NetSecu

www.facebook.com
www.facebook.com
The Virtual Network Trivia Hour | Facebook
www.metrocorpcounsel.com
www.metrocorpcounsel.com
On The Cutting Edge Of Cybersecurity Protection | The Metropolitan Corporate Counsel
www.marketwatch.com
www.marketwatch.com
Little-known ways hackers take over your phone, data and money - MarketWatch
www.pcworld.com
www.pcworld.com
Why Microsoft needs to reveal Windows 9 sooner than later: The end of Windows 7 | PCWorld
www.macworld.com
www.macworld.com
Hold the phone: iMessage spam not all it's cracked up to be | Macworld
timesofindia.indiatimes.com
timesofindia.indiatimes.com
Scientists hack into Gmail with 92% accuracy - The Times of India
www.forbes.com
www.forbes.com
How To Talk To Your Employees About Cybersecurity (Without Putting Them To Sleep) - Forbes
tools.cisco.com
tools.cisco.com
Alert Details - Security Center - Cisco Systems (RSS)
www.securitytube.net
www.securitytube.net
Black Hat Asia 2014 - Discovering Debug Interfaces With The Jtagulator Part 2 By Joe Grand
vulnerability-db.com
vulnerability-db.com
Best Bug Bounty Program of the Year 2014 - Competition & Award | Official Vulnerability- & Bug- News Resource!
indianexpress.com
indianexpress.com
Abdul Kalam calls for research in cyber security | The Indian Express
www.bloomberg.com
www.bloomberg.com
Chinese Hackers Vacuum Data From U.S. Health Industry - Bloomberg
www.watoday.com.au
www.watoday.com.au
Cyber war needs cyber soldiers
www.livingstondaily.com
www.livingstondaily.com
Ice Bucket Challenge being used for scams, security company warns | Livingston Daily | livingstondaily.com
www.macworld.co.uk
www.macworld.co.uk
iPad 6 release date, rumours, leaked images - News - Macworld UK
www.techrepublic.com
www.techrepublic.com
Retreating from the cloud: Why its silver lining may be losing its lustre - TechRepublic
businesstoday.intoday.in
businesstoday.intoday.in
Class action against Facebook attracts 60,000 users - Business Today
nakedsecurity.sophos.com
nakedsecurity.sophos.com
Facebook given 4 weeks to respond to “largest privacy class action in Europe” | Naked Security
www.toptechnews.com
www.toptechnews.com
Mac OS Yosemite Developer Preview 4 Released - Apple/Mac on Top Tech News
twitter.com
twitter.com
Juniper Networks on Twitter: And on this morning's commute....#NetworkLingo http://t.co/B01hLSiqYG
www.net-security.org
www.net-security.org
Sneak attack through smartphone shared memory
www.net-security.org
www.net-security.org
Bitcoin-themed phishing campaign creates quite a stir
www.itweb.co.za
www.itweb.co.za
Cloud build-up demands reliable disaster recovery for business - KEMP | ITWeb
motherboard.vice.com
motherboard.vice.com
Encryption Is Going Mainstream, But Will People Actually Use It? | Motherboard
twitter.com
twitter.com
Symantec on Twitter: As it stands, the average cost of a #data breach is $250 per second #DirtyTopics http://t.co/K7LmdaZPrE
forums.juniper.net
forums.juniper.net
Customers want more than black. - J-Net Community
www.ksdk.com
www.ksdk.com
Sprint unveils new unlimited data, talk and text plan
www.californiahealthline.org
www.californiahealthline.org
FBI Warns Hackers Are Targeting Health Care Organizations - California Healthline
www.technologyreview.com
www.technologyreview.com
The Ongoing Threat of Cold Boot Attacks | MIT Technology Review
seekingalpha.com
seekingalpha.com
AVG's Rapidly Growing User Base Isn't Translating Into Revenue Growth - AVG Technologies (NYSE:AVG) | Seeking Alpha
www.wired.com
www.wired.com
Your Anonymous Posts to Secret Aren’t Anonymous After All | Threat Level | WIRED
www.channelweb.co.uk
www.channelweb.co.uk
Channel to cash in on soaring security spend- 22 Aug 2014 - CRN UK News
www.reuters.com
www.reuters.com
Class action against Facebook attracts 60,000 users| Reuters
www.forbes.com
www.forbes.com
Hackers Unmask Anonymous Posters On Secret, Including App's Founder - Forbes
www.csoonline.com
www.csoonline.com
What happened to the Flashback Trojan? Turns out US universities are still riddled with it | CSO Online
www.csoonline.com
www.csoonline.com
Security spending gets boost from mobile, social and cloud, says Gartner | CSO Online
about-threats.trendmicro.com
about-threats.trendmicro.com
Turning the Tables on Cyber Attacks | TrendLabs 2Q 2014 Security Roundup
seclists.org
seclists.org
Information Security News: Amazon Expands Its Cloud Services to the U.S. Military
www.delhidailynews.com
www.delhidailynews.com
Healthcare companies warned against hacker attacks
betanews.com
betanews.com
5 tips to make your browsing safe and secure
phys.org
phys.org
Traffic light hacking shows the "Internet of Things" must come with better security
nakedsecurity.sophos.com
nakedsecurity.sophos.com
The UPS Store breach – what went wrong and what UPS got right | Naked Security
www.gameranx.com
www.gameranx.com
Watch Dogs Patch Finally Lets You Hack Your Friends
www.bloombergview.com
www.bloombergview.com
Traffic Hackers Pull Off 'Italian Job' - Bloomberg View
www.fiercemobileit.com
www.fiercemobileit.com
'Automotive bring your own device (BYOD) revenues to reach $26.4 billion in 2014' says visiongain report - FierceMobileI
www.eurogamer.net
www.eurogamer.net
Watch Dogs update finally lets you hack your friends • Eurogamer.net
www.pentesteracademy.com
www.pentesteracademy.com
Testimonials
www.infoworld.com
www.infoworld.com
Mobile apps could be abused to make expensive phone calls | Security - InfoWorld
www.symantec.com
www.symantec.com
Is Cyber Security A Political Issue? Yes! | Symantec Connect
framingham.wickedlocal.com
framingham.wickedlocal.com
Beacon Hill Roll Call - News - The Framingham Tab - Framingham, MA
www.enewscourier.com
www.enewscourier.com
Gov. Bentley says country behind hacking, won't say which one - Enewscourier.com: News
www.gamepur.com
www.gamepur.com
New Watch Dogs Patch Coming On Aug 21, Changes And Improves Certain Features, Fixes Bugs, Changelog Out
www.infosecurity-magazine.com
www.infosecurity-magazine.com
UPS Unaware of PoS Malware for Months - Infosecurity Magazine
www.washingtonpost.com
www.washingtonpost.com
Wonkbook: BofA’s record settlement may leave homeowners disappointed - The Washington Post
betanews.com
betanews.com
Information security spending to grow 8 percent in 2014
www.redorbit.com
www.redorbit.com
SECURITY ALERT: Hacking Apps Is Easy, According To Researchers - Technology News - redOrbit
www.law360.com
www.law360.com
Gov't Says NSA Phone Spying Suit Should Be Tossed - Law360
www.vg247.com
www.vg247.com
Hack your friends with the new Watch Dogs patch | VG247
www.f-secure.com
www.f-secure.com
Ransomware Race (part 5): SynoLocker's unkept promises - F-Secure Weblog : News from the Lab (RSS)
vulnerability-db.com
vulnerability-db.com
Web Security Flex v4.x (BNSEC707) - Filter Bypass & Persistent Vulnerabilities | Official Vulnerability- & Bug- News Resource!
