NetSecu

www.ktxs.com
www.ktxs.com
Chevy Volt is insurance group's Top Safety Pick | Money - Home
www.dailysabah.com
www.dailysabah.com
USB security flaw leaves open door for hackers | Technology | Daily Sabah
www.japantimes.co.jp
www.japantimes.co.jp
Hackers suspected in anti-communist messages on Chinese cable TV | The Japan Times
www.newsletter.co.uk
www.newsletter.co.uk
Alasdair McDonnell’s patients’ sensitive medical files found in rubble of his surgery - Belfast Newsletter
www.sacbee.com
www.sacbee.com
Former Minnesota Gophers lineman tackles hacking - Wire College Sports - The Sacramento Bee
www.newyorker.com
www.newyorker.com
When It’s Bad to Have Good Choices
www.securitytube.net
www.securitytube.net
25c3 - Running Your Own Gsm Network
www.startribune.com
www.startribune.com
Former Minnesota Gophers lineman tackles hacking after concussion ends his football career | Star Tribune
news.unm.edu
news.unm.edu
UNM establishes 'Science DMZ' network link for genomics research :: The University of New Mexico
www.nydailynews.com
www.nydailynews.com
Obama: The U.S. engaged in 'torture' of terrorism suspects after the 9/11 attacks   - NY Daily News
www.vancouversun.com
www.vancouversun.com
Facebook faces law student's class action suit over privacy violations
zeenews.india.com
zeenews.india.com
Chinese broadcaster `displays anti-Communist messages`
www.stuff.co.nz
www.stuff.co.nz
Privacy group gives NSA spying thumbs-up | Stuff.co.nz
time.com
time.com
Retailers Attacked in Malware Hack, Customer Credit Cards Jeopardized - TIME
www.techtimes.com
www.techtimes.com
Backoff: Here's why this malware is giving retailers the creeps : PERSONAL TECH : Tech Times
www.cio-today.com
www.cio-today.com
New 'Backoff' Malware Slips Undetected into Retail Systems - Network Security on CIO Today
chinadigitaltimes.net
chinadigitaltimes.net
Sensitive: Anti-Communists Hack Wenzhou TV - China Digital Times (CDT)
www.techspot.com
www.techspot.com
Department of Homeland Security warns retailers of 'Backoff' POS malware - TechSpot
windowsitpro.com
windowsitpro.com
Remote Desktop Applications Being Exploited on POS Systems | Security content from Windows IT Pro
timesofindia.indiatimes.com
timesofindia.indiatimes.com
US issues warning against data-stealing malware Backoff - The Times of India
www.industryleadersmagazine.com
www.industryleadersmagazine.com
U.S. Warns Retailers On The New 'Backoff' Malware Striking Sales Systems | Industry Leaders Magazine
www.cnbc.com
www.cnbc.com
Checking In From Home Leaves Entry for Hackers
www.tomshardware.co.uk
www.tomshardware.co.uk
Computer won't start after accidentally pulling pci mobo port shroud off! [Solved] - Graphics Cards - Graphics & Displays
www.ctvnews.ca
www.ctvnews.ca
Obama acknowledges U.S. 'tortured some folks' in aftermath of Sept. 11 | CTV News
www.kdramastars.com
www.kdramastars.com
Top Free Antivirus For Android: Antivirus Security, 360 Mobile Security, Lookout Security & Antivirus, Etc! Recap Of The Best Of The Bests! : Trending News : SITE_NAME
www.cio-today.com
www.cio-today.com
Gartner Rates Security Solutions in Annual Magic Quadrant Report - Big Data on CIO Today
www.techtimes.com
www.techtimes.com
Spies, hackers can access your computers via USB devices, experts warn : PERSONAL TECH : Tech Times
www.cio-today.com
www.cio-today.com
Gartner Rates Security Solutions in Annual Magic Quadrant Report - Enterprise Software on CIO Today
www.straitstimes.com
www.straitstimes.com
Chinese broadcaster 'displays anti-Communist messages', netizens suspect hacking
money.cnn.com
money.cnn.com
How hackers could slam on your car's brakes - Aug. 1, 2014
prwire.com.au
prwire.com.au
Press Release: LogRhythm Positioned as a Leader in Gartner’s 2014 SIEM Magic Quadrant
ibnlive.in.com
ibnlive.in.com
Despite warnings, most computers still vulnerable to hackers of start-up codes - IBNLive
www.pcworld.com
www.pcworld.com
Attackers can easily create dangerous file-encrypting malware, new threat suggests | PCWorld
www.reuters.com
www.reuters.com
Despite warnings, computers still vulnerable to hackers of start-up codes| Reuters
www.techweekeurope.co.uk
www.techweekeurope.co.uk
Paddy Power Admits Historical Data Breach
www.techtimes.com
www.techtimes.com
USB is the latest favorite hacking tool : PERSONAL TECH : Tech Times
www.myfoxlubbock.com
www.myfoxlubbock.com
Hackers exploiting international tragedies to steal information|myFOXlubbock.com | FOX 34 News Lubbock, Texas
www.securitytube.net
www.securitytube.net
25c3 - Anatomy Of Smartphone Hardware
motherboard.vice.com
motherboard.vice.com
Mysterious Malware 'Crouching Yeti' Has Infected High-Profile Targets Worldwide | Motherboard
www.securitytracker.com
www.securitytracker.com
Samba Heap Overflow in nmbd NetBIOS Name Services Daemon Lets Remote Users Execute Arbitrary Code - SecurityTracker (RSS)
bitbucket.org
bitbucket.org
flowswitch / phison — Bitbucket
dailycaller.com
dailycaller.com
Facebook Faces European Class Action Lawsuit Over Privacy | The Daily Caller
www.crn.in
www.crn.in
WatchGuard Enforcing Training, Certs In Partner Program Overhaul - CRN India
www.realwire.com
www.realwire.com
Aerohive Networks Positioned in the "Visionaries" Quadrant in the Wired and Wireless LAN Access Infrastructure Magic Quadrant
webinar.informationweek.com
webinar.informationweek.com
Mind the Gap – Addressing Shortfalls in Your Existing Security Infrastructure - Webcast - 2014-08-15 12:00:00 ED
www.thinkadvisor.com
www.thinkadvisor.com
Advisors Who Use Liquid Alts: The Business Continuity Issue
www.zdnet.com
www.zdnet.com
US warns of 'Backoff,' latest entry into POS malware market | ZDNet
www.rappler.com
www.rappler.com
Oh no, he didn't: Aquino forgot hunger
uk.reuters.com
uk.reuters.com
Student starts global class action against Facebook| Reuters
www.theguardian.com
www.theguardian.com
Hacker warned over visiting ill father in Glasgow over possible extradition risk | World news | The Guardian
www.reuters.com
www.reuters.com
RPT-Despite warnings, computers still vulnerable to hackers of start-up codes| Reuters
www.politico.com
www.politico.com
Rand Paul: Fire Brennan - Burgess Everett - POLITICO.com
www.cp24.com
www.cp24.com
Federal judge in Guam refuses to release Russian accused of hacking computers of US businesses | CP24.com
www.irishtimes.com
www.irishtimes.com
If it ain’t broke, don’t prefix it
www.scmagazine.com
www.scmagazine.com
A wake-up call for retailers - SC Magazine
packetstormsecurity.com
packetstormsecurity.com
Red Hat Security Advisory 2014-0995-01 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Ubuntu Security Notice USN-2305-1 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Mandriva Linux Security Advisory 2014-145 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Mandriva Linux Security Advisory 2014-146 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Debian Security Advisory 2993-1 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Debian Security Advisory 2994-1 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Mandriva Linux Security Advisory 2014-147 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Mandriva Linux Security Advisory 2014-148 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
HP Security Bulletin HPSBMU03081 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Tor-ramdisk i686 UClibc-based Linux Distribution x86 20140801 ≈ Packet Storm
www.pentesteracademy.com
www.pentesteracademy.com
Section Introduction and Challenge 1
www.infoworld.com
www.infoworld.com
Almost 200,000 people may have been affected by U.S. visa system crash | Data Management - InfoWorld
www.bidnessetc.com
www.bidnessetc.com
Facebook Inc. (NASDAQ:FB) News: Austrian Law Student Sues FB Over Violation Of Privacy Laws
www.gamerheadlines.com
www.gamerheadlines.com
Microsoft Security Essentials fails to make top 5 AntiVirus list
www.staffingindustry.com
www.staffingindustry.com
Benefit of Counsel: Getting Personal at Work
siliconangle.com
siliconangle.com
Software that keeps employees happy, automates deployments faster | SiliconANGLE
forums.juniper.net
forums.juniper.net
Calling all Juniper Fans! Show your support and vo... - J-Net Community
www.washingtonpost.com
www.washingtonpost.com
CIA director under fire from lawmakers after agency’s search of Senate computers - The Washington Post
www.computerworld.co.nz
www.computerworld.co.nz
Austrian privacy campaigner files 'class action' suit against Facebook over privacy policy - Computerworld New Zealand
omive.com
omive.com
omive. - Find movies based on genre, rating, directors and more.
www.securitytube.net
www.securitytube.net
25c3 - Rapid Prototype Your Life
www.forbes.com
www.forbes.com
Every USB Device Under Threat. New Hack Is Undetectable And Unfixable - Forbes
www.juniper.net
www.juniper.net
THE PRIVATE CLOUD IS OPEN FOR BUSINESS
www.cio-today.com
www.cio-today.com
USB Security Flaw Lets Hackers Hijack PCs - Network Security on CIO Today
www.tgdaily.com
www.tgdaily.com
Austrian law student sues Facebook…again | TG Daily
www.channelbiz.co.uk
www.channelbiz.co.uk
Netwrix Shares The Six Best Practices To Assure PCI ComplianceChannelBiz UK
www.bloomberg.com
www.bloomberg.com
Google Said to Plan Separating Photo Service From Google+ - Bloomberg
www.hngn.com
www.hngn.com
Russian Lawmaker's Son Detained In U.S. For Hacking Charges : News : Headlines & Global News
www.sfgate.com
www.sfgate.com
Americans' liberties in the balance - SFGate
www.symantec.com
www.symantec.com
Phishers' fake gaming app nabs login information | Symantec Connect
gamerant.com
gamerant.com
'Watch Dogs' DLC Heads To New Jersey This Fall
www.ctvnews.ca
www.ctvnews.ca
Head of Canadian spy agency says federal computers always facing cyberattack | CTV News
www.pingzine.com
www.pingzine.com
Chinese Hackers Compromised Canada’s Government Networks | Ping! Zine
www.lfpress.com
www.lfpress.com
Acknowledging hacker problem first step to fix it | The London Free Press
blog.trendmicro.com
blog.trendmicro.com
Cybercrime Exposed Part 1: The Security Risks of Phishing| Security Intelligence Blog | Trend Micro
vpncreative.net
vpncreative.net
TG-3279 Hackers Set Sights on Video Games | VPN Creative
www.scmagazine.com
www.scmagazine.com
Hackers target video game companies to lift copy protections and develop cheats - SC Magazine
kfor.com
kfor.com
Study ranks ‘Most Hackable Cars on the Road;’ Did your vehicle make the list? | KFOR.com
pittsburgh.cbslocal.com
pittsburgh.cbslocal.com
Experts Say Android Phone Users At Risk For Malicious Apps « CBS Pittsburgh
globalnews.ca
globalnews.ca
Hackers ‘constantly probing’ federal computers: CSEC chief - National | Globalnews.ca
www.kmov.com
www.kmov.com
How hackers could slam on your car's brakes | KMOV.com St. Louis
www.securitytracker.com
www.securitytracker.com
Wireshark Catapult DCT2000/IrDA/GTP/GSM/RLC/ASN.1 BER Dissector Bugs Let Remote Users Deny Service - SecurityTracker (RSS)
jerichoattrition.wordpress.com
jerichoattrition.wordpress.com
BSidesLV, Charity, and a change of heart. | Curmudgeonly Ways
securityledger.com
securityledger.com
Breaking And Entering: "Smart" Homes Easy Targets For Hacking | The Security Ledger
www.saultthisweek.com
www.saultthisweek.com
NRC's IT network must be rebuilt after hack: Feds | Sault This Week
www.cbc.ca
www.cbc.ca
Hackers 'constantly probing' federal computers, CSEC chief says - Politics - CBC News
newsroom.cisco.com
newsroom.cisco.com
High-Tech Recycling with The Internet of Everything - The Network: Cisco's Technology News Site
about-threats.trendmicro.com
about-threats.trendmicro.com
Pitfalls of Public Cloud Storage
www.federalnewsradio.com
www.federalnewsradio.com
Do's and don'ts for feds on vacation - FederalNewsRadio.com
blogs.reuters.com
blogs.reuters.com
Forcing the CIA to admit some ugly truths | The Great Debate
www.technologytell.com
www.technologytell.com
Majority of businesses continue using Windows XP | TechnologyTell
www.nationaljournal.com
www.nationaljournal.com
Obama Defends CIA Chief After Senate Computer Hacking Scandal - NationalJournal.com
www.pentesteracademy.com
www.pentesteracademy.com
Module 1: The Stack
www.securitytube.net
www.securitytube.net
25c3 - Banking Malware 101
www.ft.com
www.ft.com
GCHQ accredits degrees in cyber security to combat online attacks - FT.com
www.scmagazine.com
www.scmagazine.com
Cryptoblocker variant emerges, encryption differs from CryptoLocker - SC Magazine
www.chron.com
www.chron.com
Ex-NASA 'hackers' use ingenuity, technology to rescue first-ever moon photos - Houston Chronicle
www.pokernews.com
www.pokernews.com
Paddy Power Notifies Customers of Massive Data Breach | PokerNews
www.zdnet.com
www.zdnet.com
How one judge single-handedly killed trust in the US technology industry | ZDNet
www.crn.in
www.crn.in
Enterprise Security Segment To Grow 8 Percent In 2014 - CRN India
jilard.com
jilard.com
USB Devices Could Leave You Vulnerable to Hackers | jilard.com
insurancenewsnet.com
insurancenewsnet.com
The Association Between Protective Actions and Homicide Risk: Findings From the Oklahoma Lethality Assessment Study - Top News - InsuranceNewsNet.com
www.hngn.com
www.hngn.com
USB Devices Can Secretly Hack Personal Computers : News : Headlines & Global News
www.scmp.com
www.scmp.com
Chinese operating system? Still searching ... | South China Morning Post
www.scmagazine.com
www.scmagazine.com
Nearly 600 U.S. businesses compromised by 'Backoff' POS malware - SC Magazine
www.chinatopix.com
www.chinatopix.com
Cyber Attacks: China Disputes Canadian Hacking Charges, Demands ‘Credible’ Proof Of Allegations : World : Chinatopix
www.kdramastars.com
www.kdramastars.com
Watch Dogs 2 Plot Setting May Take Place In New York And New Jersey As Ubisoft Bashes GTA! What Did They Say? : Trending News : SITE_NAME
www.whatech.com
www.whatech.com
LogRhythm Positioned as a Leader in Gartner’s 2014 SIEM Magic Quadrant - WhaTech
money.cnn.com
money.cnn.com
Stop sharing USB Flash drives - right now - Aug. 1, 2014
blogs.avg.com
blogs.avg.com
How to keep your PC free from Adware
blogs.avg.com
blogs.avg.com
Improve smartphone battery life with AVG Cleaner for Android
about-threats.trendmicro.com
about-threats.trendmicro.com
Mobile Security and the Internet of Everything: The Smartphone Remote Hub Problem - Monthly Mobile Review - Mobile Threat Information Hub
blogs.technet.com
blogs.technet.com
The Importance of Data Classification - Microsoft Security Blog - Site Home - TechNet Blogs
tools.cisco.com
tools.cisco.com
Alert Details - Security Center - Cisco Systems (RSS)
www.csmonitor.com
www.csmonitor.com
US judge: Microsoft must turn over customer data stored in Ireland - CSMonitor.com
abcnews.go.com
abcnews.go.com
Report: CIA Officers Read Senate Emails - ABC News
www.cpapracticeadvisor.com
www.cpapracticeadvisor.com
Why Office 365 Is Good for Accounting Firms | CPA Practice Advisor
uk.reuters.com
uk.reuters.com
U.S. judge orders Microsoft to submit customer's emails from abroad| Reuters
twitter.com
twitter.com
Twitter / JuniperNetworks : Stayin' alive. #NetworkLingo ...
www.csoonline.com
www.csoonline.com
Paddy Power contacts 650,000 customers over data theft | CSO Online
www.csoonline.com
www.csoonline.com
Android vulnerability still a threat to many devices nearly two years later | CSO Online
catalogs.infocommiq.com
catalogs.infocommiq.com
Black Box - Ensure Business Continuity with Black Box Console Servers - AV-iQ
www.scmagazine.com
www.scmagazine.com
Microsoft must give gov't customer records on foreign server - SC Magazine
www.theguardian.com
www.theguardian.com
Mail did not reveal to PCC or Leveson that News of the World hacked staff | Media | The Guardian
venturebeat.com
venturebeat.com
If you're paranoid about Google Glass, here's a network tool that can shut it down | VentureBeat | Gadgets | by Richard Byrne Reilly
www.marketwatch.com
www.marketwatch.com
Cyber Safety Advocates SnoopWall and Miss Teen USA 2013 Partner to Protect the 2014 Miss Teen USA Contestants - MarketWatch
blogs.avg.com
blogs.avg.com
What to do about selfies?
www.youtube.com
www.youtube.com
Cybercrime Exposed: How to Spot a Phishing Scam - YouTube
www.securityfocus.com
www.securityfocus.com
WordPress PageflipBook Plugin 'pageflipbook_language' Parameter Local File Include Vulnerability (RSS)
www.securityfocus.com
www.securityfocus.com
WordPress A Page Flip Book Plugin 'pageflipbook.php' Local File Include Vulnerability (RSS)
www.scmagazine.com
www.scmagazine.com
Study: CISO leadership capacity undervalued by most C-level execs - SC Magazine
www.scmagazine.com
www.scmagazine.com
Android malware spreads via mail tracking SMS spam - SC Magazine
betabeat.com
betabeat.com
Student Leading Class Action Lawsuit Against Facebook Over Privacy | Betabeat
www.crn.com
www.crn.com
Sign Of The Times: When Identity Access Management Platforms Aren't Ready For The Cloud - Page: 1 | CRN
www.tuaw.com
www.tuaw.com
Daily Deals for August 1, 2014, featuring Flip PDF For Mac | TUAW: Apple news, reviews and how-tos since 2004
www.pcworld.com
www.pcworld.com
Microsoft reveals Windows Phone 8.1's first update, with welcome new features | PCWorld
www.thestar.com
www.thestar.com
Hackers ‘constantly probing’ federal computers, says Canada’s electronic spy chief | Toronto Star
blog.nullspace.io
blog.nullspace.io
The time I found a bug in the .NET framework and fixed it by hand-altering the DLL.
