BREXIT – Data protection: how medical researchers persuaded the European Parliament to compromise
Cass Patented BYOD Payment Solution Expands Globally -
Blackberry Priv hits Australia - PC & Tech Authority
200 BlackBerry Layoffs For Employees In Waterloo And Florida – TechMalak
Webinar Highlights Secure Enterprise Application Access | NewsFactor Network
Gartner Defines Benefits of Software-Defined Perimeter Around Enabling Business Agility in Upcoming Webinar - EIN News
NOVA: Memory Hackers | KPBS
Spartan Hackers put computer science skills to the test | The State News
Analysts Consensus For Sophos Group (LON:SOPH)
Sanders aims for big win in New Hampshire |
The Sas 2015 - Malware In The Industrial World
Identity thieves obtain 100,000 electronic filing PINs from IRS system | PCWorld
Missoula school student data breach included alumni records | The Olympian
Cyber security and mining in the age of automation | Mining Australia
20 Cybersecurity Terms Everyone Should Know | TechWeekEurope UK
8 Things to Look For in the 2017 IT Budget -
Spike in tourist deaths sparks ministry concern | Bangkok Post: business
Nikon releases ViewNX-i version 1.1.0a for Windows
MIS-Asia - Rethinking data protection
State orders city to provide 'around-the-clock' security for homeless shelters | POLITICO
Don't give fraudsters a hand filing a fake tax return
White House Requests $1.8 Billion to Fight Zika Virus Video - ABC News
New Potter play coming out in book form | FOX23
FBI launches website to stop online terror recruitment amid criticism | Minnesota Public Radio News
The global threats that keep the CIA up at night | PBS NewsHour
Back to cybersecurity basics - Post and Courier
Corruption Currents: Kenyan Athletes Allege Bribery - Risk & Compliance - WSJ
Missing airman has ties to East Texas - KWES NewsWest 9 / Midland, Odessa, Big Spring, TX: |
Maria Vergelis - Securelist
Fairfax: Providence Elementary Presents Progress Report
Manufacturers courted with Internet of Things cloud options
Hackers stole 101,000 taxpayers' logins/passwords from the IRS / Boing Boing
This Is How The Power Grid Can Be Hacked Through Home Air Conditioners » TechWorm
IRS reports a hacking attack - Houston Chronicle
Cisco Systems (CSCO) Charles H. Robbins on Q2 2016 Results - Earnings Call Transcript | Seeking Alpha
NBA hacking tactics becoming a growing issue
Chinese companies want to buy Opera for $1.2 billion
Chinese group bids $1.2 billion for Opera Software - MarketWatch
What 2 southern Walmarts say about crime in America | The Sun News
Our Favorite Internet-of-Things Stocks for 2016 - San Antonio Express-News
How to ensure VPN security in a BYOD environment
61% of Merchants Still Store Unencrypted Payment Card Data
Identity thieves breach IRS with stolen Social Security numbers | TheHill
Identity thieves obtain 100,000 electronic filing PINs from IRS system | Computerworld
Intel chiefs find bright spots amid serious risks to US security -
D.C. would get critical funding, budget autonomy in federal budget - Washington Times
Senate passes bill to hit North Korea with harsher sanctions
The Latest: 2 deputies wounded, suspect killed in shootout | WJAX-TV
Obama unveils $5.7 trillion election-shaping US Budget, United States News & Top Stories - The Straits Times
North Korea Sanctions Pass US Senate
Senate Passes North Korea Sanctions Legislation -
U.S. Senate Passes North Korea Sanctions Legislation - WSJ
Internet of Things Devices: Intelligence-Gathering Opportunity?
School Report Card: Frankfort CUSD 168 - WSIL-TV 3 Southern Illinois
Google strengthens online security, rolls out new features - The Economic Times
Tech Companies Looking To Eliminate Passwords |
Application and security trends changing the IT landscape in 2016 |
Hackers could crash electricity grids and cause massive blackouts using this terrifyingly simple trick - Mirror Online
AC Units Can Be Hacked To Create Power Grid Failure | Digital Trends
Hackers are trying to steal our tax refunds -- again - CNE
IRS Hack Affects 101,000 Tax Returns - Infosecurity Magazine
Black lawmakers sprint to Clinton's aid | TheHill
Vetr Inc. Upgrades Palo Alto Networks Inc (PANW) to Strong-Buy - The Vista Voice
Best US Cellular phones of 2016
Symantec warns of malware hidden in Hearthstone cheat programs | SiliconANGLE
Pro-Palestine hacktivist makes good on threat, posts data on FBI and DHS personnel - SC Magazine UK
Hellgate High data breach included records of former, deceased students | Local |
Banks Seek $20M In Atty Fees After Target Data Breach Deal - Law360
Android SMS Stealer Masquerades as Fake AliPay Security App - Infosecurity Magazine
Cisco second-quarter earnings
2017 Nissan Armada prepares to Patrol the US
Spike in tourist deaths sparks ministry concern | Bangkok Post: news
LibreOffice 5.1 released with redesigned user interface | InfoWorld
Fireglass Emerges From Stealth with a Military-Grade, Enterprise-Ready Threat Isolation Platform to... -- NEW YORK, Feb. 10, 2016 /PRNewswire/ --
Fast Data Will Revolutionize Cybersecurity in 2016
Security experts share tips on how to stay safe on the subway |
Why and How to Update Your Adobe Flash Player | TNH Online
Obama Administration Plans New High-Level Cyber Official - Network Security on CIO Today
Washington fears a return to the Cold War with Russia | The Siver Times
South Korea retaliates for North Korea's rocket test -
Top intel official confirms ISIS made, used chemical weapons | Fox News
The Odd Couple: ACLU, Tenth Amendment Center Take on Student Data Privacy
IoT and Privacy: Keeping Secrets from your Webcam - McAfee
Cass Offers Patented Solution for BYOD Payments in Europe
Vapor Services Proud to Announce the Release of Its New eFolder Product | Benzinga
Top Considerations When Building BYOD Policies | Kroll Ontrack Inc. - JDSupra
IoT heading towards serious security issues, says expert » Digital By Default News
Hexadite lands $8M from H-P and others amid string of cybersecurity investments | BetaBoston
Logi Analytics Placed as a Visionary in 2016 Gartner Magic Quadrant for BI & Analytics Platforms - EIN News
Report: Hackers Targeting ATMs Via Phone, Internet Jacks | News & Opinion |
IRS successfully thwarted hack attempt (this time) - SlashGear
Ex-FBI official: IRS is a favorite hacking target
NSA plans to merge offensive, defensive hacking operations | Nation |
NSA Reorganizes, Combines Cyberdefense and Offensive Hacking
Chinese companies are betting on boring apps to expand abroad - Quartz
Chinese companies make offer to acquire Opera Software - gHacks Tech News
Feds Investigate FBI, DHS Alleged Data Breach
Illinois couple blames McBride, Lock for data breach | Madison County Record
Is The Cybersecurity Bubble About To Burst? - Dark Reading
Startup Spotlight: Vectra Networks' Threat Detection - eSecurity Planet
Cisco beats profit estimates, adds $15 billion to buyback | Reuters
Red Lobster enjoys sales surge after mention in Beyonce song | WJAX-TV
New, improved DMA Locker ransomware patches decryption flaw - SC Magazine
Wendy's finds malware at some locations - SC Magazine
Our Favorite Internet-of-Things Stocks for 2016 -- The Motley Fool
Protecting Compliance in the Public Cloud -
Arrest made after fire service staff data breach (From South Wales Argus)
Survey: 65% of Businesses Expect to Suffer an Information Security Breach - Security Sales and Integration
How updating your Mac's apps could allow man-in-the-middle attacks | Macworld
Obama Budget Calls for Increased Cybersecurity Funding, New High-Level Post
DNI: China continues cyber espionage – Asia Times
The Latest: FBI chief says encryption blocks investigations |
New Encryption Bill Could Stop States From Getting a Backdoor Into Your Smartphone - ABC News
Nato to draw new strategies to combat security threats - Army Technology
Landmark Cybersecurity Proposals from White House on Workforce Development and Privacy - McAfee
Securosis Blog |
Securosis Blog | Securing Hadoop: Operational Security Issues
Inside the Beltway: Reckless, irresponsible: The 2017 budget reviews are in - Washington Times
Hearthstone gamers who download cheats may be cursed with malware - SC Magazine
The Phishie Awards: (Dis)Honoring the Best of the Worst Phishing Attacks
Over 100,000 E-File PINs Fraudulently Accessed In Automated Attack On IRS App
Cisco Bulks Up Switch Lineups for Emerging Workloads
15 great Valentine's Day steals and deals |
What's happening at the Yarmouth libraries in February - News - The Register - Yarmouth, MA
How Symantec's CIO used SDN, cloud to pull off Veritas split | CIO
Why SMBs should build a threat intelligence program -- no tech investment required - TechRepublic
The role of mobile services in the evolution of Io
Hacked Again: Can the IRS Protect Your Tax Info This Year? | The Fiscal Times
Hackers leak contact information of 20,000 FBI employees
Hackers hit IRS with stolen Social Security digits
Is The Cybersecurity Bubble About To Burst?
Global Substation Automation and Integration Industry -- NEW YORK, Feb. 10, 2016 /PRNewswire/ --
Palo Alto Networks Inc (PANW) Insider Nir Zuk Sells 30,000 Shares | Daily Political
Google issues Chrome update to fix Windows, Mac, and Linux bugs - SC Magazine
Google car software attains 'driver' status - SC Magazine
Criticial Fixes Issued for Windows, Java, Flash — Krebs on Security
Chinese Consortium Makes $1.2 Billion Offer for Opera Software -- Update -
Qihoo 360-Led Chinese Consortium Makes $1.2 Billion Offer for Opera Software - WSJ
Opera Gets A $1.2 Billion Buying Offer From Chinese Consortium Made Of Kunlun And Qihoo 360
IRS Says ID Thieves Used Stolen Social Security Numbers in Attack - NBC News
IRS website attack nets e-filing credentials for 101,000 taxpayers | Ars Technica
IRS suffers another data breach
Gun, drug, car deaths loom large in US longevity gap: Study | WJAX-TV
Day One 2: Journal app users unhappy with pricing and sync options | CIO
Apple News & Rumors, Feb. 10: Streaming TV, Hackable Macs |
Adwind: Malware-as-a-Service Platform That Hit More Than 400,000 Users and Organisations Globally -- LONDON, February 10, 2016 /PRNewswire/ --
Microsoft fixes 36 flaws in IE, Edge, Office, Windows, .Net Framework | InfoWorld
This IT security and ethical hacking training bundle is now 98% off - TechSpot
Five cyber-security trends to watch - SC Magazine UK
Google Expert Offers Online Security Tips
Wendy's Investigating Breach Of Data, Unusual Activity : News : Headlines & Global News
Senate to sanction North Korea in rebuke of Obama policy | TheHill
Obama seeks cybersecurity boost to replace 'ancient' tech |
Obama administration plans new high-level cyber official - News - Journal Star - Peoria, IL
How can IT Infrastructure Library (ITIL) improve information security?
