Int'l Franchise Association, Cyber Security Alliance caution franchisees about cybersecurity | Pizza Marketplace
Citizenfour's Laura Poitras Explains Why Edward Snowden Did It | OC Weekly
کیوان کمیلی پور sur Twitter : "Very useful for data recovery and #forensic"
QSR Web - Quick Service Restaurant News, Trends and Insights | QSRWeb
Is Your Data Safe In The Internet of Everything? | Security Intelligence Blog | Trend Micro
Apple Pay Takes On Hackers, Cash
iTWire - Windows 10: New Build Arrives, Two Factor Authentication coming
Progress Software Buys Telerik for $262.5 Million - Enterprise Software on CIO Today
Backoff Malware Is Spreading in Retail Systems - Network Security on CIO Today
Bank Settles Data Breach Case with Conn., Other States | Connecticut Law Tribune
Hackers face off at Texas A&M; hackathon - The Eagle: Local News
Grrcon 2014 - Bringing Pwned To You: Interesting Honeypot Trends
Boston Technology Jobs
Family: Doctors don't detect Ebola in nurse's body | The Miami Herald
Backoff Malware Is Spreading in Retail Systems - Network Security on Top Tech News
The 'Backoff' malware used in retail data breaches is spreading | PCWorld
Now Everyone Wants to Sell You a Magical Anonymity Router. Choose Wisely | WIRED
RSA Conference Communication Preference Center
FCC: Phone companies posted private info online
Humanitarian crises demand better response|Op-Ed Contributors|
How Apple Pay Could Rid Holiday Shopping Security Concerns
Target Offers Free Shipping on All Holiday Items - DailyFinance
Eight Ways Cloud Is Making Supply Chains Very Smart - Forbes
Protecting the vault: First Financial Bank's go-to solution - SC Magazine
Estonian hacker that stole $9.4M receives 11-year prison sentence
Hacker gets prison for cyberattack stealing $9.4M •
With a $10 million fine, the FCC is leaping into data security for the first time - The Washington Post
Apple mum as Mac owners tussle with Yosemite over Wi-Fi problems - Good Gear Guide Australia
The FCC as data security cop: $10 million fine for carriers’ security breaches | Network World
Family: Doctors don't detect Ebola in nurse's body | The Kansas City Star
FCC announces $10 million fine for two telecoms following Scripps investigation - DecodeDC Story
Local students to participate in cybersecurity competition this weekend - Post and Courier
Malware Threat Detection and Malware Block Effectiveness – Reviews | McAfee
Targeted Attack Protection via Network Topology Alteration | Security Intelligence Blog | Trend Micro
Grrcon 2014 - $#!T My Industry Says. . .
Child restraints save lives | Scoop News
Cloud Data Security Concerns Raised After Reported iCloud Attack In China : All Tech Considered : NPR
WP Engine adds disaster recovery to keep your blog alive during natural disasters & zombie uprisings | VentureBeat | Cloud | by Jordan Novet
Securing Your Online Reputation - YouTube
A black hat hacker that changed his colour - The Globe and Mail
7 Myths You Probably Believe About Social Security - Forbes
Cheapo telcos fined for their cheapo security: Financial records on 305,000 people spilled • The Register
Attacks On Patched Sandworm Flaw Force Microsoft To Issue Fix It
Mobile Health Information: Secure or a Joke? – Blog Post – RSA Conference
How Verizon’s Advertising Header Works | Web Policy
Why hackers are targeting big-name retail chains -
Hackers Are Using Microsoft PowerPoint To Attack Computers | Business Insider India
Blogs |
Democrats haven't given up on beating Mitch McConnell yet, buying new ads in Kentucky - The Week
Amber Vinson’s family says she’s Ebola-free as hazmat crews remove 53 barrels from her apartment - NY Daily News
VC cyber security funding tops £850 million - SC Magazine UK
Cyber security needed in all aspects of life - Tahlequah Daily Press: News
Cyber Security Business Doubles for London Insurer - The CIO Report - WSJ
3 Enterprise Security Tenets To Take Personally - InformationWeek
Security Conferences - Security Events - Trend Micro USA - Trend Micro USA
Well Workouts
The DEA Once Turned A 14-Year-Old Into A Drug Kingpin. Welcome To The War On Drugs
McAfee exec pitches NYU-Poly women on cybersecurity careers - Technically Brooklyn
Bulgarian national sentenced 30 months for role in ID theft ring - SC Magazine
Expect more data breaches, experts say - MarketWatch
Grrcon 2014 - Memory Forensics With Hyper-V Virtual Machines
Pakistan hackers deface Indian websites - The Hindu
Are you in the dark about mobile security?
Tripwire Announces Expanded Support for Federal Information Systems and Organizations - The State of Security
Proofpoint acquires Nexgate for $35 million - SC Magazine
Sophisticated phishing attacks launched against Outlook Web App users | PCWorld
Exclusive: Google CEO Larry Page Reorgs Staff, Anoints Sundar Pichai as New Product Czar | Re/code
Credit card breaches: How will they affect 2014’s holiday spending? - San Diego Identity Theft |
Techday – Symantec aims to make businesses more resilient against attacks
Of Google, governments and authentication | ZDNet
Porsche: The Hedge Fund that Also Made Cars
Apple mum as Mac owners tussle with Yosemite over Wi-Fi problems - PC World New Zealand
iCloud phishing attack: How to detect a fraudulent Apple site | BGR
Amplification DDoS attacks most popular, according to Symantec - SC Magazine
TOR Virtual Network Tunneling Tool ≈ Packet Storm
UK Foreign Minister: Bulk Data Collection Is Not Mass Surveillance | News | teleSUR
Data Breaches Are Making People Hate Your Brand | Co.Exist | ideas + impact
Is the mobile device the new company car? |
FBI — International Hacker Sentenced
The Battle for Palestine — Part Three | Consortiumnews
Phone-hacking: The Piers Morgan connection - Mirror admits some stories during Morgan's tenure may have been obtained by illegal means - Home News - UK - The Independent
Apple's iPad, Mac, OS X Yosemite event: Here's what to expect | ZDNet
ISSA tackles workforce gap with career lifecycle program - SC Magazine
Mandriva Linux Security Advisory 2014-206 ≈ Packet Storm
Mandriva Linux Security Advisory 2014-207 ≈ Packet Storm
Mandriva Linux Security Advisory 2014-208 ≈ Packet Storm
Ebola Hack: Trojan Malware Attached To Fake World Health Organization Emails
How To Become A CISO, Part 1
Debian Security Advisory 3055-1 ≈ Packet Storm
Slackware Security Advisory - pidgin Updates ≈ Packet Storm
Slackware Security Advisory - glibc Updates ≈ Packet Storm
The Fourier Transform, explained in one sentence
Air Force welcomes hackers to Dayton |
Apple iOS 8.1 review | Expert Reviews
Hackers face off this weekend to solve Air Force's cyber challenges | C4ISR & Networks |
Apple mum as Mac owners tussle with Yosemite over Wi-Fi problems | PCWorld
Franchises to get assistance on cybersecurity strategy - SC Magazine
NICE Conference & Expo to be held in Columbia, Md. - SC Magazine
Black Hat Usa 2014 - Virtualization: More Shadow Walker The Progression Of Tlb Splitting On X86
Wireless price war's good for consumers, but challenges carriers | Computerworld
This Week In Credit Card News: Data Breach At Staples, Early Glitches With Apple Pay - Forbes
Mobile app exploits Chilean public transit payment system - FierceMobileGovernment
The Internet of Things Will Change Your Company, Not Just Your Products - Joey Fitts - Harvard Business Review
Multivessel PCI outperformed culprit-vessel PCI in STEMI | Cardiology
Model 1012 8-channel mini PCI-express frame grabber
Court shutters NY co. selling security software with "no value" - SC Magazine
Think Before you “Share” to Prevent Identity Theft -
MIT computer scientists can predict the price of Bitcoin | MIT News
Chaos in the Video Content Management Market
Kaspersky Lab Partners with LifeJourney to Support Future Generations of Malware Experts | Kaspersky Lab US
EMCTV - Enterprise Technology Video Portal - EMCTV
Business Pulse Poll: CEO Faceoff Finals: It's down to Musk and Chambers - Silicon Valley Business Journal
Hackers breach the Warsaw Stock Exchange | TheHill
See the Windows 10 Start menu in action - CNE
Infographic: Is your business ready for a cyber data breach? | PropertyCasualty360
Physical keys give Google services added security
BDNA’s Walker White: Big Data Security, Virtualization as Priorities for Gov’t I
WHITE PAPER ▶ Legal, Security, and IT Tackle BYOD
Hackers Are Exploiting Microsoft PowerPoint to Hijack Computers
New home sales up 0.2% - NBC News
Cyber insurance is becoming increasingly necessary > Live Insurance News
Celebrity hacking scandal: Russian behind website posting the pictures begins removing them, but was he the hacker? : PERSONAL TECH : Tech Times
TorrentLocker Ransomware Reaches Italy and Brazil, Affects Thousands - Softpedia
Holiday hacking fears |
Green Party will help students in financial distress | Scoop News
