Think Before you “Share” to Prevent Identity Theft -
Apple premiers automatic update for security flaw - SC Magazine
Def Con 22 Burner Phone Ddos 2 Dollars A Day 70 Calls A Minute
Security Tips for the Holidays - Security News - Trend Micro USA
Cisco Security sur Twitter : "Have a Snorty Holiday! RT to spread the holiday cheer!"
RSA sur Twitter : "Happy holidays and a joyful 2015 from all of us at RSA!"
Def Con 22 Bug Bounty Programs Evolution
The Gift that Keeps on Giving: How Our Online Habits are Paving the Way for a Society of Surveillance for our Children and how to avoid becoming a victim
Bulletproof SSL and TLS – Blog Post – RSA Conference
Trend Micro sur Twitter : "We wish everyone safe travels, wonderful family gatherings and the happiest of holiday seasons!"
Def Con 22 Blowing Up The Celly Building Your Own Sms - Mms Fuzzer
Kaspersky Lab sur Twitter : "Wishing you all a happy holiday season!"
RSA Conference sur Twitter : ""
Cisco Security sur Twitter : "To our valued customers, partners & employees around the globe, we hope you have very #HappyHolidays!"
Explore Global disaster recovery services market that is expected to grow at a CAGR of 12.47% to 2019 - WhaTech
Schneier on Security: "Santa Claus and the Surveillance State"
Why Some Cities Are Using Cloud-Based Approaches to Disaster Recovery
Wickr Desktop v2.2.1 Windows - Denial of Service Vulnerability (Demonstration Video) | VULNERABILITY MAGAZINE - Bug Bounties, Acknoweldgements & Security Research
Bugtraq: Lazarus Guestbook v1.22 - Multiple Web Vulnerabilities
Bugtraq: Wickr Desktop v2.2.1 Windows - Denial of Service Vulnerability
Introducing Slur
Wickr Desktop v2.2.1 Windows - Denial of Service Vulnerability - YouTube
Def Con 22 Blinding The Surveillance State
The Interview - Kernel
Def Con 22 Panel - Diversity In Information Security
Symantec sur Twitter : "Symantec would like to wish you and your families a very warm and Merry Christmas!"
Bugtraq: DRAM unreliable under specific access patern
Movers and Shakers: Sarasota Law Firm Launches New Data Breach Practice Group - The Bradenton Times - Local News for Bradenton and Manatee County - Free News for Bradenton, FL and Manatee County
Def Con 22 Domain Name Problems And Solutions
Consumers Permitted To Proceed With Data Breach Class Action Against Target | King & Spalding - JDSupra
What we can be thankful for in '14, and what we might expect in '15 - SC Magazine
Albuquerque Journal, on ISIS headline: There was no data breach | New Mexico News - KOAT Home
Def Con 22 Don't Ddos Me Bro Practical Ddos Defense
Cisco Security sur Twitter : "#CableWednesday - Holiday Edition! How does your tree compare to ours? #HappyHolidays!"
5 Tips On How To Prepare For A Data Breach | Insurance & Technology
COMMUNITY NOTES: Cyber security competition, teens donate diapers, more - Press Enterprise
MBR Wiper Attacks Hit Korean Power Plant: Trend Micro | SecurityWeek.Com
2015 technology trends – what are the security implications? | Information Age
Def Con 22 Dropping Docs On Darknets How People Got Caught
Phishing quiz: Can you spot a scam when you see one? Don't be so sure - CBS News
A forecast of the cyberthreat landscape in 2015 - SC Magazine
Using Endpoint Visibility to Protect Your Enterprise with RSA Security Analytics and RSA ECAT - YouTube
5 lessons to help security pros craft a New Year’s resolution | CSO Online
Dan Kaminsky sur Twitter : "The New Yorker wins."
