Pelosi: We 'need answers' on gyrocopter | TheHill
Data Breach Security Bill Passes Amid Concerns |
A Mailman's Flight of Fancy - : Marsha Mercer
The Pentagon's new cyber attack plan: 'Blunt force trauma' - Philip Ewing - POLITICO
Top cyber officials warn of limited capabilities
Israel military networks breached by hackers |
Tech News: Hackers rip Microsoft
Russian hackers use Zero-Days malware to try to get US sanctions data |
Russians are using undiscovered exploits to hack the US government
Russian hacking campaign exploited unknown security flaws
Could forensic technology be the answer to data breaches and infections? |
Computer Security News, Advice and Research | Naked Security | Page 2
MIDEAST STOCKS - Factors to watch - April 19 | Reuters
Chromium Blog: A QUIC update on Google’s experimental transport
IDF officer discharged for leaking security information - Israel News - Jerusalem Post
Russian cyber attackers used two unknown flaws: security company | Politics | World
Tombstone of Hillary Clinton's father toppled - Nick Gass - POLITICO
License to hack? - Ethical hacking - Infosecurity Magazine
US government whistleblowers left vulnerable to eavesdropping | Naked Security
Google competes in enterprise mobility space with Android for Work
Is Cloud Application Control the silver lining that any next-gen web security solution needs? |
Hackers striking across the North East bring down Durham police site in status attack - Chronicle Live : Raytheon to buy network security company Websense $1.9 bn deal
ISSA-LA Holds Seventh Annual Information Security Summit on Cybercrime Solutions | Virtual-Strategy Magazine
Cybersecurity Expert John Popolizio Joins DB Networks Board of Advisors | NewsFactor Network
Homeland chief: Gyrocopter came in 'under the radar'
Chinese-sponsored group snooping on India for a decade: Report - timesofindia-economictimes
iPad mini 2 iOS 8.3 Review
Dot Hill Systems Corporation Is Transitioning Into Higher Profits - Dot Hill Systems Corporation (NASDAQ:HILL) | Seeking Alpha
Tech Tips from Eric Geier of On Spot Techs |
Metro State data breach proves substantial | Lillie Suburban Newspapers -
IBM releases hive mind of cyber threat information to save us all- The Inquirer
Should We Kill the Social Security Number? - ABC News
DailyNews Online Edition - Cyber security firm awarded patent for innovative security methods
'Gyrocopter' Landing Reignites Debate Over Capitol Security - NBC News
Times Editorial - More, better tech at CHS is welcome news, because ‘BYOD’ has come up short - Opinion - Crookston Times - Crookston, MN - Crookston, MN
Alleged Russia-Backed Hackers Target US Gov't via Adobe, Windows - FireEye / Sputnik International
Israel Defense Forces Reportedly Infiltrated By Arab Hackers
5 years later, enhancements in rig safety
Startups take cloud-based tech savvy to legal realm | 2015-04-18 | Indianapolis Business Journal |
Cybersecurity Expert John Popolizio Joins DB Networks Board of Advisors - Press Releases on Top Tech News
Income Wise Week gives 'speed dating' for company owners
FBI Accosts Security Researcher Over Fear That He Hacked His Flight | Gizmodo Australia
Use of several contractors could leave oil, gas operators open to hackers
Use of multiple contractors could leave oil, gas operators open to hackers | TribLIVE
Use of numerous contractors could leave oil, gas operators open to hackers
Tech News Recap: EVIDENCE of alien colonies, Putin memes made ILLEGAL and Windows HACKED | Tech | Life & Style | Daily Express
Russian cyber attackers used two unknown flaws: security company | TODAYonline
Hackers cash in on online payday loans | TribLIVE
Investigators: Hackers Hit Diplomatic Targets Via Software Flaws
Sony Attorney Warns Media After WikiLeaks Hacked E-Mail Rehash | Deadline
Google takes on real-time big data analysis with new cloud services | PCWorld
Why Social Security Reform Will Never Happen (And Why That Shouldn't Worry You)
WikiLeaks posts searchable database of Sony e-mails, documents - The Washington Post
Sefko: How do Mavericks go about facing daunting duo of Harden, Howard in playoffs? | Dallas Morning News
If the Deep Web becomes searchable, is it still deep? 60 Sec Security | Naked Security
Grant application seeks to help homeless in Pittsburg - Joplin Globe: Local News
Chris Roberts of One World Labs and Fox pulled off flight by FBI after revealing security flaws | Daily Mail Online
FBI Accosts Security Researcher Over Fear That He Hacked His Flight | Gizmodo India
Four-year-old child causes White House lockdown | Daily Mail Online
Homeland chief: Gyrocopter came in 'under the radar' - The Star Democrat - Easton, Maryland: State
Agile proves to be a big help in keeping up with fickle users | ZDNet
Russian Hackers Use Zero-Days to Try to Get Sanctions Data - Bloomberg Business
IDF network reportedly infiltrated by hackers | The Times of Israel
Russian cyber attackers used two unknown flaws: security company | Reuters
Check Point CEO Hustles to Stay on Top Amid Cyber Stock Surge - Bloomberg Business
Apple FileVault 2: Full disk encryption software overview
Software Company Anahata Announce Introduction of Ubuntu 14.04 for Java Developers | Benzinga
FBI Accosts Security Researcher More than Worry That He Hacked His Flight
DCF suffers major security breach | News - Home
Michael Nozzolio announces senate cyber terrorism committee hearings - News - Wayne Post - Wayne County, NY
Marine leaders fight to bolster cyber capabilities
The Jewish Press » » Hackers Reportedly Infiltrate IDF Computer Network
Cybersecurity bill could let companies trade info on hackers - San Antonio Express-News
Inflight entertainment exposes airliners to hackers: US report - Tech News | The Star Online
Google speeds up data transfers with Quick UDP Internet connections | ZDNet
IDF denies army networks compromised after hacking | i24news - See beyond
Red94 Playoff Preview Roundtable - Red94 | Houston Rockets news and musings
Attorney General: Anthem breach, tax fraud spike not connected
IT competence is not optional - The Manila Times OnlineThe Manila Times Online
Chinese hackers target Southeast Asia, India, researchers say | Latest News & Updates at Daily News & Analysis
Researchers Say Arab Hackers Attacked IDF Systems - Defense/Security - News - Arutz Sheva
Hackers port Microsoft’s Cortana voice assistant to Android | Mobile |
Oh, The Places You Will Go With Hackers | TechCrunch
How NZ and US agents plotted to spy on China - National - NZ Herald News
Report: 29 million healthcare records compromised in past four years