www.slideshare.net
www.slideshare.net
Cloud Insights: How Anyone in Any Vertical Can Get Started in Cloud
www.zdnet.com
www.zdnet.com
Six Clicks: Two factors are better than one | ZDNet
www.cloudpro.co.uk
www.cloudpro.co.uk
Google Drive for Work customer base growing by 1,800 a week | Cloud Pro
www.net-security.org
www.net-security.org
Control Android app permissions with NativeWrap
www.cbronline.com
www.cbronline.com
Has Citrix cut VDI deployment storage burden by 99%? - Computer Business Review
blogs.wsj.com
blogs.wsj.com
The Morning Download: Microsoft Windows Launch Transitions From ‘Start Me Up’ to ‘Get Off of My Cloud’ - The CIO Report - WSJ
www.bbc.co.uk
www.bbc.co.uk
BBC News - Gmail smartphone app hacked by researchers
www.pcworld.com
www.pcworld.com
Security spending gets boost from mobile, social and cloud, says Gartner | PCWorld
indianexpress.com
indianexpress.com
Windows 9 verison likely to be announced on September 30 | The Indian Express
allafrica.com
allafrica.com
allAfrica.com: Nigeria: Ilevbare - Hypocrisy of America's Experimental Ebola Drug
www.businesskorea.co.kr
www.businesskorea.co.kr
China’s Easy Imitation: Constant Hacking Leads to Making Fakes in China in Just One Day | BusinessKorea
www.pcpro.co.uk
www.pcpro.co.uk
Windows 8.2: release date, features and free cloud version | News | PC Pro
nakedsecurity.sophos.com
nakedsecurity.sophos.com
We need to talk about email | Naked Security
seclists.org
seclists.org
Bugtraq: DoS attacks (ICMPv6-based) resulting from IPv6 EH drops
thenextweb.com
thenextweb.com
Li-Fi: Access the Internet Through LED Bulbs
www.securityfocus.com
www.securityfocus.com
SecurityFocus (RSS)
www.eventbrite.co.uk
www.eventbrite.co.uk
ISACA Ireland 2014 Annual Conference | Dublin Tickets, Dublin - Eventbrite
www.information-age.com
www.information-age.com
Out of office, out of pocket - summer travel to cost UK businesses £170 million in roaming charges | Information Age
www.usatoday.com
www.usatoday.com
Report: Microsoft to reveal Windows 9 next month
www.idahostatesman.com
www.idahostatesman.com
Boise, Meridian, Nampa, Caldwell news by Idaho Statesman
www.infosecurity-magazine.com
www.infosecurity-magazine.com
Machete APT Hacks Through South American Victims - Infosecurity Magazine
www.theregister.co.uk
www.theregister.co.uk
Brainboxes caught opening Bitcoin fraud emails. Seriously, guys? • The Register
seclists.org
seclists.org
Bugtraq: CVE-2014-3575:OpenOffice Targeted Data Exposure Using Crafted OLE Objects
seclists.org
seclists.org
Bugtraq: CVE-2014-3524: Apache OpenOffice Calc Command Injection Vulnerability
kotaku.com
kotaku.com
Next-Gen Lighting Is Pushing The Limits Of Realism
www.infoworld.com
www.infoworld.com
So long, iOS -- jailbreakers have found their home: Android | Mobile Technology - InfoWorld
seekingalpha.com
seekingalpha.com
Brocade Communications Systems' (BRCD) CEO Lloyd Carney on Q2 2014 Results - Earnings Call Transcript | Seeking Alpha
www.datacenterdynamics.com
www.datacenterdynamics.com
KVH brings new private cloud to market in Japan | Datacenter Dynamics
tech.firstpost.com
tech.firstpost.com
Now, you can shoot a Google Photo Sphere on iPhones, iPads thanks to official app - Tech2
www.macworld.co.uk
www.macworld.co.uk
Widespread 2011 MacBook Pro failures continue - News - Macworld UK
www.newsobserver.com
www.newsobserver.com
Local & North Carolina state news from Raleigh, NC | NewsObserver.com
tech.firstpost.com
tech.firstpost.com
Microsoft Windows 9 to be previewed September 30: What are the biggest changes expected? - Tech2
www.bdtonline.com
www.bdtonline.com
Cyber security a widespread concern - Bluefield Daily Telegraph: News
nakedsecurity.sophos.com
nakedsecurity.sophos.com
Android users – Sophos needs you (and you could bag a prize)! | Naked Security
www.ibtimes.com
www.ibtimes.com
Worldwide Spending On Information Security To Surpass $70B By End Of 2014: Report
www.cloudpro.co.uk
www.cloudpro.co.uk
Symantec rolls nine security products into one cloud-based tool | Cloud Pro
www.gadsdentimes.com
www.gadsdentimes.com
Alabama governor says country behind hacking | GadsdenTimes.com
www.chip.de
www.chip.de
NSA: MonsterMind soll Cyberangriffe blocken - News - CHIP
www.net-security.org
www.net-security.org
Extracting encryption keys by measuring computers' electric potential
www.net-security.org
www.net-security.org
Securing networks in the Internet of Things era
krebsonsecurity.com
krebsonsecurity.com
Stealthy, Razor Thin ATM Insert Skimmers — Krebs on Security
ziplocate.us
ziplocate.us
ZipLocate
blogs.avg.com
blogs.avg.com
SMB extends international networking influence through MSP Alliance partnership
www.sacbee.com
www.sacbee.com
Macy's to pay $650,000 in shopper-profiling probe - Wire Business News - The Sacramento Bee
www.zdnet.com
www.zdnet.com
How to hack Gmail 92 percent of the time | ZDNet
www.information-age.com
www.information-age.com
Why Asia is the frontier of mobile security | Information Age
www.bizjournals.com
www.bizjournals.com
Millions of card numbers likely stolen during Supervalu data breach, security expert says - Boston Business Journal
www.zdnet.com
www.zdnet.com
68 percent of top free Android apps vulnerable to cyberattack, researchers claim | ZDNet
www.csoonline.com
www.csoonline.com
Mobile apps could be abused to make expensive phone calls | CSO Online
indiatoday.intoday.in
indiatoday.intoday.in
US researchers uncover Pak cyber espionage group targeting India with suspected Govt links : India, News - India Today
www.spyghana.com
www.spyghana.com
Claiming ‘iron-clad security’ for smart wearables -SpyGhana.com
www.csoonline.com
www.csoonline.com
UPS data breach: Another one bites the dust | CSO Online
techday.com
techday.com
Techday – Time for smart wearable protection as Bitdefender unveils “iron-clad” security offering
betanews.com
betanews.com
Get 6 months of Bitdefender Antivirus Plus 2015 for FREE [BetaNews exclusive offer]
research.microsoft.com
research.microsoft.com
DeLorean: Using Speculation to Enable Low-Latency Continuous Interaction for Cloud Gaming - Microsoft Research
www.securitytube.net
www.securitytube.net
Black Hat Usa 2014 - Cybersecurity As Realpolitik By Dan Geer Presented At Black Hat Usa 2014
www.pentesteracademy.com
www.pentesteracademy.com
Bad Characters
www.processor.com
www.processor.com
Request Rejected
www.thelocal.at
www.thelocal.at
Facebook lawsuit moving forward despite setback - The Local
www.pcworld.com
www.pcworld.com
NIST taking input for mobile security guidelines | PCWorld
au.ibtimes.com
au.ibtimes.com
Anti-Virus Company Symantec to Switch to Subscription Service, Consolidates Norton Products - International Business Times
www.theguardian.com
www.theguardian.com
Boot up: Kreyos questions, Samsung v US, hacking Facebook | Technology | theguardian.com
www.leaderpost.com
www.leaderpost.com
Camera to keep watch
www.theregister.co.uk
www.theregister.co.uk
ISIS terror fanatics invade Diaspora website after Twitter ban • The Register
news.sky.com
news.sky.com
Laptop Security Cracked 'Using Touch Of Hand'
