Machine-Learning Maestro Michael Jordan on the Delusions of Big Data and Other Huge Engineering Efforts - IEEE Spectrum
Carders punch holes through Staples • The Register
Wi-Fi Security and Pentesting
Apple Pay Goes Live, Experts Talk Benefits - Mobile Tech on Top Tech News
Australian organisations lag in big data adoption | ZDNet
Mac OS X Yosemite sends search, location data to Apple, Microsoft - Security - News -
Review: Apple Pay in action | The Kansas City Star
Threat of the month: Passwords - SC Magazine
Launch of ‘hugely important’ Apple Pay limited for now in Omaha area - Money
China-backed hackers may have infiltrated Apple's iCloud: blog | Deccan Chronicle
Firm hosting numerous Vietnam newswires hit by hacking
On whose dime? Court rules California employers must pay employee cell phone expenses | Insights | DLA Piper Global Law Firm
Palo Alto Networks boxes spray firewall creds across the net • The Register
Shell is coming ...: IP-Knock Shellcode: Spoofed IP as authentication method
Microsoft gives peek at coming Windows 10 software
Windows 10 Features: Task View, Start Menu, Snap Assist and More [Updated] | Lifehacker UK
Chinese hackers may have have infiltrated Apple iCloud - IBNLive
China-backed hackers may have infiltrated Apple's iCloud: Report - The Economic Times
Microsoft Puts Up, Takes Down Windows 9 Sites | Digital Trends
Microsoft introduces Windows 10 |
Windows 10: Familiarity breeds contempt | ExtremeTech
Watch the Windows 10 presentation
5 reasons to upgrade to Microsoft Windows 10 : PERSONAL TECH : Tech Times
How to install Windows 10 Technical Preview on Oracle VirtualBox
Technology and Science News - ABC News
Quantum key security steps outside the box • The Register
Has your threat feed made you lazy
Internet Of Things Will Turn Networks Inside-Out - InformationWeek
U.S. Threatened To Fine Yahoo $250K A Day If It Didn't Release User Data | WBUR & NPR
Grrcon 2014 - Exercising With Threat Models
Error in Google Chrome after installing AVG Safe... | AVG
Banks: Credit Card Breach at Staples Stores — Krebs on Security
Is Apple Pay the next iRevolution? |
Apple's OS X Yosemite available now: Should you update? - CBS News
16-year-old Indian hacked Pakistan People’s Party site? - The Times of India
I will not submit to medical martial law; here’s why | Personal Liberty
Project Zero: Did the “Man With No Name” Feel Insecure?
In Oakland, A Sign of Some Very High Times | TechCrunch
Cloudera and Red Hat Forge Big Data Alliance - SD Times
Staples says investigating possible payment card data breach| Reuters
Jennifer Lawrence blasts Perez Hilton for posting nude photos - Celebrity Buzz
Can data breaches be stopped?
Executive Cyber Intelligence Report: October 15, 2014 - The State of Security
GCHQ spokesperson says cyber terrorism is "not a concern"
Keep OS X Yosemite from sending Spotlight data to Apple | Cult of Mac
Microsoft Security Essentials vs AVG – which provides better antivirus protection and security - The REM
PwC pinpoints Millennial generation as key to wearables adoption | ZDNet
BlackBerry Passport review: Good communicator if you can overlook flaws, price - The Times of India
BlackBerry Passport review: The passport for work : Reviews, News - India Today
Jennifer Lawrence blasts Perez Hilton for posting nude photos - Daily Dish Nigeria: Microsoft Committed to Data Privacy, Security Standards
Companies Hiring ‘White Hat’ Hackers To Expose Weaknesses « CBS Boston
China-backed hackers may have infiltrated Apple's iCloud: blog| Reuters
Survey: Nearly half of cardholders likely to avoid hacked retailers - News - WIN 98.5 Your Country - WNWN FM - Battle Creek, MI
Apple blows past revenue and earnings estimates - CBS News
BBC News - Paralysed man walks again after cell transplant
Record iPhone sales drive Apple's 3Q beat | The Miami Herald
Jennifer Lawrence Slams Perez Hilton’s Lame ‘Excuse’ for Removing Her Nude Pics | Mediaite
Researcher creates proof-of-concept worm for network-attached storage devices | PCWorld
WebApp Sec: Shameless plug: OWASP Board Elections
South Korean software app being tested at two McAllen schools - The Monitor: Local News
Windows OLE Package Manager SandWorm Exploit ≈ Packet Storm
Chinese Govt Launches MITM Attack Against iCloud ≈ Packet Storm
Techday – The next evolution in next-generation firewalls #WGImagine14
HP Data Protector EXEC_INTEGUTIL Remote Code Execution ≈ Packet Storm
Facebook Tells DEA To Stop Impersonating Users ≈ Packet Storm
Joomla Akeeba Kickstart Unserialize Remote Code Execution ≈ Packet Storm
Numara / BMC Track-It! FileStorageService Arbitrary File Upload ≈ Packet Storm
Celebrity hacking scandal: Google removes links to Jennifer Lawrence nude photos, but is the move effective? : PERSONAL TECH : Tech Times
Parkinson's Drugs Can Be A Gateway To Sin | NCPR News
Federal Officials Warn 500 Million Financial Records Hacked
Tips on Stopping Hackers From Targeting Phone Systems in Schemes to Steal Billions |
Google Tries, Fails To Remove Links To Jennifer Lawrence Nude Photos
Grrcon 2014 - Seeing Purple: Hybrid Security Teams For The Enterprise
WebApp Sec: CFP COMCOM, Elsevier: Special Issue on Security and Privacy in Unified Communications: Challenges and Solutions, Manuscript Due October 31, 2014
Beefing up cyber security in Ottawa | Ottawa & Region | News | Ottawa Sun
Staples confirms data breach investigation | CSO Online
Staples Investigates 'Potential Issue' Involving Credit Card Data
Eye Phone? Your Next Eye Exam Might Be Done With Your Phone | NCPR News
