Career planning: Where do old devs go to? - Ayende @ Rahien
Facebook trawls through paste sites for compromised credentials
President Obama's Credit Card Declined At Restaurant
HP Delivers Threat Protection to Academic Institutions
McAfee presenta la versión más avanzada de McAfee Next Generation Firewall | DEFENSA PERIMETRAL | CSO España
Regaining Control of Security Complexity| Cisco Services Perspectives
Dutch gov't to take on hackers in 2015 debate - NL Times
Past data breaches could hurt hacked retailers at the holidays | Retail Dive
HP Delivers Threat Protection to Academic Institutions - MarketWatch
China may be hacking every iPhone user in the country – Quartz
Half of Americans likely to avoid retailers affected by data breaches for holiday shopping -
Sophos to offshore American support operations • The Register
Derbycon 2014 - Closing Ceremonies
How to integrate BYOD into a small business | News | TechRadar
Are data breaches creating better consumers? - The Washington Post
MobileIron Inc.: MobileIron and FireEye Join Forces To Proactively Secure Mobile Devices Against Emerging Threats And Malicious Apps
Virginia Police Have Been Secretively Stockpiling Private Phone Records | WIRED
Virender Sehwag paid birthday tribute to by Sophos Antivirus - Latest Cricket News, Articles & Videos at
Piccolo, the tiny CNC-bot
Apple issues security update for OS X Mavericks -
Dell Debuts SuperMassive 9800 Next-Gen Firewall - Press Releases on Top Tech News
Dell Introduces SuperMassive 9800 Next-Generation Firewall to Bring Powerful Enterprise-Level Security to Organisations of All Sizes - Media Releases - CSO | The Resource for Data Security Executives
Twitter 'news' spreads faster than Ebola #FakeCures #Malware • The Register
Obama signs Executive Order to bolster federal credit card security | CSO Online
Dropbox used for Phishing expedition | CSO Online
Pohatcong Township police responses up at Wal-Mart |
Rank Group invests in payment security - Essential Retail
Malware don't need Coffee: CVE-2014-0556 (Adobe Flash Player) integrating Exploit Kits
Information Security Management Systems seminar next month - News -
Yahoo Faced Daily Fines For Not handing Over User Data To The NSA - Technology News - redOrbit
If Ebola arrived in Canada - Canada News -
Surrendering our rights for whose convenience? - Decatur Daily: Editorials
Video: FBI warns technology companies of China-affiliated hackers - Telegraph
China again blames US for disrupted cybersecurity talks | CSO Online
Grim RIPA takes scythe to confidentiality | Feature | Law Society Gazette
H&S laws 40th anniversary: 'Nanny State' or workers' saviour? | Central - ITV News
TechCrunch Disrupt Europe 2014: News, photos and the Startup Battlefield LIVE |
An Analysis of A Windows Kernel-Mode Vulnerability (CVE-2014-4113) | Security Intelligence Blog | Trend Micro
Restore or remove file from the Virus Vault | AVG
Week in review: POODLE bug, Microsoft patches a slew of 0-days exploited in the wild
Privilege Escalation via DLL Hijacking
Monday review – the hot 19 stories of the week | Naked Security
JP Morgan Hackers Strike Again, Hit Fidelity Investments - Network Security on Top Tech News
Survey: Breached Businesses May Lose Holiday Shoppers
Derbycon 2014 - Open Source Threat Intelligence: Developing A Threat Intelligence Program Using Open Source Tools And Public Sources
Hillsborough schools begin teaching kids to cope with life online |, The Tampa Tribune and The Tampa Times
Can Apple Pay Thwart the Credit Card Hacking Trend? (AAPL)
Dell introduces SuperMassive 9800 next-generation firewall | IT-Online
Infographic: A brief history of malware
The Software Assurance Marketplace: A response to a challenging problem
Visual voicemail hack makes your messages a hack snack • The Register
Etisalat signs disaster recovery deal with Dubai Smart Govt - Telecompaper
IE 11 FULL RCE on Windows X on Vimeo
Will Apple Pay Be the Next iRevolution? - Apple/Mac on Top Tech News
Microsoft pulls another dodgy patch • The Register
Dell Debuts SuperMassive 9800 Next-Gen Firewall | NewsFactor Network
Delhiites queue up at midnight as iPhone 6, iPhone 6 Plus come to India - Financial Express
Int'l cyber security conference opens in Brunei | Shanghai Daily
'LulzSec leader Aush0k' found to be naughty boy not worthy of jail • The Register
Boot up: unfair big data, 10 security laws, Siri as a friend, Whisper investigated | Technology |
NYU News : NYU hosts 24-hour hacking marathon
Techcrunch Disrupt in London: City’s rising tech talent is the star of the show | City A.M.
