And Then There Were None: Europe, the Internet, and the Right to Be Forgotten – Blog Post – RSA Conference
Techday – Moving beyond fear with business assurance technology
Microsoft misses Windows bug, hackers slip past patch | Computerworld
How to upgrade to Kaspersky Internet Security 2015 - YouTube
Trend Micro sur Twitter : "The Home of the Future. #NCSAM"
New AWS Directory Service
Websense® Office of the CSO Resources —
SSLv3 "POODLE" Vulnerability CVE-2014-3566
Indianapolis Cyber Security Summit aims to fight back against computer hackers | Fox 59
Maybe there really is an Ebola (malware) outbreak | CSO Online
Securing Your Online Reputation - YouTube
SANS Institute
Officials: 500M records stolen
AT&T revenue misses forecasts as more customers bring own phones - News - AM 590 - WKZO Everything Kalamazoo
Google Nexus 6 vs. Apple iPhone 6 Specs, Review & Comparison: Ecosystems Matter Now : Tech : Latin Post
Tablets, cars drive AT&T wireless gains_not phones | The Miami Herald
US Legislator Demands Snowden be Charged with Murder | News | teleSUR
FBI Charges NOAA Worker With Swiping Data on Dams
Apple issues China iCloud security warning | South China Morning Post
No Application for Amenities Board Funding for 2015/16 | Scoop News
AT&T; revenue misses forecasts as more customers bring own phones | Daily Mail Online
FBI Arrests NOAA Employee for Stealing Sensitive Dam Information : World : Chinatopix
Maritime Union backs change of Government | Scoop News
Hacker gets two-years in case involving penetration of government computers - News
Health Care Equipment Could Be Vulnerable to Hackers | The Fiscal Times
US focus on naming foreign hackers gets criticized | TheHill
AVG Technologies Previews New Identity-as-a-Service “CloudCare SSO” at Cloud Summit | AVG Now
Grrcon 2014 - Biohacking: Becoming The Best Me I Can Be
Security Conferences - Security Events - Trend Micro USA - Trend Micro USA
Competitive Landscape: Carrier-Class Network Firewalls
The Savvy Security Leader: Using Guerrilla Tactics to ID Security Program Resources – Video – RSA Conference
Websense 2015 Security Predictions Report
Courthouse News Service
Quick Facts About Ebola | NCPR News
Apple’s iCloud service under attack in Mainland China - MarketWatch
Hackers may have infiltrated iCloud: blog | Sarnia Observer
Apple issues security warning for iCloud amid reports of hacking in China - The Economic Times
AT&T Q3 Revenue, EPS Miss, Shares Slip; Cuts Year Growth View - Tech Trader Daily -
Metro-east news from Belleville, IL | Belleville News-Democrat
Apple says hackers attacked iCloud -
The pit and the pendulum - Lexology
Survey: Data breaches could keep shoppers away
I.T. boss accused of hacking will get new trial |
Staples data breach raises question of - Silicon Valley Business Journal
The Pueblo Chieftain |Will Apple Pay be the next iRevolution?
Hackers targeting phones for bank info | World | 3 News
Microsoft Outlines Windows 10 Security and ID Management Controls --
VA: Hackers Never Siphoned Data Out of its Systems -
Microsoft warns users about 0-day behind PowerPoint attacks • The Register
FBI: No evidence that JPMorgan hack was payback for sanctions against Russia - The Washington Post
AT&T; revenue rises less than expected| Reuters
McAfee Delivers New Product Portfolio For Small and Medium-Sized Businesses
Google Introduces Enhanced Two-Factor Authentication with USB Security Key - The State of Security
Think Before you “Share” to Prevent Identity Theft -
How to Make Sure You're Visiting the Real iCloud Page
The Number of Industries Getting Classified Cyberthreat Tips from DHS Has Doubled Since July -
Google implements Security Key two-factor authentication - SC Magazine
Business Safe Online |
Red Hat Security Advisory 2014-1686-01 ≈ Packet Storm
Red Hat Security Advisory 2014-1685-01 ≈ Packet Storm
Red Hat Security Advisory 2014-1692-01 ≈ Packet Storm
You asked, we answered: #AskPtH Questions and Answers | Cyber Trust Blog
Americans fear identity theft more than getting shot to death – survey • The Register
Is your home or office internet gateway one of '1.2 MILLION' wide open to hijacking? • The Register
The Hacker News — Hacking, Cyber and Internet Security
Hackers make companies' phones call premium-rate numbers, cost them billions
Worm variant of Android ransomware, Koler, spreads via SMS - SC Magazine
Google launches support for Security Key, a simpler kind of two-factor authentication | The Verge
6 Actions Businesses Should Take During Cyber Security Awareness Month
Inside San Francisco's housing crisis — Vox
Defence-in-depth, more than a buzzword | McAfee
Feds investigating two dozen potential hacks targeting life-saving medical devices — RT USA
Earnings Challenged by Guidance from AT&T - AT&T (NYSE:T) - 24/7 Wall St.
Microsoft misses Windows bug, hackers slip past patch - Computerworld
Target rolls out free shipping for all orders during holidays - LA Times
Apple Pay: Who Won and Who Lost?
Dairy Queen latest hit by data breach
United Nations News Centre - Despite gains against tuberculosis, better research funding required – UN report
Sun Current | Richfield Dairy Queen affected by data breach
Corruption Currents: From New Jersey Mafia Hangouts to Medical-Device Hacking - Risk & Compliance - WSJ
How to Tap Your Network and See Everything That Happens On It | Life Hacker India
Windows 10 To Improve Security With Two-Factor Authentication, App Signing, More
Second Healthcare Data Breach Hits Tenn. Facility, Files Misplaced |
For Extra Safety, You Can Now Access Gmail With a Physical Key
Google USB Security Key introduced to keep out hackers | Daily Mail Online
Study: MSPs See Opportunity With Internet Of Things, But Are Slow To Act - Page: 1 | CRN
As the NSA scandal matures, outrage fizzles into business as usual | Personal Liberty
Staples reports possible data breach •
Free antivirus software for your computers | FOX C
New study finds MSPs behind on Internet of Things opportunity | Computer Dealer News
Yes, There Really is a School for Hackers in Costa Rica - Costa Rica Star NewsCosta Rica Star News
U.S. government probes medical devices for possible cyber flaws| Reuters
Thieves break into banks without entering the building |
Windows 10 Moves to Set the Bar for Security
IBM, Microsoft Collaborate on Hybrid Cloud Offerings - Microsoft/Windows on Top Tech News
Phone hacking cost small businesses $4.73 billion last year - Yahoo Finance
Windows 10 to get two-factor authentication built-in - Techworld
Have a Techie in Your Life? Hip Tablet Gift Ideas For 2014
US government probes medical devices for possible cyber flaws - The Times of India
Apple Encouraging Chrome and Firefox Users to Download Safari After Installing Yosemite - Mac Rumors
Massive malvertising campaign on Yahoo, AOL and other sites delivers ransomware | CSO Online
Attackers circumvent patch for Windows Sandworm vulnerability | Symantec Connect
Cisco supply chain CSO talks cradle to grave security - SC Magazine
New Zero-day in Microsoft OLE Being Exploited in Targeted Attacks
Bracket Aims to Tame the Cloud - Digits - WSJ
Local news from Rock Hill, SC | The Herald
Gartner identifies the Top 10 strategic technology trends for 2015 | Fort Myers Newspaper | News, Business, Real Estate and Arts in Fort Myers FL | Florida
McAfee trims prices, enhances partner margins on new SMB portfolio -
Startup wants to make cloud attractive for security-sensitive businesses | Network World
Apple Pay: What's the Big Deal? | John C. Dvorak |
Windows 10 to get two-factor authentication built-in | PCWorld
FTDI driver kills fake FTDI FT232?? - Page 1
Chinese hackers slurp iCloud passwords, Apple's CEO jumps into his jet for China • The Register
Apple issues security warning for iCloud users after attack by Chinese hackers | Latest News & Updates at Daily News & Analysis
What Google's Android 5.0 Lollipop Means For Mobile Enterprise (AAPL, BBRY, GOOG, GOOGL)
China responds over "hacker infiltration to Apple's iCloud" - Xinhua |
China-backed hackers may have infiltrated Apple's iCloud: blog| Reuters
BBC News - China denies backing iCloud hack
Phone bill premium number hack detailed | BGR
Apple CEO discusses security with top Chinese official amid hacking claims -Xinhua | Daily Mail Online
Effective security techniques we don't follow enough | ZDNet
Windows 10: Security and Identity Protection for the Modern World
Apple Pay and wearable technology could pose next threats, experts say - SC Magazine
Businesses need to prepare for the wearables invasion right now | News | TechRadar
China is hacking its own citizens’ iCloud accounts | KHON2
Apple CEO Tim Cook meets with Chinese official after iCloud attack | Computerworld
Survey: Big Data Delivers the Goods - Information Management Online Article
Staples May Have Been Breached. (Should You Just Cut Up All Your Cards?) - Forbes
Official Google Blog: An inbox that works for you
Grrcon 2014 - Autonomous Remote Hacking Drones
Windows 10: Continuing to Raise the Security Bar for Cybercriminals | Cyber Trust Blog
Could NFV be the new Google? - J-Net Community
EU group: NSA's 'balance' of security, privacy in surveillance sucks | Network World
Apple iCloud hack attempt: Is my data safe? - Recombu
DHS investigates 24 potentially deadly cyber flaws in medical devices | Computerworld
Discretix Technologies Ltd. Announces Company Name Change to Sansa Security, Inc.
