NetSecu

www.prweb.com
www.prweb.com
Comprehensive CIP, NERC, and FERC Information Security Policies and Procedures Now Available for Download from North America’s Cyber Security Leaders at flatirontech.org
www.fedtechmagazine.com
www.fedtechmagazine.com
Are You Putting Your Agency’s Networks at Risk? | FedTech Magazine
martinfowler.com
martinfowler.com
The Architecture of Morrisons OrderPad
abc13.com
abc13.com
Hackers Breach White House's Unclassified Computer Network | abc13.com
www.channelpartnersonline.com
www.channelpartnersonline.com
My Digital Shield Releases 'Shield Test' Free for SMBs
www.infopackets.com
www.infopackets.com
Most Users Don't Use Windows Update Properly: Report | www.infopackets.com
articles.economictimes.indiatimes.com
articles.economictimes.indiatimes.com
White House computer system breached by hackers: Report - Economic Times
www.net-security.org
www.net-security.org
Assume your Drupal 7 site has been compromised
www.itproportal.com
www.itproportal.com
If next generation firewalls don't evolve, they'll soon be irrelevant | ITProPortal.com
www.androidheadlines.com
www.androidheadlines.com
Americans Fear Hacking (Much) More Than Murder | Androidheadlines.com
abc7.com
abc7.com
Hackers Breach White House's Unclassified Computer Network | abc7.com
www.cloudwedge.com
www.cloudwedge.com
Gartner Report Reveals Cloud Computing's Top Myths | CloudWedge
www.csoonline.com
www.csoonline.com
Social Engineers work in teams to harness the power of information | CSO Online
www.zdnet.com
www.zdnet.com
Apple Pay rival CurrentC hacked | ZDNet
www.zdnet.com
www.zdnet.com
Drupal Security Team gives ominous news | ZDNet
www.theregister.co.uk
www.theregister.co.uk
UK consumers particularly prone to piss-poor patching • The Register
www.csoonline.com
www.csoonline.com
Advisory says to assume all Drupal 7 websites are compromised | CSO Online
nakedsecurity.sophos.com
nakedsecurity.sophos.com
White House networks hacked | Naked Security
talkincloud.com
talkincloud.com
SMB Fall Housekeeping: 5 Security Concerns to Discuss with Customers | Talkin Cloud Blog
readwrite.com
readwrite.com
None
www.claimsjournal.com
www.claimsjournal.com
More Than 18.5M California Residents' Information Was Exposed Last Year
bgr.com
bgr.com
White House cyber attack breach of computer network confirmed | BGR
www.telesurtv.net
www.telesurtv.net
Hackers Breach White House Computers | News | teleSUR
www.businessweek.com
www.businessweek.com
Tim Cook: "I'm Proud to be Gay" - Businessweek
www.thelocal.dk
www.thelocal.dk
Pirate Bay founder guilty in historic hacker case - The Local
cphpost.dk
cphpost.dk
Pirate Bay founder found guilty in historic hacker case - News - The Copenhagen Post
siliconangle.com
siliconangle.com
MCX speaks out over CurrentC hack and their position on Apple Pay | SiliconANGLE
europa.eu
europa.eu
European Commission - PRESS RELEASES - Press release - Biggest ever cyber security exercise in Europe today
www.securitytube.net
www.securitytube.net
Louisville Infosec 2014 - Creating The Department Of How: Security Awareness That Makes Your Company Like You.
www.csmonitor.com
www.csmonitor.com
Apple Pay disabled at Rite Aid, CVS. Building their own system? - CSMonitor.com
www.techradar.com
www.techradar.com
The data breach detection system will eclipse $1bn by 2018 | News | TechRadar
www.fairfieldcitizenonline.com
www.fairfieldcitizenonline.com
Calif. AG: 18.5 million residents' info exposed - Fairfield Citizen
www.retaildive.com
www.retaildive.com
California tallies retail data breaches | Retail Dive
www.itpro.co.uk
www.itpro.co.uk
Microsoft Office 16 release date revealed as H2 2015 | IT PRO
www.rsaconference.com
www.rsaconference.com
Making the Security Super Human: How to Effectively Train Anyone/Anything – Video – RSA Conference
www.windytan.com
www.windytan.com
absorptions: Visualizing hex bytes with Unicode emoji
www.kansascity.com
www.kansascity.com
Correction: Apple Pay-Retail Skirmish story | The Kansas City Star
www.net-security.org
www.net-security.org
Photo gallery: McAfee FOCUS 14
nakedsecurity.sophos.com
nakedsecurity.sophos.com
Snapchat escapes Australian cyberbullying crackdown, for now | Naked Security
www.net-security.org
www.net-security.org
NIST Guide to Cyber Threat Information Sharing open for comments
www.net-security.org
www.net-security.org
Post Snowden, most users have changed Internet habits
www.kmbz.com
www.kmbz.com
White House Still Impacted By 'Inconveniences' Following Breach Of Computer System - KMBZ
www.lexology.com
www.lexology.com
California Attorney General releases 2014 data breach report and recommendations, finding more of the same. - Lexology
www.itpro.co.uk
www.itpro.co.uk
Windows 10: Microsoft's plan to win over the enterprise | IT PRO
www.cmswire.com
www.cmswire.com
Office 365 Strengthens Mobile Device Management #TEE14
continuitycentral.com
continuitycentral.com
Business continuity briefs
betanews.com
betanews.com
The NHS is still clinging on to Windows XP
www.delcotimes.com
www.delcotimes.com
Opinion: Congress must act on consumer data breaches
www.net-security.org
www.net-security.org
Dynamic endpoint protection by McAfee and ForeScout
www.net-security.org
www.net-security.org
Over a third of orgs have no real-time insight on cyber risks
www.reuters.com
www.reuters.com
BRIEF-China's Pci-Suntek Tech wins bid for project worth 108 mln yuan| Reuters
www.itproportal.com
www.itproportal.com
UK government faces £5.5m bill as NHS clings on to Windows XP | ITProPortal.com
torrentfreak.com
torrentfreak.com
Gottfrid Svartholm Found Guilty in Hacking Trial | TorrentFreak
www.zdnet.com
www.zdnet.com
IDC has blind faith in chief digital officers | ZDNet
www.cnet.com
www.cnet.com
Windows 10 Technical Preview updated, boasts 7,000 changes and fixes - CNE
www.tripwire.com
www.tripwire.com
Drupal PSA: If You Didn't Patch Within 7 Hours Consider Your Site Compromised - The State of Security
www.youtube.com
www.youtube.com
Sue Oliva - Juniper Networks talks to Total Telecom - YouTube
www.technologyreview.com
www.technologyreview.com
Startup Semprius Fights to Bring Breakthrough Solar Tech to Market | MIT Technology Review
abc7news.com
abc7news.com
Hackers Breach White House's Unclassified Computer Network | abc7news.com
www.itworld.com
www.itworld.com
How to figure out if a data breach is a hoax | ITworld
www.rawstory.com
www.rawstory.com
Hackers break into White House computer network
www.vanityfair.com
www.vanityfair.com
Cyber Attack Hits White House, Causing Outages | Vanity Fair
www.freep.com
www.freep.com
Was Russia involved in White House cyber attacks?
www.cnet.com
www.cnet.com
How to control Touch ID on the iPhone and iPad - CNE
www.govtech.com
www.govtech.com
Data Breaches Jump in California and are Expected to Keep Climbing
thehackernews.com
thehackernews.com
Xiaomi Data Breach — "Exposing Xiaomi" Talk Pulled from Hacking Conference
www.natlawreview.com
www.natlawreview.com
FCC: The New Data Security Sheriff In Town | The National Law Review
digital.asiaone.com
digital.asiaone.com
Apple says 'Shellshock' no risk to vast majority of Mac users, AsiaOne Digital News
www.scmagazine.com
www.scmagazine.com
California data breach report reveals spike in incidents - SC Magazine
www.cnet.com
www.cnet.com
How to fix Text Message Forwarding issues on iOS 8.1 - CNE
www.krollontrack.co.uk
www.krollontrack.co.uk
Common cloud myths revealed
www.wired.com
www.wired.com
Why So Many American Retailers Are Fighting to Freeze Out Apple Pay | WIRED
www.njspotlight.com
www.njspotlight.com
Practice Makes Imperfect: Why Do We Keep Getting Disaster Recovery Wrong? - NJ Spotlight
www.macrumors.com
www.macrumors.com
MCX Confirms Retailer Exclusivity for CurrentC Mobile Payments, but No Fines for Leaving Consortium - Mac Rumors
www.cio-today.com
www.cio-today.com
Microsoft Offers Office 365 Users Free, Unlimited OneDrive Storage - Data Storage on CIO Today
www.cio-today.com
www.cio-today.com
Android's Surprising Next Big Competitor: Google - Mobile Tech on CIO Today
www.cio-today.com
www.cio-today.com
IBM Rolls Out Analytics-Based Security Solution - Big Data on CIO Today
abcnews.go.com
abcnews.go.com
What We Know Now About CurrentC, the Apple Pay Competitor - ABC News
www.mis-asia.com
www.mis-asia.com
MIS-Asia - Office 365 admins get spreadsheet search help
blog.phonebloks.com
blog.phonebloks.com
PHONEBLOKS.COM • VIDEO: PROJECT ARA UPDATE By Dave Hakkens,...
www.macobserver.com
www.macobserver.com
MCX Holds Press Conference, Does Itself No Favors - The Mac Observer
www.bizjournals.com
www.bizjournals.com
White House computer network reportedly breached by Russian hackers - Silicon Valley Business Journal
blog.trendmicro.com
blog.trendmicro.com
Shellshock–Related Attacks Continue, Targets SMTP Servers | Security Intelligence Blog | Trend Micro
www.informationweek.in
www.informationweek.in
Gartner busts top 10 cloud myths - InformationWeek – IT news & articles
www.cso.com.au
www.cso.com.au
Information-security implications feared as Parliament weighs data retention - CSO | The Resource for Data Security Executives
www.theregister.co.uk
www.theregister.co.uk
Carders offer malware with the human touch to defeat fraud detection • The Register
fox5sandiego.com
fox5sandiego.com
18.5m Californians vulnerable to fraud | FOX5 San Diego – San Diego news, weather, traffic, sports from KSWB
vator.tv
vator.tv
Apple Pay competitor CurrentC suffers e-mail breach | VatorNews
www.cso.com.au
www.cso.com.au
Adopters of Australian Azure must remember security, governance obligations - CSO | The Resource for Data Security Executives
www.cso.com.au
www.cso.com.au
Breakthrough in MPC Cryptography makes Cloud and Online computing more secure - Media Releases - CSO | The Resource for Data Security Executives
www.pcworld.com
www.pcworld.com
Attack campaign infects industrial control systems with BlackEnergy malware | PCWorld
www.theregister.co.uk
www.theregister.co.uk
Mozilla releases geolocating WiFi sniffer for Android • The Register
www.wired.com
www.wired.com
A Neuroscientist's Radical Theory of How Networks Become Conscious | WIRED
www.dailymail.co.uk
www.dailymail.co.uk
Facebook, Twitter, Instagram AND trolls will be charged over hate-filled posts | Daily Mail Online
www.drupal.org
www.drupal.org
Drupal Core - Highly Critical - Public Service announcement - PSA-2014-003 | Drupal.org
www.thestate.com
www.thestate.com
Latest local breaking news by The State Newspaper in Columbia, SC | The State
thenextweb.com
thenextweb.com
CurrentC, an Apple Pay Rival, Has Been Hacked
www.theregister.co.uk
www.theregister.co.uk
Big Retail's Apple Pay killer CurrentC HACKED, tester info stolen • The Register
www.macworld.com
www.macworld.com
CurrentC won’t let email hack delay launch as it explores NFC | Macworld
www.theguardian.com
www.theguardian.com
GCHQ views data without a warrant, government admits | UK news | The Guardian
www.tripwire.com
www.tripwire.com
Security Slice: Internet Privacy Realities - The State of Security
www.tripwire.com
www.tripwire.com
Fidelity National employees hacked after targeted phishing attack
www.tripwire.com
www.tripwire.com
Beyond a Major, To Be Successful In Security You Need To Select The Right Minor - The State of Security
www.theregister.co.uk
www.theregister.co.uk
Drupalocalypse! Devs say it's best to assume your CMS is owned • The Register
www.rsaconference.com
www.rsaconference.com
Security in the Cloud? Your Questions and Cloud Resources – Blog Post – RSA Conference
www.microsoft.com
www.microsoft.com
Microsoft Band, the smart band powered by Microsoft Health
www.nbcdfw.com
www.nbcdfw.com
Computer Hackers Attack Cleburne After Dog Shooting | NBC 5 Dallas-Fort Worth
www.eweek.com
www.eweek.com
Microsoft Tightens the Lid on Office 365 Data
www.theregister.co.uk
www.theregister.co.uk
Big Retail: We don't hate Apple, just the credit card companies • The Register
whnt.com
whnt.com
Cyber security experts warn Rocket City is top target for hackers | WHNT.com
www.listener.co.nz
www.listener.co.nz
Fire Brand - Profile - The Listener
mashable.com
mashable.com
Leaked employee passwords open up Fortune 500 companies to hackers
www.eweek.com
www.eweek.com
Research Suggests Backoff Malware Still Widely Infecting POS Systems
gizmodo.com
gizmodo.com
FM Radio Hack Allows Data To Be Routed Out of Isolated Networks
www.csoonline.com
www.csoonline.com
How to figure out if a data breach is a hoax | CSO Online
www.theatlantic.com
www.theatlantic.com
Did Russia Just Hack the White House? - The Atlantic
www.bostonglobe.com
www.bostonglobe.com
JPMorgan data breach affected 76 million households - Business - The Boston Globe
www.networkworld.com
www.networkworld.com
What IBM can learn from its own cybersecurity business | Network World
www.630wpro.com
www.630wpro.com
White House Still Impacted by ‘Inconveniences’ Following Breach of Computer System | WPRO-AM
www.karnnewsradio.com
www.karnnewsradio.com
KARN News Radio 102.9 FM / 920 AM - Some White House Computer Networks Breached by Hackers [From ABC News]
in.reuters.com
in.reuters.com
Suspicious cyber activity at White House detected, addressed| Reuters
www.dailytech.com
www.dailytech.com
DailyTech - The Usual Suspects: Russia or China Suspected in White House Data Breach
www.mercedsunstar.com
www.mercedsunstar.com
Merced community news from Merced Sun-Star in Merced, CA | MercedSunStar.com
www.wallstreetotc.com
www.wallstreetotc.com
Russian Hackers Suspected For Breaching White House Computers | Wall Street OTC
www.ledger-enquirer.com
www.ledger-enquirer.com
Local News | Columbus Ledger Enquirer
www.smh.com.au
www.smh.com.au
White House hack just the beginning: experts say major cyberattack coming soon
www.techtimes.com
www.techtimes.com
White House detects, addresses sustained cyberattack. Who is the culprit? : LIFE : Tech Times
www.latinpost.com
www.latinpost.com
White House Cyberattack: Officials Confirm Computer Network Hit by Sustained Cyberattack : US News : Latin Post
www.linuxinsider.com
www.linuxinsider.com
The Long and Winding Road to Shellshock Recovery | Enterprise | LinuxInsider
www.thecalifornian.com
www.thecalifornian.com
Supes campaigns show slight shifts in focus
www.huffingtonpost.com
www.huffingtonpost.com
U.S. Health Care System Woefully Unprepared For Ebola
www.computerworld.co.nz
www.computerworld.co.nz
Office 365 admins get spreadsheet search help - Computerworld New Zealand
www.wired.com
www.wired.com
Hackers Are Using Gmail Drafts to Update Their Malware and Steal Data | WIRED
blog.trendmicro.com
blog.trendmicro.com
Shared Responsibility Examples: The Re:Boot -
packetstormsecurity.com
packetstormsecurity.com
Red Hat Security Advisory 2014-1726-01 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Red Hat Security Advisory 2014-1727-01 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Red Hat Security Advisory 2014-1728-01 ≈ Packet Storm
www.eweek.com
www.eweek.com
Hackers Reportedly Breached White House Network
www.punchng.com
www.punchng.com
Cyber breaches put 18.5 million Californians’ data at risk
www.natlawreview.com
www.natlawreview.com
California Attorney General’s Second Annual Data Breach Report Finds Dramatic Increase in Number of Data Breaches | The National Law Review
www.businessinsider.com
www.businessinsider.com
CurrentC Hacked - Business Insider
packetstormsecurity.com
packetstormsecurity.com
Mandriva Linux Security Advisory 2014-211 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Red Hat Security Advisory 2014-1725-01 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Debian Security Advisory 3050-2 ≈ Packet Storm
www.sddt.com
www.sddt.com
San Diego Source > Technology > Cybersecurity tops SPAWAR concerns
www.philly.com
www.philly.com
Internet experts: 'Widespread harm' likely from cyber attack in next decade
www.nst.com.my
www.nst.com.my
Options to curb terror | New Straits Times
www.pcworld.com
www.pcworld.com
How to figure out if a data breach is a hoax | PCWorld
news.techworld.com
news.techworld.com
How to figure out if a data breach is a hoax - Techworld.com
www.csoonline.com
www.csoonline.com
BSides Toronto 2014 | CSO Online
recode.net
recode.net
Nico Sell of Wickr: Privacy Is the New Fame | Re/code
redteams.net
redteams.net
Rappelling off a roof — Red Teams
www.sddt.com
www.sddt.com
San Diego Source > News > Cybersecurity tops SPAWAR concerns
www.reuters.com
www.reuters.com
Wal-Mart and allies in face-off with Apple Pay over mobile payments| Reuters
www.theregister.co.uk
www.theregister.co.uk
The NO-NAME vuln: wget mess patched without a fancy brand • The Register
twitter.com
twitter.com
Juniper Networks sur Twitter : "Spooky week! http://t.co/sQXgjIkcqa"
www.forbes.com
www.forbes.com
Walgreens Exec On Why They're Backing Apple Pay - Forbes
www.star-telegram.com
www.star-telegram.com
Cleburne’s computer systems under attack by hackers | Local News | News from Fort...