Ponemon Institute Finds Data Breaches Are Increasing - Are You Ready? | The National Law Review
Facebook, Yahoo prevent use of recycled email addresses to hijack accounts | Computerworld
Juniper Networks sur Twitter : "How to trap a hacker. #NetworkLingo"
Kentucky Initiative Pushes Computer Science Awareness
McAfee Inc. sur Twitter : "Free yourself from malware by steering clear of "free" downloads:"
Russian/Chinese cyber-security pact raises concerns - SC Magazine UK
Using 8 Backdoor Techniques, Attackers Steal Company Data - Security News - Trend Micro USA
SANS Penetration Testing | Stuck on the #SANSBrochureChallenge? It's Ending Soon! Read inside for hints! | SANS Institute
SANS 2015 Big Data Security Survey
Mobile Security Blog: Why Samsung Knox isn't really a Fort Knox
A Print Magazine for Hackers - The New Yorker
Making the best of a hacking situation | Columbia Business Times
Protecting DNS: Securing Your Internet Address Book - SANS Institute
Black Hat Usa 2014 - Virtualization: Openstack Cloud At Yahoo Scale How To Avoid Disaster
Why the Mac momentum may just be starting | ZDNet
Progress buys Telerik for $262.5m - Computer Business Review
PoS Malware Infections Soar Ahead of Holiday Season - NBC News
'Fantasia: Music Evolved' and its origins in the Kinect-hacking scene
Hackers exploit Ebola scare to spread malware - Computer Business Review
Progress Software Announces Intent to Acquire Telerik - MarketWatch
Trying to Avoid Backoff Malware? Good Luck | News & Opinion |
Tim Cook wants to bring Apple Pay to China | TUAW: Apple news, reviews and how-tos since 2004
Progress Software Buys Telerik for $262.5 Million - Cloud Computing on CIO Today
GIGABYTE Releases GA-H81M-Gaming 3 Motherboard - Industry News - Overclockers Club
Bugtraq: [ MDVSA-2014:209 ] java-1.7.0-openjdk
Alex Fullick Pens Releases New Book on Testing Disaster Recovery and Business Continuity Plans - BWWBooksWorld
SC Congress Events - SC Congress Chicago
AWS Expands To Frankfurt -
Snowden filmmaker Laura Poitras: ‘Facebook is a gift to intelligence agencies’ - The Washington Post
Local | Fort Mill Times
Windows 10's ID Management and Security Controls -- Microsoft Certified Professional Magazine Online
Hackers who threaten national security could face life sentences | Naked Security
Annapolis County says hackers holding computer files for ransom - Regional - The Hants Journal
More hackers targeting mobile phones to get bank info: survey - The China Post
SS&C Technologies Finalizes PCI-DSS and EI3PA Security Assessments - MarketWatch
5 Reasons Why Information Security Departments Are Under-Resourced | Technology | Business Review Australia
Proofpoint acquires Nextgate for $35 million - SC Magazine
Bugtraq: [ MDVSA-2014:207 ] ejabberd
Bugtraq: [ MDVSA-2014:208 ] phpmyadmin
Estonia man gets 11 years in prison for credit card hacking |
Estonian hacker gets 11 years for theft in Atlanta - Atlanta Business Chronicle
Windows Office Zero-day and CryptoWall 2.0 security issues explained | BGR
Apple Mac OS criticised for sending search results to third parties - SC Magazine UK
Apple CEO says had 'very open' privacy talks in China: Xinhua| Reuters
Google extends its two-factor authentication support with physical USB keys - FierceCIO
10 key takeaways from Apple’s expectation-crushing earnings call | Cult of Mac
Protect Google Account With REAL Physical Key
New World Notes: New World Slurl: Dune in Second Life
Risk Assessments Critical for Budget Planning – Blog Post – RSA Conference
Clicktools - Sourcefire Inc.
XSS - Modifying Form fields: JS for Pentesters task 4 write up - SecureTheLock
FOCUS 14 - Breakout Sessions
Malware on Breyer Horses website for about 18 months, payment card data at risk - SC Magazine
Ebola Outbreak Used To Trick Users Into Downloading Malware ≈ Packet Storm
Moscow, Beijing Poised To Sign Deal On Joint Cyber Security Ops ≈ Packet Storm
Cisco Patches Three Year Old Remote Code Execution Hole ≈ Packet Storm
Juniper Networks sur Twitter : "Address network #security by identifying what your biggest threats are. #NCSAM"
Microsoft Issues Advice on SSL 3.0 Security Vulnerability --
This POODLE bites - ITWeb Africa
Online personal data theft soars - UTV Live News
iMessage SPAM floods US mobile networks • The Register
Bugtraq: [KIS-2014-12] TestLink <= 1.9.12 (database.class.php) Path Disclosure Weakness
Bugtraq: [slackware-security] pidgin (SSA:2014-296-02)
Bugtraq: [slackware-security] glibc (SSA:2014-296-01)
Photo Gallery: Meet the Chiefs: John Murdock, Kaspersky Lab North America | The VAR Guy
The New Security Features of iOS 8 and Android Lollipop - Security News - Trend Micro USA
Research and Markets: Global Antivirus Software Package Market 2014-2018: Key Vendors are Avast, AVG, ESET, Microsoft & Symantec | Business Wire
How to partition your drive before installing Windows 10 - CNE
Campus IT bracing for 'Internet of Things' demands | Education Dive
Computer hacker sentenced - News - The Shawnee News-Star - Shawnee, OK
PoS malware infections soar ahead of holiday season
How to Tell if Your Broker Protects You Against Identity Theft - 1
Apple CEO says had 'very open' privacy talks in China: Xinhua - News - WTAQ News Talk 97.5FM and 1360AM
Oregon Employment Department Notifies 851,322 People of Data Breach - eSecurity Planet
Virtual reality gains a small foothold in the enterprise | Network World
Hot Sectors: Employers desperately seeking cyber security skills
UD employees, faculty must collaborate to protect private, high-risk, sensitive information.
Information Security: Cyber Security Awareness ... | SecurityStreet
Pawn Storm Espionage Attacks Use Decoys, Deliver SEDNIT - Security News - Trend Micro USA
FTDI driver kills fake FTDI FT232?? - Page 38
Data Breach Bulletin: Staples, NeedMyTranscript, iCloud, Sourcebooks - Forbes
The GOP Has a New Darling, But He Lives in Canada - The Daily Beast
First Read's Morning Clips - NBC News
Black Hat Usa 2014 - Virtualization: Poacher Turned Gamekeeper: Lessons Learned From Eight Years Of Breaking Hypervisors
Beware Ebola Spam Pushing Drugs, Information
How Facebook prevents account hijacking when old email addresses are recycled
Bugtraq: APPLE-SA-2014-10-22-1 QuickTime 7.7.6
Bugtraq: [ MDVSA-2014:202 ] php
Mobility: What We Can Learn From Millennials | CIO
Two burglaries every hour in Austria - The Local
Apple Issues Security Warning for iCloud - CIO Issues on CIO Today
Better passwords could have prevented Jennifer Lawrence hacking
Microsoft discloses severe Office zero-day flaw, publishes quick fix | PCWorld
Malware strain attacks ATMs overseas - ABA Banking Journal
How Twitter will power the Internet of Things - Telegraph sur Twitter : "An insightful & balanced viewpoint on #Data #Security in the #Cloud from @carlLsecurity Snr Manager @websense"
Be Ready for a Breach with Intelligent Response - SANS Institute
Identity Fraud & Data Theft – Don’t be that Guy
SANS 2015 Cyberthreat Intelligence Survey
College Student Gets 2 Years For Hacking Navy, Others - Law360
Will your Mac run OS X 10.10 Yosemite? | ZDNet
How to set up SMS sharing with iOS 8, OS X 10.10 Yosemite - CNE
Twitter's Digits Still Bound by a Single Point-of-Failure
The 7 scariest cyber security breaches of 2014 | Opinion | Softonic
SS&C Technologies Finalizes PCI-DSS and EI3PA Security Assessments Nasdaq:SSNC
Media Release from Closing the Gap on Health and Housing | Scoop News
Zero Day Weekly: Samsung Knox controversy, Twitter Digits, bricked FTDI chips | ZDNet
Vietnam student receives American information security certificate
Has the “Sandworm” zero-day exploit burrowed back to the surface? | Naked Security
Cloud Security: Shared Responsibility in Action -
Airbnb valued at $13B ahead of staff stock sale
Poll: 'Consistent liberals' most likely to unfriend you over politics - The Week
Ello converts to a PBC to remain ad free | ZDNet
McAfee Debuts New Firewall for Gov’t, Commercial Clients; Pat Calhoun Comments | ExecutiveBiz
Old Adobe Vulnerability Used in Dyreza Attack, Targets Bitcoin Sites
Cybercriminals Are Using Cloud Storage to Hoard Stolen Files
Microsoft Windows 10 is serious about security |
Holiday Shoppers May Be Wary of Compromised Retailers | KTIC Radio
Pathway to a Cloud-Ready Wide-Area Network (WAN)
The 'Backoff' malware linked to data breaches is spreading | CSO Online
Cyberespionage group launches sophisticated phishing attacks against Outlook Web App users | CSO Online
Disaster as CryptoWall encrypts US firm's entire server installation | CSO Online
Amazon Web Services Cloud Computing Platform Now Available to Customers from Datacenters in Germany - MarketWatch
Jailbreak iOS 8 And iOS 8.1 Untethered Using 'Pangu' Jailbreak Tool