Apple, China talk hacking? | TheHill
Apple claims iCloud target of hacking attacks | Business | 3 News
Possible cybersecurity flaws in medical devices probed - Technology & Science - CBC News
Microsoft warns of new Zero-Day attack | CSO Online
US probes medical devices for possible cyber flaws
Federal Audit Finds FDA Website, Internal Network Vulnerable to Hackers | RAPS
The man with the golden blood | Mosaic
How do you promote cybersecurity across your or... | Cisco Communities
5 Keys To Successfully Sell Business Continuity As A Service
US Government Probes Medical Devices for Possible Cyber-Security Flaws | NDTV Gadgets
Security Advisory 3010060 released - MSRC - Site Home - TechNet Blogs
Bricata, LLC Announces Management Team | Virtual-Strategy Magazine
Microsoft Announces New Azure Plans, Software Marketplace, and Partnerships | NDTV Gadgets
Illumio Brings Adaptive Security to Morgan Stanley, Plantronics, Creative Artists Agency, Yahoo and NTT I3 - MarketWatch
Staples warns of possible breach affecting customer credit cards - Orlando Business Journal
Apple issues iCloud security alert -
BBB Offers Tips For How To Handle A Data Breach - / State
Android’s recent encryption announcement doesn’t protect your data | TheHill
Microsoft Details Windows 10 Security Enhancements | Windows 10 content from Paul Thurrott's SuperSite for Windows
Staples Probing Possible Payment Card Data Breach | Re/code
Microsoft warns on yet another zero-day security flaw - SC Magazine UK
Blotter: Hacking in the street | Blotter | Charleston City Paper
Soundsquatting 101: How Homophones Can Lead to Risks - Security News - Trend Micro USA
Gartner Positions Wombat Security Technologies as "Leader" in Magic Quadrant for Security Awareness Computer-Based Training Vendors
Google Chrome vs. Safari
Apple: Internet Explorer? Never heard of it | Computerworld
60% of Android attacks use financial malware
Here's a bird’s eye view of Ebola epidemic | CSO Online
Are e-health records at fault for Ebola mistakes? | CSO Online
Beachhead Solutions Cited in Gartner's Magic Quadrant for Mobile Data Protection Report
Irish Water gave bank details to landlords | Irish Examiner
Bricata, LLC Announces Management Team - Press Release - Digital Journal
8 ways Big Data helps improve global water and food security |
Target will offer free shipping on all holiday items starting today -
Apple in the enterprise: For some, its already there | ZDNet
Target eyes holiday turnaround with free shipping, faux fur - Business -
Chinese hackers go after iCloud
Microsoft promises Windows 10 will mean two-factor auth for all • The Register
Apple chief meets Chinese leader amid iCloud hacking storm - Times LIVE
Simply Security News, Views and Opinions from Trend Micro, Inc
A California Couple Has Made the World's First Working Hoverboard | Motherboard
Endpoint Visibility is Key to Combatting Attacks
Identity Fraud & Data Theft – Don’t be that Guy
Watch: Target CEO leaves breach behind this holiday season
San Juan Record - Classifieds, Events, Businesses in Monticello, San Juan County, Utah - Rick Eldredge
Microsoft Security Essentials versus Lookout Security & Antivirus: Which one is for you?
FBI Warns of Hacks by Moonlighting Foreign Agents - Bloomberg
Grrcon 2014 - Cryptorush – Rising From The Ashes
Core Impact Pro Training & Certification Now Available Online | Core Security Blog
Apple Offers Guidance Following China iCloud Attack ≈ Packet Storm
Hacker, Terrorist Threats Spur Bases To Build Power Grids ≈ Packet Storm
Gartner Positions Wombat Security Technologies as "Leader" in Magic Quadrant for Security Awareness Computer-Based Training Vendors - MarketWatch
Apple CEO meets Chinese official amid iCloud hacking row
China-backed hackers target Apple's iCloud users- blog| Reuters
Chinese Authorities Hack Apple's China iCloud - Digital Life on Top Tech News
Staples is the latest company to announce a credit card breach | Digital Trends
Chinese Hackers Suspected in iCloud, Website Attacks
Apple CEO discusses security with top Chinese official amid hacking claims - Xinhua| Reuters
Apple faces another cyber attack, issues security warning for iCloud | Wall Street OTC
Local | Fort Mill Times
Chinese Hackers Defy Apple's New Security - US News
Homeland Security Today: McAfee’s Next Generation Firewall: An Integrated Approach To Government Security
Several Staples Stores Suffer Data Breach
Bugtraq: iFunBox Free v1.1 iOS - File Include Vulnerability
Bugtraq: File Manager v4.2.10 iOS - Code Execution Vulnerability
Preview redux: Microsoft ships new Windows 10 build with 7,000 changes • The Register
Pagers Shout Data Center Creds, Pop Star Airport Arrivals ≈ Packet Storm
Google Now Lets Your Prove Your Identity With A USB Security Key ≈ Packet Storm
Staples may be the latest target in string of credit card hacks - Business - The Boston Globe
Apple CEO Meets Chinese Vice Premier to Talk Information Security, Cooperation: Reports | Business | RIA Novosti
Apple CEO Tim Cook Meets with Top Chinese Official After iCloud Login Harvesting Claims - Mac Rumors
Employees Excited, Concerned About Wearables in the Workplace | CIO
ESET reveals Smart Security 8 and NOD32 Antivirus 8 | IT News Africa- Africa's Technology News Leader
Pawn Storm Espionage Attacks Use Decoys, Deliver SEDNIT - Security News - Trend Micro USA
Apple CEO Cook Meets With Top Chinese Official Amid Hacking Claims : Trending News : Auto World News
HP Delivers Threat Protection to Academic Institutions
Wearable Devices: Privacy, Security Worries Loom Large - InformationWeek
Python for Pentesters
Live chat today: Protecting your computer from viruses, hackers and scams |
Wind River Pattern Matching Engine Breaks New Ground To Address High-Performance Security For Growing NFV Needs - Intel Corporation (NASDAQ:INTC) | Benzinga
RetailNext Delivers In-Store Analytics Platform Release 5.1 to Brick-and-Mortar Retailers | Virtual-Strategy Magazine
Windows 0-day exploited in ongoing attacks, offers temporary workarounds
#CiscoChampion Radio S1|Ep 37. New Cloud Era, New Data Protection Model
Windows 10 release date | News | PC Pro
Target leaves breach behind this holiday season
Target Eyes Holiday Turnaround on Free Shipping, Faux Fur - Bloomberg
Target CEO leaves breach behind this holiday season
Apple CEO discusses security with top Chinese official amid hacking claims: Xinhua| Reuters
WebApp Sec: Re: unsubscribing from the list
Google Accounts Now Support Security Keys — Krebs on Security
Using 8 Backdoor Techniques, Attackers Steal Company Data - Security News - Trend Micro USA
Shelbyville Times-Gazette: Column: October is Cyber Security Awareness Month (10/22/14)
AVG Free Antivirus – Reliable, Sleek and Quick to Load - Ordoh
Cybersecurity Labor Shortage Hurting Battle Against Internet Attacks - Hartford Courant
WebApp Sec: unsubscribing from the list
OS X Yosemite Wi-Fi problems – can you help us solve them? | Naked Security
Mastercard and Cloudera in PCI pact - Computer Business Review
Grrcon 2014 - Around The World In 80 Cons (A Tale Of Perspectives)
PCI Compliance Under Scrutiny Following Big Data Breaches | CIO
Samsung Galaxy Note 4 tips
Attackers change home routers' DNS settings via malicious code injected in ads
Bugtraq: FreeBSD Security Advisory FreeBSD-SA-14:23.openssl
Securonix Appoints Former Bank of America Executive as Chief Scientist to Further Advance the Use of Machine Learning for Cyber and Insider Threat Detection
Symantec sees rise in high-traffic DDoS attacks | CSO Online
Industry can head off IoT privacy rules, former US official says | CSO Online
Woman charged with planting spyware on cop’s phone | Naked Security
Cloud security: Think you're blocking staff access to certain sites? Think again | ZDNet
Children To Be Taught Cyber Security Skills
Starr Launches Cyber Security & Privacy Risk Response on a Primary Basis
Finextra: Cloudera data management platform certified as PCI compliant
This Fake Log Jams Your Phone So You'll Shut Up and Enjoy Nature | WIRED
Latest Radio News, Talk Shows, Sports, Hosts, Personalities |
Insider Threats – how they affect US companies
Staples says investigating possible payment card data breach| Reuters
Staples Investigating Possible Data Breach - Network Security on CIO Today
IPhones, iPads, Macs 'safe', but Apple Inc issues security iCloud warning - Financial Express
Apple Issues ICloud Security Warning - KMBZ
The Multiple Uses of Free Antivirus Programs - The Fuse Joplin
HP Delivers Security To Academic Institutions
Google unveils Security Key | Motherboard
Changing all links: JavaScript for Pentesters task 2 write up - SecureTheLock
6 Ways Big Data Improves Food Security
UN slams mass surveillance as ‘systematic interference’ with right to privacy - Enterprise - | - Ireland's Technology News Service
Staples Investigating Possible Data Breach | Sci-Tech Today
Staples Looking Into Possible Data Breach « CBS Boston
Local and Breaking News from The Modesto Bee in Modesto, CA |
More than 70 Hong Kong government websites 'under attack from Anonymous hackers' | South China Morning Post
Hungary plans to impose new tax on Internet traffic| Reuters
Is your phone line a ‘6-figure liability waiting to happen’? | Naked Security
Bricata Launches its ProAccel Next Generation Intrusion Prevention System in Commercial and Federal Markets
Encrypted channel monitoring: The evolution of privileged access management | Government Security News
Samsung Knox devices approved for classified US government use - IT News from
Staples (SPLS) Investigating Possible Data Breach | InvestorPlace
McAfee vernieuwt Next Generation Firewall | Productnieuws | Computable
Windows 10: Has Microsoft got it right? | Channel Pro
Preparing for Windows 10
Local news from Bellingham, Whatcom County, WA |
Free is good: No-cost Panda Software tops AV-Test's rankings of antivirus software | PC World India
Tsunami siren test next week | Scoop News
Bugtraq: FreeBSD Security Advisory FreeBSD-SA-14:20.rtsold
Bugtraq: FreeBSD Security Advisory FreeBSD-SA-14:21.routed
