Cisco Data Center sur Twitter : "And you thought your #cabling job was scary! #HappyHalloween"
Shared Responsibility Examples: The Re:Boot -
White House computer hacking causes temporary outage -
Sharyl Attkisson Just Released a Creepy Video of Her Computer That Will Likely Send Chills Down Your Spine | Video |
Schools Use HP TippingPoint to Avert Growing Cyber-Threats - Network Security on Top Tech News
Pirate Bay cofounder convicted on hacking charges (Wired UK)
Apple releases patches for OS X's 'Shellshock' Bash shell vulnerability | PCWorld
Watch Someone in The Government Take Over Sharyl Attkisson's Computer - Katie Pavlich
Video: The Sharyl Attkisson computer hack « Hot Air
Sharyl Attkisson Releases Video Allegedly Showing Gov’t Hacking Her Computer | Mediaite
Google's RAPPOR aims to preserve privacy while snaring software stats | Computerworld
The Scan: Bank Hackers Love the Thrill of the Chase - YouTube
PCI Council Releases Staff Training Guidance|PaymentsSource
Juniper Networks sur Twitter : "Decode the message and have a Happy #Halloween!"
Pirate Bay founder jailed for hacking Danish data - Houston Chronicle
Hackers' new Dyre malware infects W.Pa. computers, vexes FBI cyber agents | TribLIVE
California Attorney General Releases 2014 Data Breach Report and Recommendations, Finding More of the Same. | BakerHostetler - JDSupra
Ebola Has No Greater Friend Than Fear | Ambassador Samantha Power
Android stays 'unbeatable' in smartphone market -- for now - CNE
CurrentC Data Breach: Apple Pay Competitor Hacked | InvestorPlace
Pirate Bay Founder Convicted of Hacking | News & Opinion |
Cisco Security sur Twitter : "#NCSAM ends today, but Our Shared Responsibility for #cybersecurity continues! Thanks to all who participated!"
Cyber Security, Virtualization and Cloud Computing at Lindenwood University Making a Storming Presence in Tech Savvy St. Louis - The Edwardsville Intelligencer : Home
Halloween cyber-security nightmares - experts reveal their fears - SC Magazine UK
CVE-2014-4115 Analysis - Malicious USB Disks Allow For Possible Whole System Control | Security Intelligence Blog | Trend Micro
What is Data Encryption in Kaspersky PURE 3.0
Stay Secure During the Holiday Season | Symantec
Python for Penetration Testers | Hackfest | Python Penetration Testing
Schools Use HP TippingPoint to Avert Growing Cyber-Threats - Computing on Top Tech News
Microsoft teases Office for Mac with Outlook-only release | Computerworld
After massive Danish hack, Gottfrid Svartholm Warg sentenced to 3.5 years | Ars Technica
Pirate Bay Founder Jailed for Hacking Danish Data - ABC News
3 Business Services Stocks to Top Q3 Earnings as Fed Ends QE - October 31, 2014 -
Data Breaches: Don't Blame Security Teams, Blame Lack of Context - Forbes
It looks like Russia and smells like Russia ... but is it Russia? - Oct. 31, 2014
Co-founder of The Pirate Bay found guilty in largest hacking case in Denmark’s history
Swedish hacker finds 'serious' vulnerability in OS X Yosemite | Macworld
BBC News - Millions of websites hit by Drupal hack attack
RSA sur Twitter : "Congrats to @HowardU’s Adesola Abimbola & Hannah M Clark for winning the inaugural RSA Howard Cyber Case Competition!"
Junos Pulse: Configure an Active Directory / Windows NT Authentication Server - YouTube
Next-gen firewalls need to evolve to avoid becoming irrelevant
California Attorney General Reports Data Breaches Up 600% in 2013
Schools Use HP TippingPoint to Avert Growing Cyber-Threats - Security Solutions on CIO Today
Assume your Drupal 7 site has been compromised
Cisco Champions Program 2015. Now Accepting Nom... | Cisco Communities
Alabama credit unions report Home Depot data breach cost them nearly $1M - Birmingham Business Journal
Keep Cybercriminals Guessing with Unique Passwords -
Discovery of JPMorgan Cyberattack Aided by Company That Runs Race Website for Bank
Microsoft Launches New Outlook for Mac, Next Office for Mac Suite Coming in Second Half of 2015 - Mac Rumors
Will Apple Pay Benefit From Rival’s Hacking Incident?
Windows 7's Halloween Deadline: 5 Key Issues - InformationWeek
Hackers' New Malware Infects West Pennsylvania Computers, Vexes FBI
Phila.'s $1.43M Gun Permit Data-Breach Accord Approved | The Legal Intelligencer
Windows 10: The Clock’s striking 12 either ways | CIOL
The year of the breach: California Attorney General releases 2013 data breach report - Lexology
A lesson in business continuity planning | Spruce Grove Examiner
Bsides Dc 2014 - Diamond Model For Intrusion Analysis: What You Need To Know
Pirate Bay co-founder sentenced to 42 months in jail in Denmark| Reuters
On the downswing, chat room giant Paltalk plans pivot inspired by YouTube & Twitch | VentureBeat | Business | by Harrison Weber
Pirate Bay co-founder sentenced to 3.5 years imprisonment in Denmark | ITworld
Android's Surprising Next Big Competitor: Google - Enterprise Software on CIO Today
Microsoft Office for Mac to release in 2015, new Outlook for Mac now available to Office 365 subscribers | Latest Tech News, Video & Photo Reviews at BGR India
Pirate Bay co-founder Gottfrid Svartholm sentenced for CSC hack- The Inquirer
Texas city under attack by hackers following OIS video release
Bugtraq: [SE-2014-01] Missing patches / inaccurate information regarding Oracle Oct CPU
Bugtraq: [SECURITY] [DSA 3060-1] linux security update
Pirate Bay Co-Founder Gottfrid Svartholm Warg Gets Jail Term in Hacking Case • News •
DailyTech - Pirate Bay's Gottfried Warg Sentenced to 3 and 1/2 Years in Prison for Hacking
Pirate Bay founder handed 3.5 year prison sentence - News - The Copenhagen Post
Tales from the Crypt: Nine 'Scary' Security Stories
The sky is now the limit for Office 365 OneDrive cloud storage - TechRepublic
Making Connections to Facebook more Secure
Pirate Bay co-founder sentenced for hacking CSC servers
Google to kill off SSL 3.0 in Chrome 40 | CSO Online
Why Facebook Just Launched Its Own 'Dark Web' Site | WIRED
Juniper Networks sur Twitter : "Q6: Which two TCP flag settings are considered suspicious? (Choose two) #JuniperTrivia"
Juniper Networks sur Twitter : "Q7: Which two statements about static NAT are true? (Choose two.) #JuniperTrivia"
10 Scary Tricks Cybercriminals Use to Lure Unsuspecting Users - Security News - Trend Micro USA
Experts Divided Over Death of AV Software | CAJ News Africa
Bugtraq: [SYSS-2014-008] McAfee File and Removable Media Protection (FRP/EEFF/EERM) - Use of a One-Way Hash with a Predictable Salt (CVE-2014-8565)
Bugtraq: SEC Consult SA-20141031-0 :: XML External Entity Injection (XXE) and Reflected XSS in Scalix Web Access
Cyber Security Law Vs. Partisan Politics - InformationWeek
Millions Of Websites Hit By Drupal Hack Attack ≈ Packet Storm
Virginia Cops Can Now Force Phone Unlocks With Your Finger ≈ Packet Storm
Facebook Takes To Tor For Weird Sort Of Anonymous Socializing ≈ Packet Storm
Juniper Networks sur Twitter : "Q4: A Policy Trace can be used to troubleshoot which three scenarios? (Choose three.) #JuniperTrivia"
Juniper Networks sur Twitter : "Q5: Which configuration element do you use to group interfaces with similar security requirements? #JuniperTrivia"
Security Intelligence | TrendLabs - Trend Micro
100+ IT policies at your fingertips, ready for download | ZDNet
New laws to stop web storage hackers
Everything You Need To Know About The Internet Of Things - Forbes
Schumer: Feds should do 'top to bottom' probe of online drug marketplaces - SC Magazine
Juniper Networks sur Twitter : "Q2: What permits matching traffic even though the security policy is disabled from a scheduler? #JuniperTrivia"
Juniper Networks sur Twitter : "Q3: What are two characteristics of application firewalling? (Choose two.) #JuniperTrivia"
SANS Institute
Open source Knock Knock tool reveals OS X malware
Raising cryptography's standards
Teacher’s ex accused of hacking email, sending nude pics to students | Naked Security
Shellshock Attacks Stack Up
Juniper Networks sur Twitter : "It begins! Prepare for the first #JuniperTrivia Hour question."
Juniper Networks sur Twitter : "Q1: Which two statements are true about stateless firewall filters on Junos devices? (Choose two.) #JuniperTrivia"
Rekall Memory Forensics blog: Windows Virtual Address Translation and the Pagefile.
Microsoft releases surprise Outlook for Mac update, new Office due in 2015 | ZDNet
Mass protests force Hungary to retreat from internet tax plans - IT News from
Pirate Bay founder Gottfrid Warg convicted on hacking charges | Technology |
Trend Micro
Financial Breaches Show 'Trust Model' Is Broken
New Relic Recognized as a "Leader" in Gartner's Magic Quadrant for Application Performance Monitoring for Third Year in a Row
George Clooney finds a writer for his phone hacking movie · Newswire · The A.V. Club
Obama Administration Releases Federal Agency Climate Plans on Fifth Anniversary of Presidential Sustainability Initiative | The White House
White House cyberattack confirmed by National Security Council - Technology & Science - CBC News
Cisco Security sur Twitter : "Happy #Halloween! Guess who’s already eaten half of the candy bowl! What a pig ;)"
KrebsOnSecurity Honored for Fraud Reporting — Krebs on Security
College students trust Snapchat despite hack, study says
Things that freak out IT security pros
ShellShock vulnerability exploited in SMTP servers - SC Magazine
IT Security: Achieving Total Vision of Enterprise Assets | FedTech Magazine
Cyber Security, Virtualization and Cloud Computing at Lindenwood University Making a Storming Presence in Tech Savvy St. Louis
Financial system hackers show reasons to worry -
Facebook Reset and Scary Cell Phone Scams – All Tricks, No Treat
Virginia police can now force you to unlock your smartphone with your fingerprint | ZDNet
Phys.Org - News and Articles on Science and Technology
FCW: The Business of Federal Technology -- FCW
SANS Digital Forensics and Incident Response Blog | SANS DFIR Summit 2015 - Call For Papers | SANS Institute
Bsides Dc 2014 - Opening Acts: How Attackers Get Their Big Breaks
PwC partners with Google to drive enterprise cloud adoption - TechRepublic
How Colleges Can Mitigate Data Risks | EdTech Magazine
Cyber Security, Virtualization and Cloud Computing at Lindenwood University Making a Storming Presence in Tech Savvy St. Louis | Virtual-Strategy Magazine
Pirate Bay founder gets three years in prison - The Local
Pirate Bay co-founder Gottfrid Svartholm Warg found guilty in Denmark hacking case | Techie News
The Pirate Bay co-founder sentenced to almost four years in jail on hacking charges -
Big Data Software For Mainstream Users - InformationWeek
Gadget Web Site - Business continuity now affordable
After PCI, Aspirin Before Noncardiac Surgery Irrelevant
How to Tell Data Leaks from Publicity Stunts — Krebs on Security
Antivirus Software and Internet Security For Your PC or Mac | McAfee
Symantec sur Twitter : "Tell us what you data center horror story!"