www.insidecounsel.com
www.insidecounsel.com
What’s next in consumer data breach litigation? Minimizing the risk
www.tripwire.com
www.tripwire.com
Energetic Bear Still Going Strong, More Than 2,800 Infected - The State of Security
www.youtube.com
www.youtube.com
VRF-table-label - YouTube
www.pcworld.in
www.pcworld.in
Message to IT from Mac users: Tread lightly | PC World India
gazette.com
gazette.com
Judge won't free Russian accused of hacking in US
www.theguardian.com
www.theguardian.com
US Senate unanimously approves $225m funding for Israel's Iron Dome | World news | theguardian.com
www.pcmag.com
www.pcmag.com
Facebook Hit With Privacy Class-Action Suit | News & Opinion | PCMag.com
www.charlotteobserver.com
www.charlotteobserver.com
Irish bookmaker apologizes for 2010 data breach | CharlotteObserver.com
blog.trendmicro.com
blog.trendmicro.com
Simply Security News, Views and Opinions from Trend Micro, IncWhen Cyber Thieves Disrupt Your Life – Online Financial Threats » Simply Security News, Views and Opinions from Trend Micro, Inc
www.scmagazine.com
www.scmagazine.com
Canada's NRC breach work of Chinese state-sponsored actor - SC Magazine
blogs.microsoft.com
blogs.microsoft.com
White House highlights value of partnership in cybersecurity regulation | Microsoft on the Issues
www.newsletter.co.uk
www.newsletter.co.uk
Lo urges big gay pride turnout - Belfast Newsletter
www.therem.org
www.therem.org
BBM app beta version open to Windows Phone - The REM
www.ft.com
www.ft.com
Fuel retailers to blame for UK drive-away crime, minister says - FT.com
consortiumnews.com
consortiumnews.com
Israel’s ‘Iron Dome’ Business | Consortiumnews
www.ft.com
www.ft.com
‘Hack Attack: How the Truth Caught Up with Rupert Murdoch’, by Nick Davies - FT.com
www.theglobeandmail.com
www.theglobeandmail.com
Q&A: Introducing Target’s New Chairman and CEO Brian Cornell - The Globe and Mail
www.belfasttelegraph.co.uk
www.belfasttelegraph.co.uk
Belfast patients' medical files found on demolition site of Alasdair McDonnell's former GP surgery - BelfastTelegraph.co.uk
www.foreignpolicy.com
www.foreignpolicy.com
Exclusive: Pro-Democracy Hackers Infiltrate Chinese TV Station
www.infopackets.com
www.infopackets.com
Most Antivirus Not Secure, Exploitable: Report | www.infopackets.com
www.communitypress.ca
www.communitypress.ca
NRC's IT network must be rebuilt after hack: Feds | The Community Press
www.scmagazine.com
www.scmagazine.com
Google hands litany of 'right to be forgotten' woes to EU regulators - SC Magazine
www.nintendo.co.jp
www.nintendo.co.jp
任天堂ホームページ:任天堂製品に関連するオープンソースソフトウェアのソースコード配布ページ
www.securitytube.net
www.securitytube.net
25c3 - Making The Theoretical Possible
www.pastemagazine.com
www.pastemagazine.com
Six Tech Advancements from the 60s That Changed the World :: Tech :: Lists :: Paste
outsidelens.scmagazine.com
outsidelens.scmagazine.com
Watch "Fireside chat with Layer7's Dimitri Sirota" Video at SCMagazine
www.armytimes.com
www.armytimes.com
At West Point symposium, top leaders ponder 'the Army ethic' | Army Times | armytimes.com
www.newsobserver.com
www.newsobserver.com
WASHINGTON: CIA director reverses himself on Senate spying | Technology | NewsObserver.com
blogs.technet.com
blogs.technet.com
Threats in the Cloud – Part 1: DNS Attacks - Microsoft Security Blog - Site Home - TechNet Blogs
www.securityfocus.com
www.securityfocus.com
Linux Kernel CVE-2014-3534 Local Privilege Escalation Vulnerability (RSS)
forums.juniper.net
forums.juniper.net
Just Getting It Done (with Routing Policy!) - J-Net Community
seekingalpha.com
seekingalpha.com
Will Multi-Platform BBM Help BlackBerry? - BlackBerry Ltd. (NASDAQ:BBRY) | Seeking Alpha
www.geek.com
www.geek.com
Security researchers flag USB drives as instruments of evil | Apps and Software | Geek.com
www.toptechnews.com
www.toptechnews.com
USB Security Flaw Lets Hackers Hijack PCs - Computing on Top Tech News
healthitsecurity.com
healthitsecurity.com
HIPAA Omnibus Rule compliance tips for healthcare law firms | HealthITSecurity.com
www.scmagazine.com
www.scmagazine.com
PittyTiger spearphishing campaign speaks multiple languages - SC Magazine
www.theregister.co.uk
www.theregister.co.uk
Hey, big spender. Are you as secure as a whitebox vendor? • The Register
symantecevents.verite.com
symantecevents.verite.com
Get Greater Control and Simpler Management of Your Confidential Data | Symantec
www.sheffieldtelegraph.co.uk
www.sheffieldtelegraph.co.uk
awardGold is a safe bet for AESSEAL - Sheffield Telegraph
www.bidnessetc.com
www.bidnessetc.com
Twitter Inc (NYSE:TWTR) Bothered With Rise In Government Requests To Access User Data
www.tomsguide.com
www.tomsguide.com
Mass Hacking of iOS Devices Possible, Researchers Say
www.techweekeurope.co.uk
www.techweekeurope.co.uk
HP Grants OpenVMS New Lease Of Life
www.irishtimes.com
www.irishtimes.com
Privacy campaigner begins class-action against Facebook
www.businessinsurance.com
www.businessinsurance.com
Irish gambling site reveals data breach | Business Insurance
www.tripwire.com
www.tripwire.com
Danger USB! Could a flash drive's firmware be hiding malware?
finance.yahoo.com
finance.yahoo.com
Is Your Bank Account Safe From the Latest Phishing Scam? - Yahoo Finance
twitter.com
twitter.com
Twitter / JuniperNetworks : RT @jameshiggins68: ...
www.independent.ie
www.independent.ie
Paddy Power lambasted over delay in reporting data breach - Independent.ie
www.theinquirer.net
www.theinquirer.net
Paddy Power confesses to data leak hitting 650,000 users- The Inquirer
www.v3.co.uk
www.v3.co.uk
Paddy Power admits to 2010 data breach - IT News from V3.co.uk
www.telegraph.co.uk
www.telegraph.co.uk
Paddy Power hack 'almost certainly' led to ID theft - Telegraph
www.bitterwallet.com
www.bitterwallet.com
Paddy Power get cyber attacked | BitterWallet
www.theguardian.com
www.theguardian.com
Paddy Power admits personal details of 649,000 customers were stolen in 2010 | Technology | The Guardian
www.itproportal.com
www.itproportal.com
Paddy Power humiliated by data breach it took 4 years to fess up to | ITProPortal.com
www.computing.co.uk
www.computing.co.uk
‘Irresponsible and senseless’ Paddy Power says 650,000 users’ details were stolen in 2010 - 01 Aug 2014 - Computing News
www.ndtv.com
www.ndtv.com
Hacking Attack in Canada Bears Signs of Chinese Army Unit - Expert - NDTV
vpncreative.net
vpncreative.net
Paddy Power Discover 4 Year Old Breach, 649K Users Affected | VPN Creative
www.irishmirror.ie
www.irishmirror.ie
Paddy Power say 650,000 customers affected by 2010 cyber attack - Irish Mirror Online
www.thejournal.ie
www.thejournal.ie
Had a Paddy Power account in 2010? You need to read this · TheJournal.ie
seclists.org
seclists.org
Information Security News: Hacker group targets video game companies to steal source code
www.valleybusinessjournal.com
www.valleybusinessjournal.com
Business Continuity Planning: Just the Basics - Valley Business Journal
www.wired.co.uk
www.wired.co.uk
Facebook hit with international class action privacy suit (Wired UK)
www.standard.co.uk
www.standard.co.uk
Hacking it with the anti-Murdoch crowd - Diary - News - London Evening Standard
insurancenewsnet.com
insurancenewsnet.com
Gillibrand Introduces New Cyber-Security Legislation After New 9/11 Commission Report Released Last Week Concluded A "9/10 Ability To Protect Against... - Top News - InsuranceNewsNet.com
www.csoonline.com
www.csoonline.com
Attackers can easily create dangerous file-encrypting malware, new threat suggests | CSO Online
blog.trendmicro.com
blog.trendmicro.com
Simply Security News, Views and Opinions from Trend Micro, IncWWCD?: Clark Griswold’s Vacation Planning in the Internet Age » Simply Security News, Views and Opinions from Trend Micro, Inc
www.youtube.com
www.youtube.com
How Safe Is Your Wearable Tech? Tracking and Monitoring - Symantec - YouTube
www.securityfocus.com
www.securityfocus.com
ModSecurity Quote Parsing Security Bypass Vulnerability (RSS)
www.securityfocus.com
www.securityfocus.com
ejabberd 'mod_pubsub' Module Denial of Service Vulnerability (RSS)
www.theregister.co.uk
www.theregister.co.uk
Pentagon hacker McKinnon can't visit sick dad for fear of extradition • The Register
www.information-age.com
www.information-age.com
Information-centric security: Protecting data from the inside out | Information Age
www.govexec.com
www.govexec.com
Will the Senate Push John Brennan to Resign From the CIA? - Oversight - GovExec.com
tech.firstpost.com
tech.firstpost.com
BBM for Windows Phone arrives with revamped UI, familiar features - Tech2
www.gamerheadlines.com
www.gamerheadlines.com
AVG Free Antivius or Avira Free Antivirus Which Free Antivirus is best?
mashable.com
mashable.com
Student Files Privacy Class Action Suit Against Facebook
www.theprovince.com
www.theprovince.com
Target taps outsider as CEO for first time in push to redefine itself with shoppers
www.myrtlebeachonline.com
www.myrtlebeachonline.com
WASHINGTON: CIA director reverses himself on Senate spying | Technology | MyrtleBeachOnline.com
www.huffingtonpost.com
www.huffingtonpost.com
The Country Has Big Trouble | Greta Van Susteren
www.kaspersky.com
www.kaspersky.com
Crouching Yeti: an ongoing spying campaign with 2 800+ highly valuable targets worldwide | Kaspersky Lab
www.youtube.com
www.youtube.com
Microsoft Digital Crimes Unit - YouTube
techcrunch.com
techcrunch.com
Yo Is Trying To Get Parody App YOLO & Others Pulled From The App Store [UPDATED] | TechCrunch
www.securitytube.net
www.securitytube.net
25c3 - Opening And Keynote Nothing To Hide
seclists.org
seclists.org
Information Security News: Mitigating cyber risk as healthcare data sharing accelerates
seclists.org
seclists.org
Bugtraq: C++11 <regex> insecure by default
seclists.org
seclists.org
Bugtraq: Photo WiFi Transfer 1.01 - Directory Traversal Vulnerability
blog.trendmicro.com
blog.trendmicro.com
22 Jump Street, Transformers Are Top Movie Lures for Summer | Security Intelligence Blog | Trend Micro
www.telegram.com
www.telegram.com
Target taps outsider as CEO for needed shakeup - Worcester Telegram & Gazette - telegram.com
news.morningstar.com
news.morningstar.com
Target Aims for Fresh Strategy With New CEO
www.crn.in
www.crn.in
The Security Specialist - CRN India
voiceofrussia.com
voiceofrussia.com
British MPs come out in support of whistleblowers like Edward Snowden - News - News - Voice of Russia UK, Voice of Russia - UK Edition
www.irishtimes.com
www.irishtimes.com
Privacy campaigner launches class-action suit against Facebook
www.dividend.com
www.dividend.com
Market Wrap-up for July 31 – Dividends in Focus: Target Corporation (TGT) - Dividend.com
packetstormsecurity.com
packetstormsecurity.com
Paddy Power Admits To 2010 Data Breach ≈ Packet Storm
www.abc.net.au
www.abc.net.au
Hackers steal credit card details of thousands using MyCause charity website - ABC News (Australian Broadcasting Corporation)
packetstormsecurity.com
packetstormsecurity.com
Russia Enacts 'Draconian' Law For Bloggers And Online Media ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Retailers Shot Up By PoS Scraping Brute Force Cannon ≈ Packet Storm
www.reuters.com
www.reuters.com
BlackBerry opens up BBM to Windows phone users| Reuters
www.forbes.com
www.forbes.com
Target's New CEO Brian Cornell Lacks Innovative Pizzazz - Forbes
www.theregister.co.uk
www.theregister.co.uk
IBM snaps up identity access gatekeeper tech • The Register
seclists.org
seclists.org
Bugtraq: [ MDVSA-2014:147 ] sendmail
seclists.org
seclists.org
Bugtraq: [ MDVSA-2014:148 ] dbus
instagram.com
instagram.com
Instagram
continuitycentral.com
continuitycentral.com
The six key stages of a phased business continuity planning process
www.fiercecio.com
www.fiercecio.com
New ransomware blends use of advanced encryption, Tor and Bitcoin - FierceCIO
www.securityfocus.com
www.securityfocus.com
SecurityFocus (RSS)
www.cadalyst.com
www.cadalyst.com
Is Cloud-Based CAD Ready for Prime Time? Part 3 | Cadalyst
thegardenisland.com
thegardenisland.com
Irish bookmaker apologizes for 2010 data breach - Thegardenisland.com: World
www.newsmax.com
www.newsmax.com
John Brennan Apologizes for CIA's Hacking of Senate Computers
www.informationweek.com
www.informationweek.com
Microsoft's Device Strategy: 3 Unanswered Questions - InformationWeek
ebn.benefitnews.com
ebn.benefitnews.com
The surprising consequences of health plan data breaches - Articles - Employee Benefit News
www.thejournal.ie
www.thejournal.ie
Paddy Power comes under fire over data breach · TheJournal.ie
www.marketwatch.com
www.marketwatch.com
Alteva to Present Best Practices for Business Continuity and DisasterRecovery at CVx ChannelVision Expo - MarketWatch
www.theregister.co.uk
www.theregister.co.uk
Microsoft's Euro cloud darkens: US FEDS can dig into foreign servers • The Register
yedingding.com
yedingding.com
What you should know before starting node-webkit| Do Great Things - 叶玎玎
seclists.org
seclists.org
Information Security News: Sandwich Chain Jimmy John’s Investigating Breach Claims
seclists.org
seclists.org
Bugtraq: [ MDVSA-2014:146 ] file
seclists.org
seclists.org
Bugtraq: [SECURITY] [DSA 2993-1] tor security update
www.northeastern.edu
www.northeastern.edu
How to secure the cloud | news @ Northeastern
www.net-security.org
www.net-security.org
Reactions to the Paddy Power data breach
www.reuters.com
www.reuters.com
Hacking attack in Canada bears signs of Chinese army unit: expert| Reuters
www.macobserver.com
www.macobserver.com
OS X: Configuring FileVault - The Mac Observer
bgr.com
bgr.com
Smartphone Hack: Carrier software leaves Android vulnerable to hacking | BGR
insurancenewsnet.com
insurancenewsnet.com
Gillibrand Introduces New Cyber-Security Legislation After New 9/11 Commission Report Released Last Week Concluded A '9/10 Ability to Protect Against... - Top News - InsuranceNewsNet.com
www.securityfocus.com
www.securityfocus.com
ModSecurity XML External Entity Information Disclosure Vulnerability (RSS)
www.securityfocus.com
www.securityfocus.com
Wireshark RTP Dissector CVE-2014-2907 Remote Denial of Service Vulnerability (RSS)
www.whoishostingthis.com
www.whoishostingthis.com
Which 4 Unknown Geeks Secretly Rule the Tech World?