Cyber-espionage is more difficult to pin to a state than spying in the physical world
Information Security News: Why Data Breach at Staples May Not Matter
Information Security News: NOT OK GOOGLE: Android images can conceal code
Using technology to make your business more efficient: top tips | Guardian Small Business Network | Guardian Professional
China Attack Aims at Apple iCloud Storage Service | NDTV Gadgets
Tutus' Secure Smartphone, Farist Mobile, Approved by Spanish Security Agency
Computer misuse: Brits could face LIFE IN PRISON for serious hacking offences • The Register
Apple sees iCloud attacks; China hack reported - World | The Star Online
Watchdogs inundated by quango complaints -
Apple confirms iCloud under attack as security blog reports Chinese hack - Tech2
Today in the press - RTÉ News
Apple's iCloud believed attacked by Chinese government hackers - Technology & Science - CBC News
Grrcon 2014 - Infosec In The 21st Century
Latest local breaking news by The State Newspaper in Columbia, SC | The State
Staples May Be Latest Data Breach Victim | NECN
Apple iCloud 'hacked' in China - Telegraph
Apple Pay Goes Live, Experts Talk Benefits - Apple/Mac on Top Tech News
Staples hit by data breach, with customers in Northeast hit
Staples Probing Potential Credit-Card Data Breach | Data-Driven Marketing - Advertising Age
Outgoing GCHQ boss defends agency activities after Snowden revelations | UK news | The Guardian
Information Security News: Personal information of almost 100, 000 people exposed through flaw on site for transcripts
Information Security News: NIST drafts guide for hypervisor security
Apple Adds Guide On Browser Security In Wake Of China Hack | TechCrunch
2FA: Google offers physical alternative to verification codes
Malware directs stolen documents to Google Drive
Koler worm spreads via SMS, holds phones for ransom
Think before you share that file
China attacks lead Apple to alert users on iCloud threats | CSO Online
What It Took for SpaceX to Become a Serious Space Company - The Atlantic
More than 500M financial records stolen by hackers |
Youngstown News, Staples probes possible data breach
How To Create a Windows 8 Recovery Drive [Easy, 10 Min]
Pagers shout data center creds, pop star airport arrivals • The Register
BBC News - Cyber security firm Alert Logic opens in Cardiff
ESET launches Smart Security 8 and NOD32 Antivirus 8 | IT-Online
Chinese Government Reportedly Behind Man-In-The-Middle iCloud Attacks
Users really are bringing their own devices | IT-Online
In brief: Staples reveals possible data breach - - Oct. 22, 2014
Staples is latest retailer to report data breach |
Avast 2015 gains Home Network Security check, HTTPS scanning, hardware-based virtualization
Chinese Authorities Hack Apple's China iCloud - Apple/Mac on Top Tech News
Chinese Big Brother launches nationwide attack on iCloud | Computerworld
Apple issues iCloud security alert -
Apple issues security warning for iCloud | Deccan Chronicle
Finextra: Staples investigates data breach; Moscow cleared of JPMorgan hack
Apple sees iCloud attacks; China hack reported | Capital Business
Chinese government launches cyber attack on Apple iCloud users |
China Intercepts iCloud Logins in Apparent Attempt to Steal Passwords
Business news roundup, Oct. 22 - SFGate - Dover NH, Rochester NH, Portsmouth NH, Sanford ME
Hackers may have infiltrated iCloud: blog | Sudbury Star
Apple Issues iCloud Security Warning |
China-backed hackers may have infiltrated Apple's iCloud, says Chinese web monitoring group | Latest News & Updates at Daily News & Analysis
Apple responds to iCloud network attacks with guide on verifying browser security | 9to5Mac
Hackers target phones to get bank info
The Pit and the Pendulum (and Commitment to Privacy) | The National Law Review
Steve Wozniak to teach at UTS - ARN
Staples is latestvictim of hackers - Longview News-Journal: Business
Microsoft Windows 10 Technical Preview Updated with Action Centre, UI Improvements | NDTV Gadgets
Parties sent home with report cards | Scoop News
Apple reports hacking attacks on iCloud |
Facebook Automates Fight Against Hackers - InformationWeek
Staples Says It's Investigating Potential Credit Card Data Breach | NDTV Gadgets
Grrcon 2014 - Securing Our Ethics: Ethics And Privacy In A Target-Rich Environment
AndroSec | Category | Assembly Language and Shellcoding on Linux 64 bits
WFT Announces New Services to Help Customers Design and Deploy High-Availability and Disaster-Recovery Solutions for SAP HANA® Tailored Data Center Integration
Staples investigating possible data breach_ -
Review: iPad Air 2 is gold for pros, less so for average joes - The Globe and Mail
More Hackers Targeting Mobile Phones to Get Bank Details: Kaspersky | NDTV Gadgets
'Malvertising' is the new weapon for cyberespionage: Research - The Times of India
NOT OK GOOGLE: Android images can conceal code • The Register
Staples says it’s probing potential credit-card data breach | PropertyCasualty360
Staples investigates possible data breach - LA Times
Apple Inc issues security warning for iCloud - Financial Express
Who Owns BYO Data | News | Mobile Enterprise(ME)
In dot we trust: If you keep to this 124-page security rulebook, you can own • The Register
Auto industry forming consortium to fight hackers
Apple iOS 8.1 Preview - CNE
Dark web is new battleground for GCHQ: Outgoing head of listening post says staff are focusing on 'plotters, proliferators and paedophiles' | Daily Mail Online
Auto industry trying to prevent cyber-attacks
Samsung seeks boost from redesigned Note | The Sacramento Bee
[1410.5401] Neural Turing Machines
World's Top Privacy Experts Worry About Internet Of Things - Forbes
Vormetric and Couchbase Partner to Deliver Data-at-Rest Security for Scalable, High Performance NoSQL Environments
Companies Employing ‘White Hat’ Hackers To Prevent Data Thefts « CBS Chicago
China iCloud Hack Is Latest State-Supported Attack, Report Says
Vormetric and Couchbase Partner to Deliver Data-at-Rest Security - insideBIGDATA
MarkLogic Enters the Leaders Quadrant in the Gartner 2014 Magic Quadrant for Operational Database... -
Israel's ThetaRay turns to maths to detect cyber threats| Reuters
Good Technology Buys Austin-based Macheen - SiliconHills
Chinese Government Accused of Hacking Apple (AAPL) iCloud | InvestorPlace
Apple’s iCloud may have infiltrated by China-backed hackers - Livemint
Zix Corporation (ZIXI) CEO Richard Spurr on Q3 2014 Corporation - Earnings Call Transcript | Seeking Alpha
Vormetric and Couchbase join forces - from
Meeting Assault Survivors Where They Are | Ken Brack
WebApp Sec: Re: Shameless plug: OWASP Board Elections
Austin 3rd Grader Expert On Cyber Security - Austin News, Weather, Traffic KEYE-TV Austin - Top Stories
The Top Five NERC CIP Audit Fails - The State of Security
The Ten Most Wanted Hackers by the FBI - #10 - The State of Security
FBI backtracks on Russian involvement in JPMorgan Chase breach -
Google takes 2FA a touch further with Security Key | ZDNet
Microsoft warns of Windows zero-day; hackers serve exploits in PowerPoint files - Computerworld
Keep Your Business’s Data Safe in the Cloud -
Staples Investigating Possible Credit Card Data Breach « CBS Miami
Journey Into Incident Response: Timeline Analysis by Categories
Grrcon 2014 - Social Engineering Can Kill Me, But It Can’T Make Me Care
Restenosis at Routine Angiographic Follow-up Predicts Long-term Mortality After PCI - Journal News - TCTMD
Global security firms cooperate against Chinese hackers - SC Magazine UK
China accused of hacking into Apple's iCloud server -
Google puts Chrome credentials on USB drives for two-factor authentication • The Register
Proof-of-concept worm can attack network attached storage
Sandworm Team - Targeting SCADA Systems - iSIGHT Partners
Targeted Attacks: Stealing Information Through Google Drive | Security Intelligence Blog | Trend Micro
Malware don't need Coffee: CVE-2014-0569 (Flash Player) integrating Exploit Kit
Demystifying Point of Sale Malware and Attacks | Symantec Connect
Apple grapple: Congress kills FBI's Cupertino crypto kybosh plan • The Register
Windows Incident Response: Windows Event Logs
Head of NSA, cyber security leaders coming to Augusta for education summit | The Augusta Chronicle
Embracing BYOD...with safeguards - SC Magazine
School board candidates on Common Core, teacher pay, grad rate - Local - Gaston Gazette
10 Things To Know about Windows 10 - Enterprise Software on CIO Today
Samsung seeks boost from redesigned Note | The Miami Herald
Zscaler Launches New Advanced Persistent Threat Protection With Fall 2014 -- Now Everyone Can Be Protected From Zero-Day and Advanced Threats
Apple issues security warning for iCloud - Washington Times
Hackers Target Chinese Users Accessing Apple’s iCloud | Re/code
Caselaw is Set Free, What Next? - Google Scholar Blog
Experts Warn Corporate Boards Aren't Protecting Us From Hackers
GCHQ chief: Internet has become refuge for plotters - Telegraph
In focus: Buyers of homes, burgers, soda, ads | America's Markets
UPDATE 1-Staples says probing possible payment card data breach| Reuters
Recovering disk space in Windows 8 and 8.1 | Hyperbole, Embellishment, and Systems Administration Blog
Working 4 you: Americans wary of stores affected by data breaches | Spokane/E. WA -
Chipotle gets smoked; McDonald's sales struggle; Apple gets iPhone pop | Hot Stock Minute - Yahoo Finance
Poodle: Vulnerability in old version of SSL represents new threat | Symantec Connect
Study: Canada C-Suite execs say companies prepared for threats - SC Magazine
Chinese Authorities Hack Apple's China iCloud - Cloud Computing on CIO Today
Christian Slater Will Play An Hacker Named ‘Mr. Robot’ In A USA Series
Microsoft delivers first update to its Windows 10 Technical Preview | ZDNet
Attackers are hacking company landlines to place billions in illegal calls - TechSpot
Consumers and Retailers Concerned About Hacking - NBC News
Apple Pay Goes Live, Experts Talk Benefits - Mobile Apps on Top Tech News
Why Data Breach at Staples May Not Matter (NASDAQ: SPLS) - 24/7 Wall St.