Forget the Pumpkin Spice Latte: Starbucks is rolling out a Chestnut Praline Latte next month - The Week
BBC News - Hertfordshire Police probe anti-social behaviour data leak
D.C.-area security executives tell you how to secure your business - Washington Business Journal
How-to guide to protecting yourself from electronic spying
Vendor Q&A; Series: John Murdock, Kaspersky Lab - from
Keep Your Business’s Data Safe in the Cloud -
Black Hat Usa 2014 - Windows: Abusing Microsoft Kerberos Sorry You Guys Don't Get It
Herts police admits data breach which published confidential details of 61 people on government website | Bishops Stortford Herts & Essex Observer
Mass Surveillance and Resistance | Scoop News
Hacking a Big Danger for Small Businesses | NewsFactor Business Report
Amber Vinson's Family Says Ebola No Longer Detectable in Her Body
Hackers Are Using Microsoft PowerPoint To Attack Computers - Business Insider
Microsoft forced to issue quick fix for PowerPoint flaw | IT PRO
Chinese Hackers May Have Attacked Apple's iCloud
How to decide if it's time to upgrade to OS X Yosemite | ZDNet
Kaspersky virtual tour
Cyber Security Awareness Month: Engage Your Users – Blog Post – RSA Conference
How to kill a troll | Naked Security
Data-hacking scares us - MarketWatch
Remaining relevant amidst crisis
We chat to CloudFlare about its 'EVERYBODY GETS SSL' venture • The Register
Twitter invites us to say goodbye to passwords, use Digits instead | Naked Security
Some Bank of America customers double-charged with Apple Pay | PCWorld
A Cyberwar Quietly Rages Over Hong Kong
Commissioner calls for probe into police data breach as names and address are leaked online - Hemel Gazette
Google busts its 'iOS 7 move' with Android Lollipop | InfoWorld
Names and addresses of victims and culprits of anti-social behaviour are published online in Herts Police data leak - News - Welwyn Hatfield Times
Herts Police Admit Confidential Data Breach - Heart Four Counties News
Chipmaker deliberately cripples user devices with driver update | CSO Online
Google Launches User-Friendly 'Inbox' App, Alternative To Gmail
Heartland Files Motion to Dismiss Data Breach Litigation
Art a hack: is hacking yesterday’s news?| Culture professionals network | The Guardian
Cisco patches three-year-old Metasploit-able hole • The Register
How to Hack Your Own Network and Beef Up Its Security with Kali Linux | Life Hacker India
New Rotorua TV Commercials to Attract Aucklanders | Scoop News
Council wins $3M health project to benefit local families | Scoop News
Do we really need strong passwords? | Naked Security
ARM speeds data flow in the cloud with new, zippy interconnects | Computerworld
Speak Up Program Highlights – Video – RSA Conference
Apple issues a warning for iCloud users amid reports of hacking effort in China - B.C. - Times Colonist
What’s Worse Than Ebola in West Africa? Almost Everything - The Daily Beast
Will Hackers Change Your Holiday Shopping Habits?
Ohio family: Nurse Amber Vinson appears to be Ebola-free - CBS News
Ebola-themed emails deliver malware, exploit Sandworm vulnerability
Disaster recovery updates - Mission Network News
Soundsquatting Unraveled: Homophone-based Domain Squatting | Security Intelligence Blog | Trend Micro
Black Hat Usa 2014 - Windows: Computrace Backdoor Revisited
Bring Your Own Device: Vor allem junge Arbeitnehmer gefährden IT-Sicherheit | heise online
Goodfellas actor files $250 million lawsuit against The Simpsons for allegedly stealing his likeness - The Week
U.S. government probes medical devices for possible cyber flaws| Reuters
Disabling AVG when Windows cannot start | AVG
Family: Amber Vinson free of Ebola virus
InvestmentNews : Login
ISSA launches professional development framework
Open source NAC solution PacketFence 4.5.0 released
40% of enterprise employees use personal devices for work
Google absorbs Oxford Uni boffins in artificial intelligence boost quest • The Register
EPCOR goes to video in bid to curtail cost of upgrading Sun City infrastructure - Your West Valley News: Suncity
Bank of America to refund Apple Pay customers charged twice  - NY Daily News
'Citizenfour' Follows The Snowden Story Without (Much) Grandstanding : NPR
Homeland Security Investigating Medical Device Cybersecurity - iHealthBeat
Websense Bypasses Low-Value Partners To Focus On Elite Integrators - Page: 1 | CRN
“Good security is good marriage” | Symantec Connect
Friday Poll: How do you like Apple Pay so far? - CNE
Research and Markets: Global Antivirus Software Package Market 2014-2018: Key Vendors are Avast, AVG, ESET, Microsoft & Symantec | Virtual-Strategy Magazine
McAfee Delivers New Product Portfolio for Small and Medium-Sized Businesses - MarketWatch
Snowden documentary director touts encryption
Protect yourself from cyber hackers, modern day pirates
In the Wake of Shellshock, Mac Users Are Left Waiting for a Patch
How to combat cyber attacks using speed and sophistication
Home Depot Offering Credit Protection Following Security Breach: Here's How To Get It - Hartford Courant
McAfee Delivers New Product Portfolio for Small and Medium-Sized Businesses - Finances
Android Security App: How to keep data safe on Android | BGR
Apple Pay Partners With American Express, Visa Card Networks - Businessweek
How to Get Your Nobel Prize Medal Past Airport Security
Safe from Shellshock: How to protect your home computer from the Bash shell bug | PCWorld
How to Meet Energy Industry Mobile Security Requirements with Samsung KNOX™: Networkworld White Paper
How to measure the success of your security program - The Business Journals
Social Security tax torpedo: How to blunt it before you turn 71 |
SIEMs like a good idea: How to manage security in real time • The Register
Social Security Eligibility: How to Qualify for Each Benefit
Social Security Q&A;: How to Begin Steps to Retirement | Valley News
Nurse Who Contracted Ebola Virus-Free, Mom Says - ABC News
How Late-Life Marriage Can Hurt Your Retirement Security - 1
Cloud Data Security: How To Strategically Analyze Risk | CIO
European IS fighters: plans to avoid threats to EU’s internal security debated by MEPs
Social Security Q&A;: How to protect against identity theft | News OK
Government regulation on cloud security may spur SaaS use in health care | PCWorld
How to become a programmer, or the art of Googling well | okepi
Techday – Why enterprises must make sense of cyber security
Hackers threaten federal judge in Silk Road founder case | New York Post
Information Security Manager contract – Contract – North West England |
No Page Found - Khaleej Times
There's a lot more to backup than you thought • The Register
Asylum seekers win appeal over immigration department data breach | Australia news |
Demand for iOS devices helps drive enterprise mobility strategy - CIO
La démocratie canadienne pourrait devenir une illusion | Le Devoir
Bill to protect consumers against data breaches advances
Local Man Headed to Prison for Cyber Crimes | WSILTV | Local News
Bay Area Security Firm Hires ‘White Hat Hackers’ To Find Vulnerabilities In Digital Systems « CBS San Francisco
A private geo-cloud for the rest of us | ZDNet
Protect Data at the Source - Preventing Data Breaches | Virtual-Strategy Magazine
Hacker group leader gets 24 months in federal prison for attacking US Navy, 50 other institutions | Network World
Yahoo! Timestamps! Now! Block! Facebook! Email! Snoops! • The Register
ADL alert: Uptick in online hackers - Heritage Florida Jewish News
Apple Pay's next move: phone-to-phone payments? | Computerworld
U.S. Futures Slip on Ebola Report as Yen, Treasuries Rise - Bloomberg
The Evolution of Webinject
Powerpoint Vulnerability (CVE-2014-4114) used in Malicious Spam - SpiderLabs Anterior
Best Private Browsing Tools
Combatting Cyber Attacks Through Advanced Analytics & Intelligence – Video – RSA Conference
Calories in, calories out | Possibly Wrong
Honoring Shon Harris, a Leader of Information Security - The State of Security
How Agora Secured Their Infrastructure and Gained Visibility - The State of Security
Keeping Your Business Safe Online - The State of Security
EPIC: driver data shared via V2V technology needs protection - SC Magazine
Disarm Advanced Persistent Threats with Symantec Messaging Gateway | Symantec Connect
~kjiwa: x86 DOS Boot Sector Written in C
Where can I use Apple Pay? 220,000 U.S. stores accept cardless payment - NY Daily News
Security Privacy & Digital Life Safety - Don’t be that Guy – Trend Micro
Microsoft Windows Hit By New Zero-Day Attack | Security Intelligence Blog | Trend Micro
Moscow, Beijing poised to sign deal on joint cyber security ops • The Register
Black Hat Usa 2014 - Windows: Windows Kernel Graphics Driver Attack Surface
Greens Take Nanny State To A New Level | Scoop News