www.reuters.com
www.reuters.com
Fitch Affirms Whitbread at 'BBB'; Outlook Stable| Reuters
www.macworld.com
www.macworld.com
Message to IT from Mac users: Tread lightly | Macworld
www.lifehacker.co.in
www.lifehacker.co.in
10 Malware Removal Apps Tested, Malwarebytes Comes out on Top | Life Hacker India
gadgets.ndtv.com
gadgets.ndtv.com
Judge Denies Motion to Release Russian Accused of Hacking in the US | NDTV Gadgets
tech.firstpost.com
tech.firstpost.com
Threat to USB sticks: Hackers can easily break in to your pen drives, researcher warns - Tech2
www.stuff.co.nz
www.stuff.co.nz
Canadian hack bears signs of Chinese army | Stuff.co.nz
kfgo.com
kfgo.com
Hacking attack in Canada bears signs of Chinese army unit: expert - News - KFGO The Mighty 790AM - Fargo Moorhead, ND
www.reuters.com
www.reuters.com
UPDATE 1-Student starts global class action against Facebook| Reuters
www.streetwisetech.com
www.streetwisetech.com
Malwarebytes: Poor Showcasing of Antivirus Protection
timesofindia.indiatimes.com
timesofindia.indiatimes.com
Researchers discover security flaw that puts 90% smartphones at risk - The Times of India
www.winnipegfreepress.com
www.winnipegfreepress.com
Cyberattack breached system holding personal data: privacy watchdog - Winnipeg Free Press
timesofindia.indiatimes.com
timesofindia.indiatimes.com
Canada takes steps to secure network after China hacking claim - The Times of India
www.pcworld.idg.com.au
www.pcworld.idg.com.au
Austrian privacy campaigner files 'class action' suit against Facebook over privacy policy - Good Gear Guide by PC World Australia
www.financialexpress.com
www.financialexpress.com
BlackBerry BBM now available for Windows phone users - Financial Express
seclists.org
seclists.org
Information Security News: Hackers Can Control Your Phone Using a Tool That’s Already Built Into It
seclists.org
seclists.org
Information Security News: Stealthy new malware snatching credit cards from retailers’ POS systems
www.Techworld.com
www.Techworld.com
Techworld: Breaking News for Business Technology & Enterprise IT - Techworld.com
www.npr.org
www.npr.org
Big Data Firm Says It Can Link Snowden Data To Changed Terrorist Behavior : The Two-Way : NPR
www.kentucky.com
www.kentucky.com
WASHINGTON: CIA admits it broke into Senate computers; senators call for spy chief’s ouster | Nation | Kentucky.com
www.pushsquare.com
www.pushsquare.com
Rumour: Will Watch Dogs' Newest DLC See You Hacking the Streets of New Jersey? - Push Square
www.mobilenapps.com
www.mobilenapps.com
BlackBerry Messenger (BBM) finally hits Windows Phone – Available as a free download now : What's App : Mobile & Apps
www.reuters.com
www.reuters.com
China slams Canada for 'irresponsible' hacking accusations| Reuters
www.sbcnews.co.uk
www.sbcnews.co.uk
Paddy Power hit by ‘historical data breach’ | SBC News
www.infoworld.com
www.infoworld.com
Most USB thumb drives can be reprogrammed to infect computers | Security - InfoWorld
www.news-sentinel.com
www.news-sentinel.com
CIA director reverses himself on Senate spying - News-Sentinel.com
www.infoworld.com
www.infoworld.com
Microsoft EMET 5.0 security tool puts a leash on plug-ins | Security - InfoWorld
www.gamingunion.net
www.gamingunion.net
Watch Dogs DLC Will Take Players To A New City | GamingUnion.net
www.reuters.com
www.reuters.com
Dublin lambasts bookmaker Paddy Power over delay in reporting data breach| Reuters
economictimes.indiatimes.com
economictimes.indiatimes.com
BBM now available for Windows Phone users - The Economic Times
tech.firstpost.com
tech.firstpost.com
You can now join a class action suit against Facebook and could win $670 in damages - Tech2
www.tweaktown.com
www.tweaktown.com
Watch Dogs DLC will have you hacking New Jersey
www.forbes.com
www.forbes.com
Enterprise Data Storage and IoT -- Time for a Reality Check - Forbes
www.schneier.com
www.schneier.com
Schneier on Security: The NSA's Patents (RSS)
outsidelens.scmagazine.com
outsidelens.scmagazine.com
Watch "The future trends of APTs" Video at SCMagazine
www.net-security.org
www.net-security.org
Competition to crack a virtual terrorist HDD, break into CCTV systems
phys.org
phys.org
China denies hacking Canadian tech research group
venturebeat.com
venturebeat.com
Former NSA director Keith Alexander may have sold classified info for $1M per month | VentureBeat | Security | by Richard Byrne Reilly
www.thestar.com.my
www.thestar.com.my
Student starts global class action against Facebook - Tech News | The Star Online
wunc.org
wunc.org
Big Data Firm Says It Can Link Snowden Data To Changed Terrorist Behavior | WUNC
www.theinquirer.net
www.theinquirer.net
GCHQ awards six UK university Masters degrees cyber security accreditation- The Inquirer
insurancenewsnet.com
insurancenewsnet.com
PCI Urges Eugene and Salem to be Aware of Potential Insurance Gaps with Ride-Share Companies - Top News - InsuranceNewsNet.com
www.tomshardware.co.uk
www.tomshardware.co.uk
Problem with graphic card and motherboard pci interface [Solved] - Graphics Cards - Graphics & Displays
www.businessweek.com
www.businessweek.com
Report: CIA officers read Senate emails - Businessweek
blogs.wsj.com
blogs.wsj.com
The Morning Risk Report: Russian Firms Take Longer to Pay–Blame Sanctions - Risk & Compliance - WSJ
vpncreative.net
vpncreative.net
Facebook Facing New Class Action From Max Schrems | VPN Creative
www.digitaljournal.com
www.digitaljournal.com
Vaultize Releases New File Sync and Share Platform With Integrated Enterprise Mobility Management and Mobile-first User Experience - Press Release - Digital Journal
kbia.org
kbia.org
Big Data Firm Says It Can Link Snowden Data To Changed Terrorist Behavior | KBIA
www.channelpro.co.uk
www.channelpro.co.uk
WatchGuard launches higher service level partner programme | Channel Pro
www.digitaltrends.com
www.digitaltrends.com
BBM Lands on Windows Phone with Tile Interface | Digital Trends
www.pcworld.com
www.pcworld.com
Austrian privacy campaigner files 'class action' suit against Facebook over privacy policy | PCWorld
www.infoworld.com
www.infoworld.com
Judge rules against Microsoft in email privacy case | Security - InfoWorld
www.infosecurity-magazine.com
www.infosecurity-magazine.com
Infosecurity - Android Malware Hijacks Voice Assistant
www.macobserver.com
www.macobserver.com
OS X Yosemite: How to Trek into Dark Mode [UPDATE] - The Mac Observer
www.wired.com
www.wired.com
Yes, Hackers Could Build an iPhone Botnet—Thanks to Windows | Threat Level | WIRED
www.infoworld.com
www.infoworld.com
Many antivirus products are riddled with security flaws | Security - InfoWorld
thefusejoplin.com
thefusejoplin.com
Adobe Flash Player 14 – Comes With Updated Features - The Fuse Joplin
www.thestar.com.my
www.thestar.com.my
Hacking attack in Canada bears signs of Chinese army unit: expert - Tech News | The Star Online
www.canadianmanufacturing.com
www.canadianmanufacturing.com
NRC system holding personal data hacked: privacy watchdog
timesofindia.indiatimes.com
timesofindia.indiatimes.com
China slams Canada for hacking accusations - The Times of India
www.wired.co.uk
www.wired.co.uk
Meet the white hat hackers keeping you safe from Big Brother (Wired UK)
www.theage.com.au
www.theage.com.au
Smartphone flaws puts users at risk
tuhdo.github.io
tuhdo.github.io
Emacs Mini Manual (PART 1) - THE BASICS
www.net-security.org
www.net-security.org
Retailers warned of attacks using hard-to-spot PoS malware
www.siliconrepublic.com
www.siliconrepublic.com
France biggest user of ‘right to be forgotten’ Google EU ruling - Ireland’s communications news service – Siliconrepublic.com
www.reuters.com
www.reuters.com
Canada takes steps to secure network after China hacking claim| Reuters
www.bnd.com
www.bnd.com
WASHINGTON: CIA director reverses himself on Senate spying | Business | News Democrat
www.thefiscaltimes.com
www.thefiscaltimes.com
CIA’s Spying on Senate Staff Complicates Torture Report | The Fiscal Times
www.deccanchronicle.com
www.deccanchronicle.com
Hackers can tap USB devices in new attacks
news.xinhuanet.com
news.xinhuanet.com
Chinese FM meets Canadian counterpart - Xinhua | English.news.cn
www.symantec.com
www.symantec.com
Symantec e-Campus for Technical Product Training is free for all! | Symantec Connect
www.iol.co.za
www.iol.co.za
Canada accuses China of hacking network - IOL SciTech | IOL.co.za
www.yakimaherald.com
www.yakimaherald.com
Yakima Herald Republic | CIA confirms that employees wrongly searched Senate computers
www.stripes.com
www.stripes.com
CIA director reverses himself on Senate spying - U.S. - Stripes
www.cio-today.com
www.cio-today.com
Gartner Rates Security Solutions in Annual Magic Quadrant Report - Network Security on CIO Today
www.bellinghamherald.com
www.bellinghamherald.com
WASHINGTON: CIA admits it broke into Senate computers; senators call for spy chief’s ouster | National Politics | The Bellingham Herald
www.thonline.com
www.thonline.com
Report: CIA officers read Senate emails to gather information - THonline.com: National/World
gigaom.com
gigaom.com
Facebook faces class action privacy suit in Austria, with most of the world invited to join in — Tech News and Analysis
www.bellinghamherald.com
www.bellinghamherald.com
WASHINGTON: CIA director reverses himself on Senate spying | Technology | The Bellingham Herald
www.bbc.co.uk
www.bbc.co.uk
BBC News - Russia enacts 'draconian' law for bloggers and online media
www.thedrum.com
www.thedrum.com
The Guardian's Nick Davies mocks Piers Morgan at 'Hack Attack' book launch #DrumTV | The Drum
arstechnica.com
arstechnica.com
This thumbdrive hacks computers. “BadUSB” exploit makes devices turn “evil” | Ars Technica
www.crn.in
www.crn.in
WatchGuard Overhauls Partner Program - Security - CRN India
www.net-security.org
www.net-security.org
Targeted Cyber Attacks Review
www.net-security.org
www.net-security.org
CIA chief admits agency employees hacked Senate computers
ibnlive.in.com
ibnlive.in.com
Hackers now using mice, keyboards, pendrives, other USB devices to hack into computers - IBNLive
www.lightreading.com
www.lightreading.com
Cloudwatt Builds Snoop-Proof Cloud | Light Reading
www.f-secure.com
www.f-secure.com
Backdoor.Gates: Also Works for Windows - F-Secure Weblog : News from the Lab (RSS)
comonad.com
comonad.com
The Comonad.Reader » Letter to a Young Haskell Enthusiast
www.businesscomputingworld.co.uk
www.businesscomputingworld.co.uk
Enterprise Security: The Good, The Bad, And The Ugly | BCW
www.streetwisetech.com
www.streetwisetech.com
Security Risks using Adobe Flash Player Download
www.mediaite.com
www.mediaite.com
Flashback: CIA Director Adamantly Denied Senate Hacking Allegations Months Ago | Mediaite
in.reuters.com
in.reuters.com
Hacking attack in Canada bears signs of Chinese army unit - expert| Reuters
www.pingzine.com
www.pingzine.com
Unidentified Hackers Compromised Tor Anonymity Service | Ping! Zine
gadgets.ndtv.com
gadgets.ndtv.com
Canada Hacking Attack Bears Signs of Chinese Army Unit: Expert | NDTV Gadgets
tech.firstpost.com
tech.firstpost.com
Smartphone management flaws puts users at risk, say researchers - Tech2
www.itpro.co.uk
www.itpro.co.uk
Paddy Power data breach results in loss of 649,000 customer details | IT PRO
www.streetwisetech.com
www.streetwisetech.com
Avast & AVG - Topped Charts in Antivirus July 2014 for Android, iPhone & PC Devices
www.net-security.org
www.net-security.org
Microsoft releases EMET 5.0
www.biztechafrica.com
www.biztechafrica.com
Where DDoS is a business opportunity | BiztechAfrica Mobile,Technology & IT News Africa
www.techtimes.com
www.techtimes.com
Android Fake ID bug allows hackers to take over people’s phones : PERSONAL TECH : Tech Times
www.thestar.com.my
www.thestar.com.my
Smartphone management flaws puts users at risk, researchers say - Tech News | The Star Online
www.streetwisetech.com
www.streetwisetech.com
G Data Anti-Virus - New updates and Feature list
www.theregister.co.uk
www.theregister.co.uk
Security chap writes recipe for Raspberry Pi honeypot network • The Register
pub1.de
pub1.de
PUB1.DE - the largest public and free AS/400 on the internet
www.ciol.com
www.ciol.com
India security market is to grow 8pc in 2014, says Gartner - CIOL
www.chinatopix.com
www.chinatopix.com
Hackers Use USBs in New Attacks : Tech : Chinatopix
thefrontierpost.com
thefrontierpost.com
NSA Spying: Course and objectives
www.telegraph.co.uk
www.telegraph.co.uk
Hack Attack: How the Truth Caught Up with Rupert Murdoch by Nick Davies, review: 'exciting and important' - Telegraph
www.ozy.com
www.ozy.com
Tim West + Hacking the Food System | Rising Stars | OZY
www.net-security.org
www.net-security.org
Do CISOs deserve a seat at the leadership table?
www.net-security.org
www.net-security.org
Top 10 Facebook scams
readwrite.com
readwrite.com
None
www.nybooks.com
www.nybooks.com
Can Congress Rein In the Spies? by David Cole | NYRblog | The New York Review of Books
fivethirtyeight.com
fivethirtyeight.com
How Your City’s Public Transit Stacks up | FiveThirtyEight
www.digitaltrends.com
www.digitaltrends.com
BadUSB Can Turn Your USB Devices Against You | Digital Trends
www.cloudwedge.com
www.cloudwedge.com
A Primer on Web Hosting and Cloud Security | CloudWedge
www.abc.net.au
www.abc.net.au
'Hacking' North Korea to promote press freedom - Australia Network News (Australian Broadcasting Corporation)
www.philly.com
www.philly.com
Good Pocono memories for Jarrett
techday.com
techday.com
Techday – Calling all Aucklanders… Head to Wairau Park for the Noel Leeming Tech Expo
www.net-security.org
www.net-security.org
Guide: 6 modern security tools for Windows 8
www.securitytracker.com
www.securitytracker.com
MediaWiki Input Validation Flaws Permit Cross-Site Scripting and Clickjacking Attacks - SecurityTracker (RSS)
www.securitytube.net
www.securitytube.net
Owasp Global Webinar - Using The O2 Platform
www.bradenton.com
www.bradenton.com
WASHINGTON: CIA admits it broke into Senate computers; senators call for spy chief’s ouster | National Politics | Bradenton Herald
www.stuff.co.nz
www.stuff.co.nz
Warning: Hackers can tap USB devices | Stuff.co.nz
www.cochranetimes.com
www.cochranetimes.com
NRC's IT network must be rebuilt after hack: Feds | Cochrane Times
www.nydailynews.com
www.nydailynews.com
State Dept: ’No American is proud’ of CIA tactics  - NY Daily News
www.theregister.co.uk
www.theregister.co.uk
Retailers shot up by PoS scraping brute force cannon • The Register
www.darkreading.com
www.darkreading.com
InfoSec's Holy Grail: Data Sharing & Collaboration
www.securitytracker.com
www.securitytracker.com
HP Enterprise Maps XML External Entity Processing Flaw Lets Remote Authenticated Users Obtain Potentially Sensitive Information - SecurityTracker (RSS)
www.kdramastars.com
www.kdramastars.com
Half of Companies Worldwide Still Uses Windows XP; Microsoft Advise to Upgrade Their Systems : Trending News : SITE_NAME
www.toptechnews.com
www.toptechnews.com
USB Security Flaw Lets Hackers Hijack PCs - Network Security on Top Tech News
www.globalpost.com
www.globalpost.com
Data breach hits massive Irish bookmaker | GlobalPost
www.newindianexpress.com
www.newindianexpress.com
International Cyber Security Conference to be Held -The New Indian Express
www.slideshare.net
www.slideshare.net
DATASHEET▶ Enterprise Cloud Backup & Recovery with Symantec NetBackup
www.cmswire.com
www.cmswire.com
CrossIdeas Acqusition Underlines IBM's Security Drive
www.technologytell.com
www.technologytell.com
Apple releases OS X v10.9.5 beta to developers | TechnologyTell
seattletimes.com
seattletimes.com
Judge won’t free Russian accused of hacking Seattle-area businesses | Local News | The Seattle Times
timesofindia.indiatimes.com
timesofindia.indiatimes.com
Revenues of security vendor to rise to $953 million - The Times of India
www.weartv.com
www.weartv.com
Campus police have two suspects in network hacking at UWF - WEAR ABC Channel 3 - Top Stories
www.csoonline.com
www.csoonline.com
Tor points finger at US researchers after possible compromise of service | CSO Online
www.csoonline.com
www.csoonline.com
Attackers exploit remote access tools to compromise retail systems | CSO Online
www.tripwire.com
www.tripwire.com
Weeding Through the Security White Noise - The State of Security
www.thedailybeast.com
www.thedailybeast.com
'CIA Torture Report' Won’t Call Interrogations Torture – But It Will Show Horrors - The Daily Beast
www.ahwatukee.com
www.ahwatukee.com
Turley-Hansen: What’s with the firewall between generations? - Ahwatukee Foothills News: Valley And State
www.komonews.com
www.komonews.com
Judge won't free Russian accused of Seattle hacking | Local & Regional | Seattle News, Weather, Sports, Breaking News | KOMO News
www.jrn.com
www.jrn.com
Hospitals open to hackers, 94% of hospitals targeted - KGUN9
www.securitytube.net
www.securitytube.net
Owasp Global Webinar - Jack Mannino - Goatdroid Release
www.forbes.com
www.forbes.com
Cyber-Security Expert Warns Of 'False Flag' Digital Attacks - Forbes
www.forbes.com
www.forbes.com
The Company Keeping Your Favorite (And Least Favorite) Websites Online - Forbes
www.nation.com.pk
www.nation.com.pk
CIA apologizes for spying on US Senate
www.msnbc.com
www.msnbc.com
CIA apologizes for Senate spying | MSNBC
www.whatech.com
www.whatech.com
Pipeline safety market grow at a CAGR 9.1% to reach $6.73 billion in 2018 - WhaTech
www.scmagazine.com
www.scmagazine.com
AlgoSec Security Management Suite v6.5 product review | SC Magazine
www.bradenton.com
www.bradenton.com
WASHINGTON: Colin Powell kept in dark early on about CIA techniques? | National Politics | Bradenton Herald
venturebeat.com
venturebeat.com
Hey folks, I'm sorry: CIA director apologizes for infiltrating Senate computers | VentureBeat | Security | by Richard Byrne Reilly
www.toptechnews.com
www.toptechnews.com
USB Security Flaw Lets Hackers Hijack PCs - CIO Issues on Top Tech News
www.mercedsunstar.com
www.mercedsunstar.com
WASHINGTON: CIA admits it broke into Senate computers; senators call for spy chief’s ouster | National | Merced Sun-Star
seekingalpha.com
seekingalpha.com
Imperva's (IMPV) CEO Shlomo Kramer on Q2 2014 Results - Earnings Call Transcript | Seeking Alpha
www.bbc.com
www.bbc.com
BBC News - Avoid data breaches and keep the cyber thieves at bay
www.sfgate.com
www.sfgate.com
CIA spied on Senate, internal review finds - SFGate
www.scmagazine.com
www.scmagazine.com
Latest Citadel trick allows RDP access after malware's removal - SC Magazine
discuss.tindie.com
discuss.tindie.com
Time to Reevaulate Tindie & Paypal - Tindie Community
venturebeat.com
venturebeat.com
Michael Dell is funding this company to move surveillance cameras onto the cloud | VentureBeat | Deals | by Kia Kokalitcheva
www.kutv.com
www.kutv.com
Judge won't free Russian accused of hacking in US | KUTV.com
www.bbc.com
www.bbc.com
BBC News - Alasdair McDonnell to be investigated over 'serious data breach'
nvonews.com
nvonews.com
India's security market to cross $1.06 billion next fiscal: Gartner
www.irishexaminer.com
www.irishexaminer.com
649,000 Paddy Power customers hit by hacking | Irish Examiner
www.pentesteracademy.com
www.pentesteracademy.com
Module 2: HelloWorld Shellcode JMP-CALL-POP Technique
packetstormsecurity.com
packetstormsecurity.com
Chrome EXIF Viewer 2.4.2 Cross Site Scripting ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Why USB Security Is Fundamentally Broken ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Lynis Auditing Tool 1.5.9 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Microsoft Must Let US Feds Into Its Overseas Server, Says US Court ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Mandriva Linux Security Advisory 2014-142 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Latest Citadel Trick Allows RDP Access After Malware's Removal ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Mandriva Linux Security Advisory 2014-143 ≈ Packet Storm
www.siliconprairienews.com
www.siliconprairienews.com
Interface, Open Nebraska partner for free half-day civic hacking workshop - Silicon Prairie News
www.breitbart.com
www.breitbart.com
China’s Trade Offensive Grows Beyond Mere Hacking and Software Piracy
www.broadwayworld.com
www.broadwayworld.com
Data Loss Prevention Failures: Discuss Live on Dark Reading Radio - BWWGeeksWorld
www.worldbulletin.net
www.worldbulletin.net
Israel's Iron Dome makers were hit by hackers | TECHNOLOGY | Worldbulletin News
www.kitv.com
www.kitv.com
Russian man to remain in jail for hacking U.S. businesses' computers | More Local News - KITV Home
www.usatoday.com
www.usatoday.com
What CIA credibility? Our view
mspmentor.net
mspmentor.net
Good Technology Addresses BYOD Deployment Costs, Introduces Split Billing | Mobile Device Management content from MSPmentor
www.theregister.co.uk
www.theregister.co.uk
Plug and PREY: Hackers reprogram USB drives to silently infect PCs • The Register
www.slate.com
www.slate.com
NSA reform bill doesn’t please privacy advocates: The USA Freedom Act is far from enough.
www.itbusiness.ca
www.itbusiness.ca
The three V’s of big data – and the security risks that come with it | IT Business
thevarguy.com
thevarguy.com
Good Technology Introduces BYOD Solution with Corporate Data Plan | Mobile Device Management Software Solutions content from The VAR Guy
www.juniper.net
www.juniper.net
When is the right time to deploy SDN? How about now? - Juniper Networks
twitter.com
twitter.com
Twitter / RouteLastResort : Today's relevant and ...
