Google Play Store Host Application That Steal Users Account | SecTechno
The Hacker News sur Twitter : "Wish u all a very very Happy 66th Republic Day. #India #26January #RepublicDay #JaiHind #JaiHo #ObamaInIndia"
Tighter Control Over Your Referrers | Mozilla Security Blog
Task 15: Data Exfiltration with XMLHttpRequest
Cartero- E-Mail phishing framework | SecTechno
Rooted Con 2014 - Manu Quintans &Amp; Frank Ruiz - 50 Shades Of Crimeware
3 key data security issues HITRUST needs to consider | Healthcare Dive
Adobe patches 2nd Flash Player Zero-day Vulnerability - Hacker News
Wireless Lan Security Megaprimer Part 6: Pwning Hidden Ssids
Job Market Newbies: Lock down your social media profile -
Do you want to be the next networking super-power?... - J-Net Community
Data Encryption On The Rise - Network Computing
PC Users Group meeting and talk on cyber security at library | Trumbull Times
Tina Dupuy: Choosing weed policy over cyber security
lcamtuf's blog: Looking back at three months of afl-fuzz
Rooted Con 2014 - José Pico And David Perez - Attacking 3g
Microsoft's HoloLens explained: How it works and why it's different - CNE
Six ways identity will take center stage in 2015 - SC Magazine
From Infection to Extortion: Watch TorrentLocker In Action - Security News - Trend Micro USA
#ChatDPD Twitter Chat: Things You Should Know About Your Privacy On the Go (with images, tweets) · StaySafeOnline · Storify
The Supply, Demand, and Cost of Your Data - Security News - Trend Micro USA
Business Continuity Plans + Notifications = Business Value | BrightTALK
Module 1: Introduction to Python and Setting up an Environment
Symantec cyber-resilience
News, sports and weather for Tacoma, WA| The News Tribune &
Cisco Security sur Twitter : "Attending #CLEUR in Milan this week? Make sure to stop by the #security booth to check out our live demos!"
Rooted Con 2014 - C. Lorenzana &Amp; J. Rodriguez - Why Call Apt's, When What They Mean Is Money
Proposed CFAA revisions agitate IT security community - SC Magazine
Game over? Sony FINALLY offers compensation to MEELLIONS of PSN hack victims • The Register
Module 6: Daemons and Backdoors
Job STEM-ulation - The Killeen Daily Herald: News
Rooted Con 2014 - Jose L. Verdeguer &Amp; Víctor Seva – Secure Communications System
Insertion Encoder
Rooted Con 2014 - Jorge Ramió - Rsa Turns 36 Years And Its Youth Card Has Expired
US Gas Stations Exposed to Cyberattacks: Researchers | SecurityWeek.Com
Flash 0-day Exploited by Angler Exploit Kit
Family finances: when to worry about a data breach - Tulsa World: Money Power
Rooted Con 2014 - Miguel Tarasco - Native Wifi Analysis Under Windows
Apple's OS X 10.10.2 to Fix Security Vulnerabilities Exposed by Google's Project Zero - Mac Rumors
Biden Unveils $25 Million Grant to Support Cyber Security Education : News : ISchoolGuide
Rooted Con 2014 - Andrés Tarasco – Targeted Attacks With Wi-Fi Apts
Future of IT Podcast: Becoming Cyber Resilient in Today’s Internet of…
Backtrack 5 Wireless pen testing: Book Review - YouTube
Challenge 5: Digest Authentication Attack
Digital Doomsday Coming? ~ Sunday, 25th January 2015 from 4Hoteliers
Rooted Con 2014 - Jeremy Brown &Amp; David Seidman - Microsoft Vulnerability Research
How Origami Might Soon Be Used to Power the Internet of Things | Motherboard
Strong Authentication and the Trusted Mobile Device - YouTube
Challenge 33: XSS 14
A Guide for CISOs Concerned About Data Collection – Blog Post – RSA Conference
Rooted Con 2014 - Francisco J Gómez And Carlos J Diaz - Sinfonier
Cyber Threat Detection and Incident Response
Appie – Android Pentesting Portable Integrated Environment | Aditya Agrawal
Clues, code-breaking, and cruciverbalists: the language of crosswords | OUPblog
Police Using High-Tech Device to See Through Walls Warrantlessly - Hacker News
IANS - CISO Impact Center
Lawsuits, Legal News & Issues, Lawsuit Settlements, Class Action Lawsuits
Choosing Weed Policy Over Cyber Security | UK Progressive
JavaScript for Pentesters Archives - Securethelock
Rooted Con 2014 - Alfonso Muñoz – Hiding Communications In Natural Language
What Government Can (And Can't) Do About Cybersecurity