Juniper Networks
An In-Depth Look Into Malicious Browser Extensions Targeting Facebook
The Right and the Wrong Way to Tackle Corporate Cyber Crime - The Experts - WSJ
Press Releases - News - Stockhouse
Pirate Bay founder jailed for 3.5 years for hacking government files - Gadgets and Tech - Life and Style - The Independent
Google Launched Security Key, FIDO U2F Authentication
Bitdefender Total Security – Free Antivirus Security with a Single Click - The Fuse Joplin
CurrentC is DOA before it’s even launched | PCWorld
BBC News - Pirate Bay founder Gottfrid Warg gets lengthy jail term
FCC brings its first data breach enforcement action - Lexology
Pirate Bay founder gets 3.5 years in hacking case - The Local
Majority of Calif. Health Data Breaches from Stolen Hardware |
Report: Data Breaches Plague California - CIO Issues on CIO Today
Tablets Hit Full Stride With Agencies | FedTech Magazine
FCC: Telecom customers' data may have been exposed in cybercrime havens abroad - DecodeDC Story
Update on charity:water Efforts in Nepal – Blog Post – RSA Conference
Android dialler hides, resists attempts to remove it
Global Partner Summit Honors Top Channel Partners -
European Union holds largest-ever cyber-security exercise | The Indian Express
iOS 8.1 tips and tricks: See what your iPhone and iPad can do now - Pocket-lint
Texas Hackers to Fight Ebola, Fire and Water Contamination With African SMS | Maya Horgan
TITUS Recognized by McAfee as Most Valuable Partner of the Year -
Hundreds of companies face 2,000 cyber-attacks in EU exercise - SC Magazine UK
Information Security News: Retailers Now Actively Sharing Cyberthreat Intelligence
WebApp Sec: Security and Communication Networks - Special Issue on Software Defined Networking Security
Vulnerability Note VU#447516 - Linksys SMART WiFi firmware contains multiple vulnerabilities
McAfee Outlines Channel Initiatives to Help Partners Differentiate and Profit - BWWGeeksWorld
Improving loss prevention with unified security solutions | Retail loss prevention solutions | Security News -
Forget trick-or-treating – Kill a Zombie this Halloween | Naked Security
Microsoft Adds IoT Streaming Analytics, Data Production and Workflow Services to Azure - SQL Server Team Blog - Site Home - TechNet Blogs
Information Security News: Social Engineers work in teams to harness the power ofinformation
Information Security News: New Russian Boldness Revives a Cold War Tradition: Testing the Other Side
DDoS Preparedness: More Than a Firewall - Infosecurity Magazine South Africa: Experts Divided Over Death of AV Software
Windows 10: It's make-or-break time for Microsoft | InfoWorld
Pirate Bay founder guilty of hacking government files faces six years in prison - Gadgets and Tech - Life and Style - The Independent
Pirate Bay co-founder Gottfrid Svartholm found guilty of illegal hacking - Enterprise - | - Ireland's Technology News Service
How bots and zombies work, and why you should care | Naked Security
Don’t wear your Google Glass or other wearables when watching a movie | Naked Security
Popular Science site shrugs off malicious code infection • The Register
SIEM doesn't reduce security incidents, say IT pros
Bsides Dc 2014 - All About The Bass - Sing Off
How to manage mobile workers - Forum:Blog Forum:Blog | The World Economic Forum
Pirate Bay founder faces serious jail time after being convicted on hacking charges in Denmark - TechSpot
China's internet chief accuses US of hacking but says talks 'unhindered' - The Times of India
Pirate Bay co-founder Gottfrid Svartholm found guilty of illegal hacking - Digital Life - Digital Life | - Ireland's Technology News Service
It is one of the largest hacker processes in Danish history
Microsoft Security Essentials vs BitDefender Antivirus Free which gives more protection
Pirate Bay Co-Founder Warg Faces Stiff Prison Sentence
Danish court finds Pirate Bay co-founder guilty in hacking case : News, News - India Today
Managed Service Provider Gone Bad: One Scary Story - Post - No Jitter
Information Security News: Banks' Concerns About Cyberthreats Grow
CurrentC gets user email addresses pickpocketed | Naked Security
Dyre malware targeting Swiss bank customers
Evolution Security " PenetrationTesting & IT-Security Services" | EVOLUTION SECURITY PENTESTING [DE|EU]
Videos – RSA Conference
Danish court finds Pirate Bay cofounder guilty of hacking CSC servers • The Register
'The Pirate Bay' Co-Founder Found Guilty in Denmark's Largest Hacking Case
WebApp Sec: [Deadline Extension] CFP COMCOM, Elsevier: SI on Security and Privacy in Unified Communications: Challenges and Solutions, Manuscript Due November 21, 2014
Hackers Probing the Financial System Show Reason to Worry - Businessweek
Cyber-Warfare: Who’s Afraid of the Big Red Button? - Infosecurity Magazine
Sencha melds desktop and smartphone management with Space -
Happy Halloween from Kaspersky Lab - YouTube
Newly Revised Corporate Information Security Policy Templates Available from the Cyber Security Experts at
Mobile data more accurate than census, says study - E & T Magazine
Here's How the New Chip-and-PIN Credit Cards Could Be DOA | Adam Levin
Cyber Attacks Could Increase Over The Next Decade: Pew Poll - Technology News - redOrbit
Most orgs unprepared to handle a cyber incident
The security threat of unsanctioned file sharing
Report: Data Breaches Plague California - Network Security on CIO Today
Police can require cellphone fingerprint, not pass code | |
Microsoft patches GroupMe 'full account' hijack hole • The Register
Where Do You Draw the Line Between Relevancy and Privacy? | SmartData Collective
China turns back at US, accuses of cyber attacks : News, News - India Today
Hackers Are Using Gmail Drafts To Update Their Malware And Steal Data
Gartner highlights the top 10 cloud myths - The Times of India
BlackBerry Passport unveiled in Nigeria | BiztechAfrica Mobile,Technology & IT News Africa
Free government-penned crypto can swipe identities • The Register
Understanding disaster recovery terminology
The 5 Most Frightful Viruses Terrorizing Computer Users Everywhere | Symantec Connect
Snowden in a hotel room after alarming the world
Are the New, ‘Safer’ Credit Cards Already Vulnerable? |
IBM Rolls Out Analytics-Based Security Solution - Big Data on CIO Today
Government inaugurates information security advisory team
Symantec Event Registration System
IBM Rolls Out Analytics-Based Security Solution - Network Security on CIO Today
Disaster funding slash 'absolutely revolting': Crisafulli
Cyber security breaches, Tucson expert has the answer - KGUN9
Here's How the New Chip-and-PIN Credit Cards Could Be DOA - Forbes
Google heads out the back with rifle, puts down POODLE • The Register
Possible data breach at ASU - News - The Sun-Times - Heber Springs, AR - Heber Springs, AR
Bsides Dc 2014 - What Does It Actually Take To Start A Security Product Company?
Hackers break into White House network, Russian hackers blamed - Enterprise - | - Ireland's Technology News Service
Hackers are testing the financialsystem’s cyber defenses, and they can... - News - Seattle Sports Nut
Hackers Probing the Financial System Show Reason to Worry - Bloomberg
‘Citizenfour’ exposes Edward Snowden’s message | Boston Herald
New intelligence analytics uncover hidden criminal activity in just seconds
IBM Expands the IBM Cloud Data Services Portfolio - CRM Magazine
5 Questions For Cybersecurity Expert Bruce Schneier After the Latest White House Hacking - Bloomberg Politics
Gigamon says it can analyze attacker SSL traffic without hitting performance | ITworld
How Will Campus Networks Handle the Internet of Things' 26 Billion Devices? -- Campus Technology
Only Top Congressional Leaders Were Notified Of The White House Computer Attack
Credit Card Information Security Issues in Franchising | The Legal Intelligencer
Anything You Post Can and Will Be Used Against You - The State of Security
Restoring Digital Consumers' Confidence - Part II - The State of Security
Malware Threat Detection and Malware Block Effectiveness – Reviews | McAfee
IBM Brings Broad Portfolio of Big Data and Analytics Capabilities to the IBM Cloud Marketplace - MarketWatch
Watch "FTC sues AT&T for slowing internet connection speeds" Video at SCMagazine
Secret Manuals Show the Spyware Sold to Despots and Cops Worldwide - The Intercept
Twitter, IBM form partnership around analytic apps -
IBM Intros New Analytics Software to Battle Cyber-Crime
Hackers Keep Stealing Your Personal Data
China's Cyberspace Minister Accuses U.S. of Hacking - China Digital Times (CDT)
Big data professionals rake in almost a quarter more than IT -
Bsides Dc 2014 - How Headlines Make Heads Roll: The Media's Impact On Security
'Widespread Harm' Likely from Cyberattack in Next Decade
What's your password backup plan?