The problem with Big Data - SC Magazine
Cisco Cloud Security for Public and Private Cloud – A Secure, and Compliant Cloud Data Center
Def Con 22 Elevator Hacking From The Pit To The Penthouse
3 South Florida Staples impacted by data breach - South Florida Business Journal
Korean Nuclear Plant Faces Data Leak and Destruction - Security Intelligence - Trend Micro USA
Security experts fear Sony attack to fuel more company extortion| Reuters
McAfee sur Twitter : "Hackers' hoaxes are all over the web. Steer clear of these #12Scams."
Download Details |
JPMorgan Chase Breach: From Nation State to Simple Mistake | The State of Security
Sony To Show 'The Interview' On Youtube, Other Internet Channels ≈ Packet Storm
SAN BERNARDINO: Girl Scouts learn about cyber security and related careers - Press Enterprise
JPMorgan Hackers Compromised Server Unprotected by Two-factor Authentication
Have you been naughty or nice? Find out if Santa knows. - YouTube
DNS attacks putting organizations at risk, survey finds - SC Magazine
A Silver Lining in the Sony Hack Attack?
Def Con 22 Empowering Hackers To Create A Positive Impact
Cisco Security sur Twitter : "2001: Cisco Networking Academy reached 100 countries and more than 318,000 students learning IT skills! #Cisco30"
Weathering the Storm: How to Build an Effective Long-Term Business Continuity Plan
Modified Zeus trojan targets numerous online banking systems - SC Magazine
Apple CEO Tim Cook coming to Huntsville for cyber security summit - Huntsville News | and ABC 31: Tech Alabama
SysAid Server Arbitrary File Disclosure ≈ Packet Storm
Debian Security Advisory 3110-1 ≈ Packet Storm
Cisco Security Advisory 20141222-ntpd ≈ Packet Storm
Juniper Networks Holiday Card - YouTube
AMSI 3.20.47 Build 37 File Disclosure ≈ Packet Storm
NotePad++ 6.6.9 Buffer Overflow ≈ Packet Storm
Nuit Du Hack 2015 Call For Papers ≈ Packet Storm
Rackspace Restored After DDOS Takes Out DNS ≈ Packet Storm
How Laws Restricting Tech Expose Us To Greater Harm ≈ Packet Storm
ATLANTIC MET COAL: Russian PCI tight, US high-vol blends aid costs - Coal | Platts News Article & Story
Trend Micro Consumer Security is the Sole Leader in Real-World Testing Done by Independent Organization -
US Politician Wants Details On The Sony Pictures Hack ≈ Packet Storm
JPMorgan Chase Mega-Hack Was A Simple Two-Factor Auth Fail ≈ Packet Storm
Cyber Security Resources to Protect You from Hackers
Staples stores in St. Petersburg, Largo, Bradenton hit by data breach - Tampa Bay Business Journal
Data and Analytics - Cisco
Information Security Training | Scottsdale, AZ | Cybersecurity | SANS
SANS Institute - Photos du journal | Facebook
Radware State of the Union: Ecommerce Page Speed & Web Performance I…
Belden Acquisition Promises a Bright Future for Tripwire
Phishing schemes: Don’t take the bait! -
Santa appreciated my behavior this year.
RSA sur Twitter : "Wishing everyone a joyful 2015 from all of us at RSA!"
Key industries train to thwart cyber attacks
Panel: Ephemeral Communications: Why And How?
Norton Security and Antivirus - Android Apps on Google Play
Schneier on Security: Did North Korea Really Attack Sony?