Weekend news review: January 20-23
Watch "Reading the Tea Leaves of the RSAC Submissions" webcast
PentestingSkills sur Twitter : "Solved! First GDB test(easy) @securitytube SLAE64 course "Welcome to SLAE64 course""
x86_64 Assembly Language and Shellcoding on Linux
Here's the Secret Silk Road Journal From the Laptop of Ross Ulbricht | WIRED
Rooted Con 2014 - Pau Oliva – Bypassing Wifi Pay-Walls With Android
CyberWar Games- Video 2 Title: Tools and Concepts - nmap and Metasploit Framework - YouTube
9 Lethal Linux Commands You Should Never Run Free Guide
malwaRE- Malware repository framework | SecTechno
2015 Enterprise Dev Predictions, Part 3: Digital Transformation and Lifecycle Virtualization -- ADTmag - St. Peter's Health Partners warns of possible data breach
Rooted Con 2014 - Antonio Ramos – Agility: The Road To Security
Mouse-Box — An Entire Computer inside a Mouse - Hacker News
Module 2: NOT Encoder
SAN BERNARDINO: Community matters to Cyber Security Center - Press Enterprise
Rooted Con 2014 - Pablo Gonzalez And Juan Antonio Calles – Cyberwar: Looking For… Touchdown!
CyberWar Games Improves Security by Allowing Symantec Employees to Think Like a Hacker | Symantec Connect
Cough up your social media password or go to jail | CSO Online
We Should All Step Back from Security Journalism — The Message — Medium
Basic Authentication and Form Bruteforcing (Intermediate)
Rooted Con 2014 - Alberto Cita – Skype: An Analysis Of Security And Privacy
World's first 3D-printed apartment building constructed in China - CNE
What Poweliks tells us about our current state of security | VentureBeat | Security | by Pedro Bustamante, Malwarebytes
Cyber warfare: Capitol staffers aren’t ready - Tal Kopan - POLITICO
A Glimpse at the Latest Sandbox Evasion Techniques | SecurityWeek.Com
Panicked teen hanged himself after receiving ransomware scam email • The Register
​Ubuntu wants to be the OS for the Internet of Things | ZDNet
Chelsea Heights could see federal disaster-recovery funds - Atlantic City | Pleasantville | Brigantine
Rooted Con 2014 - Jorge Bermudez – Hackers Are From Mars, Judges Are From Venus
Grill parts website experiences system intrusion, payment card breach - SC Magazine
New Apple iOS 8 Crisis Creates Chaos For Users - Forbes
A Game of Cat and Mouse: Malware Evasion Techniques | BrightTALK
SmartCMS 2 SQL Injection ≈ Packet Storm
SmartCMS 2 Cross Site Scripting ≈ Packet Storm
ferretCMS 1.0.4-alpha Cross Site Scripting / SQL Injection ≈ Packet Storm
Challenge 34: XSS 15
Researchers examine role of 'white hat' hackers in cyber warfare
Registry Study: Transradial Appears to Best Transfemoral PCI Regardless of Presentation - Journal News - TCTMD
Endpoint Security: Protecting against the Next Generation of Attacks -
New “Zero-day” in Adobe Flash: What You Need to Know -
Prevention and Protection: The Best Practices for Enterprises in 2015 - Security News - Trend Micro USA
Personal privacy, internet commerce and national security: can they co-exist? | Information Age
Blogs |
Rooted Con 2014 - Rootedpanel - Cyberweapons
This Small Box Will Stop Hackers from Turning Your Smart Home Against You | Motherboard
Aspiring Singer Arrested in Israel on Suspicion of Hacking Madonna | WIRED
Cybrary.IT’s Free Cybersecurity Training Set to Change Tech Ed
As Automotive Makers Accelerate at CES 2015, Time to Consider Cybersecurity -
Microsoft Security sur Twitter : "How can you make an impact on @DataPrivacyDay? Join us on 1/28 for guidance & resources! Use #DPD15"
Critical Flash Player hole plugged, another still unpatched and exploited
Task 4: Modify Form Fields
You’re Not Ready For Disaster Recovery, Despite What You May Think | CIO
Even When Sharing Top Billing with Edward Snowden, the NSA Is Unrepentant - The Intercept
CTB-Locker ransomware variant being distributed in spam campaign - SC Magazine
5 Things We Can Learn from 2014 Data Breaches - Security News - Trend Micro USA
Grading the President’s SOTU Cybersecurity Agenda | Network World
Fuel tank gauges vulnerable to attackers - SC Magazine
Due to hack, Sony requests financial filing extension - SC Magazine
Why Isn’t It Easier to Customize Enterprise Mobility and Guest Portals?