Senate bill aims to derail NKorea's nuclear weapons program ::
Iranian Hacker Gained Access to Computer Database
Budget calls for new planes, but no change to end strength
AT&T; Does Not Care about Your Privacy - Schneier on Security
Cryptowall has been a cash bonanza for criminals, failure for cops - SC Magazine
European Commission : CORDIS : News and Events : Data Protection, Security and Privacy (DPSP) in the Cloud: 1st Workshop of the Project Cluster on Data Protection, Security and Privacy in the Cloud.
Gartner Defines Benefits of Software-Defined Perimeter Around Enabling Business Agility in Upcoming Webinar - Press Release - Digital Journal
Gartner Recognizes MetricStream as a Leader in 2015 Magic Quadrant for... -- PALO ALTO, Calif., Feb. 10, 2016 /PRNewswire/ --
Webinar Highlights Secure Enterprise Application Access - Contributed Content on Top Tech News
'Memory Hackers' on PBS shows limitations, possibilities of the mind - (Los Angeles, CA)
Hack Brief: Hacker Leaks the Info of Thousands of FBI and DHS Employees | WIRED
Having Trouble Hacking Government Agencies? Just Call Their Help Desks - The Libertarian Republic
US officials trivialize impact of Department of Justice hacking
New Case Suggests the FBI Shared Data from Its Mass Hacking Campaign with the UK | Motherboard
IRS hackers try to use stolen SSNs to generate E-file PINs - SC Magazine
Sanders aims for big win in New Hampshire |
Sanders aims for big win in New Hampshire |
New Hampshire primary: How the outsiders won -- and the insiders crumbled -
Hearthstone hacking can compromise your PC, say antivirus firm | PCGamesN
FDA presses medical device makers to OK good faith hacking -
VC Firm Social Capital Opens Up Its 'Magic 8-Ball' Growth And Data Tools For Any Startup To Use
Chinese antivirus cheats offer $1.2 billion to buy Opera Software | Apps and Software |
Browser maker Opera receives $1.2 billion offer from Chinese companies
Opera gets $1.2 billion buyout offer from Chinese companies – Tech2
Food and drink industry face data protection regulation headache
GDPR: A new data protection landscape for multichannel retailers |
New report says the average cost of a data breach is nearly $1 million | Trucks at Work
Cisco Releases Security Update | US-CER
Enforcing Information Policies Using a Small-Data Approach | The Legal Intelligencer
Quick Heal public offer subscribed 10.8 times - Livemint
Phony Adobe Flash Update Hosts Malware, Targets Apple Users - McAfee
Report: Pros urged to roll out IT projects before they are security-ready - SC Magazine
Bipartisan House Bill Will Seek To Prevent States From Mandating Encryption Backdoors
Apple Releases Third OS X 10.11.4 El Capitan Beta to Public Beta Testers - Mac Rumors
Bromium Announces Next-Generation Endpoint Protection Software Solution | Virtual-Strategy Magazine
5 most dangerous computer viruses of all time » TechWorm
Microsoft fixes 36 flaws in IE, Edge, Office, Windows, .NET Framework | CIO
Latest Group Tests - SC Magazine
Employees mishandle data, violate HIPAA in Washington State Medicaid breach - SC Magazine
Google is giving away 2GB data free on Drive till tomorrow: Here’s how to get it | The Indian Express
How to Make Nest's Thermostat Your Smart-Home Hub | WIRED
Government may tap into your IoT gadgets and use your smart devices to spy on you | Computerworld
Letter: Clinton’s security breach - Post and Courier
Awareness of security risks up, but more needs to be done
80% of Security Industry says Mobile Access Control Increases Vulnerability to Cyber Attacks - IFSEC Global
4 Ways To Protect America's Internet From Cyber Threats - Techaeris
Security issues plague web dating software - SC Magazine
"Cyber-Antiterror-2016" joint exercises of CIS Countries to be held in Belarus | ARMENPRESS Armenian News Agency
Proposed Nato reinforcement 'will send signal' to Russia - BBC News
PressTV-Clapper: US, Russia in Cold War spiral
Super Bowl 2016 Trailers Released; Which Teaser Is Best? 'Jason Bourne' And Other Films Teased! : Trending News : koreaportal
Going out with a bang - POLITICO
Obama's Cybersecurity Plan is Meant to Secure His Legacy | WIRED
Is the cloud more secure than the hardware for the SMB? - Infosecurity Magazine
Advancing Your Security Career - Dark Reading
When Will Passwords Finally Die? - Dark Reading
Cisco Spends $1.4 Billion on Jasper IoT Platform - Unified Communications on CIO Today
Drugs, guns more common on dark web than religious extremism
Hacking and Penetration Testing Certifications - Infosecurity Magazine
Security and the Network - Dark Reading
CorreLog, Inc., Xbridge Systems, Inc. to announce first fully integrated SIEM with automated data discovery and DLP for IBM z/OS at SHARE San Antonio, Feb. 28-Mar. 4 | Virtual-Strategy Magazine
Privacy Shield – Replacement To Safe Harbor Agreed - Data Protection - European Union
Utah anti-doxing bill would impose six-month jail term - SC Magazine
Students told: bring your mobile phone to the classroom - Installation
Vidyo Updates Video Platform for Easier, More Secure Enterprise Use
Gartner Positions Sophos as a Leader in Magic Quadrant Report for Endpoint Protection Platforms
Gartner Positions Dell SecureWorks in the “Leaders” Quadrant of the Magic Quadrant for Managed Security Services (MSS), Worldwide | Business Wire
Obama Seeks $19B for Cybersecurity Plan -
Hackers take control of a TOILET using bog-standard computer skills - Mirror Online
Twitter bug allows hackers to hijack big Twitter accounts like @God, @Vagina etc » TechWorm
La vita ai tempi di internet: monitorati anche decine di volte al giorno -
Palo Alto Networks Inc (NASDAQ:PANW) Given Consensus Recommendation of “Buy” by Brokerages - The Vista Voice
Clinton's Secret Weapon in Nevada Could Launch Her Comeback | Mother Jones
How the outsiders won -- and the insiders crumbled | Politics - WPTZ Home
How to hack Facebook!!! ; This Facebook hacking tool comes with its own risks » TechWorm
New White House Cybersecurity Plan Creates Federal CISO - Dark Reading
CSO Online's 2016 data breach blotter | CSO Online
91,000 state Medicaid clients warned of data breach | The Seattle Times
8 Issues Derailing IT Team Innovation - Infosecurity Magazine
Testimony Of CFTC Chairman Timothy G. Massad Before The U.S. House Committee On Agriculture
Simplifying Application Security: 4 Steps
Chris Wysopal - Authors & Columnists - Dark Reading
Bromium launches next generation endpoint protection
Microsoft delivers Office 2016 to subscribers on the slow train | Computerworld
Microsoft fixes 36 flaws in IE, Edge, Office, Windows, .NET | PCWorld
How high will IT salaries climb? | CIO
U.S. Intel Chief: Islamic State Produced, Deployed Chemical Weapons - Breitbart
IRS thwarts 'automated attack' against tax e-filing systems | ZDNet
New Report from NTT Com Security Highlights Critical Importance of Data Protection | Business Wire
Cyber official to be hired | News |
Great Plains Energy Incorporated Declares Dividends | Business Wire
What are the greatest security threats facing the US? -
Clements Worldwide To Host Lunch Panel with Josh Rogin of Bloomberg on Global Risks Challenging Businesses in 2016 | Benzinga
Data Breaches led 3 Million Brits to Switch Service Provider - Infosecurity Magazine
Advancements in North Korea’s nuclear weapon program a growing concern | Toronto Star
Are Industrial Control Systems the Latest Weapon in Modern Warfare? | TG Daily
Officials fear U.S. lagging in electronic war | NWADG
'We don't have the gear': How the Pentagon is struggling with electronic warfare - U.S. - Stripes
Matt Damon Says 'Jason Bourne' A 'Movie About Today' : Entertainment : Design & Trend
AlphaBay darknet phishing attack impersonates .onion domain | Netcraft
UK Government Launches New Fraud Taskforce - Infosecurity Magazine
Opinion: It's finally time to embrace Privacy by Design -
White House Wants to Revamp Cybersecurity In New $19B Plan - Defense One
Data Protection Day 2016: The Ever-Changing Landscape Of Data Protection - Data Protection - European Union
Global Cellular M2M Market Report 2016-2020 - Market is Estimated to Grow from... -- DUBLIN, Feb. 10, 2016 /PRNewswire/ --
IBM's X-Force team hacks into smart building | CSO Online