Dark web is new battleground for GCHQ: Outgoing head of listening post says staff are focusing on 'plotters, proliferators and paedophiles'  | Daily Mail Online
Slight increase in security firm McAfee's Irish profits | Irish Examiner
Big Data, IoT and Walmart: AVG's CEO Discusses Top Technology Trends | Managed Security Services content from MSPmentor
Apple Issues Security Warning for iCloud - ABC News
DailyTech - Hackers "Hit the Easy Button", Breach Staples' Credit Card System
Officials warn 500 million financial records hacked
Hackers having heyday with others' credit cards (editorial) |
Christian Slater Signs Onto USA's Hacker Series Mr. Robot | We Got This Covered
Microsoft warns of Windows zero-day; hackers serve exploits in PowerPoint files | Computerworld
WICS NewsChannel 20 :: News - Top Stories - Man Arrested For Hacking Pictures
Grrcon 2014 - Zitmo Nom
New Windows zero day being exploited through PowerPoint | ZDNet
Cloud Burst... How Jennifer Lawrence Changed My Da... - J-Net Community
Discussion Forums - J-Net Community
Federal Trade Commission Appoints Ashkan Soltani as Chief Technologist | Federal Trade Commission
Chinese APT groups targeting Australian lawyers • The Register
Hackers hit UConn, it’s all part of the program | FOX C
Opera About 1985 Achille Lauro Hijacking Draws Protests At Met | NCPR News
Christian Slater Cast In Mr. Robot |
Battling Financial Hacking - - Powered by KAMR NBC4 and KCIT FOX14
Staples investigating possible data breach | Boston Herald
How to use the Samsung Galaxy Note 4 with one hand - CNE
Christian Slater signs on to star in TV show that has not yet been canceled · Newswire · The A.V. Club
Twitter Natural Language Processing -- Noah's ARK
HP Security Bulletin HPSBUX03150 SSRT101681 ≈ Packet Storm
Incredible PBX 11 Remote Command Execution ≈ Packet Storm
WordPress Database Manager 2.7.1 Command Injection / Credential Leak ≈ Packet Storm
Files Document And PDF 2.0.2 Command Execution / Local File Inclusion ≈ Packet Storm
FileBug 1.5.1 Directory Traversal ≈ Packet Storm
Red Hat Security Advisory 2014-1676-01 ≈ Packet Storm
Red Hat Security Advisory 2014-1677-01 ≈ Packet Storm
TOR Virtual Network Tunneling Tool ≈ Packet Storm
Staples investigating possible data breach | The Miami Herald
Staples Investigating Potential Data Breach |
Staples probing possible U.S. data breach | Chatham Daily News
Microsoft Azure Award for Ebola Research - Microsoft Research - image uploaded by @SCMagazine
Mandriva Linux Security Advisory 2014-200 ≈ Packet Storm
China Denies Backing iCloud Hack ≈ Packet Storm
Mandriva Linux Security Advisory 2014-201 ≈ Packet Storm
Supreme Court To Decide Warrantless Hotel Registry Searches ≈ Packet Storm
Slackware Security Advisory - openssh Updates ≈ Packet Storm
UK Spy Drones To Fly Over Syria ≈ Packet Storm
Mandriva Linux Security Advisory 2014-196 ≈ Packet Storm
Officials Warn 500 Million Financial Records Hacked ≈ Packet Storm
Mandriva Linux Security Advisory 2014-197 ≈ Packet Storm
Mandriva Linux Security Advisory 2014-198 ≈ Packet Storm
Mandriva Linux Security Advisory 2014-199 ≈ Packet Storm
How to configure proxy server for updating Kaspersky Internet Security 2015
DOJ Will Not Challenge Cyber Security Data Sharing Platform | The National Law Review
Office of technology services hosts cyber security awareness week
For average big business, cyber-security costs reach $12.7 million - St. Louis Business Journal
Sandworm Team Went After Firms Running SCADA - Infosecurity Magazine
GOP campaign operative faces computer hacking charges | The Columbus Dispatch
Windows 10 Technical Preview updated, boasts 7,000 changes and fixes - CNE
Op-ed: Measure D — a doctor’s perspective | Berkeleyside
When Women Stopped Coding : Planet Money : NPR
Microsoft releases first Windows 10 update, starts testing fast-paced delivery system | Computerworld
Aging ATMs Draw Intense Criminal Interest - Infosecurity Magazine
Apple explains how to keep yourself safe from phishing hacks on the web | Cult of Mac
Microsoft Security Advisory 3010060
IXXAT PC/CAN interface series expanded with new PCI cards | Automation World
Google steps up web security with USB Security Key | Android Central
Will A Sting, A Court Award And A Protest Help Stop Global Sex Trafficking? | NCPR News
Dow closes up 1.3% as S&P 500, Nasdaq settle higher for fourth straight session - Proactiveinvestors (NA)
New Windows 10 Technical Preview build's '7,000 new changes' include notifications | PCWorld
Mac OS X Yosemite sends search, location data to Apple, Microsoft - Security - News -
Staples Investigating Possible Data Breach - Network Security on Top Tech News
Staples says probing possible payment card data breach| Reuters
Apple Addresses iCloud Attacks While China Denies Hacking Allegations
Grrcon 2014 - Bigger Boys Made Us
IPv6 First-Hop-Security
SCMagazine sur Twitter : "Edna Conway, CSO of global supply chain at Cisco, kicks off the keynote discussion at @sccongress"
All UMS-Wright students to be issued Apple computers in 2015 | | Study Finds Data Breaches May Affect Shoppers’ Decisions
Samsung Galaxy S5 Plus With Snapdragon 805 Listed on Company Site | NDTV Gadgets
Workers use their own devices at work, without boss's knowledge | Computerworld
How to Boost Your Phishing Detection Skills and Avoid Email Scams
Bugtraq: CFP The 12th International Joint Conference on e-business and Telecommunications ICETE 2015
More hackers targeting mobile phones to get bank info: Survey - Channel NewsAsia
Apple's Tim Cook on iPhone's wins, iPad's woes - CNE
Apple sees iCloud attacks; China hack reported
New scandal: 10 Irish Water customers had their bank details sent to their landlords
Using GNU Stow to manage your dotfiles
Pentesting with Metasploit
One week after patch, Flash vulnerability already exploited in large-scale attacks | CSO Online
Michael McKinnon sur Twitter : "Such an honour and privilege to have met @GuyKawasaki in Phoenix today. #AVGSummit"
Staples Latest Retailer Probing Possible Card Data Breach - DailyFinance
Staples investigating possible credit card data breach -
China-Backed Hackers May Have Infiltrated Apple's iCloud - Gulf Business
How the FIDO Alliance's U2F could simplify two-factor authentication | PCWorld
Bring Your Own Device (BYOD) Policies Uncovered | The National Law Review
Staples investigating possible credit card data breach -
Staples Latest National Retailer Investigating Possible Data Breach – Consumerist
Staples in Northeast likely breached with 'more to come'
Staples Data Breach Update: Office Supply Chain Announces 'Potential Issue' With Fraudulent Activity : Business : Latin Post
Gartner's Top 10 Strategic Technology Trends for 2015 - Forbes
No Easy Button Here: US Secret Service Investigates Staples Security Breach - ABC News
China is hacking its own citizens' iCloud accounts - report - Oct. 21, 2014
Staples Hack Could Compromise Credit And Debit Card Information
Staples Becomes The Latest Retailer Affected By A Payment Card Data Breach | TechCrunch
Staples May Be Latest Payment Systems Hacking Victim -
Staples investigating possible data breach -
Staples probing possible U.S. data breach | Fort Erie Times
PDF invoices may cost more than you expect | Symantec Connect
Skills set a priority over legacy prejudices, experts say - SC Magazine
Press Digest: Moscow and Beijing mull agreement on information security | Russia Beyond The Headlines
Security breach at Staples stores; customer card data stolen
How Apple Pay Mitigates Breach Fatigue - The Mac Observer
The MANA Plan for Beneficiaries and Income in Waiariki | Scoop News
More Than 500 Million Financial Records Swiped by Hackers: Official - NBC News
Apple Aware of iCloud Login Harvesting in China, Launches Browser Security Guide - Mac Rumors
Chinese government launches man-in-middle attack against iCloud | Ars Technica
Zscaler Adds Partners For SaaS-Based Security Service, Ups Battle Against Websense - Page: 1 | CRN
China's 'great firewall' being used to mount attacks on Apple's iCloud - 21 Oct 2014 - Computing News
Staples investigating potential credit card data breach, contacts law enforcement - Business - Times Colonist
More hackers targeting mobile phones to get bank info, survey says
How to set up SMS sharing with iOS 8, OS X 10.10 Yosemite - CNE
Bring-your-own-device gains traction in the U.S. — even if enterprises aren't ready yet | ZDNet
Can The New Apple iPad Air Boost AAPL Stock? - October 21, 2014 -
Apple seeks to allay concerns over Yosemite Spotlight data collection | ZDNet
Kaspersky Hunts For Virtualization Partners - Page 1 | CRN
Spike in Malware Attacks on Aging ATMs — Krebs on Security
Symantec sur Twitter : "@patkiernan @USATODAY The message is clear. #Databreach plans are no longer optional. #GoKnow"
SCMagazine sur Twitter : "Glenn Watt of Metadata Solutions discusses some of the latest threats plaguing organizations. #scny @sccongress"
Staples is investigating a potential issue involving credit card data - SC Magazine
CCNA Security Certification - IT Certifications and Career Paths - Cisco Systems
Adobe exploit used to spread Dyre credential stealer - SC Magazine
Outgoing spy chief rejects mass surveillance claims | Otago Daily Times Online News : Otago, South Island, New Zealand & International News
AT&T Earnings Preview: Next Program, Margins In Focus - Forbes
Grrcon 2014 - Full Douchesclosure
iCloud attack is blunt and obvious | ZDNet
Fraudulent activity is first hint of a Staples data breach | CSO Online
Staples Investigates Potential Credit Card Breach - The State of Security
WFT Announces New Services to Help Customers Design and Deploy High-Availability and Disaster-Recovery Solutions for SAP HANA® Tailored Data Center Integration | Virtual-Strategy Magazine
SCMagazine sur Twitter : "Expert panel takes the stage to discuss tomorrow's threats at #scny @sccongress"
AVG Business (@AVGBusiness) | Twitter
Staples investigating potential security breach of credit cards - Business - CBC News
Staples investigating possible credit card data breach (+video) -
Data Breach Confirmed By Pennsylvania Hospital
Apple's latest results reveal a company at a crossroads | Marketing Magazine
These Are the 5 Coolest Features of OS X Yosemite
Jennifer Lawrence naked 4Chan photos: Perez Hilton retaliates in strongly worded video after actress criticises him for publishing images - People - News - The Independent
Wireless Developer Network
Tablets, phones and the iPad Air2: a turning point? | euronews, hi-tech
UPDATE 3-China-backed hackers may have infiltrated Apple's iCloud -blog| Reuters
Hackers targeting Apple iCloud users in mainland China with 'massive' attack
Mana Tutorial: The Intelligent Rogue Wi-Fi Router
Bugtraq: Files Document & PDF 2.0.2 iOS - Multiple Vulnerabilities
Bugtraq: FileBug v1.5.1 iOS - Path Traversal Web Vulnerability
Data breach investigated after Irish Water discloses bank details
Harley-Davidson Inc (NYSE:HOG) Gears up on Robust Volume with LiveDeal Inc(NASDAQ:LIVE), BlackBerry Ltd (NASDAQ:BBRY) and Hewlett-Packard Company(NYSE:HPQ) | Streetwise Report
PHP vulnerabilities patched - SC Magazine
McAfee Next Generation Firewall Empowers Enterprises to More Effectively Fight Cybercrime with Expanded Threat Defense Ecosystem - MarketWatch
Hackers Leak Snapchat Photos - TECWired: News
Coke earnings disappoint; new initiatives on tap
CryptoWall: What it is and how to protect your systems - TechRepublic
Azure Data Center Comes to Australia as Microsoft Aims for Cloud Domination | Data Center Knowledge
I Hate Puzzles: Am I Still A Programmer? --
Juniper Networks sur Twitter : "#SRX is your middle name. Tell us how you would achieve installation success."