Target Settles MasterCard Data Breach Lawsuit for $19 Million - Tech Trends on CIO Today
No shield for corals in storms | Inquirer News
How to run Android apps on any laptop or desktop - The Times of India
ISC Cloud & Big Data Keynote to Focus on IT Transformation at DZ Bank - insideHPC
Net Politics » Cyber Week in Review: April 17, 2015
Inflight Wi-Fi Makes Planes Vulnerable to Cyberattacks From Terrorists
OrangeSec Italian hacker group claims to have brought Microsoft's Cortana to Android
Windows 10 Universal Apps Update Coming To Phones - InformationWeek
Top stories of the week
Security Concerns Raised In DC After Gyrocopter Lands On Capitol Lawn | NewsRadio KFBK
Top iOS news of the week: Halo, WWDC, Apple buys keyboard | ZDNet
7 Deadly Sins That Get Users Hacked - Dark Reading
Mumbai to have a local CERT unit to fight cyber crimes - The Times of India
UPDATE: Target Confirms It Has Negotiated A $19 Million Data Breach Settlement With MasterCard | Mintz Levin - Privacy & Security Matters - JDSupra
Top Android news of the week: Cyanogen, Verizon on security, install apps in search | ZDNet
3 things to know: Thursday, April 16, 2015
Symantec: Beware insider cyber attacks, malwares and spam mails threats
Cartoon: The Insider Threat - Dark Reading
Harnessing The Power Of Cyber Threat Intelligence - Dark Reading
Multiple Jonesboro physicians, dentists affected by nationwide d - KAIT Jonesboro, AR - Region 8 News, weather, sports
Google Chrome extends Windows XP support |
PayPal Wants You to Inject Your Username and Eat Your Password - Digits - WSJ
Give your iPhone or iPad a storage boost | ZDNet
Community stepping up to cybersecurity threat - San Antonio Express-News
Kerugian Akibat Malware Pencuri Uang Rp 130 Miliar Sebulan
Target reveals $19m data breach settlement with Mastercard - Essential Retail
Data breaches exposed 29 million US health records in 4 years
SSCC 194 – Patch early? Patch often? This time, “Patch NOW!” [PODCAST] | Naked Security
Business Briefs: Sprinklr Acquires SF-Based Get Satisfaction - India West: Business
Security analytics can help marketers to spot data breaches effectively
UniKey Raises Oversubscribed $10 Million Round For Smart Lock Technology - Forbes
PressTV-Hackers infiltrate Israel army networks
The Tech Take: 3 Big Skills of the Future-Ready Firm | Accounting Technology
Hacking into your home: TVs, refrigerators could be portal to most sensitive info | Fox News
Cybersecurity Expert John Popolizio Joins DB Networks Board of Advisors - Press Releases on CIO Today
Israeli military networks breached by hackers: researchers | TODAYonline
Nozzolio announces public hearings to address cyber crime - News - Brighton-Pittsford Post - Brighton, NY
The 2016 election cyber war is well underway - News - - Portsmouth, NH
Another Voice: Seventy years after the liberations of Hitler’s death camps, the threat of genocide remains - The Buffalo News
Iran poses growing cyber threat to US interests, study says - The China Post
Washington Amends its State Data Breach Notification Law | Reed Smith - JDSupra
House Panel OK's Cyberthreat Info Sharing Bill
Cybersecurity pros slam threat information-sharing bills -
Microsoft unveils touch-friendly Office apps for Windows phones - Business Today
Stock Update (NASDAQ:SYMC): Symantec CEO says pressing ahead with Veritas spin-off
The suicide bomber in cyber crime law
Teaching tech: Educators embrace digital media in classroom - Valley Morning Star : Local News
SCAM ALERT: Hackers make their rounds on computers in Texoma - - No One Gets You Closer
Another Voice: Seventy years after the liberations of Hitler’s death camps, the threat of genocide remains - Opinion - The Buffalo News
Rockets vulnerable to hacking strategy - Houston Chronicle
FBI pulls security expert from United flight | Business - Home
New technology leads to burglary arrest - Crime & Courts
Microsoft finally brings touch-friendly Office apps to Windows phones - IBNLive
Anthem subsidiaries face Missouri lawsuit over data breach - News - The Rolla Daily News - Rolla, MO - Rolla, MO
Wife of Florida gyrocopter pilot speaks about his arrest - | Continuous News Coverage | Acadiana-Lafayette - Homeland chief: Gyrocopter came in 'under the radar'
Microsoft's SharePoint Server 2016 Beta to Arrive in Q4
TigerText bringing HIPAA compliant messaging to Apple Watch
Android for Work Comes to Google Play - Enterprise Software on CIO Today
FBI pulls security expert from United flight | Money - WAPT Home
Hackers could hijack aeroplanes through passenger Wi-Fi, report warns
Ini Modus Pembobolan Rekening Nasabah Melalui "e-Banking" -
Judge Preliminarily Approves Settlement of $10 Million in Target Consumer Data Breach Action | Butler Snow LLP - JDSupra
Rethinking The Cyber Domain And Deterrence - Analysis - Eurasia Review
Mom calls for tougher DWI laws after daughter’s death |
Juniper Boosts Speed of SRX5800 Security Gateway
Cyber compliance does not always equal risk management, Deloitte report finds
San Francisco Bay View » Less than one lifetime: Eyewitness to nuclear development, from Hunters Point to Chernobyl and Fukushima, issues a warning
Apple Pay coming to Canada this fall | Cult of Mac
An Error has Occurred
Terrorists' cyber-threat to the world - Technology - NZ Herald News
Debating the Iranian cyber threat -- FCW
Do you need a wearable device policy?
Contra Costa Times editorial: Attack on U.S. from cyberspace a real possibility -
Geo-inference attacks: how the websites you visit can tell hackers where you are
Hackers use new geo inference attacks to identify your exact location - TechSpot
Barracuda Eyes Bigger Bite Of Cybersecurity Market -
Data protection authorities 'facing considerable resource challenges' due to digital boom - 17 Apr 2015 - Computing News
Advocates march for change in DWI laws - MyFoxAustin | KTBC | Fox 7 Austin | News Weather Sports
Microsoft brings its new Maps app to Windows 10 preview for phones | VentureBeat | Mobile | by Jordan Novet
Symantec, Intel, Cisco share biggest security issues in 2015 - Silicon Valley Business Journal
Doug Hughes flew gyrocopter to protest campaign financing - The Morning Call
Pro hacker removed from flight by FBI at Hancock Airport : News :
90% of security incidents trace back to PEBKAC and ID10T errors | Computerworld
Verizon Report Shows 'Sizable Gaps' In Cybersecurity Measures
Android for Work Comes to Google Play - Mobile Tech on Top Tech News
Sony Pictures condemns Wikileaks release of documents from hackers - The Economic Times
Russian-linked hackers went after Obama's YouTube interviewers | TheHill
Calling all hackers: AT&T wants you! | Malled!