The Morning Download: Regulators Tell Google that AI Qualifies as Driver - The CIO Report - WSJ
CIO Network Members - WSJ
Jeremy Seth Davis bio and recent articles
Hackers said to rig exchange rate at Russian bank
FBI Says It Still Can't Unlock San Bernardino Shooter's Encrypted Phone | Fast Company | Business + Innovation
Innovation and Industries: Cybersecurity -- The Motley Fool
Analysis: New Hampshire results keep nomination races fluid |
Sanders says N.H. win 'will echo from Wall Street to Washington'
How Tech Startup Founders Are Hacking Immigration - Bloomberg Business
Hacking gold in Hearthstone? You're probably just hacking yourself | Technology | The Guardian : Skype users, beware of new T9000 trojan
New Trojan T9000 Hacks Into Your Skype Conversations, Bypasses Even The Best Antivirus Apps : PERSONAL TECH : Tech Times
Trojan T9000 Bypasses Antivirus Suites to Spy on Skype Calls, Chats: Report | NDTV
Windows 10 updates still largely opaque | ZDNet
New bipartisan bill would prevent states from weakening encryption | ZDNet
£1.2m and a 13% drop in revenue - the cost of a data breach to UK businesses - Computer Business Review
UK firms see data breach as inevitable | Channel Pro
Soil Health Workshop announces speaker - Weekly Mailer: News
Microsoft Wants You Using Windows 10, Like It or Not - Tech Trends on CIO Today
Security Holes in Sparkle Render 'Huge' Number of Mac Apps Vulnerable: Report | NDTV
iCloak plugs in to protect privacy, but it's buggy
Windows 10 | Microsoft finally provides details for OS updates | Windows 10 content from SuperSite for Windows
Tom Reilly Talks About Helping Companies Deal With Big Data - WSJ
General Michael Hayden and Bruce Schneier Announced as Keynote Speakers at Centrify Connect: The Identity Security Conference | Business Wire
Expert's opinion: How I hacked my hospital - Securelist
Privacy and Windows 10 | Windows Experience Blog
PHOTOS: How to stay safe online – Google tips: Top 5 things you can do today to stay secure online | The Financial Express
Microsoft delivers major updates to Internet Explorer and Adobe Flash Player | Computerworld
Pressure grows to boost security of infusion pumps | Health Data Management
US intelligence: ISIS to attempt American attacks - Story
IoT Could Be Used To Spy, Admits James Clapper | TechCrunch
Defense budget focuses on readiness amid shrinking force | Military |
Final stage of CIS anti-cyberterrorism exercise to take place in Belarus
Obama signs two executive orders on cybersecurity
Draft Bill Aims to Grow U.S. Military Cyber Warfare Capabilities - Topic A: DefenseTopic A: Defense
Ennahar Online - Cyber-attacks classified among the main threats to the security of the USA
Two-thirds of Business Resigned to Suffering Security Breach - Infosecurity Magazine
Google Set to Ban Flash Display Ads Next Year - Infosecurity Magazine
The internet of things: how your TV, car and toys could spy on you | World news | The Guardian
Kaspersky Lab warnt vor Malware-Shop im Darknet - com! professional
Netwrix Reports Outstanding Q4 and Year-End Results
February Patch Tuesday Signals Six Critical Microsoft Bulletins - Infosecurity Magazine
A quarter of SME IT managers are women
Cybercrime Doesn't Pay As Much As You'd Think - Dark Reading
Petraeus Fallout: 5 Gmail Security Facts - Dark Reading
CYBERPOL public information released - Dark Reading
Hearthstone hit by malware, 1 in 10 teens know a cybercriminal - security roundup | The latest news from the Computer and IT Industry | PC Retail
The Internet of safer things - Tech News | The Star Online
Developer watches as hackers break into a server
PBS Doc "Memory Hackers" Shows The Future Of Memory Manipulation | Co.Create | creativity + culture + commerce
UE y EE.UU. logran acuerdo sobre transferencia de datos personales
Keith Jensen Unloaded $33,829 Worth of Fortinet Inc (NASDAQ:FTNT) Shares - FDA News Alert
Schneier on Security: Blog Entries Tagged war
10,000-Year-Old Warfare - Schneier on Security
Obama seeks cybersecurity boost to replace ‘ancient’ tech | KSN-TV
Palo Alto Networks Inc (NYSE:PANW) CTO Nir Zuk, Unloaded $3,856,610 in Stock - FDA News Alert
Georgia law giving police grand jury access may face change | KIRO-TV
1Password 6 for Mac review: Enterprise features and lots of small improvements | Macworld
The Futurist Big data, meet big brother - The Daily of the University of Washington: Opinion
How to secure Amazon Web Services like a boss | Networks Asia | Asia's Source for Enterprise Network Knowledge
Steelcon 2015 - Attacking The User To Compromise Corporate Networks With Fruitywifi - Xtr4nge
Steelcon 2015 - Wrong Side Of History - Finux
Steelcon 2015 - Reverse Engineering Android Applications - Tom Keetch
Steelcon 2015 - 0wning The Internet Of Trash: A Gentle Intro To Iot Ownage - Darren Martyn
Steelcon 2015 - Blindslides - Campbell Murray
Steelcon 2015 - Popping The Bubble - Mo Amin
Steelcon 2015 - The Matrix Ld_Preloaded - Alastair
Steelcon 2015 - Opening Speech - Robin Wood
Steelcon 2015 - Getting Started In Scada Testing - Campbell Murray
True IT Change Reconciliation Is Centerpiece of New CimTrak Version 3.1 | Benzinga
UK businesses spend £1.2 million recovering from a cybersecurity breach says new research
Two-Thirds of Business Decision Makers Expect to Suffer an Information Security Breach -... -- LONDON, February 10, 2016 /PRNewswire/ --
Breaches Infest C-Stores, Gas Stations: Study
Severe security flaw affects a shocking amount of Mac apps | TechRadar
Obama unveils $4T budget that calls for cybersecurity boost - NY Daily News
Overnight Cybersecurity: Obama budget tries to secure cyber legacy | TheHill
Malware: Understanding the enemy |
Senate to vote on hitting North Korea with tougher sanctions - US News
The Latest: FBI chief says encryption blocks investigations - Houston Chronicle
Pentagon seeks bigger budget for 2017
3 technologies that will transform warfare
Intelligence chief: North Korea restarts plutonium reactor |
Cybersecurity among top targets of President Obama's $4.1 trillion budget blueprint - LA Times
Employee Stole 'Yandex Search Engine' Source Code, Tried to Sell it for Just $29K
How these 25 year old founders from Ahmedabad are trying to make their mark in a $5.3 billion market
Automotive Industry Adopts GSMA Embedded SIM Specification to Accelerate Connected Car Market | Business Wire
Anonymous hackers harpoon Japanese websites in whaling protest | The Japan Times
Furby Just Got a Little Less Cute and a Lot Weirder | E! Online
Hackers said to rig exchange rate at Russian bank | NWADG
JP Morgan Cazenove Indicates Potential 81.61% Increase In Shares Of Sophos Group Plc
Sanders aims for big win in New Hampshire | KTVB.COM
JP Morgan Indicates Potential 81.61% Increase In Shares Of Sophos Group PLC
Hacking Defense & Iraq's Controversial Security Groups
Obama launches cyber-security 'national action plan' | The Times of Israel
Apple Health Care Announces Data Breach - KPQ
Nuns who help homeless face eviction in costly San Francisco | WJAX-TV
New England mops up as snow falls on East Coast | WJAX-TV
Judge's error could set man free without trial for murder | WJAX-TV
Killing Windows Mobile means killing Windows - so stop asking Microsoft to - WMPoweruser
Sparkle app updater exposes many Mac apps to hacking - SlashGear
Create password for personal computer - Your West Valley News: Personal Finance
What Was Your Hardest Device to Transition Into?
LANS Holdings, Inc. Increases the PCI Payment Security Requirements in Its Payment Platform
Five myths that help overcome contact centre cloud security fears - Ocular Technologies Press Office | ITWeb
Here's How Obama's Cybersecurity Plan Could Affect You | Fast Company | Business + Innovation
DNI Clapper: China continues large-scale cyber espionage against U.S. despite agreement | World Tribune Life
Spy Chief Warns That US Could Face Attacks Inspired By Terrorism In Paris
Sen. John McCain: Silicon Valley should join the war on terrorism - Tulsa World: Other Voices
Intelligence chief warns of more homegrown terror attacks |
Intelligence officials: ISIL determined to strike U.S. |
President Obama’s military budget is still one of the biggest ever.