www.securitytube.net
www.securitytube.net
Owasp Global Webinar - Ken Johnson - Railsgoat
blogs.cisco.com
blogs.cisco.com
Steps to Overcome the Business Risks of Cloud Services
www.firstpost.com
www.firstpost.com
Israel's 'Iron Dome' makers were hit by hackers, expert says - Firstpost
www.reuters.com
www.reuters.com
Hacking attack in Canada bears signs of Chinese army unit-expert| Reuters
arstechnica.com
arstechnica.com
Inside Citizen Lab, the “Hacker Hothouse” protecting you from Big Brother | Ars Technica
techday.com
techday.com
Techday – Telecom takes on Sky with 5000 hours of Lightbox content…
www.politico.com
www.politico.com
Sen. Mark Udall: CIA Director John Brennan should resign - Burgess Everett - POLITICO.com
www.nydailynews.com
www.nydailynews.com
CIA director admits agency improperly searched Senate computers - NY Daily News
www.miamiherald.com
www.miamiherald.com
WASHINGTON: Contradicting earlier claims, CIA admits it improperly accessed Senate computers - Nation Wires - MiamiHerald.com
www.mercedsunstar.com
www.mercedsunstar.com
WASHINGTON: Contradicting earlier claims, CIA admits it improperly accessed Senate computers | National Politics | Merced Sun-Star
www.theregister.co.uk
www.theregister.co.uk
Black Hat hackers finally drive a truck through gaping hole in USB firmware security • The Register
www.scmagazine.com
www.scmagazine.com
Paddy Power breach impacting 650K customers dates back to 2010 - SC Magazine
ieet.org
ieet.org
Hacking the world, public health style
abcnews.go.com
abcnews.go.com
Judge Won't Free Russian Accused of Hacking in US - ABC News
www.designntrend.com
www.designntrend.com
New Method of USB-Hacking Will Permanently Destroy Computers : Tech : Design & Trend
www.crn.com
www.crn.com
WatchGuard Enforcing Training, Certs In Partner Program Overhaul - Page: 1 | CRN
betaboston.com
betaboston.com
Inside the Cambridge tech scene built on secret government projects | BetaBoston
news.nationalpost.com
news.nationalpost.com
Hackers who hit National Research Council infiltrated system containing personal info | National Post
www.itworld.com
www.itworld.com
Windows Server 2003 support expiration could push sales next year | ITworld
www.businessinsurance.com
www.businessinsurance.com
Target names outsider as CEO after data breach | Business Insurance
www.scmagazine.com
www.scmagazine.com
Malware on Backcountry Gear website, payment cards compromised - SC Magazine
thedealtruck.com
thedealtruck.com
The Deal Truck
tribune.com.pk
tribune.com.pk
Cyber security: E-police stations turn a corner round inefficiency – The Express Tribune
whbl.com
whbl.com
Canada takes steps to secure network after China hacking claim - News - 1330 WHBL Sheboygan's News Radio
www.cbc.ca
www.cbc.ca
Cyberattack breached system holding personal data: privacy watchdog - Politics - CBC News
host.madison.com
host.madison.com
Irish bookmaker apologizes for 2010 data breach : Madisondotcom
www.stonyplainreporter.com
www.stonyplainreporter.com
NRC's IT network must be rebuilt after hack: Feds | Stony Plain Reporter
technology.canoe.ca
technology.canoe.ca
NRC's IT network must be rebuilt after attacks from Chinese hackers: Feds
thefusejoplin.com
thefusejoplin.com
AVG Vs Norton Antivirus Download – Which Is More Superior - The Fuse Joplin
www.avnetwork.com
www.avnetwork.com
Executives Demanding Deeper Analytics on Webcasting
koreajoongangdaily.joins.com
koreajoongangdaily.joins.com
Incentives to be given for information security-INSIDE Korea JoongAng Daily
www.scmagazine.com
www.scmagazine.com
Attackers compromise Gizmodo Brazil - SC Magazine
www.scmagazine.com
www.scmagazine.com
Jimmy John's sandwich chain investigating possible breach - SC Magazine
blog.streamingmedia.com
blog.streamingmedia.com
Apple's CDN Now Live: Has Paid Deals With ISPs, Massive Capacity In Place - Dan Rayburn - StreamingMediaBlog.com
tools.cisco.com
tools.cisco.com
Cisco Security Advisory: OSPF LSA Manipulation Vulnerability in Multiple Cisco Products (RSS)
smallbusiness.yahoo.com
smallbusiness.yahoo.com
Kicking Back With Trend Micro’s Dhanya Thakkar - Yahoo Small Business Advisor
www.businesscomputingworld.co.uk
www.businesscomputingworld.co.uk
Requiem For Anti-Virus | BCW
www.eastvalleytribune.com
www.eastvalleytribune.com
Turley-Hansen: What’s with the firewall between generations? - East Valley Tribune: East Valley Voices
gadgets.ndtv.com
gadgets.ndtv.com
China Says Canada's Hacking Accusation Is 'Groundless and Irresponsible' | NDTV Gadgets
techreport.com
techreport.com
64-bit Chrome goes beta, promises better speed, security, stability - The Tech Report
uk.reuters.com
uk.reuters.com
Target names outsider as CEO after data breach| Reuters
www.belfasttelegraph.co.uk
www.belfasttelegraph.co.uk
Huge data breach at Paddy Power bookmakers - details of over 649,000 customers stolen - BelfastTelegraph.co.uk
www.dailymail.co.uk
www.dailymail.co.uk
Bookmaker reveals cyber attack | Mail Online
www.chron.com
www.chron.com
Target taps outsider as CEO for needed shakeup - Houston Chronicle
www.westmeathindependent.ie
www.westmeathindependent.ie
Data breach at Paddy Power - News - Roundup - Articles - Westmeath Independent
www.cbsnews.com
www.cbsnews.com
CIA director apologizes for search of Senate computers - CBS News
www.macon.com
www.macon.com
DUBLIN: Irish bookmaker apologizes for 2010 data breach | Technology | Macon.com
www.heraldscotland.com
www.heraldscotland.com
George Galloway's former parliamentary secretary spared jail over data breach | Herald Scotland
newsinfo.inquirer.net
newsinfo.inquirer.net
CIA apologizes for spying on US Senate | Inquirer News
www.usatoday.com
www.usatoday.com
CIA director apologizes over Senate computer searches
thinkprogress.org
thinkprogress.org
U.S. Judge: Federal Government Can Seize Emails Even If They're Stored Overseas | ThinkProgress
www.mintpressnews.com
www.mintpressnews.com
State Dept: 'No American Is Proud' Of CIA Tactics
www.pcworld.com
www.pcworld.com
Windows Server 2003 support expiration could push sales next year | PCWorld
communities.cisco.com
communities.cisco.com
Space: Security | Cisco Communities
www.tripwire.com
www.tripwire.com
US Government Alerts Retailers of Stealthy Point-of-Sale Malware - The State of Security
www.scmagazine.com
www.scmagazine.com
Apple hit with privacy class-action over iPhone location service - SC Magazine
twitter.com
twitter.com
Twitter / TiTom73 : A @JuniperNetworks SRX Cluster ...
aws.amazon.com
aws.amazon.com
Route 53 Update - Domain Name Registration, Geo Routing, and a Price Reduction
www.securitytube.net
www.securitytube.net
Owasp Global Webinar - Initiatives Owasp Projects
www.tripwire.com
www.tripwire.com
Another Potential Retail Mega Breach At Sandwich Chain Jimmy Johns - The State of Security
motherboard.vice.com
motherboard.vice.com
The Internet of Things Can't Keep Your Data Safe | Motherboard
metronews.ca
metronews.ca
Cyberattack breached personal data: watchdog | Metro
www.latimes.com
www.latimes.com
Target names an outsider as new CEO - LA Times
redmondmag.com
redmondmag.com
Survey Suggests IT Pros Slow To React on Windows XP Migrations -- Redmondmag.com
insurancenewsnet.com
insurancenewsnet.com
Seccuris Partners with iScan Online to Deliver Data Breach Prevention Solutions - Top News - InsuranceNewsNet.com
techday.com
techday.com
Techday – Over 4 million gamers participated in Destiny beta
www.jdsupra.com
www.jdsupra.com
New Mandatory Exclusions in Standard CGL Policies Limit Coverage for Data Breaches | Proskauer - Insurance Recovery & Counseling - JDSupra
www.slate.com
www.slate.com
Hackers can modify USB firmware to spread malware.
www.usnews.com
www.usnews.com
CIA Director Apologizes to Senate Leaders - US News
www.theregister.co.uk
www.theregister.co.uk
Microsoft must let US feds into its overseas servers, says US court • The Register
www.securityfocus.com
www.securityfocus.com
Microsoft Office CVE-2013-5057 ASLR Security Bypass Vulnerability (RSS)
www.telegraph.co.uk
www.telegraph.co.uk
CIA admits spying on US senate committee - Telegraph
www.scpr.org
www.scpr.org
CIA Hacking: Agency apologizes for spying on Senate staff | 89.3 KPCC
www.marketwatch.com
www.marketwatch.com
CIA director apologizes for spying on Senate staffers - The Wall Street Journal - MarketWatch
indianapublicmedia.org
indianapublicmedia.org
Former Senator Evan Bayh Will Chair CIA Accountability Board | News - Indiana Public Media
www.nbcnews.com
www.nbcnews.com
CIA Director Brennan Apologizes to Senate Leaders for Computer 'Hack' - NBC News
business.newsfactor.com
business.newsfactor.com
IBM Beefs Up Identity Intelligence Security Solutions | NewsFactor Business
www.rawstory.com
www.rawstory.com
China slams Canada for ‘irresponsible’ hacking accusations
www.ksat.com
www.ksat.com
POL-cia-spying-senate-apologize-1
www.cio-today.com
www.cio-today.com
IBM Beefs Up Identity Intelligence Security Solutions - Data Security on CIO Today
www.theregister.co.uk
www.theregister.co.uk
Grabby baddie scours Paddy Power's towers: 650k punters leaked and it took 4 years to admit it • The Register
www.schneier.com
www.schneier.com
Schneier on Security: The Fundamental Insecurity of USB (RSS)
twitter.com
twitter.com
Twitter / CiscoSecurity : Only a few days left until ...
www.insidecounsel.com
www.insidecounsel.com
The BYOD horse is out of the barn: Implementing the right mobile policy for your organization
www.kashmirdispatch.com
www.kashmirdispatch.com
Companies behind Israel's Iron Dome missile shield hacked by China - Latest Kashmir News & Analysis - - Kashmir Dispatch
www.cmswire.com
www.cmswire.com
Why AirWatch by VMWare Stands Out from the EFSS Crowd
talkincloud.com
talkincloud.com
IBM Acquires CrossIdeas to Expand Security Offerings | Cloud Computing Mergers and Acquisitions content from Talkin' Cloud
www.lfpress.com
www.lfpress.com
China slams Canada for hacking accusations | The London Free Press
ww2.cfo.com
ww2.cfo.com
Telecommuting Not Good Buffer From Hackers
www.wvec.com
www.wvec.com
Riverside Health offers credit monitoring after data breach | WVEC.com Norfolk - Hampton Roads
www.cnet.com
www.cnet.com
Ford invites hackers to use Los Angeles city data - CNE
www.virtual-strategy.com
www.virtual-strategy.com
LiquidFrameworks Announces the Launch of a New Blog | Virtual-Strategy Magazine
www.macobserver.com
www.macobserver.com
Basic Tips for Using the Dock and Trash in OS X - The Mac Observer
www.securityfocus.com
www.securityfocus.com
Schneider Electric OPC Factory Server Local Stack Buffer Overflow Vulnerability (RSS)
www.scpr.org
www.scpr.org
CIA director apologizes to Senate leaders over searches; Feinstein responds | 89.3 KPCC
recode.net
recode.net
Hackers Can Tap USB Devices, Researcher Warns | Re/code
www.philly.com
www.philly.com
Target taps outsider as CEO for needed shakeup
www.newsfactor.com
www.newsfactor.com
New 'Backoff' Malware Slips Undetected into Retail Systems | NewsFactor Network
www.timminspress.com
www.timminspress.com
Hackers can tap USB devices: Researcher | Timmins Press
www.thescore.ie
www.thescore.ie
Had a Paddy Power account in 2010? You need to read this · The Score
wonkette.com
wonkette.com
CIA, On Careful Reflection, Remembers It Hacked Senate Computers After All | Wonkette
www.broadwayworld.com
www.broadwayworld.com
bigtincan Recognized in Seven of Analyst Firm's Hype Cycle Reports - BWWGeeksWorld
www.pcmag.com
www.pcmag.com
MetaGeek inSSIDer Wi-Fi Helper Review & Rating | PCMag.com
globalnews.ca
globalnews.ca
Cyberattack breached system holding personal data: privacy watchdog - National | Globalnews.ca
www.zdnet.com
www.zdnet.com
BadUSB: Big, bad USB security problems ahead | ZDNet
www.extremetech.com
www.extremetech.com
Massive, undetectable security flaw found in USB: It’s time to get your PS/2 keyboard out of the cupboard | ExtremeTech
www.csoonline.com
www.csoonline.com
CISOs still struggle for respect from peers | CSO Online
krebsonsecurity.com
krebsonsecurity.com
Sandwich Chain Jimmy John’s Investigating Breach Claims — Krebs on Security
www.net-security.org
www.net-security.org
BitTorrent's decentralized chat app keeps content, metadata safe
www.newsfactor.com
www.newsfactor.com
IBM Beefs Up Identity Intelligence Security Solutions | NewsFactor Network
www.crn.com
www.crn.com
IBM Acquires CrossIdeas For Identity Analytics, Access Governance - Page: 1 | CRN
www.independent.ie
www.independent.ie
Massive data breach at Paddy Power bookmakers - Independent.ie
www.cloudwedge.com
www.cloudwedge.com
IBM Buys CrossIdeas for Cloud Security Auditing | CloudWedge
www.thestar.com
www.thestar.com
Cyberattack on federal government breached system holding personal data, privacy watchdog says | Toronto Star
www.ctvnews.ca
www.ctvnews.ca
Chinese cyberattack infiltrated system holding personal data | CTV News
www.reuters.com
www.reuters.com
CIA concedes it spied on Senate investigators, apologizes| Reuters
www.siliconrepublic.com
www.siliconrepublic.com
Data breach impacts nearly 650,000 Paddy Power customers - Enterprise - | siliconrepublic.com - Ireland's Technology News Service
www.cpapracticeadvisor.com
www.cpapracticeadvisor.com
Why Office 365 Is Good for Your Practice | CPA Practice Advisor
qctimes.com
qctimes.com
Idea Lab discusses cyber security for small businesses : Business
www.your4state.com
www.your4state.com
Cyber Security Grant Awarded to HCC - Your4State.com
www.securityfocus.com
www.securityfocus.com
AT&T Connect Participant Application '.SVT' File Processing Buffer Overflow Vulnerability (RSS)
www.securityfocus.com
www.securityfocus.com
Oxwall '/admin/settings/user' Multiple Arbitrary PHP Code Execution Vulnerabilities (RSS)
www.thedailybeast.com
www.thedailybeast.com
CIA: We Improperly Accessed Senate Files - The Daily Beast
thecable.foreignpolicy.com
thecable.foreignpolicy.com
CIA to Senate: Whoops, We Actually Did Break Into Your Computers
www.grandhaventribune.com
www.grandhaventribune.com
10 things to know today | Grand Haven Tribune
www.clickondetroit.com
www.clickondetroit.com
CIA interrogation report could be released next week | Politics - Home
www.mintpressnews.com
www.mintpressnews.com
Pushing Release Of CIA Torture Report, Senators Threaten Use Of Special Rule
www.thenewsreports.com
www.thenewsreports.com
India to spend over $1billion in security market
www.bbc.co.uk
www.bbc.co.uk
BBC News - Leaked memo on CIA says 'No American proud' of abuse
timesofindia.indiatimes.com
timesofindia.indiatimes.com
US State Department: 'No American is proud' of CIA tactics - The Times of India
commonhealth.wbur.org
commonhealth.wbur.org
Lessons From Boston Children’s: When Hackers Attack Your Hospital | CommonHealth
www.politico.com
www.politico.com
Senate’s CIA report could come out in August - Burgess Everett - POLITICO.com
boingboing.net
boingboing.net
White House 'accidentally emailed' torture report talking points to AP reporter - Boing Boing
www.salon.com
www.salon.com
Feinstein was right: CIA admits it hacked Senate computers - Salon.com
live.huffingtonpost.com
live.huffingtonpost.com
HuffPost Live
www.smh.com.au
www.smh.com.au
White House accidentally emails torture report memo to reporter
www.mcclatchydc.com
www.mcclatchydc.com
WASHINGTON: CIA improperly accessed Senate computers, agency finds | National Security & Defense | McClatchy DC
rcpmag.com
rcpmag.com
Survey Underscores Windows XP's Staying Power -- Redmond Channel Partner
www.sfgate.com
www.sfgate.com
10 Things to Know for Thursday - SFGate
www.reuters.com
www.reuters.com
UPDATE 4-Target names outsider as CEO after data breach| Reuters
boingboing.net
boingboing.net
The CIA lied: agency admits it hacked Senate computers to snoop on torture investigations - Boing Boing
www.tripwire.com
www.tripwire.com
Massive Breach at Paddy Power Bookmakers Affects Nearly 650,000 Customers - The State of Security
forums.juniper.net
forums.juniper.net
My Friend Drives me Mad, but all in the Cause of B... - J-Net Community
www.infosecisland.com
www.infosecisland.com
Windows Meets Industrial Control Systems (ICS) Through HAVEX.RAT – It Spells Security Risks
www.newyorker.com
www.newyorker.com
Last Call - The New Yorker
www.securitytube.net
www.securitytube.net
25c3 - All Your Bases Are Belong To Us
www.wired.com
www.wired.com
Why the Security of USB Is Fundamentally Broken | Threat Level | WIRED
www.globalpost.com
www.globalpost.com
US warns retailers on data-stealing malware | GlobalPost
www.cnbc.com
www.cnbc.com
US government warns retailers about malicious software
talkincloud.com
talkincloud.com
Which Antivirus Software Works Best? Here's What Experts Have to Say | Cloud Computing Security content from Talkin' Cloud
www.itnewsonline.com
www.itnewsonline.com
IT News Online > - Panda Security Tops Trinity of Tests
www.huffingtonpost.com
www.huffingtonpost.com
CIA Director John Brennan Apologizes For Hacking Of Senate Computers
allafrica.com
allafrica.com
allAfrica.com: Nigeria: Hackers May Target Nigeria's Payment Cards Over Security Loopholes
twitter.com
twitter.com
Twitter / Lora_Phillips : .@FCousteau discusses his ...
www.infosecurity-magazine.com
www.infosecurity-magazine.com
Infosecurity - 1 in 10 Android Apps Are Virus-Infected
support.kaspersky.com
support.kaspersky.com
How to add and renew license for Kaspersky PURE 3.0
twitter.com
twitter.com
Twitter / TrendMicro : The Original Computer ...