BlackBerry shares spurred by Lenovo takeover rumours - The Globe and Mail
Lenovo looking to buy BlackBerry: Report - The Times of India
Five Free Mobile Apps Every IT Professional Needs | PCWorld
Staples is investigating a possible data breach - The Washington Post
Log into Gmail with a USB drive -- Google adds support for Security Key
avast! Free Antivirus 2015 released for download - Neowin
Windows 10 Download- Best Features
Staples probing possible payment card data breach - The Globe and Mail
Consumer News: Holiday Data Breach, McDonalds Menu, and Student Loans -
Staples says probing possible payment card data breach
Bugtraq: [ MDVSA-2014:200 ] bugzilla
Bugtraq: [ MDVSA-2014:201 ] kernel
Pennyslvania man sentenced after 'swatting' prank - SC Magazine
SCMagazine sur Twitter : "Security experts perform a live demo during the keynote presentation of @sccongress #scny"
Edward who? GCHQ boss dodges Snowden topic during last speech • The Register
Sourcebooks payment card breach impacts more than 5,000 customers - SC Magazine
Walk the Juniper MIB - J-Net Community
Google remove Jennifer Lawrence nude photo links from search results | Sugarscape |
Google teams with FIDO’s U2F USB Security Key - SlashGear
Cyber insurance: Worth it, but beware of the exclusions | CSO Online
Cyber security experts in Minneapolis as data breach concerns rise - Rick Kupchella's –
SweetAlert for Bootstrap
OS X Yosemite's Spotlight Suggestions: Privacy killer or not?
Cisco Advanced Malware Protection: Continuous Analysis and Retrospective Security - YouTube
Bugtraq: [ MDVSA-2014:197 ] python
Bugtraq: [ MDVSA-2014:198 ] mediawiki
Vulnerabilities addressed in Apple TV 7.0.1, iOS 8.1 updates - SC Magazine
IBM Lays Internet Of Things Foundation - InformationWeek
Apple Pay: what does the future hold for businesses? | News | TechRadar
Louis DeBroux: Feds Angry at Apple, Google, for Thwarting Unauthorized Spying — The Patriot Post
NSA: Samsung Knox Devices Safe for Classified Info | News & Opinion |
OS X Yosemite: Top 10 features | IT PRO
Analysis: Ushering in the IoT era among consumers, industries | The Jakarta Post
Technology alone isn't going to secure IoT connected devices - SC Magazine
Cisco announces winners of Security Grand Challenge - SC Magazine
Good Technology acquires Macheen, bolsters BYOD efforts | ZDNet
Staples Investigates Reports of Possible Credit Card Data Breach
Staples investigating possible credit card data breach  - NY Daily News
China hackers may have hacked Apple's iCloud
Bricata Launches its ProAccel Next Generation Intrusion Prevention System in Commercial and Federal Markets - Press Release - Digital Journal
Hacking the optimal office space | Guardian Sustainable Business |
UK spy chief rejects mass surveillance claims | Europe | Worldbulletin News
Avoiding systemd isn't hard
We must retain our freedoms - TimesDaily: Editorials
Staples On Alert After Card-Theft Hack Attack | Orange UK
Grrcon 2014 - Finux’S Historical Tour Of Ids Evasion, Insertions, And Other Odditie
SCMagazine sur Twitter : "All-star panel kicks off a discussion on cyber insurance at #scny. @sccongress"
FBI Warns of Hacks by Moonlighting Foreign Agents - Businessweek
Google Launches USB Security Key Support To Keep Accounts Safe | TechCrunch
Microsoft Battles Google, Amazon In The Cloud - InformationWeek
Allied Telesis Selects Digital Arts Filtering Solution for New Range of Next-Generation Firewalls | Virtual-Strategy Magazine
Buzzing: FBI talks JPM, China hacking — Another day, another breach: Staples — SCADA honeypot catches Chinese flies - POLITICO Morning Cybersecurity -
Microsoft's CEO comp could be eventually worth over $147 million
Hacking Ebola: New project to develop reporting tools | Media news | NSA collecting mass data on New Zealanders: Snowden
Israel's ThetaRay turns to maths to detect cyber threats - Reuters News 10/21/2014 9:37 AM
Kaspersky Lab and INTERPOL Survey Reports: 60 Percent of Android Attacks Use Financial Malware | Kaspersky Lab US
Cyber Security: The New Frontier in Crisis Preparation | Adam Fisch
Duo Security announces U2F authentication support | ZDNet
The Threat and Vulnerability Management Maturity Model | Core Security Blog
SCMagazine sur Twitter : ""It's our obligation to help get [military veterans] into our field," Winn Schwartau says at #scny @sccongress"
Flat UI Colors
Apple's iCloud Targeted in Chinese Hacking Attack: Report - NBC News
Staples looking into possible data breach | Retail Dive
NSA scandal - US companies should monitor in Germany
Your next data breach worry: Your financial adviser - Minneapolis / St. Paul Business Journal
China Accused of Launching MITM Attacks Against iCloud - Infosecurity Magazine
Outgoing UK spy chief rejects mass surveillance claims| Reuters
Nearly half of holiday shoppers won’t shop at retailers hit by hackers | New York Post
Staples Investigating Possible Payment Card Data Breach - NBC News
Digital Defense Named a “Leader” in Gartner’s Security Awareness Computer-Based Training Magic Quadrant - Press Release - Digital Journal
Apple clarifies Spotlight Suggestions data collection practices - CNE
US store Staples investigating possible theft of customer card details- The Inquirer
Staples investigating possible credit card data breach -
Bricata Launches its ProAccel Next Generation Intrusion Prevention System in Commercial and Federal Markets
Staples Investigating Possible Cedit Card Data Breach
Staples becomes the latest US retailer to investigate a potential data breach by hackers - 21 Oct 2014 - Computing News
Gartner Shows why BlackBerry Ltd (BBRY) has Chance to Survive
How to Stop OS X Yosemite's Spotlight From Sending Location, Search Data to Apple | NDTV Gadgets
Local & North Carolina state news from Raleigh, NC |
Report: Cybercrime Costs U.S. Businesses $12.7 Million Yearly, Up 10 Percent | Network Security and Data Protection Software Solutions content from The VAR Guy
Zscaler Launches New Advanced Persistent Threat Protection With Fall 2014 -- Now Everyone Can Be Protected From Zero-Day and Advanced Threats - BWWGeeksWorld
Possible Data Breach at Pa., NJ Staples | NBC 10 Philadelphia
NSA Clears The Galaxy Note 4 And Galaxy S5 For Government Use ≈ Packet Storm
California Woman Charged With Using Spyware To Tap A Cop's Phone ≈ Packet Storm
Palo Alto Networks Boxes Spray Firewall Creds Across The Net ≈ Packet Storm
Staples Investigators Frantically Pushing Easy Button After Possible Credit Card Breach ≈ Packet Storm
Clicktools - Sourcefire Inc.
JPMorgan is the Canary in the Coal Mine, and the Canary just Died | Core Security Blog
Staples probing possible payment card data breach in U.S. | Money | Toronto Sun
BBC News - Staples investigating theft of payment card data
Stock futures receive boost; Staples investigates possible data breach; Apple Pay service launches: A.M. Business News Links |
Staples investigating data breach following reports of stolen card details - IT News from
Staples probes potential theft of customer credit card data - CNE
Staples 'Investigating' Possible Payment Card Data Breach
Staples Says It’s Probing Potential Credit-Card Breach - Businessweek
Staples investigating possible payment card hack | VentureBeat | Security | by Chris O'Brien
Early Movers: MCD, VZ, KO, UTX, HOG, CMG & more
Coke profit, revenue fall on flat soda market | The Miami Herald
The Digital Worker's Guide to Doing Business on the Go | CIO
Another Major Retailer Breached |
Is Staples the Latest Victim of a Data Breach? | eCanadaNow
Latest breaking news from Hilton Head & Beaufort, SC | The Island Packet
Magic Leap Secures $542M Led By Google For “Lightweight Wearable” Tech That Merges Physical And Digital Worlds | TechCrunch
The Space Review: Big data computing above the clouds
SilverSky to be Acquired by BAE Systems -- NEW YORK, Oct. 21, 2014 /PRNewswire/ --
Information Security News: Spike in Malware Attacks on Aging ATMs
Information Security News: Staples confirms data breach investigation
Survey suggests extent of poor information security among companies. | Data Loss | The Global Recruiter Magazine
Staples Is Investigating A Possible Payment Card Data Breach - Business Insider
Hacked and ashamed? C'mon, Brits – report that cybercrime • The Register
Apple pushes out iOS 8.1 – kills the mobile POODLE and closes some, ahem, “backdoors” | Naked Security
Five PCI Compliance Amendments You Should Take a Note Of - adeo group blog Home
UK considering imprisoning ‘cowardly, venomous trolls’ for up to 2 years | Naked Security
How to Set Up Apple Pay and Add Credit Cards - Mac Rumors
Apple Pay, new features roll out as iOS 8.1 released for iPhones, iPads | ZDNet
China targets Apple's iCloud with hacking attack: Report
Staples Investigating Possible Data Breach - ABC News
iPhone 6 Off to Strong Start, iPad Sales Hit 'Speed Bump' | News & Opinion |
Continuity, cannibals, and Apple Pay: 6 key takeaways from Apple's Q4 earnings | Macworld
Lockheed Martin’s Claims on Fusion Energy Meet with Skepticism | MIT Technology Review
Grrcon 2014 - Beating The Infosec Learning Curve Without Burning Out
Facebook prowls the internet looking for your password | Naked Security
Staples warns of possible breach affecting customer credit cards - Boston Business Journal
Internet-based phone hacking targets US SMBs - The Times of India
Julian Assange: "I hope there's much still to come" - opinion - 21 October 2014 - New Scientist
Chinese government accused of attacking Apple's iCloud | ZDNet
One of the most convincing phishing attacks yet tricks you with Dropbox sharing | PCWorld
Uninstall or change a program - Windows Help
Information Security News: Researcher creates proof-of-concept worm for network-attached storage devices
Information Security News: How To Become A CISO, Part 1
Intimate Images of US Marshals From an Embedded Photographer | WIRED
Highlights of selected recent public company issues - Lexology
Cloud adoption trends in European organizations
Staples customers likely the latest victims of credit card breach
Court Sets Trial Date For Global Digital Solutions' (GDSI) Lawsuit Against Merriellyn Kett Murphy, former CEO and Sole Shareholder of Airtronic USA
Staples Calls the Cops After Potential Card Fraud Incident - Infosecurity Magazine
Staples may be latest payment systems hacking victim - CBS News
BAE Systems to buy U.S. cyber security firm SilverSky for $232.5 million| Reuters
TASS: Russia - Russia, China may soon team up to ensure information security — paper
Palo Alto Networks Brings Next-Generation Security to the Cloud -- SANTA CLARA, California, Oct. 15, 2014 /PR Newswire India/ --
AVG Antivirus
Techbytes: Federal Officials Warn Companies About Computer Hacking | Video - ABC News
Facebook Reinforces Password Security
Staples investigates possible data breach, credit card fraud | ZDNet
Information security budgets in Indian firms decline by 17% even as business loss from breaches increases by 20%: PwC report - InformationWeek – IT news & articles
BBC News - The anarchic experimental schools of the 1970s
New report may give some retailers reason to worry |
Cyber crime on the rise: Cost of cyber attacks increases by 10.4% in 2014, 21 October 2014
Review: Apple Pay in action | The Miami Herald
Gartner Identifies Top Ten Tech Trends
DLL Injection using AppInit_DLLs Part 1
Grrcon 2014 - Picking Blackberries
Course teaches ethical hacking | Albuquerque Journal News
Top 20 Mobile Security (mSecurity) Companies 2014 -- LONDON, Oct. 20, 2014 /PRNewswire/ --
Hacking a Big Danger for Small Businesses | NewsFactor Business
Staples confirms data breach investigation | CSO Online
Apple's Yosemite OS shares Spotlight search terms by default | CSO Online
Machine-Learning Maestro Michael Jordan on the Delusions of Big Data and Other Huge Engineering Efforts - IEEE Spectrum
Carders punch holes through Staples • The Register
Wi-Fi Security and Pentesting
Apple Pay Goes Live, Experts Talk Benefits - Mobile Tech on Top Tech News
Australian organisations lag in big data adoption | ZDNet
Review: Apple Pay in action | The Kansas City Star
Threat of the month: Passwords - SC Magazine
Launch of ‘hugely important’ Apple Pay limited for now in Omaha area - Money
China-backed hackers may have infiltrated Apple's iCloud: blog | Deccan Chronicle
Firm hosting numerous Vietnam newswires hit by hacking
On whose dime? Court rules California employers must pay employee cell phone expenses | Insights | DLA Piper Global Law Firm
Palo Alto Networks boxes spray firewall creds across the net • The Register
Shell is coming ...: IP-Knock Shellcode: Spoofed IP as authentication method
Microsoft gives peek at coming Windows 10 software
Windows 10 Features: Task View, Start Menu, Snap Assist and More [Updated] | Lifehacker UK
Chinese hackers may have have infiltrated Apple iCloud - IBNLive
China-backed hackers may have infiltrated Apple's iCloud: Report - The Economic Times
Microsoft Puts Up, Takes Down Windows 9 Sites | Digital Trends
Microsoft introduces Windows 10 |
Windows 10: Familiarity breeds contempt | ExtremeTech
Watch the Windows 10 presentation
5 reasons to upgrade to Microsoft Windows 10 : PERSONAL TECH : Tech Times
How to install Windows 10 Technical Preview on Oracle VirtualBox
Technology and Science News - ABC News
Quantum key security steps outside the box • The Register
Has your threat feed made you lazy
Internet Of Things Will Turn Networks Inside-Out - InformationWeek
U.S. Threatened To Fine Yahoo $250K A Day If It Didn't Release User Data | WBUR & NPR
Grrcon 2014 - Exercising With Threat Models
Error in Google Chrome after installing AVG Safe... | AVG
Banks: Credit Card Breach at Staples Stores — Krebs on Security
Is Apple Pay the next iRevolution? |
Apple's OS X Yosemite available now: Should you update? - CBS News
16-year-old Indian hacked Pakistan People’s Party site? - The Times of India
I will not submit to medical martial law; here’s why | Personal Liberty
Project Zero: Did the “Man With No Name” Feel Insecure?