US agencies may spy on citizens using the Internet of Things
GSMA announces Internet of Things guidelines – Tech2
EU-US Privacy Shield: Still Awaiting Certainty | The National Law Review
Gartner Says India's Market Dynamics Are Impacting Digital Business Implementation | Business Standard News
Is Your Smartwatch Safe From Hackers? « CBS Chicago
Hackers hit two more Japan websites amid whale hunting protests, Technology - THE BUSINESS TIMES
Hackers in Ireland Trying to Buy Apple Employee Logins - The Mac Observer
A Cyber Security Stock You Will Regret Not Buying -
Fortinet Incorporated (NASDAQ:FTNT) Shorted Shares Increased By 51.78% - FDA News Alert
The government just admitted it will use smart home devices for spying | Trevor Timm | Opinion | The Guardian
Majority of 2015 Healthcare Data Breaches Due to IT Hacking
Stallone put Oscars attendance in Coogler's hands | FOX23
Microsoft Wants You Using Windows 10, Like It or Not - Microsoft/Windows on Top Tech News
Apple Begins Offering Trade-In Credit for Damaged iPhones | NewsFactor Network
7 Data Security Concerns Farmers Can't Ignore |
White House unveils broad strategy for strengthening cybersecurity - FierceGovernmentI
5 tips to protect yourself online from a Google security expert -
Will You Experience The Next Data Breach? | TechWeekEurope UK
Nuclear North Korea, ISIS, cyber-espionage: Three biggest world threats in 2016
Obama proposes to ramp up spending against cyberattacks - Washington Times
Intelligence official: ISIS to attempt US attacks in 2016 -
US responses to NKorea nuke, missile tests will upset China
Senate to vote on hitting North Korea with tougher sanctions | Daily Mail Online
Gen. Michael Hayden Gives an Update on the Cyberwar - WSJ
Canadian organizations feel they can’t keep up in cyber security | Computer Dealer News
Intelligence officials: Islamic State determined to strike U.S. this year | News & Observer
2015 Trends: Multi-channel, Streaming Media and the Growth of Fraud
INSIGHT: Growing hacker threats make cybersecurity a great career choice
White House Budgets $19 Billion for New Cyber-Security Measures
Hackers Harpoon Japan Tax Agency Website in Whaling Protest - Bloomberg Business
FBI Hack: Hackers publish contact info of thousands of FBI employees | BGR
Pro-Palestinian hacker dumps data of thousands of Fed workers | The Times of Israel
Sanders aims for big win in New Hampshire |
Infoblox Acquires IID for $45M to Bolster Network Security
Analysis: New Hampshire results keep nomination races fluid
TalkTalk Data Breach Sees Customers Targeted After Engineering Visiots
Data Breach Affects 91,000 Washington State Medicaid Clients . News | OPB
Security, Fraud and Risk: Basics, Strategy and the Bigger Picture
AP PHOTOS: New Hampshire voters gather to vote for president | FOX13
The Latest: Intelligence chief warns of more terror attacks | FOX13
Second City names new film comedy school for Harold Ramis | FOX13
Microsoft Wants You Using Windows 10, Like It or Not - Applications on Top Tech News
Alpine Linux Goes All In for Docker
Data is the New Control Point | Computerworld
The White House wants to teach you about online security - MarketWatch
Feds investigate alleged breach of FBI, Homeland Security data - SFGate
Justice, Homeland Security Probe Hack of DHS, FBI Employee Data - NBC News
Racket 6.4 Improves Security and Adds Incremental Garbage Collection
North Korea Has Restarted Plutonium Reactor: US
Chinese Intellectual Property Theft Demands More Action | IP Theft
Analysis: Obama's Final Budget Lands...GOP Will Likely Punt - NBC News
AP PHOTOS: New Hampshire votes in nation's first primary | WJAX-TV
Obama to release $4 trillion-plus budget for 2017 | FOX13
U.S. intelligence officials say ISIS is determined to strike America this year | News update, news roundup | Tampa Bay Times
Obama sends Congress record $4.1T budget plan | Fox News
Obama's last budget proposal would spend $4.1 trillion
Obama budget expands use of criticized software | TheHill
Cyber training a key point in 2017 DoD budget
Starfish: Silver Spring Networks’ Bid for Smart Cities and the Internet of Things | GTM Squared | Greentech Media
C-Labs Announces New IoT Software Development Kit -- BELLEVUE, Wash., and ORLANDO, Fla., Feb. 9, 2016 /PRNewswire/ --
High-tech Valentine: do dating apps on company-issued mobile devices pose a security risk? - Cambridge Network
The Future of IoT Connectivity |
Get the Most from your Voice of Customer Data
The Internet of Things' Big Software Challenge
Take Google's security challenge to keep hackers at bay
Hackers release huge list of FBI employees | Irish Examiner
Former Israeli army chief's computer hacked in Iranian cyberattack | i24news - See beyond
Controversies - NSA to Merge Offensive and Defensive Hacking Operations, Counter to Advice of Presidential Panel - AllGov - News
Cato Cloud aims to simplify network security
iTWire - SunRice deploys Palo Alto security to support global market push
Cato Networks' Cloud Security-as-a-Service Platform Debuts
Teen cybercrime still has a seriously 'sexy' problem | TechRadar
Health privacy watchdog investigates data breach that led to alleged assault on nurse | Technology | The Guardian
Veolia in talks to install New Orleans flood prevention system
Sparkle software updater leaves 'huge' number of Mac apps open to attack
Everything you need to know about iOS' crippling 'Error 53'
Russia wants to force Apple & Google to pay more tax, apply 18% VAT to App Store purchases | 9to5Mac
February 2016 Patch Tuesday: IE Flash vulnerabilities get a bulletin
How to validate your security program: Part 4 |
How to Get 2GB of Free Google Drive Storage - How to Get 2 GB Free Google Drive Storage
9 Simple Ways To Keep Children Safe Online | TechWeekEurope UK
Addressing PCI Compliance Through Privileged Access Management: CIO White Paper
Obama administration plans new high-level cybersecurity official |
Obama administration plans new high-level cyber official | Fox News
Java-based Trojan was used to attack over 400,000 systems | CSO Online
ET Canada | Blog - WATCH: Samantha Bee Declares Late Night War On Colbert
Cyber a top national security threat to U.S.: Intelligence director | Business Insurance
Pentagon's $583 billion budget plan keyed to terrorism threats - Chicago Tribune
Taylor Swift leads iHeartRadio Award nominations | FOX23
Intelligence officials: IS determined to strike US this year | Boston Herald
Obama Introduces National Hacker-Defense Plan - Breitbart
DNI: China Continues Cyber Espionage
Forget Power Stations, Worry About Toasters, Cyber Experts Say - Bloomberg Business
Facebook hit by French privacy order - BBC News
The Cass Patented BYOD Payment Solution Expands Globally
Walmart Family Mobile Adds an Opt-Out 'Data Saver' |
ATX West - Icon Labs Releases First Ever Embedded Protection for Internet of Things Devices that Connect via Modbus Protocol | RoboticsTomorrow
The Internet of safer Things! | Zee News
Russian hackers jacked up curency exchange rates for 14 minutes using a malware » TechWorm
9 days: Black-hat hackers' threshold in untargeted attacks - TechRepublic
Spurs coach Gregg Popovich hates hacking, 'but I'm gonna do it' - San Antonio Spurs Blog- ESPN
Making Gartner Obsolete: Ombud Update
American Electoral - The Huffington Post
Microsoft Releases February 2016 Security Bulletin
Hacker dumps details on 29,000 FBI and DHS agents online | News |
Hacking Gladwell: Welcome To The Era Of Augmented Expertise
Hackers publish contact info of 20,000 FBI employees |
Data breach affects 91,000 Washington Medicaid clients | The Columbian
State data breach impacts 91,000 Medicaid clients
State notifies 91,000 Apple Health (Medicaid) clients of data breach | Q13 FOX News
Obama goes hard on cybersecurity, new CNAP commits funds, resources - SC Magazine
Obama Seeks Cybersecurity Boost to Replace 'Ancient' Tech - ABC News
Obama wants cybersecurity chief, $3.1B to replace old technology |
Google Releases Security Update for Chrome
Pro-Palestine hacktivist makes good on threat, posts data on FBI and DHS personnel - SC Magazine
NSA reorg could strengthen defense ops - SC Magazine
Adobe issues 32 fixes for February's Patch Tuesday - SC Magazine
Rip-off artists use Southwest Airlines in Facebook scam - SC Magazine
As Dyre Goes Quiet, Focus Turns On Other Banking Trojans
'Huge' Number of Mac Apps Open to Hijacking From Sparkle Updater Vulnerability - Mac Rumors
'Huge' number of Mac apps are vulnerable to man-in-the-middle attacks
Sparkle Updater vulnerability puts ‘huge’ number of Mac apps at risk of hijacking | 9to5Mac
Microsoft (MSFT) Improves Windows 10 Transparency with Dedicated Updates History Site
Mobile enterprise application delivery struggles to catch on
UK Surveillance Powers Bill Slammed For Privacy, Clarity And Targeting Failures | TechCrunch
Concerned by Cyber Threat, Obama Seeks Big Increase in Funding - NBC News
How to get 2GB of free Google Drive storage in two minutes or less - AOL
Sexting and cyber-crime? Welcome to the teenage internet
White House to hire its first chief information security officer | ZDNet
Microsoft released 13 security bulletins for February Patch Tuesday, 6 rated critical | Network World
Top intelligence official: ISIS to attempt U.S. attacks this year |
Intelligence officials: IS determined to strike US this year | The Charlotte Observer
North Korea restarts plutonium reactor: US intelligence chief | The Indian Express
AP News Guide: Snowy New Hampshire has its say in 2016 race | WFTV
Intelligence officials: IS determined to strike U.S. this year
Samantha Bee declares late-night war on Stephen Colbert |
Senior U.S. intelligence officials say a small but determined group of violent extremists will try to overcome the logistical challenges of mounting a strike on American soil
Matt Damon says Jason Bourne "goes deeper than Ultimatum" | GamesRadar
Report: Iran hacked former IDF chief's computer - Middle East - Jerusalem Post
Darknet drug markets are making drug-taking safer | The Mancunion
The 2016 National Threat Assessment - Schneier on Security
Microsoft's February Patch Tuesday: 13 bulletins addressing 36 vulnerabilities - SC Magazine
New White House Cybersecurity Plan Creates Federal CISO
Should the government set consumer data protection rules?