www.news10.net
www.news10.net
Tips for protecting yourself against cyber attacks
www.azcentral.com
www.azcentral.com
The Attkisson hacking incident: Vexed by Vox
www.virtual-strategy.com
www.virtual-strategy.com
Just Announced 2014 Corporate Information Security Policy Manual Available for Download from the Compliance Leaders at myinformationsecuritypolicy.com | Virtual-Strategy Magazine
outsidelens.scmagazine.com
outsidelens.scmagazine.com
Watch "Android malware leverages Tor" Video at SCMagazine
twitter.com
twitter.com
Juniper Networks sur Twitter : "Enact #security solutions to fight today’s threats. #NCSAM http://t.co/e3lNvMLCc8"
www.forbes.com
www.forbes.com
Find Out Whether This Unkillable Tracker Is On Your Smartphone - Forbes
th115.infusionsoft.com
th115.infusionsoft.com
5 Mistakes You're Probably Making Selling Security - And How To Fix Them! - Powered by Infusionsoft
bgr.com
bgr.com
Samsung ‘Find My Mobile’ security exploit discovered | BGR
www.darkreading.com
www.darkreading.com
Georgia Tech Releases 2015 Emerging Cyber Threats Report
mainisusuallyafunction.blogspot.fr
mainisusuallyafunction.blogspot.fr
main is usually a function: A taste of Rust (yum) for C/C++ programmers
www.orlandosentinel.com
www.orlandosentinel.com
OPD, OCSO mishandled Carline Brumaire Jean case, internal reviews show - Orlando Sentinel
www.truth-out.org
www.truth-out.org
"Citizenfour" Directly Confronts the Intelligence Apparatus' Subversion of Democracy
time.com
time.com
Why You Should Care That the White House Got Hacked
blog.trendmicro.com
blog.trendmicro.com
Flash Pack Exploit Leads to New Family of Malware
ottawacitizen.com
ottawacitizen.com
Cyber security a non-stop headache for federal government, conference hears | Ottawa Citizen
www.scmagazine.com
www.scmagazine.com
Virtualization advancements focus on protecting data at the source, not on the device - SC Magazine
globenewswire.com
globenewswire.com
ForeScout Partners With McAfee to Deliver Dynamic Endpoint Protection
www.cnet.com
www.cnet.com
Apple Pay rival CurrentC hit by hackers - CNE
www.cnet.com
www.cnet.com
Retail group MCX says it's not telling merchants to block Apple Pay - CNE
www.healthtechzone.com
www.healthtechzone.com
University of Rochester Medical Center Installs ForeScout Security
talkincloud.com
talkincloud.com
RackWare, NetApp Partner for Cloud-based Disaster Recovery | Cloud Companies content from Talkin' Cloud
www.frasercoastchronicle.com.au
www.frasercoastchronicle.com.au
Disaster recovery funds must continue: councillor | Fraser Coast Chronicle
mspmentor.net
mspmentor.net
6 Backup and Disaster Recovery (BDR) Lessons From October | InfoCenter BDR content from MSPmentor
www.symantec.com
www.symantec.com
Dirty Topic Tweet Chat 10/30 – Securing Mobile Devices In The Workplace | Symantec Connect
venturebeat.com
venturebeat.com
Whisper, Secret, and Snapchat leaks show that fake privacy is almost worse than no privacy at all | VentureBeat | Security | by Ruth Reader
whnt.com
whnt.com
WHNT.com
campaign.trendmicro.com
campaign.trendmicro.com
Trend Micro
www.rsaconference.com
www.rsaconference.com
A Whole New Way to Spot Malware Before It Spots You – Blog Post – RSA Conference
duartes.org
duartes.org
What Does an Idle CPU Do? - Gustavo Duarte
www.stltoday.com
www.stltoday.com
AP IMPACT: US health care unprepared for Ebola : News
www.therecorder.com
www.therecorder.com
AG Says 18 Million in State Touched by Data Breaches Last Year | The Recorder
www.computerworld.com
www.computerworld.com
Apple Pay rival MCX defends security after hackers steal emails | Computerworld
www.medpagetoday.com
www.medpagetoday.com
Munchausen by Proxy: A Case Study of Abuse
www.nytimes.com
www.nytimes.com
Hacking Sexism in the Tech Industry - Room for Debate - NYTimes.com
www.dailymail.co.uk
www.dailymail.co.uk
AP IMPACT: If Ebola batters US, we are not ready | Daily Mail Online
www.huffingtonpost.ca
www.huffingtonpost.ca
More Surveillance Punishes Canadians, Not Terrorists | Tom Henheffer
time.com
time.com
Apple Pay: Apple Pay Competitor CurrentC Has Already Been Hacked
arstechnica.com
arstechnica.com
Of course blocking instant messaging at work makes sense | Ars Technica
www.gamerheadlines.com
www.gamerheadlines.com
A Review of the Avast Antivirus After 25 Years
www.google.co.uk
www.google.co.uk
About Google - Products
www.symantec.com
www.symantec.com
Activate Symantec’s “Disarm” Feature to Sanitize Infected PowerPoint Attachments | Symantec Connect
www.channelnomics.com
www.channelnomics.com
Time to step up: vendors missing the mark on IoT - from Channelnomics.com
www.theregister.co.uk
www.theregister.co.uk
Australian E-Health records breached twice in the last year • The Register
twitter.com
twitter.com
McAfee Inc. sur Twitter : "Pop culture's biggest icons are a cause for online search concern—beware of the #RiskyCeleb Top 10: http://t.co/WaWORtYOtO"
www.wpxi.com
www.wpxi.com
Data breach victimizes local woman; Info you need to know | www.wpxi.com
blog.trendmicro.com
blog.trendmicro.com
Modern Day Dillinger Gangs -
blog.getbootstrap.com
blog.getbootstrap.com
Bootstrap 3.3.0 released · Bootstrap Blog
www.csoonline.com
www.csoonline.com
California reports huge jump in data breaches | CSO Online
www.tweaktown.com
www.tweaktown.com
'State sponsored' Russian hacker group is attacking geographic rivals
www.goodgearguide.com.au
www.goodgearguide.com.au
Gigamon says it can analyze attacker SSL traffic without hitting performance - Good Gear Guide Australia
www.darkreading.com
www.darkreading.com
Keep Calm & Verify: How To Spot A Fake Online Data Dump
www.usatoday.com
www.usatoday.com
Apple Pay competitor confirms email breach
www.weeklystandard.com
www.weeklystandard.com
Russian Hackers Take White House? | The Weekly Standard
money.cnn.com
money.cnn.com
White House hacked - Oct. 29, 2014
www.phonenews.com
www.phonenews.com
CurrentC Platform Suffers Security Breach During Pilot Program, MCX Group Attempts To Save Face
theweek.com
theweek.com
White House computers attacked by suspected Russian hackers - The Week
www.itproportal.com
www.itproportal.com
FOCUS 14 live: Obama needs to win back trust after Snowden revelations, says Condoleezza Rice | ITProPortal.com
ktla.com
ktla.com
Best Of: Free Antivirus Software | KTLA
www.computerworlduk.com
www.computerworlduk.com
Office 365 admins get spreadsheet search help - ComputerworldUK.com
6abc.com
6abc.com
Hackers Breach White House's Unclassified Computer Network | 6abc.com
www.lexology.com
www.lexology.com
How to respond to SEC inquiries concerning data breach and data security policies - Lexology
www.phoenixvillenews.com
www.phoenixvillenews.com
Collegeville-based Just Chimneys cleaning service fulfills growing need
www.chron.com
www.chron.com
Gallup: More Americans worried about hacking than murder - Houston Chronicle
www.gympietimes.com.au
www.gympietimes.com.au
The Mirror journalists to face phone-hacking charges | Gympie Times
www.phoenixnewtimes.com
www.phoenixnewtimes.com
Citizenfour's Laura Poitras Explains Why Edward Snowden Did It | Phoenix New Times
www.crn.com
www.crn.com
SVP Young: Intel Security Has No Need To Poach Symantec Partners - Page: 1 | CRN
resources.csoonline.com
resources.csoonline.com
Next Generation Firewall: CSO Webcast
www.scmagazine.com
www.scmagazine.com
Popular Science served up Rig Exploit Kit on its website - SC Magazine
www.eweek.com
www.eweek.com
SMBs See IoT Potential, Wary of Possible Challenges
www.scmagazine.com
www.scmagazine.com
Attack on White House systems breached unclassified networks - SC Magazine
blogs.microsoft.com
blogs.microsoft.com
Now available – "Windows Server 2012 Security from End to Edge and Beyond" | Cyber Trust Blog
www.theverge.com
www.theverge.com
The FBI created a fake malware-spreading newspaper article to trace a bomb threat | The Verge
www.theverge.com
www.theverge.com
Email addresses stolen from CurrentC in security breach | The Verge
www.sunshinecoastdaily.com.au
www.sunshinecoastdaily.com.au
The Mirror journalists to face phone-hacking charges | Sunshine Coast Daily
www.statetechmagazine.com
www.statetechmagazine.com
How Governments Can Mitigate Data Risks | StateTech Magazine
www.scmagazineuk.com
www.scmagazineuk.com
'Sophisticated' Chinese hackers launched attacks against 43,000 computer systems - SC Magazine UK
www.macrumors.com
www.macrumors.com
How to Use AirDrop to Share Files Between Macs and iOS Devices - Mac Rumors
www.neowin.net
www.neowin.net
Panda Free Antivirus 15.0.3 - Neowin
www.washingtonpost.com
www.washingtonpost.com
Retail industry’s Apple Pay rival has experienced a data breach - The Washington Post
virtualizationreview.com
virtualizationreview.com
Are Containers the Beginning of the End of Virtual Machines? -- Virtualization Review
www.tripwire.com
www.tripwire.com
Apple Pay Competitor CurrentC Reports Breach By 'Unauthorized Third-Parties' - The State of Security
www.scmagazine.com
www.scmagazine.com
Deloitte releases paper on vetting leaks, avoiding costly hoax - SC Magazine
www.androidorigin.com
www.androidorigin.com
Apple Mac OS X Yosemite Update: Wi-Fi Bug
www.techradar.com
www.techradar.com
How to protect your business hardware | News | TechRadar
www.pcworld.com
www.pcworld.com
Microsoft's new Office 365 search tool is like Minesweeper for Excel spreadsheets | PCWorld
www.insurancejournal.com
www.insurancejournal.com
PCI Elects Erie's Cavanaugh As Chair
www.theregister.co.uk
www.theregister.co.uk
Bad dog: Redmond's new IE tool KILLS POODLE with one shot • The Register
www.csoonline.com
www.csoonline.com
Apple Pay rival CurrentC suffers pre-launch compromise | CSO Online
Independentherald.com
Independentherald.com
Independent Herald - independentherald.com
blog.trendmicro.com
blog.trendmicro.com
Keep Cybercriminals Guessing with Unique Passwords -
www.theguardian.com
www.theguardian.com
FBI demands new powers to hack into computers and carry out surveillance | US news | theguardian.com
www.scpr.org
www.scpr.org
Apple Pay competitor CurrentC reports data breach | 89.3 KPCC
www.wxyz.com
www.wxyz.com
FCC: Telecom customers' data may have been exposed in cybercrime havens abroad - DecodeDC Story
www.nextgov.com
www.nextgov.com
NSA Chief Warns Companies Against Revenge Hacking - Nextgov.com
www.lexology.com
www.lexology.com
FCC enters new area of privacy and data security regulation with proposed $10 million fine - Lexology
www.mcafee.com
www.mcafee.com
McAfee Threat Intelligence Exchange | McAfee Products
www.independent.co.uk
www.independent.co.uk
Criminal phone-hacking charges against up to nine Mirror Group journalists 'imminent' - Crime - UK - The Independent
virtualizationreview.com
virtualizationreview.com
Gartner Explodes 10 Cloud Myths -- Virtualization Review
www.zdnet.com
www.zdnet.com
Microsoft releases anti-POODLE Fix It | ZDNet
www.kb.cert.org
www.kb.cert.org
Vulnerability Note VU#973460 - drchrono Electronic Health Record (EHR) web applications vulnerable to cross-site scripting and cross-site request forgery
home.mcafee.com
home.mcafee.com
Antivirus Software and Internet Security For Your PC or Mac | McAfee
staysafeonline.org
staysafeonline.org
StaySafeOnline.org
www.bbc.com
www.bbc.com
BBC News - White House computer network 'hacked'
blogs.microsoft.com
blogs.microsoft.com
Microsoft’s Perspective on the Cybersecurity Framework: Next Steps for Incentives and International Harmonization | Cyber Trust Blog
www.infosecisland.com
www.infosecisland.com
Compliance-Based Infosec Vs Threat-Based Infosec
www.crn.com
www.crn.com
Hexis, Others Put Security Response On Autopilot - Page: 1 | CRN
www.bsminfo.com
www.bsminfo.com
The BYOD Disconnect Complying With Mobile Device Security At Work
bgr.com
bgr.com
Google Gmail drafts malware attack discovered | BGR
www.bloomberg.com
www.bloomberg.com
CurrentC, an Apple Pay Rival, Gets Hit by Hackers - Bloomberg
newsinfo.inquirer.net
newsinfo.inquirer.net
AFP mulls filing disbarment case vs Laude family lawyer Harry Roque | Inquirer News
phys.org
phys.org
'Major' hacking attack in US looms: expert survey
seclists.org
seclists.org
Bugtraq: CVE-2014-8399 SQL Injection in NuevoLabs flash player for clipshare
www.net-security.org
www.net-security.org
White House network breach was likely nation-sponsored
www.autonet.ca
www.autonet.ca
Dispelling car hacking fears | Autonet.ca
www.bizjournals.com
www.bizjournals.com
N.J. close to passing tougher regulation on data breaches - Philadelphia Business Journal
www.forbes.com
www.forbes.com
Blocking Apple Pay Is A Terrible Strategy For CurrentC Merchants - Forbes
www.businessweek.com
www.businessweek.com
CurrentC's Data Breach Adds to Awful Week for Apple Pay Rival - Businessweek
www.govexec.com
www.govexec.com
NSA Chief Warns Companies Against Revenge Hacking - Defense - GovExec.com
www.straitstimes.com
www.straitstimes.com
'Major' hacking attack looming in US: Expert survey
twitter.com
twitter.com
McAfee Inc. sur Twitter : ".@condoleezzarice and @youngdchris have an informal chat about the current landscape of #cybersecurity at #FOCUS14 http://t.co/dKAU8EynIC"
blogs.cisco.com
blogs.cisco.com
#CiscoChampion Radio S1|Ep 38. Threat Focused Firewall
seclists.org
seclists.org
Bugtraq: SEC Consult SA-20141029-0 :: Multiple critical vulnerabilities in Vizensoft Admin Panel
seclists.org
seclists.org
Bugtraq: SEC Consult SA-20141029-1 :: Persistent cross site scripting in Confluence RefinedWiki Original Theme
twitter.com
twitter.com
Patrick Flynn sur Twitter : "McAfee's DXL Digital Exchange Layer #FOCUS14 http://t.co/RkJQGUtdiA"
www.csoonline.com
www.csoonline.com
Attack campaign infects industrial control systems with BlackEnergy malware | CSO Online
thatguy.trendmicro.com
thatguy.trendmicro.com
Full Security and Privacy Tip Sheet - Trend Micro
twitter.com
twitter.com
Juniper Networks sur Twitter : "A new day, a new quiz question. Show off your chops in today’s certification quiz. http://t.co/sYVKVH55py"
www.infosecisland.com
www.infosecisland.com
Cracking wifi passwords with Kali Linux
mspmentor.net
mspmentor.net
Kaspersky Lab: 94% of Companies Are Dealing with Cybersecurity Issues | Managed Security Services content from MSPmentor
thehill.com
thehill.com
Samsung fixes bug that let hackers lock phones | TheHill
arstechnica.com
arstechnica.com
Hackers swipe e-mail addresses from Apple Pay-competitor CurrentC | Ars Technica
www.iol.co.za
www.iol.co.za
Credit-card hacking 'is top crime worry' - IOL SciTech | IOL.co.za
thehill.com
thehill.com
Rival to Apple Pay is breached by hackers | TheHill
www.nfcworld.com
www.nfcworld.com
MCX suffers email address data breach • NFC World+
siliconangle.com
siliconangle.com
Samsung users vulnerable to DDoS attacks via Find My Mobile service | SiliconANGLE
www.techweekeurope.co.uk
www.techweekeurope.co.uk
NHS Trusts Are Still Struggling On With Windows XP, FOI Request Finds
www.washingtontimes.com
www.washingtontimes.com
White House won't confirm Russian hacking connection - Washington Times
www.cultofmac.com
www.cultofmac.com
Apple Pay’s biggest competitor has already been hacked | Cult of Mac
www.marketwired.com
www.marketwired.com
StrikeForce Technologies, Inc. Announces Cino Ltd. as a Global Cyber Security Distributor
seclists.org
seclists.org
Bugtraq: [security bulletin] HPSBUX03159 SSRT101785 rev.1 - HP-UX kernel, Local Denial of Service (DoS)
seclists.org
seclists.org
Bugtraq: [ MDVSA-2014:211 ] wpa_supplicant
abc30.com
abc30.com
Hackers Breach White House's Unclassified Computer Network | abc30.com
www.itproportal.com
www.itproportal.com
FireEye uncovers Russian malware with hint of government backing | ITProPortal.com
www.pcpro.co.uk
www.pcpro.co.uk
Five smartwatch features we’ll see by 2015 | Features | PC Pro
www.pcworld.idg.com.au
www.pcworld.idg.com.au
Gigamon says it can analyze attacker SSL traffic without hitting performance - PC World Australia
appadvice.com
appadvice.com
Apple Pay competitor CurrentC suffers its first data breach -- AppAdvice
www.wral.com
www.wral.com
AP IMPACT: US health care unprepared for Ebola :: WRAL.com
www.cbsnews.com
www.cbsnews.com
​Samsung phones vulnerable to hacking - CBS News
techcrunch.com
techcrunch.com
Retailer-Backed Apple Pay Rival CurrentC Has Been Hacked, Testers’ Email Addresses Stolen | TechCrunch
www.mynews4.com
www.mynews4.com
Panel teaches small business how to secure technology - My News 4 - KRNV, Reno, NV
twitter.com
twitter.com
Gavin Struthers sur Twitter : "#FOCUS14 #intelsecurity @MichaelFeyCTO 2014 marks the death of security by obscurity http://t.co/g9EDRUG2ba"
www.scmagazine.com
www.scmagazine.com
Hacker Lacroix apologizes, gets four years in federal prison - SC Magazine
play.google.com
play.google.com
AntiVirus PRO Android Security - Android Apps on Google Play
blogs.technet.com
blogs.technet.com
MSRC - Site Home - TechNet Blogs
store.digitalriver.com
store.digitalriver.com
Kaspersky Lab eStore
my.kaspersky.com
my.kaspersky.com
My Kaspersky
www.channelbiz.co.uk
www.channelbiz.co.uk
SMB Disaster Recovery Toolkit Released By DatabarracksChannelBiz UK
www.scmagazine.com
www.scmagazine.com
Securonix taps former BofA exec for chief scientist role - SC Magazine
www.bankinfosecurity.com
www.bankinfosecurity.com
Espionage Hacks Tied To Russians - BankInfoSecurity
sprout.hp.com
sprout.hp.com
Sprout | HP® Official Site
www.mbtmag.com
www.mbtmag.com
Walk, Don’t Run: A Security Framework For Midsize Organizations
www.huffingtonpost.com
www.huffingtonpost.com
Why Credit Card Companies Couldn't Stop Hacks At Target And Home Depot
www.sanluisobispo.com
www.sanluisobispo.com
Latest local news from San Luis Obispo, CA | The Tribune
www.siliconbeat.com
www.siliconbeat.com
Survey finds many experts fear worsening cyber attacks | SiliconBeat
news.sky.com
news.sky.com
White House Computers Breached By Hackers
www.usatoday.com
www.usatoday.com
Experts: Major cyberattack will hit in next 11 years
www.buzzfeed.com
www.buzzfeed.com
White House Computers Breached By Suspected Russian Hackers
www.theguardian.com
www.theguardian.com
White House’s unclassified computer network hacked | US news | The Guardian
www.net-security.org
www.net-security.org
Fake "Online Ebola Alert Tool" delivers Trojan, unwanted apps
www.net-security.org
www.net-security.org
Orgs choose network performance over security
www.scmagazine.com
www.scmagazine.com
MPAA urges USTR to put pirate sites on 'Notorious Markets' list - SC Magazine
newsroom.juniper.net
newsroom.juniper.net
Juniper Networks - press-releases
www.reporternews.com
www.reporternews.com
Hacking is the crime Americans worry about most, Gallup poll shows - DecodeDC Story
www.pewinternet.org