Critical Java updates fix 19 vulnerabilities, disable SSL 3.0 | InfoWorld
Phishing quiz: Can you spot a scam when you see one? Don't be so sure - CBS News
Analysts detail spying tool Regin's malicious modules - SC Magazine
Register – RSA Conference
Task 17: CSRF Token Stealing
US spy program has financial, security impacts, says Snowden | CSO Online
New framework helps companies quantify risk | CSO Online
Rooted Con 2014 - Jaime Sánchez And Pablo San Emeterio - Whatsapp: Lies And Videotapes
WHITE PAPER▶ Symantec Security Response Presents:The Waterbug Attack …
Information Security News: Yes, 123456 is the most common password, but here’s why that’s misleading
Information Security News: How a 7-year-old girl hacked a public Wi-Fi network in 10minutes
Time To Apply A Risk-Based Approach To Information Security Training | The Network, Inc. - JDSupra
Vulnerability Note VU#546340 - QPR Portal contains multiple vulnerabilities
3D Printing: Possibility to Reality -
Thousands of U.S. Gas Stations Found Vulnerable to Dangerous Internet Attacks
[INFOGRAPHIC] Progressive Image Rendering and the User Experience: Go…
(Via Forbes) Is Your Data Management Plan a Ticking Time Bomb of Risk? | Matt Nelson | LinkedIn
Man receives jail time for Bitcoin operation on Silk Road - SC Magazine
HITRUST, Deloitte slate cyber town halls for health care orgs - SC Magazine
The Sorry State of Cybersecurity Threat Intelligence – Blog Post – RSA Conference | What's next in payments
17-Year-Old Hanged Himself After Receiving Police Ransomware Threat Email - Hacker News
Psychological profile-based security – could it work? | Naked Security
Safety, Privacy, and the Internet Paradox: Solutions at Hand and the Need for new Trans-Atlantic Rules - Microsoft Europe
New Zero-Day Vulnerability Affects Adobe Flash - Security News - Trend Micro USA
Madonna hacking suspect arrested by Israeli police
Activity Info
Police Seized 50 Servers in Pirate Bay Raid | TorrentFreak
Rooted Con 2014 - José Luis Quintero And Felix Estrada – From War Games To Die Hard 4
Security of Cloud Services | Computer Science Online NJI
Information Security Training | Reston, VA | Cybersecurity | SANS
Thousands of U.S. gas stations exposed to Internet attacks | CSO Online
St. Peter's Health Partners warns of possible data breach - Times Union
Israeli police arrest alleged hacker who leaked Madonna's music - SC Magazine
Adobe Security Bulletin
Why leaving a shared device unprotected is dangerous
scottdware/go-junos · GitHub
Secure the Data or Else: Every Business, Including the Smallest, Faces Real Financial and Legal Risks |
Industry fragmentation, government regulations, and big data will dominate cyber security in 2015
Congress to hold first data breach legislation hearing - SC Magazine
Mobile Virtualization: Solving the BYOD Problem - Security News - Trend Micro USA
RSA Conference Announces New Crowdsourced Submissions – Blog Post
Kaspersky Lab Products Lead the Way in all Q4 Dennis Technology Labs Tests | Kaspersky Lab US
Congress To Hold First Data Breach Legislation Hearing ≈ Packet Storm
Emergency Patch Fixes Adobe Flash Flaw ≈ Packet Storm
WTF! It Should Not Be Illegal To Hack Your Own Car's Computer ≈ Packet Storm
Anti-rootkit utility TDSSKiller
GoDaddy Patches Vulnerability That Could Allow Hackers to Hijack Customer Domains | Data Center Knowledge
More awareness needed on cyber security, not sure of privacy of Aadhaar data: DSCI chief | The Indian Express