Technavio Announces Top Three Emerging Trends Impacting the Global Mobile Computer Market | Business Wire
Security and Standardization Strategies Needed to Maximize $1.3 Billion in Federal Mobility... -- HERNDON, Va., Feb. 9, 2016 /PRNewswire-USNewswire/ --
Prysm Moves Into Enterprise Collaboration Space
3D Printing Brings New Opportunities and New Challenges to the Oil & Gas Industry |
Hacker Releases Data on 10K DHS Workers, Says FBI Is Next - Customer Data on Top Tech News
Hacker Releases Data on 10K DHS Workers, Says FBI Is Next - Network Security on CIO Today
Hackers Release Contact Information for More Than 20,000 FBI Employees |
Apple Employees: Hackers Have Offered Us $23,000 For Our Login Info | Fast Company | Business + Innovation
Apple employee login: Hackers paying $23,000 for access | BGR
Every version of Windows hit by 'critical' security vulnerability | ZDNet
Cryptzone Named SC Magazine 2016 Trust Awards, Best NAC Solution, Finalist - Press Release Rocket
Pulse Secure Eliminates Security Silos for the Next Generation of Workers, Applications, Networks and Things - Press Release - Digital Journal
Barnabas Health moves to one vendor to standardize firewalls | Health Data Management
Wendy's data breach probe draws Orlando lawsuit - Orlando Sentinel
After 15 years, cleanup plan approved for contaminated town | FOX25
Recent Broker Updates On Zix Corporation (NASDAQ:ZIXI)
Cybersecurity Investments Reach All-Time High
Draft Investigatory Powers Bill draws fire from Parliamentary committee - SC Magazine
AlienSpy returns as cross-platform backdoor - SC Magazine UK
Fake Adobe Flash Player Update 'Officially Certified By Apple' Infects Mac OS X Devices with Malware |
Microsoft will stop hiding what's inside Windows 10 updates | The Verge
iOS 9 review - iOS could get VR by 2018 | IT PRO
Q&A;: Managing data, security at the server | Plant Engineering
Want a safer Internet? Here's how to start - CBS News
How to convince the CFO of the budgetary security need | CSO Online
Why Safer Internet Day could teach businesses a thing or two | IT PRO
Dell Makes the Most Secure PCs in the Industry Even More Secure - Systems - Press Release -
Virus found on Troy school computer server
Louisville International Airport resumes normal operations | Local News - WLKY Home
Security checkpoints at Louisville airport reopen after suspicio - WDRB 41 Louisville News
Obama Debuts $19Bn Cybersecurity National Action Plan - Infosecurity Magazine
Fast Flux Bot Nets and Fluxer - Part 1 - SC Magazine
Corcow Trojan manipulates currency rates - SC Magazine
Microsoft Security Bulletins For February 2016 - gHacks Tech News
Poseidon Group Carries Out Global Cyber Espionage by Land, Air and Sea - Infosecurity Magazine
James Clapper, intel chief: North Korea has restarted plutonium reactor - Washington Times
Medical Device, Health Care Security Continues to Ail | Threatpost | The first stop for security news
Vitaly Kamluk on the Adwind RAT | Threatpost | The first stop for security news
Adobe Releases Security Updates | US-CER
U.S. intelligence chief warns of 'homegrown' security threat | Reuters
U.S. Director of National Intelligence James Clapper speaks on North Korean nuclear threat, ISIS, homegrown terrorsim, cyber threats - CBS News
Twitter says it has shut down over 125k accounts linked to ISIS | Daily Mail Online
DepSecDef Work Details 2017 Budget: Offset Just Beginning EXCLUSIVE « Breaking Defense - Defense industry news, analysis and commentary
Emily Thornberry defends comparing Trident to Spitfires after fiery clash with Labour MPs - Mirror Online
Obama reaches for relevance with $4.1 trillion 2017 budget plan | Centre Daily Times
Obama unveils national cybersecurity action plan
US intelligence chief: we might use the internet of things to spy on you | Technology | The Guardian
Mass EK-as-a-Service Campaign Compromises 30K+ Websites - Infosecurity Magazine
NORML: We Have No Problem Taking Money from Dark Web Drug Dealers | Motherboard
Microsoft Adds Mobile Email Protection for Exchange - Infosecurity Magazine
Article 29 WP Response To "Privacy Shield" - Data Protection - European Union
Facebook Has Three Months To Comply With Data Protection Laws, France Warns
Obama’s Newest Executive Orders Establish ‘Cyber Czar’ and New Privacy Board |
Kaspersky confirms return of Carbanak and two more banking APT groups - SC Magazine
AlienSpy returns as cross-platform backdoor - SC Magazine
Kunal Anand - Authors & Columnists - Dark Reading
How (And Why) AppSec Is Important To Your Business - Dark Reading
VMware Broadens Its Hybrid-Cloud Virtual Desktop Horizons - Datamation
VMware gives enterprises a BYOD boost with three new tools | PCWorld
Blurred lines, teenage hackers, and BYOD: Why we need an Internet Safety Day - Computer Business Review
Hacker Releases Data on 10K DHS Workers, Says FBI Is Next | NewsFactor Network
GSMA releases Intenet of Things industry security guidelines | Latest News & Updates at Daily News & Analysis
Hackers leak contact details of 20,000 FBI staff
Russian Hackers Moved Ruble-Dollar Rate at Regional Bank: Cyber-Security Firm
Vigilante Hackers Fight Lizard Squad For Control Of 150,000 Home Routers
Vulnerabilities in Trane thermostats heat up IoT safety concerns - SC Magazine
Furby Hacking Project Invites Terrifying Modifications to Create "Social Robots"
Sterling Computers Chosen for Network Connectivity Project
Harrison High School Officials Investigating Hacking Of Teacher's Website, E-mail | WBAA
Cybersecurity Smackdown: What Side Are You On? - Dark Reading
Here's How To Protect Against A Ransomware Attack - Dark Reading
Here Are Four Sundance Films the NRA Really Doesn't Want You to See | Mother Jones
Dealing With Careless Users as a CIO | SmartData Collective
US senator calls for investigation of cruise ship in storm | FOX23
CloudMagic is a great cross-platform email app [Review]
Apple could face class-action lawsuit over 'Error 53' | Cult of Mac
Lawfirm Ready to File iPhone Error 53 Lawsuit - The Mac Observer
More Office 365 subscribers are starting to get Office 2016 | ZDNet
Java-based Trojan was used to attack over 400,000 systems | PCWorld
Andy Rubin Unleashed Android on the World. Now Watch Him Do the Same With AI | WIRED
TARGIT Makes Big Data Analytics More Approachable with New Version of its Data Discovery Module | Business Wire
How to Hack the Power Grid Through Home Air Conditioners | WIRED
Bat Blue Releases Book on Unified Cloud Security -- NEW YORK, Feb. 9, 2016 /PRNewswire/ --
Comparing the top vulnerability management tools
Chinese Cyberspies Pivot To Russia In Wake Of Obama-Xi Pact
In cybersecurity bid, Obama wants to retire outdated government systems -
What to See at MWC - McAfee
Former DNI and NSA chief Mike McConnell joins Securonix board - SC Magazine
Florida man charged with having three wives | WJAX-TV
Cyber a top national security threat to U.S.: intelligence director | Reuters
Africanews | Brazzaville: INTERPOL African conference seeks to avert evolving continental crime
US lags behind Russia, China in electronic warfare capabilities
Half of cyber attacks on Canadian firms succeed, survey suggests | IT World Canada News
Matt Damon Talks "Dark And Tortured" 'Jason Bourne,' Says | The Playlist
North Korea Has Resumed Weapons-Grade Nuke Work, Intel Chief Says - NBC News
GSMA releases Internet of Things industry security guidelines
Risks of Tor use inside a network - how to block Tor in business network | Tutorial | Computerworld UK
Zero Day - Page 322 | ZDNet
Obama seeks hike in funding as cybersecurity takes top priority | ZDNet
US DOJ, DHS Yet To Confirm Breach, Leak - Dark Reading
Facebook's Failure in India - The Atlantic
Is the dark web safe? | Alphr
Data Protection Day—Data Processors And The GDPR - Data Protection - European Union
Data protection unlocked - Understanding the EU-US Privacy Shield - Lexology
Cato Networks Launches Cato Cloud to Make Network Security Simple Again
Cellular M2M Market by Application (Video Surveillance, Fleet Management, Asset Tracking, Theft Recovery and POS) 2016 - Global Forecasts to 2020 - Research and Markets | Business Wire
Will CyberArk Software (CYBR) Surprise in Q4 Earnings? - February 9, 2016 -
Gartner BI Magic Quadrant: Inflection Point Has Arrived - InformationWeek
New Safe Harbor Pact Offers Temporary Port in Storm
SentinelOne Named as a Visionary in Gartner 2016 Magic Quadrant for Endpoint Protection Platforms | Business Wire
Should you fight back against hackers? | IT PRO
Hackers trying to bribe Apple workers into handing over login information, report says
Hackers reportedly attempting to bribe Apple employees for login details, offering $23k | 9to5Mac
Skimmers Hijack ATM Network Cables — Krebs on Security
Online 'Batman' Takes On Dridex Banking Trojan Operators
Cato Networks Launches Network Security-As-A-Service Platform To Channel - Page: 1 | CRN
Hacking is the new 'cool' for UK teenagers |
Hackers publish contact info of 20,000 FBI employees |
Windows 8 : quel antivirus choisir ? - JDN
Dyre Trojan almost dead after 'takedown' by the Russians - SC Magazine
Monday Morning Quarterbacking Super Bowl 50: Infosec Edition - Dark Reading
Obama Wants $19 Billion To Better Protect Government Data - BuzzFeed News
DOJ Breach Overshadows Cybersecurity Budget Plan - US News
Understanding Health Data Security and Print Infrastructure
NSFOCUS International Business (IB) Appoints Industry Specialist Alex Cruz Farmer as VP, Cloud Services | Business Wire
Data centre specialist turns to Securiclad for security solutions
Improving Loss Prevention by Applying Swarm Intelligence | Retail News | RIS News: Business/Technology Insights for Retail, Supermarket Executives
Security predictions for 2016: The C-suite and cybersecurity landscape
Microsoft Wants You Using Windows 10, Like It or Not - Windows Security on Top Tech News
BIOS Hack Detection Added To Dell Enterprise Security Suite - InformationWeek
JSocket offers cyber criminals one-stop shop for malware | InfoWorld
Microsoft makes it clear exactly how Windows 10 is super-secure | TechRadar
Walgreens CIO starts with the customer and works backward | CIO
Cops will adapt big data platform to secure Super Bowl - StateScoop
Brazilian Cyberspies In Suits Shake Down Victims With Stolen Company Secrets - Dark Reading
Obama administration plans new high-level cyber official - San Antonio Express-News
Free Google Drive cloud storage: Security checkup nets you 2GB | BGR
How to secure your Mac | TechRadar
Contact centre solutions: the move away from minutes | Channel Pro
Q&A: How Do I Get Grandma to Stop Tech Shaming the Kids? - McAfee
Interview: Nigel Harrison, Board Member, Cybersecurity Challenge - Infosecurity Magazine
Apple has defended criticism over Error 53 - Infosecurity Magazine
Intelligence Chief: North Korea Restarts Plutonium Reactor - ABC News