Apple's Yosemite OS shares Spotlight search terms by default | CSO Online
Mac OS X Yosemite sends search, location data to Apple, Microsoft - Security - News -
The Battle for Palestine | Consortiumnews
Telefónica dives into the consumer internet of things with Thinking Things “ambient” pack — Tech News and Analysis
A Natural A/B Test of Harassment - Kongregate Developer News
Event: Learn how to protect your kids online - West London Mum
Apple Pay Glitch Charges Some Bank of America Users Twice - Digits - WSJ
Apple CEO Tim Cook discusses security with China amid iCloud hacking claims - The Times of India
Techday – New super massive firewall to protect all business sizes
Why Apple Pay Is The Most Secure Payment Platform On The Planet
Incident Response Plan - CSO | The Resource for Data Security Executives
Protect Against Email Targeted Attacks with Symantec Disarm Technology | SymantecTV
Leaders working on cyber security education
FAQs – RSA Conference
Hackers May Have Found a Way to Infiltrate Apple’s iCloud in China | PadGadget
Ventir Trojan Intercepts Keystrokes from Mac OS X Computers | The Mac Security Blog
Top 5 Scariest Zombie Botnets
OpenBSD 5.5 Local Kernel Panic ≈ Packet Storm
TestLink 1.9.12 PHP Object Injection ≈ Packet Storm
Centreon SQL / Command Injection ≈ Packet Storm
Microsoft launches two new Android apps, one new Android Wear app | Android and Me
Ransomware takes malware from bad to worse | InfoWorld
ElectricCommander Privilege Escalation ≈ Packet Storm
Red Hat Security Advisory 2014-1668-01 ≈ Packet Storm
Ubuntu Security Notice USN-2388-2 ≈ Packet Storm
POS malware - a look at Dexter and Decebal - HP Enterprise Business Community
An Imaginary Town Becomes Real, Then Not. True Story : Krulwich Wonders... : NPR
Nurses face obstacles on front lines against Ebola
Symantec sees rise in high-traffic DDoS attacks | PCWorld
The BlackEye Delusion - YouTube
Grrcon 2014 - Reducing Your Organization’S Social Engineering Attack Surface
Carmakers ignore hacking risk, security expert says - Technology & Science - CBC News
Historians’ work meant little to an MI5 obsessed with cold-war communists | World news | The Guardian
Hackers face off this weekend to solve Air Force's cyber challenges | Air Force Times |
Apple Dropping SSL 3.0 for Push Notifications in Wake of Poodle Security Flaw - The Mac Observer
DES Appear Safe and Effective in SVG PCI - Journal News - TCTMD
NetApp Plug-in for Symantec NetBackup Solution Brief
Malware directs stolen documents to Google Drive
Break the Fraud Lifecycle – Video – RSA Conference
FTDI admits to bricking innocent users' chips in silent update | ZDNet
NIST finalizes cloud computing roadmap - SC Magazine
Microsoft's Android Wear app lets you search Bing with a flick of the wrist | News | TechRadar
Microsoft launches three new Android apps
Techday – Why enterprises must make sense of cyber security #WGImagine14
Startup Marketing Conference: Conversion Hacking The Brain « iMediaConnection Blog
Efua Dorkenoo, who fought female genital mutilation, dies at 65 - The Washington Post
Chinese MitM attack targets iCloud users - SC Magazine
Data Center Server Security: A SANS Survey - SANS Institute
Online Harassment Prevalent, Often by Strangers, Pew Study Finds - Digits - WSJ
Websense CEO: Bush-League Partners Were Hurting Our Channel Strategy - Page: 1 | CRN
BYOD In Australia - Cool, Cheap And (Potentially) Catastrophic! | DLA Piper - JDSupra
OS X Yosemite Download Available Now: How to Update Mac OS to Yosemite | The Christian Times
Microsoft beefs up security features in Windows 10 | News | TechRadar
Forrester Grades Its 2014 Cloud Predictions | News | Vertical Systems Reseller (VSR)
Windows 10 has new ways to protect you against internet data breaches
Symantec Endpoint Protection Small Business Edition 2013 | Symantec
Researchers observe recently patched Adobe bug added to exploit kits - SC Magazine
Vuln Hunt: Find the Security Vulnerability Challenge # 3 | Cyber Trust Blog
Twitter wages war on the password with 'Digits' phone number login - Telegraph
Ebola Spreads - In Cyber Attacks Too
Ubuntu Security Notice USN-2387-1 ≈ Packet Storm
Half Of UK Affected By Cybercrime, Financially And Emotionally ≈ Packet Storm
Quick PHP Patch Beats Slow Research Reveal ≈ Packet Storm
Apple warns of new iCloud threat | Technology |
Mono for Unreal Engine - Miguel de Icaza
ThreatTrack Vipre Antivirus 2015 Review & Rating |
Viral-research moratorium called too broad : Nature News & Comment
‘Spam Nation’ Publisher Discloses Card Breach — Krebs on Security
Juniper Q3 earnings in line with estimates, outlook bleak | ZDNet
Sourcebooks shopping-cart security breach hits over 5,000 customers
IBM and Microsoft promise to make their clouds compatible | Computerworld
Startup Marketing Conference Panel: Lean Marketing Meets Growth Hacking: Getting the First 1000 users Overnight « iMediaConnection Blog
Citizenfour's Laura Poitras Explains Why Edward Snowden Did It | Houston Press
Location Labs wants to disrupt 911 - SFGate
Grrcon 2014 - New World, New Realities: Endpoint Threat Detection, Response And Prevention
Twitter throws devs an authentication bone | ZDNet
Patch for Windows flaw can be bypassed, prompts temporary fix from Microsoft - SC Magazine
SEDNIT malware delivered in 'Operation Pawn Storm' - SC Magazine
Three Things Small Businesses Can Learn from High Profile Data Breaches | ThreatMetrix
Adobe spies on readers: EVERY page you turn leaked to base over SSL • The Register
SP Network Transformation at the Cisco Live Cancun World of Solutions
Annapolis County says hackers holding computer files for ransom - Local - The Spectator
Facebook tells DEA: Stop impersonating users - Oct. 20, 2014
Vulnerability Note VU#184540 - Incorrect implementation of NAT-PMP in multiple devices
Juniper Networks - press-releases
Juniper Networks - Q3 2014 Financial Results Conference Call
CSO seeks feedback for reader survey | CSO Online
Malvertising impacts Yahoo, AOL visitors, spreads ransomware - SC Magazine
Cyber Security Careers: What You Need To Know To Advance In The Security Field
Building a Forex trading platform using Kafka, Storm and Cassandra
Stalker gets life for hacking girl 10 years ago
Microsoft ramps up Windows 10 security, introduces two-factor authentication |
Three Latin American men arrested not connected to ATM-hacking cases — IGP – BorneoPost Online | Borneo , Malaysia, Sarawak Daily News | Largest English Daily In Borneo
Health Data Breach Lawsuits Face Uphill Battle in California - iHealthBeat
Filming in fear: Edward Snowden as 'Citizenfour'
Staples Investigating Possible Data Breach - Network Security on CIO Today
Three Latin American men not connected to ATM-hacking cases, says IGP | theSundaily
Data breach lawsuits not always a slam dunk for plaintiffs | Healthcare Dive
Ebola advice emails from 'World Health Organization' are malware spam | Technology |
Protect My Business | Small Business Security Solutions | Kaspersky Lab
PCI student speaks about RYLA experience | Portage Daily Graphic
Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion -
Why would you want Windows for IoT anyway? | CITEworld
Security Education K Through Life
XL Group Appoints New Cyber & Technology Insurance Underwriters
CloudOne Appoints James Goldman Chief Trust and Security Officer
Security in the age of IOT - CSO Bloggers - CSO | The Resource for Data Security Executives
Microsoft Wants to Own You [Video]
CyberSecurity Academy students get real world training - Baltimore Sun
Huawei smartphone shipments up 26 percent; on track for annual targets | ZDNet
XL Group Adds New Cyber & Technology Insurance Expertise - MarketWatch
People In Business: Carl Boyer of The Technology Group |
Cybersecurity Credentials Coalition (C3) Featured at ISACA Security Conference
Financial Executives International DailyCyber Risk Banks’ Biggest Worry - Financial Executives International Daily
Attackers circumvent patch for Windows Sandworm vulnerability | Symantec Connect
Microsoft misses Windows bug, hackers slip past patch | Computerworld
Migrating from AWS to AWS - Instagram Engineering
Lawyer Goes After Obama, Sues Over Illegal Spying | The Daily Caller
Your business can’t afford the cost of cyber crime | CSO Online
Microsoft Releases Workaround for Zero-Day Flaw in Windows OLE - The State of Security
Healthcare Cyber Security Summit (San Francisco, CA)
One Year after Data Breach, FDA System Still Vulnerable |
Hackers use Ebola outbreak to trick users into downloading malware- The Inquirer
Amazon Web Services opens German location to ease privacy concerns - Techworld
Ebola email viruses go viral with 'healthtips' from hackers — RT News
Terrible People Prey On Ebola Fears In New Email Scam
The Pueblo Chieftain |Will Apple Pay be the next iRevolution?