Silk Road 2.0 deputy arrested after 6-month attack on Tor | Naked Security
School rule-breakers to hand over Facebook and Twitter passwords | Naked Security
Google discloses three OS X 0-days
Seven-Year-Old Hacks Public WiFi in Under 11 Minutes
A Global Black Market for Stolen Personal Data
EMC Community Network - ECN: Improve Incident Detection and Investigation with RSA Security Analytics and RSA ECAT
Women in Business and the Professions World Awards
NDB Advisory Announces Comprehensive Texas PCI-QSA Services for Dallas, Houston, and Austin Merchants and Service Providers
Infosecurity Europe 2015
RSA Conference 2015
Bsidesto 2014 - Blackhat Python - Dan Frisch
How you could become a victim of cybercrime in 2015 | Technology | The Guardian
Project Zero: Exploiting NVMAP to escape the Chrome sandbox - CVE-2014-5332
RiSK Conference 2015
Journalist Barrett Brown sentenced to 63 months
EMC Store Products - EMC Store
Looking Ahead at RSA Conference 2015 – Blog Post
What can you do to mark Safer Internet Day? | AVG Now Blog
Sign In
Zero Day Weekly: SOTU, Adobe zero day, Symantec RCE, security alert overkill | ZDNet
FOCUS: Cyber Security | The Network
Cyber Security: Firms Must Cooperate Says Bank
CES: Things to think about with Smartwatches -
FBI-baiter Barrett Brown gets five years in chokey plus $890,000 fine • The Register
Snoopy Fujitsu tech KNOWS you'll click that link – before YOU do • The Register
How To Communicate With Employees During A Cyber Hack | Fast Company | Business + Innovation
How to secure your online email accounts | AVG Now Blog
UK Scouts database 'flaws' raise concerns • The Register
HTTP Basic Authentication Attack (Easy)
The State of Obama Cybercare
Google reveals 3 Apple OS X Zero-day Vulnerabilities - Hacker News
2015 Enterprise Dev Predictions, Part 2: Convergence, Security, Automation and Analytics -- ADTmag
Bsidesto 2014 - Batch Firmware Analysis - Jeremy Richards
Hands On With Microsoft HoloLens |
Bugtraq: REWTERZ-20140102 - ManageEngine ServiceDesk Plus User Enumeration Vulnerability
Bugtraq: Fwd: REWTERZ-20140103 - ManageEngine ServiceDesk Plus User Privileges Management Vulnerability
Yes, we’re still using dumb passwords. But not nearly as much as before. - The Washington Post
Google Apps Flaw Allowed Hacker to Hijack Account and Disable Two-factor Authentication - Hacker News
Symantec data centre security software has security holes • The Register
Google drops three OS X 0days on Apple | Ars Technica
Google's Project Zero reveals three Apple OS X zero-day vulnerabilities | ZDNet
HPI Names John Ballentine as Director of Cyber Security and Compliance – Press Release Rocket
Journalist Barrett Brown sentenced to 63 months in federal prison, must pay $890K in restitution - Boing Boing
DMARC: The time is right for email authentication
Cisco Security sur Twitter : "RT if you're attending @CiscoLiveEurope in Milan next week! #CLEUR"
Bsidesto 2014 - Elk: Not P.O.S. - Jason Kendall
Symantec Security Intelligence
Barrett Brown Sentenced to 5 Years in Prison just for 'Re-Sharing Link to Hacked Material' - Hacker News
Adobe finds, patches ANOTHER exploited Flash 0day • The Register
6 predictions for cloud security in 2015 | Information Age
5 tips for dealing with cyberbullying in education
OTA Determines Over 90% of Data Breaches in 2014 Could Have Been Prevented | Online Trust Alliance
Bsidesto 2014 - Security And Behavioural Economics - Augusto Barros