Santa Visits Children’s Hospitals Across North America using Cisco Video Technology
Shoppers can sue Target over data breach - Memphis Business Journal
Crimeware-as-a-Service offers custom targeting | CSO Online
How Laws Restricting Tech Actually Expose Us to Greater Harm | WIRED
8 Free Privacy Programs Worth Your Year-End Donations | WIRED
South Korean Nuclear Power Plant Hacked - Hacker News
Cybercrime group steals millions from Russian banks, targets US and European retailers | CIO
Mobile phones 'wide open' to global hackers - Telegraph
Def Con 22 Extreme Privilege Escalation On Windows 8 Uefi Systems
BBC News - South Korea's Park Geun-hye orders cyber security boost
Five cyber-security trends to watch for in 2015
Steven Sinofsky: Sony Hack Is A Major Security 'Breaking Point' - Business Insider
Bugtraq: Reflecting XSS Vulnerability in CMS Contenido 4.9.x-4.9.5
Senior Security Engineer (CISSP) at Western Carolina University (Western Carolinian) | Western Carolinian
Def Con 22 From Raxacoricofallapatorius With Love Case Studies In Insider Threats
The Gift that Keeps on Giving: 12 Ways Everyone Can Help IT This Holiday Season | Symantec Connect
Apple pushes first ever automated security update to Mac users| Reuters
Bugtraq: FreeBSD Security Advisory FreeBSD-SA-14:31.ntp
Bugtraq: Cisco Security Advisory: Multiple Vulnerabilities in ntpd Affecting Cisco Products
Apple Pushes Its First Automated Security Update To Squash Critical OS X NTP Flaw
Def Con 22 I Am A Legend Hacking Hearthstone With Machine Learning
Thoughts on Workplace Privacy
The 12 Hacks of Christmas – Part 3
10 Cloud Security Considerations for Healthcare
Rackspace restored after DDOS takes out DNS • The Register
Hacking the Internet of Things: Be Afraid of the Toasters
Chip-and-PIN will cut fraud | TheHill
Thoughts on Mobile Digital Parenting
ICANN's technical competence queried by Verisign report • The Register
The Case for N. Korea’s Role in Sony Hack — Krebs on Security
You Better Watch Out, You Better Not Click: Holiday Movie Threats - Security News - Trend Micro USA
Technology is still a distraction for drivers
POS malware crooks hack IP cams to validate targets • The Register
Threat-Centric Security: Top Security Highlight... | Cisco Communities
Def Con 22 How To You Feel About Your Mother Psych And The Se
What does the Future hold for Women in Tech
Sony hack reveals threat of ‘psychological’ cyber warfare | TheHill
Here Are 10 Internet Security Predictions For 2015 BySymantec [Infographic] | Business Insider India
Kaspersky Anti-Virus 2015 Review - PC Antivirus Software
Hack flings bootkits from Macs' Thunderbolts • The Register
7 high-tech holiday scams
The Changing Landscape of BYOD
Doh! WikiLeaks' PDF viewer springs XSS vuln • The Register
AutoIT-based POS Malware 'Sparks' Fresh Threat - Infosecurity Magazine
Boardroom or Baby? Why are there so few women in tech?
Big Data Analytics & Hadoop | Big Data Solutions | EMC
Def Con 22 How To Get Phone Companies To Just Say No To Wiretapping
MBR Wiper Attacks Strike Korean Power Plant
How to Identify Yourself, Digitally
Network Access Control Sure Isn’t What It Used to Be…
Best of Patch | Local News, Community, Sports, Shopping, Restaurants, Things To Do
Staples says 1.16M cards affected during data breach | CSO Online
SANS Institute
How New Cyber Security Federal Regulations Are Impacting Application and Network Security
ACCOAST-PCI: Prasugrel treatment should be deferred for non-STEMI | Cardiology
Local cyber security expert shares tips for Phoenix businesses after Sony hack - Phoenix Business Journal
Hackers - Deadly as Australia's wildlife - J-Net Community
Schneier on Security: Manipulating Juries with PowerPoint
US lawmaker asks Sony for details on data breach | Computerworld
oledump: Extracting Embedded EXE From DOC | Didier Stevens
Hot Cloud Swap: Migrating a Database Cluster with Zero Downtime
Def Con 22 How To Disclose An Exploit Without Getting In Trouble
SDN Comes Of Age - InformationWeek
Here’s To Second Acts
What the Sony breach means for security in 2015 | CSO Online
FBI Insights On Fighting Cybercrime -
How technology will change the way we behave in 2015
The Sony Hack: A Bitter Multi-Motive Pill to C.H.E.W.