U.S. Army, Cyber Security and Business Against a Common Foe conference set for Wednesday | The Augusta Chronicle
The enemy within: seven strategies to stop cyber breaches - The MandarinThe Mandarin
'Major' hacking attack in US looms: survey |
PHI ‘Mishandling’ by Montana VA Leads to Possible Data Breach |
Federal data breaches up again | IT World Canada News
Office of the Privacy Commissioner of Canada | Annual Report: RCMP review highlights need for better record keeping
How to secure your homes during ‘Undas’ | Inquirer News
There Will Be Battles. Some Will Be Lost - American Banker Article
China's Internet Chief Accuses US of Hacking but Says Talks 'Unhindered' | NDTV Gadgets
Disaster recovery assistance available for S.W. Alta. | 660News
Juniper Networks - Investor Day 2014
Peer2Peer Facilitators – RSA Conference
Privacy in the Cloud: A Legal Framework for Moving Personal Data to the Cloud | Morrison & Foerster LLP - Social Media - JDSupra
Samsung ‘Find My Mobile’ security exploit discovered | BGR
Virus Bulletin : Blog - Paper: Invading the core: iWorm's infection vector and persistence mechanism
Android/Emmental: adding cheese in emmental holes | Fortinet Blog
Do We Need a CDC for Cybersecurity?
Pirate Bay co-founder convicted in Denmark’s “largest hacking case” ever | Ars Technica
Guilty! Pirate Bay’s Gottfrid Svartholm Could Spend Six Years in Jail for Hacking
Latest local breaking news by The State Newspaper in Columbia, SC | The State
Pirate Bay's Svartholm found guilty in Danish hacking case- The Inquirer
BBC News - Pirate Bay founder Gottfrid Warg faces lengthy jail term
Pirate Bay Founder Guilty of Hacking, Facing Six Years in Prison | Society | RIA Novosti
Gartner Debunks Top 10 Cloud Myths | Cloud Computing content from Talkin' Cloud
Pirate Bay co-founder guilty in Danish hacking case
Chronic Vitamin K Antagonist Use Ups In-Hospital Bleeding Among Primary PCI Patients - Journal News - TCTMD
Bsides Dc 2014 - Doctor Docker: Building Your Infrastructure's Immune System
Assessing Your Windows Server 2003 deployment | Windows Server 2003 End of Support content from Windows IT Pro
IBM Boosts Cyber Security Education Efforts - eSecurity Planet
F5 Big-IP XML External Entity Injection #1 ≈ Packet Storm
Red Hat Security Advisory 2014-1744-01 ≈ Packet Storm
Debian Security Advisory 3059-1 ≈ Packet Storm
Ubuntu Security Notice USN-2392-1 ≈ Packet Storm
National Cyber Security Month - Trend Micro USA
Entrevista exclusiva a Raj Samani durante #McAfeeFOCUS en Las Vegas : by @GlobbTV
West Africa's Financial Immune Deficiency
Hackers Attack Cleburne Servers, Which May Be Linked To Controversial Dog Shooting | KERA News
CurrentC won't let email hack delay launch as it explores NFC | PC World India
Operators disable firewall features to increase network performance, survey finds - SC Magazine
CEO Kovacs Recasts AVG As Cloud Player - Page: 1 | CRN
Satisfaction Survey
Comments ≈ Packet Storm
Pirate Bay Founder Guilty In Historic Hacker Case ≈ Packet Storm
Vizensoft Admin Panel Bypass / Backdoor / Upload / XSS / SQL Injection ≈ Packet Storm
Partners for the Networking Lifecycle - YouTube
E-Payments & Security - How to prevent fraud with tokenization - Internet Retailer
How one man’s private files ended up on Apple’s iCloud without his consent - The Washington Post
Review of ‘Citizenfour,’ documentary about Edward Snowden - Movies - The Boston Globe
How to Get Half a Million More From Uncle Sam for Your Retirement - ABC News
How To Fix Your 401(k) Before You Retire - Forbes
Driving Change against Cyberbullying | Symantec Connect
Beware of the malware walking dead - SC Magazine
Hackers grab email addresses of CurrentC pilot participants - SC Magazine
Example: Configuring Basic Layer 2 Switching on MX Series - Technical Documentation - Support - Juniper Networks
Discover Global wireless network security market that is expected to reach $15.55 billion by 2019 - WhaTech
Pirate Bay co-founder Svartholm Warg found guilty of hacking
Correction: Apple Pay-Retail Skirmish story | The Miami Herald
Pirate Bay Founder Convicted on Hacking Charges | WIRED
Government’s Sustainability Efforts Present ‘Big Data Opportunity’ -
Comprehensive 2014 Information Security Policy Manual Available for Instant Download from North America’s Cyber Security Specialists at | Virtual-Strategy Magazine
Xiaomi Data Breach — "Exposing Xiaomi" Talk Pulled from Hacking Conference
Seamless Guides: The Recipe for Easier Learning - J-Net Community
Petition targets Apple over ‘spyware’ in OS X Yosemite | CSO Online
Vulnerabilities found in more command-line tools, wget and tnftp get patches | CSO Online
PCI publishes guidance on security awareness programs - SC Magazine
HackingTeam spying manuals posted online - SC Magazine
Tales from the Encrypt - YouTube
Apple Pay competitor CurrentC just says customer email addresses were hacked
Cybersecurity Expert Warns of Data Breaches
Cyber Threat Intelligence Summit (Washington, DC)
Executives Now More Worried About External Hackers than Insider Threat - The CIO Report - WSJ
Former Obama Officials: U.S. Unable to Cope With Complex Security Challenges - Blog
QS/1 Partners with ANX, a Leading PCI Protection Company
Louisville Infosec 2014 - Closing Ceremony
Chip & PIN vs. Chip & Signature — Krebs on Security
IBM Goes Big on Data in the Cloud -- ADTmag
Office 365 admins get spreadsheet search help - CIO
FBI investigating leaker of national security information - CBS News
Sheheen hammers Haley over data breach, DSS deaths - SCNow: Politics
FCC Issues $10 Million Fine in Data Breach-Federal Communications Commission | The National Law Review
Report: Data Breaches Plague California - CIO Issues on Top Tech News
Local news from Rock Hill, SC | The Herald
What you need to know about the Drupal vulnerability CVE-2014-3704 | CSO Online
How Facebook Could End Up Controlling Everything You Watch and Read Online | WIRED
OpenStack Summit November 2014 Paris: Creating a Carrier-Grade Virtualized Net...
Government commits to disaster recovery assistance for SW Alberta | 660News
The Morning Download: IBM, Twitter Developing Tools to Analyze Social Data - The CIO Report - WSJ
Verizon Adds FireEye Cyber-Security Tools for Business Users
How to Respond to SEC Inquiries Concerning Data Breach and Data Security Policies | BakerHostetler - JDSupra
Europe Holds Biggest Ever Cyber Security Incident Response Exercise Simulating 2,000 Threats - The State of Security
Hurricane fails to stir Bacardi's business continuity plan | CSO Online
IT pros turn a blind eye to file sharing practices, report says | CSO Online
Mirror Group faces further investigation into phone-hacking - Crime - UK - The Independent
IBM, Twitter data deal will help Indian firms cut costs - Livemint
How to build a secure fortress - SC Magazine
No Page Found - Khaleej Times
EU Carrying Out Biggest Ever Cybersecurity Exercise: Information Security Agency | Society | RIA Novosti
Scammers pose as company execs in wire transfer spam campaign | Symantec Connect
Phishing campaign passes off Pony Stealer trojan as 'overdue invoice' - SC Magazine
Assume Drupal 7 sites are compromised, unless patched or updated to 7.32 within hours - SC Magazine
Juniper IR sur Twitter : "Great start to #Juniper Investor Day this morning with a whiteboarding session led by Pradeep Sindhu!"
Full Security and Privacy Tip Sheet - Trend Micro
Just where are the world's hackers located?
Mobile/Micro Data Center Market by Applications (Instant & Retrofit, Disaster Recovery, High Density Networks, Remote Office, Mobile Computing), Rack Size, Organization Size and Verticals - Global Advancements, Worldwide Forecast & Analysis (2014-2019) - MarketWatch
Maryland's cyber security strategy: Avoid boneheaded mistakes - Baltimore Business Journal
Symantec sur Twitter : "What are the reasons you would NOT allow employee-owned devices in the enterprise? Why would you? #DirtyTopics #BYOD"
Pirate Bay co-founder found guilty for hacking IT service provider - SC Magazine
My Digital Shield Releases 'Shield Test' Free for SMBs
Report: Nation state cyber conflict will become the norm - FierceGovernmentI
Hackers using Gmail drafts to steal data and update malware |
Home Depot Breach Costs CUs $60M
Home Depot breach costs doubled Target's | TheHill
FBI Seeks New Surveillance Powers | News | teleSUR
Presidential “pixie dust”: How a quiet new rule can wipe away your basic rights -
Protest gegen NSA-Überwachung: Schmerzhafte Trennung -
Top 10 Cloud Myths | News | Mobile Enterprise(ME)
Home Depot breach cost credit unions almost $60M | 2014-10-30 | HousingWire
Judges reject senior Merseyside cop's appeal against data breach convictions - Liverpool Echo
Citizenfour review - Chicago Tribune
IT spending reality check: 2014's mixed message | ITworld
Report: Stolen card data is crime that concerns Americans most - SC Magazine
What's jeopardizing the safety of your datacenter?
Complexity for Retailers Creates Opportunities for Attackers | SecurityWeek.Com
Millions of Drupal websites at risk from failure to patch | Naked Security
Symantec sur Twitter : "Welcome to the #DirtyTopics chat! Today we'll be discussing productivity and security in a BYOD program."
Symantec sur Twitter : "Are there benefits to having a #BYOD policy at your organization? #DirtyTopics"
49 Orgs Call on Congress to Restore Whistleblower Rights for Intelligence Contractors | GAP
Pirate Bay cofounder found guilty of hacking
Yosemite Wi-Fi issues: fix dropped connection and slow Internet | BGR
IT Starter Plan for Bring Your Own Devices | New Jersey Law Journal
China says cyber talks ‘unhindered’ despite US hacking - E & T Magazine
Current Status | LiveOffice Support Center
Computer Spies Target Control Systems Made by GE, Siemens - WSJ - WSJ
Louisville Infosec 2014 - Where Does Data Security Fit Into The Data Quality Strategy?