US responses to NKorea nuke, missile tests will upset China - Washington Times
Intelligence chief warns of more homegrown terror attacks | Fox News
US responses to NKorea nuke, missile tests will upset China | News & Observer
Extend NATO Cyber-Security to Asian-Pacific Allies
US intelligence chief warns of more homegrown terror attacks, ongoing cyberwarfare from abroad
Small Cyber Firm May Be Worth Billions To Northrop Grumman Or Another Top U.S. Defense Contractor
Submarines and Spitfires: Labour's Trident conundrum | Politics | The Guardian
The Research Pirates of the Dark Web - The Atlantic
Cybersecurity Company Digital Shadows Grabs $14M - Venture Capital Dispatch - WSJ
UK cybersecurity start-up Digital Shadows raises $14m to expand data analytics tool - Computer Business Review
People and paper: The well-intentioned threat of data protection and privacy? |
Protecting U.S. Innovation From Cyberthreats - WSJ
Overnight Cybersecurity: Obama budget seeks to boost cyber spending | TheHill
Barbara Kay, Author at McAfee
Stop Reacting, Start Preventing - McAfee
The internet of military things: Logistics dream, security nightmare? | ZDNet
VMware Unveils Workspace ONE to Deliver Digital Workspaces With Consumer Simplicity, Enterprise Security
VMware, Inc. (NYSE:VMW) Rolls Out Workspace One To Address Hybridity
Are Customers Living In The Digital Era of Distrust? -
iconnect007 :: Article
Report: Hackers steal, post details on 9,000 DHS employees - CSO | The Resource for Data Security Executives
Infoblox buys threat intel firm IID for $45M - SC Magazine
France to Facebook: Stop tracking everyone on the internet | ZDNet
What Analysts say about Palo Alto Networks, Inc. (PANW)? | CWRUOBSERVER
Deal: IT Security & Ethical Hacking Certification Training for $30 2/9/16 |
Latest Hacker Crime Wave Robs Millions From Dozens Of Banks
Large-Scale FBI Hacking - Schneier on Security
Schneier on Security: Blog Entries Tagged child pornography
Advanced Security Needs Addressed with Release of Check Point 700 Series Appliances
SPECIAL REPORT-The World Health Organization's critical challenge: healing itself
Mac OS isn’t as safe as you think - News - - Portsmouth, NH
BSP porting offers fast track development, ByteSnap | Electronics Weekly
Wind farms: Here's who's betting big
Demand Soars for Cybersecurity Experts Across Many Industry Sectors
Obama seeks over one-third rise in U.S. cyber security funding | Reuters
Republican debate wrapped, a good night for governors - LA Times
Onyx Group remains on track with five year targets after growing revenues 34% - Chronicle Live
South Wales Fire and Rescue Service staff data breached - BBC News
Apple plugs more than 100 flaws in its latest iOS security update - FierceMobileI
Kaspersky Lab Exposes the Poseidon Group: A Commercial Malware Boutique Operating on Land, Air and Sea | Business Wire
Brazilian Cyberspies In Suits Shake Down Victims With Stolen Company Secrets
Poseidon Group: a Targeted Attack Boutique specializing in global cyber-espionage - Securelist
Small Screen: This Apocalypse looms with wit and wisdom
Fewer Canadian organizations believe they are winning the cyber security war -- TORONTO, Feb. 9, 2016
Investment in cyber security solutions key in safeguarding data - Al Arabiya English
Firms, schools step up to boost manpower in cyber security industry - Channel NewsAsia
DoJ and DHS Employee Details Exposed in Latest Hack - Infosecurity Magazine
Digital Shadows Gets $14M To Keep Growing Its Digital Risk Scanning Service | TechCrunch
CES 2016 suggests technology business is alive and well
Imation sells IronKey to Kingston and DataLocker. - Infosecurity Magazine
India's market dynamics impacting digital business implementation: Gartner | Business Standard News
Why the Internet of Things is a can of worms and how to keep it sealed
Latest iOS 9 Security Update Patches Apple Pay Glitch That Provides Hackers Access To Your Data : PERSONAL TECH : Tech Times
Hacker Publishes Personal Info of 20,000 FBI Agents | Motherboard
Jet lag can be prevented by 'hacking' body clock with light, Study - News of the World
South Africa next on Anonymous anti-corruption hacking list - Times LIVE
Hackers publish FBI employees' contact info | Politics - WMUR Home
Sophos Home Free Antivirus (Mac) - Download - COMPUTER BILD
Gas stations, c-stores most hit by data breach, says latest study - PetrolPlaza - News
Wendy's Investigating Possible POS Data Breach - Network Security on Top Tech News
Lincolnshire Council suffered January data breach, tipster claims
Usenix Security '15 - Sound-Proof: Usable Two-Factor Authentication Based On Ambient Sound
Usenix Security '15 - The Unexpected Dangers Of Dynamic Javascript
Usenix Security '15 - Investigating The Computer Security Practices And Needs Of Journalists
Usenix Security '15 - Preventing Security Bugs Through Software Design
Usenix Security '15 - Towards Discovering And Understanding Task Hijacking In Android
Usenix Security '15 - Type Casting Verification: Stopping An Emerging Attack Vector
Usenix Security '15 - Rocking Drones With Intentional Sound Noise On Gyroscopic Sensors
Usenix Security '15 - Cloudy With A Chance Of Breach: Forecasting Cyber Security Incidents
Usenix Security '15 - Trustworthy Whole-System Provenance For The Linux Kernel
Visa Puts Consumers in Charge of Security | Business Wire
Vormetric Unveils New Patented Solution to Streamline Encryption Deployment - Vormetric... -- SAN JOSE, Calif., Feb. 9, 2016 /PRNewswire/ --
Poseidon cybercriminals blackmail enterprise players into business relationships | ZDNet
Google Giving Away 2GB Of Free Drive Storage, Here's How To Get it
How To "Nudge" Your Business Back To Better Mobile Security |
How to Get 2GB Google Drive Storage for Free | NDTV
Bitcoin Lending Platform Loanbase Loses Customers' Funds after Security Breach - NEWSBTC
Arrest after fire service discover alleged security breach of staff's personal data - Wales Online
Obama Administration Plans New High-Level Cyber Official - ABC News
White House reveals plan to bolster American cybersecuity -
US Responses to NKorea Nuke, Missile Tests Will Upset China - ABC News
Event planners don't understand real threat of cyber hacking | C⁢
Sanctions, media propaganda forms of new terrorism - Mehr News Agency
'Bourne 5' Matt Damon Returns; Jason Falls for Cyber Spy - Australia Network News
People, Not Tech: DepSecDef Work On 3rd Offset, JICSPOC « Breaking Defense - Defense industry news, analysis and commentary
GSMA Announces Security Guidelines to Support Growth of the Internet of Things | Business Wire
10 Year Poseidon APT Group Identified As First Portuguese Speaking Campaign | Threatpost | The first stop for security news
Un accident de train fait au moins quatre morts en Allemagne
Three Strange Words That Might Just Save You This Valentine's Day
High-Tech Valentine: Do dating apps installed on company-issued mobile devices pose a security risk?
Microstrategy: Has The Enfant Terrible Of The Software World Finally Matured? - MicroStrategy Incorporated (NASDAQ:MSTR) | Seeking Alpha
Tech Stock Roundup: Earnings Top Estimates, Markets Crash -
Canada's secret bid to stop Russian hackers
Tax season scams: Hackers targeting online filers -
Newswire & Press Release / Top Research University Links with 'Janet,' Adds Services, and Ramps Up Security with Palo Alto Networks - IT Services/Network Management - Palo Alto Networks, Inc. | NewswireToday
Pulse Secure Eliminates Security Silos for the Next Generation of Workers, Applications, Networks and Things - EIN News
Sierraware Introduces Virtual Mobile Infrastructure (VMI) for ARM Servers, Delivering Scalable and Efficient Mobile Security - Press Release Rocket
How 3 new VMware products empower end users while keeping IT happy - TechRepublic
Cyber Safety and Security In An Era Of Constant Social Media Surveillance | Collective-Evolution
Safety in the sanctuary: Teaching churches how to handle mass shootings
Micron21 prepares to launch DDoS mitigation datacentre | ZDNet
India, UAE may sign pact on nuclear energy | The Financial Express
US responses to NKorea nuke, missile tests will upset China | Daily Mail Online
Jason Bourne: "it's not a whole new chapter" | Den of Geek
Matt Damon Returns in ‘Jason Bourne’ Super Bowl Ad - Speakeasy - WSJ
The Internet of Broken Things (or, Why am I so Cold?) | Hackaday
AWS IoT platform connects devices to cloud services
Privacy in the Context of Data Protection - Experts & Views
New Safe Harbor Still Hangs in the Balance - Lexology
Health Happenings: Feb. 9 | Bradenton Herald
Sex crimes are getting reported more in Toronto: Analysis | Metro News
The great Australian IT security spend: More brawn than brains? - CSO | The Resource for Data Security Executives
Hacker Posts FBI, DHS Employee Data - US News
Hackers publish FBI employees' contact info - Story
Suspected Pakistani hackers vandalise Indian Revenue Service website
Learn security and ethical hacking via IT certification training - Pocket-lint
Microsoft Wants You Using Windows 10, Like It or Not - Computing on CIO Today
5 Best Practices for Reducing Third-Party Security Risks - eSecurity Planet
Why Cyber Security Stocks Got Smacked on Monday -- The Motley Fool
How to Carpet Bomb, Discriminately | Foreign Policy
ISIS-Inspired Hackers Breach DOJ Network, Release FBI Staff List
UAE's defence ties with India set to grow - Emirates 24|7 | Mohamed visit to India will strengthen trade, political and security co-operation: Gargash
Hackers publish FBI employees' contact info | Politics - WDSU Home
Jeremy Corbyn's New Shadow Defence Secretary Emily Thornberry Heckled Over 'Spitfire' And Other Remarks At Parliamentary Labour Party Meeting
Bourne filmmakers reveal name of new movie | Irish Examiner
#WorldGovSummit: Why security solutions not cyberspace regulation - Emirates 24|7
Safe Harbor Part Deux: The Privacy Shield - Data Protection - United States
EU and US reach Privacy Shield data deal
French privacy regulator vows to crack down on Facebook data collecting - Technology & Science - CBC News
Two Numbers? Mast Mobile Puts Both Onto One Smartphone | Digital Trends
Google working on a proper VR headset | KitGuru
How a desk liberation has led to a security nightmare in the legal sector | Information Age
All Covered Announces New Solution that lets you Access your Desktop, Apps from any Device
Infoblox (BLOX) Acquires IDD for $45M
Hackers publish 20,000 FBI employees' contact information -
FX manipulation? - Hackers use malware for huge FX rate move
Cyber Ratings Firms Can Help Thwart Hackers
Hackers publish FBI employees' contact info | Politics - WBAL Home
Intego Warns of Fake Flash Update that Installs Scareware - The Mac Observer
Poll: Do you still use your Iris scanner? - WMPoweruser
Evaluating Azure Container Service vs. Google and AWS
Google's second annual security check-up starts, get you 2GB of free Drive storage just for making sure your account is secure - Ausdroid