Ebola epidemic: fake emails from World Health Organization used by hackers to spread malware - Gadgets and Tech - Life and Style - The Independent
Why Apple Pay Is the Most Secure Payment Platform on the Planet
Derek sur Twitter : "Thanks @2600 for my latest copy of the Mag!!! #WiGLE looks cool."
#NCSAM: Cisco’s Cyber Security Story
Akamai sees record-setting spikes in size and volume of DDoS attacks | CSO Online
Poisoned Apples: A Look Into The Recent Threats That Affected iOS Users - Security News - Trend Micro USA
Federal Trade Commission appoints new chief technologist - SC Magazine
Juniper Networks sur Twitter : "That’s #SRX appeal! Via @RFairclough, @cooperlees & @aijayadams."
New ABA Head Wants To Work With Retailers For Payments Security |
Tiempo Blog - Y-Combinator, a Two-Year-Old, and a Pregnant Wife
Amazon Web Services opens German location to ease privacy concerns | PCWorld
Microsoft To Step Up Security Controls in Windows 10 -- Redmond Channel Partner
Brown: Ebola will elevate respect for nurses | Nation/World - Home
Blaming everything but the real causes |
Tamsin Fox-Davies sur Twitter : "Listening to Judith Bitterli the CMO of @AVGFree on the power of three minutes at @The_Pitch"
Android Malware Attacks Soaring |
From ASCII Atlantic City 5 Great Quotes 2 Helpful Business Continuity Tools
Cybercriminals continue to piggyback on Ebola news - SC Magazine
Grrcon 2014 - Adopting A Risk-Based Threat Model To Secure Your Defenses And Regain Control Of Your Critical Data
Local news from Rock Hill, SC | The Herald
Documentary 'Citizenfour' tracks how decision to become a whistleblower posed a gripping dilemma for Edward Snowden - NY Daily News
First Data launches Perka beacon to accompany loyalty app for SMBs | ZDNet
Computer users who damage national security could face jail | Law | The Guardian
Is Target Stock a Buy Nearly a Year After the Data Breach? (TGT)
Outgoing UK spy chief rejects mass surveillance claims| Reuters
INFOGRAPHIC▶DDoS Attacks on the Rise
Abandoned subdomains pose security risk for businesses | CSO Online
Adobe exploit used to spread Dyre credential stealer - SC Magazine
Apple iOS v8.0.2 - Silent Contact 0Day Vulnerability (Denial of Service) | Official Vulnerability- & Bug- News Resource!
Cyber Security Market in the US Government Sector 2014-2018: Key Vendors are BAE... -- DUBLIN, Oct. 23, 2014 /PRNewswire/ --
Letters of Note: 1984 v. Brave New World
Citizenfour Review | Movie Reviews and News | Fall Movies - Calendar, Trailers, Movie Photos, Movie Clips, Movie Guide |
Noted Cybersecurity Expert John Pirc Joins Bricata as Chief Strategy Officer - Press Release - Digital Journal
ThreatMetrix Data Finds E-Commerce Executives See Drop in Fraud Rates and Chargebacks Following Implementation of Comprehensive Fraud Prevention Solution | Virtual-Strategy Magazine
Twitter Debuts Fabric SDK For Mobile Developers - InformationWeek
You might not be able to avoid a data breach, so here's how to protect yourself from the inevitable |
Cost of cyber attacks increases by 10.4% in 2014 | IDM Magazine
Etsy rolls out Square-like card reader for offline payments | ZDNet
How Avanade institutionalizes innovation | ZDNet
My Certification Journey - J-Net Community
Cyber-Criminals Quickly Adopt Critical Flash Player Vulnerability
Citizenfour's Laura Poitras Explains Why Edward Snowden Did It | Village Voice
Spam in September: Financial Phishing Accounts for Highest Percent of Detections | Kaspersky Lab US
From CIOs to IT: Shining a light on cloud disaster recovery with attainable metrics - Cloud Tech News
ISA president urges state AGs to expand understanding of cybercrime - SC Magazine
Ello Raises $5.5 Million, Legally Files As Public Benefit Corp. Meaning No Ads Ever | TechCrunch
Twitter launches Digits, a password-free login service for mobile apps |
Government issues guidance on Bring Your Own Device to work | theHRDIRECTOR - The only magazine dedicated to HR Directors
ThreatMetrix Data Finds E-Commerce Executives See Drop in Fraud Rates and Chargebacks Following Implementation of Comprehensive Fraud Prevention Solution
Illinois man sentenced for hacking U.S. Navy
‘Best female marketer – B2B’ awards shortlist announced |
Legality pain for security pros | ITWeb
The BlackEye Deception - YouTube
New Zealanders are being watched: Snowden | SBS News
Ebola: Nurses on the front lines of disease (Opinion) -
Apple CEO Talks Security With Top Chinese Official: Xinhua - NBC News
Microsoft unveils tighter security plans for Windows 10- The Inquirer
How to Use Apple Pay | News & Opinion |
Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics
Business continuity planning gets easier | ITWeb
SANS Institute
Staples data breach raises question of - San Francisco Business Times
Apple Pay Can Be Tricked To Work Outside U.S. - Apple/Mac on CIO Today
Lone lawyer sues Obama, alleging illegality of surveillance programs | Ars Technica
HP adds two new Moonshot configs and increased app support | ZDNet
ThreatMetrix Data Finds E-Commerce Executives See Drop in Fraud Rates and Chargebacks Following Implementation of Comprehensive Fraud Prevention Solution - Press Release - Digital Journal
Grrcon 2014 - Advanced Threats And Lateral Movement
Watch "New York financial regulator shifts agency's focus on to cyber security" Video at SCMagazine
Transcript website flaw exposed personal data on 98k users - SC Magazine
The Bash Vulnerability: How to Protect your Environment
7 Things About Android Lollipop 5.0 You Need To Know
15 Hot Security Companies That Could Be Symantec Acquisition Targets - Page: 1 | CRN
Zscaler Launches New Advanced Persistent Threat Protection
10 strategic tech trends to watch for - ABA Banking Journal
Planned new computer hacking laws need greater clarification, say UK lawmakers
Inside the iPad Air 2 | ZDNet
Apple dropping support for SSL 3.0 on push notification servers, requiring TLS by October 29th | 9to5Mac
Kaspersky Internet Security 2015
Watch Out for Suspicious Microsoft Office Files--It Could Be Malware
U.S. national security prosecutors shift focus from spies to cyber - Chicago Tribune
Now Open - AWS Germany (Frankfurt) Region - EC2, DynamoDB, S3, and Much More
Q&A: Laura Poitras | The Nation
Illinois man sentenced for hacking U.S. Navy, other victims : News
We have another White House fence jumper - The Week
Cyber skills shortage makes UK a soft target for hackers
Modular malware for OS X includes backdoor, keylogger components - SC Magazine
Ad-borne Cryptowall ransomware is set to claim FRESH VICTIMS • The Register
Apple iCloud under attack from Chinese hackers. Here's why : PERSONAL TECH : Tech Times
Michael Rasmussen Governance Risk and Compliance 2015 | ITWeb
A Hacker’s Perspective: How I Took Over Your City’s Power Grid – Podcast – RSA Conference
Mapillary in the OpenStreetMap iD Editor
Celebrating two OS landmarks: Windows 7 and 8.1 | News | TechRadar
Hackers Ran Loose Inside JPMorgan For 2 Months Before Getting Caught
Attackers bypass Sandworm patch with new 0-day
Information Security News: Oracle's Quarterly Critical Patch Update Includes 25 Java Security Patches
Hector Martin sur Twitter : "Here's how @FTDIChip's new driver is intentionally and maliciously bricking clones."