Gartner: Smart Machines To Be Most Disruptive Trend - Tech Trends on Top Tech News
Secure Email and Cloud Alternatives to Gmail and Dropbox - TechSpot
Mr. Abhaxas sur Twitter : "go home twitter, you're drunk. i'll accept my bugbounty via bitcoin thx"
Inside Secure Introduces VAULTiTRUST to Lower Adoption Barrier to Best-in-Class Security for Internet of Things (IoT)
Marc Andreessen on Why Optimism Is Safest Bet -- NYMag
Derbycon 2014 -Once Upon A Time... (Infosec History 101)
Aussie satisfaction in big data lags behind global results: Accenture - CMO Australia
Big Data = Big Challenges
Gartner: Smart Machines To Be Most Disruptive Trend - Cloud Computing on Top Tech News
Changing rainfall global issue - Canada News -
Half of Holiday Shoppers Say They'll Avoid Stores That Got Hacked, Survey Finds
Stores bitten by data breaches may see shy shoppers, survey finds - Chicago Tribune
Celebrity nude photo leak: Model helps cops - Emirates 24/7
84% Of Enterprises See Big Data Analytics Changing Their Industries' Competitive Landscapes In The Next Year - Forbes
Oz privacy comish says breaches could double this year • The Register
Haskell Is Exceptionally Unsafe | Existential Type
Goodbye wallet, hello iPhone? Apple big Pay-day
Interview: Editor-at-large of Techcrunch Mike Butcher | City A.M.
New gadgets are nice, but Apple Pay is bigger deal
Avast Antivirus 2014 download vs Avira Antivirus update for iOS, Android and Windows Phone 8.1 - The REM
EM Nerd: Unclog the "Clogged Pipes" Model
Spike in Malware Attacks on Aging ATMs — Krebs on Security
Documenting with dignity in the Ebola zone |
Metadata: Facebook's software architecture
Identifying and Preventing Insider Threats - The State of Security
Symantec Canada Honey Stick Project 2014 - YouTube
UGA cancels Liberian journalist’s appearance out of Ebola concern | Political Insider blog
Media Release: Dell Introduces SuperMassive 9800 Next-Generation Firewall to Bring Powerful Enterprise-Level Security to Organisations of All Sizes
Derbycon 2014 - Hacking Mainframes; Vulnerabilities In Applications Exposed Over Tn3270
Demand up for ethical hackers who spot and patch up breaches
Social News 20/10 - News VietNamNet
Snowden Accuses Kiwi Government of Mass Surveillance Program - Infosecurity Magazine
FIRST standards to clean up messy CERTs • The Register
BBB: How to avoid cyber security issues |
Will Apple Pay Be the Next iRevolution? - Mobile Tech on CIO Today
A sinking sense of 'security' | TribLIVE
Customers wonder how to protect their data and money after recent data hacks
Like Jennifer Lawrence’s naked photo leak, the Snappening is another example of why we shouldn't trust cloud services - 14 Oct 2014 - Computing Analysis
Ultimate answer to card hacking is more vigilance - Your Houston News: Opinion
The Chromecast continues to be perhaps the best value in tech | writing about tech
Model helps police set up sting operation on celebrity nude photo hacker who told her to pay $900 or have her naked body exposed to the world | Daily Mail Online
Dropbox users targeted by phishing scam hosted on Dropbox | Symantec Connect
Infographic: a brief history of malware
Access Bank gets ISO 22301 Business Continuity Mgt Systems Certification - The Sun News
Holiday season may increase your risk of identity theft
Apple patches security issues in OS X Mavericks - Software - News -
Derbycon 2014 - Single Chip Microcontrollers: Beyond Arduino
Amanda institutes new cellphone policy
Disabled Russian ship secured - Canada News -
School systems work to develop cyber security curriculum | The Augusta Chronicle
Local News | Columbus Ledger Enquirer
Apple Pay Is it the iPhone 6 game-changer?
Data Visualization with JavaScript
Build systems with cyber security from ground up
Firms urged to crack down on mobile app security- 15 Sep 2014 - CRN UK News
Hackers have broken into mainstream TV
As vendors split and jettison, can Microsoft avoid the same fate? | ZDNet
Quiet 'whiz kid' became public face of Ebola fight | The Miami Herald
Lupe Fiasco "Tetsuo & Youth" Release Date; Hackers Claim Responsibility | Get The Latest Hip Hop News, Rap News & Hip Hop Album Sales | HipHop DX
Protecting Your Privacy – A Key to Online Security -
FBI director demands access to private cell phone data - CNE
Windows 10: Aiming for More Business Users - Operating Systems on CIO Today
Documenting with dignity in the Ebola zone - The Washington Post
Encrypted channel monitoring: The evolution of privileged access management | Government Security News
Trudeau: cuts could be reversed - Canada News -
Russian man: not guilty to new hacking charges | The Salt Lake Tribune
FBI warns of Chinese state-sponsored hackers, 16 October 2014
Derbycon 2014 - Building Better Botnets With Ipv6
Review: Mac OS X Yosemite - Canadian Reviewer - News, Reviews and Opinion with a Canadian Perspective
Phishing schemes: Don’t take the bait! -
Kelly Brook poses in a skimpy bikini on Mexican getaway with David McIntosh... as pictures emerge of her dining with mystery man in LA last week | Daily Mail Online
Macminicolo Blog (A look at the 2014 Mac mini)
Government info security news, training, education - GovInfoSecurity
Cloud, big data propel bank CISOs into the boardroom - Security -
V3 Security Summit: Majority of apps would fail basic security tests - IT News from
Adobe Reader update now more secure than ever available for download - The REM
Konloch/bytecode-viewer · GitHub
Dune-themed bug lets Russian hackers target NATO, Ukraine: iSight
Scammers exploit Ebola virus to spread malwares | SecTechno
What to Consider When Buying a Smart Device - Security News - Trend Micro USA
[Lollipop Feature Spotlight] WebView Is Now Unbundled From Android And Free To Auto-Update From Google Play
Nude photos of Britain's Got Talent winner George Sampson 'leaked online by Snapchat hackers' - Manchester Evening News
Derbycon 2014 - Bad Advice - Unintended Consequences And Broken Paradigms. Think &Amp;&Amp; Act Different!