ibnlive.in.com
ibnlive.in.com
Researchers exploit OS weakness to hack into Gmail with 92 per cent success rate - IBNLive
www.net-security.org
www.net-security.org
Why you’re not as secure as you think you are
symantecevents.verite.com
symantecevents.verite.com
Disaster Recovery to the Cloud with Symantec Disaster Recovery Orchestrator and Microsoft Azure | Symantec
windowsitpro.com
windowsitpro.com
The UPS Store Security Incident Shows Responsible Actions Taken | Security content from Windows IT Pro
www.streetwisetech.com
www.streetwisetech.com
Lavasoft Ad-Ware Antivirus: One Of The Best Software In The Market 
www.dailymail.co.uk
www.dailymail.co.uk
Pair in court in phone hacking case | Mail Online
www.fortmilltimes.com
www.fortmilltimes.com
Local | Fort Mill Times
q13fox.com
q13fox.com
Is your info safe? Data breach at UPS Stores affects Washington, 23 other states | Q13 FOX News
www.rep-am.com
www.rep-am.com
Macy's to pay $650,000 in shopper-profiling probe Republican American
www.net-security.org
www.net-security.org
Worldwide infosec spending to grow in 2014
www.ibtimes.co.uk
www.ibtimes.co.uk
Researchers Show Malware Can Hack Gmail App With 92% Success Rate
www.dailymail.co.uk
www.dailymail.co.uk
Ninth time lucky? Microsoft set to unveil successor to widely panned Windows 8 software on September 30th | Mail Online
www.securitytube.net
www.securitytube.net
Black Hat Asia 2014 - Diving Into Ie 10’S Enhanced Protected Mode Sandbox By Mark Vincent Yason
ca.reuters.com
ca.reuters.com
JPMorgan customers targeted in email phishing campaign| Business| Reuters
www.wbng.com
www.wbng.com
Vestal UPS store hit by data breach | WBNG-TV: News, Sports and Weather Binghamton, New York | Top Video
ww2.cfo.com
ww2.cfo.com
'Heartbleed' Bug Opens Hospital Chain to Cyber-Attack
www.extremetech.com
www.extremetech.com
Windows 9 is set to be unveiled on September 30 | ExtremeTech
www.npr.org
www.npr.org
An Unstoppable Killer: New Research Suggests Cancer Can't Be Eradicated : NPR
newjersey.news12.com
newjersey.news12.com
UPS reports data breach at stores in Middletown, Lopatcong and Cherry Hill - News 12 New Jersey
www.csmonitor.com
www.csmonitor.com
FBI says healthcare industry targeted by hackers (+video) - CSMonitor.com
www.bizjournals.com
www.bizjournals.com
3 reasons why data is such a big target in the health care sector — and what health practices can do about it - Washington Business Journal
www.cnet.com
www.cnet.com
Researchers find way to hack Gmail with 92 percent success rate - CNE
www.techrepublic.com
www.techrepublic.com
7 out of 10 fear security implications of Internet of Things - TechRepublic
www.anglechronicle.com
www.anglechronicle.com
Community Health Systems suffers Data Breach | Angle Chronicle
www.cbc.ca
www.cbc.ca
Community gardeners frustrated over brazen veggie thieves - Saskatchewan - CBC News
www.law360.com
www.law360.com
Community Health Sued Over Hacking Of 4.5M Patients' Data - Law360
timesofindia.indiatimes.com
timesofindia.indiatimes.com
FBI warns healthcare companies against hacker attacks - The Times of India
www.techtimes.com
www.techtimes.com
Hackers responsible for U.S. hospital data breach exploit Heartbleed bug : PERSONAL TECH : Tech Times
techcrunch.com
techcrunch.com
Despite FAA Setbacks, Amazon Prime Air Makes Notable Engineering, NASA And Aerospace Hires | TechCrunch
instagram.com
instagram.com
Instagram
www.healio.com
www.healio.com
Higher mortality reported for women undergoing PCI for STEMI | Cardiology
www.csoonline.com
www.csoonline.com
Lessons learned from UPS Store breach | CSO Online
cjonline.com
cjonline.com
Ford: PowerSchool data breach fixed | CJOnline.com
www.citylab.com
www.citylab.com
It's Time for a Four-Day Workweek - CityLab
www.securitytube.net
www.securitytube.net
Black Hat Asia 2014 - Offensive: Exploiting Dns Servers Changes By Leonardo Nve
www.indianagazette.com
www.indianagazette.com
Macy's to pay $650,000 for profiling shoppers - August 20, 2014
www.thestate.com
www.thestate.com
Latest local breaking news by The State Newspaper in Columbia, SC | The State
www.cio.com.au
www.cio.com.au
Startup builds intrusion prevention system for home networks - CIO
www.ksdk.com
www.ksdk.com
Hacker group claims shutdown of county, city websites
www.islandpacket.com
www.islandpacket.com
Latest breaking news from Hilton Head & Beaufort, SC | The Island Packet
www.computerworld.com.au
www.computerworld.com.au
Security spending nears $2 billion a year in Australia: Gartner - Computerworld
taosecurity.blogspot.fr
taosecurity.blogspot.fr
TaoSecurity: Air Force Leaders Should Read This Book (RSS)
experiment.com
experiment.com
Initial Success! | Experiment
www.streetwisetech.com
www.streetwisetech.com
A look at the 2014 Antivirus graphs - Avast & AVG are in the top
www.newschannel9.com
www.newschannel9.com
WTVC NewsChannel 9 :: News - Top Stories - Data Breach at Several UPS Stores
www.globalpost.com
www.globalpost.com
U.S. government's nuclear watchdog victim of cyber attacks: report | GlobalPost
www.marketwatch.com
www.marketwatch.com
Big 12 beats Ivy League – in cybersecurity - MarketWatch
www.theregister.co.uk
www.theregister.co.uk
Malicious app can get past Android WITHOUT PERMISSIONS • The Register
www.tomshardware.com
www.tomshardware.com
Haswell-E Core i7-5820K Will Only Have 28 PCI-Express Lanes
www.symantec.com
www.symantec.com
What’s New in the Spam Market? | Symantec Connect
www.cnet.com
www.cnet.com
Windows 9 unveiling set for September 30, report says - CNE
TheAlternativePress.com
TheAlternativePress.com
The Alternative Press
www.openculture.com
www.openculture.com
The Harvard Classics: Download All 51 Volumes as Free eBooks | Open Culture
www.youtube.com
www.youtube.com
Sydney Office Opening Aug. 2014 - YouTube
www.gamerheadlines.com
www.gamerheadlines.com
Which is better Bitdefender Antivirus or Avast Free Antivirus
www.wwmt.com
www.wwmt.com
Study: Traffic lights could be susceptible to hacking - WWMT - News, Sports, Weather, Traffic
packetstormsecurity.com
packetstormsecurity.com
Ubuntu Security Notice USN-2322-1 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Ubuntu Security Notice USN-2323-1 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Ubuntu Security Notice USN-2324-1 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Ubuntu Security Notice USN-2325-1 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Hackers Breach Social Network MeetMe ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Stealing Encryption Keys Through The Power Of Touch ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Body Scanner's Problem: Fails To Detect Guns ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Ubuntu Security Notice USN-2311-2 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Ubuntu Security Notice USN-2321-1 ≈ Packet Storm
www.stuff.co.nz
www.stuff.co.nz
Parallels Desktop 10: run Windows on your Yosemite Mac | Stuff.co.nz
ricks.foreignpolicy.com
ricks.foreignpolicy.com
A letter to the West Point Class of 2014: No combat patch? That's no problem!