Demand up for ethical hackers who spot and patch up breaches, AsiaOne Digital News
Enterprises scaled down information security budgets by 17% in 2014: PwC - Livemint
Red Hat Security Advisory 2014-1671-01 ≈ Packet Storm
Debian Security Advisory 3054-1 ≈ Packet Storm
LiteCart Cross Site Scripting ≈ Packet Storm
Apple Security Advisory 2014-10-20-1 ≈ Packet Storm
Apple Security Advisory 2014-10-20-2 ≈ Packet Storm
Asterisk Project Security Advisory - AST-2014-011 ≈ Packet Storm
Documenting with dignity in the Ebola zone - The Washington Post
China-backed hackers may have infiltrated Apple's iCloud - Tech News | The Star Online
Better Business Bureau warns about Community Health Systems data breach |
Is the Chinese Government Hacking Every iPhone in the Country? -
Hackers may have infiltrated Apple's iCloud |
Driver mows down soldiers - Canada News -
VentureBeat Webinar: The Private Cloud Diaries or 4 reasons your company needs private clouds | VentureBeat | Cloud | by VentureBeat Staff
Global cloud security market to reach $8.71 billion by 2019 with CAGR 15.7% - WhaTech
Staples Latest Store To Suffer Credit Card Breach - Techaeris
Spike in Malware Attacks on Aging ATMs — Krebs on Security
DDoS is the new spam...and it's everyone's problem now - SC Magazine
HP Security Bulletin HPSBHF03084 2 ≈ Packet Storm
HP Security Bulletin HPSBMU03143 ≈ Packet Storm
HP Security Bulletin HPSBMU03144 ≈ Packet Storm
HP Security Bulletin HPSBST03131 ≈ Packet Storm
Debian Security Advisory 3050-1 ≈ Packet Storm
Apple OS X Yosemite contains bug fixes, Security Update also released - SC Magazine
Staples Investigates Potential Data Breach At Northeast Locations - Forbes
London Calling: Unannounced Police Visits to Legal U.K. Gun Owners Begin
Apple Pay launches today - Oct. 20, 2014
OptiFine HD A4 (FPS Boost, HD Textures, AA, AF and much more) - Minecraft Mods - Mapping and Modding - Minecraft Forum - Minecraft Forum
Technical analysis of the SandWorm Vulnerability (... - HP Enterprise Business Community
Making a business case is crucial to speed up the mainstream SDN adoption | CIOL
Phone hacking scheme used to finance Mumbai attack: NYT - News Oneindia
Sandworm Team Targeted SCADA Systems: Trend Micro | SecurityWeek.Com
Operation DeathClick Targets US Defense Sector - Infosecurity Magazine
McAfee next generation firewall helps enterprises more effectively fight cybercrime | Government Security News
Foreign internet-based phone hackers target businesses, Mumbai terror link emerges - Financial Express
BBC News - Why firms don't want you to be brilliant at your job
Virtualizing Data for Faster, Better Decisions| Cisco Services Perspectives
Derbycon 2014 - Introducing Network-Scout: Defending The Soft Center Of Your Network
FBI Director James Comey says Apple and Google go “too far” with default encryption | Naked Security
Big Data Giants Flex at Strata + Hadoop World
Hacker Halted 2014: Johnny Long - Infosecurity Magazine
Madison Louch helped police to catch the hacker of nude celeb pictures | Latest News | Breaking News UK and Newspaper content | Daily Star
Keep your private information safe from hackers |
What you missed in Big Data: Hadoop love fest in the Big Apple | SiliconANGLE
Human error to blame for recent hacks? - IOL SciTech |
Study Finds Nearly Half of Holiday Shoppers Will Avoid Breached Retailers - The State of Security
Android.Selfmite.B | Symantec
Op-ed: Measure D — a doctor’s perspective | Berkeleyside
Analysts Put Apple Pay To The Test - And It Works - Forbes
FBI Warns of Hacks By Moonlighting Foreign Agents - Bloomberg
Published for the First Time: a 1959 Essay by Isaac Asimov on Creativity | MIT Technology Review
Nigerian scammers take aim at business targets - Third Certainty
Will new commercial mobile encryption affect BYOD policy? -- FCW
Cloudera and Teradata Extend Partnership to Drive Big Data Analytics - insideBIGDATA
Hackers hit UConn, it’s all part of the program | FOX C
Grizzly bear's deadly attack - Canada News -
The fog of war can cloud both physical and digital battlefields - Infosecurity Magazine
Cybersecurity Stock Directory Update for National Cyber Security Awareness Month; Identity Theft - Fastest-growing Crime
Avoiding plastic during the holidays |
Apple profit up 20% as iPhone 6 sales soar - Business - CBC News
Officials warn 500 million financial records hacked
NDB Advisory Announces Expansion to Include South Carolina PCI QSA Services for Merchants and Service Providers | Virtual-Strategy Magazine
Florida Supreme Court rules warrants a must for real-time cell location tracking - SC Magazine
Phone hacking: Legal loophole allows police to hack into people's messages and emails - Mirror Online
Gartner Updates Magic Quadrant, Praises Kaltura, Panopto, Qumu - Streaming Media Magazine
‘Phone hacking scheme used to finance Mumbai attack’ - Mumbai Mirror
See Apple Pay Put to the Test at McDonald's - ABC News
Top 10 smartphones for business: Apple iPhone 6 – Part 3 | IT Business
Writing C in Cython « Computational Linguistics
Apple adds a few more security fixes in iOS 8.1 | ZDNet
Mac OS X Yosemite reportedly leaks location, search data | Ars Technica
Apple iOS8 and Yosemite: The latest privacy invasion - TechRepublic
Apple Pay mobile payments service to launch on Monday - CNE
Gartner: Smart Machines To Be Most Disruptive Trend | NewsFactor Network
How To Future-Proof A Business Discovering The Internet Of Things
4 Reasons Why You Should Shop at Stores That Got Hacked - 1