China blames US for difficulty in resuming cyber security talks | World | The Malay Mail Online
pci 1x to 16x adapter to use a second graphics card [Solved] - Graphics Cards - Graphics & Displays
Vermont to get $83,000 for TD Bank data breach | Vermont Business Magazine
BYOD & COPE: How the Philippines government manages enterprise mobility and why
China says it's hard to resume cyber security talks with US
Obama announces plan to tighten card security
BackBox 4.0 Released | SecTechno
Sandworm and SCADA -
Superconducting circuits, simplified | MIT News
Derbycon 2014 -Simple Network Management Pwnd
China says US must change 'mistaken policies' before deal on cyber security | World news |
Phishing Scams & Identity Theft Protection – Don’t be that Guy – Trend Micro
Facebook scouring leaked credentials, postings to help stolen ID victims : PERSONAL TECH : Tech Times
Which size Apple device is right for you? - CNE
China says it's hard to resume cyber security talks with U.S. | Reuters
Infected Flight Wins The Disrupt Europe 2014 Hackathon Grand Prize, Appilepsy And Seeusoon Are Runners Up | TechCrunch
Midnight Hacking in the Dungeon | Disrupt EU Hackathon - TechCrunch Hackathon | TechCrunch TV
FacebookLinkedInMidnight Hacking in the Dungeon | Disrupt EU HackathonHere in London,... - News - Seattle Sports Nut
Bucket list baby: Worth the hackers, extra heartache?
OpenSSL Released a fix to four vulnerabilities | SecTechno
Apple's new tablets, iMac impress, but analysts say Apple Pay is more important strategic move - Daily Journal
My First Keyboard Build. | Stuff Dave Does
Derbycon 2014 - Analyzing Weak Areas Of The Federal Cloud Security Program
Data breaches threaten to shake consumer confidence - Eagle-Tribune: New Hampshire
The US government's wireless-spectrum auction: Why it matters (FAQ) - CNE
Beware of Online Ad Attacks : Trending : Hallels
After Massive Data Breaches, Businesses Move to Make ID More Personal - ABC News
Humble spud poised to launch a world food revolution | Science | The Observer
Why Free Antivirus Programs are Important
‘FNBO Account Application’ is nothing but a zipped Malware | SecTechno
Roll up your sleeves, we may need to fork Debian.
Business - Shared Disaster Recovery Site launched by DSG and etisalat
Global Industrial Control Systems (ICS) Security Market To See 8.0% CAGR to 2018 Says a Research Report Available at
Derbycon 2014 - Proactive Application Security
McAfee Next generation firewall empowers enterprises to more effectively fight cybercrime with expanded threat defense ecosystem - Zawya
Centrify Enables Expanding Enterprise Adoption of Macs With Day One Support of New Mac OS X Operating System
Apple Pay: Revolutionary but won't come to India anytime soon - Firstbiz
Apple Pay Is Here: Everything You Need To Know : Trending : Hallels
Hot Model Extorted in Celebrity Hacking Scandal |
GM’s hit and run: How a lawyer, mechanic, and engineer blew open the worst auto scandal in history | PandoDaily
Social News 19/10 - News VietNamNet
Disney rendered its new animated film on a 55,000-core supercomputer
Cyber hassle: Data breaches cause headaches for area banks and businesses : Business
Field office for disaster recovery set up following 3 disasters in northeast Nebraska closed
Derbycon 2014 - Chicken Of The Apt: Understanding Targeted Attackers With Incubation!
Gartner: Smart Machines To Be Most Disruptive Trend - Big Data on Top Tech News
Hackers shake confidence in free software idealism of the 1980s - Business - The Buffalo News
Will Apple Pay be the next iRevolution?