FBI pulls computer security expert off flight, after he tweets about hacking its systems - CNE
TidBITS: Keeping Up with the Snoops 9: Junk in the PRISM Trunk
Barracuda Eyes Bigger Bite Of Cybersecurity Market CUDA IBM CHKP -
2016 BMW 7 Series Prototype First Drive
Fearing United plane was hacked, FBI pulls security expert off flight - Apr. 17, 2015
Hackers keep trying new targets in search of easy data : News :
Why businesses are still vulnerable to cyberattacks - Jacksonville Business Journal
Microsoft Promises ‘Universal’ Office App For Phones Running Windows 10 This Month | TechCrunch
How To Enable Stealth Mode in Yosemite - The Mac Observer
Canadian Bankers Balk at 'Onerous' Apple Pay Terms - The Mac Observer
Google to support Chrome browser on Windows XP till the end of 2015 | Maine News Online
Google Chrome To Support Windows XP Till End Of 2015
How to run Android apps on any laptop or desktop | TechRadar
What Surprises Dell Research Has in Its Five-Year Product Plan
Perry Focuses On Border Security In New Hampshire | The Daily Caller
Target Settles MasterCard Data Breach Lawsuit for $19 Million - Customer Data on Top Tech News
Homeland Security chief: Florida mailman flew gyrocopter to Capitol 'under the radar' | Tampa Bay Times
Schneier on Security: Friday Squid Blogging: Squid Hoodie
Former IT manager faces seven charges in federal indictment - SC Magazine
Cybersecurity bills move forward on Capitol Hill - SC Magazine
New Laws for New Threats Like Drones and Bioterrorism - WSJ
APT Group 'Pawn Storm' Ratchets Up Attacks
Study: Average organization has 4,000 instances of exposed credentials stored in the cloud - SC Magazine
Flash EK leveraged in potentially widespread malvertising attack - SC Magazine
It is Time for a Cyber FDIC | Dante Disparte
China suspends tech requirements that drew global concern - SC Magazine
'Money Smart Week' - Petoskey News-Review: Community
Canadian banks play hard ball with Apple Pay's moving north | Computerworld
Mobile ID World | AppHawk Offers Enterprise-Level Security for Employees’ Mobile Devices
Medical Records Under Threat from Data Breaches - Health on Top Tech News
'Islamic State Hackers' target Ithaca real estate blogThe Ithaca Voice
Timothy H. Edgar | Reforming The NSA | Foreign Affairs
Cyber Advanced Warning System sounds the alarm on security threats - TechRepublic
Six Clicks for Linux beginners: Ubuntu 15.04, Vivid Vervet | ZDNet
Hacker in serious trouble with authorities for tweeting about 'playing' with the plane communications mid-flight
Pengguna Internet Bangking Sasaran Hacker - Kalteng Pos
Anthem customers say stolen personal data used to file fraudulent tax returns | FOX C
Anthem data breach possibly linked to tax return fraud -
Hands-On With Microsoft's New Windows 10 Office Apps
Member of group that hacked Farmers Insurance, DirecTV, sentenced to 3 years - SC Magazine
Snowden: "Dopo Charlie Hebdo sempre più sorvegliati. Rischiamo il più grande sistema di oppressione della storia" -
Google fixes potential revenue-stealing “comment cloning” YouTube bug | Naked Security
PCI DSS 3.1 Reinforces Payment Security Compliance
Failure to Maintain PCI Compliance Exposes Online Retailers to Security Breaches
Researchers: Israeli military networks breached by hackers - Israel News, Ynetnews
Pat Calhoun, Author at McAfee
Breaking Beebone: Global Takedown, Local Shut Down - McAfee
Google Updates Docs, Sheets, Slides, And Drive With New Features On Android Devices |
FBR Capital Markets gives Apple trillion-dollar valuation with $185 price target
Android for Work Comes to Google Play - Mobile Tech on CIO Today
7 Deadly Sins That Get Users Hacked
Gurucul identifies cloud threats based on identity, behaviors | CIO
8 cloud companies to watch following MONSTER funding week | Network World
Gurucul - Predictive Security Analytics
Oracle Releases 14 Java Security Patches, Last Patch Update for Java 7 -- ADTmag
Will Check Point (CHKP) Surprise Q1 Earnings Estimates? - Analyst Blog -
Call Center Threats Grow
Naval Academy wins cyber competition against NSA hackers, other schools - Baltimore Sun
Hackers allegedly bring Microsoft's Cortana to Android | VentureBeat | Dev | by Emil Protalinski
Hackers increasingly target banks and their employees, not customers | Business Insurance
Teenagers suspected of hacking Belgian and French websites - Europe News & Top Stories - The Straits Times
What's inside the 2015 Verizon DBIR?
New bill would protect security research hacking | TheHill
Iran Stepping Up Its Hacking Activities Against US, Study Says
Cyber spies hacked Israeli army networks, security researchers say - Diplomacy and Defense - Israel News | Haaretz
Pawn Storm cyberespionage group increases activity, targets NATO - Reseller News
Cyber Legislation On The Move: Data Breach Bill Passes Out Of Committee - Data Protection - United States
Anthem customers in Connecticut say stolen personal data used to file fraudulent tax returns
Senators Propose Data Breach National Standards - Law360
What to Expect from Fortinet (FTNT) this Earnings Season? - Analyst Blog -
Windows 10 Universal Office Apps for Phones Coming This Month | News & Opinion |
Office Universal preview arriving for Windows 10 Mobile this month | Windows 10 content from SuperSite for Windows
ISIS online strategies and recruiting techniques | CIO
Google to support Chrome on Windows XP until end of this year - CNE
The Morning Risk Report: Compliance Won’t Prevent Hacks - Risk & Compliance - WSJ
PCI DSS Version 3.1 - What's New? - BankInfoSecurity
Homeland chief: Gyrocopter came in 'under the radar' - WNCN: News, Weather, Raleigh, Durham, Fayetteville
Startup TruStar Platform Lets Enterprises Anonymously Share Security Breaches
Phishing and hacking represents 70% of cyber attacks
Critical Windows vulnerability affects at least 70 million websites | Netcraft
Verizon Data Breach Investigation Report: 10 Common Vulnerabilities Exposed | Managed Security Services content from MSPmentor
Pawn Storm cyberspy group targets NATO, other gov't agencies | Computerworld
These key restrictions won't help Google in the EC's Android antitrust probe | ZDNet
Could Sony hack take place to a lot more businesses?
HSBC mortgage customer info was publicly accessible on the internet - SC Magazine
Github publishes first transparency report - SC Magazine
Cyber War Can Be Real War.