www.technologytell.com
www.technologytell.com
Report: iMessage accounts behind 30% of messaging spam | TechnologyTell
www.myarklamiss.com
www.myarklamiss.com
Data Breach at ULM - MyArkLaMiss.com - KTVE NBC 10 - KARD FOX 14 - Your homepage for the latest News, Weather and Sports in the ArkLaMiss!
www.ozarksfirst.com
www.ozarksfirst.com
New Hack Could Steal Personal Information from Apps - OzarksFirst.com
www.theregister.co.uk
www.theregister.co.uk
AWS levels up in game of government security – and now one step below classified access • The Register
www.kaspersky.com
www.kaspersky.com
Tips on Keeping Android Device Security Threats at Bay| Internet Safety | Kaspersky Lab
packetstormsecurity.com
packetstormsecurity.com
Red Hat Security Advisory 2014-1087-01 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Debian Security Advisory 3008-1 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Debian Security Advisory 2940-1 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Red Hat Security Advisory 2014-1086-01 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
ArcGIS For Server 10.1.1 XSS / Open Redirect ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
ToorCon 16 Call For Papers ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
oclHashcat For NVidia 1.30.7 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
oclHashcat For AMD 1.30.7 ≈ Packet Storm
www.securitytube.net
www.securitytube.net
Black Hat Asia 2014 - Privacy-By-Design For The Security Practitioner By Richard Chow
www.tripwire.com
www.tripwire.com
Study Shows Higher Education Needs Security 101 - The State of Security
prwire.com.au
prwire.com.au
Press Release: Gartner says information security spending in Australia will grow 13.5 percent in 2014 to reach $1.9 billion
packetstormsecurity.com
packetstormsecurity.com
MyBB 1.8 Beta 3 Cross Site Scripting / SQL Injection ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Red Hat Security Advisory 2014-1088-01 ≈ Packet Storm
www.zdnet.com
www.zdnet.com
How Apple took over the only segment of the PC market that still matters | ZDNet
algorithm.dk
algorithm.dk
RTFM 0day in iOS apps: G+, Gmail, FB Messenger, etc. - Algorithm.dk
www.nbcnews.com
www.nbcnews.com
Sneak Attack: Android Apps Can Spy on Each Other - NBC News
www.wfmynews2.com
www.wfmynews2.com
Hundreds Of Bioterror Lab Mishaps Cloaked In Secrecy
www.gulf-times.com
www.gulf-times.com
Expert calls for tighter information security steps
www.spotify.com
www.spotify.com
Serendipity
www.theledger.com
www.theledger.com
Macy's to Pay $650,000 to Settle Profiling Case | TheLedger.com
www.marketwatch.com
www.marketwatch.com
It's a New Day for Data for American Consumers - MarketWatch
www.youtube.com
www.youtube.com
Threat Visualization | Symantec - YouTube
www.tomsguide.com
www.tomsguide.com
UPS Data Breach: What to Do Right Now
www.iclarified.com
www.iclarified.com
iClarified - Apple News - iMessage Now Accounts for Over 30% of All Mobile Spam Messages
fox40.com
fox40.com
UPS Customer Data Hacked; Sacramento Store on the List | KTXL FOX40
wgntv.com
wgntv.com
Data breach at UPS Stores in 24 states, including Illinois | WGN-TV
www.tomsguide.com
www.tomsguide.com
Sneak Attack: Android Apps Can Ambush Each Other
insurancenewsnet.com
insurancenewsnet.com
2015 Subaru Legacy, Outback Shine in Small Overlap Test, Earn TOP SAFETY PICK+
tidbits.com
tidbits.com
TidBITS: Parallels Desktop 10
blogs.wsj.com
blogs.wsj.com
Here Are the 51 UPS Stores Impacted by Data Breach - MoneyBeat - WSJ
thehill.com
thehill.com
Credit unions: Anti-hacking bill should be ‘priority’ | TheHill
www.oregonlive.com
www.oregonlive.com
UPS data breach compromises credit, debit cards used in 51 stores (but none in Oregon) | OregonLive.com
www.youtube.com
www.youtube.com
KIDS REACT TO OLD COMPUTERS - YouTube
www.smithsonianmag.com
www.smithsonianmag.com
History, Travel, Arts, Science, People, Places | Smithsonian
www.csoonline.com
www.csoonline.com
More problems emerge on the Community Health Systems network | CSO Online
www.latinpost.com
www.latinpost.com
Macy's, New York State Settle Racial Profiling, False Detention Complaints Against Latinos, African Americans : US News : Latin Post
www.scmagazine.com
www.scmagazine.com
Researcher hacks network connected devices in own home - SC Magazine
www.information-age.com
www.information-age.com
EU Regulation: time to act on corporate data protection | Information Age
www.scmagazine.com
www.scmagazine.com
Medical transcription provider settles data security charges - SC Magazine
www.pri.org
www.pri.org
Even your medical records aren't safe. Chinese group hacks into hospital's patient records | Public Radio International
www.techrepublic.com
www.techrepublic.com
Spy agency uses game to find tomorrow's cyber security stars - TechRepublic
www.cnet.com
www.cnet.com
The guide to password security (and why you should care) - CNE
www.cso.com.au
www.cso.com.au
CISOs Can Combat APTs with a Bit of Preparation - CSO | The Resource for Data Security Executives
www.cbsnews.com
www.cbsnews.com
New hack could steal personal information from Gmail, other popular apps - CBS News
www.kspr.com
www.kspr.com
Traffic lights are dangerously easy to hack | Money - Home
www.theregister.co.uk
www.theregister.co.uk
Facebook slings $50k Internet Defense Prize™ at bug hunter duo • The Register
thehill.com
thehill.com
UPS confirms data breach at some locations | TheHill
WGNtv.com
WGNtv.com
WGN-TV | Chicago's Very Own source for breaking news, weather, sports and entertainment.