Obama’s under-used credit card declined in NY cafe - Nation - The Boston Globe
"Why Does S Look Like F?": A Guide to Reading Very Old Books—Blog—The Appendix
Thinking Functionally with Haskell: Richard Bird: 9781107087200: Books
Lumberton superintendent urges parental involvement
NSA Forced Yahoo To Supply User Info or Pay Big Fines | NewsFactor Network
Dyersburg State Gazette: Local News: Dairy Queen addresses recent data breach (10/18/14)
Filtered: NMAP Port Scanner Sees Through IPtables Firewall | Diary Products - Hannes Schmidt
Derbycon 2014 -Bending And Twisting Networks
Pres. Obama wants increased debit, credit card security after breaches
Ebola Scare Turns Dallas Hospital Into a 'Ghost Town' - ABC News
Websense Strengthens MENA Distribution Channel with StarLink - Zawya
Phone hacking: MPs challenge prosecutors on evidence in Murdoch case - Crime - UK - The Independent
That’s me in the picture: Kevin Berthia on the Golden Gate bridge | Art and design | The Guardian
Ask Deemable Tech: Can Macs Get Viruses? | WJCT NEWS
Maine, states settle TD Bank data breach - Washington Times
Targeted attack protection via network topology alteration
Editorial: A friendlier Apple Inc now invites media through its Infinite Loop front door
Claire Trevett: Gamemakers wreak havoc but leaders battle on - National - NZ Herald News
Doctors Tell All—and It’s Bad - Meghan O'Rourke - The Atlantic
Learn How to Transform your Network with Cisco Innovations at MEF GEN14!!
Derbycon 2014 - The Achilles Heel Of The American Banking System
Facebook can tell you if your password was stolen
Field office for disaster recovery set up following 3 disasters in northeast Nebraska closed - Daily Journal
Hugh Grant writes himself off | Burton Mail
Hugh Grant reveals face pinning (From Daily Echo)
Hugh Grant on Hollywood, hacking and celebrity | The Indian Express
XNG: GIFs, but better, and also magical | Clean Rinse
YouTube Ads Lead To Exploit Kits, Hit US Victims | Security Intelligence Blog | Trend Micro
Yahoo Faced $250k/day Fine If They Didn’t Comply With Government Requests
PressTV - It’s hypocrite of US to warn of China hacking plot: Analyst
Building the Largest Ship In the World, South Korea | The Blog of Photographer Alastair Philip Wiper
Snapchat Hack Not A Hoax, Says 'Snappening' Chronicler - Forbes
OS X Yosemite tips and tricks: See what your Mac can do now - Pocket-lint
16-year-old Indian hacked Pakistan People’s Party site? - The Times of India
Dropbox hacked, login details dumped online? No, says Dropbox : PERSONAL TECH : Tech Times
Will Apple Pay Be the Next iRevolution? - Mobile Apps on Top Tech News
Vector, the Journal of the British APL Association
Derbycon 2014 - It's Not Easy Being Purple
Local News |
Experts: Ebola Suits Can Keep Wearers Safe | Sci-Tech Today
'Am I being catfished?' An author confronts her number one online critic | Books | The Guardian
AVG vs Kaspersky vs Norton Antivirus– Which Program can be entrusted with your device’s security? - The REM
Dell Debuts SuperMassive 9800 Next-Gen Firewall - Press Releases on CIO Today
Facebook slurps 'paste sites' for STOLEN passwords, sprinkles on hash and salt • The Register
Post facto, Obama acts to protect U.S. financial sector after devastating attacks | VentureBeat | News Briefs | by Richard Byrne Reilly
Holyrood powers - East Lothian News
Shared disaster recovery site is secure data environment for government entities | The National
Everything You Need to Know About Cooking with Blood
Derbycon 2014 - Control Flow Graph Based Virus Scanning
DB-Engines Ranking - popularity ranking of database management systems
Cloud Architecture 101: Scalability DON’TS | Celingest Blog – Feel the Cloud
10 courses to learn Amazon Web Services with Cloud Academy
Confused by cloud computing price comparisons? Here they are in one easy-peasy chart — Tech News and Analysis
How we increased our EC2 event throughput by 50%, for free « Swrve Engineering
Dyre Trojan Takes Aim at Bitcoin Sites, Adobe Vulnerability Leveraged - Softpedia
RIG Exploit Kit Dropping CryptoWall 2.0 « Featured « ThreatTrack Security Labs Blog
Obama credit card declined: Does he need to get out more? (+video) -
Obama offers plan to tighten card security - Business
Scam: Computer Hackers Claiming to be Law Enforcement
History of Octave Discovery
Symantec Named a Leader in Enterprise Mobile Management | Symantec Connect
Convergence In The Internet Of Things Is Priming The Tech World For A Major Cultural Shift | TechCrunch
Kickstarter Suspends Anonabox Security Appliance Project
David Walliams settled phone-hacking damages claim | Western Daily Press
Dataguise Announces Security Solution for Hadoop in the Cloud - insideBIGDATA
President Obama Executive Order for Microchips in Government Credit Cards | Viral Global News
Obama: My Credit Card Was Declined - The Daily Beast
How many packs to get a full collection?