www.infosecisland.com
www.infosecisland.com
Is it Cheaper to Keep it? Reevaluating Your IAM Solutions
www.theglobeandmail.com
www.theglobeandmail.com
Canada’s ‘baseless’ hacking claims a blow to relations, Beijing says - The Globe and Mail
www.sourcewire.com
www.sourcewire.com
Truth, not Trust – Big Data Governance, Integrity and Security Solved
lethbridgeherald.com
lethbridgeherald.com
Cyberattack breached system holding personal data: privacy watchdog › The Lethbridge Herald – myLH.ca
www.theblaze.com
www.theblaze.com
CIA Apologizes for Hacking Senate Computers | TheBlaze.com
nakedsecurity.sophos.com
nakedsecurity.sophos.com
Android “FakeID” security hole causes a pre-BlackHat stir | Naked Security
www.washingtontimes.com
www.washingtontimes.com
CIA admits improperly hacking Senate computers in search of Bush-era information - Washington Times
www.thebitbag.com
www.thebitbag.com
Best Android Antivirus Apps To Protect Your Precious Smartphone and Tablet
www.mediaite.com
www.mediaite.com
CIA Admits to Hacking into Senate Computers | Mediaite
www.usnews.com
www.usnews.com
Irish bookmaker apologizes for 2010 data breach - US News
www.torontosun.com
www.torontosun.com
China slams Canada for 'irresponsible' hacking accusations | News | Tech | Toron
www.telegraph.co.uk
www.telegraph.co.uk
Paddy Power: hackers stole details of 600,000 users - Telegraph
twitter.com
twitter.com
Twitter / Lora_Phillips : First @Symantec Green Talk ...
twitter.com
twitter.com
Twitter / JuniperNetworks : A thing of beauty! Snapshot ...
www.net-security.org
www.net-security.org
Malicious USB device firmware the next big infection vector?
www.symantec.com
www.symantec.com
Russian ransomware author takes the easy route | Symantec Connect
www.itworld.com
www.itworld.com
Hacker group targets video game companies to steal source code | ITworld
www.mirror.co.uk
www.mirror.co.uk
Jealous copper spied on George Galloway's assistant claiming it was part of 'anti terror investigation' - Mirror Online
www.marketwatch.com
www.marketwatch.com
Bit9 + Carbon Black and Stroz Friedberg Form Partnership for Incident Response - MarketWatch
www.motorauthority.com
www.motorauthority.com
Subaru BRZ, Scion FR-S Earn IIHS Top Safety Pick Rating
www.bbc.com
www.bbc.com
BBC News - Israeli Iron Dome firms 'infiltrated by Chinese hackers'
www.worldtribune.com
www.worldtribune.com
'Pre-9/11 moment': Officials say Al Qaida planning massive cyber attack on U.S. - World Tribune | World Tribune
www.techtimes.com
www.techtimes.com
OS X Yosemite public beta a huge hit with Mac users : PERSONAL TECH : Tech Times
blogs.technet.com
blogs.technet.com
General Availability for Enhanced Mitigation Experience Toolkit (EMET) 5.0 - MSRC - Site Home - TechNet Blogs
www.theguardian.com
www.theguardian.com
Bug spotting: Germans hold 'nature walks' to observe rare NSA spy | World news | The Guardian
www.bbc.co.uk
www.bbc.co.uk
BBC News - George Galloway's ex-aide discharged over data breach
www.ashdowngroup.com
www.ashdowngroup.com
Gartner: Be cautious over data lakes | IT News | Ashdown Group
www.nationaljournal.com
www.nationaljournal.com
CIA Admits to Improperly Hacking Senate Computers - NationalJournal.com
www.fenderbender.com
www.fenderbender.com
Chevy Volt Earns Top Safety Pick in Recent Tests - FenderBender - July 2014 - United States
www.cnet.com
www.cnet.com
China rebuffs Canada for 'irresponsible' hacking claims - CNE
venturebeat.com
venturebeat.com
Why you can no longer trust any USB device plugged into your PC | VentureBeat | Business | by Simon Cohen
in.reuters.com
in.reuters.com
Hackers can tap USB devices in new attacks, researcher warns| Reuters
healthitsecurity.com
healthitsecurity.com
Internal data breach, identity fraud at Riverside Health | HealthITSecurity.com
reason.com
reason.com
CIA Admits Fault for Snooping on Senate Computers - Hit & Run : Reason.com
www.thestar.co.uk
www.thestar.co.uk
Data breach couple spared prison - The Star
www.youtube.com
www.youtube.com
The Sound of dial-up Internet - YouTube
abcnews.go.com
abcnews.go.com
Irish Bookmaker Apologizes for 2010 Data Breach - ABC News
www.networkworld.com
www.networkworld.com
BlackBerry buying German firm for voice encryption | Network World
packetstormsecurity.com
packetstormsecurity.com
80% Of IoT Devices Are Vulnerable To Data Theft ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Russia Wants SAP, Apple Source Code To Prove They Aren't Spies ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Tor Attack May Have Unmasked Dark Net Users ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
China Rebuffs Canada For 'Irresponsible' Hacking Claims ≈ Packet Storm
inhomelandsecurity.com
inhomelandsecurity.com
Feds admit cooperation remains an obstacle with corporations and cyber threats | In Homeland Security
scienceblog.com
scienceblog.com
High schoolers hacking for a good cause | ScienceBlog.com
www.sourcewire.com
www.sourcewire.com
Bit9 + Carbon Black Announces Bit9 Security Platform Version 7.2
www.csoonline.com
www.csoonline.com
Security Manager's Journal: A ransomware flop, thanks to security awareness | CSO Online
www.csoonline.com
www.csoonline.com
Hacker group targets video game companies to steal source code | CSO Online
www.csoonline.com
www.csoonline.com
No patch yet for zero day in Symantec Endpoint Protection software driver | CSO Online
www.csoonline.com
www.csoonline.com
In a hyper-social world, some seek a little privacy | CSO Online
blog.trendmicro.com
blog.trendmicro.com
Simply Security News, Views and Opinions from Trend Micro, IncOnline Banking Challenges: Cybercriminals are Leveling Up » Simply Security News, Views and Opinions from Trend Micro, Inc
gizmodo.com
gizmodo.com
USB Has a Fundamental Security Flaw That You Can't Detect
www.jpost.com
www.jpost.com
Chinese hackers allegedly stole Iron Dome designs | JPost | Israel News
www.prnewswire.com
www.prnewswire.com
AirWatch Awarded Multiple Patents for Watermarking Technology -- ATLANTA, July 31, 2014 /PRNewswire/ --
www.v3.co.uk
www.v3.co.uk
Microsoft updates OneNote app for iPhone, iPad and Mac users - IT News from V3.co.uk
www.fortmcmurraytoday.com
www.fortmcmurraytoday.com
Hackers can tap USB devices: Researcher | Fort McMurray Today
www.cmswire.com
www.cmswire.com
Mac News: OneNote Upgraded, But What About Office?
www.pnj.com
www.pnj.com
Data breach at UWF
inventorspot.com
inventorspot.com
Internet of Everything Is Hackable
www.wired.co.uk
www.wired.co.uk
Nasa validates 'impossible' space drive (Wired UK)
www.net-security.org
www.net-security.org
Security contest rewards builders of secure systems
www.theregister.co.uk
www.theregister.co.uk
Pentagon hacker McKinnon reinvents himself as SEO guru • The Register
www.securitytube.net
www.securitytube.net
25c3 - Evoting After Nedap And Digital Pen
www.heraldonline.com
www.heraldonline.com
News, sports and weather for Rock Hill, SC | The Herald & Heraldonline.com
www.wired.com
www.wired.com
Hackers Can Control Your Phone Using a Tool That’s Already Built Into It | Threat Level | WIRED
www.techinsider.net
www.techinsider.net
Microsoft Corporation (MSFT) Facing Trouble in China | Tech Insider
online.wsj.com
online.wsj.com
StrikeForce's ProtectID(R) Out-of-Band Authentication Technology Now Secures Microsoft Office 365 - WSJ.com
www.presstv.ir
www.presstv.ir
PressTV - China slams Canada hacking allegation
www.cio-today.com
www.cio-today.com
Will OS X Yosemite Bring More Grief for Apple? - Enterprise Software on CIO Today
www.thestreet.com
www.thestreet.com
5 Reasons Target’s New CEO Is Boring Chic - TheStreet
abcnews.go.com
abcnews.go.com
China Denies Hacking Canadian Tech Research Group - ABC News
www.trustedreviews.com
www.trustedreviews.com
Google Drive vs iCloud Drive vs Dropbox vs OneDrive - Opinion - Trusted Reviews
www.channelnews.com.au
www.channelnews.com.au
9 Things Microsoft Should Consider For Windows 9 Success - Channel News
jutiagroup.com
jutiagroup.com
Stock Update: Cisco Systems Inc (NASDAQ:CSCO) – Cisco Broadens Storage Networking Portfolio to Address Massive Data Growth Across Small to Cloud-Scale Storage Networks
www.kolotv.com
www.kolotv.com
Facebook Hacking Scam
www.politico.com
www.politico.com
Scoop: Gillibrand introducing cyber bill today – Microsoft case front and center today, but is it obsolete? - POLITICO Morning Cybersecurity - POLITICO.com
forum.kaspersky.com
forum.kaspersky.com
How to report undetected viruses or false positives to the viruslab - Kaspersky Lab Forum
forums.juniper.net
forums.juniper.net
Readiness, Benefits and Barriers: An SDN Progress ... - J-Net Community
www.infoworld.com
www.infoworld.com
No patch yet for zero day in Symantec Endpoint Protection software driver | Security - InfoWorld
www.infoworld.com
www.infoworld.com
IBM buys access control and identity management firm CrossIdeas | Security - InfoWorld
idahobusinessreview.com
idahobusinessreview.com
The 5 most common cyber security mistakes | Idaho Business Review
healthitsecurity.com
healthitsecurity.com
Healthcare CIO talks network security, efficiency balance | HealthITSecurity.com
www.irishtimes.com
www.irishtimes.com
Paddy Power to contact 650,000 customers over data breach
www.breakingnews.ie
www.breakingnews.ie
120,000 Irish Paddy Power customers affected by massive data breach | BreakingNews.ie
www.wfaa.com
www.wfaa.com
Target names Pepsi's Cornell as chairman, CEO | wfaa.com Dallas - Fort Worth
www.marketwatch.com
www.marketwatch.com
AirWatch Awarded Multiple Patents for Watermarking Technology - MarketWatch
www.independent.co.uk
www.independent.co.uk
Hack Attack by Nick Davies, book review: A panoramic account of the hacking scandal - Reviews - Books - The Independent
www.forbes.com
www.forbes.com
VMware Secures Patent To Take Mobile Devices Back To The Dark Ages - Forbes
www.dailymail.co.uk
www.dailymail.co.uk
USB security flaw that lets hackers take over computers discovered | Mail Online
www.siliconindia.com
www.siliconindia.com
Most Powerful Antivirus Software of 2014
www.fmprc.gov.cn
www.fmprc.gov.cn
Foreign Ministry Spokesperson Qin Gang's Remarks on the Statement Released by the Canadian Side Saying that Chinese Hackers Attacked Canada's National Research Council
www.usnews.com
www.usnews.com
Target names Pepsi's Cornell as chairman, CEO - US News
www.cheddarvalleygazette.co.uk
www.cheddarvalleygazette.co.uk
More organisations demand business partners meet international information security standards, says SGS | Cheddar Valley Gazette
arstechnica.com
arstechnica.com
Active attack on Tor network tried to decloak users for five months | Ars Technica
www.forbes.com
www.forbes.com
What Brian Cornell Must Do To Succeed At Target - Forbes
time.com
time.com
Target Announces New CEO To Lead Data Breach Recovery - TIME
www.aljazeera.com
www.aljazeera.com
Russia: RIP freedom of speech? - Opinion - Al Jazeera English
www.marketwatch.com
www.marketwatch.com
StrikeForce's ProtectID(R) Out-of-Band Authentication Technology NowSecures Microsoft Office 365 - MarketWatch
www.pcworld.com
www.pcworld.com
Hacker group targets video game companies to steal source code | PCWorld
www.independent.ie
www.independent.ie
Breaking: Massive data breach at Paddy Power bookmakers - Independent.ie
www.charlotteobserver.com
www.charlotteobserver.com
Target names Pepsi's Cornell as chairman, CEO | CharlotteObserver.com
timesofindia.indiatimes.com
timesofindia.indiatimes.com
Beware, USB devices offer hackers direct route to computers - The Times of India
seclists.org
seclists.org
Information Security News: Man Arrested After Security Breach At The Oklahoma County Jail
www.utm.edu
www.utm.edu
mdmss
www.streetwisetech.com
www.streetwisetech.com
Anti virus face off: Avast vs AVG vs Microsoft Security Essentials - Who's got the best features?
www.reuters.com
www.reuters.com
Fitch Rates Thailand-based CP ALL's Secured Bonds 'A+(tha)'| Reuters
www.marketwatch.com
www.marketwatch.com
CloudPassage Taps Security Industry Veteran Amrit Williams as ChiefTechnology Officer - MarketWatch
www.startribune.com
www.startribune.com
Target names PepsiCo executive as its next CEO | Star Tribune
abcnews.go.com
abcnews.go.com
Target Names Pepsi's Cornell as Chairman, CEO - ABC News
economictimes.indiatimes.com
economictimes.indiatimes.com
Target to hire Pepsi executive Brian Cornell as CEO: Report - The Economic Times
www.streetwisetech.com
www.streetwisetech.com
Baidu Anti Virus - Always free and forever Free
online.wsj.com
online.wsj.com
NXT-ID's Next Generation Biometric Smart Wallet Featured on NewsWatch Consumer Show on the History Channel and FYI Network Today, July 31st - WSJ.com
www.bloomberg.com
www.bloomberg.com
Target Chooses Former Pepsi Executive Cornell as Next CEO - Bloomberg
www.thestar.com
www.thestar.com
Target hires Pepsi exec to help it recover from data breach, Canadian troubles | Toronto Star
news.nocamels.com
news.nocamels.com
Microsoft, Akamai Technologies and JVP Partner In Cyber Security Accelorator Program | NoCamels News Flash
www.schneier.com
www.schneier.com
Schneier on Security: Debit Card Override Hack (RSS)
phys.org
phys.org
You don't need a fast car to rob a bank any more, just malware
online.wsj.com
online.wsj.com
IBM Named a Leader in Gartner Magic Quadrant for Security Information and Event Management - WSJ.com
thefusejoplin.com
thefusejoplin.com
Top 5 Free Antivirus 2014 – The Ones That Protect You the Most - The Fuse Joplin
www.stockhouse.com
www.stockhouse.com
Press Releases - News - Stockhouse
www.securitytube.net
www.securitytube.net
25c3 - Analyzing Rfid Security
www.businesswire.com
www.businesswire.com
Capella University Announces New Online Master's Degree in Information Assurance and Security | Business Wire
motherboard.vice.com
motherboard.vice.com
Canada and China Are Still Waging a Cyber War | Motherboard
seekingalpha.com
seekingalpha.com
Akamai Technologies' (AKAM) CEO Thomson Leighton on Q2 2014 Results - Earnings Call Transcript | Seeking Alpha
allafrica.com
allafrica.com
allAfrica.com: Nigeria: End of Support for Windows 2003 Puts 25 Million Payment Cards At Risk
www.cso.com.au
www.cso.com.au
Next-gen firewalls protect crews in concert at Melbourne and Olympic Parks - CSO | The Resource for Data Security Executives
www.infosecurity-magazine.com
www.infosecurity-magazine.com
Infosecurity - Chinese Hackers Use APTs to Target Gaming Companies
www.huffingtonpost.co.uk
www.huffingtonpost.co.uk
IT On the Verge of a Mobile Meltdown: Why BYOD and Mobile Application Management are Driving Businesses Crazy | Vincent Smyth
www.pcworld.com
www.pcworld.com
Attackers use domino effect to compromise your accounts | PCWorld
seclists.org
seclists.org
Information Security News: Commentary: Cyber Deterrence Is Working
seclists.org
seclists.org
Information Security News: Zambia: First Cyber Security Lab Unveiled
seclists.org
seclists.org
Bugtraq: RE: [FD] Beginner's error: import function of Windows Mail executes rogue program C:\Program.exe with credentials of other account
seclists.org
seclists.org
Bugtraq: Re: [FD] Beginner's error: import function of Windows Mail executes rogue program C:\Program.exe with credentials of other account
www.securityfocus.com
www.securityfocus.com
Elasticsearch CVE-2014-3120 Arbitrary Java Code Execution Vulnerability (RSS)
www.theregister.co.uk
www.theregister.co.uk
Securobods claim Middle East govts' fingerprints all over malware flung at journos • The Register
ca.reuters.com
ca.reuters.com
China slams Canada for 'irresponsible' hacking accusations| Canada| Reuters
www.theglobeandmail.com
www.theglobeandmail.com
July 31: Caught in the Net – and other letters to the editor - The Globe and Mail
mybroadband.co.za
mybroadband.co.za
Your PC can be hacked with a USB mouse
betanews.com
betanews.com
XP is still used in 53 percent of businesses
www.startribune.com
www.startribune.com
How to Inspect Your Own House, Part 2: Exterior Water Management | The Home Inspector | StarTribune.com
eandt.theiet.org
eandt.theiet.org
USB offers hackers direct route to computers - E & T Magazine
seclists.org
seclists.org
Bugtraq: [ MDVSA-2014:144 ] live
www.thestar.com
www.thestar.com
Ottawa warned about its vulnerability to hackers, lack of strategy | Toronto Star
www.independent.co.uk
www.independent.co.uk
Hack attack by Nick Davies; The news machine by James Hanning with Glenn Mulcaire - Reviews - Books - The Independent
techday.com
techday.com
Techday – Gartner: Beware of the Data Lake Fallacy…
en.itar-tass.com
en.itar-tass.com
ITAR-TASS: World - US court on Guam rejects motion to release Russia’s hacking suspect
www.pcr-online.biz
www.pcr-online.biz
Security roundup: USB drives, mice and keyboards can be hacked | The latest news from the Computer and IT Industry | PC Retail
www.infoworld.com
www.infoworld.com
Gartner gets the 'data lake' concept all wrong | Application Development - InfoWorld
www.design-engineering.com
www.design-engineering.com
NRC computers attacked by Chinese hackers, spy agency says - Design Engineering
www.triplepundit.com
www.triplepundit.com
What Does Corporate Responsibility Mean When It Comes To NSA Data Requests?