How to Improve Your Mobile Security in 3 Simple Steps | Lifehacker UK
Five Ways to Move Your Big Data Projects Into the Cloud | WIRED
Your data's gone mobile: Keep it secure - SC Magazine
Epidemic of medical data breaches leaking our most sensitive information | Naked Security
‘Replay’ Attacks Spoof Chip Card Charges — Krebs on Security
Cyber crime tool automates monetization of stolen payment cards
Dirty Topic Tweet Chat 10/30 – Securing Mobile Devices In The Workplace | Symantec Connect
Paris Hilton Phone Hacker Sentenced To Prison For Hacking Police, College Computers | The Daily Caller
China's Internet chief accuses U.S. of hacking but says talks 'unhindered'| Reuters
Pat Calhoun: McAfee Report Shows Trade-Off Between Network Security, Performance | ExecutiveBiz
Report: Data Breaches Plague California - Network Security on Top Tech News
McAfee Threat Intelligence Exchange | McAfee Products
Ensuring Security and Trust Stewardship and Accountability
Meet APT28, Russian-backed malware for gathering intelligence from governments, militaries: Report : LIFE : Tech Times
Voice Control Could Help Hackers Mount Attacks | MIT Technology Review
Expert claims hacking Xiaomi server, firm calls it hoax - The Economic Times
Microsoft Azure Gets a New Marketplace, Advanced Networking Features and Batch Processing
BIGGEST THREAT to Europe’s cybersecurity? Hint: not hackers • The Register
EU Holds Largest-Ever Cyber Security Exercise - ABC News
CurrentC Hacked - Business Insider
About 60K transactions possibly affected in Cape May-Lewes Ferry breach - SC Magazine
​Google on Android Lollipop security: Set it and forget it - CNE
California and the Nation - Data Breaches Affect Nearly Half of California’s Residents - Ca - News
Hackers Target Apple Pay Rival CurrentC
Theory of Everything writer to tackle George Clooney’s phone hacking scandal docudrama
About Apple's OS X Yosemite: Everything You Need to Know
Office 365 to get MDM capabilities baked in | IT PRO
How to get the Windows 10 Technical Preview, plus release date, features and latest news | News | PC Pro
China's Internet chief accuses U.S. of hacking but says talks unhindered| Reuters
Netizen Report: Hungarians reject “Internet tax” with protests, motherboards.
Jordan's Furniture Moves Into More Bandwidth and Greater Cost Savings With Comcast Business | Business - Press Releases | | The Providence Journal
PrivacyScan 1.7 Privacy for Apple's Yosemite Released - BWWGeeksWorld
After Massive Outrage, Houston Pulls Plug on Pastor Subpoenas - Hit & Run :
Carders offer malware with the human touch to defeat fraud detection • The Register
Information Security News: Did Drupal Drop The Ball? Users Who Didn't Update Within 7 Hours 'Should Assume They've Been Hacked'
Information Security News: Security Firms Tie Russian Government to Utilities Hacks
Business continuity is not just about backup
Symantec sur Twitter : "What does it take to build an Agile Data Center? Visit us at #NTAPinsight booth 530 and learn how! #ADC #SDDC"
Denmark: Pirate Bay Founder Found Guilty of Hacking | Democracy Now!
Redis latency spikes and the 99th percentile - Antirez weblog
Smart meter hacking risk | Electronics Weekly
The Year of the Breach: California Attorney General Releases 2013 Data Breach Report | Ad Law Access
Hackers breach White House network - sources - IOL SciTech |
Standard Digital News - Kenya : Hackers breach White House computer system, Russia suspected
IDC To CIOs: 60 Percent Of You Will Be Supplanted By Chief Digital Officers By 2020 - Forbes
White House notified Congressional “gang of eight” about breach - NIST framework: the view from Tampa - POLITICO Morning Cybersecurity -
The ULTIMATE CRUELTY: Sandworm uses PowerPoint against Swiss bank customers • The Register
CurrentC mobile payment system hacked, user info stolen
#CiscoPublicSafety Series: Redefining Public Safety and Justice through IoE
Bugtraq: [slackware-security] wget (SSA:2014-302-01)
Bugtraq: Call for Papers - WorldCIST'15 - Azores, Deadline: November 23
How to install and configure Kaspersky Safe Browser (iOS)
Students Test Cyber Security Skills - Time Warner Cable News
Shellshock–Related Attacks Continue, Targets SMTP Servers | Security Intelligence Blog | Trend Micro
Mozilla Releases Geolocating WiFi Sniffer For Android ≈ Packet Storm
Europe Hosts Its Biggest Ever Cyber Security Exercise ≈ Packet Storm
Louisville Infosec 2014 - Are You Really Pci Dss Compliant? Case Studies Of Pci Dss Failure!"
What's causing the recent string of data breaches?
FBI raids home of 'second Snowden' whistleblower in US -
Jordan's Furniture Moves Into More Bandwidth and Greater Cost Savings With Comcast Business
The NHS is still clinging on to Windows XP
In-flight entertainment's future may be on your tablet |
Does depleting privacy equate to the end of liberty? Why every business must watch this Edward Snowden documentary | Information Age
FBI wants expanded hacking authority | TheHill
Are the White House Hackers Gone? -
Mobility/BYOD = Power to the People | CIO
A Layman’s Reading of Gartner’s Top 10 Cloud Myths | CloudWedge
Careless employees with mobiles biggest security threat | IT PRO
Hackers breached a mobile payment system... - BREAKING NEWS - Seattle Sports Nut
IDC's 2015 CIO Predictions: Demand For Analytics Continues To Skyrocket - Forbes
As HomeKit Launch Draws Near, the Internet of Things Still Faces a Major Obstacle | Re/code
Apple Pay Rival CurrentC Hit By Hackers ≈ Packet Storm
Drupalocalypse! Dev Says Your CMS Is Probably Owned ≈ Packet Storm
The Biggest Mistake Companies Make With Security Breaches - The Experts - WSJ
Axcient and Business Continuity Institute to Host Complimentary Webinar Series on Disaster Recovery and Business Continuity Initiatives - BWWGeeksWorld
3 ways to make your Gmail account safer | Naked Security
5 Mistakes You're Probably Making Selling Security - And How To Fix Them! - Powered by Infusionsoft
Websense 2015 Security Predictions Report
Скачать Яндекс.Браузер (бета)
Barracuda Extends Email Management Capabilities for Microsoft Azure Customers - MarketWatch
Hackers Attack Cleburne Servers, May Be Linked To Controversial Dog Shooting | KERA News
Right message, wrong messenger
Judge orders hacking case against Chinese military officers put on hold | TribLIVE
What Are Next-Generation Firewalls? — BizTech
UK smart meters arrive in 2020. Hackers have ALREADY found a flaw • The Register
BBC News - White House computer network 'hacked'
Russian Hackers Suspected In Recent White House Computer Breach | Global Grind
Biggest ever cyber security exercise in Europe is underway
Bugtraq: [SECURITY] [DSA 3059-1] dokuwiki security update
Pirate Bay co-founder found guilty of hacking in Denmark | PCWorld
Barracuda Extends Email Management Capabilities for Microsoft Azure Customers
AVG Technologies Announces New Managed Workplace® Enhancements to Partners at Cloud Summit
IBM Rolls Out Analytics-Based Security Solution - Big Data on Top Tech News
Next-Generation Connected Wearable, Samsung Gear S, Arrives at Sprint Nov. 7 - MarketWatch
Securing Your Portfolio with Network Security Company -
The Mirror journalists to face phone-hacking charges | Rockhampton Morning Bulletin
If next generation firewalls don't evolve, they'll soon be irrelevant |
Axcient and Business Continuity Institute to Host Complimentary Webinar Series on Disaster Recovery and Business Continuity Initiatives
Trend Micro sur Twitter : "Trend Micro CEO, Eva Chen, kicks off the TrendMicro 2014 industry analyst conference #TrendInsight in Boston"
Comprehensive CIP, NERC, and FERC Information Security Policies and Procedures Now Available for Download from North America’s Cyber Security Leaders at
Are You Putting Your Agency’s Networks at Risk? | FedTech Magazine
The Architecture of Morrisons OrderPad
Hackers Breach White House's Unclassified Computer Network |
Most Users Don't Use Windows Update Properly: Report |
White House computer system breached by hackers: Report - Economic Times
Americans Fear Hacking (Much) More Than Murder |
Hackers Breach White House's Unclassified Computer Network |
Gartner Report Reveals Cloud Computing's Top Myths | CloudWedge
Social Engineers work in teams to harness the power of information | CSO Online
Apple Pay rival CurrentC hacked | ZDNet
Drupal Security Team gives ominous news | ZDNet
UK consumers particularly prone to piss-poor patching • The Register
Advisory says to assume all Drupal 7 websites are compromised | CSO Online
White House networks hacked | Naked Security
SMB Fall Housekeeping: 5 Security Concerns to Discuss with Customers | Talkin Cloud Blog
More Than 18.5M California Residents' Information Was Exposed Last Year
White House cyber attack breach of computer network confirmed | BGR
Hackers Breach White House Computers | News | teleSUR
Tim Cook: "I'm Proud to be Gay" - Businessweek
Pirate Bay founder guilty in historic hacker case - The Local
Pirate Bay founder found guilty in historic hacker case - News - The Copenhagen Post
MCX speaks out over CurrentC hack and their position on Apple Pay | SiliconANGLE
European Commission - PRESS RELEASES - Press release - Biggest ever cyber security exercise in Europe today
Louisville Infosec 2014 - Creating The Department Of How: Security Awareness That Makes Your Company Like You.
Apple Pay disabled at Rite Aid, CVS. Building their own system? -
The data breach detection system will eclipse $1bn by 2018 | News | TechRadar
Calif. AG: 18.5 million residents' info exposed - Fairfield Citizen
California tallies retail data breaches | Retail Dive
Microsoft Office 16 release date revealed as H2 2015 | IT PRO
Making the Security Super Human: How to Effectively Train Anyone/Anything – Video – RSA Conference
absorptions: Visualizing hex bytes with Unicode emoji
Correction: Apple Pay-Retail Skirmish story | The Kansas City Star
Photo gallery: McAfee FOCUS 14
Snapchat escapes Australian cyberbullying crackdown, for now | Naked Security
NIST Guide to Cyber Threat Information Sharing open for comments
Post Snowden, most users have changed Internet habits
White House Still Impacted By 'Inconveniences' Following Breach Of Computer System - KMBZ
California Attorney General releases 2014 data breach report and recommendations, finding more of the same. - Lexology
Windows 10: Microsoft's plan to win over the enterprise | IT PRO
Office 365 Strengthens Mobile Device Management #TEE14
Business continuity briefs
Opinion: Congress must act on consumer data breaches
Dynamic endpoint protection by McAfee and ForeScout
Over a third of orgs have no real-time insight on cyber risks
BRIEF-China's Pci-Suntek Tech wins bid for project worth 108 mln yuan| Reuters
UK government faces £5.5m bill as NHS clings on to Windows XP |
Gottfrid Svartholm Found Guilty in Hacking Trial | TorrentFreak
IDC has blind faith in chief digital officers | ZDNet
Windows 10 Technical Preview updated, boasts 7,000 changes and fixes - CNE
Drupal PSA: If You Didn't Patch Within 7 Hours Consider Your Site Compromised - The State of Security
Sue Oliva - Juniper Networks talks to Total Telecom - YouTube
Startup Semprius Fights to Bring Breakthrough Solar Tech to Market | MIT Technology Review
Hackers Breach White House's Unclassified Computer Network |
How to figure out if a data breach is a hoax | ITworld
Hackers break into White House computer network
Cyber Attack Hits White House, Causing Outages | Vanity Fair
Was Russia involved in White House cyber attacks?