Apple iOS v8.0 - v8.0.2 - Denial of Service Vulnerability (UIAlertControlview & Invalidationhandler) - YouTube
Vacker targets top automation company status with new offerings
Brown: Ebola will elevate respect for nurses | National News - WPTZ Home
Smart Lock Devices: Security Risks and Opportunities | Security Intelligence Blog | Trend Micro
Google unveils “Inbox” as combined toolset for mail, calendars, tasks | Ars Technica
Apple to stop SSL 3.0 support for push notifications soon | CSO Online
Microsoft misses Windows bug, hackers slip past patch | CSO Online
Business continuity briefs
Ten years of Ubuntu: How Linux’s beloved newcomer became its criticized king | Ars Technica
Family of nurse Amber Vinson says she is free of Ebola virus - The Week
Inspired eLearning is a Leader in the New Gartner Magic Quadrant for Security Awareness Computer-Based Training | Virtual-Strategy Magazine
519 Million Reasons Why Your Financial Records Are in a Hacker's Hands
The Easiest Ways to Protect Yourself After a Data Breach |
UK spy chief rejects mass surveillance claims | Europe | Worldbulletin News
Wind River hunts viruses using Atom processor | Electronics Weekly
Windows 10 to include built-in two-factor authentication
Target Says Banks Can't Go After It For Data Breach Losses - Law360
Staples Investigating Possible Data Breach
Grrcon 2014 - Pci And Crypto: The Good, The Bad, And The Frankly Ugly
Information Security News: Many Americans Say They Will Avoid Breached Retailers,Study Shows
Cyber Threats: Information vs. Intelligence
Review: Ups and Downs of Apple Pay in Action - Digital Life on Top Tech News
Apple to grow retail stores in China from 15 to 40 within two years, says Cook | 9to5Mac
Windows 10 to get two-factor authentication built-in | InfoWorld
How Savvy Security Leaders Get the Budgets They Need – Blog Post – RSA Conference
[1410.6079] Bitcoin over Tor isn't a good idea
Citrix ShareFile review | PC Pro
Cybersecurity and Data Breaches: What CMOs Need to Know | DigitalNext - Advertising Age
Information Security News: Offensive Cyber Operations in US Military Doctrine
Pro-Privacy Senator Wyden on Fighting the NSA From Inside the System | WIRED
Zscaler Launches New Advanced Persistent Threat Protection With Fall 2014 -- Now Everyone Can Be Protected From Zero-Day and Advanced Threats - EIN News
Scientists closer to understanding mysterious markings on the world's oldest wooden statue - The Week
Windows 10: Aiming for More Business Users - Operating Systems on CIO Today
Apple to Open 25 New Stores in China Over Next Two Years, Says CEO Tim Cook - Mac Rumors
Surprise! Here's the first look at Avengers: Age of Ultron - The Week
Plea to Pāpāmoa pond and aquarium owners | Scoop News
Rasamny: Millennials must take precautions to avoid falling victim to hackers | The Daily Orange – The Independent Student Newspaper of Syracuse, New York
Google goes beyond two-step verification with new USB Security Key | Naked Security
A New Provable Factoring Algorithm | Gödel's Lost Letter and P=NP
Apple’s iCloud service suffers cyber-attack in China, putting passwords in peril - The Washington Post
Information Security News: CJK network security consultation mechanism to combat cyber-terrorism matters discussed
Information Security News: Automakers working to prevent vehicle cyber terrorism
SSCC 170 – Is the best time to shop at a store right after it has a breach? [PODCAST] | Naked Security
DefCamp 2014
Colombia negotiator to testify in peace talks hacking case
What's new? Apple releases new iOS 8.1
Review: Ups and Downs of Apple Pay in Action - Data Security on CIO Today
Interview: Hord Tipton, Executive Director, (ISC)2 - Infosecurity Magazine
Castles in the Air: Data Protection in the Consumer Age – Podcast – RSA Conference
From the Canyon Edge: Fingerprints are Usernames, not Passwords
AT&T; revenue misses forecasts as more customers bring own phones| Reuters
Grrcon 2014 - Are You A Janitor, Or A Cleaner?
Target Moves On From Massive Breach Issue, Preps for Holidays : Marketing : Franchise Herald
Illinois man sentenced in hacking conspiracy - Bluefield Daily Telegraph: News
CDC to monitor all West African travelers for 21 days - The Week
Tablets, cars drive AT&T wireless gains—not phones - SFGate
China linked to cyber attacks on Taiwan exploiting Windows vulnerability | Technology |
Chinese government launches cyber attack on Apple iCloud users |
Auckland man convicted for bags of cash | Scoop News
The mystery of the disappearing Silk Road murder charges
Bring your own ‘anything’ | IT-Online
After attack on Chinese iCloud users, Apple issues browser security notice | ZDNet
With new OS, Microsoft will try to put Windows 8 era behind it - PC World Australia
Crikey says: we stand with Freya | Crikey
Watch crazy, chaotic footage of shots being fired inside Canadian Parliament - The Week
Review: Apple Pay in action - Hindustan Times
Apple Pay Can Be Tricked To Work Outside U.S. - Apple/Mac on Top Tech News
China-backed hackers target Apple's iCloud users - blog
Student who pleaded guilty to hacking Frances Abbott's $60,000 school scholarship files that were leaked online has to wait another month to find out her fate | Daily Mail Online
More victims of data breach contacted: WARMC parent company sending letters to affected clinic patients - Mohave Daily News: News
Skybox Security Accelerates Channel Program Growth with New Offerings | Business Wire
TidBITS: How to Use Apple Pay
Tutus' Secure Smartphone, Farist Mobile, Approved by Spanish Security Agency - Press Release - Digital Journal
Tech Report Best Of: Free Antivirus Software |
Xen says its security policies might be buggier than its software • The Register
New CVE-2014-4114 Attacks Seen One Week After Fix | Security Intelligence Blog | Trend Micro
Operation Pawn Storm: The Red in SEDNIT | Security Intelligence Blog | Trend Micro
Grrcon 2014 - Vulnerable By Design – The Backdoor That Came Through The Front
WebApp Sec: Re: Shameless plug: OWASP Board Elections
WebApp Sec: Administrivia: Trouble Ticket Systems subscribing to this list and unsubscribe requests
Business School | Beware of Internet-based Phone System Hacks | Valdosta Today - South Georgia's News Source
Inspired eLearning is a Leader in the New Gartner Magic Quadrant for Security Awareness Computer-Based Training
Have a Techie in Your Life? Hip Tablet Gift Ideas For 2014
3 reasons to invest in a Surface Pro 3 instead of an iPad Air 2 - TechRepublic
Bash Bug can affect computers running Mac OS X: Symantec - The Economic Times
Experts: Beware of hackers, security lapses - News - - Middletown, NY
Blackwater Guards Found Guilty In 2007 Shootings In Iraq | NCPR News
AT&T, like Verizon, misses profit estimates | The Kansas City Star
Homegrown developers look to unseat Microsoft’s dominant OS - Headlines, features, photo and videos from|china|news|chinanews|ecns|cns
How to keep your rigs from getting ripped off | Fire Chief
Vietnam police hunt hackers behind mass outage | PCWorld
Illinois voting machine changes Republican votes to Democratic ones - The Week
AT&T revenue misses forecasts as more customers bring own phones | TODAYonline
Why are so many big-name retail chains being hacked?
Bankers say data breach over that affected Easthampton, Southampton businesses, including Big E’s Supermarket |
Data Privacy for Businesses: A Part of Doing Business | Security Intelligence Blog | Trend Micro
Videos – RSA Conference
Apple Pay: Who Won and Who Lost?
Techday – Fortinet’s next-generation firewall platforms unveiled
Soldier Killed, Suspect Dead In Shooting Near Canadian Parliament | NCPR News
Hackers play cat-and-mouse with retailers' security systems
Microsoft pulls SHA-2 update for Windows 7 and Server 2008 R2 - Neowin
Windows Update drivers bricking USB serial chips beloved of hardware hackers | Ars Technica
My adventures in CNC robotics
New McAfee Security Suites for SMB - McAfee
Tablets, cars drive AT&T wireless gains_not phones | The Kansas City Star
Hewlett-Packard Company(NYSE:HPQ): Should You Buy The Split? | ETF DAILY NEWS
Tablets, Cars Drive AT&T; Wireless gains_not Phones - ABC News
Personal Data up for Grabs in the Great Cyber War
And Then There Were None: Europe, the Internet, and the Right to Be Forgotten – Blog Post – RSA Conference
Techday – Moving beyond fear with business assurance technology
How to upgrade to Kaspersky Internet Security 2015 - YouTube
Trend Micro sur Twitter : "The Home of the Future. #NCSAM"
New AWS Directory Service
Websense® Office of the CSO Resources —
SSLv3 "POODLE" Vulnerability CVE-2014-3566
Indianapolis Cyber Security Summit aims to fight back against computer hackers | Fox 59
Maybe there really is an Ebola (malware) outbreak | CSO Online
Officials: 500M records stolen
AT&T revenue misses forecasts as more customers bring own phones - News - AM 590 - WKZO Everything Kalamazoo
Google Nexus 6 vs. Apple iPhone 6 Specs, Review & Comparison: Ecosystems Matter Now : Tech : Latin Post
Tablets, cars drive AT&T wireless gains_not phones | The Miami Herald
US Legislator Demands Snowden be Charged with Murder | News | teleSUR
FBI Charges NOAA Worker With Swiping Data on Dams
Apple issues China iCloud security warning | South China Morning Post
No Application for Amenities Board Funding for 2015/16 | Scoop News
AT&T; revenue misses forecasts as more customers bring own phones | Daily Mail Online
FBI Arrests NOAA Employee for Stealing Sensitive Dam Information : World : Chinatopix
Maritime Union backs change of Government | Scoop News
Hacker gets two-years in case involving penetration of government computers - News
Health Care Equipment Could Be Vulnerable to Hackers | The Fiscal Times
US focus on naming foreign hackers gets criticized | TheHill
AVG Technologies Previews New Identity-as-a-Service “CloudCare SSO” at Cloud Summit | AVG Now
Grrcon 2014 - Biohacking: Becoming The Best Me I Can Be
Competitive Landscape: Carrier-Class Network Firewalls
The Savvy Security Leader: Using Guerrilla Tactics to ID Security Program Resources – Video – RSA Conference
Websense 2015 Security Predictions Report
Courthouse News Service
Quick Facts About Ebola | NCPR News
Apple’s iCloud service under attack in Mainland China - MarketWatch
Hackers may have infiltrated iCloud: blog | Sarnia Observer
Apple issues security warning for iCloud amid reports of hacking in China - The Economic Times
AT&T Q3 Revenue, EPS Miss, Shares Slip; Cuts Year Growth View - Tech Trader Daily -
Metro-east news from Belleville, IL | Belleville News-Democrat
Apple says hackers attacked iCloud -
The pit and the pendulum - Lexology
Survey: Data breaches could keep shoppers away
I.T. boss accused of hacking will get new trial |
Staples data breach raises question of - Silicon Valley Business Journal
Hackers targeting phones for bank info | World | 3 News
Microsoft Outlines Windows 10 Security and ID Management Controls --
VA: Hackers Never Siphoned Data Out of its Systems -
Microsoft warns users about 0-day behind PowerPoint attacks • The Register
FBI: No evidence that JPMorgan hack was payback for sanctions against Russia - The Washington Post
AT&T; revenue rises less than expected| Reuters
McAfee Delivers New Product Portfolio For Small and Medium-Sized Businesses
Google Introduces Enhanced Two-Factor Authentication with USB Security Key - The State of Security
How to Make Sure You're Visiting the Real iCloud Page
The Number of Industries Getting Classified Cyberthreat Tips from DHS Has Doubled Since July -
Google implements Security Key two-factor authentication - SC Magazine
Business Safe Online |
Red Hat Security Advisory 2014-1686-01 ≈ Packet Storm
Red Hat Security Advisory 2014-1685-01 ≈ Packet Storm
Red Hat Security Advisory 2014-1692-01 ≈ Packet Storm
You asked, we answered: #AskPtH Questions and Answers | Cyber Trust Blog
Americans fear identity theft more than getting shot to death – survey • The Register
Is your home or office internet gateway one of '1.2 MILLION' wide open to hijacking? • The Register
The Hacker News — Hacking, Cyber and Internet Security
Hackers make companies' phones call premium-rate numbers, cost them billions
Worm variant of Android ransomware, Koler, spreads via SMS - SC Magazine
Google launches support for Security Key, a simpler kind of two-factor authentication | The Verge
6 Actions Businesses Should Take During Cyber Security Awareness Month
Inside San Francisco's housing crisis — Vox
Defence-in-depth, more than a buzzword | McAfee
Feds investigating two dozen potential hacks targeting life-saving medical devices — RT USA
Earnings Challenged by Guidance from AT&T - AT&T (NYSE:T) - 24/7 Wall St.