www.sourcewire.com
www.sourcewire.com
Bit9 + Carbon Black Announces Carbon Black Version 4.2
www.theregister.co.uk
www.theregister.co.uk
AVG stung as search revenue from freebie scanners dries up • The Register
www.securityfocus.com
www.securityfocus.com
ppc64-diag CVE-2014-4039 Multiple Insecure File Permissions Vulnerabilities (RSS)
www.symantec.com
www.symantec.com
Looking for the Right Data Backup Solution for the Virtual World? Ask Yourself These Three Questions | Symantec Connect
www.marketwatch.com
www.marketwatch.com
Newscast: Hackers key on remote access software - Market Update - MarketWatch
www.theepochtimes.com
www.theepochtimes.com
Chinese Hacking Barely Mentioned in Ottawa - The Epoch Times
www.techweekeurope.co.uk
www.techweekeurope.co.uk
McAfee Warns About Dangers Posed By Advanced Evasive Techniques
security.itbusinessnet.com
security.itbusinessnet.com
Global Survey Reveals Impact of Data Breaches on Customer Loyalty
www.pcworld.idg.com.au
www.pcworld.idg.com.au
Microsoft faces anti-monopoly probe in China over Windows, Office - Good Gear Guide by PC World Australia
daveyarwood.github.io
daveyarwood.github.io
20 cool Clojure functions :: Dave Yarwood
tech.firstpost.com
tech.firstpost.com
USB pen drives under threat, as researchers show new vulnerability - Tech2
www.themalaymailonline.com
www.themalaymailonline.com
Hackers can tap USB devices in new attacks, researcher warns | Tech/Gadgets | The Malay Mail Online
www.theregister.co.uk
www.theregister.co.uk
Fiendishly complex password app extension ships for iOS 8 • The Register
www.securityfocus.com
www.securityfocus.com
phpMyAdmin 'functions.js' Multiple Cross Site Scripting Vulnerabilities (RSS)
www.securityfocus.com
www.securityfocus.com
phpMyAdmin CVE-2014-4987 Remote Security Bypass Vulnerability (RSS)
www.securityfocus.com
www.securityfocus.com
phpMyAdmin 'rte_list.lib.php' Cross Site Scripting Vulnerability (RSS)
www.securityfocus.com
www.securityfocus.com
phpMyAdmin 'structure.lib.php' Cross Site Scripting Vulnerability (RSS)
www.net-security.org
www.net-security.org
How security analytics help identify and manage breaches
insurancenewsnet.com
insurancenewsnet.com
Range of Ratings: Small Car Ratings Run the Gamut in Challenging Small Overlap Front Test - Top News - InsuranceNewsNet.com
www.guampdn.com
www.guampdn.com
Judge denies motion to release Russian hacking suspect | Pacific Daily News | guampdn.com
en.itar-tass.com
en.itar-tass.com
ITAR-TASS: World - US court turns down Russian suspected hacker’s lawyer request for release
www.wateronline.com
www.wateronline.com
MWH Global And CSC Partner On Cybersecurity Offerings For Critical Utility Infrastructure
www.securitytracker.com
www.securitytracker.com
HP NonStop NetBatch Unspecified Flaw Lets Remote Users Execute Arbitrary NetBatch Jobs - SecurityTracker (RSS)
www.net-security.org
www.net-security.org
PC gamers increasingly under attack
www.net-security.org
www.net-security.org
PCI compliance contributes to false sense of security
www.net-security.org
www.net-security.org
Failure is an option
www.net-security.org
www.net-security.org
The role of the cloud in the modern security architecture
www.teslamotors.com
www.teslamotors.com
Panasonic and Tesla Sign Agreement for the Gigafactory | Press Releases | Tesla Motors
www.securitytube.net
www.securitytube.net
25c3 - Messing Around With Garage Doors
insurancenewsnet.com
insurancenewsnet.com
PCI Urges Revere Residents Affected by Monday's Tornado to Use Caution When Hiring a Contractor - Top News - InsuranceNewsNet.com
insurancenewsnet.com
insurancenewsnet.com
PCI Testifies on Flood Insurance Claims Process Lessons Learned and Potential Improvements - Top News - InsuranceNewsNet.com
www.itpro.co.uk
www.itpro.co.uk
Tor network users may have been identified by hackers | IT PRO
www.darkreading.com
www.darkreading.com
Internet Of Things Contains Average Of 25 Vulnerabilities Per Device
www.truenorthtimes.ca
www.truenorthtimes.ca
Chinese Hackers Try To Infiltrate National Research Council | The True North Times
online.wsj.com
online.wsj.com
MobileIron Security Expert Mike Raggo to Present at BlackHat, DEF CON and BSidesLV - WSJ.com
www.smarthouse.com.au
www.smarthouse.com.au
9 Things Microsoft Should Consider For Windows 9 Success - Smart House
www.lightreading.in
www.lightreading.in
Gartner Says India Security Market To Grow 8% In 2014 - Light Reading – India Telecom News, Telecommunication News
www.net-security.org
www.net-security.org
Whitepaper: Security strategies for success
www.itwebafrica.com
www.itwebafrica.com
Is Kenya’s government clueless on curbing cyber attacks? - ITWeb Africa
www.prweb.com
www.prweb.com
Fasoo Announces New Report on Preventing Insider Threats in the Workplace
www.bovinevetonline.com
www.bovinevetonline.com
10 commandments for business continuity
securityaffairs.co
securityaffairs.co
Attacks to compromise TOR Network and De-Anonymize users | Security Affairs
www.reuters.com
www.reuters.com
Fitch Affirms Bosch at 'F1'| Reuters
www.expressandstar.com
www.expressandstar.com
Travellers pitch up on Bilston road for sixth time this year « Express & Star
www.imediaethics.org
www.imediaethics.org
2 more Journalists charged with Phone Hacking Conspiracy
www.theregister.co.uk
www.theregister.co.uk
Russia to SAP, Apple: Hand over source code to prove you're not spies • The Register
getprismatic.com
getprismatic.com
Cyber security : how Cisco use graph analytics to identify threats - Prismatic
www.thehindubusinessline.com
www.thehindubusinessline.com
Moser Baer becomes the first domestic brand to launch information-security token with 80 KB memory to augment the Governments thrust on domestic manufacturing | Business Line
allafrica.com
allafrica.com
allAfrica.com: Kenya to Launch Unified Web Portal to Protect Against Hackers
www.digit.in
www.digit.in
India's security market to reach $1.06 billion in 2015: Gartner | Digit.in
vpncreative.net
vpncreative.net
Tokyo Police Launch Formal Mt. Gox Investigation Over Missing Bitcoin | VPN Creative
www.isn.ethz.ch
www.isn.ethz.ch
Exporting Surveillance: A New International Security Issue / ISN
www.globalpost.com
www.globalpost.com
Bitcoins stolen from Mt. Gox several times through hacking | GlobalPost
blogs.wsj.com
blogs.wsj.com
Tokyo Police Formally Investigate Missing Bitcoin - Japan Real Time - WSJ
www.scmp.com
www.scmp.com
‘Chinese hackers’ stole data on Israel’s Iron Dome missile shield | South China Morning Post
www.streetwisetech.com
www.streetwisetech.com
Lavasoft Ad-aware Antivirus: The Best Antivirus Software in the Market
www.siliconrepublic.com
www.siliconrepublic.com
Gigglebit: ‘I hacked before hacking was cool …’ - Enterprise - | siliconrepublic.com - Ireland's Technology News Service
www.thestar.com.my
www.thestar.com.my
Connected devices have huge security holes: study - Tech News | The Star Online
www.streetwisetech.com
www.streetwisetech.com
Trend Micro Titanium Antivirus: All-in-One Protection Offer
www.skynews.com.au
www.skynews.com.au
Cyber attack causes major disruption
researchcenter.paloaltonetworks.com
researchcenter.paloaltonetworks.com
Reusable Mobile App Libraries Introduce Reusable Security Issues ‹ Palo Alto Networks BlogPalo Alto Networks Blog
fullcomment.nationalpost.com
fullcomment.nationalpost.com
Today’s letters: ‘The free world will stand strong and prevail’ | National Post
tech.firstpost.com
tech.firstpost.com
India's security market to hit $1.06 billion by 2015: Gartner - Tech2
media.watoday.com.au
media.watoday.com.au
Mass pitch invasion overwhelms security
www.thestar.com.my
www.thestar.com.my
Home security systems vulnerable to hackers, cyberattacks - Tech News | The Star Online
aeon.co
aeon.co
Where do children’s earliest memories go? – Kristin Ohlson – Aeon
www.securitytube.net
www.securitytube.net
Owasp Global Webinar - Php Security Project
in.reuters.com
in.reuters.com
UPDATE 1-Israel's 'Iron Dome' makers were hit by hackers, expert says| Reuters
www.tulsaworld.com
www.tulsaworld.com
Walgreens' new pharmacy safes installed to deter drug robberies - Tulsa World: Homepage3
www.bbc.com
www.bbc.com
BBC News - Smart home kit proves easy to hack, says HP study
vpncreative.net
vpncreative.net
Senate Bill Proposes Sweeping NSA Reform...Again | VPN Creative
en.ria.ru
en.ria.ru
NSA Spying Could Cost American Companies Billions - US Report | World | RIA Novosti
tech.firstpost.com
tech.firstpost.com
Enterprise security has huge potential in India, to hit $1.06 billion by 2015: Gartner - Tech2
www.healthcare.gov
www.healthcare.gov
Health Insurance Marketplace, Affordable Care Act | HealthCare.gov
www.kyivpost.com
www.kyivpost.com
Telegraph: Tor admits hackers have unmasked 'anonymous' users
hamptonroads.com
hamptonroads.com
Riverside warns of data breach; ex-employee charged | HamptonRoads.com | PilotOnline.com
www.tirebusiness.com
www.tirebusiness.com
Small cars struggle in latest round of crash tests - News - Tire Business - The Tire Dealer's No. 1 News Source
tech.firstpost.com
tech.firstpost.com
India's security market to reach $1.06 billion in 2015: Gartner - Tech2
appadvice.com
appadvice.com
Russia wants Apple to hand over its iOS and OS X source code -- AppAdvice
www.engineering.com
www.engineering.com
Beware of Internet of Things Hacking > ENGINEERING.com
www.thehindu.com
www.thehindu.com
DMK wants Katju removed from PCI post - The Hindu
www.symantec.com
www.symantec.com
SSL Ciphers - Beyond Private key and Certificate | Symantec Connect
www.newsday.com
www.newsday.com
U.S. tech business losses foreseen if NSA spying isn't curbed - Newsday
tech.firstpost.com
tech.firstpost.com
India security market to touch $1.06 billion in 2015, says Gartner study - Tech2
www.theregister.co.uk
www.theregister.co.uk
BitTorrent launches decentralised crypto-fied chat app • The Register
time.com
time.com
Martha Stewart: Why I Love My Drone - TIME
www.tripwire.com
www.tripwire.com
Security Slice: The Problem with Password Solutions - The State of Security
www.tripwire.com
www.tripwire.com
Where Does Security Rank When Choosing Your New Language? - The State of Security
seekingalpha.com
seekingalpha.com
Lumber Liquidators Holdings' (LL) CEO Robert Lynch on Q2 2014 Results - Earnings Call Transcript | Seeking Alpha
www.monroenews.com
www.monroenews.com
Small cars fare poorly in crash tests | MonroeNews.com
www.dallasnews.com
www.dallasnews.com
Hackers exploit remote access to enter systems | Dallas Morning News
www.reuters.com
www.reuters.com
UPDATE 3-In rare move, Canada accuses Chinese of trying to hack govt network| Reuters
www.huffingtonpost.com
www.huffingtonpost.com
Chinese Hackers Stole 'Large Amounts' Of Tech Behind Israel's Iron Dome: Report
www.houstonchronicle.com
www.houstonchronicle.com
Small cars fare poorly in crash tests - Houston Chronicle
triblive.com
triblive.com
Feds admit cooperation remains an obstacle with corporations and cyber threats | TribLIVE
www.theregister.co.uk
www.theregister.co.uk
Multipath TCP speeds up the Internet so much that security breaks • The Register
www.koreaittimes.com
www.koreaittimes.com
Global Survey Reveals Impact of Data Breaches on Customer Loyalty | Korea IT Times
ahamlett.com
ahamlett.com
Blog - Alan Hamlett
www.cbronline.com
www.cbronline.com
Did Chinese hackers steal Israel’s Iron Dome missile data? - Computer Business Review
www.securitytube.net
www.securitytube.net
Owasp Global Webinar - Josh Sokol - Simple Risk
www.apppicker.com
www.apppicker.com
Apple seeds OS X Mavericks 10.9.5 beta to developers - Apppicker news 17092
www.asianage.com
www.asianage.com
Canada claims hacking by China | The Asian Age
mediamatters.org
mediamatters.org
As Murdoch Tries To Buy Time Warner, Two More Charged With Phone Hacking | Blog | Media Matters for America
tech.esper.com
tech.esper.com
Algebraic Data Types | Esper Tech Blog
www.securitytracker.com
www.securitytracker.com
Symantec Endpoint Protection Lets Local Users Gain Elevated Privileges - SecurityTracker (RSS)
www.scnow.com
www.scnow.com
County, city focusing on cyber security - SCNow: Living
money.cnn.com
money.cnn.com
Iron Dome makers got hacked, says cybersecurity firm - Jul. 29, 2014
www.youtube.com
www.youtube.com
4 Months to 40 Minutes - YouTube
www.zdnet.com
www.zdnet.com
Microsoft antitrust probe in China: the plot thickens | ZDNet
www.tulsaworld.com
www.tulsaworld.com
Walgreens' new pharmacy safes installed to deter robberies of controlled substances - Tulsa World: Homepage3
bgr.com
bgr.com
BlackBerry global market share: Too small to be counted | BGR
www.reuters.com
www.reuters.com
Fitch Revises P4 Sp zoo's Outlook to Stable on Subordinated PIK Plan| Reuters
green.autoblog.com
green.autoblog.com
Chevy Volt 'acceptable,' Nissan Leaf 'poor' in new IIHS safety tests
www.net-security.org
www.net-security.org
97% of Global 2000 remain vulnerable to due to Heartbleed
www.thisdaylive.com
www.thisdaylive.com
Absence of Cybercrime Law Worries Information Security Society, Articles | THISDAY LIVE
packetstormsecurity.com
packetstormsecurity.com
Joomla Kunena Forum 3.0.5 Cross Site Scripting ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
D-Link AP 3200 Missing Authentication / Cleartext Secret Storage ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
D-Link DWR-113 Cross Site Request Forgery ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Facebook For Android Information Disclosure / Open Proxy ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
HP Security Bulletin HPSBMU03078 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Elastic Search 1.1.1 Arbitrary File Read ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
SkaDate Lite 2.0 CSRF / Cross Site Scripting ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
SkaDate Lite 2.0 Remote Code Execution ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Fwknop Port Knocking Utility 2.6.3 ≈ Packet Storm
www.thisdaylive.com
www.thisdaylive.com
End of Support for Windows 2003 Puts 25m Payment Cards at Risk, Articles | THISDAY LIVE
www.smh.com.au
www.smh.com.au
Assistive technology puts creativity within reach
www.wbhm.org
www.wbhm.org
Kyle Whitmire: Uber Stalls In Birmingham (WBHM - Your NPR News Station)
www.securitytracker.com
www.securitytracker.com
dhcpcd Overloaded Options Processing Flaw Lets Remote Users Deny Service - SecurityTracker (RSS)
www.scmagazine.com
www.scmagazine.com
Symantec Endpoint Protection vulnerabilities enable privilege escalation - SC Magazine
packetstormsecurity.com
packetstormsecurity.com
Mandriva Linux Security Advisory 2014-139 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Mandriva Linux Security Advisory 2014-141 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Mandriva Linux Security Advisory 2014-140 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Ubuntu Security Notice USN-2302-1 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Debian Security Advisory 2992-1 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Joomla Kunena Forum 3.0.5 SQL Injection ≈ Packet Storm
www.richsoil.com
www.richsoil.com
micro heaters cut 87% off my electric heat bill
www.securitytube.net
www.securitytube.net
Owasp Global Webinar - Owasp Media Project
www.bankinfosecurity.com
www.bankinfosecurity.com
4 Facts About Operation Emmental - BankInfoSecurity
www.scmagazineuk.com
www.scmagazineuk.com
Nasdaq's 2010 brush with disaster only now truly understood - SC Magazine UK
www.jpost.com
www.jpost.com
IAI refutes claim that Iron Dome makers were hacked | JPost | Israel News
www.newsbiscuit.com
www.newsbiscuit.com
McAfee unveils first homeopathic antivirus software | NewsBiscuit
blog.trendmicro.com
blog.trendmicro.com
Simply Security News, Views and Opinions from Trend Micro, IncYour Journey to the Cloud: Securing the Modern Data Center » Simply Security News, Views and Opinions from Trend Micro, Inc
jutiagroup.com
jutiagroup.com
Market Update: Cisco Systems Inc (NASDAQ:CSCO) – Cisco Schedules Conference Call for Q4 Fiscal Year 2014 Financial Results
www.iclarified.com
www.iclarified.com
iClarified - Apple News - Russia Asks Apple to Hand Over iOS and Mac Source Code
www.telegraph.co.uk
www.telegraph.co.uk
Average Internet of Things device has 25 security flaws - Telegraph
www.informationweek.com
www.informationweek.com
HP Warns Of IoT Security Risks - InformationWeek
www.scmagazine.com
www.scmagazine.com
A five-month-long Tor attack attempting to 'deanonymize' users - SC Magazine
blogs.wsj.com
blogs.wsj.com
Sprint Will Sell a $12 Wireless Plan that Only Connects to Facebook or Twitter - Digits - WSJ
www.csoonline.com
www.csoonline.com
Tor hints at possible U.S. government involvement in recent attack | CSO Online
www.csoonline.com
www.csoonline.com
Internet of things devices contain high number of vulnerabilities, study finds | CSO Online
www.csoonline.com
www.csoonline.com
Antivirus products riddled with security flaws, researcher says | CSO Online
it-tna.com
it-tna.com
A Replication Feature is NOT a Disaster Recovery Plan - IT-TNA | IT-TNA
www.symantec.com
www.symantec.com
How does SSL work? What is an SSL handshake? | Symantec Connect
www.technewsworld.com
www.technewsworld.com
Hackers Back to Their Old Tricks | Hacking | TechNewsWorld
www.scmagazine.com
www.scmagazine.com
Leahy bill would end bulk data collection, introduce reforms - SC Magazine
www.tulsaworld.com
www.tulsaworld.com
New "pharmacy safe" placed in Tulsa Walgreens could lower robberies - Tulsa World: Homepage3
www.scmagazine.com
www.scmagazine.com
House passes two cyber security bills - SC Magazine
blogs.cars.com
blogs.cars.com
Not All Small Cars Shine in Latest IIHS Crash Tests - KickingTires
www.dailytech.com
www.dailytech.com
DailyTech - Windows Phone 8.1 Update Adds "Live Folders", Expands Cortana Support
www.forbes.com
www.forbes.com
Is BlackBerry Smart? - Forbes
www.linkedin.com
www.linkedin.com
Redirecting...