Hackers: they're 'superheroes' that 'change the world' (Wired UK)
Security and the Internet of Everything
Apple pushes users to adopt Yosemite
Apple Pay Launch: Why Retailers Will Love Apple's Payment System - Businessweek
Apple Patches POODLE, Pushes Yosemite Upgrade
Dell broadens SuperMassive next-gen firewall product with 9800 model | eChannelLine
New products in hand, Apple tries to reignite interest in iPad - The Times of India
/dev/dump: Your language sucks...
Derbycon 2014 - Ok - So You've Been Pwned - Now What?
“Oops! I’m sorry about that” – 60 Sec Security [VIDEO] | Naked Security
US Government Fines Intel's Wind River Over Crypto Exports ≈ Packet Storm
Hacked: The Six Most Common Ways Non-Tech People Fall Victim ≈ Packet Storm
Microsoft Withdraws Another Buggy Update ≈ Packet Storm
Kickstarter Kicks Out Controversial Anonabox ≈ Packet Storm
Review: Bitcoin 'Vault' Trezor Lives Up to its Name
Exclusive: NSA reviewing deal between official, ex-spy agency head| Reuters
Campaign Details ¦ Stop Think Connect
Dell Debuts SuperMassive 9800 Next-Gen Firewall | NewsFactor Business
Nicholas Manousos
Operating Partner, DFJ
Derbycon 2014 - Everybody Gets Clickjacked: Hard Knock Lessons On Bug Bounties
Apple Pay looks to cash in on consumer concerns - Newsday
Privacy in the Internet of Things Era
Here's what hackers do with your data - The Times of India
Supervalu still getting a handle on summer data breach -
Sony Xperia Z3 Compact review: small size, big deal
C O U N T E R V I E W: Congress' "cyber war" dream collapsing in Sonia Gandhi adviser Ahmed Patel's home turf, Gujarat
Dell launches new SuperMassive NGFW - from
Don’t worry about getting hacked. Worry about getting socially engineered. - The Washington Post
Secure Your PC And Clear The Clutter With The Best Free Antivirus Software
Are POODLE Security Fears Barking Up the Wrong Tree? - Computing on Top Tech News
Are POODLE Security Fears Barking Up the Wrong Tree? - Data Security on CIO Today
Latest breaking news from Hilton Head & Beaufort, SC | The Island Packet
Gartner: Smart Machines To Be Most Disruptive Trend | Sci-Tech Today
It can happen to anyone: Obama's credit card declined
AVG Cloud Partner Summit: 5 Things MSPs Need to Know | Events content from MSPmentor
Avira Launches 2015 Antivirus Security Software Line | Business Wire
Hackers strike defense companies through real-time ad bidding | CSO Online
SSLsplit - transparent and scalable SSL/TLS interception (SSLsplit)
Derbycon 2014 - Are You A Beefeater , Focused On Protecting Your Crown Jewels?
Merced community news from Merced Sun-Star in Merced, CA |
POODLE vulnerability hastens the death of SSL 3.0 - TechRepublic
Revealed: how Whisper app tracks ‘anonymous’ users | Technology | The Guardian
‘The Fappening’ Is Dead: From A-List Hacking Victims to D-Listers Accused of Leaking Nudes For PR - The Daily Beast
The Fappening Part 5: Lindsay Clubine, Wife of Clay Bucholz, Lashes Out After Nude Photos; George Sampson Also?