China is already spying on Apple iCloud users, watchdog claims • The Register
Bugtraq: APPLE-SA-2014-10-20-1 iOS 8.1
Bugtraq: LiteCart Security Advisory - Multiple XSS Vulnerabilities - CVE-2014-7183
OutSecure Inc. to host cyber security summit | Easton Courier
Hacker sentenced to 30 months in prison and $300k restitution - SC Magazine
Bugtraq: [security bulletin] HPSBMU03126 rev.2 - HP Operations Manager/Operations Agent, Remote Cross-site Scripting (XSS)
Bugtraq: AST-2014-011: Asterisk Susceptibility to POODLE Vulnerability
Phishing schemes: Don’t take the bait! -
Fake Dropbox login page nabs credentials, is hosted on Dropbox - SC Magazine
Class changer | Sandusky Register
MPs urged to decide whether to act over phone-hacking evidence | Media | The Guardian
Suspected Chinese government hackers behind new iCloud account attack | VentureBeat | Security | by Richard Byrne Reilly
Ebola In Church: A Reverend's Quarantine Spreads The Word | NCPR News
Japanese porn links found on official Connacht GAA site after reported hacking incident
Three Atlanta federal judges recuse themselves from Home Depot data breach lawsuits - Atlanta Business Chronicle
Emacs 24.4 released
Derbycon 2014 - Getting Windows To Play With Itself: A Pen Testers Guide To Windows Api Abuse
Progress on national breach notification law may stall - SC Magazine
Using 8 Backdoor Techniques, Attackers Steal Company Data - Security News - Trend Micro USA
Shoppers to Avoid Data Breach Stores Like Target (TGT) | InvestorPlace
Hacking Into Your Happy Chemicals: Dopamine, Serotonin, Endorphins and Oxytocin | Thai Nguyen
Is a $5 Billion Phone Hacking Scam Too Small to Nail for the FCC? | The Fiscal Times
Number of cancelled Australian passports doubled over last financial year: ASIO | SBS News
Bugtraq: [security bulletin] HPSBST03131 rev.1 - HP StoreOnce Backup Systems running Bash Shell, Remote Code Execution
Bugtraq: [security bulletin] HPSBST03129 rev.1 - HP StoreFabric B-series switches running Bash Shell, Remote Code Execution
JPMorgan Chase hackers missed fed gov't employee accounts - SC Magazine
Google updates piracy-fighting report - SC Magazine
More than 30 Government Technology Solution Providers Preview News before GTEC 2014 - Press Release - Digital Journal
Chinese Big Brother launches nationwide attack on iCloud | Computerworld
Apple Pay Goes Live, Experts Talk Benefits - E-Commerce on CIO Today
Ebola vaccine concern - Canada News -
INSIDE Secure Introduces VAULTiTRUST to Lower Adoption Barrier to Best-in-Class Security for Internet of Things (IoT) | Business Wire
Hackers have powers beyond most countries, expert says | TheHill
FYI: OS X Yosemite's Spotlight tells Apple EVERYTHING you're searching for • The Register
Tails 1.2 Released | SecTechno
XL Group Adds New Cyber & Technology Insurance Expertise
Combining cloud with disaster recovery and business continuity
Former RSA CISO named president and COO of White Ops - SC Magazine
Bugtraq: [security bulletin] HPSBHF03084 rev.2 - HP PCs with UEFI Firmware, Execution of Arbitrary Code
Bugtraq: [security bulletin] HPSBMU03143 rev.1 - HP Virtualization Performance Viewer, Bash Shell, Remote Code Execution
How to Stop Apple From Snooping on Your OS X Yosemite Searches | WIRED
Cybersecurity becomes a top priority after data breaches - The Globe and Mail
Will Apple Pay be the next iRevolution? |
AnandTech | Apple Releases iOS 8.1 With Bug Fixes and New Features
Phone Hacking Scheme Used to Finance Mumbai Attack: NYT -The New Indian Express
Cyber Risk Report: October 13-19, 2014
TD Bank to Pay $850,000, Improve Security To End State Attorneys General Breach Case | Bloomberg BNA
Bucket list baby: Worth the hackers, extra heartache?
Will Apple Pay be the next iRevolution? | New Straits Times
Chinese government launches cyber-attack on iCloud users | TG Daily
Digital Medicine? High-Tech Health Care On the Way - NBC News
Conn. to receive $180K as part of settlement in TD Bank data breach Republican American
Connecticut joins multi-state settlement with TD Bank over data breach | The Weston Forum
Despite business losses due to security breaches, Indian firms information security spending shrinks, says PwC report | Business Standard News
Dark Reading | Security | Protect The Business - Enable Access
5 Tech Stocks That Should Start Paying Dividends
Digital Defense Named a “Leader” in Gartner's Security Awareness Computer-Based Training Magic Quadrant - BWWGeeksWorld
Jonathan Bergknoff: Building good docker images
Derbycon 2014 - Protocol Me Maybe? How To Date Scada
Protecting Customer Data in Our Cloud through Microsoft Azure | Cyber Trust Blog
Hacker Myths Debunked
Hackers, Downtime, And Deathmobiles In The Age Of Io
Apple Pay Could Be Apple's Greatest Challenge at Disruption
VMware comes (almost) full circle with Horizon Flex - Labs - a blog from
Data Breach News: Pa. Server Hacked; Records Found Dumped |
TD Bank settles with NJ over data breach
Spotlight: Privacy Advocates Furious As Apple Feature Siphons Off Location Data of Yosemite And iOS 8 Users - Forbes
State part of settlement with TD Bank
Digital Defense web training program gets high marks from security industry - San Antonio Business Journal
Telefonica unveils Disaster Recovery as a Service offering - Telecompaper
FBI — Cyber Security: Task Force Takes ‘Whole Government’ Approach
Dropbox users targeted by phishing scam hosted on Dropbox | Symantec Connect
Juniper Networks sur Twitter : "This one goes out to all our test takers out there. Great work all."