www.pewinternet.org
Cyber Attacks Likely to Increase | Pew Research Center's Internet & American Life Project
www.nydailynews.com
www.nydailynews.com
Russia may have hacked White House computers: report  - NY Daily News
blogs.cisco.com
blogs.cisco.com
The Value of Endpoint and Network Protection Together
www.youtube.com
www.youtube.com
Securing Your Online Reputation - YouTube
www.npr.org
www.npr.org
Can Authorities Cut Off Utilities And Pose As Repairmen To Search A Home? : NPR
www.virtual-strategy.com
www.virtual-strategy.com
Voxer Appliance Enables Self-Contained, Secure, Real-Time Voice and Instant Messaging Deployments for Government Organizations | Virtual-Strategy Magazine
www.insidetrade.co
www.insidetrade.co
Easy Network Security with Palo Alto Networks | InsideTrade
www.trutower.com
www.trutower.com
Voxer Appliance Brings Secure, Real-time Voice, Instant Messaging Deployments to Government Organizations | TruTower
www.therem.org
www.therem.org
Chrome update vs Firefox download with security armor for Mac OS X and Windows 8.1 - The REM
www.sourcewire.com
www.sourcewire.com
Check Point Launches Capsule: Mobile Security that Goes Wherever Users Go
www.fedtechmagazine.com
www.fedtechmagazine.com
Four Strategies for Successful Next-Generation Firewall Deployment | FedTech Magazine
time.com
time.com
Know Right Now: Russian Hackers Take on the White House
www.aegindia.org
www.aegindia.org
Cost Of Data Breach Detection System Rising; Will Be Over $1bn By 2018 | AEG India
www.northcountrypublicradio.org
www.northcountrypublicradio.org
Emory Hospital Shares Lessons Learned On Ebola Care | NCPR News
time.com
time.com
Americans Are More Afraid of Being Hacked Than Getting Murdered
www.techworld.com
www.techworld.com
Anti-virus is no longer enough - new apps show how vulnerability scanning is becoming a must - Blogs - Techworld.com
www.itbusinessedge.com
www.itbusinessedge.com
Five Ways Automation Speeds Up Big Data Deployments
nakedsecurity.sophos.com
nakedsecurity.sophos.com
TeamDigi7al US navy hacker sentenced to 2 years in jail | Naked Security
krebsonsecurity.com
krebsonsecurity.com
How to Tell Data Leaks from Publicity Stunts — Krebs on Security
nakedsecurity.sophos.com
nakedsecurity.sophos.com
The “Dirty Dozen” SPAMPIONSHIP – who’s got the biggest zombie problem? | Naked Security
www.bankinfosecurity.com
www.bankinfosecurity.com
Banks' Concerns About Cyberthreats Grow - BankInfoSecurity
www.infoworld.com
www.infoworld.com
The big one: The makings of a global cyber attack | InfoWorld
www.utsandiego.com
www.utsandiego.com
More Californians exposed to data breaches, says state Attorney General | UTSanDiego.com
www.techrepublic.com
www.techrepublic.com
Microsoft's Android moment has arrived - TechRepublic
www.thestar.com.my
www.thestar.com.my
Lollipop's new features sweeten the Android experience - Tech Opinion | The Star Online
redmondmag.com
redmondmag.com
Top Security Threats Still Plaguing Enterprise Cloud Adoption -- Redmondmag.com
www.biznews.com
www.biznews.com
How hackers access sensitive information: cybersecurity report
www.itproportal.com
www.itproportal.com
How to make your Windows 8.1 PC run faster | ITProPortal.com
www.businessinsider.com
www.businessinsider.com
Hackers Use 'Find My Mobile' To Wipe Any Samsung Phone - Business Insider
seclists.org
seclists.org
Information Security News: Hackers breach some White House computers
www.zdnet.com
www.zdnet.com
Lite-On EP1 Series SSDs deliver PCI Express speeds in M.2 format | ZDNet
nakedsecurity.sophos.com
nakedsecurity.sophos.com
SSCC 171 – Are you SURE that “1234” is a bad password? [PODCAST] | Naked Security
twitter.com
twitter.com
RSA sur Twitter : "Remember, what you do online can potentially affect everyone. Practice good #online habits! #NCSAM http://t.co/jTOieJikT2"
www.securitytube.net
www.securitytube.net
Louisville Infosec 2014 - Changing What Game- One Future For Information Security
www.aplaceformom.com
www.aplaceformom.com
6 Ways Ambient Assisted Living Improves Quality of Life
www.pcmag.com
www.pcmag.com
Seagate NAS 2-Bay Review & Rating | PCMag.com
www.politico.com
www.politico.com
Russia-linked hackers allegedly penetrated unclassified White House networks - Sun, surf and the NIST framework - POLITICO Morning Cybersecurity - POLITICO.com
www.zdnet.com
www.zdnet.com
BYOD: Why the biggest security worry is the fool within rather than the enemy without | ZDNet
www.cpifinancial.net
www.cpifinancial.net
CPI Financial | Jobs | Business Continuity Manager
thatguy.trendmicro.com
thatguy.trendmicro.com
Password Manager – Online Account protection – Don’t be that Guy
www.facebook.com
www.facebook.com
SANS Institute - Photos du journal | Facebook
www.reuters.com
www.reuters.com
Studies find fast traders get data from SEC seconds early: WSJ| Reuters
www.businesswire.com
www.businesswire.com
McAfee Report Reveals Organizations Choose Network Performance Over Advanced Security Features | Business Wire
time.com
time.com
White House Hacked: Computer Networks Breached, Reportedly By Russians
www.tribuneindia.com
www.tribuneindia.com
The Tribune, Chandigarh, India - Latest News
blogs.wsj.com
blogs.wsj.com
Israeli Accelerator UpWest Helps Startups Move to Silicon Valley - Venture Capital Dispatch - WSJ
mspmentor.net
mspmentor.net
MSPs Can Help SMB Customers Pursue BYOD -- Safely | MSPmentor Blog
theweek.com
theweek.com
Why the defense industry is ripe picking for hackers - The Week
www.usatoday.com
www.usatoday.com
White House hacked (Russia involved?)
www.zawya.com
www.zawya.com
Growing BYOD Trend in Middle East Requires Ramped Up Data Center Security - Zawya
www.information-age.com
www.information-age.com
Why even compliant enterprises can be vulnerable in today’s threat landscape | Information Age
www.whatech.com
www.whatech.com
New report looks into Global bring your own device (BYOD) market that is expected to grow to $83.76 billion by 2019 - WhaTech
www.dailymail.co.uk
www.dailymail.co.uk
Samsung Find My Mobile bug lets hackers remotely lock devices | Daily Mail Online
www.idtheftcenter.org
www.idtheftcenter.org
Identity Theft Resource Center - TOLL-FREE NO COST ASSISTANCE at 888-400-5530
packetstormsecurity.com
packetstormsecurity.com
White House Computer Network 'Hacked' ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
BlackEnergy Malware Has Compromised Systems For 2 Years ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Hackers Are Using Gmail Drafts To Update Their Malware And Steal Data ≈ Packet Storm
www.csoonline.com
www.csoonline.com
Hackers target unclassified White House network | CSO Online
keithp.com
keithp.com
Goodbye-Barnes-and-Noble
www.computerworlduk.com
www.computerworlduk.com
For big raises in IT, look to mobile, security, big data - ComputerworldUK.com
www.darkreading.com
www.darkreading.com
Security Companies Team Up, Take Down Chinese Hacking Group
phys.org
phys.org
Walk through buildings from your own device
www.cloudcomputing-news.net
www.cloudcomputing-news.net
How software defined networking and cloud computing pave the way towards a digital society - Cloud Tech News
www.theguardian.com
www.theguardian.com
The FBI says to be wary of hackers ... and to let the FBI hack what it wants | Trevor Timm | Comment is free | theguardian.com
www.theregister.co.uk
www.theregister.co.uk
WHITE HOUSE network DOWN: Nation-sponsored attack likely • The Register
www.bloombergview.com
www.bloombergview.com
The Link You Just Clicked May Not Be Real - Bloomberg View
www.cbronline.com
www.cbronline.com
Why networks 'are being sacrificed for security' - Computer Business Review
www.theguardian.com
www.theguardian.com
'State sponsored' Russian hacker group linked to cyber attacks on neighbours | Technology | theguardian.com
blogs.wsj.com
blogs.wsj.com
Fortune 500 Companies at Risk with Exposure of Employee Passwords - The CIO Report - WSJ
www.today.com
www.today.com
Data Breaches? Bah, humbug! We're going to shop - Money - TODAY.com
www.theverge.com
www.theverge.com
Americans are more afraid of being hacked than of all other crimes, including murder | The Verge
www.nbcnews.com
www.nbcnews.com
Unwitting Workers Give Hackers Keys to Fortune 500 Firms' Networks: Study - NBC News
www.marketwired.com
www.marketwired.com
Sanovi and 3Qube Partner to Provide Business Continuity in the Cloud
www.zdnet.com
www.zdnet.com
Hackers infiltrate White House network | ZDNet
www.forbes.com
www.forbes.com
SymantecVoice: How To Hire The Best IT Security Team For Your Business - Forbes
sizeof.io
sizeof.io
Snap webcam photos whenever your app crashes
www.bakersfieldnow.com
www.bakersfieldnow.com
Attorney general: 18.5 million Californians had info hacked, stolen or exposed | Local & Regional News | Bakersfield Now - News, Weather and Sports
www.washingtonpost.com
www.washingtonpost.com
How you would fix Social Security: Sooner rather than later - The Washington Post
www.qsrweb.com
www.qsrweb.com
HMSHost deploys WatchGuard firewall system | QSRWeb
www.darkreading.com
www.darkreading.com
Cyber Espionage Attacks Attributed To Russian Government
www.inquisitr.com
www.inquisitr.com
Hacked! Russian Hackers Breached White House Computer Networks
uncovermichigan.com
uncovermichigan.com
FireEye report provides a view into Russia's cyber-espionage tactics | Uncover Michigan
www.net-security.org
www.net-security.org
US ICS operators under attack by crims wielding BlackEnergy malware
seclists.org
seclists.org
Information Security News: Army fitness standards for fat ‘cyber warriors’ may change as U.S. waistlines grow
nakedsecurity.sophos.com
nakedsecurity.sophos.com
Arrests made after ‘specialist malware’ used in £1.6 million ATM heist | Naked Security
www.prweb.com
www.prweb.com
FISMA and NIST Information Security Policies and Procedures Available for Instant Download from the Security Experts from Flat Iron Technologies, LLC
www.securitytube.net
www.securitytube.net
Louisville Infosec 2014 - Practical Interception Of Mobile Device Traffic
www.computerworld.com
www.computerworld.com
Gigamon says it can analyze attacker SSL traffic without affecting performance | Computerworld
www.wtop.com
www.wtop.com
BYOD: How to keep the boss out of your business - WTOP.com
www.cnbc.com
www.cnbc.com
Data breach: Most holiday shoppers undeterred
news.techworld.com
news.techworld.com
NHS Trusts struggling with Windows XP migration, FoI request finds - Techworld.com
www.computerworld.com
www.computerworld.com
Tech support’s NSFW problem
www.zdnet.com
www.zdnet.com
Enterprise network security takes backseat to speed: McAfee | ZDNet
www.itv.com
www.itv.com
White House computers 'breached by hackers' - ITV News
nakedsecurity.sophos.com
nakedsecurity.sophos.com
Placemeter monitors streets from apartment windows: time to don a mask? | Naked Security
swtimes.com
swtimes.com
ASU-Beebe Warns Campuses Of Possible Data Breach | Times Record
archive.org
archive.org
Internet Archive: Digital Library of Free Books, Movies, Music & Wayback Machine
www.cio-today.com
www.cio-today.com
Microsoft Offers Office 365 Users Free, Unlimited OneDrive Storage - Cloud Computing on CIO Today
www.v3.co.uk
www.v3.co.uk
Google upgrades Android Lollipop security with encryption - IT News from V3.co.uk
www.smh.com.au
www.smh.com.au
How to keep emails private and avoid embarrassing leaks
www.infoworld.com
www.infoworld.com
Azure expands, while security, storage, APIs lift Office 365 | InfoWorld
seclists.org
seclists.org
Information Security News: BlackEnergy crimeware coursing through US control systems
seclists.org
seclists.org
Information Security News: Research links massive cyber spying ring to Russia
hitconsultant.net
hitconsultant.net
New Rulings Protect Hospitals Against Security Data Breaches
www.cmswire.com
www.cmswire.com
Securing Social Business in Office 365
safety.blr.com
safety.blr.com
10 steps to a safe driving program
phys.org
phys.org
South Korea spy agency says North hacking smartphones
www.prweb.com
www.prweb.com
Newly Revised 2014 Cyber Security Policies and Procedures Available for Instant Download from the Experts at myinformationsecuritypolicy.com
www.net-security.org
www.net-security.org
10% of employees unaware if they have an IT department or not
symantecevents.verite.com
symantecevents.verite.com
Enterprise Data Protection Simplified & Enhanced with NetBackup 5330 | Symantec
antirez.com
antirez.com
This is why I can’t have conversations using Twitter - Antirez weblog
www.kyivpost.com
www.kyivpost.com
Washington Post: Russia suspected to be behind White House hack
www.reuters.com
www.reuters.com
Cyber breaches put 18.5 million Californians' data at risk in 2013: report| Reuters
www.rferl.org
www.rferl.org
White House Detects Suspicious Cyber Activity, Report Blames Russia
www.wjactv.com
www.wjactv.com
National Stories - WJAC WJACTV.com
www.marketwatch.com
www.marketwatch.com
Gigamon Announces New Solutions for SSL Visibility and Enhancements for Multi-Tiered Security - MarketWatch
www.independent.ie
www.independent.ie
Russians accused of hacking White House computer network - Independent.ie
thejournal.com
thejournal.com
Report: Security Pressures Making Older Firewalls Obsolete -- THE Journal
www.foreignpolicyjournal.com
www.foreignpolicyjournal.com
The Death Squad Dilemma: Counterinsurgency Policy and the Salvadoran Model - Foreign Policy Journal
www.businesswire.com
www.businesswire.com
Allied Telesis Selects Emerging Threats’ ETPro® and IQRisk® Products for New Range of Next-Generation Firewalls | Business Wire
www.net-security.org
www.net-security.org
IT is losing the battle on security in the cloud
thehackernews.com
thehackernews.com
Sony Xperia Devices Secretly Sending User Data to Servers in China
www.virtual-strategy.com
www.virtual-strategy.com
TITUS Recognized by McAfee as Most Valuable Partner of the Year | Virtual-Strategy Magazine
www.symantec.com
www.symantec.com
EMEA CR Awareness Event: Drumming Up EMEA’s Corporate Responsibility Initiatives | Symantec Connect
www.rsaconference.com
www.rsaconference.com
Turning Medical Device Hacks into Tools for Defenders – Podcast – RSA Conference
www.kansascity.com
www.kansascity.com
Seoul: N. Korea's Kim Jong Un had ankle surgery | The Kansas City Star
www.toptechnews.com
www.toptechnews.com
IBM Rolls Out Analytics-Based Security Solution - Big Data on Top Tech News
www.digitaljournal.com
www.digitaljournal.com
PhishLine Recognized as a Visionary in Gartner 2014 Magic Quadrant for Security Awareness Computer-Based Training - Press Release - Digital Journal
goldrushcam.com
goldrushcam.com
Attorney General Kamala D. Harris Releases Data Breach Report; 18.5 Million Californians’ Personal Information Put at Risk
www.securitytube.net
www.securitytube.net
Louisville Infosec 2014 - Building An Enterprise Ddos Mitigation Strategy
www.virtual-strategy.com
www.virtual-strategy.com
SC Magazine Awards PFU iNetSec Smart Finder 5-Star Rating for Features, Ease of Use, Performance, Support and Value | Virtual-Strategy Magazine
smartdatacollective.com
smartdatacollective.com
How Governments Can (and should) Use Hadoop | SmartData Collective
www.theregister.co.uk
www.theregister.co.uk
BlackEnergy crimeware coursing through US control systems • The Register
www.terravion.com
www.terravion.com
Careers - TerrAvion
www.cnet.com
www.cnet.com
Russian government gathers intelligence with malware: report - CNE
www.ndtv.com
www.ndtv.com
South Korea Spy Agency Says North Hacking Smartphones
www.usnews.com
www.usnews.com
California AG Says 18.5 Million Residents' Info Exposed - US News
thehackernews.com
thehackernews.com
Cryptography Hacks - Hash Encryption using DuckDuckGo Search Engine
www.symantec.com
www.symantec.com
Enable the Agile Data Center | Symantec
www.net-security.org
www.net-security.org
Fixing the broken windows of software security
www.prweb.com
www.prweb.com
PhishLine Recognized as a Visionary in Gartner 2014 Magic Quadrant for Security Awareness Computer-Based Training
www.finances.com
www.finances.com
Citrix Positioned for the Eighth Consecutive Year in the Leaders Quadrant for Application Delivery Controllers MQ - Finances
www.retail-week.com
www.retail-week.com
Comment: Retailers are too complacent about data security | Comment | Retail Week
gadgets.ndtv.com
gadgets.ndtv.com
US Urges More Government-Business Cooperation on Cyber-Security | NDTV Gadgets
www.marketwatch.com
www.marketwatch.com
New Personal Trading Instruments (PCI) from IFC Markets are Now Available for Trading - MarketWatch
www.computerworlduk.com
www.computerworlduk.com
Microsoft leans on data-center strength to get cloud edge - ComputerworldUK.com
triblive.com
triblive.com
Charleroi to review school security plan | TribLIVE
www.sfgate.com
www.sfgate.com
Personal data of more than 18.5 million Californians exposed - SFGate
www.power-eng.com
www.power-eng.com
Gartner Recognizes FishNet Security for Computer-Based Security Awareness Training - Power Engineering
edition.cnn.com
edition.cnn.com
North Korea: Stop sending it luxury goods (Opinion) - CNN.com
firstlook.org
firstlook.org
Ed Snowden Taught Me To Smuggle Secrets Past Incredible Danger. Now I Teach You. - The Intercept
www.ihealthbeat.org
www.ihealthbeat.org
Warnings Issued About Fake Ebola Treatments, Malware Scams - iHealthBeat
priceonomics.com
priceonomics.com
The Man Who Writes His Dissenting Opinion in ALL CAPS
www.cbsnews.com
www.cbsnews.com
Maine nurse who treated Ebola patients will not observe quarantine - CBS News
www.thedailybeast.com
www.thedailybeast.com
Hackers Breach White House Computers - The Daily Beast
www.kpbs.org
www.kpbs.org
Personal Info Of 18.5M Californians Exposed In 2013 | KPBS
www.marketwatch.com
www.marketwatch.com
McAfee Report Reveals Organizations Choose Network Performance Over Advanced Security Features - MarketWatch
www.latimes.com
www.latimes.com
Data breaches jump in California and are expected to keep climbing - LA Times
www.miamiherald.com
www.miamiherald.com
Seoul: N. Korea's Kim Jong Un had ankle surgery | The Miami Herald
www.sci-tech-today.com
www.sci-tech-today.com
IBM Rolls Out Analytics-Based Security Solution | Sci-Tech Today
www.csoonline.com
www.csoonline.com
White House officials confirm breach on unclassified network | CSO Online
www.securitytube.net
www.securitytube.net
Louisville Infosec 2014 - A Crosswalk Of The Department Of Defense (Dod) Information Assurance Certification And Accreditation Process (Diacap)
abcnews.go.com
abcnews.go.com
Kaci Hickox Won't Follow Maine Ebola Quarantine Rule, Lawyer Says - ABC News
www.pcworld.co.nz
www.pcworld.co.nz