Flaw in open-source PDF viewer could put WikiLeaks users, others at risk | CSO Online
A Security Carol | Core Security Blog
Experts Are Still Divided on Whether North Korea Is Behind Sony Attack | WIRED
Identity Fraud & Data Theft – Don’t be that Guy
Child Safe Initiative - Alamo ISSA
US lawmaker asks Sony for details on data breach | PCWorld
Forensic Examinations And Facts
Cyber Security masters degree | Information Security Masters Degree
China is key to North Korean Internet, but maybe not hackers | CSO Online
Your Six Favorite Posts of 2014 | Radware Blog
Coordinating Threat Intelligence to Stop Sophisticated Attacks | The Security Ledger
Reaffirming Symantec’s Commitment to Security and Privacy for the Online World | Symantec Connect
Thunderbolt devices can infect MacBooks with persistent rootkits | CSO Online
JPMorgan mega breach traced back to simple 2FA fail • The Register
Def Con 22 Home Alone With Localhost Automating Home Defense
Slackware Security Advisory - xorg-server Updates ≈ Packet Storm
Apple Security Advisory 2014-12-22-1 ≈ Packet Storm
BitRaider Streaming Client Local Privilege Escalation ≈ Packet Storm
Information Security Training | New Orleans, LA | Cybersecurity | SANS
Schneier on Security: North Korea DDoSed Off the Internet
South Korea Steps Up Cyber Security at Nuclear Plants | Re/code
MSNBC Cyber Security Expert: Evidence That North Korea Behind Sony Hack "Speculative" | Video | RealClearPolitics
RIT cyber security scholarship - 13WHAM ABC Rochester NY - Top Stories
SmoothWall 3.1 Cross Site Request Forgery / Cross Site Scripting ≈ Packet Storm
SoX 14.4.1 Heap Buffer Overflow ≈ Packet Storm
UnZip 6.0 Heap Buffer Overflow ≈ Packet Storm
Phishing Scams & Identity Theft Protection – Don’t be that Guy – Trend Micro
Innovation Sandbox 2014 - RedOwl - YouTube
Sony Hack Breaks 'Nation-State' Mold - InfoRiskToday
Weak server entry point in JPMorgan Chase breach - SC Magazine
IPCop 2.1.4 Cross Site Request Forgery / Cross Site Scripting ≈ Packet Storm
Fun with CISSP Questions: "The Absurd, The Drink the Kool-Aid, and The Ugly" - SANS Institute
Cyber Threat Intelligence Summit (Washington, DC)
Issues and Dilemmas in Information Security Practices
Holiday shopping may not be more secure
Apple Updates Macs For First Time Without Asking ≈ Packet Storm
China Fingered For Afghan Govt Attacks ≈ Packet Storm
This Year's Worst Hacks, From Sony To Celebrity Nude Pics ≈ Packet Storm
Sony Threatens to Sue Twitter Unless It Removes Tweets Containing Hacked Emails | Motherboard
Tor Network Is Under Attack through Directory Authority Servers Seizures - Hacker News
11 predictions for security in 2015 | CSO Online
Schneier on Security: 2008 Cyberattack Against Turkish Oil Pipeline
Dissecting WLAN Headers
Apple Releases Security Patch for NTP Vulnerability in OS X
GCHQ: We can't track crims any more thanks to Snowden • The Register
Def Con 22 Hacking Us And Uk &Amp; Australia &Amp; France Etc Traffic Control Systems
North Korea's Internet restored after over 9-hour outage | CSO Online
Charlatans: The new wave of privacy profiteers | ZDNet
Cisco UCS Mini Wins infoTECH Spotlight Award
Misfortune Cookie vulnerability affects 12 million routers | CSO Online
Two-factor authentication oversight led to JPMorgan breach, investigators reportedly found | CSO Online
North Korea, Iran, Syria – asymmetric cyberwar is here to stay | CSO Online
Judge's ruling allows customers to sue Target over data breach | WDAZ
Facebook Social Network - Privacy Issue disclosed to Bug Bounty Program by Whitehat | VULNERABILITY MAGAZINE - Bug Bounties, Acknoweldgements & Security Research