Sandworm and SCADA -
China Launches Cyber Attack As New iPhones Arrive | Fast Company | Business + Innovation
China refutes new FBI hacking claims - SC Magazine UK
Nearly half of holiday shoppers won’t shop at breached retailers - MarketWatch
Facebook Inc (FB) Warns Its Users If Their Accounts Is At Risk Of Being Compromised By Hackers - Insider Monkey
Bad News for Target: Holiday Shoppers Plan to Skip Breached Retailers - Mic
AVG's Judith Bitterli - MEF Presentation - YouTube
IGIS: No Indiscriminate Interception of NZers’ Data Found | Scoop News
Apple launches Apple Pay mobile payment service - CBS News
CSID Study Finds Most Small Healthcare Facilities Unprepared for Data Breach - MarketWatch
China executes MITM attack against iCloud and Microsoft account holders
NSS Labs: Cyber Resilience
National Cyber Security Month - Trend Micro USA
Virginia Police Have Been Secretively Stockpiling Private Phone Records ≈ Packet Storm
The ASV Process Is Broken – Part 1
World's Top Privacy Experts Worry About Internet Of Things - Forbes
We the Police: the relationship between Tempe and its protectors | ASU News | The State Press | Arizona State University
Phone hacking scheme used to finance Mumbai attack: NYT -
Apple Pay launch marks strategic shift for Apple - Business - CBC News
World's Data Protection Leaders Highlight Internet of Things, Big Data Privacy R... | Bloomberg BNA
Virginia Police Have Been Secretively Stockpiling Private Phone Records | WIRED
Information Security News: Hackers strike defense companies through real-time ad bidding
How to enable Anti-Banner in Kaspersky Internet Security 2015
Whisper CTO trashes reports that it tracks even those users who turn off geolocation | Naked Security
Visual Voicemail Hack Makes Your Messages A Snack ≈ Packet Storm
Google Changes To Fight Piracy By Highlighting Legal Sites ≈ Packet Storm
Microsoft Pulls Second Patch Tuesday Update In Three Months ≈ Packet Storm
Australian Government, private sector face increased risk from foreign hackers: ASIO report - ABC News (Australian Broadcasting Corporation)
Madison Louch helps police set up sting on celebrity nude photo hacker | Daily Mail Online
Safari 8 browser on Yosemite shows major speed boost - CNE
Holiday shoppers say they'll avoid stores hit by data breaches |
China Phishing Apple for iCloud Information - Nationwide Attack
Digital Defense Named a “Leader” in Gartner’s Security Awareness Computer-Based Training Magic Quadrant | Virtual-Strategy Magazine
U.S. Fighter Says Kurdish Militia are Outgunned - NBC News
Cyber security spend by Indian firms down 17%: PwC - The Economic Times
Hackers make companies' phones call premium-rate numbers, cost them billions
Bugtraq: Re: LiveZilla Security Issue
Bugtraq: [SECURITY] [DSA 3050-1] iceweasel security update
China Has Reportedly Hacked Every iPhone User In The Country
China launches “Great Firewall” attack against iCloud - Cloud Tech News
Kaltura Positioned in the "Leaders" Quadrant of the 2014 Magic Quadrant for Enterprise Video Content Management
Model blackmailed over private pictures helped police sting to capture celeb iCloud hacker - Irish Mirror Online
Cost of Cybercrime in U.S. Reaches $12.7 Million per Organization - eSecurity Planet
The security challenges of BYOPC | CSO Online
Will You Avoid Data-Breached Retailers This Holiday Season? – Consumerist
Model blackmailed over private pictures helped police sting to capture celeb iCloud hacker - Mirror Online
Bruce Schneier: NSA would rather eavesdrop than negotiate for bulk data - FierceEnterpriseCommunications
Apple, IBM deal could reach 42M new users; iPad recovery on deck? | ZDNet
Families lose money because of children on the internet
Dropbox for iOS Updated with Touch ID Integration, iPhone 6 and 6 Plus Support - Mac Rumors
Derbycon 2014 - What To Expect When You're Expecting...A Pentest
Bill Murray named 2014 ISE® Luminary Leadership Award Winner
Facebook: Dear DEA, please don’t set up fake profiles to trap criminals | Naked Security
Disk scan stops at 27% after using AVG PC TuneUp | AVG
FTC pushes big data considerations at multi-government conference - FierceGovernmentI
Chinese government apparently phishing iCloud account info with man-in-the-middle attack | 9to5Mac
With Apple Pay, Tech Giant Bets Big on Mobile Payments - NBC News
Authorities allegedly spying on iCloud users in China | Cult of Mac
Hacking Russia's leaders and getting away with it
Holiday shoppers say they'll avoid Target, other stores hit by data breaches |
Phone Hacking Scheme Used to Finance Mumbai Attack: Report
More than 30 Government Technology Solution Providers Preview News before GTEC 2014 - BWWGeeksWorld
Information Security News: Hackers have broken into mainstream TV
Information Security News: Sino-US cyber talks at impasse
Bugtraq: Elastix Multiple vulnerabilities (Remote Command Execution, XSS, CSRF)
KB Parallels: How can I install and activate Kaspersky Internet Security for Mac in Parallels Desktop 10?