venturebeat.com
venturebeat.com
U.S. Senator Patrick Leahy's latest privacy bill culls NSA surveillance | VentureBeat | Business | by Ruth Reader
www.nextgov.com
www.nextgov.com
Hackers Raided Israeli Contractors That Built Iron Dome Missile Shield - Nextgov.com
www.scmagazine.com
www.scmagazine.com
Breach index: Encryption used in 4 percent of Q2 incidents - SC Magazine
forums.juniper.net
forums.juniper.net
Innovation Is A Human Condition And Shakespeare De... - J-Net Community
www.securitytracker.com
www.securitytracker.com
Tor 'relay_early' Cell Protocol Lets Certain Remote Users Conduct Traffic Confirmation Attacks - SecurityTracker (RSS)
bizblog.blackberry.com
bizblog.blackberry.com
How BlackBerry And Trend Micro Protect You From Malicious Apps | Inside BlackBerry for Business Blog
siliconangle.com
siliconangle.com
Cisco warns that network virtualization does have its downsides | SiliconANGLE
www.ft.com
www.ft.com
Two ex-News of the World journalists face phone hacking charges - FT.com
thevarguy.com
thevarguy.com
The New Security Sale: Network Virtualization for Micro-Segmentation | The VAR Guy Blog
www.hollywoodreporter.com
www.hollywoodreporter.com
Hacking: One Former 'News of the World' Journalist Charged, Another One Set to Be Charged
www.nbcnews.com
www.nbcnews.com
'Internet of Things' Devices Vulnerable to Attack: Report - NBC News
www.scmagazine.com
www.scmagazine.com
BlackBerry acquires voice and data encryption firm Secusmart - SC Magazine
www.securitytracker.com
www.securitytracker.com
Subversion Symlink Flaw in 'svnwcsub.py', 'irkerbridge.py', and 'daemonize.py' Lets Local Users Gain Elevated Privileges - SecurityTracker (RSS)
www.tripwire.com
www.tripwire.com
Everyday IoT Devices Packed With Alarming Number of Vulnerabilities - The State of Security
www.scmagazine.com
www.scmagazine.com
OTI report exposes economic costs of NSA spying - SC Magazine
www.scmagazine.com
www.scmagazine.com
Breach index: Encryption used in 23 percent of Q2 incidents - SC Magazine
www.iol.co.za
www.iol.co.za
China probes Microsoft for OS monopoly - IOL SciTech | IOL.co.za
www.autoevolution.com
www.autoevolution.com
Scion FR-S (Toyota GT 86) Gets 2014 Top Safety Pick in IIHS Small Overlap Crash [Video]
www.bit-tech.net
www.bit-tech.net
Microsoft under monopoly investigation in China | bit-tech.net
www.techzone360.com
www.techzone360.com
Two SafeNet Surveys Show It is Pretty Ugly Out There Regarding Data Breaches
www.tulsaworld.com
www.tulsaworld.com
New "pharmacy safe" placed in Tulsa Walgreens could lower robberies - Tulsa World: Homepagelatest
www.securitytube.net
www.securitytube.net
Owasp Global Webinar - Owasp Passfault Project
www.csoonline.com
www.csoonline.com
10 new social media scams to watch out for | CSO Online
www.bizjournals.com
www.bizjournals.com
FAU seeks entrepreneurs to create cybersecurity solutions - South Florida Business Journal
www.symantec.com
www.symantec.com
NetBackup 7.6.0.3 (NetBackup 7.6 Maintenance Release 3) is now available! | Symantec Connect
www.symantec.com
www.symantec.com
Criminal Motives Are Simple but Tactics are Crafty | Symantec Connect
www.macgasm.net
www.macgasm.net
Tor Network Breached, Your IP Isn't As Safe As You May Think
uk.reuters.com
uk.reuters.com
Two former senior Murdoch editors charged over UK phone-hacking| Reuters
techday.com
techday.com
Techday – Harré heads to Helensville to hassle Key on Internet economy
machinedesign.com
machinedesign.com
Design for Real-Time Control: Embedded Computing on Multicore Processors | Embedded content from Machine Design
www.scmagazine.com
www.scmagazine.com
House of Lords subcommittee highlights 'right to be forgotten' flaws - SC Magazine
washingtonexaminer.com
washingtonexaminer.com
Class action lawsuit filed against eBay over data breach | WashingtonExaminer.com
www.scmagazine.com
www.scmagazine.com
Programming error results in CVS Caremark mailing blunder - SC Magazine
www.autoevolution.com
www.autoevolution.com
IIHS Top Safety Pick+ Awarded to 2014 Chevrolet Volt [Video]
www.itproportal.com
www.itproportal.com
America's self harm problem: How the NSA is killing the US economy | ITProPortal.com
www.claimsjournal.com
www.claimsjournal.com
Small Cars Still Need to Improve in Overlap Front Crash Test: IIHS
tools.cisco.com
tools.cisco.com
Cisco Security Advisory: Multiple Vulnerabilities in Cisco IronPort Encryption Appliance (RSS)
www.csoonline.com
www.csoonline.com
Tor releases updates to address traffic confirmation attacks | CSO Online
blog.credit.com
blog.credit.com
Operation Emmental: Could Your Bank Get Hacked? | Credit.com
www.securityfocus.com
www.securityfocus.com
Trusted Boot 'loader.c' Security Bypass Vulnerability (RSS)
www.indctraining.com
www.indctraining.com
JRE - Junos Routing Essentials - INDC
www.usnews.com
www.usnews.com
2 tabloid journalists charged with phone hacking - US News
www.independent.co.uk
www.independent.co.uk
Neil Wallis, Andy Coulson’s deputy, once cleared of suspicion, faces hacking charges - Crime - UK - The Independent
www.eweek.com
www.eweek.com
Microsoft Offers OneNote With Apple-Flavored Updates
www.net-security.org
www.net-security.org
Managing BYOD & Enterprise Mobility USA 2014
hhvm.com
hhvm.com
Announcing a specification for PHP « HHVM
globenewswire.com
globenewswire.com
PCI Announces Definitive Agreement to Acquire Penn Pharma
www.stlamerican.com
www.stlamerican.com
Data breach is everybody’s business - St. Louis American: Guest Columnists
abcnews.go.com
abcnews.go.com
2 Tabloid Journalists Charged With Phone Hacking - ABC News
www.pcmag.com
www.pcmag.com
Asus C200 Chromebook Review & Rating | PCMag.com
www.rawstory.com
www.rawstory.com
Canada accuses China of hacking science agency computers
www.informationweek.com
www.informationweek.com
Windows Phone 8.1 Update: 7 Key Facts - InformationWeek
www.huffingtonpost.com
www.huffingtonpost.com
Two Former Senior Murdoch Editors Charged With Phone Hacking
www.bloomberg.com
www.bloomberg.com
Hackers Pose Threat to Business, U.S. Official Warns - Bloomberg
www.securityfocus.com
www.securityfocus.com
CMSimple 'required_classes.php' Remote File Include Vulnerability (RSS)
www.startribune.com
www.startribune.com
Canadian government says Chinese hackers infiltrated top research and development organization | Star Tribune
motherboard.vice.com
motherboard.vice.com
The DIY Neuroenhancers Hacking Their Brains With Electricity | Motherboard
www.princegeorgecitizen.com
www.princegeorgecitizen.com
National Research Council only the most recent victim of computer hacking - National - Prince George Citizen
sfist.com
sfist.com
Uber Still Illegally Working SFO, Allegedly Hacking The App To Do So: SFist
www.moneycontrol.com
www.moneycontrol.com
India IT security mkt to touch $1.06 bn in 2015: Gartner - Moneycontrol.com
www.cnbc.com
www.cnbc.com
Microsoft latest US tech target in Beijing
www.cio.com.au
www.cio.com.au
Microsoft faces anti-monopoly probe in China over Windows, Office - CIO
www.itbusinessedge.com
www.itbusinessedge.com
Data Breaches: On the Rise and Chasing Away Customers
www.expressandstar.com
www.expressandstar.com
Wallis dubs hack probe 'vindictive' « Express & Star
blog.torproject.org
blog.torproject.org
Tor security advisory: "relay early" traffic confirmation attack | The Tor Blog
roscidus.com
roscidus.com
My first unikernel - Thomas Leonard's blog
www.darkreading.com
www.darkreading.com
SSL After The Heartbleed
www.cnet.com
www.cnet.com
​BitTorrent unwraps chat app Bleep - CNE
www.broadwayworld.com
www.broadwayworld.com
Vaulterus launches BitCan'' - Next Generation Cloud Backup and Recovery Service for Databases and Files - BWWGeeksWorld
www.washingtontimes.com
www.washingtontimes.com
Chinese hackers stole 'huge quantities' of sensitive data on Israel's Iron Dome - Washington Times
betabeat.com
betabeat.com
BitTorrent Debuts Ultra Secure Chat App to Protect Messages from Hackers | | Betabeat
news.sky.com
news.sky.com
NOTW Journalists Charged With Phone Hacking
adtmag.com
adtmag.com
Java Devs Get Mac OS X Support in Open Source Zulu -- Application Development Trends: For Software Development Professionals
web.orange.co.uk
web.orange.co.uk
NOTW Journalists Charged With Phone Hacking | Orange UK
ca.reuters.com
ca.reuters.com
Two former senior Murdoch editors charged over UK phone-hacking| Top News| Reuters
www.nydailynews.com
www.nydailynews.com
IIHS front overlap crash test proves difficult for small car models - NY Daily News
www.macobserver.com
www.macobserver.com
Ford Ditching BlackBerry for iPhone for Global Corporate Use - The Mac Observer
www.benchmarkmonitor.com
www.benchmarkmonitor.com
Microsoft (NASDAQ:MSFT) Facing ‘Anti-Monopoly’ Investigation in China as Technology ‘Cold War’ Heats Up | Benchmark Monitor
www.businessweek.com
www.businessweek.com
Hackers Pose Threat to Business, U.S. Official Warns - Businessweek
www.microsoft.com
www.microsoft.com
Get Smart About Mobile Phone Safety | Microsoft Security
www.bbc.com
www.bbc.com
BBC News - UK to allow driverless cars on public roads in January
www.securitytube.net
www.securitytube.net
Owasp Global Webinar - Owasp Reverse Engineering And Code Modification Project
www.net-security.org
www.net-security.org
Layered security in the cloud
www.marketwired.com
www.marketwired.com
Solix Announces Solix Big Data Suite: First ILM Application Framework for Enterprise Analytics on a Petabyte Scale
www.autospies.com
www.autospies.com
MINI Countryman Comes Out On Top In Latest Round Of Small Car Crash Testing - AutoSpies Auto News
www.huffingtonpost.co.uk
www.huffingtonpost.co.uk
Heads in the Sand When It Comes to Small Business Security | David Emm
www.cultofmac.com
www.cultofmac.com
Russia tells Apple it wants to check its source code for spying | Cult of Mac
www.infosecisland.com
www.infosecisland.com
Facebook “Enter Details Here to Enable Your Account”
twitter.com
twitter.com
Twitter / CiscoSecurity : You’ve got a friend in us! ...
www.csoonline.com
www.csoonline.com
Tor Attack Confirmed | CSO Online
www.pcmag.com
www.pcmag.com
Protect Yourself From Cyber-Snoops, Stalkers, and Thieves at School | PCMag.com
www.telegraph.co.uk
www.telegraph.co.uk
How much would you pay to recover your digital life? - Telegraph
www.infosecisland.com
www.infosecisland.com
Real Hacks of Critical Infrastructure are Occurring – Information Sharing is Not Working
www.pcworld.com
www.pcworld.com
Antivirus products riddled with security flaws, researcher says | PCWorld
www.ctvnews.ca
www.ctvnews.ca
Small car crash tests: All but one fare poorly | CTV News | Autos
www.thelawyer.com
www.thelawyer.com
No harm, no foul — appellate court finds no CMIA claim without actual injury | Briefings | The Lawyer
hamptonroads.com
hamptonroads.com
Riverside Health warns 2,000 of possible data breach | HamptonRoads.com | PilotOnline.com
www.citeworld.com
www.citeworld.com
Despite bolstering its offerings, BlackBerry is still stuck in the past | CITEworld
a16z.com
a16z.com
The Happy Demise of the 10X Engineer | Andreessen Horowitz
www.cardiovascularbusiness.com
www.cardiovascularbusiness.com
Use of quality measures prevents kidney injuries in 1 in 5 PCI patients | Cardiovascular Business
www.forbes.com
www.forbes.com
Can You Completely Trust Tor To Protect Your Privacy? Fresh Attacks Would Suggest Not - Forbes
www.buryfreepress.co.uk
www.buryfreepress.co.uk
Man charged in US with hacking will face no UK charges - Bury Free Press
www.telegraph.co.uk
www.telegraph.co.uk
Tor admits hackers have unmasked 'anonymous' users - Telegraph
www.wcti12.com
www.wcti12.com
Chevy Volt is insurance group's Top Safety Pick | Money - WCTI NewsChannel 12
kdvr.com
kdvr.com
Chevy Volt is insurance group’s Top Safety Pick | kdvr.com
www.v3.co.uk
www.v3.co.uk
Hackers caught hunting Tor hidden services - IT News from V3.co.uk
www.anandtech.com
www.anandtech.com
AnandTech | Microsoft Details Next Windows Phone Update With Folders, Expanded Cortana, and More
www.infosecurity-magazine.com
www.infosecurity-magazine.com
B.Y.O.E: Bring Your Own Encryption - Prevent a Data Breach and Stay out of the Headlines - Infosecurity
www.itproportal.com
www.itproportal.com
Hang your heads in shame: 70% of us spend more time with phones and tablets than family and friends | ITProPortal.com
www.huffingtonpost.com
www.huffingtonpost.com
Make Information Security a Priority | Robert Siciliano
www.securityfocus.com
www.securityfocus.com
ol-commerce Multiple SQL Injection and Multiple Cross Site Scripting Vulnerabilities (RSS)
www.securityfocus.com
www.securityfocus.com
Concrete5 Cross Site Scripting and Path Disclosure Vulnerabilities (RSS)
www.securityfocus.com
www.securityfocus.com
IP.Board Cross Site Scripting Vulnerability (RSS)
www.securityfocus.com
www.securityfocus.com
MyConnection Server 'test.php' Multiple Cross Site Scripting Vulnerabilities (RSS)
www.symantec.com
www.symantec.com
How safe is your quantified self? Tracking, monitoring, and wearable tech | Symantec Connect
www.theregister.co.uk
www.theregister.co.uk
Tor attack nodes RIPPED MASKS off users for 6 MONTHS • The Register
www.chiswickw4.com
www.chiswickw4.com
Neil Wallis Facing Phone- Hacking Charge
www.chinatopix.com
www.chinatopix.com
How Hackers Hack: the Six Steps to Successful Hacking : Tech : Chinatopix
www.federaltimes.com
www.federaltimes.com
Can Big Data better secure DoD networks? | Federal Times | federaltimes.com
www.bbc.com
www.bbc.com
BBC News - Canada National Research Council 'hacked by Chinese spies'
windowsitpro.com
windowsitpro.com
Microsoft Improves Windows Phone for the Enterprise with Update 1 | Windows Phone content from Windows IT Pro
www.darkreading.com
www.darkreading.com
Security Holes Found In Some DLP Products
www.net-security.org
www.net-security.org
0-days found in Symantec Endpoint Protection
www.heraldonline.com
www.heraldonline.com
PORTLAND, Ore.: Tripwire Retail Survey: PCI Compliance Contributes To False Sense of Security | Business Wire | Rock Hill Herald Online
gmailblog.blogspot.fr
gmailblog.blogspot.fr
Official Gmail Blog: Send money to friends with Gmail and Google Wallet
www.csoonline.com
www.csoonline.com
iPhone gets first free app for encrypting voice calls | CSO Online
www.sdbmagazine.com
www.sdbmagazine.com
Study shows link between data breach and fraud vic - SDB - Storage & Destruction Business
www.sequoyahcountytimes.com
www.sequoyahcountytimes.com
Disaster recovery grant possible - Sequoyah County Times: News
rcpmag.com
rcpmag.com
Microsoft Study Touts Disaster Recovery in Public Cloud -- Redmond Channel Partner
packetstormsecurity.com
packetstormsecurity.com
DDoS Takes Down Cirrus Comms ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Hackers Hitting The Video Games Industry With IP-Stealing Attacks ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
UK To Allow Driverless Cars On Public Roads In January ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Researcher Finds Exploitable Flaws In 14 AV Engines ≈ Packet Storm
www.recordnet.com
www.recordnet.com
NSA should target those worth targeting | Recordnet.com
www.miltonkeynes.co.uk
www.miltonkeynes.co.uk
Milton Keynes police offering online tips to beat the burglars - Milton Keynes Citizen
boingboing.net
boingboing.net
The magic of hacking reality - Boing Boing
www.lifehacker.co.in
www.lifehacker.co.in
Most Popular Desktop Antivirus Application: Avast! Free Antivirus | Life Hacker India
www.gamerevolution.com
www.gamerevolution.com
Two Tribes Announces RIVE
www.huffingtonpost.co.uk
www.huffingtonpost.co.uk
Phone Hacking: Neil Wallis And Jules Stenson, Former News Of The World Journalists, Charged
economictimes.indiatimes.com
economictimes.indiatimes.com
India security market to touch $1.06 billion in 2015: Gartner - The Economic Times
www.fieldtechnologiesonline.com
www.fieldtechnologiesonline.com
DMI Recognized In Gartner Magic Quadrant For Managed Mobility Services For Second Year In A Row Evaluation Based On Completeness Of Vision And Ability To Execute
www.castanet.net
www.castanet.net
Terry Fox day in Manitoba - Canada News - Castanet.net
www.prnewswire.com
www.prnewswire.com
Data Loss Prevention Failures: Discuss Live on Dark Reading Radio -- NEW YORK, July 30, 2014 /PRNewswire/ --
www.scotsman.com
www.scotsman.com
Two News of World’s journalists in hacking charge - The Scotsman
www.gulf-times.com
www.gulf-times.com
Canada accuses Chinese of hacking attempt
comicbook.com
comicbook.com
Norton Launches Hitchhiker's Guide to the Galaxy-Themed Antivirus Site | Comicbook.com
www.standard.co.uk
www.standard.co.uk
Two ex-News of the World journalists charged with conspiracy to hack phones - Crime - News - London Evening Standard
www.dailymail.co.uk
www.dailymail.co.uk
Former News of the World deputy editor Neil Wallis and colleague charged with conspiracy to hack phones  | Mail Online
www.mobilewebuser.com
www.mobilewebuser.com
Why is Microsoft Security Essentials Important?