How to control Touch ID on the iPhone and iPad - CNE
Data Breaches Jump in California and are Expected to Keep Climbing
FCC: The New Data Security Sheriff In Town | The National Law Review
Apple says 'Shellshock' no risk to vast majority of Mac users, AsiaOne Digital News
California data breach report reveals spike in incidents - SC Magazine
How to fix Text Message Forwarding issues on iOS 8.1 - CNE
Common cloud myths revealed
Why So Many American Retailers Are Fighting to Freeze Out Apple Pay | WIRED
Practice Makes Imperfect: Why Do We Keep Getting Disaster Recovery Wrong? - NJ Spotlight
MCX Confirms Retailer Exclusivity for CurrentC Mobile Payments, but No Fines for Leaving Consortium - Mac Rumors
Microsoft Offers Office 365 Users Free, Unlimited OneDrive Storage - Data Storage on CIO Today
Android's Surprising Next Big Competitor: Google - Mobile Tech on CIO Today
What We Know Now About CurrentC, the Apple Pay Competitor - ABC News
MIS-Asia - Office 365 admins get spreadsheet search help
MCX Holds Press Conference, Does Itself No Favors - The Mac Observer
White House computer network reportedly breached by Russian hackers - Silicon Valley Business Journal
Gartner busts top 10 cloud myths - InformationWeek – IT news & articles
Information-security implications feared as Parliament weighs data retention - CSO | The Resource for Data Security Executives
18.5m Californians vulnerable to fraud | FOX5 San Diego – San Diego news, weather, traffic, sports from KSWB
Apple Pay competitor CurrentC suffers e-mail breach | VatorNews
Adopters of Australian Azure must remember security, governance obligations - CSO | The Resource for Data Security Executives
Breakthrough in MPC Cryptography makes Cloud and Online computing more secure - Media Releases - CSO | The Resource for Data Security Executives
Attack campaign infects industrial control systems with BlackEnergy malware | PCWorld
Mozilla releases geolocating WiFi sniffer for Android • The Register
A Neuroscientist's Radical Theory of How Networks Become Conscious | WIRED
Facebook, Twitter, Instagram AND trolls will be charged over hate-filled posts | Daily Mail Online
Drupal Core - Highly Critical - Public Service announcement - PSA-2014-003 |
CurrentC, an Apple Pay Rival, Has Been Hacked
Big Retail's Apple Pay killer CurrentC HACKED, tester info stolen • The Register
CurrentC won’t let email hack delay launch as it explores NFC | Macworld
GCHQ views data without a warrant, government admits | UK news | The Guardian
Security Slice: Internet Privacy Realities - The State of Security
Fidelity National employees hacked after targeted phishing attack
Beyond a Major, To Be Successful In Security You Need To Select The Right Minor - The State of Security
Drupalocalypse! Devs say it's best to assume your CMS is owned • The Register
Security in the Cloud? Your Questions and Cloud Resources – Blog Post – RSA Conference
Microsoft Band, the smart band powered by Microsoft Health
Computer Hackers Attack Cleburne After Dog Shooting | NBC 5 Dallas-Fort Worth
Microsoft Tightens the Lid on Office 365 Data
Big Retail: We don't hate Apple, just the credit card companies • The Register
Cyber security experts warn Rocket City is top target for hackers |
Fire Brand - Profile - The Listener
Leaked employee passwords open up Fortune 500 companies to hackers
Research Suggests Backoff Malware Still Widely Infecting POS Systems
FM Radio Hack Allows Data To Be Routed Out of Isolated Networks
How to figure out if a data breach is a hoax | CSO Online
Did Russia Just Hack the White House? - The Atlantic
JPMorgan data breach affected 76 million households - Business - The Boston Globe
What IBM can learn from its own cybersecurity business | Network World
White House Still Impacted by ‘Inconveniences’ Following Breach of Computer System | WPRO-AM
KARN News Radio 102.9 FM / 920 AM - Some White House Computer Networks Breached by Hackers [From ABC News]
Suspicious cyber activity at White House detected, addressed| Reuters
DailyTech - The Usual Suspects: Russia or China Suspected in White House Data Breach
Merced community news from Merced Sun-Star in Merced, CA |
Russian Hackers Suspected For Breaching White House Computers | Wall Street OTC
Local News | Columbus Ledger Enquirer
White House hack just the beginning: experts say major cyberattack coming soon
White House detects, addresses sustained cyberattack. Who is the culprit? : LIFE : Tech Times
White House Cyberattack: Officials Confirm Computer Network Hit by Sustained Cyberattack : US News : Latin Post
The Long and Winding Road to Shellshock Recovery | Enterprise | LinuxInsider
Supes campaigns show slight shifts in focus
U.S. Health Care System Woefully Unprepared For Ebola
Office 365 admins get spreadsheet search help - Computerworld New Zealand
Hackers Are Using Gmail Drafts to Update Their Malware and Steal Data | WIRED
Red Hat Security Advisory 2014-1726-01 ≈ Packet Storm
Red Hat Security Advisory 2014-1727-01 ≈ Packet Storm
Red Hat Security Advisory 2014-1728-01 ≈ Packet Storm
Hackers Reportedly Breached White House Network
Cyber breaches put 18.5 million Californians’ data at risk
California Attorney General’s Second Annual Data Breach Report Finds Dramatic Increase in Number of Data Breaches | The National Law Review
Mandriva Linux Security Advisory 2014-211 ≈ Packet Storm
Red Hat Security Advisory 2014-1725-01 ≈ Packet Storm
Debian Security Advisory 3050-2 ≈ Packet Storm
San Diego Source > Technology > Cybersecurity tops SPAWAR concerns
Internet experts: 'Widespread harm' likely from cyber attack in next decade
Options to curb terror | New Straits Times
How to figure out if a data breach is a hoax | PCWorld
How to figure out if a data breach is a hoax -
BSides Toronto 2014 | CSO Online
Nico Sell of Wickr: Privacy Is the New Fame | Re/code
Rappelling off a roof — Red Teams
San Diego Source > News > Cybersecurity tops SPAWAR concerns
Wal-Mart and allies in face-off with Apple Pay over mobile payments| Reuters
The NO-NAME vuln: wget mess patched without a fancy brand • The Register
Juniper Networks sur Twitter : "Spooky week!"
Walgreens Exec On Why They're Backing Apple Pay - Forbes
Cleburne’s computer systems under attack by hackers | Local News | News from Fort...
Tips for protecting yourself against cyber attacks
The Attkisson hacking incident: Vexed by Vox
Just Announced 2014 Corporate Information Security Policy Manual Available for Download from the Compliance Leaders at | Virtual-Strategy Magazine
Watch "Android malware leverages Tor" Video at SCMagazine
Juniper Networks sur Twitter : "Enact #security solutions to fight today’s threats. #NCSAM"
Find Out Whether This Unkillable Tracker Is On Your Smartphone - Forbes
Georgia Tech Releases 2015 Emerging Cyber Threats Report
main is usually a function: A taste of Rust (yum) for C/C++ programmers
OPD, OCSO mishandled Carline Brumaire Jean case, internal reviews show - Orlando Sentinel
"Citizenfour" Directly Confronts the Intelligence Apparatus' Subversion of Democracy
Why You Should Care That the White House Got Hacked
Flash Pack Exploit Leads to New Family of Malware
Cyber security a non-stop headache for federal government, conference hears | Ottawa Citizen
Virtualization advancements focus on protecting data at the source, not on the device - SC Magazine
ForeScout Partners With McAfee to Deliver Dynamic Endpoint Protection
Apple Pay rival CurrentC hit by hackers - CNE
Retail group MCX says it's not telling merchants to block Apple Pay - CNE
University of Rochester Medical Center Installs ForeScout Security
RackWare, NetApp Partner for Cloud-based Disaster Recovery | Cloud Companies content from Talkin' Cloud
Disaster recovery funds must continue: councillor | Fraser Coast Chronicle
6 Backup and Disaster Recovery (BDR) Lessons From October | InfoCenter BDR content from MSPmentor
Whisper, Secret, and Snapchat leaks show that fake privacy is almost worse than no privacy at all | VentureBeat | Security | by Ruth Reader
A Whole New Way to Spot Malware Before It Spots You – Blog Post – RSA Conference
What Does an Idle CPU Do? - Gustavo Duarte
AP IMPACT: US health care unprepared for Ebola : News
AG Says 18 Million in State Touched by Data Breaches Last Year | The Recorder
Apple Pay rival MCX defends security after hackers steal emails | Computerworld
Munchausen by Proxy: A Case Study of Abuse
Hacking Sexism in the Tech Industry - Room for Debate -
AP IMPACT: If Ebola batters US, we are not ready | Daily Mail Online
More Surveillance Punishes Canadians, Not Terrorists | Tom Henheffer
Apple Pay: Apple Pay Competitor CurrentC Has Already Been Hacked
Of course blocking instant messaging at work makes sense | Ars Technica
A Review of the Avast Antivirus After 25 Years
About Google - Products
Activate Symantec’s “Disarm” Feature to Sanitize Infected PowerPoint Attachments | Symantec Connect
Time to step up: vendors missing the mark on IoT - from
Australian E-Health records breached twice in the last year • The Register
McAfee Inc. sur Twitter : "Pop culture's biggest icons are a cause for online search concern—beware of the #RiskyCeleb Top 10:"
Data breach victimizes local woman; Info you need to know |
Modern Day Dillinger Gangs -
Bootstrap 3.3.0 released · Bootstrap Blog
California reports huge jump in data breaches | CSO Online
'State sponsored' Russian hacker group is attacking geographic rivals
Gigamon says it can analyze attacker SSL traffic without hitting performance - Good Gear Guide Australia
Keep Calm & Verify: How To Spot A Fake Online Data Dump
Apple Pay competitor confirms email breach
Russian Hackers Take White House? | The Weekly Standard
White House hacked - Oct. 29, 2014
CurrentC Platform Suffers Security Breach During Pilot Program, MCX Group Attempts To Save Face
White House computers attacked by suspected Russian hackers - The Week
FOCUS 14 live: Obama needs to win back trust after Snowden revelations, says Condoleezza Rice |
Best Of: Free Antivirus Software | KTLA
Office 365 admins get spreadsheet search help -
Hackers Breach White House's Unclassified Computer Network |
How to respond to SEC inquiries concerning data breach and data security policies - Lexology
Collegeville-based Just Chimneys cleaning service fulfills growing need
Gallup: More Americans worried about hacking than murder - Houston Chronicle
The Mirror journalists to face phone-hacking charges | Gympie Times
Citizenfour's Laura Poitras Explains Why Edward Snowden Did It | Phoenix New Times
SVP Young: Intel Security Has No Need To Poach Symantec Partners - Page: 1 | CRN