Worldcore payment platform using voice biometrics for authentication | BiometricUpdate
Troy CSD officials: Security breach may have threatened student information | News, Weather, Sports, Breaking News | WRGB
Japan to adopt parliamentary resolution to protest North Korea’s missile launch |
No country immune to threat from Islamic State, not even India: UAE minister - Firstpost
Avaya Offers Hybrid Cloud Collaboration to Midmarket
Local Counties Prepare For Approaching Winter Storm « CBS Philly
Mimecast Announces Financial Results for the Third Quarter of Fiscal 2016 -
Hacker Releases Data on 10K DHS Workers, Says FBI Is Next - Network Security on Top Tech News
Tech Firms Push Toward a Future Without Passwords -
The RPG Reload Podcast - 012 - 'Nameless: The Hackers RPG' | TouchArcade
'Memory Hackers' shows how our brains lie | MNN - Mother Nature Network
Alleged elections website hack draws FDLE attention - WZVN News for Fort Myers, Cape Coral & Naples, Florida
Jet-lag can be prevented by ‘hacking’ body clock with light, scientists find - Telegraph
Fortaleza Asset Management Inc. Increases Stake in Palo Alto Networks Inc (PANW) - Financial Market News
Justice Department investigates data breach that exposed worker data - MarketWatch
US Department of Homeland Security looking into reports of data breach; says no indication any 'sensitive or personally identifiable information' was accessed - NBC News -
Adwind Malware-as-a-Service Platform Hit 400,000 Victims Globally - Infosecurity Magazine
Poisoned Apple: Which Viruses Can Put Your iDevices to Sleep - TechShout
Steam uses insecure, out-of-date Chromium browser - gHacks Tech News
Industry 4.0: What businesses need to know |
Google’s Gmail May Be Down, But You Don’t Have To Be: Here’s How To Get 2 GB Of Free Google Drive Storage
Firm creates online access to forex - Punch Newspapers
DOJ and Homeland Security hacked by ‘impersonator’ - SlashGear
Cop suspended for security breach at home min’s event - Bangalore Mirror
iPhone iOS 9 lockscreen security threat detailed, likely harmless | BGR
The NSA is merging its cyber offense and defense teams | The Verge
UAE Warns India: 'You're Not Immune To ISIS'
Analyst: U.S. lacks strategy in terror fight | NJJN
India, UAE Likely to Sign Pact for Cooperation in Civil Nuclear Energy - The New Indian Express
Matt Damon: Jason Bourne Plot Goes to a Dark Place | Collider
Cisco Systems Just Spent $1.4 Billion to Expand Its Reach in the Internet of Things -- The Motley Fool
Facebook Told by France to Stop Collecting Non-User Data - Bloomberg Business
French privacy regulator cracks down on Facebook's use of personal data | Technology | The Guardian
Kids Have Their Own Place at Salt Lake Comic Con FanX - Story
Google’s great democratization of Virtual Reality - SlashGear
The legal industry: A desk liberation that led to a security nightmare - Enterprise Apps Tech News
5 myths about the Internet of Things | Network World
Infoblox Acquires IID, Combining Threat Intelligence With Network Context to Deliver Uniquely Actionable Security Insights
Hackers post anti-war message on Alabama government websites - Washington Times
Memory Hackers | Community Idea Stations
Lee elections website hacked by supervisor of elections candidate
Maxim Group Initiates Coverage on Palo Alto Networks Inc to Buy | Street Edition
Palo Alto Networks (PANW) – Investment Analysts’ Weekly Ratings Updates - Financial Market News
Hacker fulfills threat to dump data on 20K FBI agents | TheHill
OPINION: NBA basketball should hack the hacking - Western Herald: Basketball
Feds probe apparent breach of FBI, DHS worker data | Fox News
London businessman sues Google for 'data breach' » TechWorm
Breach Exposes Data From Thousands of DHS Employees | News & Opinion |
Intrusion Inc. Announces 2015 Fourth Quarter And Annual Results -- RICHARDSON, Texas, Feb. 8, 2016 /PRNewswire/ --
Massive Brute-Force Attack on Alibaba Affects Millions - Infosecurity Magazine
Law Firms Consider 'Error 53' Lawsuits Against Apple as Some Stores Authorized for Repairs - Mac Rumors
Adobe Flash Player Fake Update Can Infect Mac Computers with Scareware
Rational Quality Manager offers enhanced code coverage tools
Public cloud poised for a huge upswing this year - 08 Feb 2016 - Computing Analysis
Apache Spark rises to become most active open source project in big data - TechRepublic
Check your Google security and get 2 free GBs of Google Drive for free | ZDNet
Worldcore Relies on Voice Biometrics for Payment Authentication
Oracle Releases Security Updates for Java
Hacker threatens to expose info on DHS, FBI employees - SC Magazine
Cybercriminals increasingly launching APT-style attacks against banks, finds Kaspersky - SC Magazine
National Security Agency merging offensive, defensive hacking operations | Reuters
Cybercriminals adopt spies' techniques to pull off online bank heists | CIO
Homeland Security Today: China-Based Adversaries Pose Major Cyber Threat in 2016
Cyber: The new No. 1 threat
Homegrown Extremists Top Terrorist Threat List, Clapper Says - Bloomberg Business
Trump kids stump for their dad | Boston Herald
The buzz around Intrexon Corporation: Zika, GMO's, Pentagon and Wall Street - PravdaReport
Did A Spy-Turned-Congressman Just Out His Role In Cyber War With Russia?
Draft bill seeks to improve U.S. military cyber warfare capabilities - SC Magazine
Silver Spring Networks Extends Internet of Things Technology Platform With Gen5 Networking Advancements | Business Wire
Avast patches its web browser after Google finds flaw in Chromium-inspired product - SC Magazine
French data privacy regulator cracks down on Facebook | Reuters
French data privacy regulator to Facebook: You have 3 months to stop tracking non-users | VentureBeat | Social | by Reuters
French Regulator Alleges Facebook Violates Privacy Laws - WSJ
Skype targeted by T9000 backdoor trojan - SC Magazine
The Internet of Things: Why Success Lies in Services - Knowledge@Wharton
Explicit cookie consent | The Economist
Judicial Redress Act Would Extend Privacy Act Remedies to Citizens of Designated Foreign Nations | The National Law Review
Vulnerabilities allow delivery of malware through web page fonts - SC Magazine
Remtasu trojan latest tactic: posing as malicious Facebook app - SC Magazine
AUDIO: Robert Scheer Speaks With Jill Stein About the Green Party and the 2016 Election - Truthdig
Global Personal Identity management 2016-2020 -- LONDON, Feb. 8, 2016 /PRNewswire/ --
How 3D Printing will impact Oil and Gas Industry? | Express Computer
Tech Stock Roundup: Earnings Top Estimates, Markets Crash - February 8, 2016 -
Hackers using phishing to cash in on 9m tax returns - Computer Business Review
Thousands of FBI and Homeland Security details stolen by hackers
House Oversight presses Kerry to renegotiate cyber controls | TheHill
Mark Cuban: changing hacking rules would be a mistake |
Palo Alto Networks Inc (NASDAQ:PANW) Receives $199.70 Average Target Price from Analysts - Financial Market News
Majority of Mobile Business Users Tap Risky Apps - Infosecurity Magazine
Data and Goliath Published in Paperback - Schneier on Security
US officials downplay impact of Department of Justice hacking | Technology | The Guardian
Clever bank hack allowed crooks to make unlimited ATM withdrawals | Ars Technica
Student arrested for grade changing school data breach
NSFOCUS International Business (IB) to Build New Cloud DDoS Mitigation Solution & Centers | Business Wire
User Behavior Analytics: A complement to baseline hygeine | CSO Online
Mobile Security Is Still Important - Unified Communications Strategies
Check Point Software Tech Limited (NASDAQ:CHKP) Shorted Shares Increased 17.9% After Market Selling - FDA News Alert
Windows 10 dethrones XP to become number three operating system- The Inquirer
Mocana's Platform to Protect Schneider Electric's Next-Generation IP Connected "Things"
NextNine OT security management platform auto-discovers lower level industrial assets
'AlienSpy' Family Openly Sold As Subscription Service
ESI Group: Acquisition of Mineset Inc., a Big Data Visual Analytics and Machine-Learning Specialist | Business Wire
Securing Big Data Infrastructure: An Evolving Market Ecosystem -- DUBLIN, Feb. 8, 2016 /PRNewswire/ --
How to protect your business from IP theft |
Supplemental Security Income for Children With Mental Disabilities | Pediatrics Perspectives | Pediatrics
Airport workers seen with laptop in Somalia jet blast -
Speech Analytics Vendor Voci Partners with Phone Service Provider Vaspian - CRM Magazine
Java installer flaw shows why you should clear your Downloads folder | PCWorld
Apple mulling iMessage port to Android, sending encrypted messaging mainstream | ZDNet
Cybercriminals adopt spies' techniques to pull off online bank heists | PCWorld
Russian Cops Bust Key Members Of World's Busiest Cybercrime Gang: Sources
China - Implications Of The Anti-Terrorism Law For Telecom And Internet Companies. | Conventus Law
Cyber Crime Forensics, LLC Unveils Cybercrime Forensics Training Center to Train New Breed of Cyber Professional
Vulns allow delivery of malware through web page fonts - SC Magazine
Monday Morning Quarterbacking Super Bowl 50: Infosec Edition
Tim Helming - Authors & Columnists - Dark Reading
Patent The Internet Of Things, Or Not? - Intellectual Property - United States
Cisco Spends $1.4 Billion on Jasper IoT Platform - Cloud Computing on CIO Today
Broadcasting and Cable
EC Announces Privacy Shield Timeframe, Conditions
Best Free iPhone Apps: 13 paid iOS apps on sale for free, Feb 8 | BGR
Robin Who? Dridex botnet replaced with antivirus software - SC Magazine
Clean house to keep WordPress infection from coming back again and again - SC Magazine
The New World of Innovation
The Data Center JournalTop Cloud Security Trends for 2016 - The Data Center Journal
Preservica warns companies to safeguard against future 'X-Files'
Warning about hackers targeting self-assessment tax returns - B
Hacker dumps data on 10K DHS employees, threatens FBI next | TheHill
Southampton Uni upgrades network with Palo Alto - Telecompaper
IT Security & Ethical Hacking Certification Training - Geeky Gadgets
Hillary's Cyber Loose Lips: Clinton's Email Server Was Ripe for Hacking - Fox Nation
Avast's Secure Web Browser Was Anything But Safe
Dridex banking malware mysteriously hijacked to distribute antivirus program - CIO India News on |
Businessman sues Google over 'data breach' (From Herald Scotland)
Binoy Kampmark: State of Unease - The X Files | Scoop News
Apple’s security check in new iPhones and iPads can disable the devices
Apple: Error 53 is About Security, not Bricking iPhones - The Mac Observer
Apple Watch comes out ahead in study of fitness tracker privacy, security
Microsoft's new site highlights Windows 10 security features |
What are containers and microservices?