The Sneakiest Way Prosecutors Get a Guilty Verdict: PowerPoint | WIRED
The Year's Worst Hacks, From Sony to Celebrity Nude Pics | WIRED
Newswire & Press Release / Barracuda Wins Three TechTarget Information Security Magazine and 2014 Readers’ Choice Awards - IT Security/Anti-Spam - Barracuda Networks, Inc. | NewswireToday
Def Con 22 Hacking The Fbi How &Amp; Why To Liberate Government Records
Make your battery life go further with smart battery profiles
BitTorrent Invites Sony to Release 'The Interview' Movie On Its Paid Service - Hacker News
AVG CloudCare wins VB100 independent antivirus award
Quality control and measurement of business continuity management systems: final survey results
Business continuity briefs
EU flings €1m at open source security audit wheeze • The Register
Infosec: More than reindeer games
China fingered for Afghan Govt attacks • The Register
Bugtraq: [slackware-security] xorg-server (SSA:2014-356-03)
Flaw in MacBook EFI allows boot ROM malware | ZDNet
Easy Tinder prank hack lets you play stupid cupid • The Register
5 working days left until the deadline for compliance with PCI DSS 3.0 kicks in
Def Con 22 Hack All The Things 20 Devices In 45 Minutes
Patches Not Cure-all for Shellshock
Bugtraq: [slackware-security] ntp (SSA:2014-356-01)
Bugtraq: [slackware-security] php (SSA:2014-356-02)
UC Berkeley hack: Personal data on 1,600 people possibly compromised - LA Times
Geers: In the future, national security and cyber security will grow increasingly synonymous, 23 December 2014
Cyber Security Trends Expected to Continue into 2015 | CloudWedge
Top Facebook scams and malware attacks
Bugtraq: [SECURITY] [DSA 3111-1] cpio security update
"Not Your Everyday Hack": Cyber Security Wiz Kids Chime in on Sony Hack | NBC Southern California
Bugtraq: APPLE-SA-2014-12-22-1 OS X NTP Security Update
Bradenton Staples store among 115 locations in data breach - Sarasota News | and ABC 7: Local News
Digital crime landscape in 2015
The Sony Hack: Comparisons with Shamoon and Dark Seoul
From Toys to Terror
Redis latency spikes and the 99th percentile - Antirez weblog
Def Con 22 Getting Windows To Play With Itself A Hacker's Guide To Windows Api Abuse
Mobile Security 2015: The Enterprise at Risk
If you doubted that information security was a business continuity issue consider a four letter word: Sony
(ISC)² Security Congress Opens Call for Speakers - Infosecurity Magazine
Microsoft patch mashes Office forms and macros • The Register
Sony cyber security hack could inspire copycats -
Sucker for punishment? Join Sony's security team • The Register
Will 2015 be the year of risk-based security?
Def Con 22 Generating Rop Payloads From Numbers
Sony Pictures Entertainment Hack – Truly motion picture worthy
Watch Symantec's Vine "Empower your team with Symantec Mobility Solutions. #GoEmpower"
Local experts offer advice for cyber security | Local -
EU to demand 2-factor for online payments by August 2015? | Naked Security
North Korean malware that infected Sony network is well-known and 'simplistic,' says Cisco - FierceITSecurity
Malicious links: Spammers change malware delivery tactics | Symantec Connect
Def Con 22 From Root To Special Pwning Ibm Mainframes
Report: SS7 flaws enable listening to cell phone calls, reading texts - SC Magazine
Gang Hacked ATMs from Inside Banks — Krebs on Security
Northwestern Memorial HealthCare laptop stolen, patient data at risk - SC Magazine
The future of wearable technology in 2015
China condemns cyberattacks, but says no proof North Korea hacked Sony| Reuters