Gigamon says it can analyze attacker SSL traffic without hitting performance - PC World New Zealand
zeenews.india.com
zeenews.india.com
US eyes cyber `deterrence` to stop hackers
www.argusleader.com
www.argusleader.com
Boe Forum speaker: Protection from hackers a top priority
yubanet.com
yubanet.com
AG Kamala D. Harris Releases Data Breach Report; 18.5 Million Californians' Personal Information Put at Risk
www.fresnobee.com
www.fresnobee.com
Local News | FresnoBee.com
mybroadband.co.za
mybroadband.co.za
US military to secure cyberspace
www.theregister.co.uk
www.theregister.co.uk
Cisco: We made UCS secure but need your help to finish the job • The Register
www.businessinsurance.com
www.businessinsurance.com
Outgoing PCI chair wins President's Award | Business Insurance
www.businessinsurance.com
www.businessinsurance.com
New PCI chairman monitors federal regulatory posture | Business Insurance
www.scmagazine.com
www.scmagazine.com
US-CERT warns of phishing campaign spreading Dyre - SC Magazine
www.atvn.org
www.atvn.org
Data Breaches Plague California | ATVN
abcnews.go.com
abcnews.go.com
Hackers Breach White House's Unclassified Computer Network - ABC News
www.pcworld.com
www.pcworld.com
California reports huge jump in data breaches | PCWorld
www.theregister.co.uk
www.theregister.co.uk
Find My Phone does just one thing but Samsung's messed it up • The Register
www.washingtonpost.com
www.washingtonpost.com
Calif. AG: 18.5 million residents’ info exposed - The Washington Post
www.computerworld.com
www.computerworld.com
California reports huge jump in data breaches | Computerworld
abc7.com
abc7.com
Data breaches affected 18.5 million Californians last years | abc7.com
www.itnews.com.au
www.itnews.com.au
Hackers breach White House network - Security - News - iTnews.com.au
www.crn.com
www.crn.com
Intel Exec Tells Partners Missed Security Services Opportunity 'Criminal' - Page: 1 | CRN
www.computerdealernews.com
www.computerdealernews.com
New Intel Security boss asks the big question | Computer Dealer News
www.thestar.com
www.thestar.com
Has the mystery behind Kim Jong Un’s disappearance been solved? | Toronto Star
english.chosun.com
english.chosun.com
The Chosun Ilbo (English Edition): Daily News from Korea - N.Korea Hacks 20,000 S.Korean Smartphones
thevarguy.com
thevarguy.com
McAfee Overhauls Partner Program | Information Technology Channel Partner Programs content from The VAR Guy
www.heraldonline.com
www.heraldonline.com
Local news from Rock Hill, SC | The Herald
www.stripes.com
www.stripes.com
Report: Russian hackers thought to breach White House network - News - Stripes
www.kolotv.com
www.kolotv.com
Businesses Learn Cyber Security
www.businesswire.com
www.businesswire.com
McAfee Report Reveals Organizations Choose Network Performance Over Advanced Security Features
pwc.blogs.com
pwc.blogs.com
Additional indicators relating to Sofacy (APT28) phishing - Cyber security updates
malware.dontneedcoffee.com
malware.dontneedcoffee.com
Malware don't need Coffee: The worst of Windows "Police Locker" is also available on Android
www.pcworld.com
www.pcworld.com
Security vendor coalition cleans 43,000 malware infections used for cyberespionage | PCWorld
cxsecurity.com
cxsecurity.com
MacOS X 10.10 & FreeBSD10 ftp Remote Comand Execution - CXSecurity.com
www.gurufocus.com
www.gurufocus.com
Microsoft's Innovation Can Take It Higher - GuruFocus.com
www.latimes.com
www.latimes.com
White House computer network is hacked, official says - LA Times
www.independent.ie
www.independent.ie
How an ankle brought Kim to heel - Independent.ie
www.seattlepi.com
www.seattlepi.com
Seattle FBI admits to faking news report to drop spyware on teen's computer - seattlepi.com
english.vietnamnet.vn
english.vietnamnet.vn
Social News 29/10 - News VietNamNet
blogs.technet.com
blogs.technet.com
The dangers of opening suspicious emails: Crowti ransomware - Microsoft Malware Protection Center - Site Home - TechNet Blogs
blogs.cisco.com
blogs.cisco.com
Threat Spotlight: Group 72, Opening the ZxShell
pentesteracademylab.appspot.com
pentesteracademylab.appspot.com
Pentester Academy Lab
www.ndtv.com
www.ndtv.com
North Korean Leader Kim Jong Un Had Ankle Surgery: Officials
english.yonhapnews.co.kr
english.yonhapnews.co.kr
N. Korea attempts to hack into S. Koreans' smartphones: NIS
www.pcworld.com
www.pcworld.com
Gigamon says it can analyze attacker SSL traffic without hitting performance | PCWorld
www.tripwire.com
www.tripwire.com
The Ten Most Wanted Hackers By The FBI – #9 and #8 - The State of Security
www.tripwire.com
www.tripwire.com
300,000 Social Security Numbers, driving licenses and more private data leaked after being left on publicly accessible server
thehill.com
thehill.com
Chip-based cards targeted after Home Depot hack | TheHill
www.securitytube.net
www.securitytube.net
Louisville Infosec 2014 - Issa Awards
www.voanews.com
www.voanews.com
Suspicious Activity Detected on White House Computer Network
www.reuters.com
www.reuters.com
UPDATE 2-Suspicious cyber activity at White House detected, addressed| Reuters
www.itbusiness.ca
www.itbusiness.ca
How Qualys tackles an incident response | IT Business
betanews.com
betanews.com
Google for Work scores 45,000 new users -- should Microsoft worry?
news.asiaone.com
news.asiaone.com
Suspicious cyber activity detected by technicians at the White House, AsiaOne World News
www.tomsguide.com
www.tomsguide.com
Apple Addresses 'Shellshock' Bug as More Attacks Appear
www.digitaljournal.com
www.digitaljournal.com
McAfee Delivers New Product Portfolio for Small and Medium-Sized Businesses - Press Release - Digital Journal
www.telegram.com
www.telegram.com
Cyber attacks enrich security specialists - Worcester Telegram & Gazette - telegram.com
www.heraldscotland.com
www.heraldscotland.com
NHS Greater Glasgow and Clyde issue apology after confidentiality breach | Herald Scotland
a16z.com
a16z.com
Mobile Is Eating the World | Andreessen Horowitz
www.ctvnews.ca
www.ctvnews.ca
White House says it has handled suspicious hacker activity | CTV News
en.ria.ru
en.ria.ru
Former NSA Official Warns Companies Against Cyber-Retaliation or ‘Hacking Back’ | Military & Intelligence | RIA Novosti
www.eturbonews.com
www.eturbonews.com
IATA launches Aviation Cyber Security Toolkit - eTurboNews.com
edition.cnn.com
edition.cnn.com
The world of 'hackonomics' - CNN.com Video
www.power-eng.com
www.power-eng.com
Prometric Expands Industry Leadership for Systems Security and Management - Power Engineering
www.washingtonpost.com
www.washingtonpost.com
Hackers breach some White House computers - The Washington Post
www.powerlineblog.com
www.powerlineblog.com
Is the Washington Press Corps Covering Up Another Obama Administration Fiasco? [Updated] | Power Line
www.issaquahpress.com
www.issaquahpress.com
Local issues, national candidates in Nov. 4 general election : The Issaquah Press – News, Sports, Classifieds and More in Issaquah, WA
carnegieeurope.eu
carnegieeurope.eu
A New Ambition for Europe: A Memo to the European Union Foreign Policy Chief - Carnegie Europe
www.scmagazine.com
www.scmagazine.com
FBI uncovers second person leaking government documents - SC Magazine
krebsonsecurity.com
krebsonsecurity.com
‘Replay’ Attacks Spoof Chip Card Charges — Krebs on Security
www.scmagazine.com
www.scmagazine.com
FireEye identifies cyber espionage group possibly tied to Russian government - SC Magazine
www.rsaconference.com
www.rsaconference.com
Avoiding BYOD? Why Setting BYOD Policies Is Increasingly Critical – Video – RSA Conference
www.latimes.com
www.latimes.com
Hacks on Californians shot up last year, more are expected this year - LA Times
abc7news.com
abc7news.com
California Attorney General Kamala Harris: 18.5 million residents' information exposed | abc7news.com
www.techtimes.com
www.techtimes.com
Hackers hit data of 18.5M Californians in mostly retail breaches : PERSONAL TECH : Tech Times
www.youtube.com
www.youtube.com
MFE PS14 Highlight - YouTube
www.theregister.co.uk
www.theregister.co.uk
'GCHQ's surveillance data gulp is BULKY and WARRANTLESS', human rights groups moan • The Register
www.techtimes.com
www.techtimes.com
Find My Phone glitch lets hackers lock up Samsung handsets : PERSONAL TECH : Tech Times
azdailysun.com
azdailysun.com
Potential data breach for 44,000 Arizona retirees
www.computerworlduk.com
www.computerworlduk.com
Office 365 is getting management features for iOS, Android and Windows Phone - ComputerworldUK.com
www.scmagazine.com
www.scmagazine.com
Amit Yoran promoted to RSA president - SC Magazine
www.islandpacket.com
www.islandpacket.com
Latest breaking news from Hilton Head & Beaufort, SC | The Island Packet
www.trendmicro.com
www.trendmicro.com
Pawn Storm Espionage Attacks Use Decoys, Deliver SEDNIT - Security News - Trend Micro USA
consumerist.com
consumerist.com
Survey: The Crime Americans Worry About Most? Credit Card Hack Attacks – Consumerist
www.scmagazine.com
www.scmagazine.com
Coalition sheds more light on Hikit threat, Axiom spy group - SC Magazine
www.mcafee.com
www.mcafee.com
Malware Threat Detection and Malware Block Effectiveness – Reviews | McAfee
duckduckhack.com
duckduckhack.com
DuckDuckHack
www.newsworks.org
www.newsworks.org
Data breach at Cape May-Lewes Ferry — NewsWorks
www.miamiherald.com
www.miamiherald.com
ASU-Beebe warns campuses of possible data breach | The Miami Herald
www.cso.com.au
www.cso.com.au
Gigamon announces new solutions for SSL visibility and enhancements for multi-tiered security - Media Releases - CSO | The Resource for Data Security Executives
www.scmagazine.com
www.scmagazine.com
'Cash out' crew member sentenced to 21 months in prison - SC Magazine
www.darkreading.com
www.darkreading.com
SuperValu Reports Second Cyberattack
www.securitytube.net
www.securitytube.net
Louisville Infosec 2014 - What Your Web Vulnerability Scanners Aren't Telling You
news.stv.tv
news.stv.tv
Health board apology to 86 transgender patients over privacy breach | Glasgow & West | News
www.newser.com
www.newser.com
Calif. AG: Personal data hacked, exposed from 18.5 million Calif. accounts in 2013, up 600 pct - 10/28/2014 12:37:03 PM | Newser
kjzz.org
kjzz.org
AZ State Retirment System Responds To Potential Data Breach | KJZZ
www.digitaljournal.com
www.digitaljournal.com
WatchGuard Technologies Delivers a Leading Combination of Security and Value in NSS Labs' Analysis of Next Generation Firewall Appliances - Press Release - Digital Journal
www.mymotherlode.com
www.mymotherlode.com
State Hacking Hike | myMotherLode.com
www.newsobserver.com
www.newsobserver.com
Local & North Carolina state news from Raleigh, NC | NewsObserver.com
healthitsecurity.com
healthitsecurity.com
Unencrypted Discs with PHI Create Potential Health Data Breach | HealthITSecurity.com
www.sonicscoop.com
www.sonicscoop.com
Review: Batch Commander for Pro Tools, from Slate Media Technology | SonicScoop - Creative, Technical & Business Connections For NYC’s Music & Sound Community
www.vox.com
www.vox.com
The evidence that Sharyl Attkisson got her laptop hacked seems weak - Vox
www.mycentraljersey.com
www.mycentraljersey.com
Man charged with hacking into Clinton's computers
www.newsmax.com
www.newsmax.com
Report: Russian Government in on Hacking Schemes
www.watoday.com.au
www.watoday.com.au
The grinch who hacked Telethon's Instagram account
www.scmagazine.com
www.scmagazine.com
Layering EMV chip, tokenization, encryption bolsters card payment security - SC Magazine
outsidelens.scmagazine.com
outsidelens.scmagazine.com
Watch "Hackers exploiting Microsoft PowerPoint to access computers" Video at SCMagazine
www.youtube.com
www.youtube.com
Providing Next-Gen Security for Today’s Healthcare - YouTube
blogs.microsoft.com
blogs.microsoft.com
Microsoft’s Commitment to Protect Customer Data through Encryption Continues | Cyber Trust Blog
www.nasa.gov
www.nasa.gov
NASA Television | NASA
www.nationaljournal.com
www.nationaljournal.com
NSA Chief Warns Companies Against Revenge Hackings - NationalJournal.com
www.emc.com
www.emc.com
Amit Yoran Named RSA President; Art Coviello Remains as RSA Executive Chairman
gizmodo.com
gizmodo.com
This Credit-Card-Size Cellphone Would Be the Ultimate Backup
rt.com
rt.com
​Watch your attachments: Microsoft Office bug lets hackers take over computers — RT USA
blogs.mcafee.com
blogs.mcafee.com
Gavin Struthers' Partner Summit 2014 Keynote Recap | McAfee
blogs.mcafee.com
blogs.mcafee.com
Partner Summit 2014 Wraps Up | McAfee
masterherald.com
masterherald.com
Is Jailbreaking Apple iPhone 6 and iOS 8 Legal? Let’s Find Out! | Master Herald
www.bloomberg.com
www.bloomberg.com
Hacking Group May Be Linked to Russian Government: Video - Bloomberg
www.breitbart.com
www.breitbart.com
More Evidence the Government Hacked Sharyl Attkisson's Computer
venturebeat.com
venturebeat.com
OneNote for iOS gets cloud storage attachments and Touch ID, OneNote for Mac gets SharePoint Server support | VentureBeat | News Briefs | by Emil Protalinski
techday.com
techday.com
Techday – Think you know all there is to know about the cloud? Think again
www.businessinsider.com
www.businessinsider.com
Cybersecurity Executives Raises Hacks - Business Insider
www.tripwire.com
www.tripwire.com
US-CERT Warns of Phishing Campaigns Spreading ‘Dyre’ Banking Trojan - The State of Security
www.bloomberg.com
www.bloomberg.com
Wall Street Beset by Hackers Raises Key Executive Pay - Bloomberg
windowsitpro.com
windowsitpro.com
Microsoft Launches TechEd Europe with Wave of Announcements | Cloud content from Windows IT Pro
www.kshb.com
www.kshb.com
Hacking is the crime Americans worry about most, Gallup poll shows - DecodeDC - KSHB.com
www.businessweek.com
www.businessweek.com
Wall Street Beset by Hackers Raises Key Executive Pay - Businessweek
arstechnica.com
arstechnica.com
Who knew? MPAA concerned online pirates are exposed to malware | Ars Technica
www.theguardian.com
www.theguardian.com
Tor users advised to check their computers for malware | Technology | theguardian.com
medievalbooks.nl
medievalbooks.nl
Hugging a Medieval Book | medievalbooks
www.federaltimes.com
www.federaltimes.com
Improving cybersecurity for small and medium-sized businesses | Federal Times | federaltimes.com
www.khaleejtimes.com
www.khaleejtimes.com
No Page Found - Khaleej Times
www.marketwired.com
www.marketwired.com
Cisco Unveils Industry's First Threat-Focused Next-Generation Firewall
www.govexec.com
www.govexec.com
Republican 2016 Contenders Have Taken Positions on NSA Reform. Where Does Hillary Clinton Stand? - Defense - GovExec.com
www.fastcompany.com
www.fastcompany.com
Why International Cybercrime Is Going To Keep Getting Worse | Fast Company | Business + Innovation
www.theregister.co.uk
www.theregister.co.uk
Security Avengers team up to take down Chinese hacking group • The Register
community.websense.com
community.websense.com
Official Website of Popular Science Compromised
twitter.com
twitter.com
Kaspersky Lab sur Twitter : "We'd like to extend a very big thank you to our sponsors today at the #KasperskyGSS Government Cybersecurity Forum: http://t.co/8LoFEB50fn"
www.securitytube.net
www.securitytube.net
Louisville Infosec 2014 - A Place At The Table
news.slashdot.org
news.slashdot.org
2600 Profiled: "A Print Magazine For Hackers" - Slashdot
www.smallbusinesscomputing.com
www.smallbusinesscomputing.com
Small Business Security: Hackers Dial Up Telephone Fraud
www.finextra.com
www.finextra.com
Finextra: Feedzai and Encap form security partnership
www.heraldnet.com
www.heraldnet.com
Lawyers in Seattle ask to move Russia hacking trial to May | HeraldNet.com - Northwest
www.itbusinessedge.com
www.itbusinessedge.com
Deliver Business Value Through Big Data: Make It Small
www.cnbc.com
www.cnbc.com
18.5M Californians' data breached last year: Report
www.dailytech.com
www.dailytech.com
DailyTech - Samsung's Remote Wipe Could Let Hackers Hold Your Phone Ransom
www.bellinghamherald.com
www.bellinghamherald.com
Local news from Bellingham, Whatcom County, WA | BellinghamHerald.com
www.powerengineeringint.com
www.powerengineeringint.com
Prometric Expands Industry Leadership for Systems Security and Management - Power Engineering International
twitter.com
twitter.com
McAfee Inc. sur Twitter : "At the Demonstrating Proxy on #NGFW Turbo Talk—looking at improved isolation between clients and servers. #FOCUS14 http://t.co/f2LDmCbecb"
www.kb.cert.org
www.kb.cert.org
Vulnerability Note VU#685996 - GNU wget Arbitrary Filesystem Access through FTP Symlinks
twitter.com
twitter.com
Juniper Networks sur Twitter : "Give this week's certification quiz your best guess, good luck! http://t.co/MLJAo9eTdT"
www.cio-today.com
www.cio-today.com
IBM Rolls Out Analytics-Based Security Solution - Computing on CIO Today
www.worldpoliticsreview.com
www.worldpoliticsreview.com
Out of the Shadows: Iran’s Evolving Approach to Drug Addiction
blogs.wsj.com
blogs.wsj.com
How to Make Your Money Last for a Longer Lifetime - Total Return - WSJ
www.computerworld.com
www.computerworld.com
Security vendor coalition cleans 43K malware infections used for cyberespionage | Computerworld
www.networkworld.com
www.networkworld.com
Microsoft: 42% of Americans endure daily or weekly attacks on personal data
www.theregister.co.uk
www.theregister.co.uk
FBI impersonated newspaper to finger school bomb threat suspect • The Register
www.surveymonkey.com
www.surveymonkey.com
EC Q4 2014: NFV/SDN Survey
www.businessinsider.com
www.businessinsider.com
Wal-Mart's War Against Apple Pay, The iPhone Payments System - Business Insider
www.tweaktown.com
www.tweaktown.com
Gallup poll: Americans fear hackers more than any other crime
www.philly.com
www.philly.com
Calif. AG: 18.5 million residents' info hacked
www.bloomberg.com
www.bloomberg.com
Hacking Group May Be Linked to Russian Government, Report Says - Bloomberg
www.arkansasbusiness.com
www.arkansasbusiness.com
ASU-Beebe Warns Campuses of Possible Data Breach | Arkansas Business News | ArkansasBusiness.com
www.darkreading.com
www.darkreading.com
Identifying Jailbroken iPhones/rooted Android Phones To Stop Fraud
www.powerengineeringint.com
www.powerengineeringint.com
Gartner Recognizes FishNet Security for Computer-Based Security Awareness Training - Power Engineering International
www.techtimes.com
www.techtimes.com
Which crime scares Americans the most? Poll says hacking : T-Lounge : Tech Times
phys.org
phys.org
US eyes cyber 'deterrence' to stop hackers
www.toptechnews.com
www.toptechnews.com
New Chinese Cyber-Espionage Group Exposed - Network Security on Top Tech News
www.pottsmerc.com
www.pottsmerc.com
RALPH R. REILAND: Can Obama Administration do anything right?