OS X Yosemite comes with POODLE and Shellshock patches
Kaspersky Lab to Host Second Annual Government Cybersecurity Forum in Washington D.C. | Kaspersky Lab US
Kaspersky Multi-Device Security | Multi-Platform Security | Kaspersky Lab TR
Tech industry on the offensive against government | ZDNet
Phishing Scams & Identity Theft Protection – Don’t be that Guy – Trend Micro
Man Heads to Jail for Hacking Neighbor's Internet, Posting Bomb Threat | NBC 10 Philadelphia
Shellshock: How to protect yourself [UPDATED] |
Phone hacking scheme used to finance Mumbai attack: NY
Frost & Sullivan Recognizes Fortinet for Global Cyber Threat Analysis and Reporting, and Managed Security Service Provider Market Leadership
Apple iPhone 6 India launch | The Indian Express
MOSX Tumblelog - Please don’t make us use iCloud anymore
Int'l cyber security conference opens in Brunei - Xinhua |
China says no plans to restart cyber-security talks with US - E & T Magazine
Court Sets Trial Date For Global Digital Solutions' (GDSI) Lawsuit Against Merriellyn Kett Murphy, former CEO and Sole Shareholder of Airtronic USA | Virtual-Strategy Magazine
Facebook is scouring the Web for hacked passwords. Here's why : PERSONAL TECH : Tech Times
Big Data for Finance - Security and Regulatory Compliance Considerations - insideBIGDATA
Gartner: Smart Machines To Be Most Disruptive Trend - Big Data on Top Tech News
Network Security Vendors Update Firewall Portfolios
Dell Debuts SuperMassive 9800 Next-Gen Firewall - Press Releases on CIO Today
Dell Debuts SuperMassive 9800 Next-Gen Firewall - Press Releases on Top Tech News
What Is 'Personalized Learning'? Educators Seek Clarity - Education Week
Facebook takes its user protection up a notch by actively seeking password leaks - T4
Facebook scours the web for personal information to keep hackers out | Daily Mail Online
UBM Tech | More than 30 Government Technology Solution Providers Preview News before GTEC 2014
Survey: Past data breaches could hurt hacked retailers during holidays | Retail Dive
Jacaranda FM Mobi site - Relax, Ebola's not going to cause 'World War Z'
Four online romance scammers jailed – don’t get sucked in to Advance Fee Fraud! | Naked Security
Police use loophole to hack phones and email | The Times
With Apple Pay, tech giant bets big on mobile payments
Apple’s OS X Yosemite: 7 new enterprise features - Enterprise Apps Tech News
CNBC Exclusive: CNBC Transcript: Microsoft CEO Satya Nadella Sits Down with CNBC's Jon Fortt
British police using legal loophole to hack into voicemails and texts - News - News - Voice of Russia UK, Voice of Russia - UK Edition
Career planning: Where do old devs go to? - Ayende @ Rahien
Facebook trawls through paste sites for compromised credentials
President Obama's Credit Card Declined At Restaurant
HP Delivers Threat Protection to Academic Institutions
McAfee presenta la versión más avanzada de McAfee Next Generation Firewall | DEFENSA PERIMETRAL | CSO España
Regaining Control of Security Complexity| Cisco Services Perspectives
Dutch gov't to take on hackers in 2015 debate - NL Times
Past data breaches could hurt hacked retailers at the holidays | Retail Dive
HP Delivers Threat Protection to Academic Institutions - MarketWatch
China may be hacking every iPhone user in the country – Quartz
Half of Americans likely to avoid retailers affected by data breaches for holiday shopping -
Sophos to offshore American support operations • The Register
Derbycon 2014 - Closing Ceremonies
How to integrate BYOD into a small business | News | TechRadar
Are data breaches creating better consumers? - The Washington Post
MobileIron Inc.: MobileIron and FireEye Join Forces To Proactively Secure Mobile Devices Against Emerging Threats And Malicious Apps
Virender Sehwag paid birthday tribute to by Sophos Antivirus - Latest Cricket News, Articles & Videos at
Piccolo, the tiny CNC-bot
Apple issues security update for OS X Mavericks -
Dell Introduces SuperMassive 9800 Next-Generation Firewall to Bring Powerful Enterprise-Level Security to Organisations of All Sizes - Media Releases - CSO | The Resource for Data Security Executives
Twitter 'news' spreads faster than Ebola #FakeCures #Malware • The Register
Obama signs Executive Order to bolster federal credit card security | CSO Online
Dropbox used for Phishing expedition | CSO Online
Pohatcong Township police responses up at Wal-Mart |
Rank Group invests in payment security - Essential Retail
Malware don't need Coffee: CVE-2014-0556 (Adobe Flash Player) integrating Exploit Kits
Information Security Management Systems seminar next month - News -
Yahoo Faced Daily Fines For Not handing Over User Data To The NSA - Technology News - redOrbit
If Ebola arrived in Canada - Canada News -
Surrendering our rights for whose convenience? - Decatur Daily: Editorials
Video: FBI warns technology companies of China-affiliated hackers - Telegraph
China again blames US for disrupted cybersecurity talks | CSO Online
Grim RIPA takes scythe to confidentiality | Feature | Law Society Gazette
H&S laws 40th anniversary: 'Nanny State' or workers' saviour? | Central - ITV News
TechCrunch Disrupt Europe 2014: News, photos and the Startup Battlefield LIVE |
An Analysis of A Windows Kernel-Mode Vulnerability (CVE-2014-4113) | Security Intelligence Blog | Trend Micro
Restore or remove file from the Virus Vault | AVG
Week in review: POODLE bug, Microsoft patches a slew of 0-days exploited in the wild
Privilege Escalation via DLL Hijacking
Monday review – the hot 19 stories of the week | Naked Security
JP Morgan Hackers Strike Again, Hit Fidelity Investments - Network Security on Top Tech News
Survey: Breached Businesses May Lose Holiday Shoppers
Derbycon 2014 - Open Source Threat Intelligence: Developing A Threat Intelligence Program Using Open Source Tools And Public Sources
Hillsborough schools begin teaching kids to cope with life online |, The Tampa Tribune and The Tampa Times
Can Apple Pay Thwart the Credit Card Hacking Trend? (AAPL)
Dell introduces SuperMassive 9800 next-generation firewall | IT-Online
Infographic: A brief history of malware
The Software Assurance Marketplace: A response to a challenging problem
Visual voicemail hack makes your messages a hack snack • The Register
Etisalat signs disaster recovery deal with Dubai Smart Govt - Telecompaper
IE 11 FULL RCE on Windows X on Vimeo
Will Apple Pay Be the Next iRevolution? - Apple/Mac on Top Tech News
Microsoft pulls another dodgy patch • The Register
Dell Debuts SuperMassive 9800 Next-Gen Firewall | NewsFactor Network
Delhiites queue up at midnight as iPhone 6, iPhone 6 Plus come to India - Financial Express
Int'l cyber security conference opens in Brunei | Shanghai Daily
'LulzSec leader Aush0k' found to be naughty boy not worthy of jail • The Register
Boot up: unfair big data, 10 security laws, Siri as a friend, Whisper investigated | Technology |
NYU News : NYU hosts 24-hour hacking marathon
Techcrunch Disrupt in London: City’s rising tech talent is the star of the show | City A.M.