California Supreme Court Won't Hear Medical Data Breach Case | The Recorder
Nexus 9 Listed on Google Play India; Price Revealed | NDTV Gadgets
Hospital turns to PR to fight Ebola
Govt ICT: Autocracy, all-of-government contracts, common capability and questions | The National Business Review
Big Data Product Watch 10/17/14: Big Three Make Big Moves -- ADTmag
BBC News - Theresa May: We need to collect communications data 'haystack'
It can happen to anyone: Obama's credit card declined - The Times of India
Google announces Android Lollipop, Nexus 6 smartphone, Nexus 9 tablet and Nexus Player
Lookout Details Android 5.0 Lollipop Has Toughened Security Features |
Hacking a big danger for small businesses - Houston Chronicle
Hackers strike defence companies through real-time ad bidding - CIO
NJ to get $103,000 in TD Bank settlement over data breach - Business -
Thoughts on Startup School
Derbycon 2014 - Dolla Dolla Bump Key
'Malvertising' targets U.S. military firms in new twist on old web threat| Reuters
Walliams settles phone-hacking claim | Herald Scotland
Local news from Kennewick, Pasco, Richland, WA | Tri-City Herald
Combine Solicitation - Water Sampling
Russian hackers made billions of dollars over the past 12 months
Apple Delivers iPads, iMac, Mac Mini, Shuns Touchscreens | Business Smartphone and Tablet Technology Solutions content from The VAR Guy
‘Hacking’ through South America: How to get the most out of reward miles
Breach Year | Columns | RIS News: Business/Technology Insights for Retail, Supermarket Executives
Latest local news from San Luis Obispo, CA | The Tribune
Functional Programming in Javascript | Businesses Brush Up On Cyber Security
Microsoft withdraws another buggy update | ZDNet
New attack hides stealthy Android malware in images | PCWorld
Obama Announces Plan to Tighten Card Security - ABC News
Avira Launches 2015 Antivirus Security Software Line - Press Release - Digital Journal
Investigators continue work on data breach - Bowling Green Daily News: News
Derbycon 2014 - What Dungeons &Amp; Dragons Taught Me About Infosec
Local news from The Sun News in Myrtle Beach SC |
EDITORIAL: Hacked - The Brown and White
7 things you didn’t know your browser could do | USA TODAY College
Securing the Internet of Everything - YouTube
Isolationism, Globalization and the Role of the Colocation Provider | Data Center Knowledge
New ad praises Senator Pat Roberts for defending freedom of speech | Human Events
Gartner: Smart Machines To Be Most Disruptive Trend - Big Data on CIO Today
Yahoo says gov't threatened $250,000 a day fine - Story
TD Bank settles backup tape data breach case with 9 states — Business — Bangor Daily News — BDN Maine
Hackers rip into heart of open-source software | TribLIVE
Obama announces BuySecure Initiative; Urges passage of national data breach bill - San Diego Identity Theft |
Tablet Sales Slowing, But Keep Your Mobility Shingle Hanging | Ipad and Android Enterprise Mobility News content from The VAR Guy
AVG Cloud Summit
Hackers strike defense companies through real-time ad bidding | ITworld
Centreon SQL Injection / Command Injection ≈ Packet Storm
Drupal HTTP Parameter Key/Value SQL Injection ≈ Packet Storm
Linux PolicyKit Race Condition Privilege Escalation ≈ Packet Storm
Apple Releases iTunes 12.0.1 Alongside OS X Yosemite - Mac Rumors
MS14-060 Microsoft Windows OLE Package Manager Code Execution ≈ Packet Storm
Target too focused on 'white suburban moms,' exec says -
Kickstarter Freezes Anonabox Privacy Router Project for Misleading Funders | WIRED
Apple releases mega security patch round for OS X, Server and iTunes • The Register
Card Decline Leads to Speculation That Obama Was Hacked
In Plain Sight: How Cyber Criminals Exfiltrate Data Via Video
Community news from Biloxi and Gulfport, MS | Sun Herald
The Gordon Dividend Growth Model Points To Relative Strength For Intel And Microsoft - Intel Corporation (NASDAQ:INTC) | Seeking Alpha
Security, tech firm coalition fights Hikit actors, other advanced groups - SC Magazine
Redditors Accuse Popular Kickstarter Project of Misleading Customers
Sports Ministry seeks report from the PCI | The Indian Express
Are You Ready For Wearable Devices? - Security News - Trend Micro USA
What Is Google Chrome Helper, and Why Is It Hogging My CPU Cycles? | WIRED
Derbycon 2014 - Gender Differences In Social Engineering: Does Sex Matter?
Apple kills the POODLE – also fixes Shellshock in case you forgot | Naked Security
Will Apple Pay be the next iRevolution? - Washington Times
National news from McClatchy DC News | Washington DC
New Mac botnet malware uses Reddit to find out what servers to connect to | 9to5Mac
Hackers shake confidence in idealism of open-source software - SFGate
Schneier on Security: Friday Squid Blogging: 1,057 Squid T-Shirts
$42m boost for cyber security research, AsiaOne Digital News
Vulnerability Note VU#577193 - POODLE vulnerability in SSL 3.0
New type of credit card coming that aims at preventing hacking | St. Louis
FBI warns U.S. businesses of cyber attacks, blames Beijing | Science & Technology | Worldbulletin News
FBI Warns U.S. Businesses of China-backed Cyberattacks - NBC News
News from Macon and Warner Robins, GA, and beyond | The Telegraph
Phishing email delivers keylogger malware, also takes screenshots - SC Magazine
President signs Executive Order to improve payment security - SC Magazine
Candidates for 15th U.S. House stake out positions
The Security of Everything -
TD Bank settles with NJ over data breach
Jérémy Brun sur Twitter : "You pay more than 1000€ for a security conference and this is what you get for lunch. Fucking Joke #BHEU"
Obama: ‘My Credit Card Was Rejected’ - Washington Wire - WSJ
BBC News - Week ahead
Avast Antivirus update available for Download – security for free - The REM
UW-Madison scientist on front lines in fight against Ebola
Emacs 24.4 release candidate 1
Cyberswim notifies customers that payment card data may be at risk - SC Magazine
My account has been hacked - Help
Free Antivirus Program Download – Protecting your System from Disaster - Ordoh
Microsoft's Guidelines for Deploying Windows -- Microsoft Certified Professional Magazine Online
The Big Password Mistake That Hackers Are Hoping You'll Make | News OK
Sourcebooks suffers credit card data breach | CSO Online
Report: Target too focused on 'white suburban moms,' exec says -
AVG vs. Kaspersky vs. Norton – Providing you with Peace of Mind - The Fuse Joplin
New Jersey, other states settle with TD Bank over 2012 data breach |
What is the POODLE (SSL) Vulnerability?