Microsoft misses Windows bug, hackers slip past patch - Computerworld
Target rolls out free shipping for all orders during holidays - LA Times
Dairy Queen latest hit by data breach
United Nations News Centre - Despite gains against tuberculosis, better research funding required – UN report
Sun Current | Richfield Dairy Queen affected by data breach
Corruption Currents: From New Jersey Mafia Hangouts to Medical-Device Hacking - Risk & Compliance - WSJ
How to Tap Your Network and See Everything That Happens On It | Life Hacker India
Windows 10 To Improve Security With Two-Factor Authentication, App Signing, More
Second Healthcare Data Breach Hits Tenn. Facility, Files Misplaced |
For Extra Safety, You Can Now Access Gmail With a Physical Key
Google USB Security Key introduced to keep out hackers | Daily Mail Online
Study: MSPs See Opportunity With Internet Of Things, But Are Slow To Act - Page: 1 | CRN
As the NSA scandal matures, outrage fizzles into business as usual | Personal Liberty
Staples reports possible data breach •
Free antivirus software for your computers | FOX C
New study finds MSPs behind on Internet of Things opportunity | Computer Dealer News
Yes, There Really is a School for Hackers in Costa Rica - Costa Rica Star NewsCosta Rica Star News
Thieves break into banks without entering the building |
Windows 10 Moves to Set the Bar for Security
IBM, Microsoft Collaborate on Hybrid Cloud Offerings - Microsoft/Windows on Top Tech News
Phone hacking cost small businesses $4.73 billion last year - Yahoo Finance
Windows 10 to get two-factor authentication built-in - Techworld
US government probes medical devices for possible cyber flaws - The Times of India
Apple Encouraging Chrome and Firefox Users to Download Safari After Installing Yosemite - Mac Rumors
Massive malvertising campaign on Yahoo, AOL and other sites delivers ransomware | CSO Online
Cisco supply chain CSO talks cradle to grave security - SC Magazine
New Zero-day in Microsoft OLE Being Exploited in Targeted Attacks
Bracket Aims to Tame the Cloud - Digits - WSJ
Gartner identifies the Top 10 strategic technology trends for 2015 | Fort Myers Newspaper | News, Business, Real Estate and Arts in Fort Myers FL | Florida
McAfee trims prices, enhances partner margins on new SMB portfolio -
Startup wants to make cloud attractive for security-sensitive businesses | Network World
Apple Pay: What's the Big Deal? | John C. Dvorak |
Windows 10 to get two-factor authentication built-in | PCWorld
FTDI driver kills fake FTDI FT232?? - Page 1
Chinese hackers slurp iCloud passwords, Apple's CEO jumps into his jet for China • The Register
Apple issues security warning for iCloud users after attack by Chinese hackers | Latest News & Updates at Daily News & Analysis
What Google's Android 5.0 Lollipop Means For Mobile Enterprise (AAPL, BBRY, GOOG, GOOGL)
China responds over "hacker infiltration to Apple's iCloud" - Xinhua |
China-backed hackers may have infiltrated Apple's iCloud: blog| Reuters
BBC News - China denies backing iCloud hack
Phone bill premium number hack detailed | BGR
Apple CEO discusses security with top Chinese official amid hacking claims -Xinhua | Daily Mail Online
Effective security techniques we don't follow enough | ZDNet
Windows 10: Security and Identity Protection for the Modern World
Apple Pay and wearable technology could pose next threats, experts say - SC Magazine
Businesses need to prepare for the wearables invasion right now | News | TechRadar
China is hacking its own citizens’ iCloud accounts | KHON2
Apple CEO Tim Cook meets with Chinese official after iCloud attack | Computerworld
Survey: Big Data Delivers the Goods - Information Management Online Article
Staples May Have Been Breached. (Should You Just Cut Up All Your Cards?) - Forbes
Official Google Blog: An inbox that works for you
Grrcon 2014 - Autonomous Remote Hacking Drones
Windows 10: Continuing to Raise the Security Bar for Cybercriminals | Cyber Trust Blog
Could NFV be the new Google? - J-Net Community
EU group: NSA's 'balance' of security, privacy in surveillance sucks | Network World
Apple iCloud hack attempt: Is my data safe? - Recombu
DHS investigates 24 potentially deadly cyber flaws in medical devices | Computerworld
Discretix Technologies Ltd. Announces Company Name Change to Sansa Security, Inc.
Apple, China talk hacking? | TheHill
Apple claims iCloud target of hacking attacks | Business | 3 News
Possible cybersecurity flaws in medical devices probed - Technology & Science - CBC News
Microsoft warns of new Zero-Day attack | CSO Online
US probes medical devices for possible cyber flaws
Federal Audit Finds FDA Website, Internal Network Vulnerable to Hackers | RAPS
The man with the golden blood | Mosaic
How do you promote cybersecurity across your or... | Cisco Communities
5 Keys To Successfully Sell Business Continuity As A Service
US Government Probes Medical Devices for Possible Cyber-Security Flaws | NDTV Gadgets
Security Advisory 3010060 released - MSRC - Site Home - TechNet Blogs
Bricata, LLC Announces Management Team | Virtual-Strategy Magazine
Microsoft Announces New Azure Plans, Software Marketplace, and Partnerships | NDTV Gadgets
Illumio Brings Adaptive Security to Morgan Stanley, Plantronics, Creative Artists Agency, Yahoo and NTT I3 - MarketWatch
Staples warns of possible breach affecting customer credit cards - Orlando Business Journal
Apple issues iCloud security alert -
BBB Offers Tips For How To Handle A Data Breach - / State
Android’s recent encryption announcement doesn’t protect your data | TheHill
Microsoft Details Windows 10 Security Enhancements | Windows 10 content from Paul Thurrott's SuperSite for Windows
Staples Probing Possible Payment Card Data Breach | Re/code
Microsoft warns on yet another zero-day security flaw - SC Magazine UK
Blotter: Hacking in the street | Blotter | Charleston City Paper
Soundsquatting 101: How Homophones Can Lead to Risks - Security News - Trend Micro USA
Gartner Positions Wombat Security Technologies as "Leader" in Magic Quadrant for Security Awareness Computer-Based Training Vendors
Google Chrome vs. Safari
Apple: Internet Explorer? Never heard of it | Computerworld
60% of Android attacks use financial malware
Here's a bird’s eye view of Ebola epidemic | CSO Online
Are e-health records at fault for Ebola mistakes? | CSO Online
Beachhead Solutions Cited in Gartner's Magic Quadrant for Mobile Data Protection Report
Irish Water gave bank details to landlords | Irish Examiner
Bricata, LLC Announces Management Team - Press Release - Digital Journal
8 ways Big Data helps improve global water and food security |
Target will offer free shipping on all holiday items starting today -
Apple in the enterprise: For some, its already there | ZDNet
Target eyes holiday turnaround with free shipping, faux fur - Business -
Chinese hackers go after iCloud
Microsoft promises Windows 10 will mean two-factor auth for all • The Register
Apple chief meets Chinese leader amid iCloud hacking storm - Times LIVE
Simply Security News, Views and Opinions from Trend Micro, Inc
A California Couple Has Made the World's First Working Hoverboard | Motherboard
Endpoint Visibility is Key to Combatting Attacks
Watch: Target CEO leaves breach behind this holiday season
San Juan Record - Classifieds, Events, Businesses in Monticello, San Juan County, Utah - Rick Eldredge
Microsoft Security Essentials versus Lookout Security & Antivirus: Which one is for you?