In Oakland, A Sign of Some Very High Times | TechCrunch
Cloudera and Red Hat Forge Big Data Alliance - SD Times
Jennifer Lawrence blasts Perez Hilton for posting nude photos - Celebrity Buzz
Can data breaches be stopped?
Executive Cyber Intelligence Report: October 15, 2014 - The State of Security
GCHQ spokesperson says cyber terrorism is "not a concern"
Keep OS X Yosemite from sending Spotlight data to Apple | Cult of Mac
Microsoft Security Essentials vs AVG – which provides better antivirus protection and security - The REM
PwC pinpoints Millennial generation as key to wearables adoption | ZDNet
BlackBerry Passport review: Good communicator if you can overlook flaws, price - The Times of India
BlackBerry Passport review: The passport for work : Reviews, News - India Today
Jennifer Lawrence blasts Perez Hilton for posting nude photos - Daily Dish Nigeria: Microsoft Committed to Data Privacy, Security Standards
Companies Hiring ‘White Hat’ Hackers To Expose Weaknesses « CBS Boston
Survey: Nearly half of cardholders likely to avoid hacked retailers - News - WIN 98.5 Your Country - WNWN FM - Battle Creek, MI
Apple blows past revenue and earnings estimates - CBS News
BBC News - Paralysed man walks again after cell transplant
Record iPhone sales drive Apple's 3Q beat | The Miami Herald
Jennifer Lawrence Slams Perez Hilton’s Lame ‘Excuse’ for Removing Her Nude Pics | Mediaite
Researcher creates proof-of-concept worm for network-attached storage devices | PCWorld
WebApp Sec: Shameless plug: OWASP Board Elections
South Korean software app being tested at two McAllen schools - The Monitor: Local News
Windows OLE Package Manager SandWorm Exploit ≈ Packet Storm
Chinese Govt Launches MITM Attack Against iCloud ≈ Packet Storm
Techday – The next evolution in next-generation firewalls #WGImagine14
HP Data Protector EXEC_INTEGUTIL Remote Code Execution ≈ Packet Storm
Facebook Tells DEA To Stop Impersonating Users ≈ Packet Storm
Joomla Akeeba Kickstart Unserialize Remote Code Execution ≈ Packet Storm
Numara / BMC Track-It! FileStorageService Arbitrary File Upload ≈ Packet Storm
Celebrity hacking scandal: Google removes links to Jennifer Lawrence nude photos, but is the move effective? : PERSONAL TECH : Tech Times
Parkinson's Drugs Can Be A Gateway To Sin | NCPR News
Federal Officials Warn 500 Million Financial Records Hacked
Tips on Stopping Hackers From Targeting Phone Systems in Schemes to Steal Billions |
Google Tries, Fails To Remove Links To Jennifer Lawrence Nude Photos
Grrcon 2014 - Seeing Purple: Hybrid Security Teams For The Enterprise
WebApp Sec: CFP COMCOM, Elsevier: Special Issue on Security and Privacy in Unified Communications: Challenges and Solutions, Manuscript Due October 31, 2014
Beefing up cyber security in Ottawa | Ottawa & Region | News | Ottawa Sun
Staples Investigates 'Potential Issue' Involving Credit Card Data
Eye Phone? Your Next Eye Exam Might Be Done With Your Phone | NCPR News
Demand up for ethical hackers who spot and patch up breaches, AsiaOne Digital News
Enterprises scaled down information security budgets by 17% in 2014: PwC - Livemint
Red Hat Security Advisory 2014-1671-01 ≈ Packet Storm
Debian Security Advisory 3054-1 ≈ Packet Storm
LiteCart Cross Site Scripting ≈ Packet Storm
Apple Security Advisory 2014-10-20-1 ≈ Packet Storm
Apple Security Advisory 2014-10-20-2 ≈ Packet Storm
Asterisk Project Security Advisory - AST-2014-011 ≈ Packet Storm
Documenting with dignity in the Ebola zone - The Washington Post
China-backed hackers may have infiltrated Apple's iCloud - Tech News | The Star Online
Better Business Bureau warns about Community Health Systems data breach |
Is the Chinese Government Hacking Every iPhone in the Country? -
Hackers may have infiltrated Apple's iCloud |
Driver mows down soldiers - Canada News -
VentureBeat Webinar: The Private Cloud Diaries or 4 reasons your company needs private clouds | VentureBeat | Cloud | by VentureBeat Staff
Global cloud security market to reach $8.71 billion by 2019 with CAGR 15.7% - WhaTech
Staples Latest Store To Suffer Credit Card Breach - Techaeris
DDoS is the new spam...and it's everyone's problem now - SC Magazine
HP Security Bulletin HPSBHF03084 2 ≈ Packet Storm
HP Security Bulletin HPSBMU03143 ≈ Packet Storm
HP Security Bulletin HPSBMU03144 ≈ Packet Storm
HP Security Bulletin HPSBST03131 ≈ Packet Storm
Debian Security Advisory 3050-1 ≈ Packet Storm
Apple OS X Yosemite contains bug fixes, Security Update also released - SC Magazine
Staples Investigates Potential Data Breach At Northeast Locations - Forbes
London Calling: Unannounced Police Visits to Legal U.K. Gun Owners Begin
Apple Pay launches today - Oct. 20, 2014
OptiFine HD A4 (FPS Boost, HD Textures, AA, AF and much more) - Minecraft Mods - Mapping and Modding - Minecraft Forum - Minecraft Forum
Technical analysis of the SandWorm Vulnerability (... - HP Enterprise Business Community
Making a business case is crucial to speed up the mainstream SDN adoption | CIOL
Phone hacking scheme used to finance Mumbai attack: NYT - News Oneindia
Sandworm Team Targeted SCADA Systems: Trend Micro | SecurityWeek.Com
Operation DeathClick Targets US Defense Sector - Infosecurity Magazine
McAfee next generation firewall helps enterprises more effectively fight cybercrime | Government Security News
Foreign internet-based phone hackers target businesses, Mumbai terror link emerges - Financial Express
BBC News - Why firms don't want you to be brilliant at your job
Virtualizing Data for Faster, Better Decisions| Cisco Services Perspectives
Derbycon 2014 - Introducing Network-Scout: Defending The Soft Center Of Your Network
FBI Director James Comey says Apple and Google go “too far” with default encryption | Naked Security
Big Data Giants Flex at Strata + Hadoop World
Hacker Halted 2014: Johnny Long - Infosecurity Magazine
Madison Louch helped police to catch the hacker of nude celeb pictures | Latest News | Breaking News UK and Newspaper content | Daily Star
Keep your private information safe from hackers |
What you missed in Big Data: Hadoop love fest in the Big Apple | SiliconANGLE
Human error to blame for recent hacks? - IOL SciTech |
Study Finds Nearly Half of Holiday Shoppers Will Avoid Breached Retailers - The State of Security
Android.Selfmite.B | Symantec
Analysts Put Apple Pay To The Test - And It Works - Forbes
FBI Warns of Hacks By Moonlighting Foreign Agents - Bloomberg
Published for the First Time: a 1959 Essay by Isaac Asimov on Creativity | MIT Technology Review
Nigerian scammers take aim at business targets - Third Certainty
Will new commercial mobile encryption affect BYOD policy? -- FCW
Cloudera and Teradata Extend Partnership to Drive Big Data Analytics - insideBIGDATA
Grizzly bear's deadly attack - Canada News -
The fog of war can cloud both physical and digital battlefields - Infosecurity Magazine
Cybersecurity Stock Directory Update for National Cyber Security Awareness Month; Identity Theft - Fastest-growing Crime
Avoiding plastic during the holidays |
Apple profit up 20% as iPhone 6 sales soar - Business - CBC News
NDB Advisory Announces Expansion to Include South Carolina PCI QSA Services for Merchants and Service Providers | Virtual-Strategy Magazine
Florida Supreme Court rules warrants a must for real-time cell location tracking - SC Magazine
Phone hacking: Legal loophole allows police to hack into people's messages and emails - Mirror Online
Gartner Updates Magic Quadrant, Praises Kaltura, Panopto, Qumu - Streaming Media Magazine
‘Phone hacking scheme used to finance Mumbai attack’ - Mumbai Mirror
See Apple Pay Put to the Test at McDonald's - ABC News
Top 10 smartphones for business: Apple iPhone 6 – Part 3 | IT Business
Writing C in Cython « Computational Linguistics
Apple adds a few more security fixes in iOS 8.1 | ZDNet
Mac OS X Yosemite reportedly leaks location, search data | Ars Technica
Apple iOS8 and Yosemite: The latest privacy invasion - TechRepublic
Apple Pay mobile payments service to launch on Monday - CNE
Gartner: Smart Machines To Be Most Disruptive Trend | NewsFactor Network
How To Future-Proof A Business Discovering The Internet Of Things
4 Reasons Why You Should Shop at Stores That Got Hacked - 1
China is already spying on Apple iCloud users, watchdog claims • The Register
Bugtraq: APPLE-SA-2014-10-20-1 iOS 8.1
Bugtraq: LiteCart Security Advisory - Multiple XSS Vulnerabilities - CVE-2014-7183
OutSecure Inc. to host cyber security summit | Easton Courier
Hacker sentenced to 30 months in prison and $300k restitution - SC Magazine
Bugtraq: [security bulletin] HPSBMU03126 rev.2 - HP Operations Manager/Operations Agent, Remote Cross-site Scripting (XSS)
Bugtraq: AST-2014-011: Asterisk Susceptibility to POODLE Vulnerability
Phishing schemes: Don’t take the bait! -
Fake Dropbox login page nabs credentials, is hosted on Dropbox - SC Magazine
Class changer | Sandusky Register
MPs urged to decide whether to act over phone-hacking evidence | Media | The Guardian
Suspected Chinese government hackers behind new iCloud account attack | VentureBeat | Security | by Richard Byrne Reilly
Ebola In Church: A Reverend's Quarantine Spreads The Word | NCPR News