Next Generation Firewall: CSO Webcast
Popular Science served up Rig Exploit Kit on its website - SC Magazine
SMBs See IoT Potential, Wary of Possible Challenges
Attack on White House systems breached unclassified networks - SC Magazine
Now available – "Windows Server 2012 Security from End to Edge and Beyond" | Cyber Trust Blog
The FBI created a fake malware-spreading newspaper article to trace a bomb threat | The Verge
Email addresses stolen from CurrentC in security breach | The Verge
The Mirror journalists to face phone-hacking charges | Sunshine Coast Daily
How Governments Can Mitigate Data Risks | StateTech Magazine
'Sophisticated' Chinese hackers launched attacks against 43,000 computer systems - SC Magazine UK
How to Use AirDrop to Share Files Between Macs and iOS Devices - Mac Rumors
Panda Free Antivirus 15.0.3 - Neowin
Retail industry’s Apple Pay rival has experienced a data breach - The Washington Post
Are Containers the Beginning of the End of Virtual Machines? -- Virtualization Review
Apple Pay Competitor CurrentC Reports Breach By 'Unauthorized Third-Parties' - The State of Security
Deloitte releases paper on vetting leaks, avoiding costly hoax - SC Magazine
Apple Mac OS X Yosemite Update: Wi-Fi Bug
How to protect your business hardware | News | TechRadar
Microsoft's new Office 365 search tool is like Minesweeper for Excel spreadsheets | PCWorld
PCI Elects Erie's Cavanaugh As Chair
Bad dog: Redmond's new IE tool KILLS POODLE with one shot • The Register
Apple Pay rival CurrentC suffers pre-launch compromise | CSO Online
Independent Herald -
FBI demands new powers to hack into computers and carry out surveillance | US news |
Apple Pay competitor CurrentC reports data breach | 89.3 KPCC
NSA Chief Warns Companies Against Revenge Hacking -
FCC enters new area of privacy and data security regulation with proposed $10 million fine - Lexology
Criminal phone-hacking charges against up to nine Mirror Group journalists 'imminent' - Crime - UK - The Independent
Gartner Explodes 10 Cloud Myths -- Virtualization Review
Microsoft releases anti-POODLE Fix It | ZDNet
Vulnerability Note VU#973460 - drchrono Electronic Health Record (EHR) web applications vulnerable to cross-site scripting and cross-site request forgery
Microsoft’s Perspective on the Cybersecurity Framework: Next Steps for Incentives and International Harmonization | Cyber Trust Blog
Compliance-Based Infosec Vs Threat-Based Infosec
Hexis, Others Put Security Response On Autopilot - Page: 1 | CRN
The BYOD Disconnect Complying With Mobile Device Security At Work
Google Gmail drafts malware attack discovered | BGR
CurrentC, an Apple Pay Rival, Gets Hit by Hackers - Bloomberg
AFP mulls filing disbarment case vs Laude family lawyer Harry Roque | Inquirer News
'Major' hacking attack in US looms: expert survey
Bugtraq: CVE-2014-8399 SQL Injection in NuevoLabs flash player for clipshare
White House network breach was likely nation-sponsored
Dispelling car hacking fears |
N.J. close to passing tougher regulation on data breaches - Philadelphia Business Journal
Blocking Apple Pay Is A Terrible Strategy For CurrentC Merchants - Forbes
CurrentC's Data Breach Adds to Awful Week for Apple Pay Rival - Businessweek
NSA Chief Warns Companies Against Revenge Hacking - Defense -
'Major' hacking attack looming in US: Expert survey
McAfee Inc. sur Twitter : ".@condoleezzarice and @youngdchris have an informal chat about the current landscape of #cybersecurity at #FOCUS14"
#CiscoChampion Radio S1|Ep 38. Threat Focused Firewall
Bugtraq: SEC Consult SA-20141029-0 :: Multiple critical vulnerabilities in Vizensoft Admin Panel
Bugtraq: SEC Consult SA-20141029-1 :: Persistent cross site scripting in Confluence RefinedWiki Original Theme
Patrick Flynn sur Twitter : "McAfee's DXL Digital Exchange Layer #FOCUS14"
Attack campaign infects industrial control systems with BlackEnergy malware | CSO Online
Juniper Networks sur Twitter : "A new day, a new quiz question. Show off your chops in today’s certification quiz."
Cracking wifi passwords with Kali Linux
Kaspersky Lab: 94% of Companies Are Dealing with Cybersecurity Issues | Managed Security Services content from MSPmentor
Samsung fixes bug that let hackers lock phones | TheHill
Hackers swipe e-mail addresses from Apple Pay-competitor CurrentC | Ars Technica
Credit-card hacking 'is top crime worry' - IOL SciTech |
Rival to Apple Pay is breached by hackers | TheHill
MCX suffers email address data breach • NFC World+
Samsung users vulnerable to DDoS attacks via Find My Mobile service | SiliconANGLE
NHS Trusts Are Still Struggling On With Windows XP, FOI Request Finds
White House won't confirm Russian hacking connection - Washington Times
Apple Pay’s biggest competitor has already been hacked | Cult of Mac
StrikeForce Technologies, Inc. Announces Cino Ltd. as a Global Cyber Security Distributor
Bugtraq: [security bulletin] HPSBUX03159 SSRT101785 rev.1 - HP-UX kernel, Local Denial of Service (DoS)
Bugtraq: [ MDVSA-2014:211 ] wpa_supplicant
Hackers Breach White House's Unclassified Computer Network |
FireEye uncovers Russian malware with hint of government backing |
Five smartwatch features we’ll see by 2015 | Features | PC Pro
Gigamon says it can analyze attacker SSL traffic without hitting performance - PC World Australia
Apple Pay competitor CurrentC suffers its first data breach -- AppAdvice
AP IMPACT: US health care unprepared for Ebola ::
​Samsung phones vulnerable to hacking - CBS News
Retailer-Backed Apple Pay Rival CurrentC Has Been Hacked, Testers’ Email Addresses Stolen | TechCrunch
Panel teaches small business how to secure technology - My News 4 - KRNV, Reno, NV
Gavin Struthers sur Twitter : "#FOCUS14 #intelsecurity @MichaelFeyCTO 2014 marks the death of security by obscurity"
Hacker Lacroix apologizes, gets four years in federal prison - SC Magazine
AntiVirus PRO Android Security - Android Apps on Google Play
MSRC - Site Home - TechNet Blogs
Kaspersky Lab eStore
My Kaspersky
SMB Disaster Recovery Toolkit Released By DatabarracksChannelBiz UK
Securonix taps former BofA exec for chief scientist role - SC Magazine
Espionage Hacks Tied To Russians - BankInfoSecurity
Sprout | HP® Official Site
Walk, Don’t Run: A Security Framework For Midsize Organizations
Why Credit Card Companies Couldn't Stop Hacks At Target And Home Depot
Latest local news from San Luis Obispo, CA | The Tribune
Survey finds many experts fear worsening cyber attacks | SiliconBeat
White House Computers Breached By Hackers
Experts: Major cyberattack will hit in next 11 years
White House Computers Breached By Suspected Russian Hackers
White House’s unclassified computer network hacked | US news | The Guardian
Fake "Online Ebola Alert Tool" delivers Trojan, unwanted apps
Orgs choose network performance over security
MPAA urges USTR to put pirate sites on 'Notorious Markets' list - SC Magazine
Juniper Networks - press-releases
Hacking is the crime Americans worry about most, Gallup poll shows - DecodeDC Story
Cyber Attacks Likely to Increase | Pew Research Center's Internet & American Life Project
Russia may have hacked White House computers: report  - NY Daily News
The Value of Endpoint and Network Protection Together
Securing Your Online Reputation - YouTube
Can Authorities Cut Off Utilities And Pose As Repairmen To Search A Home? : NPR
Voxer Appliance Enables Self-Contained, Secure, Real-Time Voice and Instant Messaging Deployments for Government Organizations | Virtual-Strategy Magazine
Easy Network Security with Palo Alto Networks | InsideTrade
Voxer Appliance Brings Secure, Real-time Voice, Instant Messaging Deployments to Government Organizations | TruTower
Chrome update vs Firefox download with security armor for Mac OS X and Windows 8.1 - The REM
Check Point Launches Capsule: Mobile Security that Goes Wherever Users Go
Four Strategies for Successful Next-Generation Firewall Deployment | FedTech Magazine
Know Right Now: Russian Hackers Take on the White House
Cost Of Data Breach Detection System Rising; Will Be Over $1bn By 2018 | AEG India
Emory Hospital Shares Lessons Learned On Ebola Care | NCPR News
Americans Are More Afraid of Being Hacked Than Getting Murdered
Anti-virus is no longer enough - new apps show how vulnerability scanning is becoming a must - Blogs -
Five Ways Automation Speeds Up Big Data Deployments
TeamDigi7al US navy hacker sentenced to 2 years in jail | Naked Security
The “Dirty Dozen” SPAMPIONSHIP – who’s got the biggest zombie problem? | Naked Security
Banks' Concerns About Cyberthreats Grow - BankInfoSecurity
The big one: The makings of a global cyber attack | InfoWorld
More Californians exposed to data breaches, says state Attorney General |
Microsoft's Android moment has arrived - TechRepublic
Lollipop's new features sweeten the Android experience - Tech Opinion | The Star Online
Top Security Threats Still Plaguing Enterprise Cloud Adoption --
How hackers access sensitive information: cybersecurity report
How to make your Windows 8.1 PC run faster |
Hackers Use 'Find My Mobile' To Wipe Any Samsung Phone - Business Insider
Information Security News: Hackers breach some White House computers
Lite-On EP1 Series SSDs deliver PCI Express speeds in M.2 format | ZDNet
SSCC 171 – Are you SURE that “1234” is a bad password? [PODCAST] | Naked Security
RSA sur Twitter : "Remember, what you do online can potentially affect everyone. Practice good #online habits! #NCSAM"
Louisville Infosec 2014 - Changing What Game- One Future For Information Security
6 Ways Ambient Assisted Living Improves Quality of Life
Seagate NAS 2-Bay Review & Rating |
Russia-linked hackers allegedly penetrated unclassified White House networks - Sun, surf and the NIST framework - POLITICO Morning Cybersecurity -
BYOD: Why the biggest security worry is the fool within rather than the enemy without | ZDNet
CPI Financial | Jobs | Business Continuity Manager
Password Manager – Online Account protection – Don’t be that Guy
SANS Institute - Photos du journal | Facebook
Studies find fast traders get data from SEC seconds early: WSJ| Reuters
McAfee Report Reveals Organizations Choose Network Performance Over Advanced Security Features | Business Wire
White House Hacked: Computer Networks Breached, Reportedly By Russians
The Tribune, Chandigarh, India - Latest News
Israeli Accelerator UpWest Helps Startups Move to Silicon Valley - Venture Capital Dispatch - WSJ
MSPs Can Help SMB Customers Pursue BYOD -- Safely | MSPmentor Blog
Why the defense industry is ripe picking for hackers - The Week
White House hacked (Russia involved?)