Apple Inc. (AAPL) Superior Ecosystem Will Drive Valuation To $1 Trillion: FBR Capital
5 Ways Digital Work Will Change Data Centers
Will Check Point (CHKP) Surprise Q1 Earnings Estimates? - April 17, 2015 -
Israel military networks breached by hackers: researchers | Reuters
Medical records vulnerable to hackers study finds
NPR’s Gas Pains » CounterPunch: Tells the Facts, Names the Names
Cyber Thieves Hacking Your Files for Ransom
Troy, New York hacking event part of AT&T civic app challenge - Albany Business Review
WikiLeaks publishes huge searchable archive of hacked Sony documents | Naked Security
What's next for Microsoft's 'universal' Office apps | ZDNet
Anthem Data Breach Victims Urged To Sign Up For Free Credit Monitoring « CBS New York
Target Announces $19M Data Breach Settlement With MasterCard
What to Expect from Fortinet (FTNT) this Earnings Season? - April 17, 2015 -
OptioLabs Unveils New Anti-Malware Product, OptioGrizzly, at RSA
Report: Apple planning Apple Pay launch in Canada for November | 9to5Mac
Apple Planning November Launch of Apple Pay in Canada - Mac Rumors
OS X Server 4.1: Change log - potential problems and solutions - TechRepublic
Chinese mPayment Platform Gets Gov't Advice on Biometrics - FindBiometrics
Windows 7 Or Windows 8.1: Should You Upgrade? – MotoringCrunch
IT's cloud security concerns do not correlate to actual failures | InfoWorld
Hawk Defense Partners With FireHost to Provide Advanced Threat Detection Services | Virtual-Strategy Magazine
Chris Christie says his Social Security plan hurts the rich, but it really hurts the poor - Vox
Dennis Fisher and Mike Mimoso Discuss the Windows HTTP.sys Vulnerability and More | Threatpost | The first stop for security news
Google Moving Toward Encrypted Ad Services | Threatpost | The first stop for security news
Point Of Sale Payment Processing And Data Collection News From March 2015
Target Settles MasterCard Data Breach Lawsuit for $19 Million - Network Security on CIO Today
Homeland chief: Gyrocopter came in 'under the radar' - SFGate
Minecraft security vulnerability found, allows users to crash servers remotely
Top 10 smart home gadgets and appliances | ZDNet
Climbing the career ladder: What do you need on your CV to make it to the top in tech? | ZDNet
A time to lead | The Indian Express
'Arab hackers believed to have breached Israeli military networks' - Arab-Israeli Conflict - Jerusalem Post
Active DoS Exploits for MS15-034 Under Way | Threatpost | The first stop for security news
How Ionic Says It Makes Data Breaches Irrelevant - Dark Reading
Google launches Android for Work on Google Play to bolster BYOD endeavors : Software/OS : iTech Post
Apple Inc. On Path To Be A Trillion Dollar Company: Analyst
Why BYOD Could Lead To Lawsuits For Employers - Employment and HR - United States
Marble Security Seeks Mobile Intelligence Partners | Network Security and Data Protection Software Solutions content from The VAR Guy
Smaller Businesses Drive Big Data's Growth | Seeking Alpha
Gartner: Security analytics could be crucial for breach detection
Google's Chrome just got better on your iPhone or iPad | ZDNet
Dr. Chase Cunningham - Authors & Columnists - Dark Reading
Inside the 4 Most Common Threat Actor Tools
Google Play User Says Hackers Stole Thousands In Purchases - Law360
Apple Inc. Is Catching Up to Its Most Powerful Rival (AAPL)
Elastica nabs another Palo Alto Networks big shot - 17 Apr 2015 - CRN UK News
Internet hacking group explains actions after in-custody death in Vineland - News
Sony hacking scandal far from over - NBC News
Pawn Storm cyberespionage group increases activity, targets NATO | PCWorld
Twin Cities Business | Recent News
New technology leads to lone burglary arrest - Crime & Courts
OptioLabs Unveils New Anti-Malware Product, OptioGrizzly, at RSA | SYS-CON MEDIA
Insufficient SMB security among major issues highlighted by reports
Defending the corporate network from cybercrime - New Hampshire Business Review - April 17 2015
Microsoft Pushes Back SharePoint 2016 Release to Next Year -- Redmond Channel Partner
Microsoft pushes back next SharePoint Server release to Q2 2016 | ZDNet
PC Magazine Cloud Channel |
Major Apple TV Update Planned For WWDC 2015 on June 8 | TechBeat
How to Build a Portfolio of Tech Stocks
Google Gives Windows XP Users a Chrome Reprieve | Windows XP content from Windows IT Pro
Spent 15 minutes with five Apple Watch bands, left Apple Store and ordered a Garmin Vivoactive | ZDNet
Popular Home Automation System Backdoored Via Unpatched Flaw
Popular Home Automation System Backdoored Via Unpatched Flaw - Dark Reading
Vormetric Announces Cloud Encryption Gateway - Protects Data Within AWS S3 and Box
EY Sees Barriers to Use of Big Data for Audits -
Symantec, Intel, Cisco and other security companies share tips - Silicon Valley Business Journal
Target Settles MasterCard Data Breach Lawsuit for $19 Million - Network Security on Top Tech News
AirDroid app fixes severe authentication vulnerability - PC World New Zealand
Security expert pulled off flight by FBI after exposing airline tech vulnerabilities | Fox News
Pawn Storm cyberespionage group increases activity, targets NATO | ITworld
Email Phishing Attacks Take Just Minutes to Hook Recipients | WIRED
Russian-linked hackers target White House & Nato, says Trend Micro - Computer Business Review
How Corporations and Law Enforcement Are Spying on Environmentalists
Cyberterrorism : is there a European response ? | euronews, u talk
Cyber crime bill is all set for final approval from NA | The News Teller
How Twitter is fighting trolls while balancing freedom of speech | ZDNet
Pawn Storm cyberespionage group increases activity, targets NATO | CIO
The future of SCADA-control security | CSO Online
Attacks against industrial control systems double | CIO
Operation Pawn Storm Ramps up its Activities; Targets NATO, White House | Trend Micro Security Intelligence Blog
Duo Security Expands Beyond Two-Factor Authentication With $30 Million In Series C Funding - Forbes
'Game of Thrones' Offers Strategy Model for Enterprise Mobility World
Home Automation Systems - A Consumer Checklist
WikiLeaks Publishes Over 30,000 Documents From Sony Hack | Rolling Stone
Sony Pictures condemns Wikileaks release of documents from hackers | Reuters
3 arrested for hacking UPPCL online billing system | Business Standard News
Juniper Networks Introduces its Fastest Firewall | News |
Cyberoam Awarded Patent for Innovative Layer-8 Security Method | News |
Update Me
The Upload: Your tech news briefing for Friday, April 17 | CIO
Update: Wikileaks publishes searchable database of hacked Sony docs | Computerworld
Hacker In Trouble With Feds After Tweeting About 'Playing' With Plane Comms Mid-Flight - Forbes
Three arrested for hacking UPPCL online billing system | Zee News
Ternyata, Pembobol Tiga Bank Besar di Indonesia Bukan Orang Indonesia - Tribun Pontianak
Microsoft pulls Windows 10 preview for low-end Lumias after 'bricking' reports' | ZDNet
Zero Day Weekly: Active Microsoft zero-day, Oracle kills Java, D-Link snafu, more DHS cyber-negligence | ZDNet
Dems fear late add could blow up cyber push | TheHill
ICO probed 173 law firms last year over data breach fears - Computer Business Review
OptioLabs Unveils New Anti-Malware Product, OptioGrizzly, at RSA | Business Wire
Could a hacker *really* bring down a plane from a phone in seat 12C? | Naked Security
Schneier on Security: Blog Entries Tagged no-fly list
Schneier on Security: The No-Fly List and Due Process
Dropbox launches bug bounty program - SC Magazine
Ransomware: Pay it or fight it?