www.tripwire.com
www.tripwire.com
Healthcare Cyberthreat Advisory & VERT Alert - The State of Security
www.youtube.com
www.youtube.com
Cybercrime Exposed: When Adware Go Bad - YouTube
azure.microsoft.com
azure.microsoft.com
DocumentDB Documentation | Azure
www.securitytube.net
www.securitytube.net
Black Hat Asia 2014 - Solutum Cumulus Mediocris By Eldar Marcussen
www.pentesteracademy.com
www.pentesteracademy.com
Course Introduction
www.bizjournals.com
www.bizjournals.com
It's all about trust: What data breaches mean for hospitals, health systems - Nashville Business Journal
www.scmagazine.com
www.scmagazine.com
Study: Most higher ed malware infections attributed to 'Flashback' - SC Magazine
www.expressandstar.com
www.expressandstar.com
Pair in court in phone hacking case « Express & Star
www.fiercehealthit.com
www.fiercehealthit.com
Computer bug 'Heartbleed' likely source of Community Health Systems data breach - FierceHealthI
www.pcmag.com
www.pcmag.com
Panda Antivirus Pro 2015 Review & Rating | PCMag.com
www.themotorreport.com.au
www.themotorreport.com.au
Mercedes-Benz C-Class Review: 2015 C 200 and C 250 Road Test Page 1 of 2 | The Motor Report
www.mercurynews.com
www.mercurynews.com
2011: Symantec leases big office building that could contain up to 1,000 workers - San Jose Mercury News
www.digitaljournal.com
www.digitaljournal.com
Archive Systems Recognized in Gartner Hype Cycle for Human Capital Management - Press Release - Digital Journal
www.ihealthbeat.org
www.ihealthbeat.org
Hackers Directly Targeting Health Care Organizations, FBI Warns - iHealthBeat
siliconangle.com
siliconangle.com
Enterprise pros say cloud, Big Data prompting radical IT shifts | SiliconANGLE
www.wired.co.uk
www.wired.co.uk
Gmail app hack works 92 percent of the time (Wired UK)
blog.seattlepi.com
blog.seattlepi.com
Apple’s iMessage becomes a major source of mobile spam - Dwight Silverman's TechBlog
www.csmonitor.com
www.csmonitor.com
FBI says healthcare industry targeted by hackers - CSMonitor.com
healthitsecurity.com
healthitsecurity.com
HITRUST Cyber Threat Briefing focuses on CHSI data breach | HealthITSecurity.com
www.csoonline.com
www.csoonline.com
City of London Police brings in Kaspersky to train officers to tackle cybercrime | CSO Online
blog.trendmicro.com
blog.trendmicro.com
Simply Security News, Views and Opinions from Trend Micro, IncTrend Micro and SanDisk: Storing and Securing Your Digital Life » Simply Security News, Views and Opinions from Trend Micro, Inc
forums.juniper.net
forums.juniper.net
From Private to Multi to Hybrid Cloud in the Enter... - J-Net Community
gamasutra.com
gamasutra.com
Gamasutra: Kevin Maxon's Blog - Finances of a Bare Bones Developer
www.technewsworld.com
www.technewsworld.com
Is Open Source an Open Invitation to Hack Webmail Encryption? | Hacking | TechNewsWorld
www.itnewsafrica.com
www.itnewsafrica.com
The IoT is already here – Will you be secure? | IT News Africa- Africa's Technology News Leader
thenextweb.com
thenextweb.com
Sprint and T-Mobile Offer Up New Competitive Plans
www.bizjournals.com
www.bizjournals.com
How to apply for reimbursement in Schnucks data breach settlement - St. Louis Business Journal
blogs.kqed.org
blogs.kqed.org
New-Generation Earthquake Forecasting Swings into Operation in Italy | Science | KQED Public Media for Northern CA
www.wowt.com
www.wowt.com
UPS Data Breach Affecting Omaha Customers
www.lohud.com
www.lohud.com
Macy's in New York City to pay $650,000 in shopper-profiling probe
www.idevnews.com
www.idevnews.com
Idevnews | Cloud Security, Identity Solutions Heat Up The Summer
online.wsj.com
online.wsj.com
Global Platinum Sponsor Trend Micro to Share Security Insight at VMworld 2014 - WSJ.com
www.scmagazine.com
www.scmagazine.com
With Black Hat and DefCon comes spike in Vegas-based attacks - SC Magazine
Blockchain.info
Blockchain.info
Bitcoin Block Explorer - Blockchain.info
www.metrocorpcounsel.com
www.metrocorpcounsel.com
Cybersecurity In Its Several Aspects | The Metropolitan Corporate Counsel
www.bizjournals.com
www.bizjournals.com
UPS Store data breach hits Durham - Triangle Business Journal
www.scnow.com
www.scnow.com
Virulent Chinese hacking group mows through U.S. health industries - SCNow: Local
blogs.wsj.com
blogs.wsj.com
Does Microsoft Need a Big Windows Unveiling at the End of September? - Digits - WSJ
www.dailyherald.com
www.dailyherald.com
After Jewel, UPS, how do consumers stay safe from data hacks? - DailyHerald.com
www.pharmacytimes.com
www.pharmacytimes.com
Smartphone Safety: Antivirus Apps Protect Users from Digital Threats
blog.trendmicro.com
blog.trendmicro.com
Simply Security News, Views and Opinions from Trend Micro, IncOperational Efficiency: the Key to Data Center Success » Simply Security News, Views and Opinions from Trend Micro, Inc
twitter.com
twitter.com
Symantec on Twitter: In the future, what role do you think proactive defense will play in #security ? #DirtyTopics http://t.co/2zjb1OvcM
forums.juniper.net
forums.juniper.net
FAQ: Protecting your OpenSSL Server from HeartBlee... - J-Net Community
www.infosecisland.com
www.infosecisland.com
Preparing for a Successful IAM Integration Project (Part 2 of 2)
blogs.cisco.com
blogs.cisco.com
Security Compliance is Necessary for Real-Time Mobile Data Access
www.slideshare.net
www.slideshare.net
Accenture high performance IT research
twitter.com
twitter.com
Symantec on Twitter: What is the biggest obstacle for you and your organization when it comes to investing in #cybersecurity? #DirtyTopics http://t.co/bDpp3aDtmh
www.scmagazine.com
www.scmagazine.com
Experts discover history of malware infections on network of Community Health Systems - SC Magazine
www.scmagazine.com
www.scmagazine.com
AOL announces that it does not follow 'Do Not Track' requests - SC Magazine
www.securityfocus.com
www.securityfocus.com
Oracle Java SE CVE-2014-4221 Remote Security Vulnerability (RSS)
www.vcloudnine.de
www.vcloudnine.de
Configuration management with Juniper Junos | vcloudnine.de
www.androidpolice.com
www.androidpolice.com
[Price War] Sprint Fires Back With New $60 Unlimited Data Plan
foxct.com
foxct.com
2 Connecticut UPS Stores Hit By Nationwide Data Breach | FOX C
www.benefitspro.com
www.benefitspro.com
30 million patients hit by health data breaches | BenefitsPro
www.dailytech.com
www.dailytech.com
DailyTech - Opera Becomes Official Browser of Microsoft-Nokia's Non-Windows Phones
fox43.com
fox43.com