Japanese porn links found on official Connacht GAA site after reported hacking incident
Three Atlanta federal judges recuse themselves from Home Depot data breach lawsuits - Atlanta Business Chronicle
Emacs 24.4 released
Derbycon 2014 - Getting Windows To Play With Itself: A Pen Testers Guide To Windows Api Abuse
Progress on national breach notification law may stall - SC Magazine
Shoppers to Avoid Data Breach Stores Like Target (TGT) | InvestorPlace
Hacking Into Your Happy Chemicals: Dopamine, Serotonin, Endorphins and Oxytocin | Thai Nguyen
Is a $5 Billion Phone Hacking Scam Too Small to Nail for the FCC? | The Fiscal Times
Number of cancelled Australian passports doubled over last financial year: ASIO | SBS News
Bugtraq: [security bulletin] HPSBST03131 rev.1 - HP StoreOnce Backup Systems running Bash Shell, Remote Code Execution
Bugtraq: [security bulletin] HPSBST03129 rev.1 - HP StoreFabric B-series switches running Bash Shell, Remote Code Execution
JPMorgan Chase hackers missed fed gov't employee accounts - SC Magazine
Google updates piracy-fighting report - SC Magazine
More than 30 Government Technology Solution Providers Preview News before GTEC 2014 - Press Release - Digital Journal
Apple Pay Goes Live, Experts Talk Benefits - E-Commerce on CIO Today
Ebola vaccine concern - Canada News -
INSIDE Secure Introduces VAULTiTRUST to Lower Adoption Barrier to Best-in-Class Security for Internet of Things (IoT) | Business Wire
Hackers have powers beyond most countries, expert says | TheHill
FYI: OS X Yosemite's Spotlight tells Apple EVERYTHING you're searching for • The Register
Tails 1.2 Released | SecTechno
XL Group Adds New Cyber & Technology Insurance Expertise
Combining cloud with disaster recovery and business continuity
Former RSA CISO named president and COO of White Ops - SC Magazine
Bugtraq: [security bulletin] HPSBHF03084 rev.2 - HP PCs with UEFI Firmware, Execution of Arbitrary Code
Bugtraq: [security bulletin] HPSBMU03143 rev.1 - HP Virtualization Performance Viewer, Bash Shell, Remote Code Execution
How to Stop Apple From Snooping on Your OS X Yosemite Searches | WIRED
Cybersecurity becomes a top priority after data breaches - The Globe and Mail
Will Apple Pay be the next iRevolution? |
AnandTech | Apple Releases iOS 8.1 With Bug Fixes and New Features
Phone Hacking Scheme Used to Finance Mumbai Attack: NYT -The New Indian Express
Cyber Risk Report: October 13-19, 2014
TD Bank to Pay $850,000, Improve Security To End State Attorneys General Breach Case | Bloomberg BNA
Bucket list baby: Worth the hackers, extra heartache?
Will Apple Pay be the next iRevolution? | New Straits Times
Chinese government launches cyber-attack on iCloud users | TG Daily
Digital Medicine? High-Tech Health Care On the Way - NBC News
Conn. to receive $180K as part of settlement in TD Bank data breach Republican American
Connecticut joins multi-state settlement with TD Bank over data breach | The Weston Forum
Despite business losses due to security breaches, Indian firms information security spending shrinks, says PwC report | Business Standard News
Dark Reading | Security | Protect The Business - Enable Access
5 Tech Stocks That Should Start Paying Dividends
Digital Defense Named a “Leader” in Gartner's Security Awareness Computer-Based Training Magic Quadrant - BWWGeeksWorld
Jonathan Bergknoff: Building good docker images
Derbycon 2014 - Protocol Me Maybe? How To Date Scada
Protecting Customer Data in Our Cloud through Microsoft Azure | Cyber Trust Blog
Hacker Myths Debunked
Hackers, Downtime, And Deathmobiles In The Age Of Io
Apple Pay Could Be Apple's Greatest Challenge at Disruption
VMware comes (almost) full circle with Horizon Flex - Labs - a blog from
Data Breach News: Pa. Server Hacked; Records Found Dumped |
TD Bank settles with NJ over data breach
Spotlight: Privacy Advocates Furious As Apple Feature Siphons Off Location Data of Yosemite And iOS 8 Users - Forbes
State part of settlement with TD Bank
Digital Defense web training program gets high marks from security industry - San Antonio Business Journal
Telefonica unveils Disaster Recovery as a Service offering - Telecompaper
FBI — Cyber Security: Task Force Takes ‘Whole Government’ Approach
Dropbox users targeted by phishing scam hosted on Dropbox | Symantec Connect
Juniper Networks sur Twitter : "This one goes out to all our test takers out there. Great work all."
Sandworm and SCADA -
China Launches Cyber Attack As New iPhones Arrive | Fast Company | Business + Innovation
China refutes new FBI hacking claims - SC Magazine UK
Nearly half of holiday shoppers won’t shop at breached retailers - MarketWatch
Facebook Inc (FB) Warns Its Users If Their Accounts Is At Risk Of Being Compromised By Hackers - Insider Monkey
Bad News for Target: Holiday Shoppers Plan to Skip Breached Retailers - Mic
AVG's Judith Bitterli - MEF Presentation - YouTube
IGIS: No Indiscriminate Interception of NZers’ Data Found | Scoop News
Apple launches Apple Pay mobile payment service - CBS News
CSID Study Finds Most Small Healthcare Facilities Unprepared for Data Breach - MarketWatch
China executes MITM attack against iCloud and Microsoft account holders
NSS Labs: Cyber Resilience
National Cyber Security Month - Trend Micro USA
Virginia Police Have Been Secretively Stockpiling Private Phone Records ≈ Packet Storm
The ASV Process Is Broken – Part 1
We the Police: the relationship between Tempe and its protectors | ASU News | The State Press | Arizona State University
Phone hacking scheme used to finance Mumbai attack: NYT -
Apple Pay launch marks strategic shift for Apple - Business - CBC News
World's Data Protection Leaders Highlight Internet of Things, Big Data Privacy R... | Bloomberg BNA
Virginia Police Have Been Secretively Stockpiling Private Phone Records | WIRED
Information Security News: Hackers strike defense companies through real-time ad bidding
How to enable Anti-Banner in Kaspersky Internet Security 2015
Whisper CTO trashes reports that it tracks even those users who turn off geolocation | Naked Security
Visual Voicemail Hack Makes Your Messages A Snack ≈ Packet Storm
Google Changes To Fight Piracy By Highlighting Legal Sites ≈ Packet Storm
Microsoft Pulls Second Patch Tuesday Update In Three Months ≈ Packet Storm
Australian Government, private sector face increased risk from foreign hackers: ASIO report - ABC News (Australian Broadcasting Corporation)
Madison Louch helps police set up sting on celebrity nude photo hacker | Daily Mail Online
Safari 8 browser on Yosemite shows major speed boost - CNE
Holiday shoppers say they'll avoid stores hit by data breaches |
China Phishing Apple for iCloud Information - Nationwide Attack
Digital Defense Named a “Leader” in Gartner’s Security Awareness Computer-Based Training Magic Quadrant | Virtual-Strategy Magazine
U.S. Fighter Says Kurdish Militia are Outgunned - NBC News
Cyber security spend by Indian firms down 17%: PwC - The Economic Times
Bugtraq: Re: LiveZilla Security Issue
Bugtraq: [SECURITY] [DSA 3050-1] iceweasel security update
China Has Reportedly Hacked Every iPhone User In The Country
China launches “Great Firewall” attack against iCloud - Cloud Tech News
Kaltura Positioned in the "Leaders" Quadrant of the 2014 Magic Quadrant for Enterprise Video Content Management
Model blackmailed over private pictures helped police sting to capture celeb iCloud hacker - Irish Mirror Online
Cost of Cybercrime in U.S. Reaches $12.7 Million per Organization - eSecurity Planet
The security challenges of BYOPC | CSO Online
Will You Avoid Data-Breached Retailers This Holiday Season? – Consumerist
Model blackmailed over private pictures helped police sting to capture celeb iCloud hacker - Mirror Online
Bruce Schneier: NSA would rather eavesdrop than negotiate for bulk data - FierceEnterpriseCommunications
Apple, IBM deal could reach 42M new users; iPad recovery on deck? | ZDNet
Families lose money because of children on the internet
Dropbox for iOS Updated with Touch ID Integration, iPhone 6 and 6 Plus Support - Mac Rumors
Derbycon 2014 - What To Expect When You're Expecting...A Pentest
Bill Murray named 2014 ISE® Luminary Leadership Award Winner
Facebook: Dear DEA, please don’t set up fake profiles to trap criminals | Naked Security
Disk scan stops at 27% after using AVG PC TuneUp | AVG
FTC pushes big data considerations at multi-government conference - FierceGovernmentI
Chinese government apparently phishing iCloud account info with man-in-the-middle attack | 9to5Mac
With Apple Pay, Tech Giant Bets Big on Mobile Payments - NBC News
Authorities allegedly spying on iCloud users in China | Cult of Mac
Hacking Russia's leaders and getting away with it
Holiday shoppers say they'll avoid Target, other stores hit by data breaches |
Phone Hacking Scheme Used to Finance Mumbai Attack: Report
More than 30 Government Technology Solution Providers Preview News before GTEC 2014 - BWWGeeksWorld
Information Security News: Hackers have broken into mainstream TV
Information Security News: Sino-US cyber talks at impasse
Bugtraq: Elastix Multiple vulnerabilities (Remote Command Execution, XSS, CSRF)
KB Parallels: How can I install and activate Kaspersky Internet Security for Mac in Parallels Desktop 10?