iOS 9 review - Apple defends device-bricking 'Error 53' | IT PRO
New Smart Toy Hack: This Time, It's Fisher-Price
Oracle patches Java SE vulnerability - SC Magazine
Alums file class action against UCF for PII exposure during breach - SC Magazine
Comcast and Earth Networks Bring Big Data Intelligence to Xfinity Home | Business Wire
The 8 most stressful jobs in tech | CIO
Learn how to keep your home extra safe with these home security life hacks | SF Globe
What Should Security Cost? - Dark Reading
Tom Quillin - Authors & Columnists - Dark Reading
Oracle issues emergency Java patch for Windows security flaw - IT News from
T9000 malware records Skype calls, screenshots and text messages to steal data | ZDNet
Obama’s remaining days - POLITICO
Adwind: Malware-as-a-Service Platform That Hit More Than 400,000 Users and Organizations Globally | Business Wire
Counter Ideology Required to Tackle ISIS: US Defence Policy Expert - The New Indian Express
US DOJ, DHS Yet To Confirm Breach, Leak
10 Shocking New Facts About Ransomware
Kratos Receives Unmanned Ground, Sea, and Aerial Target System Contract Awards Totaling in Excess of $2 Million -
The Secrecy Cryptography Giveth to Criminals, the Internet of Things Taketh Away - IEEE Spectrum
Cisco to Acquire Internet of Things Company Jasper | IHS Electronics360
What you missed in the Smart World: Super Bowl holo table and more | SiliconANGLE
Notable Earnings: Qualys Inc | CWRUOBSERVER
Adwind: FAQ - Securelist
Why Larry Ponemon Dedicated His Career to Privacy
Privacy Shield hammers another nail in the coffin of data protection | IT PRO
Forget power stations; worry about toasters, cyber experts say | Ames Tribune
Businesses not convinced of keeping up with EU data protection regulation - Cloud Tech News
Frost & Sullivan Applauds VMware AirWatch Teacher Tools and VMware Workspace... -- MOUNTAIN VIEW, Calif., Feb. 8, 2016 /PRNewswire/ --
When cloud gets personal: the consumerisation of the enterprise | Information Age
Google is planning a next-gen VR headset to get the jump on rivals- The Inquirer
AlienSpy RAT strikes over 400,000 victims worldwide | ZDNet
PayPal's overbroad rules unfairly punish VPN users | ZDNet
Mutiny on the bug bounty - SC Magazine
Darktrace Reports Over 500% Growth In Bookings -- CAMBRIDGE, UK, Feb. 8, 2016 /PRNewswire/ --
The Morning Download: Global Tech Slowdown Hits VC Funding in India - The CIO Report - WSJ
Hackers breach DOJ, dump details of 9,000 DHS employees, plan to leak 20,000 from FBI | Computerworld
Report: Hackers steal, post details on 9,000 DHS employees | Network World
Report: Hackers use malware to manipulate Russian currency value | TheHill
IoT Reality: Smart Devices, Dumb Defaults — Krebs on Security
Fitch Downgrades Genworth Life's IFS Ratings to 'BB+'; Outlook Negative | Reuters
FireEye Inc, Palo Alto Networks Inc Option Traders Aim For More Pain - Schaeffer's Investment Research
Carbanak 2.0: the billion-dollar bank heist is back | IT PRO
Top cybercrime ring disrupted as authorities raid Moscow offices: Sources | ET Telecom
Hacker verschicken Anti-Virus-Software anstelle von Malware - News -
Computerworld India News | Dridex banking malware mysteriously hijacked to distribute antivirus program |
Cybercrime Gangs Blend Cyber Espionage And Old-School Hacks In Bank Heists
Keller Rohrback L.L.P. Investigates University of Central Florida Data Breach - Yahoo Finance
Hotel Data Breaches: Can You Protect Business Travelers?: Business Travel News
U of Central Florida data breach affects student athletes, staff | Education Dive
APT-style bank robberies increase with Metel, GCMAN and Carbanak 2.0 attacks - Securelist
Computer Incidents Investigation Department - Securelist
Online 'Batman' Takes On Dridex Banking Trojan Operators - Dark Reading
Is Sharing Threat Data With the Government a Good Idea?
Don't Fall for the CrashSafari Scam that Crashes Macs and iPhones - Network Security on Top Tech News
Developing a first line of defence against cybercrime |
Why the market for paid-for Windows and OS X upgrades no longer exists | ZDNet
Windows 10 Operating System Bringing More Headaches to Users, RESCUECOM Report Shows -- SYRACUSE, N.Y., Feb. 8, 2016 /PRNewswire/ --
How to conquer recruiting, retention and IT skills challenges | CIO
What you missed in Big Data: Taming the Internet of Things | SiliconANGLE
What Does 2016 Hold for Healthcare Data Security, Storage?
Butler creates video to teach students how to respond to active shooter situation | CBS 4 - Indianapolis News, Weather, Traffic and Sports | WTTV
Error 53: Apple says iPhone error that forces handset to shut down helps keep it secure | News | Lifestyle | The Independent
Worldcore - The World's First EU-regulated Payment Institution Offering Voice Biometrics... -- PRAGUE, Czech Republic, February 8, 2016 /PRNewswire/ --
New Java bug leads to "complete compromise" of PC, warns Oracle | IT PRO
Oracle throws up emergency patch for Java on Windows problems- The Inquirer
Sophisticated Cyber-Espionage Malware Taps Into Skype Calls
Securely Breathe Life Into Old Devices - McAfee
Politics/News/News/KBS World Radio
Cyber security issue takes centre stage offshore
The 50 Most Anticipated Video Games of 2016
A First Look at Mad Matt Damon in Jason Bourne -- Vulture
Jason Bourne: Matt Damon answers burning questions about Bourne 5 |
Cisco Spends $1.4 Billion on Jasper IoT Platform - Cloud Computing on Top Tech News
TMZ Users Hit with Malvertising Blitz - Infosecurity Magazine
EU Data Protection Regulators All Set To Scrutinise ‘EU-U.S. Privacy Shield' And Transfer Mechanisms To The U.S. Generally - Data Protection - European Union
Forget Power Grid: Worry About Toasters - Enterprise
What to expect from the Privacy Shield and the General Data Protection Regulation - Lexology
Avast Patches Critical SafeZone Flaw - Infosecurity Magazine
How to Make Your Own Chocolate: Jim and Maureen Elitzak | Phoenix New Times
Pitfalls of ‘Bring Your Own Device’
South Bend schools get new computers - South Bend Tribune: Education
Sex crimes getting reported more in Toronto: analysis | Toronto Star
Bitdefender Named a Visionary in Gartner Magic Quadrant for Endpoint Protection Platforms -- BUCHAREST, Romania, February 8, 2016 /PRNewswire/ --
Russian Hackers Moved Currency Rate With Malware, Group-IB Says - Bloomberg Business
Metel APT hacking group rolls back ATM transactions to dupe banks | ZDNet
Bank-busting hackers crack secret of 'free money' by fooling cash machines into churning out dosh - Mirror Online
IT certification training: Learn security and ethical hacking: $30
Analytical Approach on Palo Alto Networks, Inc. (PANW) | CWRUOBSERVER
Trump draft status could be an issue in S.C. | Politics - WPTZ Home
Russia Cracks Down on Financial Hacking Ring, Raiding Moscow Office: Sources
IT Certification Training: $30 Security & Ethical Hacking Courses
Exploiting Google Maps for Fraud - Schneier on Security
9-Figure Deals Lift Cybersecurity Investments To An All-Time High
India temporarily Bans Facebook's Free Internet Service
It's time to stop waiting for the Apple Watch's killer app | Macworld
Critical security flaws discovered in Netgear NMS300 software |
Lumia 650 Looks Awesome on the Outside, Ugly on the Inside
Carbanak 2.0, Metel, GCMAN Borrow from APT Attacks | Threatpost | The first stop for security news
Firms Feel More Confident In Ability to Thwart Data Breaches | Information Management Online
Optomany to make a stand at RBTE 2016 - Essential Retail
TI Sparkle's Greek operations receive PCI-DSS certification - Telecompaper
Oracle posts security patch for bug that could result in 'complete compromise' of Windows machines | ZDNet
Oracle issues an emergency patch to Java for Windows
Dyre Wolf Banking Malware Stole More Than $1 Million
NSA reorganization to combine offense, defense - Baltimore Sun
Week ahead: Senate to sanction North Korea | TheHill
Internet of Thieves - Government must take a lead in Internet of Things security - Jerry Fishenden
Cybersecurity And Data Privacy: 2016 Outlook - Data Protection - United States
Showdown in Europe over privacy leaves US companies worried - Times of India
Data protection unlocked Understanding the EUUS Privacy Shield- Publications - Eversheds International
Out of sight out of mind: how to tackle the 'culture of complacency' around the cloud | Information Age
John Ragsdale: Make Your Field Techs 'Mobile Power Users' - Field Service Digital
Ada County voters may see faster results with new election system | Idaho Statesman
Suspected Pakistan-based hackers behind the Indian government's IRS cyber attack | Latest News & Updates at Daily News & Analysis
Social Media Wall: TheSAS2016 - Securelist
TaxSlayer Software Developers Reveal Data Breach | TechBeat
Businessman sues Google over 'data breach' |
Check Point super-sizes appliance for SMEs | IT-Online
BUSINESS IN BRIEF 8/2 - News VietNamNet
Don't Fall for the CrashSafari Scam that Crashes Macs and iPhones - Apple/Mac on Top Tech News
How to determine if big data security analytics will produce useful outcomes | Networks Asia | Asia's Source for Enterprise Network Knowledge
Worldcore - The World's First EU-regulated Payment Institution Offering... -- PRAGUE, Czech Republic, February 8, 2016 /PR Newswire UK/ --
WSJ's Beijing Bureau Reveal Their Favorite Foods | the Beijinger
Guest speaker Margaret Hu discusses cyber surveillance in the modern world | News |
Bourne 5 Will Be Called Jason Bourne |
Semiconductor Engineering .:. What Is Cyberwarfare?
Super Bowl 50: Matt Damon returns as Jason Bourne in new trailer | News | Culture | The Independent
Cisco Spends $1.4 Billion on Jasper IoT Platform - Unified Communications on Top Tech News
A new report paints an alarming picture about the kind of cybercrime you rarely hear about - Business - The Herald News, Fall River, MA - Fall River, MA
IRS Website Defaced by Suspected Pakistani Hackers | NDTV
Hacker Plans to Dump Alleged Details of 20,000 FBI, 9,000 DHS Employees | Motherboard
IRS website defaced: Hackers from Pakistan suspected – Tech2