No Easy Fix for Point-of-Sale Security - eSecurity Planet
FBI director warns of Apple and Google device encryption implications - SC Magazine
Ecuador must make 'cyber war' preparations - Correa - BNamericas
White House to Launch New Measures to Protect Against Identity Theft, Fraud - Law Blog - WSJ
Researchers reveal vulnerability of smart meters to hacking
@niftylettuce - Node.js Auth for Email/Google/Facebook on Web/iOS/Android with Eskimo
Derbycon 2014 - Introduction To System Hardening
New Security White Paper: Unified Computing System (UCS) Hardening Guide
Activity Info
Rothfus, McClelland check off the issues that separate them - Ellwood City Ledger: Local News
Facebook now actively seeks password leaks to protect its users
New Strain of Mac OS X Malware Found
Turn down for what? Obama's credit card declined
Windows Server Experts Directory Released by LeadFerret - Press Release - Digital Journal
Apple patches OS X to protect against POODLE | Computerworld
How the `Internet of things¿ will affect insurance companies
Facebook Automates Fight Against Hackers - InformationWeek
Symantec To Face Further Struggles, Could Be Acquisition Target - Page: 1 | CRN
Cloudera Unveils Cloudera Enterprise 5.2 - insideBIGDATA
UK judge: No payout to cleared hacking defendant - NewsTimes
Federal Bills Pursue Comprehensive Data Breach Notification | King & Spalding - JDSupra
How Anti-spyware Provides the Best Defense for Your Computer | Kaspersky Lab
How insurance brokers can ensure business continuity in a disaster
Cops Need a Warrant to Grab Your Cell Tower Data, Florida Court Rules | WIRED
No Page Found - Khaleej Times
Apple issues third OS X Yosemite public beta | Computerworld
New OS X Yosemite Betas Released | Ubergizmo
Lupe Fiasco Featuring Sirah “Lilies” (NEW MUSIC) | Global Grind
Arcadia — Arcadia 0.1a Launched
Prep session for upcoming Hackaton by Juniper Networks/Comcast SDN Software Workshop and Competition | Events | NYIT
The Adaptive Intelligent Firewall - J-Net Community
Cracked, Scratched and Even Dunked: Why BYODD (Bring Your Own Damaged Device) is Now the Norm « Spend Matters
President Obama’s Credit Card Declined At New York Restaurant « CBS New York
Obama's Under-Used Credit Card Declined in NY Cafe - ABC News
Target's 2013 Data Breach One Event In A Long Chain Of Breaches: Target Corporation, Michaels Companies Inc, The Home Depot, Inc., Sears Holdings Corps | Benzinga
Cartel members kidnap, kill citizen journalist in Mexico and tweet photo of her body - San Antonio Express-News
‘My life has reached its end': Hackers break into Twitter account of kidnapped anti-crime blogger | National Post
Nine Important Facts About Android Malware Risks
Vulnerability Note VU#298796 - Centreon contains multiple vulnerabilities
Police: Traffic stop near Houston may be break in Home Depot data breach case |
A Silver Lining in the JP Morgan Breach? | WIRED
New Products in Hand, Apple Tries to Reignite Interest in the iPad - News - Standard Speaker
Got Hacked? Here's How Obama Wants to Protect Your Data -
FACT SHEET: Safeguarding Consumers’ Financial Security | The White House
Apple Pay to be released Monday. Will it be the next iRevolution? -
Obama calls for greater credit card security in light of data breaches - The Washington Post
Obama launches initiative to cut identity theft - Washington Times
Police: Traffic stop near Houston may be break in Home Depot data breach case |
New Jersey joins multi-state settlement with TD Bank over data breach | Cape May County Regional
Data Breach Bulletin: Kmart, POODLE, Oregon Employment Department - Forbes
Open Nebraska to host civic hacking event this weekend : Lincoln, NE Journal Star
Ron Klain Will Be the Best Ebola Czar Yet - The Daily Beast
ICYMI: Poodle, hacking smart meters and spending big on cyber security - SC Magazine UK
US government fines Intel subsidiary over crypto exports • The Register
Cyber attacks now cost businesses $1.6m per incident - IT News from
Facebook Looks For Stolen Passwords - Business Insider
White House To Secure Government Credit Cards
Apple defies FBI and offers encryption by default on new operating system | Technology |
Dramatic increase in data breach costs - SC Magazine UK
AVG Google Nexus Tablet Giveaway - Techlicious
Derbycon 2014 - Hacking Your Way Into The Aprs Network On The Cheap
Docker 1.3 arrives with improved security | ZDNet