Cyber extortion: A growth industry | CIO
Cloud shopping: Is iCloud Photo Library the best value for your dollar? | Macworld
Google Chrome on Windows XP support extends until the end of 2015
Google, WordPress, LastPass, Salesforce - new USB token secures them all | Security | Techworld
Boston Police Use Marathon Security To Expand Video Surveillance Network | WBUR
UN asks if robots should be allowed to kill humans | Naked Security
Kenya rights group shutdown 'harming counter-terrorism efforts' | The Guardian Nigeria
How to password-protect your Mac--and keep other people from using it | Macworld
Target’s settlement with MasterCard costs retailer $19 million | Naked Security
Samsung Galaxy S6 review: Superb screen and great camera make it the best Android yet | ZDNet
Another French TV Station is Hacked as Attackers Steal Personal Data - Infosecurity Magazine
3DIcon Well-Positioned as Interest Grows for Cyber Technologies
Tampering with US voting machine as easy as ‘abcde’, audit finds | Naked Security
Internet @ - News, Features and Essential Information for IT professionals
Hackers attack Huron County Sheriff's Office | Norwalk Reflector
New Dark-Web Market Is Selling Zero-Day Exploits to Hackers | WIRED
New Report Reveals That Iran Is Quickly Becoming a Significant Cybersecurity Threat | Business Wire
Google extends Chrome support for 'millions' still on Windows XP | ZDNet
Practical IT: What you need to know about email encryption | Naked Security
Open for business: Android for Work shows up on Google Play | ZDNet
Begini Cara Perampok Curi Uang Anda Lewat Antivirus dan Internet - Tribun Timur
Gawat! Malware di Komputer Nasabah tak Bisa Dihapus -
Public-Facing Web Assets Expose Banks to Greater Risk - Infosecurity Magazine
Maine dairy farmers divided on raw milk sales restrictions - Brattleboro Reformer
Avionics Magazine :: Cockpit Avionics at Risk, GAO Report Says
Google extends Chrome support for Windows XP to the end of 2015
Google extends support for Chrome on Windows XP | Expert Reviews
Memex – DARPA’s search engine for the Dark Web | Naked Security
Lost your Android? Now you can Google it! | Naked Security
Prioritizing Health Care Data Security :: Security & Resiliency | SYS-CON MEDIA
Boston Marathon Surveillance Raises Privacy Concerns Long After Bombing : NPR
Google boosts cloud-based big data services | Business Cloud News
Somali Shebab University Massacre Gunmen Were Kenyans: Report
Somansa Announces New Global Channel Reseller Partner Program | Benzinga
Homeland chief: Gyrocopter came in 'under the radar' - WCIV-TV | ABC News 4 - Charleston News, Sports, Weather
No Cookies | Perth Now
Playing Host to the Hacker - Infosecurity Magazine
Securosis Blog |
Securosis Blog | LAST CHANCE! Register for the Disaster Recovery Breakfast
Chef aims to create the secret recipe for DevOps success | ZDNet
How enterprise architecture can deliver business value from IoT: Gartner
Wikileaks publishes Sony's hacked email for anyone to go through | PCWorld
Boeing rejects fears computer hackers could take over jets | Plane Talking
OJK: Pembobolan Internet Banking Hanya Rp 5 Miliar -
Diretipideksus Usut Kasus Pembobolan Rekening Nasabah Tiga Bank
Manfaatkan Aplikasi Antivirus, Sindikat Kuras Uang Nasabah E-Banking - Banjarmasin Post
Horizon Avoids Data Breach Class Action For Lack Of Standing | King & Spalding - JDSupra
Massive Data Breach: Target Settles Suit With MasterCard |
Protocols, Security, and The IoT | SYS-CON MEDIA
The Economics of Persistent Cyber Attacks - Forbes
Homeland chief: Gyrocopter came in 'under the radar' : News
Verizon Releases 2015 Data Breach Investigation Report
Hackers Using Old Tricks To Snare Victims in Their Cyber Traps | Sci-Tech Today
Verizon 2015 Data Breach Investigations Report Finds Cyberthreats Are Increasing in Sophistication | Technuter
Verizon's yearly reminder that we're still useless at infosec | ZDNet
NBN Co reshuffles executive team after Telstra deal | ZDNet
Data is Coming: Game of Thrones meets Business Intelligence | SmartData Collective
Still waiting for your tax refund? It could be hackers |
WikiLeaks posts documents stolen by Sony hackers - NBC News
Threat from hackers and cybercriminals growing in Canada: reports
Government Agency Warns Airplanes At Risk of Hacking - Techlicious
Ransomware: What you need to know -
Target announces $19 million data breach settlement with MasterCard | Business Insurance
Hackers move from retail to health care, may target education next, say security researchers
ChannelLife NZ - Cloud security: What enterprises of today require
Apple seeds first OS X 10.10.4 beta to developers for testing
NewSat falls into administration | ZDNet
Guns on airplanes: TSA outlines how to legally carry gun with airline luggage | Local News | Times Free Press
4 no-bull facts about Microsoft's HTTP.sys vulnerability | InfoWorld
Symantec computer security report highlights the biggest vulnerability issues of 2014 - Silicon Valley Business Journal - Stocks to Watch
wearable devices in enterprise
Wearables Gaining Popularity In Business
UPDATE 1-Sony Pictures condemns Wikileaks release of documents from hackers | Reuters
The NSA's Fight To Keep Its Best Hackers - Defense One
VMware announces EVO:Rail partners for Asean | ZDNet
Police confirm car hacking is occurring in Australia
Suspicion strong that Aussie teen wiz hacked Metro State website | Star Tribune
How Terrorists Are Turning Robots Into Weapons - Defense One
Expert: Terrorists Hacking Into Robots, Drones to Use as Weapons
Official: Commercial IT fuels DOD information environment - The Fort Campbell Courier: News
Chris Back's animal protection bill vital to protect against radical activism: Agribusiness lawyer - Beef Central
Comodo Updates Next Generation Data Loss Prevention Solution -- CLIFTON, N.J., April 16, 2015 /PRNewswire/ --
New Zealand link to hardline forces - Politics - NZ Herald News
Target will settle with MasterCard for $19 million following 2013 security breach - AfterDawn
College security breaches: Where they’ve happened and how to prevent them | USA TODAY College
Patch Wednesday: Adobe Flash Player update for IE10 and IE11 rolling out | Patch Tuesday content from Windows IT Pro