Data breach at UPS Stores in 24 states – Including Pennsylvania | WPMT FOX43
www.engadget.com
www.engadget.com
Sprint's new individual plan gets you unlimited everything for $60
www.kcci.com
www.kcci.com
List of 51 stores hit in new data breach just released | Local News - KCCI Home
abc7chicago.com
abc7chicago.com
Lake Forest, Riverwoods stores among 51 UPS retailers affected by data breach | abc7chicago.com
www.chinatopix.com
www.chinatopix.com
UPS Stores Hacked : Business : Chinatopix
recode.net
recode.net
UPS Warns of Data Breach at 51 Stores | Re/code
blog.trendmicro.com
blog.trendmicro.com
Simply Security News, Views and Opinions from Trend Micro, IncExtend Your Virtualized Data Center to the Cloud with Ease » Simply Security News, Views and Opinions from Trend Micro, Inc
www.datastax.com
www.datastax.com
Multi-Datacenter Cassandra on 32 Raspberry Pi’s : DataStax
www.cio-today.com
www.cio-today.com
Apple Opens iCloud Data Center in China - Cloud Computing on CIO Today
www.securitytube.net
www.securitytube.net
Black Hat Asia 2014 - Abusing The Internet Of Things: Blackouts, Freakouts, And Stakeouts By Nitesh Dhanjani
www.charlotteobserver.com
www.charlotteobserver.com
Chester, Lancaster hospital patients could be at risk after data breach | CharlotteObserver.com
kfor.com
kfor.com
Study: It may be easier than you think to hack traffic signals | KFOR.com
www.eweek.com
www.eweek.com
Syrian Cyber-Attacks Expose Activists, Firms to Malware Infection
www.tomshardware.co.uk
www.tomshardware.co.uk
My graphics card covers my PCI-E x1 slot [Solved] - Graphics Cards - Components
www.cnet.com
www.cnet.com
Facebook reports enormous uptick in use of snoop-proof email - CNE
www.securityfocus.com
www.securityfocus.com
Bitdefender GravityZone Authentication Bypass and Unauthorized Access Vulnerabilities (RSS)
www.securityfocus.com
www.securityfocus.com
Apache HttpComponents Incomplete Fix SSL Certificate Validation Security Bypass Vulnerability (RSS)
twitter.com
twitter.com
Juniper Networks on Twitter: How do you prepare for your exams? Here's @sid_1011's testing lab! http://t.co/sE0KUb1AxU
www.businesswire.com
www.businesswire.com
Survey: Impact of Target Data Breach on Cybersecurity Budget, Executive Awareness Diminishing | Business Wire
blogs.cisco.com
blogs.cisco.com
Cisco 2014 Midyear Security Report: Brush Your Teeth, Change Your Passwords, Update Your Software
www.insurancetech.com
www.insurancetech.com
Driving Information Security, From Silicon Valley to Detroit
www.usnews.com
www.usnews.com
Cybersecurity Among Top Energy Industry Concerns - US News
twitter.com
twitter.com
Symantec on Twitter: Just one hour left until our first #DirtyTopics chat launches! Join us! http://t.co/h4Nd773rZM
www.bbc.co.uk
www.bbc.co.uk
BBC News - Ebola patients Kent Brantly and Nancy Writebol discharged
www.csoonline.com
www.csoonline.com
Should companies practice data retention or data destruction? | CSO Online
www.csoonline.com
www.csoonline.com
Retired US airport body scanners fail to spot guns, knives | CSO Online
www.csoonline.com
www.csoonline.com
The UPS Store says malware found on systems of 51 stores | CSO Online
www.csoonline.com
www.csoonline.com
Apple patches 12 Mac bugs in Flash, SSL | CSO Online
money.cnn.com
money.cnn.com
90% of hospitals and clinics lose their patients' data - Aug. 20, 2014
forms.madisonlogic.com
forms.madisonlogic.com
Spotlight on the Road Warrior
www.telecompaper.com
www.telecompaper.com
RAD to exhibit new NFV platform at CIGRE 2014 - Telecompaper
www.chicagotribune.com
www.chicagotribune.com
Virulent Chinese hacking group mows through U.S. health industry - Chicago Tribune
www.theregister.co.uk
www.theregister.co.uk
Cyber spies whip out 'Machete', stride towards Latin America • The Register
www.pentesteracademy.com
www.pentesteracademy.com
Dictionary Attack on Hidden SSID Networks
www.infosecisland.com
www.infosecisland.com
Save $300 on ICS Cyber Security Conference Registration
www.pcadvisor.co.uk
www.pcadvisor.co.uk
Tech Jargon Buster - August 2014 - PC Advisor
www.claimsjournal.com
www.claimsjournal.com
Hackers Steal Data From 4.5M Hospital-Chain Patients
betanews.com
betanews.com
Run Windows software on Google's Chromebooks with Citrix Receiver for Chrome
money.cnn.com
money.cnn.com
Data breach at UPS Stores in 24 states - Aug. 21, 2014
qz.com
qz.com
Chinese hackers targeted the MH 370 investigation and appear to have stolen classified documents – Quartz
www.prnewswire.com
www.prnewswire.com
It's a New Day for Data for American Consumers -- OVERLAND PARK, Kan., Aug. 19, 2014 /PRNewswire/ --
www.scmagazine.com
www.scmagazine.com
Hackers breach social network MeetMe - SC Magazine
www.producthunt.com
www.producthunt.com
Product Hunt for iOS
nakedsecurity.sophos.com
nakedsecurity.sophos.com
Google et al slammed by justice chief over ‘right to be forgotten’ | Naked Security
nakedsecurity.sophos.com
nakedsecurity.sophos.com
‘Facebook Drug Task Force’ hoax cranks up the paranoia | Naked Security
nakedsecurity.sophos.com
nakedsecurity.sophos.com
SSCC161 – What do you mean, “Trade him for Edward Snowden”? [PODCAST] | Naked Security
nakedsecurity.sophos.com
nakedsecurity.sophos.com
Mother tracks down Facebook predator who lured son away from home | Naked Security
nakedsecurity.sophos.com
nakedsecurity.sophos.com
Police push for phone screen locking by default | Naked Security
www.macon.com
www.macon.com
News from Macon and Warner Robins, GA, and beyond | The Telegraph
www.viralglobalnews.com
www.viralglobalnews.com
Sprint Family Share Pack How It Works
techreport.com
techreport.com
Windows 8.1 August Update causes crashes, gets pulled - The Tech Report
www.kaiserhealthnews.org
www.kaiserhealthnews.org
How Chinese Hackers Stole Patient Data - Kaiser Health News
www.finextra.com
www.finextra.com
Finextra: Security startup vArmour raises $36m
www.heraldonline.com
www.heraldonline.com
Local news from Rock Hill, SC | The Herald
www.mobilewebuser.com
www.mobilewebuser.com
Avast vs AVG: Protect Your PCs with Free Antivirus Software
packetstormsecurity.com
packetstormsecurity.com
Researchers Find It's Terrifyingly Easy To Hack Traffic Lights ≈ Packet Storm
virtualizationreview.com
virtualizationreview.com
Clouds Fail: Deal with It -- Virtualization Review
packetstormsecurity.com
packetstormsecurity.com
Green Lights Forever: Analyzing The Security Of Traffic Infrastructure ≈ Packet Storm
nautil.us
nautil.us
This Is Your Brain on Silence - Issue 16: Nothingness - Nautilus