Gartner: Smart Machines To Be Most Disruptive Trend - Tech Trends on Top Tech News
Secure Email and Cloud Alternatives to Gmail and Dropbox - TechSpot
Mr. Abhaxas sur Twitter : "go home twitter, you're drunk. i'll accept my bugbounty via bitcoin thx"
Inside Secure Introduces VAULTiTRUST to Lower Adoption Barrier to Best-in-Class Security for Internet of Things (IoT)
Marc Andreessen on Why Optimism Is Safest Bet -- NYMag
Derbycon 2014 -Once Upon A Time... (Infosec History 101)
Aussie satisfaction in big data lags behind global results: Accenture - CMO Australia
Big Data = Big Challenges
Gartner: Smart Machines To Be Most Disruptive Trend - Cloud Computing on Top Tech News
Changing rainfall global issue - Canada News -
Half of Holiday Shoppers Say They'll Avoid Stores That Got Hacked, Survey Finds
Stores bitten by data breaches may see shy shoppers, survey finds - Chicago Tribune
Celebrity nude photo leak: Model helps cops - Emirates 24/7
84% Of Enterprises See Big Data Analytics Changing Their Industries' Competitive Landscapes In The Next Year - Forbes
Oz privacy comish says breaches could double this year • The Register
Haskell Is Exceptionally Unsafe | Existential Type
Goodbye wallet, hello iPhone? Apple big Pay-day
Interview: Editor-at-large of Techcrunch Mike Butcher | City A.M.
New gadgets are nice, but Apple Pay is bigger deal
Avast Antivirus 2014 download vs Avira Antivirus update for iOS, Android and Windows Phone 8.1 - The REM
EM Nerd: Unclog the "Clogged Pipes" Model
Documenting with dignity in the Ebola zone |
Metadata: Facebook's software architecture
Identifying and Preventing Insider Threats - The State of Security
Symantec Canada Honey Stick Project 2014 - YouTube
UGA cancels Liberian journalist’s appearance out of Ebola concern | Political Insider blog
Media Release: Dell Introduces SuperMassive 9800 Next-Generation Firewall to Bring Powerful Enterprise-Level Security to Organisations of All Sizes
Derbycon 2014 - Hacking Mainframes; Vulnerabilities In Applications Exposed Over Tn3270
Demand up for ethical hackers who spot and patch up breaches
Social News 20/10 - News VietNamNet
Snowden Accuses Kiwi Government of Mass Surveillance Program - Infosecurity Magazine
FIRST standards to clean up messy CERTs • The Register
BBB: How to avoid cyber security issues |
Will Apple Pay Be the Next iRevolution? - Mobile Tech on CIO Today
A sinking sense of 'security' | TribLIVE
Customers wonder how to protect their data and money after recent data hacks
Like Jennifer Lawrence’s naked photo leak, the Snappening is another example of why we shouldn't trust cloud services - 14 Oct 2014 - Computing Analysis
Ultimate answer to card hacking is more vigilance - Your Houston News: Opinion
The Chromecast continues to be perhaps the best value in tech | writing about tech
Model helps police set up sting operation on celebrity nude photo hacker who told her to pay $900 or have her naked body exposed to the world | Daily Mail Online
Infographic: a brief history of malware
Access Bank gets ISO 22301 Business Continuity Mgt Systems Certification - The Sun News
Holiday season may increase your risk of identity theft
Apple patches security issues in OS X Mavericks - Software - News -
Derbycon 2014 - Single Chip Microcontrollers: Beyond Arduino
Amanda institutes new cellphone policy
Disabled Russian ship secured - Canada News -
School systems work to develop cyber security curriculum | The Augusta Chronicle
Local News | Columbus Ledger Enquirer
Apple Pay Is it the iPhone 6 game-changer?
Data Visualization with JavaScript
Build systems with cyber security from ground up
Firms urged to crack down on mobile app security- 15 Sep 2014 - CRN UK News
Hackers have broken into mainstream TV
As vendors split and jettison, can Microsoft avoid the same fate? | ZDNet
Quiet 'whiz kid' became public face of Ebola fight | The Miami Herald
Lupe Fiasco "Tetsuo & Youth" Release Date; Hackers Claim Responsibility | Get The Latest Hip Hop News, Rap News & Hip Hop Album Sales | HipHop DX
Protecting Your Privacy – A Key to Online Security -
FBI director demands access to private cell phone data - CNE
Windows 10: Aiming for More Business Users - Operating Systems on CIO Today
Encrypted channel monitoring: The evolution of privileged access management | Government Security News
Trudeau: cuts could be reversed - Canada News -
Russian man: not guilty to new hacking charges | The Salt Lake Tribune
FBI warns of Chinese state-sponsored hackers, 16 October 2014
Derbycon 2014 - Building Better Botnets With Ipv6
Review: Mac OS X Yosemite - Canadian Reviewer - News, Reviews and Opinion with a Canadian Perspective
Kelly Brook poses in a skimpy bikini on Mexican getaway with David McIntosh... as pictures emerge of her dining with mystery man in LA last week | Daily Mail Online
Macminicolo Blog (A look at the 2014 Mac mini)
Government info security news, training, education - GovInfoSecurity
Cloud, big data propel bank CISOs into the boardroom - Security -
V3 Security Summit: Majority of apps would fail basic security tests - IT News from
Adobe Reader update now more secure than ever available for download - The REM
Konloch/bytecode-viewer · GitHub
Dune-themed bug lets Russian hackers target NATO, Ukraine: iSight
Scammers exploit Ebola virus to spread malwares | SecTechno
What to Consider When Buying a Smart Device - Security News - Trend Micro USA
[Lollipop Feature Spotlight] WebView Is Now Unbundled From Android And Free To Auto-Update From Google Play
Nude photos of Britain's Got Talent winner George Sampson 'leaked online by Snapchat hackers' - Manchester Evening News
Derbycon 2014 - Bad Advice - Unintended Consequences And Broken Paradigms. Think &Amp;&Amp; Act Different!