Just-released Minecraft exploit makes it easy to crash game servers | Ars Technica
Telstra's restructure exec to retire | ZDNet
Iran poses growing cyber threat | Bangkok Post: tech
WikiLeaks republishes hacked Sony data in searchable database - CNE
Oakland Tribune editorial: Attack on U.S. from cyberspace a real possibility -
Wikileaks publishes searchable database of hacked Sony emails - Apr. 16, 2015
Sony: The Sequel, as WikiLeaks wades into hacking fray
ISIS sympathizers linked to hacking of Leeds nonprofit site | WIAT 42
HSBC Notifies US Customers Of Data Breach
Data breaches inevitable, endangering students, families
Computer hacker likely exposed data of 160,000 at Metropolitan State University | Star Tribune
Google to pull Chrome plug on Windows XP at year's end | Computerworld
Microsoft Releases 4 'Critical' Bulletins for April's Security Update -- Microsoft Certified Professional Magazine Online
IBM unbolts vast threat database to fight cybercrimes | Network World
IBM to release 20 years worth of cyberthreat data
IT Help Wanted, Especially Security Experts
Gyrocopter Pilot in Court Video - ABC News
Mailman in Capitol gyrocopter landing charged and ordered to home detention | US news | The Guardian
HSBC Notifies Consumers of Mortgage Information Breach - Infosecurity Magazine
Sony execs lobbied Netflix to stop VPN users | ZDNet
Some taxpayers affected by Anthem security breach face frustrating journey to file returns |
Critcal Adobe Flash Player patches include fix for exploited zero day flaw | PCWorld
Minecraft vulnerability leaves servers exposed to forced crashes - PC Gamer
Safe internet wanted, but security issues require data: GCCS kicks off - NL Times
National Assembly body approves controversial cyber-crime bill | Business Recorder
NA body approves bill against electronic crimes
Apple heading to $1 trillion in a year: Analyst
Next SharePoint Server Product Now Expected in Q2 2016 --
Inflight systems vulnerable to hackers: report - Taipei Times
Ransomware is a scary and lucrative tool for hackers - San Jose Mercury News
Study – Iran poses growing cyber threat to US - The Times of Israel
'Heartbleed' bug in OpenSSL leaves encrypted communications at risk | Computerworld
Experts boost threat level, call for patching critical Windows bug ASAP | CIO
Is SSL Hurting More Than Helping Middle East Organizations | MENAFN.COM
WikiLeaks makes Sony's hacked emails searchable - Business - CBC News
Class action lawyer blasts Target’s data breach deal with MasterCard
Target to Pay MasterCard Banks $19M to Settle Data Breach Claim
Remarks by President Obama in Working Mothers Town Hall
Puerto Rico exports its addicts to Chicago | THE GATE Newspaper
Apple Seeds OS X Yosemite 10.10.4 Beta | Ubergizmo
Dropbox integrates with Office Online: News tech leaders need to know | Financial Post
Big data, analytics, & DaaS market trends & 2019 forecast report just published - WhaTech
Big Data Technology for Manufacturing - insideBIGDATA
Google takes on real-time big data analysis with new cloud services - PC World Australia
Merkle Response Management Group Achieves PCI DSS 3.0 Level 1 Compliance | Business Wire
IBM Launches Open Threat Intelligence Platform - Infosecurity Magazine
Homeland chief: Gyrocopter came in 'under the radar' | The Kansas City Star The Kansas City Star
Data breach notification bill could weaken consumer protections | Computerworld
GAO: Newer aircraft vulnerable to hacking | Politics - WESH Home
Adobe patches 22 vulnerabilities in Flash Player plus ColdFusion and Flex flaws | Security | Techworld
Adobe Security Bulletin addresses Flash Player, ColdFusion, Flex vulnerabilities
China backs away from banning foreign tech companies from banking sector |
Public-private partnerships a way to tackle well-organized and sophisticated cyber criminals
Nozzolio announces public hearings to address cyber crime - News - Irondequoit Post - Irondequoit, NY
PCI Security Standards Council Revises PCI DSS V. 3.1 - Infosecurity Magazine
ServiceNow delivers strong Q1, but Q2 outlook light | ZDNet
FBR Capital Starts Apple (AAPL) at Outperform
FBR: Apple Worth $1 Trillion - Apple Inc. (NASDAQ:AAPL) | Benzinga
Making the Case for Cloud Security in Government | CSO Online
Sony Pictures condemns WikiLeaks' release of hacked material - LA Times
Sony condemns WikiLeaks release of documents stolen by hackers — Nation — Bangor Daily News — BDN Maine
Iran poses growing cyber threat to US | Daily Mail Online
Hacking group explains actions after in-custody death in Vineland - News
IT manager accused of hacking into ex-Northbrook employer's emails - Lake County News-Sun
Sony Pictures hit by WikiLeaks document dump | New York Post
Report: Iranian Hackers Eye U.S. Grid - The Daily Beast
Vulnerable Dell support tool now detected as risky software - PC Advisor
Protecting consumers from ID theft goal of Blunt's new bill : News
Target to Pay MasterCard $19M to Settle Data Breach Lawsuit - April 16, 2015 -
Homeland Security Today: Legislation Reintroduced to Protect Consumers from Identity Theft, Fraud
Sony to plough cash into Brazilian mobile market | ZDNet
When Should You Outsource Security? - Health Data Management Blogs Article
How 1 Meter of Orange Plastic Tape Could Change Your Security Business - Article from CE Pro
TechBits: Analyzing medical data, breaking smartphones - WKOW 27: Madison, WI Breaking News, Weather and Sports
First OS X Yosemite 10.10.4 beta for Mac developers now available | 9to5Mac
Apple Releases 10.10.3 Supplemental Update - The Mac Observer
Apple Seeds First OS X 10.10.4 Yosemite Beta to Developers - Mac Rumors
Cyanogen Announces Strategic Partnership With Microsoft
Google Extends Chrome Updates for Windows XP Users | News & Opinion |
Resolution1 lays off global marketing team, focuses on customers, R&D; - SC Magazine
POS threat 'Punkey' allows additional malware download for greater access - SC Magazine
Yikes: 10,000 IRS impersonation scam calls are placed every week | Network World
IBM unbolts vast threat database to fight cybercrimes | CIO
Big Data Looms as Next Battle in Europe - WSJ
IBM Security Opens Up Library of Malware and Threat Intelligence | Xconomy
Cybersecurity, Data Science and Machine Learning: Is All Data Equal?