www.net-security.org
www.net-security.org
Russian-based cyber spies going after military, intelligence targets
www.symantec.com
www.symantec.com
Looking at the Threat Landscape to Improve Your Endpoint Security | Symantec Connect
packetstormsecurity.com
packetstormsecurity.com
Tuleap 7.2 XXE Injection ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Tuleap 7.4.99.5 Remote Command Execution ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
CUPS Filter Bash Environment Variable Code Injection ≈ Packet Storm
www.websense.com
www.websense.com
Careers Listing — Websense.com
www.bbc.com
www.bbc.com
BBC News - Google is developing cancer and heart attack detector
www.marketwired.com
www.marketwired.com
Gartner Recognizes FishNet Security for Computer-Based Security Awareness Training
losangeles.cbslocal.com
losangeles.cbslocal.com
Millions Of Californians Face Fraud Risk Due To Data Breaches « CBS Los Angeles
www.directionsmag.com
www.directionsmag.com
2014 Cybersecurity Leadership and Innovation Awards Announced - Directions Magazine
www.virtual-strategy.com
www.virtual-strategy.com
Cylance Introduces Threat Indicators to CylancePROTECT and CylanceV, Providing Context on Threats Before They Execute | Virtual-Strategy Magazine
www.net-security.org
www.net-security.org
ScanBox keylogging framework lurking on disparate watering holes
www.marketwired.com
www.marketwired.com
Prometric Expands Industry Leadership for Systems Security and Management
packetstormsecurity.com
packetstormsecurity.com
HP Security Bulletin HPSBMU03152 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
HP Security Bulletin HPSBST03157 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Debian Security Advisory 3058-1 ≈ Packet Storm
www.juniper.net
www.juniper.net
Example: Configuring BGP PIC Edge for MPLS Layer 3 VPNs - Technical Documentation - Support - Juniper Networks
www.centredaily.com
www.centredaily.com
Community | CentreDaily.com
www.scmagazineuk.com
www.scmagazineuk.com
95% of companies challenged by BYOD security - SC Magazine UK
www.networkworld.com
www.networkworld.com
Microsoft announcements: From TechEd Europe innovations to baking Skype into IE | Network World
www.nbcnews.com
www.nbcnews.com
New York Governor Lays Out Ebola Rules: Mandatory Home Quarantine - NBC News
www.dailytimes.com.pk
www.dailytimes.com.pk
WikiLeaks’ Julian Assange warns: Google is not what it seems
www.csoonline.com
www.csoonline.com
Security vendor coalition cleans 43,000 malware infections used for cyberespionage | CSO Online
www.highlandnews.net
www.highlandnews.net
Attorney General Kamala D. Harris Releases Data Breach Report - Highland Community News: Breaking News
www.globes.co.il
www.globes.co.il
Globes English - Export Institute to support cyber security sales
www.scmagazine.com
www.scmagazine.com
Unencrypted discs missing, Arizona State Retirement System notifies 44,000 - SC Magazine
www.sans.org
www.sans.org
Pen Test Hackfest (Washington, DC)
www.continuityforum.org
www.continuityforum.org
Government steps up resources for SME's on Cyber and Information Security risk | Continuity Forum
www.trendmicro.com
www.trendmicro.com
The New Security Features of iOS 8 and Android Lollipop - Security News - Trend Micro USA
business-technology.co.uk
business-technology.co.uk
Skills shortage tears holes in government security - Business Technology
www.ftc.gov
www.ftc.gov
FTC Says AT&T Has Misled Millions of Consumers with ‘Unlimited’ Data Promises | Federal Trade Commission
www.sfgate.com
www.sfgate.com
Calif. AG: 18.5 million residents' info exposed - SFGate
mashable.com
mashable.com
Hackers can use the Samsung Find My Mobile feature to attack phones
www.scmagazineuk.com
www.scmagazineuk.com
NATO and UK defence groups hit by Russian cyber-attack - SC Magazine UK
www.tennessean.com
www.tennessean.com
Cloud, mobile technologies boost bottom line
www.theregister.co.uk
www.theregister.co.uk
Microsoft unwraps new auto data-protection in Office 365 tools • The Register
www.natlawreview.com
www.natlawreview.com
FCC Issues First Data Security Fine - Federal Communications Commission | The National Law Review
www.scmagazineuk.com
www.scmagazineuk.com
FBI raids house of 'second Snowden' - SC Magazine UK
www.rgj.com
www.rgj.com
Calif. AG: 18.5 million residents’ info hacked
abcnews.go.com
abcnews.go.com
Calif. AG: 18.5 Million Residents' Info Exposed - ABC News
www.themoscowtimes.com
www.themoscowtimes.com
2nd Russian Hacker Group Accused of Targeting NATO | Business | The Moscow Times
www.huffingtonpost.com
www.huffingtonpost.com
Vladimir Putin Employs An Army Of Skilled Hackers, Report Finds
www.securitytube.net
www.securitytube.net
Louisville Infosec 2014 - Origin Of Cybersecurity Laws - An Insider's Story
twitter.com
twitter.com
Marcel Holsheimer sur Twitter : "Securing the Internet of Things. Renee James at #FOCUS14 #intelsecurity http://t.co/mabLSifLsv"
www.infosecisland.com
www.infosecisland.com
Healthcare Data Today: In Motion or Out of Control?
www.itproportal.com
www.itproportal.com
Verizon: CIOs control over half of enterprise cloud spending | ITProPortal.com
www.prnewswire.com
www.prnewswire.com
New Managed Security Information and Event Management Service from Sungard AS Helps... -- LAS VEGAS, Oct. 28, 2014 /PRNewswire/ --
www.jdsupra.com
www.jdsupra.com
An Update on DOT’s Passenger Protection Rulemaking #3, NextGen, Ebola, Drones, Enforcement Actions, Security Fees and Other Aviation Regulatory Matters | Cozen O'Connor - JDSupra
www.techworld.com.au
www.techworld.com.au
Security vendor coalition cleans 43,000 malware infections used for cyberespionage - Techworld
www.natlawreview.com
www.natlawreview.com
FCC Expands Application of Customer Privacy Provisions with $10 Million Fine Against Carriers | The National Law Review
www.wsbtv.com
www.wsbtv.com
Calif. AG: 18.5 million residents' info hacked | www.wsbtv.com
www.zdnet.com
www.zdnet.com
Cloud computing: CIOs are taking back control, but it is already too late? | ZDNet
www.asicentral.com
www.asicentral.com
ASI - DMA Releases Data Breach Guide
windowsitpro.com
windowsitpro.com
Data Loss Prevention Expanded to Office 365 | Office 365 content from Windows IT Pro
www.cmswire.com
www.cmswire.com
IBM Security App Focuses on Multi-Dimensional Analysis
login.live.com
login.live.com
Sign In
www.baltimoresun.com
www.baltimoresun.com
Cyber club prepares high school students for future careers - Baltimore Sun
twitter.com
twitter.com
Symantec sur Twitter : "Microsoft Office 365 Gets Unlimited Cloud Storage http://t.co/odhDeIccYv"
www.net-security.org
www.net-security.org
Belgacom shares more details about alleged GCHQ breach
nakedsecurity.sophos.com
nakedsecurity.sophos.com
‘Al-Quida Free Terror Nettwork’ Wi-Fi hotspot grounds plane | Naked Security
www.csoonline.com
www.csoonline.com
Shellshock attacks against MTAs could leave SMBs exposed | CSO Online
techcrunch.com
techcrunch.com
DigitalOcean Partners With Mesosphere To Allow Developers To Focus On Apps, Not Servers | TechCrunch
thehill.com
thehill.com
Experts: Russian hackers targeting military secrets | TheHill
www.express.co.uk
www.express.co.uk
Microsoft warn Windows Office software bug allows hackers to take over your computer | Tech | Life & Style | Daily Express
www.telecompaper.com
www.telecompaper.com
Microsoft unveils new products TechEd Europe - Telecompaper
www.marketwatch.com
www.marketwatch.com
Introducing The Check Point Capsule: Groundbreaking Mobile Security That Goes Where You Go - MarketWatch
seclists.org
seclists.org
Bugtraq: [ MDVSA-2014:210 ] mariadb
seclists.org
seclists.org
Bugtraq: phpfusion (Search Page) Denial of Service Vulnerability
www.infosecisland.com
www.infosecisland.com
On MSSP SLAs
spectrum.ieee.org
spectrum.ieee.org
Feds Probe Cybersecurity Dangers in Medical Devices - IEEE Spectrum
www.business-standard.com
www.business-standard.com
Private-sector spying foils China-linked hacking | Business Standard News
www.dbta.com
www.dbta.com
Solutionary Releases Security Platform Leveraging Hadoop - Database Trends and Applications
indiatoday.intoday.in
indiatoday.intoday.in
Microsoft offers unlimited OneDrive storage to Office 365 users : News, News - India Today
www.myce.com
www.myce.com
Windows 7 no longer sold to consumers – all about Windows 8.1 now | Myce.com
www.nj.com
www.nj.com
Cape May-Lewes Ferry financial data breach affects bank card data | NJ.com
www.businessreviewusa.com
www.businessreviewusa.com
Concerned About Big Data Breaches? Technology Can Help | Technology | Business Review USA
www.cio.com
www.cio.com
In BYOD We Trust | CIO
www.cnbc.com
www.cnbc.com
Russian hackers target Nato, military secrets
www.forbes.com
www.forbes.com
What To Do When Your Big Data Isn't Big Enough - Forbes
business.asiaone.com
business.asiaone.com
Credit-card hacking is Americans' top crime worry: poll, News, News, AsiaOne Business News
www.computerworld.com
www.computerworld.com
Russia fingered in long-running spying campaign | Computerworld
blogs.cisco.com
blogs.cisco.com
File Security With the Click of a Button
twitter.com
twitter.com
McAfee Inc. sur Twitter : "Use the automation, Luke. Did you know that you can patch Java, Mozilla, Adobe Flash & Reader, all w/ ePO? #FOCUS14 http://t.co/uVMnEufKKb"
www.m2mnow.biz
www.m2mnow.biz
'Cyber Security Awareness month' comes to a close, but don't let your M2M guard down - M2M Now - News and expert opinions on the M2M industry, machine to machine magazine
forums.juniper.net
forums.juniper.net
The Tech Conundrum: White Hat vs. Black Hat - J-Net Community
www.rsaconference.com
www.rsaconference.com
Around the Web: Backoff, Online Payments, Security – Blog Post – RSA Conference
iq.intel.com
iq.intel.com
Jimmy Kimmel Is the Most Dangerous Cyber Celebrity of 2014 - iQ by Intel
www.computing.co.uk
www.computing.co.uk
US banks biggest target for phishing scams, reveals RSA - 29 Sep 2014 - Computing News
mashable.com
mashable.com
Researchers reveal new Chinese hacking group
www.itpro.co.uk
www.itpro.co.uk
Office 365 to get MDM capabilities baked in | IT PRO
www.computerworld.com
www.computerworld.com
Next Office for Mac leaks, shots of UI appear | Computerworld
seclists.org
seclists.org
Bugtraq: [security bulletin] HPSBHF03156 rev.1 - HP TippingPoint Intrusion Prevention System (IPS) Local Security Manager (LSM) running SSL, Remote Disclosure of Information
seclists.org
seclists.org
Bugtraq: [security bulletin] HPSBST03160 rev.1 - HP XP Command View Advanced Edition running Apache Struts, Remote Execution of Arbitrary Code
twitter.com
twitter.com
McAfee Inc. sur Twitter : "Monitor exploitable processes—tips & lessons learned for managing your ePO environment—tech deep dives #fFOCUS14 http://t.co/wNHigJ1VZX"
seekingalpha.com
seekingalpha.com
Flextronics' INS Division: Cheapest Way To Buy Into Cyber Security - Flextronics International Ltd. (NASDAQ:FLEX) | Seeking Alpha
www.newsworks.org
www.newsworks.org
NewsWorks: News and conversation for Philadelphia, Pennsylvania, New Jersey and Delaware
packetstormsecurity.com
packetstormsecurity.com
Defense And Military Cyber Attacks Traced Back To Russia ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Shellshock Over SMTP Attacks Mean You Can Now Ignore Your Email ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Camera Jacket Turns You Into A Walking Surveillance Station ≈ Packet Storm
blogs.microsoft.com
blogs.microsoft.com
Why businesses should care about cybersecurity this October | Cyber Trust Blog
www.techzim.co.zw
www.techzim.co.zw
How to deal with neighbourhood hackers: tips for securing your Wi-Fi - Techzim
www.marketwired.com
www.marketwired.com
Introducing The Check Point Capsule: Groundbreaking Mobile Security That Goes Where You Go
www.gmanetwork.com
www.gmanetwork.com
Hacking for a cause: Cybersecurity for the govt procurement system | SciTech | GMA News Online
www.marketwired.com
www.marketwired.com
Check Point's Third Annual Mobile Security Survey Highlights Careless Employees as Greatest Mobile Security Threat
www.crn.com
www.crn.com
Solution Providers Get Stealthy On Shadow IT - Page: 1 | CRN
www.marketwatch.com
www.marketwatch.com
Earnings Releases, Court Rulings, and Preliminary Quarterly Results - Research Reports on TSMC, Seagate, 3DS, Xerox and Check Point - MarketWatch
www.theregister.co.uk
www.theregister.co.uk
HDS flings cloud-in-a-box at EMC Vblock, NetApp FlexPod • The Register
sdtimes.com
sdtimes.com
Sencha Space 1.2 unifies enterprise application deployment and management - SD Times
twitter.com
twitter.com
McAfee Inc. sur Twitter : "Very informative deep dive into maximizing your SIEM. #FOCUS14 http://t.co/g9vhutTM97"
www.avangate.com
www.avangate.com
Customer support related to the order, payment or software delivery | Avangate
www.theregister.co.uk
www.theregister.co.uk
Feds seek potential 'second Snowden' gov doc leaker – report • The Register
seclists.org
seclists.org
Bugtraq: Apple iOS v8.0.2 - Silent Contact Denial of Service Vulnerability
seclists.org
seclists.org
Bugtraq: Folder Plus v2.5.1 iOS - Persistent Item Vulnerability
www.econtentmag.com
www.econtentmag.com
DMA Releases Data Breach Survival Guide, Gives Marketers Essentials - EContent Magazine
www.emergencymgmt.com
www.emergencymgmt.com
Merging Missions: Business Continuity and Emergency Management
joker.org
joker.org
Joker.org | .torrent -> streamable video
www.i-programmer.info
www.i-programmer.info
New Docker Engine
www.information-age.com
www.information-age.com
Cloud does NOT equal data centre: Gartner dispels the top 10 myths of cloud computing | Information Age
mspmentor.net
mspmentor.net
IT Security Stories to Watch: Did Hackers Attack, Infiltrate Staples? | Managed Security Services content from MSPmentor
www.zdnet.com
www.zdnet.com
Docker CTO: Why Microsoft's Docker plans for Windows will matter to you | ZDNet
www.net-security.org
www.net-security.org
Crooks use stolen magnetic payment card info to make fraudulent chip-enabled transactions
www.securitytube.net
www.securitytube.net
Louisville Infosec 2014 - Linking Users To Social Media Usage On Android Mobile Devices
www.zdnet.com
www.zdnet.com
Look for Windows 7 Mainstream Support to be extended | ZDNet
www.scmagazine.com
www.scmagazine.com
EFF files brief in response to Jewel v. NSA opposition - SC Magazine
now.avg.com
now.avg.com
MEF Appoints Judith Bitterli to Global Board of Directors
lj.libraryjournal.com
lj.libraryjournal.com
Reservation Management | Product Spotlight
www.cnet.com
www.cnet.com
My three favorite Windows laptop alternatives - CNE
www.politico.com
www.politico.com
ONC policy group examines Big Data questions — FTC’s Ramirez applauds HealthKit policies — FCC Commissioner has universal service fund in his sight - POLITICO Morning eHealth - POLITICO.com
www.virtual-strategy.com
www.virtual-strategy.com
Gigamon Announces New Solutions for SSL Visibility and Enhancements for Multi-Tiered Security | Virtual-Strategy Magazine
www.csmonitor.com
www.csmonitor.com
Who wins Senate in Election 2014? 3 reasons it could be mystery for weeks. - Failure to win a majority - CSMonitor.com
seclists.org
seclists.org
Bugtraq: [security bulletin] HPSBMU03152 rev.1 - HP Operations Orchestration running SSL, Remote Disclosure of Information
seclists.org
seclists.org
Bugtraq: [security bulletin] HPSBST03157 rev.1 - HP StoreEver ESL E-series Tape Library and HP Virtual Library System (VLS) running Bash Shell, Remote Code Execution
www.militaryaerospace.com
www.militaryaerospace.com
BAE Systems boosts expertise in cyber warfare and cyber security with acquisition of SilverSky
www.geek.com
www.geek.com
Dexmo is an exoskeleton glove that lets you feel virtual objects | News | Geek.com
www.iclarified.com
www.iclarified.com
iClarified - Apple News - OS X Yosemite is Now Available to Download!