www.securitytube.net
www.securitytube.net
Black Hat Asia 2014 - Beyond ‘Check The Box’: Powering Intrusion Investigations By Jim Aldridge
www.nbcnews.com
www.nbcnews.com
Hackers Target Colleges to Steal Personal Data, University Research - NBC News
www.vox.com
www.vox.com
Here's how easy it is to hack a traffic light with a laptop - Vox
consumerist.com
consumerist.com
UPS: Hackers Hit Computer Systems At 51 Retail Stores, Possibly Exposing Customer Info – Consumerist
vpncreative.net
vpncreative.net
Facebook Order to Respond to Class Action Suit | VPN Creative
www.scmagazine.com
www.scmagazine.com
Incapsula mitigates multi-vector DDoS attack lasting longer than a month - SC Magazine
www.prnewswire.co.uk
www.prnewswire.co.uk
Protecting Your Business from a DDoS Attack -- MOUNTAIN VIEW, California, Aug. 21, 2014 /PR Newswire UK/ --
myfox8.com
myfox8.com
Data breach at UPS stores in North Carolina | myfox8.com
www.cbsnews.com
www.cbsnews.com
Supervalu reveals potential data breach - CBS News
money.cnn.com
money.cnn.com
Traffic lights are dangerously easy to hack - Aug. 21, 2014
www.theguardian.com
www.theguardian.com
Hack Attack: How the Truth Caught Up With Rupert Murdoch by Nick Davies – review | Books | The Guardian
www.net-security.org
www.net-security.org
Critical Delphi and C++Builder VCL library bug found
www.theregister.co.uk
www.theregister.co.uk
Microsoft: We plan to CLEAN UP this here Windows Store town • The Register
www.CapitalGazette.com
www.CapitalGazette.com
Home - capitalgazette.com
blog.trendmicro.com
blog.trendmicro.com
Simply Security News, Views and Opinions from Trend Micro, IncSeverity of Attacks against Organizations Escalated » Simply Security News, Views and Opinions from Trend Micro, Inc
moodleshare.org
moodleshare.org
SciFi Dune: Dune Genesis by Frank Herbert
www.marketwired.com
www.marketwired.com
Check Point a Leader in Unified Threat Management for Completeness of Vision and Ability to Execute
www.cnbc.com
www.cnbc.com
Hackers target colleges to steal personal data, university research
www.capitalgazette.com
www.capitalgazette.com
Annapolis Portable Search
www.toptechnews.com
www.toptechnews.com
Cost of Target Data Breach: $148 Million Plus Loss of Trust - Computing on Top Tech News
www.itwebafrica.com
www.itwebafrica.com
Fortinet: Leader in Gartner's 2014 Magic Quadrant for UTM - ITWeb Africa
www.washingtonpost.com
www.washingtonpost.com
Wonkbook: The Fed just might raise rates sooner than expected - The Washington Post
blog.chron.com
blog.chron.com
Apple’s iMessage becomes a major source of mobile spam - TechBlog
tech.firstpost.com
tech.firstpost.com
Spammers love iMessage: Apple's service blamed for one-third of mobile spam - Tech2
www.securitytracker.com
www.securitytracker.com
Apache Axis Certificate Validation Flaw Lets Remote Users Spoof Server Certificates - SecurityTracker (RSS)
whiteboardfox.com
whiteboardfox.com
Whiteboard Fox - Simple Online Whiteboard
www.net-security.org
www.net-security.org
Ground Zero Summit 2014
www.net-security.org
www.net-security.org
Most popular Android apps open users to MITM attacks
www.bizjournals.com
www.bizjournals.com
Target cuts outlook as data breach costs hit earnings again - Orlando Business Journal
www.computerworld.com.au
www.computerworld.com.au
As sales deadline approaches, OEMs continue to push Windows 7 PCs to consumers - Computerworld
www.infoworld.com
www.infoworld.com
The UPS Store says malware found on systems of 51 stores | Security - InfoWorld
www.virtual-strategy.com
www.virtual-strategy.com
Protecting Your Business from a DDoS Attack | Virtual-Strategy Magazine
www.streetwisetech.com
www.streetwisetech.com
Review: One Of The Best Software In The Market - TrustPort Antivirus
www.postandcourier.com
www.postandcourier.com
Sheheen hits Haley on hacking in new TV ad - Post and Courier
www.maclife.com
www.maclife.com
Morning Report: Dirty Rotten iMessage Spam, Walmart's 97-Cent iPhone 5c | Mac|Life
www.securityfocus.com
www.securityfocus.com
Microsoft .NET Framework CVE-2014-4062 ASLR Security Bypass Vulnerability (RSS)
www.theverge.com
www.theverge.com
These six lawsuits shaped the internet | The Verge
www.bbc.com
www.bbc.com
BBC News - UPS branches hit by data breach
mspmentor.net
mspmentor.net
Security from the Cloud: More Risky? | MSPmentor Blog
FOX43.com
FOX43.com
WPMT FOX43 - News in Harrisburg, York, Lancaster, Lebanon News, Weather, Sports
www.nasa.gov
www.nasa.gov
Ozone-Depleting Compound Persists, NASA Research Shows | NASA
www.securitytube.net
www.securitytube.net
Black Hat Asia 2014 - The Inner Workings Of Mobile Cross-Platform Technologies By Simon Roses Femerling
www.pentesteracademy.com
www.pentesteracademy.com
Google XSS Challenge 2
www.harboroughmail.co.uk
www.harboroughmail.co.uk
Pair in court in phone hacking case - Harborough Mail
vpncreative.net
vpncreative.net
Traffic Lights Hacked Through An Old Laptop | VPN Creative
www.broadwayworld.com
www.broadwayworld.com
Coalfire to Showcase New Reference Architecture Guides at VMworld 2014 - BWWGeeksWorld
www.theguardian.com
www.theguardian.com
Phone hacking: Neil Wallis and Jules Stenson appear in court | UK news | theguardian.com
phys.org
phys.org
Michigan team finds security flaws in traffic lights
www.autoevolution.com
www.autoevolution.com
Traffic Lights Hacked in Michigan - autoevolution
phys.org
phys.org
Hacking Gmail with 92 percent success
www.nbcnews.com
www.nbcnews.com
Traffic Lights Are Vulnerable to Simple Hack, Researchers Find - NBC News
www.businessmirror.com.ph
www.businessmirror.com.ph
BusinessMirror - Services sector: A few highlights
9to5mac.com
9to5mac.com
iMessage “being taken over by spammers,” accounts for almost a third of mobile spam | 9to5Mac
www.dailymail.co.uk
www.dailymail.co.uk
Traffic lights hacked in major cities using just a laptop | Mail Online
www.net-security.org
www.net-security.org
Most Facebook email notifications are now encrypted
www.theregister.co.uk
www.theregister.co.uk
Chinese hackers spied on investigators of Flight MH370 - report • The Register
www.wired.com
www.wired.com
How Hackers Could Mess With 911 Systems and Put You at Risk | Threat Level | WIRED
www.schneier.com
www.schneier.com
Schneier on Security: Disguising Exfiltrated Data (RSS)
www.stuff.co.nz
www.stuff.co.nz
More email nasties to come, Nats warned | Stuff.co.nz
www.zdnet.com
www.zdnet.com
US, German researchers create framework for core Android security modules | ZDNet
www.broadwayworld.com