This New Interactive Film Shows Who's Watching You Online - Forbes
How to maximize your Social Security benefits
Researchers identify new targets in 'Operation Pawn Storm' campaign - SC Magazine
Banking industry security protocol falters in third-party vendor contracts - SC Magazine
Small businesses in UK battling wave of card breaches, says Worldpay -
FBI, Homeland Security officials' addresses leaked
Reddit User Finds Security Flaw In Burlington Electric Online Payment System | Vermont Public Radio
Just because it's virtual, doesn't mean it's not real: digital extortion is on the rise | Al Bawaba
Unmasking the Masque attack: Inside the iOS security flaw
Israeli Cyber Expert: Next 9/11 Will Happen Without Suicide Terrorists Aboard the Plane | SYS-CON MEDIA
Iran poses growing cyber threat to US: Study | Zee News
Study: Iranian Cyber Warfare Capabilities Increasing Exponentially - Breitbart
Redbooth's Award-Winning Collaboration Platform Named as Gartner's "Cool Vendor" in Unified Communications
Sonasoft's Move into Banking Could Pay Big Dividends - MarketWatch
Cybersecurity expert Keren Elazari lauds 'good hackers' at Halifax conference - Nova Scotia - CBC News
WikiLeaks Publishes Sony Documents, Opening New Phase of Hacking - Bloomberg Business
UPDATED: Sony Slams WikiLeaks Document Dump; Do We Need A Sequel? | Deadline
WikiLeaks republishes all documents from Sony hacking scandal | Technology | The Guardian
Target settles with MasterCard for $19M over data breach - CNE
Target offers $19 million to MasterCard issuers to settle 2013 data breach
Verizon Data Breach Investigations Report: over 1 out of 10 people fall for phishing attempts
Gardening: Making it to rainy season - Marco Eagle
What Prospective Homebuyers Should Look for When Evaluating Homes to Purchase | The National Law Review
Skyhigh Networks Announces Security Intelligence Platform for Sanctioned Cloud Services | SYS-CON MEDIA
Skyhigh upgrades cloud security platform to detect security breaches in cloud storage accounts - FierceCIO
Skyhigh Turns Its Mind To The Security Of Sanctioned Applications - Forbes
Audit finds unsecured docs at most desks in five DHS orgs - SC Magazine
PCI SSC releases version 3.1, eschews SSL, early TLS - SC Magazine
Shaping your content management strategy around mobility
Cyanogen and Microsoft Android Apps: Bing, Skype, Office and OneDrive | BGR
Docker ships 1.6 with a faster registry and more for sysadmins | ZDNet
Google Expands Access to Big Data Tool -- ADTmag
Your Employees Are Your Biggest Security Risk | 2015-04-16 |
Google adds real-time big data analysis to two of its cloud services | Computerworld
The new debate about Social Security | LifeHealthPro
The Short Case For Target: Are Target's Latest Cyber-Security Efforts Too Little, Too Late? - Target Corporation (NYSE:TGT) | Seeking Alpha
Breach Defense Playbook - Dark Reading
Ryan Vela - Authors & Columnists - Dark Reading
Lawyer: Malware located on drive | NWADG
Target Settles MasterCard Data Breach Lawsuit for $19 Million - Data Security on Top Tech News
Editorial: China’s ‘Great Cannon’
Chinese Hackers Target Southeast Asia, India
China's 'Great Cannon' Redirects U.S. Traffic for Censorship - US News
San Bernardino County sheriff's deputies, His bail is set at $100,000
China’s ‘Great Cannon’ Uses DDoS Style Redirects for Censorship | SocialTimes
5 Cyberwar Threats Worth Watching - InformationWeek
Attention officers: Sign up soon for cyber transfers
Col. Derek Harvey: US Vulnerable to a 'Cyber 9/11'
Iran poses growing cyber threat to US: Study - United States News & Top Stories - The Straits Times
Youth, Apathy, And Salary Dictate Mobile Threats To Business - Dark Reading
New Rulings Address BYOD Policies | WeComply, a Thomson Reuters business - JDSupra
Duo Security Introduces Platform Edition -- the Most Effective Way to Prevent Data Breaches - Press Release - Digital Journal
Duo Security: (Big) New Money, New Platform, New Offices | Xconomy
SCED's speech at Internet of Things Symposium 2015
IBM Earnings Preview: Revenues To Decline As Business Environment Remains Challenging -- Trefis
Singtel looks to acquisitions, partnerships to grow enterprise base - Channel NewsAsia
Hackers Using Old Tricks To Snare Victims in Their Cyber Traps - Network Security on Top Tech News
Gangs of hackers cause cyber breaches to spike 23%
Ransomware Teslacrypt Still Targeting Gamers | Threatpost | The first stop for security news
IBM X-Force Exchange
IBM opens up its threat data as part of new security intelligence sharing platform | CIO
These voting machines are disturbingly easy to hack
Seculert Research Finds Critical Gaps in Gateway Solutions | Virtual-Strategy Magazine
New Data Center and Endpoint Solutions Make Fortinet the Only Network Security Provider to Protect Enterprises Against Threats at Every Possible Entry Point - MarketWatch
Minnesota university breach update, 160K students affected - SC Magazine
Report: DEA contract supplied agency with Hacking Team spyware - SC Magazine
US Drug Enforcement Agency buying spyware from an Italian company
Lawfare › On Hacking A Passenger Airliner (GAO report)
Banking malware using a variety of tricks to evade detection | CSO Online
Trustlook Antivirus & Mobile Security Ranked Top in AV-TEST With Best Score
Server-crashing Minecraft exploit published after game maker "failed to act" | ZDNet
Data breach notification bill could weaken consumer protections | PCWorld
Jeff Gelles: Is Congress taking wrong direction on data privacy?