OS X Yosemite comes with POODLE and Shellshock patches
Kaspersky Lab to Host Second Annual Government Cybersecurity Forum in Washington D.C. | Kaspersky Lab US
Kaspersky Multi-Device Security | Multi-Platform Security | Kaspersky Lab TR
Tech industry on the offensive against government | ZDNet
Phishing Scams & Identity Theft Protection – Don’t be that Guy – Trend Micro
Man Heads to Jail for Hacking Neighbor's Internet, Posting Bomb Threat | NBC 10 Philadelphia
Shellshock: How to protect yourself [UPDATED] |
Phone hacking scheme used to finance Mumbai attack: NY
Frost & Sullivan Recognizes Fortinet for Global Cyber Threat Analysis and Reporting, and Managed Security Service Provider Market Leadership
Apple iPhone 6 India launch | The Indian Express
MOSX Tumblelog - Please don’t make us use iCloud anymore
Int'l cyber security conference opens in Brunei - Xinhua |
China says no plans to restart cyber-security talks with US - E & T Magazine
Court Sets Trial Date For Global Digital Solutions' (GDSI) Lawsuit Against Merriellyn Kett Murphy, former CEO and Sole Shareholder of Airtronic USA | Virtual-Strategy Magazine
Facebook is scouring the Web for hacked passwords. Here's why : PERSONAL TECH : Tech Times
Big Data for Finance - Security and Regulatory Compliance Considerations - insideBIGDATA
Gartner: Smart Machines To Be Most Disruptive Trend - Big Data on Top Tech News
Network Security Vendors Update Firewall Portfolios
Dell Debuts SuperMassive 9800 Next-Gen Firewall - Press Releases on CIO Today
Dell Debuts SuperMassive 9800 Next-Gen Firewall - Press Releases on Top Tech News
What Is 'Personalized Learning'? Educators Seek Clarity - Education Week
Facebook takes its user protection up a notch by actively seeking password leaks - T4
Facebook scours the web for personal information to keep hackers out | Daily Mail Online
UBM Tech | More than 30 Government Technology Solution Providers Preview News before GTEC 2014
Survey: Past data breaches could hurt hacked retailers during holidays | Retail Dive
Jacaranda FM Mobi site - Relax, Ebola's not going to cause 'World War Z'
Four online romance scammers jailed – don’t get sucked in to Advance Fee Fraud! | Naked Security
Police use loophole to hack phones and email | The Times
With Apple Pay, tech giant bets big on mobile payments
Apple’s OS X Yosemite: 7 new enterprise features - Enterprise Apps Tech News
CNBC Exclusive: CNBC Transcript: Microsoft CEO Satya Nadella Sits Down with CNBC's Jon Fortt
British police using legal loophole to hack into voicemails and texts - News - News - Voice of Russia UK, Voice of Russia - UK Edition
Career planning: Where do old devs go to? - Ayende @ Rahien
Facebook trawls through paste sites for compromised credentials
President Obama's Credit Card Declined At Restaurant
McAfee presenta la versión más avanzada de McAfee Next Generation Firewall | DEFENSA PERIMETRAL | CSO España
Regaining Control of Security Complexity| Cisco Services Perspectives
Dutch gov't to take on hackers in 2015 debate - NL Times
Past data breaches could hurt hacked retailers at the holidays | Retail Dive
HP Delivers Threat Protection to Academic Institutions - MarketWatch
China may be hacking every iPhone user in the country – Quartz
Half of Americans likely to avoid retailers affected by data breaches for holiday shopping -
Sophos to offshore American support operations • The Register
Derbycon 2014 - Closing Ceremonies
How to integrate BYOD into a small business | News | TechRadar
Are data breaches creating better consumers? - The Washington Post
MobileIron Inc.: MobileIron and FireEye Join Forces To Proactively Secure Mobile Devices Against Emerging Threats And Malicious Apps
Virender Sehwag paid birthday tribute to by Sophos Antivirus - Latest Cricket News, Articles & Videos at
Piccolo, the tiny CNC-bot
Apple issues security update for OS X Mavericks -
Dell Introduces SuperMassive 9800 Next-Generation Firewall to Bring Powerful Enterprise-Level Security to Organisations of All Sizes - Media Releases - CSO | The Resource for Data Security Executives
Twitter 'news' spreads faster than Ebola #FakeCures #Malware • The Register
Obama signs Executive Order to bolster federal credit card security | CSO Online
Dropbox used for Phishing expedition | CSO Online
Pohatcong Township police responses up at Wal-Mart |
Rank Group invests in payment security - Essential Retail
Malware don't need Coffee: CVE-2014-0556 (Adobe Flash Player) integrating Exploit Kits
Information Security Management Systems seminar next month - News -
Yahoo Faced Daily Fines For Not handing Over User Data To The NSA - Technology News - redOrbit
If Ebola arrived in Canada - Canada News -
Surrendering our rights for whose convenience? - Decatur Daily: Editorials
Video: FBI warns technology companies of China-affiliated hackers - Telegraph
China again blames US for disrupted cybersecurity talks | CSO Online
Grim RIPA takes scythe to confidentiality | Feature | Law Society Gazette
H&S laws 40th anniversary: 'Nanny State' or workers' saviour? | Central - ITV News
TechCrunch Disrupt Europe 2014: News, photos and the Startup Battlefield LIVE |
An Analysis of A Windows Kernel-Mode Vulnerability (CVE-2014-4113) | Security Intelligence Blog | Trend Micro
Restore or remove file from the Virus Vault | AVG
Week in review: POODLE bug, Microsoft patches a slew of 0-days exploited in the wild
Privilege Escalation via DLL Hijacking
Monday review – the hot 19 stories of the week | Naked Security
JP Morgan Hackers Strike Again, Hit Fidelity Investments - Network Security on Top Tech News
Survey: Breached Businesses May Lose Holiday Shoppers
Derbycon 2014 - Open Source Threat Intelligence: Developing A Threat Intelligence Program Using Open Source Tools And Public Sources
Hillsborough schools begin teaching kids to cope with life online |, The Tampa Tribune and The Tampa Times
Can Apple Pay Thwart the Credit Card Hacking Trend? (AAPL)
Dell introduces SuperMassive 9800 next-generation firewall | IT-Online
Infographic: A brief history of malware
The Software Assurance Marketplace: A response to a challenging problem
Visual voicemail hack makes your messages a hack snack • The Register
Etisalat signs disaster recovery deal with Dubai Smart Govt - Telecompaper
IE 11 FULL RCE on Windows X on Vimeo
Will Apple Pay Be the Next iRevolution? - Apple/Mac on Top Tech News
Microsoft pulls another dodgy patch • The Register
Dell Debuts SuperMassive 9800 Next-Gen Firewall | NewsFactor Network
Delhiites queue up at midnight as iPhone 6, iPhone 6 Plus come to India - Financial Express
Int'l cyber security conference opens in Brunei | Shanghai Daily
'LulzSec leader Aush0k' found to be naughty boy not worthy of jail • The Register
Boot up: unfair big data, 10 security laws, Siri as a friend, Whisper investigated | Technology |
NYU News : NYU hosts 24-hour hacking marathon
Techcrunch Disrupt in London: City’s rising tech talent is the star of the show | City A.M.
Gartner: Smart Machines To Be Most Disruptive Trend - Tech Trends on Top Tech News
Secure Email and Cloud Alternatives to Gmail and Dropbox - TechSpot
Mr. Abhaxas sur Twitter : "go home twitter, you're drunk. i'll accept my bugbounty via bitcoin thx"
Inside Secure Introduces VAULTiTRUST to Lower Adoption Barrier to Best-in-Class Security for Internet of Things (IoT)
Marc Andreessen on Why Optimism Is Safest Bet -- NYMag
Derbycon 2014 -Once Upon A Time... (Infosec History 101)
Aussie satisfaction in big data lags behind global results: Accenture - CMO Australia
Big Data = Big Challenges
Gartner: Smart Machines To Be Most Disruptive Trend - Cloud Computing on Top Tech News
Changing rainfall global issue - Canada News -
Half of Holiday Shoppers Say They'll Avoid Stores That Got Hacked, Survey Finds
Stores bitten by data breaches may see shy shoppers, survey finds - Chicago Tribune
Celebrity nude photo leak: Model helps cops - Emirates 24/7
84% Of Enterprises See Big Data Analytics Changing Their Industries' Competitive Landscapes In The Next Year - Forbes
Oz privacy comish says breaches could double this year • The Register
Haskell Is Exceptionally Unsafe | Existential Type
Goodbye wallet, hello iPhone? Apple big Pay-day
Interview: Editor-at-large of Techcrunch Mike Butcher | City A.M.
New gadgets are nice, but Apple Pay is bigger deal
Avast Antivirus 2014 download vs Avira Antivirus update for iOS, Android and Windows Phone 8.1 - The REM
EM Nerd: Unclog the "Clogged Pipes" Model
Documenting with dignity in the Ebola zone |
Metadata: Facebook's software architecture
Identifying and Preventing Insider Threats - The State of Security
Symantec Canada Honey Stick Project 2014 - YouTube
UGA cancels Liberian journalist’s appearance out of Ebola concern | Political Insider blog
Media Release: Dell Introduces SuperMassive 9800 Next-Generation Firewall to Bring Powerful Enterprise-Level Security to Organisations of All Sizes
Derbycon 2014 - Hacking Mainframes; Vulnerabilities In Applications Exposed Over Tn3270
Demand up for ethical hackers who spot and patch up breaches
Social News 20/10 - News VietNamNet
Snowden Accuses Kiwi Government of Mass Surveillance Program - Infosecurity Magazine
FIRST standards to clean up messy CERTs • The Register
BBB: How to avoid cyber security issues |
Will Apple Pay Be the Next iRevolution? - Mobile Tech on CIO Today
A sinking sense of 'security' | TribLIVE