Stratfor hacker and FBI-harasser Barrett Brown gets five years inside • The Register
Photo Gallery: 10 Worst Cloud Security Threats Of 2015 | Talkin' Cloud
6 Biggest Business Security Risks and How You Can Fight Back | CIO
Google splashes $80k on Chrome 40 bug splatting • The Register
Security For Startups | TechCrunch
Only one in five Irish companies haven't suffered data breach in last year -
Internet of Things -- The Space Junk Challenge | WIRED
Trend Micro sur Twitter : "Get 'em next time, @turcotte16. #XGames"
Scarab attackers took aim at select Russian targets since 2012 | Symantec Connect
Internet Attack Could Shut Down US Gas Stations ≈ Packet Storm
Red Hat Security Advisory 2015-0080-01 ≈ Packet Storm
Red Hat Security Advisory 2015-0074-01 ≈ Packet Storm
New RATs Emerge from Leaked Njw0rm Source Code  | Security Intelligence Blog | Trend Micro
Swots explain how to swat CPU SNITCHES • The Register
Flash Patch Targets Zero-Day Exploit — Krebs on Security
Converting PEiD Signatures To YARA Rules | Didier Stevens
2015 Annual Security Report Infographic
Bsidesto 2014 - Cryptocurrencies And Security - Michael Perklin
Unconfirmed zero-day vulnerability discovered in Adobe Flash Player | Symantec Connect
Best Buy News sur Twitter : "Be sure to watch @turcotte16 race his @GeekSquad outfitted snowmobile on the @XGames tonight on @espn! |"
Trend Micro and Best Buy’s Geek Squad Sponsor X Games Snowmobiler - YouTube
articleFR CMS 3.0.5 Cross Site Scripting ≈ Packet Storm
Barrett Brown Jailed For Linking To Stolen Data ≈ Packet Storm
Program-O 2.4.6 XSS / LFI / HTTP Response Splitting ≈ Packet Storm
Customer Log In | Box
Zscaler Research: Malvertising leading to Flash Zero Day via Angler Exploit Kit
BMW and VW team to build electric vehicle charging network - LA Times
The Uncanny Exploit Kit Cycle | Solutionary Blog
Robots Replacing People, Robots Serving People: Kaspersky Lab Presents a Forecast for 2045 | Kaspersky Lab
Juniper Networks sur Twitter : "Dial-up internet access sounds #ExplainThe90sIn4Words"
Unless Chronic, Operator Sleep Deprivation Not Tied to Unsafe PCI - Journal News - TCTMD
For CKD Patients, CABG Favored Long-term Over PCI - Journal News - TCTMD
Which Antivirus Offers the Best Protection? AV-Test Reports
SANS Institute | Facebook
Bsidesto 2014 - Logs And Tactical Defence - Allan Stojanovic
CryptoDefense, the CryptoLocker Imitator, Makes Over $34,000 in One Month | Symantec Connect
SANS FOR610: Reverse Engineering Malware: Malware Analysis Tools & Techniques - YouTube
Silvio Micali succeeds Bill Freeman as associate head in EECS | MIT News
NAFCU asks Congress to create bipartisan data breach working group - SC Magazine
Chrome 40 promoted to stable channel, includes 62 security fixes - SC Magazine
Explore Enterprise Mobility Suite | Microsoft
Angler exploit kit goes after new Adobe Flash 0-day flaw
Web Shell: PHP Meterpreter
Data attacks on the rise in 2015: How hospitals can manage the risk | Healthcare Dive
Barrett Brown Sentenced to 5 Years in Prison in Connection to Stratfor Hack | WIRED
FBI and IRS warn of pervasive, maddening business, consumer scams | CSO Online
Judge gives Home Depot till July to respond to class-action lawsuit allegations - SC Magazine
Professional Services: Making the Difference at SW Hosting - YouTube
The New Year Security Checklist: Security Resolutions for 2015 - Security News - Trend Micro USA
Security Budgets Going Up, Thanks To Mega-Breaches