Growing BYOD Trend in Middle East Requires Ramped Up Data Center Security - Zawya
Why even compliant enterprises can be vulnerable in today’s threat landscape | Information Age
New report looks into Global bring your own device (BYOD) market that is expected to grow to $83.76 billion by 2019 - WhaTech
Samsung Find My Mobile bug lets hackers remotely lock devices | Daily Mail Online
Identity Theft Resource Center - TOLL-FREE NO COST ASSISTANCE at 888-400-5530
White House Computer Network 'Hacked' ≈ Packet Storm
BlackEnergy Malware Has Compromised Systems For 2 Years ≈ Packet Storm
Hackers Are Using Gmail Drafts To Update Their Malware And Steal Data ≈ Packet Storm
Hackers target unclassified White House network | CSO Online
For big raises in IT, look to mobile, security, big data -
Security Companies Team Up, Take Down Chinese Hacking Group
Walk through buildings from your own device
How software defined networking and cloud computing pave the way towards a digital society - Cloud Tech News
The FBI says to be wary of hackers ... and to let the FBI hack what it wants | Trevor Timm | Comment is free |
WHITE HOUSE network DOWN: Nation-sponsored attack likely • The Register
The Link You Just Clicked May Not Be Real - Bloomberg View
Why networks 'are being sacrificed for security' - Computer Business Review
'State sponsored' Russian hacker group linked to cyber attacks on neighbours | Technology |
Fortune 500 Companies at Risk with Exposure of Employee Passwords - The CIO Report - WSJ
Data Breaches? Bah, humbug! We're going to shop - Money -
Americans are more afraid of being hacked than of all other crimes, including murder | The Verge
Unwitting Workers Give Hackers Keys to Fortune 500 Firms' Networks: Study - NBC News
Sanovi and 3Qube Partner to Provide Business Continuity in the Cloud
Hackers infiltrate White House network | ZDNet
SymantecVoice: How To Hire The Best IT Security Team For Your Business - Forbes
Snap webcam photos whenever your app crashes
Attorney general: 18.5 million Californians had info hacked, stolen or exposed | Local & Regional News | Bakersfield Now - News, Weather and Sports
How you would fix Social Security: Sooner rather than later - The Washington Post
HMSHost deploys WatchGuard firewall system | QSRWeb
Cyber Espionage Attacks Attributed To Russian Government
Hacked! Russian Hackers Breached White House Computer Networks
FireEye report provides a view into Russia's cyber-espionage tactics | Uncover Michigan
US ICS operators under attack by crims wielding BlackEnergy malware
Information Security News: Army fitness standards for fat ‘cyber warriors’ may change as U.S. waistlines grow
Arrests made after ‘specialist malware’ used in £1.6 million ATM heist | Naked Security
FISMA and NIST Information Security Policies and Procedures Available for Instant Download from the Security Experts from Flat Iron Technologies, LLC
Louisville Infosec 2014 - Practical Interception Of Mobile Device Traffic
Gigamon says it can analyze attacker SSL traffic without affecting performance | Computerworld
BYOD: How to keep the boss out of your business -
Data breach: Most holiday shoppers undeterred
NHS Trusts struggling with Windows XP migration, FoI request finds -
Tech support’s NSFW problem
Enterprise network security takes backseat to speed: McAfee | ZDNet
White House computers 'breached by hackers' - ITV News
Placemeter monitors streets from apartment windows: time to don a mask? | Naked Security
ASU-Beebe Warns Campuses Of Possible Data Breach | Times Record
Internet Archive: Digital Library of Free Books, Movies, Music & Wayback Machine
Microsoft Offers Office 365 Users Free, Unlimited OneDrive Storage - Cloud Computing on CIO Today
Google upgrades Android Lollipop security with encryption - IT News from
How to keep emails private and avoid embarrassing leaks
Azure expands, while security, storage, APIs lift Office 365 | InfoWorld
Information Security News: BlackEnergy crimeware coursing through US control systems
Information Security News: Research links massive cyber spying ring to Russia
New Rulings Protect Hospitals Against Security Data Breaches
Securing Social Business in Office 365
10 steps to a safe driving program
South Korea spy agency says North hacking smartphones
Newly Revised 2014 Cyber Security Policies and Procedures Available for Instant Download from the Experts at
10% of employees unaware if they have an IT department or not
Enterprise Data Protection Simplified & Enhanced with NetBackup 5330 | Symantec
This is why I can’t have conversations using Twitter - Antirez weblog
Washington Post: Russia suspected to be behind White House hack
Cyber breaches put 18.5 million Californians' data at risk in 2013: report| Reuters
White House Detects Suspicious Cyber Activity, Report Blames Russia
National Stories - WJAC
Gigamon Announces New Solutions for SSL Visibility and Enhancements for Multi-Tiered Security - MarketWatch
Russians accused of hacking White House computer network -
Report: Security Pressures Making Older Firewalls Obsolete -- THE Journal
The Death Squad Dilemma: Counterinsurgency Policy and the Salvadoran Model - Foreign Policy Journal
Allied Telesis Selects Emerging Threats’ ETPro® and IQRisk® Products for New Range of Next-Generation Firewalls | Business Wire
IT is losing the battle on security in the cloud
Sony Xperia Devices Secretly Sending User Data to Servers in China
TITUS Recognized by McAfee as Most Valuable Partner of the Year | Virtual-Strategy Magazine
EMEA CR Awareness Event: Drumming Up EMEA’s Corporate Responsibility Initiatives | Symantec Connect
Turning Medical Device Hacks into Tools for Defenders – Podcast – RSA Conference
Seoul: N. Korea's Kim Jong Un had ankle surgery | The Kansas City Star
PhishLine Recognized as a Visionary in Gartner 2014 Magic Quadrant for Security Awareness Computer-Based Training - Press Release - Digital Journal
Attorney General Kamala D. Harris Releases Data Breach Report; 18.5 Million Californians’ Personal Information Put at Risk
Louisville Infosec 2014 - Building An Enterprise Ddos Mitigation Strategy
SC Magazine Awards PFU iNetSec Smart Finder 5-Star Rating for Features, Ease of Use, Performance, Support and Value | Virtual-Strategy Magazine
How Governments Can (and should) Use Hadoop | SmartData Collective
BlackEnergy crimeware coursing through US control systems • The Register
Careers - TerrAvion
Russian government gathers intelligence with malware: report - CNE
South Korea Spy Agency Says North Hacking Smartphones
California AG Says 18.5 Million Residents' Info Exposed - US News
Cryptography Hacks - Hash Encryption using DuckDuckGo Search Engine
Enable the Agile Data Center | Symantec
Fixing the broken windows of software security
PhishLine Recognized as a Visionary in Gartner 2014 Magic Quadrant for Security Awareness Computer-Based Training
Citrix Positioned for the Eighth Consecutive Year in the Leaders Quadrant for Application Delivery Controllers MQ - Finances
Comment: Retailers are too complacent about data security | Comment | Retail Week
US Urges More Government-Business Cooperation on Cyber-Security | NDTV Gadgets
New Personal Trading Instruments (PCI) from IFC Markets are Now Available for Trading - MarketWatch
Microsoft leans on data-center strength to get cloud edge -
Charleroi to review school security plan | TribLIVE
Personal data of more than 18.5 million Californians exposed - SFGate
Gartner Recognizes FishNet Security for Computer-Based Security Awareness Training - Power Engineering
North Korea: Stop sending it luxury goods (Opinion) -
Ed Snowden Taught Me To Smuggle Secrets Past Incredible Danger. Now I Teach You. - The Intercept
Warnings Issued About Fake Ebola Treatments, Malware Scams - iHealthBeat
The Man Who Writes His Dissenting Opinion in ALL CAPS
Maine nurse who treated Ebola patients will not observe quarantine - CBS News
Hackers Breach White House Computers - The Daily Beast
Personal Info Of 18.5M Californians Exposed In 2013 | KPBS
McAfee Report Reveals Organizations Choose Network Performance Over Advanced Security Features - MarketWatch
Data breaches jump in California and are expected to keep climbing - LA Times
Seoul: N. Korea's Kim Jong Un had ankle surgery | The Miami Herald
IBM Rolls Out Analytics-Based Security Solution | Sci-Tech Today
White House officials confirm breach on unclassified network | CSO Online
Louisville Infosec 2014 - A Crosswalk Of The Department Of Defense (Dod) Information Assurance Certification And Accreditation Process (Diacap)
Kaci Hickox Won't Follow Maine Ebola Quarantine Rule, Lawyer Says - ABC News
Gigamon says it can analyze attacker SSL traffic without hitting performance - PC World New Zealand
US eyes cyber `deterrence` to stop hackers
Boe Forum speaker: Protection from hackers a top priority
AG Kamala D. Harris Releases Data Breach Report; 18.5 Million Californians' Personal Information Put at Risk
Local News |
US military to secure cyberspace
Cisco: We made UCS secure but need your help to finish the job • The Register
Outgoing PCI chair wins President's Award | Business Insurance
New PCI chairman monitors federal regulatory posture | Business Insurance
US-CERT warns of phishing campaign spreading Dyre - SC Magazine
Data Breaches Plague California | ATVN
Hackers Breach White House's Unclassified Computer Network - ABC News
California reports huge jump in data breaches | PCWorld
Find My Phone does just one thing but Samsung's messed it up • The Register
Calif. AG: 18.5 million residents’ info exposed - The Washington Post
California reports huge jump in data breaches | Computerworld
Data breaches affected 18.5 million Californians last years |
Hackers breach White House network - Security - News -
Intel Exec Tells Partners Missed Security Services Opportunity 'Criminal' - Page: 1 | CRN
New Intel Security boss asks the big question | Computer Dealer News
Has the mystery behind Kim Jong Un’s disappearance been solved? | Toronto Star
The Chosun Ilbo (English Edition): Daily News from Korea - N.Korea Hacks 20,000 S.Korean Smartphones
McAfee Overhauls Partner Program | Information Technology Channel Partner Programs content from The VAR Guy
Report: Russian hackers thought to breach White House network - News - Stripes
Businesses Learn Cyber Security
McAfee Report Reveals Organizations Choose Network Performance Over Advanced Security Features
Additional indicators relating to Sofacy (APT28) phishing - Cyber security updates
Malware don't need Coffee: The worst of Windows "Police Locker" is also available on Android
Security vendor coalition cleans 43,000 malware infections used for cyberespionage | PCWorld
MacOS X 10.10 & FreeBSD10 ftp Remote Comand Execution -
Microsoft's Innovation Can Take It Higher -
White House computer network is hacked, official says - LA Times
How an ankle brought Kim to heel -
Seattle FBI admits to faking news report to drop spyware on teen's computer -
Social News 29/10 - News VietNamNet
The dangers of opening suspicious emails: Crowti ransomware - Microsoft Malware Protection Center - Site Home - TechNet Blogs
Threat Spotlight: Group 72, Opening the ZxShell
Pentester Academy Lab
North Korean Leader Kim Jong Un Had Ankle Surgery: Officials
N. Korea attempts to hack into S. Koreans' smartphones: NIS
Gigamon says it can analyze attacker SSL traffic without hitting performance | PCWorld
The Ten Most Wanted Hackers By The FBI – #9 and #8 - The State of Security
300,000 Social Security Numbers, driving licenses and more private data leaked after being left on publicly accessible server
Chip-based cards targeted after Home Depot hack | TheHill
Louisville Infosec 2014 - Issa Awards
Suspicious Activity Detected on White House Computer Network
UPDATE 2-Suspicious cyber activity at White House detected, addressed| Reuters
How Qualys tackles an incident response | IT Business
Google for Work scores 45,000 new users -- should Microsoft worry?