China blames US for difficulty in resuming cyber security talks | World | The Malay Mail Online
pci 1x to 16x adapter to use a second graphics card [Solved] - Graphics Cards - Graphics & Displays
Vermont to get $83,000 for TD Bank data breach | Vermont Business Magazine
BYOD & COPE: How the Philippines government manages enterprise mobility and why
China says it's hard to resume cyber security talks with US
Obama announces plan to tighten card security
BackBox 4.0 Released | SecTechno
Superconducting circuits, simplified | MIT News
Derbycon 2014 -Simple Network Management Pwnd
China says US must change 'mistaken policies' before deal on cyber security | World news |
Facebook scouring leaked credentials, postings to help stolen ID victims : PERSONAL TECH : Tech Times
Which size Apple device is right for you? - CNE
China says it's hard to resume cyber security talks with U.S. | Reuters
Infected Flight Wins The Disrupt Europe 2014 Hackathon Grand Prize, Appilepsy And Seeusoon Are Runners Up | TechCrunch
Midnight Hacking in the Dungeon | Disrupt EU Hackathon - TechCrunch Hackathon | TechCrunch TV
FacebookLinkedInMidnight Hacking in the Dungeon | Disrupt EU HackathonHere in London,... - News - Seattle Sports Nut
OpenSSL Released a fix to four vulnerabilities | SecTechno
Apple's new tablets, iMac impress, but analysts say Apple Pay is more important strategic move - Daily Journal
My First Keyboard Build. | Stuff Dave Does
Derbycon 2014 - Analyzing Weak Areas Of The Federal Cloud Security Program
Data breaches threaten to shake consumer confidence - Eagle-Tribune: New Hampshire
The US government's wireless-spectrum auction: Why it matters (FAQ) - CNE
Beware of Online Ad Attacks : Trending : Hallels
After Massive Data Breaches, Businesses Move to Make ID More Personal - ABC News
Humble spud poised to launch a world food revolution | Science | The Observer
Why Free Antivirus Programs are Important
‘FNBO Account Application’ is nothing but a zipped Malware | SecTechno
Roll up your sleeves, we may need to fork Debian.
Business - Shared Disaster Recovery Site launched by DSG and etisalat
Global Industrial Control Systems (ICS) Security Market To See 8.0% CAGR to 2018 Says a Research Report Available at
Derbycon 2014 - Proactive Application Security
McAfee Next generation firewall empowers enterprises to more effectively fight cybercrime with expanded threat defense ecosystem - Zawya
Centrify Enables Expanding Enterprise Adoption of Macs With Day One Support of New Mac OS X Operating System
Apple Pay: Revolutionary but won't come to India anytime soon - Firstbiz
Apple Pay Is Here: Everything You Need To Know : Trending : Hallels
Hot Model Extorted in Celebrity Hacking Scandal |
GM’s hit and run: How a lawyer, mechanic, and engineer blew open the worst auto scandal in history | PandoDaily
Social News 19/10 - News VietNamNet
Disney rendered its new animated film on a 55,000-core supercomputer
Cyber hassle: Data breaches cause headaches for area banks and businesses : Business
Field office for disaster recovery set up following 3 disasters in northeast Nebraska closed
Derbycon 2014 - Chicken Of The Apt: Understanding Targeted Attackers With Incubation!
Hackers shake confidence in free software idealism of the 1980s - Business - The Buffalo News
Will Apple Pay be the next iRevolution?
Obama’s under-used credit card declined in NY cafe - Nation - The Boston Globe
"Why Does S Look Like F?": A Guide to Reading Very Old Books—Blog—The Appendix
Thinking Functionally with Haskell: Richard Bird: 9781107087200: Books
Lumberton superintendent urges parental involvement
NSA Forced Yahoo To Supply User Info or Pay Big Fines | NewsFactor Network
Dyersburg State Gazette: Local News: Dairy Queen addresses recent data breach (10/18/14)
Filtered: NMAP Port Scanner Sees Through IPtables Firewall | Diary Products - Hannes Schmidt
Derbycon 2014 -Bending And Twisting Networks
Pres. Obama wants increased debit, credit card security after breaches
Ebola Scare Turns Dallas Hospital Into a 'Ghost Town' - ABC News
Websense Strengthens MENA Distribution Channel with StarLink - Zawya
Phone hacking: MPs challenge prosecutors on evidence in Murdoch case - Crime - UK - The Independent
That’s me in the picture: Kevin Berthia on the Golden Gate bridge | Art and design | The Guardian
Ask Deemable Tech: Can Macs Get Viruses? | WJCT NEWS
Maine, states settle TD Bank data breach - Washington Times
Targeted attack protection via network topology alteration
Editorial: A friendlier Apple Inc now invites media through its Infinite Loop front door
Claire Trevett: Gamemakers wreak havoc but leaders battle on - National - NZ Herald News
Doctors Tell All—and It’s Bad - Meghan O'Rourke - The Atlantic
Learn How to Transform your Network with Cisco Innovations at MEF GEN14!!