www.esecurityplanet.com
www.esecurityplanet.com
Sony Settles Data Breach Lawsuit for $15 Million - eSecurity Planet
insurancenewsnet.com
insurancenewsnet.com
PCI Announces Definitive Agreement to Acquire Penn Pharma - Top News - InsuranceNewsNet.com
www.csoonline.com
www.csoonline.com
Zero-day flaws found in Symantec's Endpoint Protection | CSO Online
www.csoonline.com
www.csoonline.com
Homeland Security wants corporate board of directors more involved in cyber-security | CSO Online
www.csoonline.com
www.csoonline.com
British hacker Gary McKinnon launches SEO start-up | CSO Online
www.csoonline.com
www.csoonline.com
Defunct Koler ransom Trojan attacked 200,000 Android users in matter of weeks | CSO Online
www.securitytube.net
www.securitytube.net
Owasp Appsec Europe 2014 - Mobile Track
www.nintendo-insider.com
www.nintendo-insider.com
Two Tribes announce robot hacking shooter RIVE | Nintendo Insider
www.biztechafrica.com
www.biztechafrica.com
Gartner: Beware of the Data Lake fallacy | BiztechAfrica Mobile,Technology & IT News Africa
www.latimes.com
www.latimes.com
Mini Cooper Countryman wins insurance group's top rating in crash test - LA Times
www.marketwatch.com
www.marketwatch.com
NCP engineering Appoints Patrick Oliver Graf as CEO - MarketWatch
www.forbes.com
www.forbes.com
Small Cars, Including Two Electric Models, Show Mixed Results In New Crash Tests - Forbes
img.ly
img.ly
New racks packed full of @JuniperNetworks gear! EX45/4200 stack that replaced Cisco Cat6509 I posted. @JNETCommunity - img.ly
www.theinquirer.net
www.theinquirer.net
Security researcher finds exploitable flaws in 14 major anti-virus engines- The Inquirer
www.cnet.com
www.cnet.com
Canada accuses China of hacking into National Research Council - CNE
www.virtual-strategy.com
www.virtual-strategy.com
Global Survey Reveals Impact of Data Breaches on Customer Loyalty | Virtual-Strategy Magazine
www.net-security.org
www.net-security.org
IoT devices are filled with security flaws, researchers warn
usa.kaspersky.com
usa.kaspersky.com
Kaspersky Internet Security Awarded MRG Effitas Online Banking Browser Security Certification | Kaspersky Lab US
www.cbronline.com
www.cbronline.com
Are Android hackers using fake IDs to get into mobiles? - Computer Business Review
www.express.co.uk
www.express.co.uk
Phone-hacking scandal: Two more News of the World journalists charged | UK | News | Daily Express
freepressjournal.in
freepressjournal.in
India security mkt to touch $1.06 bn in 2015: Gartner - Free Press Journal
www.skynews.com.au
www.skynews.com.au
Connected devices have huge security holes
www.bloomberg.com
www.bloomberg.com
Two Ex-News Corp. Editors Charged With Hacking in U.K. - Bloomberg
edition.cnn.com
edition.cnn.com
The hackers who recovered NASA's lost lunar photos - CNN.com
www.highdefdigest.com
www.highdefdigest.com
'Toki Tori' Dev Announces 'RIVE' | High-Def Digest
www.yourlocalguardian.co.uk
www.yourlocalguardian.co.uk
News of the World journalist charged with phone hacking (From Your Local Guardian)
money.cnn.com
money.cnn.com
Chevy Volt top safety pick says insurance group - Jul. 30, 2014
community.norton.com
community.norton.com
Android Security Bug Uses “Fake ID” To Access User... - Norton Community
www.securitytracker.com
www.securitytracker.com
Google Android Certificate Chain Validation Flaw Lets Applications Gain Elevated Privileges - SecurityTracker (RSS)
www.darkreading.com
www.darkreading.com
Bayshore Networks Extends PallatonCapabilities for High-Value IP Protection
www.financialexpress.com
www.financialexpress.com
Indian security market to grow 8 pct in 2014: Gartner - Financial Express
www.skynews.com.au
www.skynews.com.au
Ex-Murdoch journalists face hacking charges
www.sci-tech-today.com
www.sci-tech-today.com
Android 'Fake ID' Puts Millions of Users at Risk | Sci-Tech Today
www.marketwatch.com
www.marketwatch.com
Adaptiva TechEd Survey Reveals Over Half Still Running XP, WithStronger Than Expected Windows 8 Adoption Plans - MarketWatch
www.itnews.com.au
www.itnews.com.au
A ten-point plan for disrupting security - Strategy - Security - Blogs - iTnews.com.au
insurancenewsnet.com
insurancenewsnet.com
Senate Environment and Public Works Subcommittee on Clean Air and Nuclear Safety Hearing - Top News - InsuranceNewsNet.com
www.virtual-strategy.com
www.virtual-strategy.com
Vaultize Releases New File Sync and Share Platform With Integrated Enterprise Mobility Management and Mobile-first User Experience | Virtual-Strategy Magazine
seclists.org
seclists.org
Information Security News: Utilities ignorant of IT security despite pounding by hackers: Ponemon
seclists.org
seclists.org
Bugtraq: Vulnerabilities in Facebook and Facebook Messenger for Android [STIC-2014-0529]
www.securityfocus.com
www.securityfocus.com
phpMyAdmin CVE-2014-4349 Multiple Cross Site Scripting Vulnerabilities (RSS)
www.securityfocus.com
www.securityfocus.com
phpMyAdmin CVE-2014-4348 Multiple Cross Site Scripting Vulnerabilities (RSS)
www.securityfocus.com
www.securityfocus.com
Cisco Unified Customer Voice Portal CVE-2014-3325 Multiple Cross Site Scripting Vulnerabilities (RSS)
www.networkworld.com
www.networkworld.com
New SSL server rules go into effect Nov. 1 | Network World
www.expressandstar.com
www.expressandstar.com
Trinity allots £4m for hack claims « Express & Star
www.techworld.com.au
www.techworld.com.au
Microsoft's Windows Phone 8.1 update takes Cortana to China, UK, and three other countries - Techworld
globenewswire.com
globenewswire.com
Verdasys Promotes Peter Tyrrell to Chief Operating Officer
www.skynews.com.au
www.skynews.com.au
Small cars fare poorly in crash tests
www.consumeraffairs.com
www.consumeraffairs.com
IIHS gives mixed ratings to small cars in small overlap front crash test
www.bbc.com
www.bbc.com
BBC News - Two ex-News of the World journalists charged over hacking - CPS
www.marketwatch.com
www.marketwatch.com
375 Million Customer Data Records Compromised in 2014 - Retail Industry Hit Hardest - MarketWatch
www.insurancejournal.com
www.insurancejournal.com
Most Electric and Small Cars Come Up Short in IIHS Safety Ratings
seclists.org
seclists.org
Bugtraq: [security bulletin] HPSBMU03078 rev.1 - HP CloudSystem Foundation and HP CloudSystem Enterprise Software running OpenSSL, Remote Unauthorized Access or Disclosure of Information
seclists.org
seclists.org
Bugtraq: [ MDVSA-2014:140 ] owncloud
www.zdnet.com
www.zdnet.com
NSA Playset, 911 hacked and war cats: A wild ride at DEF CON 22 | ZDNet
tuoitrenews.vn
tuoitrenews.vn
Canada says China hacked science agency computers
www.infoworld.com
www.infoworld.com
Mobile management: Making sense of your options | Consumerization Of It - InfoWorld
www.thetimes.co.uk
www.thetimes.co.uk
Two charged with phone hacking after probe into NoTW features desk | The Times
www.infoworld.com
www.infoworld.com
3 zero-day flaws found in Symantec's Endpoint Protection | Security - InfoWorld
www.marketwatch.com
www.marketwatch.com
Bayshore Networks(R) Extends Pallaton(TM) Capabilities for High-ValueIP Protection - MarketWatch
www.infoworld.com
www.infoworld.com
iPhone gets first free app for encrypting voice calls | Security - InfoWorld
www.belfasttelegraph.co.uk
www.belfasttelegraph.co.uk
Wallis dubs hack probe 'vindictive' - BelfastTelegraph.co.uk
www.marketwatch.com
www.marketwatch.com
Medidata Selects Sumo Logic and The Herjavec Group for NewAdvancements in Data Security - MarketWatch
insurancenewsnet.com
insurancenewsnet.com
NIST, HHS Sponsor 7th Annual Conference on Healthcare Information Security - Top News - InsuranceNewsNet.com
indiatoday.intoday.in
indiatoday.intoday.in
Microsoft's Cortana AI comes to India as an alpha : News, News - India Today
www.harrogateadvertiser.co.uk
www.harrogateadvertiser.co.uk
'Hack plot' journalists charged - Harrogate Advertiser
www.whatech.com
www.whatech.com
Global Bring Your Own Device and Enterprise Mobility Market 2019 Forecast and Analysis - WhaTech
www.telegraph.co.uk
www.telegraph.co.uk
Former News of the World executives charged with phone hacking offences - Telegraph
www.net-security.org
www.net-security.org
Free iPhone app for encrypted phone calls released
seclists.org
seclists.org
Bugtraq: [Onapsis Security Advisory 2014-024] Hard-coded Username in SAP FI Manager Self-Service
seclists.org
seclists.org
Bugtraq: [Onapsis Security Advisory 2014-023] HTTP verb tampering issue in SAP_JTECHS
www.securityfocus.com
www.securityfocus.com
Moodle Repositories CVE-2014-3541 PHP Code Injection Vulnerability (RSS)
www.businessinsider.com
www.businessinsider.com
Hack To Save Your Snapchats Forever - Business Insider
ibnlive.in.com
ibnlive.in.com
Microsoft Xbox One to be launched in China on September 23 - IBNLive
betanews.com
betanews.com
Internet of Things devices open up new avenues for hackers
www.themalaymailonline.com
www.themalaymailonline.com
Former ‘News of the World’ editors charged over UK phone-hacking | World | The Malay Mail Online
www.independent.ie
www.independent.ie
Two former NOTW journalists to be charged for phone hacking - Independent.ie
www.clickondetroit.com
www.clickondetroit.com
Chevy Volt is insurance group's Top Safety Pick | Business - Home
www.computerworld.com.au
www.computerworld.com.au
LG G3 deep-dive review: A phone with great specs, but real-world issues - Computerworld
www.theglobeandmail.com
www.theglobeandmail.com
Chinese hacked government computers, Ottawa says - The Globe and Mail
www.belfasttelegraph.co.uk
www.belfasttelegraph.co.uk
'Hack plot' journalists charged - BelfastTelegraph.co.uk
www.nydailynews.com
www.nydailynews.com
Two former senior Murdoch editors charged over UK phone-hacking - NY Daily News
www.theregister.co.uk
www.theregister.co.uk
iWallet: No BONKING PLEASE, we're Apple • The Register
www.securitytube.net
www.securitytube.net
Owasp Appsec Europe 2014 - Malware &Amp; Defence Track
seclists.org
seclists.org
Bugtraq: [Onapsis Security Advisory 2014-025] Multiple Cross Site Scripting Vulnerabilities in SAP HANA XS Administration Tool
seclists.org
seclists.org
Bugtraq: [Onapsis Security Advisory 2014-026] Missing authorization check in function modules of BW-SYS-DB-DB4
www.brianmadden.com
www.brianmadden.com
EMM Smackdown: Head-to-head analysis of Airwatch by VMware, Citrix, Good Technology, Microsoft Enterprise Mobility Suite, MobileIron, IBM MaaS360 and more! - Ruben Spruijt - BrianMadden.com
www.youtube.com
www.youtube.com
Ferrari Case Study - YouTube
www.networkworld.com
www.networkworld.com
Microsoft's Windows Phone 8.1 update takes Cortana to China, UK, and three other countries | Network World
www.streetwisetech.com
www.streetwisetech.com
AVG Antivirus: Giving Optimum Security -
www.macworld.co.uk
www.macworld.co.uk
Apple Aperture vs Adobe Photoshop Lightroom - Review - Macworld UK
money.cnn.com
money.cnn.com
Contract Announcements, Financial Results, Recognitions, and Market Activity - Research Reports on Fortinet, NeuStar, Ruckus Wireless, ChannelAdvisor and Silicom
www.infosecurity-magazine.com
www.infosecurity-magazine.com
Infosecurity - Comment Crew Chinese Hackers Blamed for Stealing Israeli Missile Secrets
www.macleans.ca
www.macleans.ca
Canadian spy agency says Chinese hacked into NRC computers
www.security-faqs.com
www.security-faqs.com
Heartbleed Research Shows Top Companies Are Slow To Mitigate Threat
seclists.org
seclists.org
Bugtraq: [SECURITY] [DSA 2992-1] linux security update
seclists.org
seclists.org
Bugtraq: WiFi HD v7.3.0 iOS - Multiple Web Vulnerabilities
www.cnnvd.org.cn
www.cnnvd.org.cn
中国国家信息安全漏洞库
www.securityfocus.com
www.securityfocus.com
Moodle CVE-2014-3546 Multiple Information Disclosure Vulnerabilities (RSS)
www.securityfocus.com
www.securityfocus.com
Moodle CVE-2014-3543 XML External Entity Information Disclosure Vulnerability (RSS)
www.securityfocus.com
www.securityfocus.com
Moodle Shibboleth Plugin CVE-2014-3552 Authentication Bypass Vulnerability (RSS)
www.securityfocus.com
www.securityfocus.com
Moodle Quiz CVE-2014-3545 Remote Code Execution Vulnerability (RSS)
www.theguardian.com
www.theguardian.com
Phone hacking: NoW’s Neil Wallis and Jules Stenson to be charged | UK news | theguardian.com
www.belfasttelegraph.co.uk
www.belfasttelegraph.co.uk
Ex-NotW pair face hacking charges - BelfastTelegraph.co.uk
www.kelownadailycourier.ca
www.kelownadailycourier.ca
National Research Council only the most recent victim of computer hacking - Daily Courier: National News
www.siliconindia.com
www.siliconindia.com
Gartner Says India Security Market is on Pace to Grow 8 Percent in 2014
www.infotechlead.com
www.infotechlead.com
InfotechLead.com | Security vendor revenue to grow to $953 mn in 2014 from $882 mn in 2013: Gartner
in.reuters.com
in.reuters.com
In rare move, Canada accuses Chinese of trying to hack govt network| Reuters
www.kidsandcars.org
www.kidsandcars.org
KidsAndCars.org
www.trust.org
www.trust.org
Two former senior Murdoch editors charged over UK phone-hacking
www.osnews.com
www.osnews.com
Another day, another sensationalist, unfounded security story
www.itv.com
www.itv.com
Two former NotW journalists charged with phone hacking - ITV News
www.scmagazineuk.com
www.scmagazineuk.com
Chinese hackers steal confidential documents on Israeli missile defence system - SC Magazine UK
www.nbcnews.com
www.nbcnews.com
How Technology Is Intensifying Gaza War Between Israel and Hamas - NBC News
seclists.org
seclists.org
Information Security News: OIG audit criticizes HHS access controls
seclists.org
seclists.org
Information Security News: Nigeria: Over 25 Million Payment Cards in Nigeria At Risk
seclists.org
seclists.org
Bugtraq: Kunena Forum Extension for Joomla Multiple Reflected Cross-Site Scripting Vulnerabilities
www.symantec.com
www.symantec.com
Cyber Shakedowns: A Hacker's New Payday | Symantec Connect
www.irishexaminer.com
www.irishexaminer.com
Congress urges Obama ‘not to take action’ | Irish Examiner
www.13wham.com
www.13wham.com
Congress shows support for Israel - 13WHAM ABC Rochester NY - Top Stories
www.digitaltrends.com
www.digitaltrends.com
Windows Phone 8.1 Update Concentrates on Cortana | Digital Trends
www.stripes.com
www.stripes.com
With Israel at war, US lawmakers give full support - Middle East - Stripes
www.newsobserver.com
www.newsobserver.com
WASHINGTON: Lawmakers struggle to seal $225M Iron Dome package | National Politics | NewsObserver.com
AllAfrica.com
AllAfrica.com
allAfrica.com: Home
whatwillilooklike.com
whatwillilooklike.com
What will I look like?
www.thehindubusinessline.com
www.thehindubusinessline.com
Gartner: Indian security market on pace to grow 8% in 2014 | Business Line
www.net-security.org
www.net-security.org
6 best practices to assure PCI compliance
www.firstpost.com
www.firstpost.com
Hackers stole documents from makers of Israeli defence system: Experts
www.tdtnews.com
www.tdtnews.com
Duo deny computer hacking charge - Temple Daily Telegram: News
www.prnewswire.co.uk
www.prnewswire.co.uk
Vaultize Releases New File Sync and Share Platform... -- NEW YORK and LONDON, July 30, 2014 /PR Newswire UK/ --
www.washingtonpost.com
www.washingtonpost.com
How Anonymous and other hacktivists are waging war on Kenya - The Washington Post
betanews.com
betanews.com
Cleaning up after viruses -- which antivirus solutions are best?
www.virtual-strategy.com
www.virtual-strategy.com
Peerlyst Poised to Redefine Information Security Collaboration at Black Hat USA Conference | Virtual-Strategy Magazine
www.infoworld.com
www.infoworld.com
Who's managing your managed services? You, ultimately | Data Center - InfoWorld
fox17online.com
fox17online.com
Chevy Volt is insurance group’s Top Safety Pick | Fox17
time.com
time.com
Canada Accuses Chinese Hackers of Cyberattack - TIME
www.crikey.com.au
www.crikey.com.au
More Edward Snowdens to blow the whistle on the NSA | Crikey
www.net-security.org
www.net-security.org
Looking at insider threats from the outside
www.securitytube.net
www.securitytube.net
Owasp Appsec Europe 2014 - Security Management &Amp; Training Track
www.pcworld.com
www.pcworld.com
5 unexpectedly useful apps | PCWorld
globalnews.ca
globalnews.ca
Chinese hackers hit NRC computers, network shut down - National | Globalnews.ca
www.net-security.org
www.net-security.org
375 million customer records compromised in 2014
www.westerlynews.ca
www.westerlynews.ca
National Research Council only the most recent victim of computer hacking - National News - Tofino Ucluelet Westerly
www.cbsnews.com
www.cbsnews.com
Cyber warfare: The next front in the Israel-Gaza conflict? - CBS News
gadgets.ndtv.com
gadgets.ndtv.com
Canada Accuses China of Hacking Key Government Network | NDTV Gadgets
www.prweb.com
www.prweb.com
Peerlyst Poised to Redefine Information Security Collaboration at Black Hat USA Conference
www.newyorker.com
www.newyorker.com
Nukes of Hazard - The New Yorker
www.smh.com.au
www.smh.com.au
Hackers plundered Israeli firms that built Iron Dome missile defence system
www.cso.com.au
www.cso.com.au
Utilities ignorant of IT security despite pounding by hackers: Ponemon - CSO | The Resource for Data Security Executives
allafrica.com
allafrica.com
allAfrica.com: Nigeria: Over 25 Million Payment Cards in Nigeria At Risk
www.streetwisetech.com
www.streetwisetech.com
Kaspersky Internet Security - Version 2015 -
www.newvision.co.ug
www.newvision.co.ug
Microsoft to comply with China amid probe
www.theregister.co.uk
www.theregister.co.uk
Firm issues soft denial against Iron Dome hack • The Register
www.scmagazineuk.com
www.scmagazineuk.com
4% of Googlebots are fake and can launch attacks - SC Magazine UK
www.dqindia.com
www.dqindia.com
EMC makes Redefine Possible - Dataquest
www.playstationlifestyle.net
www.playstationlifestyle.net
Rive PS4, Xbox One, Wii U & PC Versions Planned, Say Two Tribes
www.scmagazine.com
www.scmagazine.com
Report: Hackers stole data from Israeli defense firms - SC Magazine
www.itnewsonline.com
www.itnewsonline.com
IT News Online > - Bit9 + Carbon Black Announces Bit9 Security Platform Version 7.2
www.independent.ie
www.independent.ie
China regulator announces anti-monopoly probe of Microsoft - Independent.ie
www.belfasttelegraph.co.uk
www.belfasttelegraph.co.uk
China 'hacks data' from Israel's Iron Dome missile shield, says report - BelfastTelegraph.co.uk
www.itnewsonline.com
www.itnewsonline.com
IT News Online > - Bit9 + Carbon Black Announces Integrated Endpoint Threat Prevention, Detection and Response Solution
in.reuters.com
in.reuters.com
Israel's 'Iron Dome' makers were hit by hackers, expert says| Reuters
www.lexology.com
www.lexology.com
Appellate Court rules medical information must actually have been viewed by an unauthorized person for a plaintiff to recover under the California Confidentiality of Medical Information Act - Lexology
www.insidermonkey.com
www.insidermonkey.com
Details on Microsoft Corporation (MSFT)’s Investigations in China Over Monopoly Allegations - Insider Monkey