Suspicious cyber activity detected by technicians at the White House, AsiaOne World News
Apple Addresses 'Shellshock' Bug as More Attacks Appear
McAfee Delivers New Product Portfolio for Small and Medium-Sized Businesses - Press Release - Digital Journal
Cyber attacks enrich security specialists - Worcester Telegram & Gazette -
NHS Greater Glasgow and Clyde issue apology after confidentiality breach | Herald Scotland
Mobile Is Eating the World | Andreessen Horowitz
White House says it has handled suspicious hacker activity | CTV News
Former NSA Official Warns Companies Against Cyber-Retaliation or ‘Hacking Back’ | Military & Intelligence | RIA Novosti
IATA launches Aviation Cyber Security Toolkit -
The world of 'hackonomics' - Video
Prometric Expands Industry Leadership for Systems Security and Management - Power Engineering
Hackers breach some White House computers - The Washington Post
Is the Washington Press Corps Covering Up Another Obama Administration Fiasco? [Updated] | Power Line
Local issues, national candidates in Nov. 4 general election : The Issaquah Press – News, Sports, Classifieds and More in Issaquah, WA
A New Ambition for Europe: A Memo to the European Union Foreign Policy Chief - Carnegie Europe
FBI uncovers second person leaking government documents - SC Magazine
FireEye identifies cyber espionage group possibly tied to Russian government - SC Magazine
Avoiding BYOD? Why Setting BYOD Policies Is Increasingly Critical – Video – RSA Conference
Hacks on Californians shot up last year, more are expected this year - LA Times
California Attorney General Kamala Harris: 18.5 million residents' information exposed |
Hackers hit data of 18.5M Californians in mostly retail breaches : PERSONAL TECH : Tech Times
MFE PS14 Highlight - YouTube
'GCHQ's surveillance data gulp is BULKY and WARRANTLESS', human rights groups moan • The Register
Find My Phone glitch lets hackers lock up Samsung handsets : PERSONAL TECH : Tech Times
Potential data breach for 44,000 Arizona retirees
Office 365 is getting management features for iOS, Android and Windows Phone -
Amit Yoran promoted to RSA president - SC Magazine
Latest breaking news from Hilton Head & Beaufort, SC | The Island Packet
Pawn Storm Espionage Attacks Use Decoys, Deliver SEDNIT - Security News - Trend Micro USA
Survey: The Crime Americans Worry About Most? Credit Card Hack Attacks – Consumerist
Coalition sheds more light on Hikit threat, Axiom spy group - SC Magazine
Data breach at Cape May-Lewes Ferry — NewsWorks
ASU-Beebe warns campuses of possible data breach | The Miami Herald
Gigamon announces new solutions for SSL visibility and enhancements for multi-tiered security - Media Releases - CSO | The Resource for Data Security Executives
'Cash out' crew member sentenced to 21 months in prison - SC Magazine
SuperValu Reports Second Cyberattack
Louisville Infosec 2014 - What Your Web Vulnerability Scanners Aren't Telling You
Health board apology to 86 transgender patients over privacy breach | Glasgow & West | News
Calif. AG: Personal data hacked, exposed from 18.5 million Calif. accounts in 2013, up 600 pct - 10/28/2014 12:37:03 PM | Newser
AZ State Retirment System Responds To Potential Data Breach | KJZZ
WatchGuard Technologies Delivers a Leading Combination of Security and Value in NSS Labs' Analysis of Next Generation Firewall Appliances - Press Release - Digital Journal
State Hacking Hike |
Local & North Carolina state news from Raleigh, NC |
Unencrypted Discs with PHI Create Potential Health Data Breach |
Review: Batch Commander for Pro Tools, from Slate Media Technology | SonicScoop - Creative, Technical & Business Connections For NYC’s Music & Sound Community
The evidence that Sharyl Attkisson got her laptop hacked seems weak - Vox
Man charged with hacking into Clinton's computers
Report: Russian Government in on Hacking Schemes
The grinch who hacked Telethon's Instagram account
Layering EMV chip, tokenization, encryption bolsters card payment security - SC Magazine
Watch "Hackers exploiting Microsoft PowerPoint to access computers" Video at SCMagazine
Providing Next-Gen Security for Today’s Healthcare - YouTube
Microsoft’s Commitment to Protect Customer Data through Encryption Continues | Cyber Trust Blog
NASA Television | NASA
NSA Chief Warns Companies Against Revenge Hackings -
Amit Yoran Named RSA President; Art Coviello Remains as RSA Executive Chairman
This Credit-Card-Size Cellphone Would Be the Ultimate Backup
​Watch your attachments: Microsoft Office bug lets hackers take over computers — RT USA
Gavin Struthers' Partner Summit 2014 Keynote Recap | McAfee
Partner Summit 2014 Wraps Up | McAfee
Is Jailbreaking Apple iPhone 6 and iOS 8 Legal? Let’s Find Out! | Master Herald
Hacking Group May Be Linked to Russian Government: Video - Bloomberg
More Evidence the Government Hacked Sharyl Attkisson's Computer
OneNote for iOS gets cloud storage attachments and Touch ID, OneNote for Mac gets SharePoint Server support | VentureBeat | News Briefs | by Emil Protalinski
Techday – Think you know all there is to know about the cloud? Think again
Cybersecurity Executives Raises Hacks - Business Insider
US-CERT Warns of Phishing Campaigns Spreading ‘Dyre’ Banking Trojan - The State of Security
Wall Street Beset by Hackers Raises Key Executive Pay - Bloomberg
Microsoft Launches TechEd Europe with Wave of Announcements | Cloud content from Windows IT Pro
Hacking is the crime Americans worry about most, Gallup poll shows - DecodeDC -
Wall Street Beset by Hackers Raises Key Executive Pay - Businessweek
Who knew? MPAA concerned online pirates are exposed to malware | Ars Technica
Tor users advised to check their computers for malware | Technology |
Hugging a Medieval Book | medievalbooks
Improving cybersecurity for small and medium-sized businesses | Federal Times |
Cisco Unveils Industry's First Threat-Focused Next-Generation Firewall
Republican 2016 Contenders Have Taken Positions on NSA Reform. Where Does Hillary Clinton Stand? - Defense -
Why International Cybercrime Is Going To Keep Getting Worse | Fast Company | Business + Innovation
Security Avengers team up to take down Chinese hacking group • The Register
Official Website of Popular Science Compromised
Kaspersky Lab sur Twitter : "We'd like to extend a very big thank you to our sponsors today at the #KasperskyGSS Government Cybersecurity Forum:"
Louisville Infosec 2014 - A Place At The Table
2600 Profiled: "A Print Magazine For Hackers" - Slashdot
Small Business Security: Hackers Dial Up Telephone Fraud
Finextra: Feedzai and Encap form security partnership
Lawyers in Seattle ask to move Russia hacking trial to May | - Northwest
Deliver Business Value Through Big Data: Make It Small
18.5M Californians' data breached last year: Report
DailyTech - Samsung's Remote Wipe Could Let Hackers Hold Your Phone Ransom
Local news from Bellingham, Whatcom County, WA |
Prometric Expands Industry Leadership for Systems Security and Management - Power Engineering International
McAfee Inc. sur Twitter : "At the Demonstrating Proxy on #NGFW Turbo Talk—looking at improved isolation between clients and servers. #FOCUS14"
Vulnerability Note VU#685996 - GNU wget Arbitrary Filesystem Access through FTP Symlinks