MobileIron joins forces with FireEye to secure mobile devices | Financial News
This Week In Credit Card News: Data Breach Hits Kmart, Will Apple Pay Kill Credit Cards? - Forbes
Secrets become history: Edward Snowden on film as Citizenfour | Ars Technica
Apple Pay to launch next week - News - The State Journal-Register - Springfield, IL
Most mobile apps will fail standard security tests, Gartner says - CNE
Ministry asks PCI to submit report on para athletes issue | Zee News
Average person has 19 passwords – but 1 in 3 don’t make them strong enough | Naked Security
Transparency reports useful, but more info needed on 'digital searches' - SC Magazine
FireEye pegs top Java exploits and EKs using them - SC Magazine
Clay Buchholz’s wife’s photos hacked? | BetaBoston
Docker beefs up security in nod to enterprise developers | SiliconANGLE
Target’s Target No Longer Just The “White Suburban Mom,” CMO Says - CMO Today - WSJ
BBC News - BBC to publish 'right to be forgotten' removals list
New planning rules brought in for waste sites | Resource Magazine
Government issues BYOD Guidance - Lexology
How Target Used Data Breach to Shake Up Its Brand | Special: ANA Annual Meeting 2014 - Advertising Age
HP adds disaster recovery to Helion cloud - Computer Business Review
Two Detroit men arrested may be linked to Home Depot breach - SC Magazine
Apple Security Advisory 2014-10-16-3 ≈ Packet Storm
Apple Security Advisory 2014-10-16-4 ≈ Packet Storm
Apple Security Advisory 2014-10-16-5 ≈ Packet Storm
Apple Security Advisory 2014-10-16-6 ≈ Packet Storm
Elastix 2.4.0 Stable XSS / CSRF / Command Execution ≈ Packet Storm
Fonality Trixbox CE Command Execution ≈ Packet Storm
Stop worrying about mastermind hackers. Start worrying about the IT guy. - The Washington Post
Police: Traffic stop near Houston may be break in Home Depot data breach case |
Apple October 16th live blog: iPad Air 2, Retina iMac and more | Apple |
Vitesse Data | Welcome
Paving The Road To Channel Marketing Success | Channel Marketer Report
Ubuntu Security Notice USN-2386-1 ≈ Packet Storm
Apple OS X Mountain Lion Tackles Problem Poodle SSL Bug ≈ Packet Storm
Debian Security Advisory 3053-1 ≈ Packet Storm
Facebook Doubles Advertising Bug Bounty ≈ Packet Storm
Apple Security Advisory 2014-10-16-1 ≈ Packet Storm
Australian Spookhaus Busted For Warrantless Tap Of Own Phones ≈ Packet Storm
Apple Security Advisory 2014-10-16-2 ≈ Packet Storm
Anonymous App Whisper Denies Tracking Claims ≈ Packet Storm
Risk Meets Reward: Windows Phone 8.1 Security Overview | Cyber Trust Blog
FBI warns US businesses of cyber attacks, blames Beijing - Economic Times
Apple OS X Mountain Lion tackles problem Poodle SSL 3.0 bug - IT News from
10 essential elements for a secure enterprise mobility strategy: Networkworld White Paper
Will Apple Pay be the next iRevolution? | The Sacramento Bee
Hacked: The six most common ways non-tech people fall victim | ZDNet
Updates, changes to security, could lessen POODLE's bite - SC Magazine
Cisco: NFGWs Ain't What They Used To Be... Or Should Be - IT-TNA | IT-TNA
The Big Password Mistake That Hackers Are Hoping You'll Make | Jeff Fox
Facebook’s new Safety Check lets you tell friends you’re safe when disaster strikes | Naked Security
Snapchat photo leak shows users' mistake was trusting each other - LA Times
New Products in Hand, Apple Tries to Reignite Interest in the iPad | Alaska Dispatch
Apple Patches OS X Mavericks for POODLE SSL Flaw
The Debian init system general resolution returns []
Derbycon 2014 - Building A Web Application Vulnerability Management Program
Mismanagement and political gain in the Ebola scare; background checks on gun purchases: Opinion roundup |
The Chinese Truly are Attacking our Critical Infrastructure
Wi-Fi Assist
10 essential elements for a secure enterprise mobility strategy: Infoworld White Paper
U.S. threatened massive fine to force Yahoo to release data - Roanoke Times: Home
Hackers strike defense companies through real-time ad bidding | Computerworld
Hackers claim victory in Lupe Fiasco 'censorship' row | Music | : Hackers use online ad bidding to target defence suppliers
Local and Breaking News from The Modesto Bee in Modesto, CA |
McAfee Upgrades Its NGFW - CRN India
Wurldtech Launches New Achilles Industrial Next Gen Firewall to Deliver Comprehensive Security for Operational Technology Environments
Tor Browser 4.0, Tails 1.2 are out
Schneier on Security: Hacking a Video Poker Machine