Derbycon 2014 - The Achilles Heel Of The American Banking System
Facebook can tell you if your password was stolen
Field office for disaster recovery set up following 3 disasters in northeast Nebraska closed - Daily Journal
Hugh Grant writes himself off | Burton Mail
Hugh Grant reveals face pinning (From Daily Echo)
Hugh Grant on Hollywood, hacking and celebrity | The Indian Express
XNG: GIFs, but better, and also magical | Clean Rinse
YouTube Ads Lead To Exploit Kits, Hit US Victims | Security Intelligence Blog | Trend Micro
Yahoo Faced $250k/day Fine If They Didn’t Comply With Government Requests
PressTV - It’s hypocrite of US to warn of China hacking plot: Analyst
Building the Largest Ship In the World, South Korea | The Blog of Photographer Alastair Philip Wiper
Snapchat Hack Not A Hoax, Says 'Snappening' Chronicler - Forbes
OS X Yosemite tips and tricks: See what your Mac can do now - Pocket-lint
Dropbox hacked, login details dumped online? No, says Dropbox : PERSONAL TECH : Tech Times
Will Apple Pay Be the Next iRevolution? - Mobile Apps on Top Tech News
Vector, the Journal of the British APL Association
Derbycon 2014 - It's Not Easy Being Purple
Local News |
Experts: Ebola Suits Can Keep Wearers Safe | Sci-Tech Today
'Am I being catfished?' An author confronts her number one online critic | Books | The Guardian
AVG vs Kaspersky vs Norton Antivirus– Which Program can be entrusted with your device’s security? - The REM
Facebook slurps 'paste sites' for STOLEN passwords, sprinkles on hash and salt • The Register
Post facto, Obama acts to protect U.S. financial sector after devastating attacks | VentureBeat | News Briefs | by Richard Byrne Reilly
Holyrood powers - East Lothian News
Shared disaster recovery site is secure data environment for government entities | The National
Everything You Need to Know About Cooking with Blood
Derbycon 2014 - Control Flow Graph Based Virus Scanning
DB-Engines Ranking - popularity ranking of database management systems
Cloud Architecture 101: Scalability DON’TS | Celingest Blog – Feel the Cloud
10 courses to learn Amazon Web Services with Cloud Academy
Confused by cloud computing price comparisons? Here they are in one easy-peasy chart — Tech News and Analysis
How we increased our EC2 event throughput by 50%, for free « Swrve Engineering
Dyre Trojan Takes Aim at Bitcoin Sites, Adobe Vulnerability Leveraged - Softpedia
RIG Exploit Kit Dropping CryptoWall 2.0 « Featured « ThreatTrack Security Labs Blog
Obama credit card declined: Does he need to get out more? (+video) -
Obama offers plan to tighten card security - Business
Scam: Computer Hackers Claiming to be Law Enforcement
History of Octave Discovery
Symantec Named a Leader in Enterprise Mobile Management | Symantec Connect
Convergence In The Internet Of Things Is Priming The Tech World For A Major Cultural Shift | TechCrunch
Kickstarter Suspends Anonabox Security Appliance Project
David Walliams settled phone-hacking damages claim | Western Daily Press
Dataguise Announces Security Solution for Hadoop in the Cloud - insideBIGDATA
President Obama Executive Order for Microchips in Government Credit Cards | Viral Global News
Obama: My Credit Card Was Declined - The Daily Beast
How many packs to get a full collection?
Hackers: they're 'superheroes' that 'change the world' (Wired UK)
Security and the Internet of Everything
Apple pushes users to adopt Yosemite
Apple Pay Launch: Why Retailers Will Love Apple's Payment System - Businessweek
Apple Patches POODLE, Pushes Yosemite Upgrade
Dell broadens SuperMassive next-gen firewall product with 9800 model | eChannelLine
New products in hand, Apple tries to reignite interest in iPad - The Times of India
/dev/dump: Your language sucks...
Derbycon 2014 - Ok - So You've Been Pwned - Now What?
“Oops! I’m sorry about that” – 60 Sec Security [VIDEO] | Naked Security
US Government Fines Intel's Wind River Over Crypto Exports ≈ Packet Storm
Hacked: The Six Most Common Ways Non-Tech People Fall Victim ≈ Packet Storm
Microsoft Withdraws Another Buggy Update ≈ Packet Storm
Kickstarter Kicks Out Controversial Anonabox ≈ Packet Storm
Review: Bitcoin 'Vault' Trezor Lives Up to its Name
Exclusive: NSA reviewing deal between official, ex-spy agency head| Reuters
Campaign Details ¦ Stop Think Connect
Dell Debuts SuperMassive 9800 Next-Gen Firewall | NewsFactor Business
Nicholas Manousos
Operating Partner, DFJ
Derbycon 2014 - Everybody Gets Clickjacked: Hard Knock Lessons On Bug Bounties
Apple Pay looks to cash in on consumer concerns - Newsday
Privacy in the Internet of Things Era
Here's what hackers do with your data - The Times of India
Supervalu still getting a handle on summer data breach -
Sony Xperia Z3 Compact review: small size, big deal
C O U N T E R V I E W: Congress' "cyber war" dream collapsing in Sonia Gandhi adviser Ahmed Patel's home turf, Gujarat
Dell launches new SuperMassive NGFW - from
Don’t worry about getting hacked. Worry about getting socially engineered. - The Washington Post
Secure Your PC And Clear The Clutter With The Best Free Antivirus Software
Are POODLE Security Fears Barking Up the Wrong Tree? - Computing on Top Tech News
Are POODLE Security Fears Barking Up the Wrong Tree? - Data Security on CIO Today
Latest breaking news from Hilton Head & Beaufort, SC | The Island Packet
Gartner: Smart Machines To Be Most Disruptive Trend | Sci-Tech Today
It can happen to anyone: Obama's credit card declined
AVG Cloud Partner Summit: 5 Things MSPs Need to Know | Events content from MSPmentor
Avira Launches 2015 Antivirus Security Software Line | Business Wire
Hackers strike defense companies through real-time ad bidding | CSO Online
SSLsplit - transparent and scalable SSL/TLS interception (SSLsplit)
Derbycon 2014 - Are You A Beefeater , Focused On Protecting Your Crown Jewels?
Merced community news from Merced Sun-Star in Merced, CA |
POODLE vulnerability hastens the death of SSL 3.0 - TechRepublic