FBI Warns of Hacks by Moonlighting Foreign Agents - Bloomberg
Grrcon 2014 - Cryptorush – Rising From The Ashes
Core Impact Pro Training & Certification Now Available Online | Core Security Blog
Apple Offers Guidance Following China iCloud Attack ≈ Packet Storm
Hacker, Terrorist Threats Spur Bases To Build Power Grids ≈ Packet Storm
Gartner Positions Wombat Security Technologies as "Leader" in Magic Quadrant for Security Awareness Computer-Based Training Vendors - MarketWatch
Apple CEO meets Chinese official amid iCloud hacking row
China-backed hackers target Apple's iCloud users- blog| Reuters
Chinese Authorities Hack Apple's China iCloud - Digital Life on Top Tech News
Staples is the latest company to announce a credit card breach | Digital Trends
Chinese Hackers Suspected in iCloud, Website Attacks
Apple CEO discusses security with top Chinese official amid hacking claims - Xinhua| Reuters
Apple faces another cyber attack, issues security warning for iCloud | Wall Street OTC
Chinese Hackers Defy Apple's New Security - US News
Homeland Security Today: McAfee’s Next Generation Firewall: An Integrated Approach To Government Security
Several Staples Stores Suffer Data Breach
Bugtraq: iFunBox Free v1.1 iOS - File Include Vulnerability
Bugtraq: File Manager v4.2.10 iOS - Code Execution Vulnerability
Preview redux: Microsoft ships new Windows 10 build with 7,000 changes • The Register
Pagers Shout Data Center Creds, Pop Star Airport Arrivals ≈ Packet Storm
Google Now Lets Your Prove Your Identity With A USB Security Key ≈ Packet Storm
Staples may be the latest target in string of credit card hacks - Business - The Boston Globe
Apple CEO Meets Chinese Vice Premier to Talk Information Security, Cooperation: Reports | Business | RIA Novosti
Apple CEO Tim Cook Meets with Top Chinese Official After iCloud Login Harvesting Claims - Mac Rumors
Employees Excited, Concerned About Wearables in the Workplace | CIO
ESET reveals Smart Security 8 and NOD32 Antivirus 8 | IT News Africa- Africa's Technology News Leader
Apple CEO Cook Meets With Top Chinese Official Amid Hacking Claims : Trending News : Auto World News
HP Delivers Threat Protection to Academic Institutions
Wearable Devices: Privacy, Security Worries Loom Large - InformationWeek
Python for Pentesters
Live chat today: Protecting your computer from viruses, hackers and scams |
Wind River Pattern Matching Engine Breaks New Ground To Address High-Performance Security For Growing NFV Needs - Intel Corporation (NASDAQ:INTC) | Benzinga
RetailNext Delivers In-Store Analytics Platform Release 5.1 to Brick-and-Mortar Retailers | Virtual-Strategy Magazine
Windows 0-day exploited in ongoing attacks, offers temporary workarounds
#CiscoChampion Radio S1|Ep 37. New Cloud Era, New Data Protection Model
Windows 10 release date | News | PC Pro
Target leaves breach behind this holiday season
Target Eyes Holiday Turnaround on Free Shipping, Faux Fur - Bloomberg
Target CEO leaves breach behind this holiday season
Apple CEO discusses security with top Chinese official amid hacking claims: Xinhua| Reuters
WebApp Sec: Re: unsubscribing from the list
Google Accounts Now Support Security Keys — Krebs on Security
Shelbyville Times-Gazette: Column: October is Cyber Security Awareness Month (10/22/14)
AVG Free Antivirus – Reliable, Sleek and Quick to Load - Ordoh
Cybersecurity Labor Shortage Hurting Battle Against Internet Attacks - Hartford Courant
WebApp Sec: unsubscribing from the list
OS X Yosemite Wi-Fi problems – can you help us solve them? | Naked Security
Mastercard and Cloudera in PCI pact - Computer Business Review
Grrcon 2014 - Around The World In 80 Cons (A Tale Of Perspectives)
PCI Compliance Under Scrutiny Following Big Data Breaches | CIO
Samsung Galaxy Note 4 tips
Attackers change home routers' DNS settings via malicious code injected in ads
Bugtraq: FreeBSD Security Advisory FreeBSD-SA-14:23.openssl
Securonix Appoints Former Bank of America Executive as Chief Scientist to Further Advance the Use of Machine Learning for Cyber and Insider Threat Detection
Symantec sees rise in high-traffic DDoS attacks | CSO Online
Industry can head off IoT privacy rules, former US official says | CSO Online
Woman charged with planting spyware on cop’s phone | Naked Security
Cloud security: Think you're blocking staff access to certain sites? Think again | ZDNet
Children To Be Taught Cyber Security Skills
Starr Launches Cyber Security & Privacy Risk Response on a Primary Basis
Finextra: Cloudera data management platform certified as PCI compliant
This Fake Log Jams Your Phone So You'll Shut Up and Enjoy Nature | WIRED
Latest Radio News, Talk Shows, Sports, Hosts, Personalities |
Insider Threats – how they affect US companies
Staples says investigating possible payment card data breach| Reuters
IPhones, iPads, Macs 'safe', but Apple Inc issues security iCloud warning - Financial Express
Apple Issues ICloud Security Warning - KMBZ
The Multiple Uses of Free Antivirus Programs - The Fuse Joplin
HP Delivers Security To Academic Institutions
Google unveils Security Key | Motherboard
Changing all links: JavaScript for Pentesters task 2 write up - SecureTheLock
6 Ways Big Data Improves Food Security
UN slams mass surveillance as ‘systematic interference’ with right to privacy - Enterprise - | - Ireland's Technology News Service
Staples Investigating Possible Data Breach | Sci-Tech Today
Staples Looking Into Possible Data Breach « CBS Boston
Local and Breaking News from The Modesto Bee in Modesto, CA |
More than 70 Hong Kong government websites 'under attack from Anonymous hackers' | South China Morning Post
Hungary plans to impose new tax on Internet traffic| Reuters
Is your phone line a ‘6-figure liability waiting to happen’? | Naked Security
Bricata Launches its ProAccel Next Generation Intrusion Prevention System in Commercial and Federal Markets
Encrypted channel monitoring: The evolution of privileged access management | Government Security News
Samsung Knox devices approved for classified US government use - IT News from
Staples (SPLS) Investigating Possible Data Breach | InvestorPlace
McAfee vernieuwt Next Generation Firewall | Productnieuws | Computable
Windows 10: Has Microsoft got it right? | Channel Pro
Preparing for Windows 10
Local news from Bellingham, Whatcom County, WA |
Free is good: No-cost Panda Software tops AV-Test's rankings of antivirus software | PC World India
Tsunami siren test next week | Scoop News
Bugtraq: FreeBSD Security Advisory FreeBSD-SA-14:20.rtsold
Bugtraq: FreeBSD Security Advisory FreeBSD-SA-14:21.routed
Cyber-espionage is more difficult to pin to a state than spying in the physical world
Information Security News: Why Data Breach at Staples May Not Matter
Information Security News: NOT OK GOOGLE: Android images can conceal code
Using technology to make your business more efficient: top tips | Guardian Small Business Network | Guardian Professional
China Attack Aims at Apple iCloud Storage Service | NDTV Gadgets
Tutus' Secure Smartphone, Farist Mobile, Approved by Spanish Security Agency
Computer misuse: Brits could face LIFE IN PRISON for serious hacking offences • The Register
Apple sees iCloud attacks; China hack reported - World | The Star Online
Watchdogs inundated by quango complaints -
Apple confirms iCloud under attack as security blog reports Chinese hack - Tech2
Today in the press - RTÉ News
Apple's iCloud believed attacked by Chinese government hackers - Technology & Science - CBC News
Grrcon 2014 - Infosec In The 21st Century
Latest local breaking news by The State Newspaper in Columbia, SC | The State
Staples May Be Latest Data Breach Victim | NECN
Apple iCloud 'hacked' in China - Telegraph
Apple Pay Goes Live, Experts Talk Benefits - Apple/Mac on Top Tech News
Staples hit by data breach, with customers in Northeast hit
Staples Probing Potential Credit-Card Data Breach | Data-Driven Marketing - Advertising Age
Outgoing GCHQ boss defends agency activities after Snowden revelations | UK news | The Guardian