www.bizjournals.com
www.bizjournals.com
California Supreme Court declines to review Sutter data-breach case - Sacramento Business Journal
www.bidnessetc.com
www.bidnessetc.com
Apple Inc. (NASDAQ:AAPL) News Analysis: How to Secure Your Apple iOS 8 Device
emcinformation.com
emcinformation.com
EMC Corporation
blogs.cisco.com
blogs.cisco.com
Cisco 2014 Annual Security Report: Cybercriminals Applying “Old” Techniques in New Ways
gadgets.ndtv.com
gadgets.ndtv.com
Microsoft Announces Unlimited OneDrive Storage for Office 365 Subscribers | NDTV Gadgets
www.moneycontrol.com
www.moneycontrol.com
'Cloud aids mobility of human experience across devices' - Moneycontrol.com
www.informationweek.com
www.informationweek.com
Chipmaker Disables Counterfeits With Software Update - InformationWeek
www.realwire.com
www.realwire.com
Watchful Software Announces Industry’s First Mac OS X Support for Microsoft RMS Classification and Data Protection
www.techradar.com
www.techradar.com
Microsoft unveils new Azure tools, opens up Office 365 with new APIs | News | TechRadar
www.theregister.co.uk
www.theregister.co.uk
EvilToss and Sourface hacker crew 'likely' backed by Kremlin – FireEye • The Register
money.cnn.com
money.cnn.com
Gigamon Announces New Solutions for SSL Visibility and Enhancements for Multi-Tiered Security
www.computing.co.uk
www.computing.co.uk
Microsoft reveals ramped-up security offerings for Windows 10 and Office 365 across multiple devices - 28 Oct 2014 - Computing News
www.cbronline.com
www.cbronline.com
Why CIOs 'should lead data breach responses' - Computer Business Review
www.breitbart.com
www.breitbart.com
Sharyl Attkisson's Computer was Bugged Using Government Software (Update)
www.cso.com.au
www.cso.com.au
Allied Telesis Selects Emerging Threats’ ETPro® and IQRisk® Products for New Range of Next-Generation Firewalls - Media Releases - CSO | The Resource for Data Security Executives
recombu.com
recombu.com
Samsung phones can be remotely hacked, warns NIST - Recombu
www.masslive.com
www.masslive.com
New Bedford man gets 4-year federal prison sentence for hacking into police computer servers, including chief's email account | masslive.com
indianexpress.com
indianexpress.com
What the world is reading: What were you thinking, Mr Nadella? | The Indian Express
www.realwire.com
www.realwire.com
ArmstrongAdams wins Imperva partner award
www.scmagazine.com
www.scmagazine.com
Targeted attacks on rise, costly, survey says - SC Magazine
www.igadgetware.com
www.igadgetware.com
Latest Gadgets | Mobiles | Tablets | Android apps | Social Media | Tech News: EBOLA Virus Is Affecting Fast Around 5000 People Died
www.zdnet.com
www.zdnet.com
Mobile app permissions: Who does it right? | ZDNet
www.androidheadlines.com
www.androidheadlines.com
Security Researcher Suggests Samsung's KNOX and Android 5.0 Lollipop Aren't All That Secure | Androidheadlines.com
it-online.co.za
it-online.co.za
Microsoft adds new cloud, mobility solutions - IT-Online | IT-Online
www.marketwired.com
www.marketwired.com
Watchful Software Announces Industry's First Mac OS X Support for Microsoft RMS Classification and Data Protection
www.net-security.org
www.net-security.org
246 percent spike in Apple-themed phishing scams
www.virtual-strategy.com
www.virtual-strategy.com
Sencha Space 1.2 Unifies Enterprise Application Deployment and Management | Virtual-Strategy Magazine
www.sunherald.com
www.sunherald.com
Community news from Biloxi and Gulfport, MS | Sun Herald
www.virtual-strategy.com
www.virtual-strategy.com
Thinspace CEO Advises Chinese Government IT Solutions Supplier of Desktop Virtualization Security Technologies | Virtual-Strategy Magazine
www.forbes.com
www.forbes.com
Sencha Rolls Out The Latest Flavor Of Its Cross-Platform Mobile Toolkit - Forbes
www.zacks.com
www.zacks.com
Fortinet Misses on Q3 Earnings, Revenues Beat, Shares Up - October 28, 2014 - Zacks.com
www.zdnet.com
www.zdnet.com
Military secrets theft hacking trail leads to Russia | ZDNet
delmarvapublicradio.net
delmarvapublicradio.net
Cape May-Lewes Ferry Data Breach | Delmarva Public Radio
www.techweekeurope.co.uk
www.techweekeurope.co.uk
Microsoft Office 365 Gets Unlimited Storage, MDM And APIs
www.techweekeurope.co.uk
www.techweekeurope.co.uk
Microsoft Azure Gains Big Data And Automation Tools
www.zdnet.com
www.zdnet.com
Cloud will never be fully secure, get over it | ZDNet
blogs.mcafee.com
blogs.mcafee.com
5 Ways to Curb Your Child's Chronic Texting | McAfee
www.net-security.org
www.net-security.org
Top 10 cloud myths
www.csoonline.com
www.csoonline.com
Clues point to Russia in long-running spying campaign | CSO Online
www.csoonline.com
www.csoonline.com
'ScanBox' keylogger targets Uyghurs, US think tank, hospitality industry | CSO Online
h14s.p5r.org
h14s.p5r.org
0x5f3759df | Hummus and Magnets
www.pinknews.co.uk
www.pinknews.co.uk
NHS Scotland accidentally leaks list of transgender patients · PinkNews.co.uk
www.itworld.com
www.itworld.com
For big raises in IT, look to mobile, security, big data | ITworld
www.thenewstribune.com
www.thenewstribune.com
Local News | The News Tribune
www.cmo.com.au
www.cmo.com.au
Media Release: Allied Telesis Selects Emerging Threats’ ETPro® and IQRisk® Products for New Range of Next-Generation Firewalls
money.cnn.com
money.cnn.com
Thinspace CEO Advises Chinese Government IT Solutions Supplier of Desktop Virtualization Security Technologies
www.slashgear.com
www.slashgear.com
Samsung Find My Mobile reported to be vulnerable to attack - SlashGear
blogs.wsj.com
blogs.wsj.com
Capital Journal Daybreak: Rare Sight in New England for GOP | Hacking Trail Leads to Russia | The Policy-Free Campaign of 2014 - Washington Wire - WSJ
www.prnewswire.com
www.prnewswire.com
Alert Logic Security Solutions Now Microsoft Azure Certified -- BARCELONA, Spain, Oct. 28, 2014 /PRNewswire/ --
www.shinyshiny.tv
www.shinyshiny.tv
An exploit in Samsung's 'Find My Mobile' service could remotely wipe your phone - Shiny Shiny
www.huffingtonpost.com
www.huffingtonpost.com
Americans Fear Hacking More Than Any Other Crime, Poll Finds
www.infosecurity-magazine.com
www.infosecurity-magazine.com
Hackers Used Online Video Site to Smuggle Data Out of Firm - Infosecurity Magazine
www.securitytube.net
www.securitytube.net
Louisville Infosec 2014 - Trash Talkin - It Audit Guide To Dumpster Diving
seclists.org
seclists.org
WebApp Sec: Re: Shameless plug: OWASP Board Elections
www.capitalfm.com
www.capitalfm.com
Drake Reveals Three Previously Unheard New Songs To Stop Hackers Leaking Them - Capital FM
www.csoonline.com
www.csoonline.com
The evolution of the CISO role and organizational readiness | CSO Online
www.virtual-strategy.com
www.virtual-strategy.com
NSS Labs Tests Show Next Generation Firewall Security Effectiveness Remains Strong | Virtual-Strategy Magazine
www.businesswire.com
www.businesswire.com
F5 Positioned as a Leader in the Magic Quadrant for Application Delivery Controllers for Eighth Consecutive Year | Business Wire
www.batesvilleheraldtribune.com
www.batesvilleheraldtribune.com
How to handle a data breach - The Herald-Tribune: Business
www.computerworld.com
www.computerworld.com
Microsoft opens Office 365 to programmers | Computerworld
www.prnewswire.co.uk
www.prnewswire.co.uk
Alert Logic Security Solutions Now Microsoft Azure Certified -- BARCELONA, Spain, Oct. 28, 2014 /PR Newswire UK/ --
nakedsecurity.sophos.com
nakedsecurity.sophos.com
Is Google Maps accurate? Ask the giant cat… | Naked Security
www.cio.com
www.cio.com
An Easy Way to Dramatically Improve iPhone (or Any Phone) Security | CIO
www.bbc.com
www.bbc.com
BBC News - Online harassment affects 40% of US adults, report says
www.nu.edu
www.nu.edu
Nationally-Recognized Cyber Security Program Adds Focus in Computer Forensics | National University
www.rsaconference.com
www.rsaconference.com
Navigating the Internet of Things – Video – RSA Conference
www.psmag.com
www.psmag.com
We Are All Confident Idiots - Pacific Standard: The Science of Society
www.infosecurity-magazine.com
www.infosecurity-magazine.com
Windows 10 Looks to Eliminate Passwords - Infosecurity Magazine
en.ria.ru
en.ria.ru
Russia May Have Hacked US Firm Keeping Classified Military Data: Cybersecurity Company | Military & Intelligence | RIA Novosti
www.cadillacnews.com
www.cadillacnews.com
CadillacNews.com
www.forbes.com
www.forbes.com
More Microsoft News From TechEd Europe--Azure, Mobile And Ecosystem - Forbes
www.delawareonline.com
www.delawareonline.com
Cape May-Lewes Ferry card data breached
streetfightmag.com
streetfightmag.com
Mobile Payments Still Facing the Same Big Obstacles | Street Fight
www.usatoday.com
www.usatoday.com
Election countdown: Runoff in Louisiana? Dems hope not
thefootballexaminer.com
thefootballexaminer.com
Mac OS X unsecured documents are by default stored in the iCloud
www.marketwired.com
www.marketwired.com
SC Magazine Awards PFU iNetSec Smart Finder 5-Star Rating for Features, Ease of Use, Performance, Support and Value
www.net-security.org
www.net-security.org
Cyber security coalition reports on Chinese state-sponsored espionage
www.businesswire.com
www.businesswire.com
Coalfire Updates Navis Rapid PA-DSS to PCI 3.0 Standards | Business Wire
www.pcpro.co.uk
www.pcpro.co.uk
Samsung denies KNOX security flaw claims | News | PC Pro
onerng.info
onerng.info
OneRNG - Hardware Random Number Generator
www.localnews8.com
www.localnews8.com
CNN poll: Voters are angry | Politics - Home
www.bbc.com
www.bbc.com
BBC News - US 'probes hackable flaws' in medical devices
www.net-security.org
www.net-security.org
IBM's Big Data analytics solution to uncover criminal cyber activity in seconds
www.2600.com
www.2600.com
DIGITAL SUBSCRIPTIONS NOW AVAILABLE THROUGHOUT EUROPE | 2600
www.digitaljournal.com
www.digitaljournal.com
Microsoft delivers wave of innovation at TechEd Europe - Press Release - Digital Journal
www.infosecurity-magazine.com
www.infosecurity-magazine.com
Can Security and Privacy Happily Co-Exist in the Enterprise? - Infosecurity Magazine
www.healthitoutcomes.com
www.healthitoutcomes.com
Gartner Identifies Tech Trends
timesofindia.indiatimes.com
timesofindia.indiatimes.com
BSF on high alert as Nilofer approaches border districts in Rajasthan - The Times of India
it-online.co.za
it-online.co.za
Business continuity planning essential - IT-Online | IT-Online
www.rsaconference.com
www.rsaconference.com
Neuro-Hacking 101: Taming Your Inner Curmudgeon – Podcast – RSA Conference
www.pcpro.co.uk
www.pcpro.co.uk
Apple releases iOS 8.1 with Apple Pay | News | PC Pro
www.turkishweekly.net
www.turkishweekly.net
Britain declares cyber war on ISIS to stop home-grown jihadism, 28 October 2014
www.numerama.com
www.numerama.com
Un lanceur d'alerte post-Snowden identifié par le FBI
www.ibtimes.co.uk
www.ibtimes.co.uk
Queen Elizabeth Abused By Twitter Trolls After Sending Her First Tweet
www.theregister.co.uk
www.theregister.co.uk
Intel bods to detail RSA birko crypto man-in-the-middle diddle • The Register
www.securitytube.net
www.securitytube.net
27c3 - Sip Home Gateways Under Fire
www.newsfactor.com
www.newsfactor.com
Cloud, Hardware Drive Record Microsoft Revenue | NewsFactor Network
www.ausgamers.com
www.ausgamers.com
Microsoft's Azure Data Centres Now Live in Australia - AusGamers.com
www.datacenterknowledge.com
www.datacenterknowledge.com
Telstra, Equinix to Link to Azure Data Centers in Australia
www.arnnet.com.au
www.arnnet.com.au
Microsoft launches Australian Azure offering (+13 photos) - ARN
www.delhidailynews.com
www.delhidailynews.com
Microsoft Azure Australia begins operating
ceskapozice.lidovky.cz
ceskapozice.lidovky.cz
Plošné digitální sledování ohrožuje demokracii - ceskapozice.lidovky.cz
www.businesscloudnews.com
www.businesscloudnews.com
Microsoft Azure goes live in Australia | Business Cloud News
www.pcworld.com
www.pcworld.com
Microsoft opens up Office 365 APIs to other platforms, including Android | PCWorld
www.reseller.co.nz
www.reseller.co.nz
Why NZ firms can benefit from Microsoft's new Aussie datacentres - Reseller News
www.cio.com.au
www.cio.com.au
Microsoft unveils Azure Australia cloud services - CIO
www.theage.com.au
www.theage.com.au
Microsoft Azure cloud launches in Australia
www.cloudwedge.com
www.cloudwedge.com
Microsoft Azure in Australia Goes Live Today | CloudWedge
appleinsider.com
appleinsider.com
Microsoft unveils Office 365 SDK and APIs for iOS app extensibility
sdtimes.com
sdtimes.com
Microsoft offers new APIs for Office 365 - SD Times
www.afr.com
www.afr.com
Sky high expectations as Microsoft launches Australian Azure cloud service
www.brw.com.au
www.brw.com.au
Microsoft Azure to contest supremacy in local cloud market
www.scmagazineuk.com
www.scmagazineuk.com
Rogue Tor exit node injects malware into downloaded binaries - SC Magazine UK
www.huffingtonpost.com
www.huffingtonpost.com
Why Social Media Guidance Is Important | Jeannie Borin
www.bbc.co.uk
www.bbc.co.uk
BBC News - Met Office to build £97m supercomputer
www.smartcompany.com.au
www.smartcompany.com.au
SmartCompany - Microsoft launches Azure cloud platform data centres in Australia
venturebeat.com
venturebeat.com
Microsoft unleashes big-data tools for Azure and Office 365 security features | VentureBeat | Cloud | by Jordan Novet
redmondmag.com
redmondmag.com
Containers: Beyond Virtualization -- Redmondmag.com
www.scoop.co.nz
www.scoop.co.nz
New Microsoft data centres in Australia to offer NZ benefits | Scoop News
money.cnn.com
money.cnn.com
Microsoft delivers wave of innovation at TechEd Europe
www.eni.network24.co
www.eni.network24.co
Taylor Swift warns friends against hackers
www.virtual-strategy.com
www.virtual-strategy.com
Xfernet To Showcase Affordable Business Continuity Solutions At The Los Angeles Small Business Expo | Virtual-Strategy Magazine
www.pizzamarketplace.com
www.pizzamarketplace.com
HMSHost deploys WatchGuard firewall system | Pizza Marketplace
www.bloomberg.com
www.bloomberg.com
China-Linked Hacking Foiled by Private-Sector Sleuthing - Bloomberg
www.informationweek.in
www.informationweek.in
How cryptography can help banks guard against data breaches - InformationWeek – IT news & articles
www.theregister.co.uk
www.theregister.co.uk
Knock Knock tool makes a joke of Mac AV • The Register
www.mobilepaymentstoday.com
www.mobilepaymentstoday.com
Security companies form pact for mobile authentication | Mobile Payments Today
www.independent.co.uk
www.independent.co.uk
Baroness Kidron interview: ‘Children’s online safety is too vital to leave to Government’ - Profiles - People - The Independent
www.prnewswire.com
www.prnewswire.com
Cyber Security Coalition Releases Full Report on Large-Scale Interdiction of Chinese State Sponsored... -- WASHINGTON, Oct. 28, 2014 /PRNewswire/ --
www.pcworld.com
www.pcworld.com
Clues point to Russia in long-running spying campaign | PCWorld
healthitsecurity.com
healthitsecurity.com
Potential Health Data Breach, Medical Records Fly off Truck | HealthITSecurity.com
www.washingtonpost.com
www.washingtonpost.com
Researchers identify sophisticated Chinese cyberespionage group - The Washington Post
www.fastcasual.com
www.fastcasual.com
HMSHost deploys WatchGuard firewall system | Fast Casual
abcnews.go.com
abcnews.go.com
Where Things Stand With The Senate: ABC News Election 2014 Race Ratings - ABC News
www.dailymail.co.uk
www.dailymail.co.uk
SnoopWall's privacy flashlight app protects your information | Daily Mail Online
blog.trendmicro.com
blog.trendmicro.com
Think Before you “Share” to Prevent Identity Theft -
blog.trendmicro.com
blog.trendmicro.com
Keep Your Business’s Data Safe in the Cloud -
blog.trendmicro.com
blog.trendmicro.com
Cloud Security: Shared Responsibility in Action -
www.infosecurity-magazine.com
www.infosecurity-magazine.com
EWF USA 2014: Best Practice and Playbooks for Incident Response - Infosecurity Magazine
sobesednik.ru
sobesednik.ru
Второй Сноуден в США: ФБР поведало о содержании документов, которые мужчина передавал СМИ | Собеседник.ру
www.extremetech.com
www.extremetech.com
Windows 10 will come with a command line package manager, much to the lament of Linux users | ExtremeTech
www.eweek.com
www.eweek.com
Microsoft Scrambles to Fix Zero-Day Flaw in OLE
www.wcti12.com
www.wcti12.com
Cevallos: Why Ebola quarantine is legal | National News - WCTI NewsChannel 12
www.net-security.org
www.net-security.org
Automation is the key to successful policy implementation
www.net-security.org
www.net-security.org
Whitepaper: 10 network security tools you should use
www.securitytube.net
www.securitytube.net
27c3 - Safety On The Open Sea
ktar.com
ktar.com
Most Americans are afraid of credit card hacking
articles.economictimes.indiatimes.com
articles.economictimes.indiatimes.com
Government aims to make $15 billion Internet of Things industry in India by 2020 - Economic Times
www.kansascity.com
www.kansascity.com
Democratic attack ads aim to save Senate majority | The Kansas City Star
www.bbc.com
www.bbc.com
BBC News - Exposing the hidden history of computer hacking
blogs.technet.com
blogs.technet.com
Novetta leads first coordinated malware eradication campaign - Microsoft Malware Protection Center - Site Home - TechNet Blogs
www.isightpartners.com
www.isightpartners.com
Operation SMN - Disruption of Axiom Group - Prolific Chinese Cyber Espionage Team - iSIGHT Partners
www.glamour.com
www.glamour.com
How to Keep Passion in a Relationship: Glamour.com
www.thv11.com
www.thv11.com
ASU-Beebe reports potential data breach
www.reuters.com
www.reuters.com
Fight for U.S. Senate control may not end on Election Day| Reuters
www.winknews.com
www.winknews.com
Hackers target Fort Myers family business, and daughter - WINK-TV News
www.thestar.com.my
www.thestar.com.my
Credit-card hacking is Americans' top crime worry: poll - Business News | The Star Online
www.businessweek.com
www.businessweek.com
China-Linked Hacking Foiled by Private-Sector Sleuthing - Businessweek
www.digitaljournal.com
www.digitaljournal.com
NJIT Offers Certified Information Systems Security Professional (CISSP) Exam Preparation Boot Camp - Press Release - Digital Journal
www.bostonglobe.com
www.bostonglobe.com
New Bedford computer hacker sentenced to 4 years in federal prison - Metro - The Boston Globe
www.tripwire.com
www.tripwire.com
8-Year-Old CEO Reuben Paul Proves that Kids Are the Future of Cybersecurity - The State of Security
www.tripwire.com
www.tripwire.com
Enabling Adaptive Threat Protection - The State of Security
www.alienvault.com
www.alienvault.com
The Bash Vulnerability: Practical Tips to Secure your Environment | AlienVault
www.computing.co.uk
www.computing.co.uk
Russia and China to sign cyber-security treaty in November - 26 Oct 2014 - Computing News
www.azcentral.com
www.azcentral.com
Potential data breach at ASRS; 44,000 retirees affected
blogs.wsj.com
blogs.wsj.com
Banks Ramp Up Cybersecurity Requirements For Outside Lawyers - Law Blog - WSJ
www.rsaconference.com
www.rsaconference.com
PCI: Retailer Security Failures – Video – RSA Conference
toastytech.com
toastytech.com
SALTO - The Xerox Alto Simulator
www.theinquirer.net
www.theinquirer.net
Hackers take advantage of Bash Shellshock bug as developers rush to patch- The Inquirer
www.wptz.com
www.wptz.com
Cevallos: Why Ebola quarantine is legal | National News - WPTZ Home
thenextdigit.com
thenextdigit.com
FCC imposes $10 million fine on TerraCom and YourTel America
www.j-14.com
www.j-14.com
Get the Deets on Ansel Elgort's Scary Hacking Incident | J-14
www.eweek.com
www.eweek.com
FCC Slaps Telecos With $10M Fine for Data Breaches
mashable.com
mashable.com
Shellshock: The 'Bash Bug' That Could Be Worse Than Heartbleed
www.digitaltrends.com
www.digitaltrends.com
FCC Hands Out $10 Million Fine For Comsumer Privacy Breach | Digital Trends
www.slate.com
www.slate.com
Republican candidates won’t win a mandate: The midterm elections will only prove President Obama is unpopular.
