - Security News - Trend Micro USA
2 stores in metro Atlanta tied to Staples data breach
How to Identify Yourself, Digitally
Possible upcoming attempts to disable the Tor network | The Tor Blog
A Lightweight Formal Approach For Analyzing Security Of Web Protocols; Apurva Kumar
Making the Internet a utility—what’s the worst that could happen? | Ars Technica
UC Berkeley hack: Personal data on 1,600 people possibly compromised - LA Times
Cyber Security Risks During Online Holiday Shopping - Time Warner Cable News
What does the Future hold for Women in Tech
You Can't Be Me: Enabling Trusted Paths And User Sub-Origins In Web Browsers
Thoughts on Mobile Digital Parenting
Seekonk location among Staples stores exposed in data breach - The Sun Chronicle : Local News
Unsupervised Anomaly-Based Malware Detection Using Hardware Features
Sony facing 2 suits by ex-workers over data breach - WTOP
Crazy Tech CEO Quotes: 2014 Edition - InformationWeek
Zen and the Art of Cloud Database Security (Part 2) | SecurityWeek.Com
Staples confirms data breach at 2 Maine stores | Local News - WMTW Home
Protecting Web-Based Single Sign-On Protocols Against Relying Party Impersonation Attacks Through A Dedicated Bi-Directional Authenticated Secure Channel
In 2013 Ransomware Attacks Grew by 500% - Symantec ISTR - YouTube
Ubuntu Security Notice USN-2447-2 ≈ Packet Storm
Ubuntu Security Notice USN-2448-2 ≈ Packet Storm
Apple Security Advisory 2014-12-18-1 ≈ Packet Storm
Heads up! If Tor VANISHES over the weekend, this is why • The Register
Cyber security expert warns U.S. response to North Korean... |
JCE-Tech 4.0 Cross Site Scripting ≈ Packet Storm
JasPer 1.900.1 Double-Free / Heap Overflow ≈ Packet Storm
GQ File Manager 0.2.5 Cross Site Scripting / SQL Injection ≈ Packet Storm
Disrupting the Internet in 2015
Cyber Security Experts Doubt FBI Conclusion On Sony Hack