Virginia Voting Machines Exposed to Low-Level, Election Altering Hacks Since 2004 | Threatpost | The first stop for security news
IT News Online > PR Newswire - CipherCloud Research Reveals Enterprises' Cloud Security Requirements
Skyhigh Networks Announces Security Intelligence Platform for Sanctioned Cloud Services | Business Wire
CISOs struggling to contain 'shadow' universe of consumer cloud apps -
Camgian Recognized as Pioneer in Edge Analytics for the Internet of Things | SYS-CON MEDIA
Google takes on real-time big data analysis with new cloud services | CIO
Intel, IoT And The Case For Commerce |
USmax awarded Prime Contract worth $17.9 Million with U.S. Agency for International... -- FAIRFAX, Va., April 16, 2015 /PRNewswire/ --
Cyber-security pros blame breaches on skills gap - SC Magazine UK
GitHub issues first transparency report; 40 accounts affected | ZDNet
Chris Christie's stuck in the middle on Social Security and Medicare reform | Mulshine |
How to bring clarity and urgency to Social Security reporting - Columbia Journalism Review
Fix Social Security by spending less on huge military budget : News
Anthem Health Coverage Data Security Breach : Webster Today
Data breach notification bill could weaken consumer protections | Network World
Senator calls for investigation into gyrocopter breach
Authorities Take Down Malware-Distributing Simda Botnet - Dark Reading
Forever 21 denies pirating Adobe software, strikes back | CIO
Complaint v Forever 21
AirDroid fixes flaw that could grant hackers full control of your phone | PCWorld
FireEye Earns Top Honors for Advanced Threat Detection and Threat Intelligence From SANS Institute
3DIcon Well-Positioned as Interest Grows for Cyber Technologies - Press Release - Digital Journal
Microsoft Zero-Day Bug Being Exploited In The Wild
Andrei Ravkov: Cyber wars are no longer launched by lone hackers | Politics | Headlines
UT Press Review: Financial Times on Russia's silent war - watch on -
L.A. school district may seek millions in refunds for iPad curriculum | ZDNet
iconnect007 :: Article
Small business advice: What you need to know about shadow IT - The Washington Post
IoT device explosion challenges data center security
Predictive Analytics: The Future Is Now - McAfee
Cyber attacks to rise, but competent security talent scarce, study says - SC Magazine
Hackers keep trying new targets in search of easy data : Business
El Moujahidin hackers target Staffordshire country pub's website - Telegraph
In-flight Wi-Fi could be hacked to take control of planes - B
Voting machine password hacks as easy as 'abcde', details Virginia state report | US news | The Guardian
Hacking US electronic voting machines was extremely easy |
ECI Telecom Completes Development of Its NFV Security Solution -- PETACH TIKVA, Israel, April 16, 2015 /PRNewswire/ --
Zscaler Experts to Speak on Cloud Security Best Practices at RSA Conference 2015 | Virtual-Strategy Magazine
Local Beat: Learning About Messy Data Through Hacking at Hack Jersey 2.0 |
GAO raises wi-fi hacking concerns | MRO Network
Revealed: Pentagon, DEA Secretly Bought Spyware From Front Company / Sputnik International
Antivirus Security DU Master Download | ZDNet
Antivirus competitors join arms to take down a huge botnet
Trustlook Antivirus & Mobile Security Ranked Top in AV-TEST With Best Score
10 reasons to buy a Windows tablet for work instead of an iPad or Android | ZDNet
HSBC Finance Notifies Mortgage Customers of Data Breach | American Banker
Sentors introduce bipartisan data breach legislation | TheHill
Target Corporation Makes Partial Data Breach Settlement With Mastercard Users
Is SSL hurting more than helping Middle East organisations?
Consumer Protection and Your Business | Thomas Fox - JDSupra
Zscaler Experts to Speak on Cloud Security Best Practices at RSA Conference 2015 - Press Release - Digital Journal
BlackBerry Announces Global Rollout of BlackBerry Leap | Broadcaster - Canada's Communications Magazine
iOS 8 vs Android KitKat: The BIGGEST and BEST Platforms Compared | Know Your Mobile
Six things that make open source a no-brainer for your company - TechRepublic
BlackBerry Announces Global Rollout of BlackBerry Leap
Securosis Blog | Presenting the 2015 RSA Conference Guide
How Big Data Is Changing The CFO Role
Data Breaches, Hacks And Phishing Attacks Aren't Slowing Down, Verizon Report Warns : PERSONAL TECH : Tech Times
Should We Kill the Social Security Number? |
(ISC)² Workforce Study: As Threats Evolve, Security Professionals are Concerned About Technology Sprawl
Heavily-Barricaded White House Security Breached... by Four-Year-Old : News : News Every Day
Patients' medical records under threat from data breaches : Business
Gyro-Copter Landing on Capitol Grounds Raises Questions About Security - NBC News
Cyberattacks Increasingly Rapid and Deceptive: Symantec
Harnessing The Power Of Cyber Threat Intelligence
Stu Solomon - Authors & Columnists - Dark Reading
Public trust in the web 'eroded' says global cyber commission - Times LIVE
Google Shuts Off NPAPI in Chrome | Threatpost | The first stop for security news
Iranian cyberattacks on the rise, study says | TheHill
Microsoft, Yahoo renew search deal, but with amendments | ZDNet
Athena and Rambus Cryptography Research Division Announce Solutions to Prevent Advanced Security Threats
Former CISO of eBay Dave Cullinane Launches TruSTAR, First Global Anonymous Cyber Incident Sharing Platform for Enterprises
Marble Security's AppHawk Mobile Threat Intelligence and Defense Service Guards Enterprises Against iOS and Android Apps That Threaten Security and Data -
Marble Security Taps PaRaBaL as U.S. VAR for AppHawk Mobile Threat Intelligence Platform - MarketWatch
Garter: IoT requires new architecture strategy | Business Cloud News
ISACA is First to Combine Skills-based Cybersecurity Training with Performance-based Exams and Certifications to Address Global Cyber Talent Shortage - Dark Reading
Study: 82% of Organizations Expect a Cyberattack, Yet 35% Are Unable to Fill Open Security Jobs - Dark Reading
Hackers keep trying new targets in search of easy data -
Security Companies Recruit Hackers to Counter Cyber Crimes
DEA, US Army bought $1.2M worth of hacking tools in recent years | Ars Technica
GAO Report Warns In-Flight Wi-Fi May Leave Aircraft Vulnerable To Hacking | WXPR
The DEA's using powerful spyware for surveillance too
info utiles - Articles
Ultra-High-Speed Broadband Bolsters UConn Research | UConn Today
Seculert Research Finds Critical Gaps in Gateway Solutions - Press Release - Digital Journal
Lottery Winner May Have Won By Hacking, So Who Gets To Keep The Loot? - Forbes
WSJ Market Wrap: April 14, 2015
Medical Records Under Threat from Data Breaches | Sci-Tech Today
Target nears $20-million MasterCard data breach settlement: report - The Globe and Mail
Target announces $19 million data breach settlement with MasterCard | Reuters
Spikes Security Wins 2015 Govies Award From 1105 Media
Drone laws in the UK – what are the rules? - Telegraph Namibia: FNB and Visa Join Hands to Fight Card Cloning Fraud
Meet the e-voting machine so easy to hack, it will take your breath away | Ars Technica
Bitdefender Box review: Antivirus for the Internet of Things
HDMI 2.0 finally appears in a pair of Viewsonic 4K monitors | PCWorld
Attivo Networks closes $8M Series A
Learning Business Continuity Can Improve Information Technology Professional Skills | CIO
Google pushes on with big data: Cloud Dataflow beta and BigQuery update | ZDNet
Security pros name their must-have tools | Network World
Get into RSA 2015 for free, hear eye-opening talks! | Naked Security
UK Law Firms Putting Client Data at Risk - Infosecurity Magazine
HTC and Samsung Android flagships disappoint: Back to the Apple iPhone 6 Plus | ZDNet
New malware program PoSeidon targets point-of-sale systems | Computerworld
New malware program Punkey targets point-of-sale systems | CIO
Bicyclist's close call, capitol security breach: 8 things to know Thursday | Local News - WMTW Home
FireEye Earns Top Honors for Advanced Threat Detection and Threat Intelligence From SANS Institute - MarketWatch
Iran Increasingly a Skilled Cyberthreat, Experts Say