newsbusters.org
newsbusters.org
Ex-CBS Reporter: A 'Three-Letter Government Agency' Hacked Into My Computer And Spied On Me
gcn.com
gcn.com
NIST lays out roadmap for cloud computing -- GCN
twitter.com
twitter.com
McAfee Inc. sur Twitter : "A lot of great conversation happening out our #FOCUS14 Expo Hall demo stations. http://t.co/foVDfJzQCq"
timesofindia.indiatimes.com
timesofindia.indiatimes.com
Channel ban: PCI panel indicts Telangana govt - The Times of India
www.cio-today.com
www.cio-today.com
SUSE Linux Enterprise 12 Is Released - Operating Systems on CIO Today
www.pcmag.com
www.pcmag.com
Trying to Avoid Backoff Malware? Good Luck | News & Opinion | PCMag.com
thehackernews.com
thehackernews.com
Samsung 'Find My Mobile' Flaw Allows Hacker to Remotely Lock Your Device
www.securitytube.net
www.securitytube.net
27c3 - Your Infrastructure Will Kill You
nation.com.pk
nation.com.pk
Hidden history of computer hacking
www.nbcnews.com
www.nbcnews.com
Sen. Rob Portman: Changing Majority Will Get Things Done - NBC News
www.rferl.org
www.rferl.org
Ukraine Unspun: Chechnya War Pic Passed Off As Ukraine Atrocity By Hackers, Russian TV
timesofindia.indiatimes.com
timesofindia.indiatimes.com
Internet-based phone hacking targets US SMBs - The Times of India
abcnews.go.com
abcnews.go.com
Taylor Swift on '1989,' Fans and Her New Year's Eve Plans - ABC News
techday.com
techday.com
Techday – Making the complex simple
www.computerworld.com
www.computerworld.com
Here’s why Rite Aid and CVS turned off Apple Pay | Computerworld
www.itwire.com
www.itwire.com
iTWire - How to create a secure, easy-to-manage private cloud
www.macworld.com
www.macworld.com
Continuity and Spotlight highlight the need to closely examine where our data goes | Macworld
www.itworld.com
www.itworld.com
Vulnerability in widely used 'strings' utility could spell trouble for malware analysts | ITworld
www.computerworld.com
www.computerworld.com
Tor Project flags Russian 'exit node' server for delivering malware | Computerworld
www.waaytv.com
www.waaytv.com
Alabama doesn't require data breach notification - Huntsville News | WAAYTV.com and ABC 31: Appnews
www.trendmicro.com
www.trendmicro.com
Security Conferences - Security Events - Trend Micro USA - Trend Micro USA
thehackernews.com
thehackernews.com
Verizon Wireless Injects Identifiers to Track Mobile Customers’ Online Activities
robert.ocallahan.org
robert.ocallahan.org
Well, I'm Back: Are We Fast Yet? Yes We Are!
www.itworldcanada.com
www.itworldcanada.com
Biggest challenge for SDN isn’t technology, says Gartner | IT World Canada News
www.business-standard.com
www.business-standard.com
Taylor Swift warns friends against hackers | Business Standard News
time.com
time.com
Taylor Swift is New York City's new welcome ambassador for tourism
www.rushlimbaugh.com
www.rushlimbaugh.com
Sharyl Attkisson's Book on the Obama-Media Axis - The Rush Limbaugh Show
www.dailymail.co.uk
www.dailymail.co.uk
'Government-related agency behind laptop hack,' claims former CBS reporter who felt targeted by Obama administration for reporting on Benghazi | Daily Mail Online
www.irishtimes.com
www.irishtimes.com
China-backed hackers reportedly target Apple’s iCloud users
thehackernews.com
thehackernews.com
Microsoft PowerPoint Vulnerable to Zero-Day Attack
packetstormsecurity.com
packetstormsecurity.com
Windows TrackPopupMenu Win32k NULL Pointer Dereference ≈ Packet Storm
newsroom.cisco.com
newsroom.cisco.com
Data Science Meets the Power of the Crowd | The Network
www.channelnewsasia.com
www.channelnewsasia.com
Credit card hacking is Americans' top crime worry: Poll - Channel NewsAsia
www.cbsnews.com
www.cbsnews.com
Is new "Bash Bug" worse than Heartbleed? - CBS News
www.ubergizmo.com
www.ubergizmo.com
Vulnerability Found In Samsung’s Find My Mobile Feature
www.billboard.com
www.billboard.com
Taylor Swift's '1989' Aiming For 900,000-Plus Sales Debut | Billboard
www.miamiherald.com
www.miamiherald.com
Democratic attack ads aim to save Senate majority | The Miami Herald
www.abc22now.com
www.abc22now.com
Americans Fear Hacking, Most Frequent Crime - WKEF-TV ABC 22 News :: News - Top Stories
packetstormsecurity.com
packetstormsecurity.com
Filemaker Login Bypass / Privilege Escalation ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
vBulletin 4.x Tapatalk Blind SQL Injection ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
libbfd Out Of Bounds ≈ Packet Storm
www.pcworld.com
www.pcworld.com
Vulnerability in widely used 'strings' utility could spell trouble for malware analysts | PCWorld
www.theregister.co.uk
www.theregister.co.uk
AWS scores same Oz gov sec creds as Azure • The Register
www.theregister.co.uk
www.theregister.co.uk
Shellshock over SMTP attacks mean you can now ignore your email • The Register
www.billboard.com
www.billboard.com
Taylor Swift Named New York City Welcome Ambassador | Billboard
www.entertainmentwise.com
www.entertainmentwise.com
Jennifer Lawrence's Ex-Boyfriend Claims Her Steamy Videos Could Be Leaked Next
www.desimartini.com
www.desimartini.com
Taylor Swift warns friends against hackers - Hollywood News - Desimartini.com
www.cio-today.com
www.cio-today.com
SUSE Linux Enterprise 12 Is Released - Disaster Recovery on CIO Today
mcpmag.com
mcpmag.com
Windows 10's ID Management and Security Controls -- Microsoft Certified Professional Magazine Online
blogs.mcafee.com
blogs.mcafee.com
New Exploit of Sandworm Zero-Day Could Bypass Official Patch | McAfee
www.theblaze.com
www.theblaze.com
The ‘Outrageous’ Thing Former CBS Reporter Sharyl Attkisson Says a Source Confirmed That a ‘Government-Related Entity’ Did to Her | TheBlaze.com
www.cbsnews.com
www.cbsnews.com
Louisiana Democratic senator in tight race against GOP challenger - CBS News
www.forbes.com
www.forbes.com
Six Degrees Of Asteroid Data Separation - Forbes
www.forbes.com
www.forbes.com
The Crimes Americans Worry About The Most [Infographic] - Forbes
fox10tv.com
fox10tv.com
Could the city of Mobile have prevented a cyber attack? | FOX10 News | Fox10tv.com
www.infosecurity-magazine.com
www.infosecurity-magazine.com
Canada Mulls Mandatory Data Breach Notifications - Infosecurity Magazine
www.infoworld.com
www.infoworld.com
Deathmatch review: Windows 8.1 vs. OS X Yosemite | InfoWorld
www.einnews.com
www.einnews.com
New CompTIA Security+ course by IT Governance helps progress career in a competitive job market - EIN News
thehill.com
thehill.com
Report: Hackers can lock Samsung phones | TheHill
thenextweb.com
thenextweb.com
Chrome and Firefox Flagging Bit.ly Links as Malware
www.staysafeonline.org
www.staysafeonline.org
Download Details | StaySafeOnline.org
www.ghacks.net
www.ghacks.net
CrypTool: experiment with cryptographic algorithms - gHacks Tech News
techday.com
techday.com
Techday – Making the complex simple #WGImagine14
www.moneynews.com
www.moneynews.com
Our Top Crime Worry? Credit-card Hacking
www.avclub.com
www.avclub.com
Drake releases new songs in response to “hackers” · Newswire · The A.V. Club
campustechnology.com
campustechnology.com
New Data Security Pressures Driving Next Generation Firewalls -- Campus Technology
www.thenewamerican.com
www.thenewamerican.com
Why Should the Law-abiding Care About Electronic Surveillance?
www.miamiherald.com
www.miamiherald.com
Taylor Swift taps 1989 for inspiration; Neil Diamond strolls bountiful ‘Melody Road’ | The Miami Herald
www.virtual-strategy.com
www.virtual-strategy.com
Feedzai and Encap Security Announce Strategic Partnership | Virtual-Strategy Magazine
www.theregister.co.uk
www.theregister.co.uk
Why weasel words might not work for Whisper • The Register
www.securitytube.net
www.securitytube.net
27c3 - Data Retention In The Eu Five Years After The Directive
www.eweek.com
www.eweek.com
IBM Brings New Big Data, Analytics Tools to Cloud Marketplace
fox6now.com
fox6now.com
Set to stand trial: 25-year-old Phoebe Sayavong accused of hacking into her boyfriend’s email account | FOX6Now.com
globalnews.ca
globalnews.ca
Judge like celebrity-hacking victim: lawyer - Winnipeg | Globalnews.ca
zeenews.india.com
zeenews.india.com
Credit-card hacking is Americans` top crime worry: Poll | Zee News
www.infoworld.com
www.infoworld.com
IBM's new data tools are low-maintenance, Watson-powered | InfoWorld
arstechnica.com
arstechnica.com
Fed up, US cities take steps to build better broadband | Ars Technica
www.symantec.com
www.symantec.com
A History of Joint Innovation on Display | Symantec Connect
news.yahoo.com
news.yahoo.com
Feds identify suspected 'second leaker' for Snowden reporters - Yahoo News
abcnews.go.com
abcnews.go.com
What's Behind the 2014 Midterm Election Cycle's Trendiest Attack Line - ABC News
www.inquisitr.com
www.inquisitr.com
Jennifer Lawrence’s Ex Is A Hacker And He Warns That Explicit Videos May Be Leaked Next
www.cbc.ca
www.cbc.ca
Lori Douglas, celeb Jennifer Lawrence both nude photo victims: lawyer - Manitoba - CBC News
abc7chicago.com
abc7chicago.com
CHA: Data breach investigation 'closed' | abc7chicago.com
www.washingtonpost.com
www.washingtonpost.com
Sharyl Attkisson’s computer intrusions: ‘Worse than anything Nixon ever did’ - The Washington Post
www.waaytv.com
www.waaytv.com
Alabama doesn't require businesses to notify customers of data breach - Huntsville News | WAAYTV.com and ABC 31: Appnews
www.consumeraffairs.com
www.consumeraffairs.com
“Replay” lets fraudsters disguise fake credit card charges as legitimate chip-card transactions
www.enewspf.com
www.enewspf.com
Massachusetts Man Sentenced to Four Years in Prison for Computer Hacking Involving Stolen Credit Card Numbers and Altered Academic Records
billingsgazette.com
billingsgazette.com
2nd robot enables BPD bomb squad to respond to more than 1 incident at a time
arstechnica.com
arstechnica.com
Verizon Wireless injects identifiers that link its users to Web requests | Ars Technica
www.powerlineblog.com
www.powerlineblog.com
The Most Stunning News Story of 2014 | Power Line
www.independent.co.uk
www.independent.co.uk
Jennifer Lawrence's former boyfriend alleges he's a hacker - People - News - The Independent
edition.cnn.com
edition.cnn.com
Why Ebola quarantine is legal (Opinion) - CNN.com
metronews.ca
metronews.ca
Judge like celebrity-hacking victim: lawyer | Metro
www.virtual-strategy.com
www.virtual-strategy.com
IBM Brings Broad Portfolio of Big Data and Analytics Capabilities to the IBM Cloud Marketplace | Virtual-Strategy Magazine
www.arkansasmatters.com
www.arkansasmatters.com
ASU-Beebe Warns of Potential Data Breach - Arkansas Matters
www.prnewswire.com
www.prnewswire.com
IBM Brings Broad Portfolio of Big Data and Analytics Capabilities to the... -- LAS VEGAS, Oct. 27, 2014 /PRNewswire/ --
abcnews.go.com
abcnews.go.com
Ebola Nurse Kaci Hickox Will 'Understand' Her Quarantine, New Jersey Governor Says - ABC News
www.marketwatch.com
www.marketwatch.com
IBM Introduces New Enterprise Intelligence Analytics to Fight Cybercrime at High Speeds and Massive Scale - MarketWatch
news.nationalpost.com
news.nationalpost.com
Manitoba ‘naked’ judge to tell inquiry she played no culpable role in photo scandal that could get her fired | National Post
twitter.com
twitter.com
Intel Security sur Twitter : "Come one, come all, to the #FOCUS14 expo hall! Now open at #McAfeeFocus. http://t.co/2wRBrUnyIB"
www.triplepundit.com
www.triplepundit.com
Symantec Pledges to Engage 1M Students in STEM by 2020
time.com
time.com
Social Media Over-Sharers Are Annoying, But You're Also Over-Following
www.csoonline.com
www.csoonline.com
Incoming PCI council head ready to take on the hackers | CSO Online
www.portal.reinvent.awsevents.com
www.portal.reinvent.awsevents.com
Customer Perspectives on Implementing Security Controls with AWS
www.washingtonpost.com
www.washingtonpost.com
T-Mobile quietly hardens part of its U.S. cellular network against snooping - The Washington Post
siliconangle.com
siliconangle.com
IBM should “stay the course” despite losses, analysts suggest | #ibminsight | SiliconANGLE
www.itbusiness.ca
www.itbusiness.ca
Why data breaches keep happening | IT Business
www.cbronline.com
www.cbronline.com
IBM promises security with criminal investigation of enterprise data - Computer Business Review
www.cbronline.com
www.cbronline.com
IBM to host analytics in its cloud marketplace - Computer Business Review
www.marketwatch.com
www.marketwatch.com
IBM Introduces New Generation of Cloud-Based Data Services to Help Organizations Know More, Faster - MarketWatch
www.darkreading.com
www.darkreading.com
How I Became a CISO: Janet Levesque, RSA
www.localsyr.com
www.localsyr.com
Taylor Swift urges famous pals to tighten online security - LocalSYR.com powered by NewsChannel 9 WSYR Syracuse
www.npr.org
www.npr.org
Medical Journal To Governors: You're Wrong About Ebola Quarantine : Goats and Soda : NPR
www.kesq.com
www.kesq.com
Cevallos: Why Ebola quarantine is legal | News - Home
www.wired.com
www.wired.com
ACLU Calls Schools' Policy to Search Devices and 'Approve' Kids' Web Posts Unconstitutional | WIRED
money.cnn.com
money.cnn.com
IBM Brings Broad Portfolio of Big Data and Analytics Capabilities to the IBM Cloud Marketplace
abcnews.go.com
abcnews.go.com
Democratic Attack Ads Aim to Save Senate Majority - ABC News
www.livemint.com
www.livemint.com
‘Bash’ computer bug could hit millions - Livemint
www.tripwire.com
www.tripwire.com
Report: Point-of-Sale Malware Infections Expected to Surge During Holiday Season - The State of Security
recode.net
recode.net
Re/code’s Code/Mobile Conference By The Numbers | Re/code
www.tctmd.com
www.tctmd.com
Invasive Measurements Confirm Quick Recovery of Microcirculation After Primary PCI - Journal News - TCTMD
www.zenhub.io
www.zenhub.io
ZenHub.io - Agile Project Management inside GitHub
today.uconn.edu
today.uconn.edu
Cybersecurity Contest Challenges Teams to Think Like a Hacker | UConn Today
www.politico.com
www.politico.com
Hackers DDoS Ukraine elections — First look: Attacks on businesses continue to rise — Feinstein: Intel is the ‘only defense’ against lone wolf terrorists - POLITICO Morning Cybersecurity - POLITICO.com
www.sci-tech-today.com
www.sci-tech-today.com
SUSE Linux Enterprise 12 Is Released | Sci-Tech Today
blogs.cisco.com
blogs.cisco.com
Can the Elephant Dance to a Security Tune?
nakedsecurity.sophos.com
nakedsecurity.sophos.com
Adobe updates its e-reader – DRM data no longer transmitted insecurely | Naked Security
www.newsnet5.com
www.newsnet5.com
newsnet5.com | Local Breaking News, Weather, Sports | WEWS-TV NewsChannel5 | Cleveland, Akron, Canton, Ohio
support.liveoffice.com
support.liveoffice.com
Current Status | LiveOffice Support Center
www.theregister.co.uk
www.theregister.co.uk
Planning to fly? Pour out your shampoo, toss your scissors, RENAME TERRORIST WI-FI! • The Register
www.securitytube.net
www.securitytube.net
27c3 - Having Fun With Rtp
www.wtvq.com
www.wtvq.com
Taylor Swift urges famous pals to tighten online security - WTVQ
www.sun-sentinel.com
www.sun-sentinel.com
Hacking of Plantation temple website part of growing trend - Sun Sentinel
edition.cnn.com
edition.cnn.com
CNN poll: Voters are angry - CNN.com
www.santacruzsentinel.com
www.santacruzsentinel.com
Editorial, Oct. 28, 2014: Bad news for bobcats, good news for lions - Santa Cruz Sentinel
www.gizmag.com
www.gizmag.com
20th anniversary of the banner advert: Digital advertising begins its third decade
blog.trendmicro.com
blog.trendmicro.com
Fighting Cybercrime Across Borders - Why Law Enforcement Collaboration Matters | Security Intelligence Blog | Trend Micro
www.infosecisland.com
www.infosecisland.com
6 Actions Businesses Should Take During Cyber Security Awareness Month
twitter.com
twitter.com
McAfee Inc. sur Twitter : "20% of searches for @JimmyKimmel lead to a malicious site. Here are our other Most Dangerous Celebrities #RiskyCeleb http://t.co/Yd00VdUgLe"
www.scmagazine.com
www.scmagazine.com
WorldPay hacker sentenced to 11 years for role in $9.4M scheme - SC Magazine
www.polarr.co
www.polarr.co
Photo Editor | Polarr - Online Photo Editing Re-imagined.
news.xinhuanet.com
news.xinhuanet.com
美国历史上的知名“深喉”
news.xinhuanet.com
news.xinhuanet.com
美国情报机构心惊肉跳
www.channelpro.co.uk
www.channelpro.co.uk
AVG: Moving beyond antivirus | Channel Pro
www.stockhouse.com
www.stockhouse.com
Press Releases - News - Stockhouse
www.proactiveinvestors.com
www.proactiveinvestors.com
Absolute Software ups dividend 17% to 7 cents per share - Proactiveinvestors (NA)
abcnews.go.com
abcnews.go.com
Obama Focuses on Governor Races Where He's Welcome - ABC News
www.ervik.as
www.ervik.as
Netscaler still leader in the Gartner Magic Quadrant for Application Delivery Controllers - App Delivery, MDM, VDI, Cloud and Virtualization News, Blogs and Community
www.zdnet.com
www.zdnet.com
IBM unveils new enterprise analytics portfolio to combat cybercrime | ZDNet
www.scmagazine.com
www.scmagazine.com
Fidelity National Financial employees targeted in phishing attack - SC Magazine
thehill.com
thehill.com
Poll: Worries of hacking outweigh burglary, assault | TheHill
cointelegraph.com
cointelegraph.com
Researcher Discovers Tor Is Vulnerable To Malware Binaries Inserted By Exit Nodes
money.cnn.com
money.cnn.com
Gartner Positions Verizon in the Leaders Quadrant of the Magic Quadrant of Machine-to-Machine Services
www.wired.com
www.wired.com
NY Senator Calls for Renewed Crackdown on Dark Web Drug Sales | WIRED
www.scmagazine.com
www.scmagazine.com
FCC fines telecom companies $10 million - SC Magazine
www.scmagazine.com
www.scmagazine.com
Tor exit node found to add malware to downloaded binaries - SC Magazine
alostrealist.com
alostrealist.com
Juniper Secure Access: Testing Web Rewrite via Proxy SA | Tank on Networking
internetsafety.trendmicro.com
internetsafety.trendmicro.com
A Hacking Contest to Promote Digital Literacy | Internet Safety for Kids & Families
www.thefiscaltimes.com
www.thefiscaltimes.com
The Crime Americans Fear Most Costs $445 Billion a Year | The Fiscal Times
www.virtual-strategy.com
www.virtual-strategy.com
EnterpriseDB Positioned in the Leaders Quadrant in Gartner’s Magic Quadrant for Operational Database Management Systems | Virtual-Strategy Magazine
www.miamiherald.com
www.miamiherald.com
Struggling governors could hurt GOP's Senate hopes | The Miami Herald
www.jdsupra.com
www.jdsupra.com
Plaintiff’s Law Firm Steps Up Actions Against Bitcoin-Related Companies: Crypto Currency Exchange and Founder Sued for “Theft� of Bitcoin | Manatt, Phelps & Phillips, LLP - JDSupra
www.infoworld.com
www.infoworld.com
Suse Linux Enterprise 12 goes light on Docker, heavy on reliability | InfoWorld
en.ria.ru
en.ria.ru
Almost 70% of Americans Fear Cybercrime More Than Being Killed: Poll | World | RIA Novosti
www.wilmingtonbiz.com
www.wilmingtonbiz.com
UNCW Students Tackle Cyber Security | WilmingtonBiz
www.scmagazine.com
www.scmagazine.com
Google employee arrested over sextortion ruse - SC Magazine
community.websense.com
community.websense.com
Ebola Spreads - In Cyber Attacks Too
blogs.mcafee.com
blogs.mcafee.com
Studying Online – Year 12 and Beyond | McAfee
www.kansascity.com
www.kansascity.com
Struggling governors could hurt GOP's Senate hopes | The Kansas City Star
thefootballexaminer.com
thefootballexaminer.com
Apple Mac OS X stores data in iCloud Backup
www.thedailystar.net
www.thedailystar.net
Maritime environmental laws needed to combat marine pollution
www.esecurityplanet.com
www.esecurityplanet.com
Mobile Security's Budget Shortfall - eSecurity Planet
www.wcsh6.com
www.wcsh6.com
Businesses responding to data breaches
www.dailymail.co.uk
www.dailymail.co.uk
Beware Microsoft Office! Software contains dangerous bug that could let hackers take over your computer | Daily Mail Online
tools.cisco.com
tools.cisco.com
Cyber Risk Report: October 20-26, 2014
www.outlookindia.com
www.outlookindia.com
Restrain From Making Provocative Comments: Panel to Telangana CM
www.forbes.com
www.forbes.com
Internet-Connected Guns Are The Next Step For Data-Hungry Police - Forbes
www.scmagazine.com
www.scmagazine.com
Heartbleed, Shellshock and POODLE: The sky is not falling - SC Magazine
www.net-security.org
www.net-security.org
APWG launches global cybercrime reporting program
twitter.com
twitter.com
McAfee Inc. sur Twitter : "EVP, CMO @PennyRBaldwin discusses the future of @IntelSecurity, McAfee & what this means for YOU. #mfeps14 #FOCUS14 http://t.co/Kd51iAPp17"
twitter.com
twitter.com
Juniper Networks sur Twitter : "Piecing together a giant #Juniper delivery. Thanks for the picture, @wendohw! http://t.co/fydy5aUWVN"
www.aaronsw.com
www.aaronsw.com
Rewriting Reddit (Aaron Swartz's Raw Thought)
www.usatoday.com
www.usatoday.com
Election countdown: GOP & McConnell chase history
www.jsonline.com
www.jsonline.com
Mystery debit card fraud shows even chip-and-PIN cards vulnerable to theft - JSOnline
www.computerworld.com
www.computerworld.com
Desktop-as-a-Service: Your BYOD assist | Computerworld
www.mcafeefocus.com
www.mcafeefocus.com
FOCUS 14 - Breakout Sessions
twitter.com
twitter.com
McAfee Inc. sur Twitter : "This morning at #FOCUS14: Lisa Matherly addressing the crowd at #mfeps14 to announce our new partner program. http://t.co/hbfkf73oHC"
www.symantec.com
www.symantec.com
Android.Lockdroid.F | Symantec
www.net-security.org
www.net-security.org
Code Red: A global initiative for fighting government surveillance
www.securitytube.net
www.securitytube.net
27c3 - "The Concert" - A Disconcerting Moment For Free Culture
www.al.com
www.al.com
Mobile city email system attacked by hackers | AL.com
edition.cnn.com
edition.cnn.com
Senate battle: Six races to watch (Opinion) - CNN.com
auburnpub.com
auburnpub.com
Rep. Dan Maffei challenges John Katko's positions on preserving Social Security
blogs.wsj.com
blogs.wsj.com
How Vulnerable is the FDA to Computer Hackers? - Pharmalot - WSJ
www.computerworlduk.com
www.computerworlduk.com
Suse enterprise Linux can take your system back in time - ComputerworldUK.com
www.wusa9.com
www.wusa9.com
Officials warn 500 million financial records hacked
www.thenation.com
www.thenation.com
Edward Snowden: A ‘Nation’ Interview | The Nation
www.virtual-strategy.com
www.virtual-strategy.com
Avecto Strikes the Balance between Security and Freedom with the Launch of Defendpoint | Virtual-Strategy Magazine
www.channelpartnersonline.com
www.channelpartnersonline.com
McAfee Renames, Simplifies Channel Program
www.csoonline.com
www.csoonline.com
Vulnerability in widely used 'strings' utility could spell trouble for malware analysts | CSO Online
www.scmagazine.com
www.scmagazine.com
Latest Ebola-themed phish leverages unpatched Windows bug - SC Magazine
packetstormsecurity.com
packetstormsecurity.com
Tor Exit Node Mashes Malware Into Downloads ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Drone Safeguards Urged By UK Pilots ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Julian Assange: Google Is Breaking Bad ≈ Packet Storm
forums.juniper.net
forums.juniper.net
Automation with Chef/Puppet and Ansible - J-Net Community
www.infosecisland.com
www.infosecisland.com
Distinguishing Acts of War in Cyberspace
www.symantec.com
www.symantec.com
Unstructured Data, Ownership | Data Insight
www.scmagazine.com
www.scmagazine.com
Report: POS malware sees sharp increase in Q3 - SC Magazine
blog.trendmicro.com
blog.trendmicro.com
Old versus New: Vulnerabilities in Targeted Attacks | Security Intelligence Blog | Trend Micro
googleresearch.blogspot.fr
googleresearch.blogspot.fr
Research Blog: HDR+: Low Light and High Dynamic Range photography in the Google Camera App
now-here-this.timeout.com
now-here-this.timeout.com
Hacking the mac: a custom McDonald’s menu for London – Now. Here. This. – Time Out London
www.cultofmac.com
www.cultofmac.com
Learn how to protect your clients from hackers with the White Hat Hacker Bundle [Deals] | Cult of Mac
ww2.cfo.com
ww2.cfo.com
In the Trenches of the Cyber War
www.marketwired.com
www.marketwired.com
SwiftStack Secures $16M in Funding to Accelerate Adoption of Software-Defined Storage Platform
www.zdnet.com
www.zdnet.com
Shellshock attacks mail servers | ZDNet
www.net-security.org
www.net-security.org
RBS WorldPay hack ringleader finally sentenced
www.digitaljournal.com
www.digitaljournal.com
Court Sets Trial Date For Global Digital Solutions' (GDSI) Lawsuit Against Merriellyn Kett Murphy, former CEO and Sole Shareholder of Airtronic USA - Press Release - Digital Journal
www.lowcards.com
www.lowcards.com
Compare Credit Cards & Low Interest Credit Cards At LowCards.com
twitter.com
twitter.com
AVGFree sur Twitter : "Want to win 1 year of AVG IS 4 FREE? Tell us about a time you experienced a creepy computer glitch!#ghostinthemachine http://t.co/pP4AaHUJ39"
www.totaltele.com
www.totaltele.com
Where Should You Focus Investment in Your Projects?
www.proprofs.com
www.proprofs.com
Poll for National Cyber Security Awareness Month: Of the below four challenges with cybercrime, which do you think is the most significant?
drewblaisdell.github.io
drewblaisdell.github.io
monitor.io - remote monitoring and debugging for socket.io
www.computerworld.com
www.computerworld.com
For big raises in IT, look to mobile, security, big data | Computerworld
consumerist.com
consumerist.com
Bogus Credit Card Charges Look Like They Were Made With Chip-Enabled Cards – Consumerist
www.businesswire.com
www.businesswire.com
Avecto Strikes the Balance between Security and Freedom with the Launch of Defendpoint | Business Wire
www.gamerheadlines.com
www.gamerheadlines.com
Download Free Antivirus for Your Business
betanews.com
betanews.com
HP launches free executive tools to reduce the impact of security incidents
www.techspot.com
www.techspot.com
How 64-bit computing will improve the mobile experience - TechSpot
winsupersite.com
winsupersite.com
Microsoft Preps Partners for Windows 10 | Windows 10 content from Paul Thurrott's SuperSite for Windows
www.retailcustomerexperience.com
www.retailcustomerexperience.com
Security companies form pact for mobile authentication | Retail Customer Experience
www.youtube.com
www.youtube.com
Gem-Tech Awards Sound Bite: Monique Jeanne Morrow - YouTube
www.fireengineering.com
www.fireengineering.com
Login - Fire Engineering
www.marketwatch.com
www.marketwatch.com
Absolute Software Increases Quarterly Dividend - MarketWatch
globenewswire.com
globenewswire.com
Contractors, Hackers and Regulators all Pose Data Breach Risks for Healthcare Providers London Stock Exchange:BEZ
economictimes.indiatimes.com
economictimes.indiatimes.com
IBM’s first cloud data centre in India to focus on private services for SMEs - The Economic Times
www.theverge.com
www.theverge.com
Retailers are disabling NFC readers to shut out Apple Pay | The Verge
seclists.org
seclists.org
Bugtraq: vulnerabilities in libbfd (CVE-2014-beats-me)
seclists.org
seclists.org
Bugtraq: [SECURITY] [DSA 3057-1] libxml2 security update
betanews.com
betanews.com
Targeted attacks against businesses are on the rise
www.bna.com
www.bna.com
South Korean Internet Regulator Confirms Data Breach at Popular Video Sharing Site | Bloomberg BNA
dhowe.github.io
dhowe.github.io
AdNauseam - Clicking Ads So You Don't Have To
www.prnewswire.com
www.prnewswire.com
Absolute Software Corporation Announces Meeting Date and Record Date and Approval of Advance Notice Policy -- VANCOUVER, Oct. 27, 2014
www.theregister.co.uk
www.theregister.co.uk
Schneier, Diffie, ex-MI5 bod, privacy advocates team up on Code Red • The Register
www.net-security.org
www.net-security.org
Tor exit node found patching downloaded binaries with malware
seclists.org
seclists.org
Bugtraq: iTunes 12.0.1 for Windows: still COMPLETELY outdated and VULNERABLE 3rd party libraries
seclists.org
seclists.org
Bugtraq: NEW VMSA-2014-0011 VMware vSphere Data Protection product update addresses a critical information disclosure vulnerability
www.marketwatch.com
www.marketwatch.com
How to make your $20-a-month COLA increase make a difference - MarketWatch
www.politico.com
www.politico.com
McCarthy vows change on Hill to save GOP — New York loosens quarantine policy — A “post-Obama” Republican — States push on quarantines - POLITICO Pulse - POLITICO.com
www.jewishpress.com
www.jewishpress.com
The Jewish Press » » S. African Anti-Israel Jews Say Hackers Killed Tutu Plaque Unveiling
www.business-standard.com
www.business-standard.com
A secure way for banking | Business Standard News
www.businesscomputingworld.co.uk
www.businesscomputingworld.co.uk
Driving Digital Growth With The Internet Of Things | BCW
blogs.cisco.com
blogs.cisco.com
The increasing prevalence and complexity of malware
thatguy.trendmicro.com
thatguy.trendmicro.com
Identity Fraud & Data Theft – Don’t be that Guy
www.livemint.com
www.livemint.com
Android ambassador Sundar Pichai gets his due at Google - Livemint
www.channelnomics.com
www.channelnomics.com
Skybox Puts Channel in Catbird Seat - from Channelnomics.com
www.mumbaimirror.com
www.mumbaimirror.com
Probe Andheri firm’s claims it lost 1 lakh dollars to hackers: HC tells CBI - Mumbai Mirror
windowsitpro.com
windowsitpro.com
Sundar Pichai Takes Over All of Google's Core Products | Paul Thurrotts WinInfo content from Windows IT Pro
www.financialexpress.com
www.financialexpress.com
Google Inc puts Sunder Pichai in charge of major products, services - Financial Express
www.zdnet.com
www.zdnet.com
Bugs lead banks to approve fake EMV transactions | ZDNet
blogs.mcafee.com
blogs.mcafee.com
What Is a Trojan Horse? | McAfee
news.georgiasouthern.edu
news.georgiasouthern.edu
Criminology Professor Shares Tips to Prevent Hacking and Cybercrime Attacks | Newsroom | Georgia Southern University
gmauthority.com
gmauthority.com
How To Safely Drive Through Floods And Flooded Roads | GM Authority
www.marketwatch.com
www.marketwatch.com
Absolute Software Corporation Announces Meeting Date and Record Date and Approval of Advance Notice Policy - MarketWatch
www.csoonline.com
www.csoonline.com
Report: Criminals use Shellshock against mail servers to build botnet | CSO Online
www.infosecisland.com
www.infosecisland.com
Webcast: How Gaps In SSH Security Create an Open Door for Attackers
blog.trendmicro.com
blog.trendmicro.com
Operation Pawn Storm: Putting Outlook Web Access Users at Risk | Security Intelligence Blog | Trend Micro