www.broadwayworld.com
Protecting Your Business from a DDoS Attack - BWWGeeksWorld
www.information-age.com
www.information-age.com
The IT director as realist: how to accelerate practical change in board meetings | Information Age
gulfnews.com
gulfnews.com
Millions of Android smartphones ‘at risk’ of hacking in Middle East | GulfNews.com
www.deccanchronicle.com
www.deccanchronicle.com
Syrian malware is lurking, is dangerous | Deccan Chronicle
www.belfasttelegraph.co.uk
www.belfasttelegraph.co.uk
Pair in court in phone hacking case - BelfastTelegraph.co.uk
www.broadwayworld.com
www.broadwayworld.com
CORRECTING and REPLACING Parallels Announces Parallels Desktop 10 for Mac with OS X Yosemite Integration, Enables to Launch Office Applications Up to 50 Percent Faster an - BWWGeeksWorld
betanews.com
betanews.com
Universities fail to get to grips with cyber security
insurancenewsnet.com
insurancenewsnet.com
Tip sheet PCI-compliant payment processing: Tokenless two-factor authentication overcomes the compliance issues
www.zdnet.com
www.zdnet.com
Bitcoin phishing campaign targets media, tech, education industries | ZDNet
www.ajc.com
www.ajc.com
UPS Stores report data breach | www.ajc.com
www.v3.co.uk
www.v3.co.uk
GCHQ launches cyber war games to find future spooks - IT News from V3.co.uk
www.dailymail.co.uk
www.dailymail.co.uk
Pair face phone hacking allegations | Mail Online
www.infoworld.com
www.infoworld.com
SDS still young, but very much on the rise | Security - InfoWorld
seclists.org
seclists.org
Bugtraq: [SECURITY] [DSA 3008-1] php5 security update
seclists.org
seclists.org
Bugtraq: [SECURITY] [DSA 2940-1] libstruts1.2-java security update
seclists.org
seclists.org
Information Security News: 5 cool new security research breakthroughs
seclists.org
seclists.org
Information Security News: Chinese hackers reportedly took classified data on MH370 a day after it went missing
www.ibtimes.co.uk
www.ibtimes.co.uk
Operation Flag Day: GCHQ Launches Online Spy Game To Find Cyber Security Talent
www.eweek.com
www.eweek.com
Symantec Moving All Norton Security into One Cloud Service
business.itbusinessnet.com
business.itbusinessnet.com
Sophos in Leader's Quadrant in 2014 Unified Threat Management Magic Quadrant for 3rd Consecutive Year
www.itproportal.com
www.itproportal.com
Microsoft reports fall in fake antivirus programs | ITProPortal.com
www.bizjournals.com
www.bizjournals.com
Data breach at 51 UPS Stores; 3 Colorado locations affected - Denver Business Journal
www.nbcchicago.com
www.nbcchicago.com
Two Area UPS Stores Affected by Data Breach | NBC Chicago
tuoitrenews.vn
tuoitrenews.vn
Vietnamese hackers invited to join maiden hacking contest
www.businesswire.com
www.businesswire.com
Coalfire to Showcase New Reference Architecture Guides at VMworld 2014 | Business Wire
www.net-security.org
www.net-security.org
51 UPS stores hit with PoS malware
www.theregister.co.uk
www.theregister.co.uk
Hear ye, young cyber warriors of the realm: GCHQ wants you • The Register
www.huffingtonpost.co.uk
www.huffingtonpost.co.uk
GCHQ Launches 'Cyber Security Challenge' To Find Hacking Superheroes
www.barrowcountynews.com
www.barrowcountynews.com
BRMC patients affected by data breach
www.businessweek.com
www.businessweek.com
Two Ex-News Corp. Editors Appear in London Court Over Hacking - Businessweek
mashable.com
mashable.com
Hackers Compromise 51 UPS Stores Across the United States
technology.inquirer.net
technology.inquirer.net
Bill penalizing techy intruders advances to plenary | Inquirer Technology
www.macrumors.com
www.macrumors.com
New Research Claims iMessage Accounts for 30% of Mobile Spam Messages - Mac Rumors
www.net-security.org
www.net-security.org
How the role of the CSO is changing
en.portnews.ru
en.portnews.ru
USPA conducts a seminar on information security
www.gq.com
www.gq.com
The Strange Tale of the North Pond Hermit
www.securitytube.net
www.securitytube.net
Black Hat Usa 2014 - Oracle Data Redaction Is Broken By David Litchfield
www.pentesteracademy.com
www.pentesteracademy.com
Challenge 8: Broken Authentication
www.mobilewebuser.com
www.mobilewebuser.com
Avast Antivirus: The Best Things Coming From The Best Software
www.streetwisetech.com
www.streetwisetech.com
Avast Antivirus: Protection Guaranteed From A Free Software
www.harboroughmail.co.uk
www.harboroughmail.co.uk
Pair face phone hacking allegations - Harborough Mail
www.dqindia.com
www.dqindia.com
Smartlink brings next generation wireless technology with its new router - Dataquest
www.isn.ethz.ch
www.isn.ethz.ch
Some Principles of Cyber Strategy / ISN
www.theregister.co.uk
www.theregister.co.uk
Boffins propose security shim for Android • The Register
www.net-security.org
www.net-security.org
What can we learn from the top 10 biggest data breaches?
www.thehindu.com
www.thehindu.com
Workshop on cyber security for women in Kochi - The Hindu
www.streetwisetech.com
www.streetwisetech.com
Review: Protection Guaranteed From Kaspersky Antivirus Software
www.nbcnews.com
www.nbcnews.com
UPS Says Hack May Have Exposed Customer Data at 51 Stores - NBC News
www.pcadvisor.co.uk
www.pcadvisor.co.uk
Antivirus Remover 2.1.0.0 - PC Advisor
www.securityfocus.com
www.securityfocus.com
OpenSSL DTLS CVE-2014-3507 Remote Denial of Service Vulnerability (RSS)
www.streetwisetech.com
www.streetwisetech.com
Norman Antivirus: The Best Features From An Outstanding Program
www.mddionline.com
www.mddionline.com
How Hackers Stole Data From 4.5 Million Patients | MDDI Medical Device and Diagnostic Industry News Products and Suppliers
www.itpro.co.uk
www.itpro.co.uk
BYOD policies in local government explored | IT PRO
www.theregister.co.uk
www.theregister.co.uk
New twist as rogue antivirus enters death throes • The Register
www.net-security.org
www.net-security.org
NIST vetting guide helps in testing mobile apps
www.theregister.co.uk
www.theregister.co.uk
Did you swipe your card through one of these UPS Store tills? You may have been pwned • The Register
practicaltypography.com
practicaltypography.com
Butterick’s Practical Typography
www.theregister.co.uk
www.theregister.co.uk
New twist as rogue anti-virus enters death throes • The Register
www.timesunion.com
www.timesunion.com
Retailer takes profiling deal - Times Union
www.inferse.com
www.inferse.com
Apple’s OS X Yosemite Public Beta available for download
allafrica.com
allafrica.com
allAfrica.com: Nigeria: Protecting Financial Data From Cyber Attacks
www.wsoctv.com
www.wsoctv.com
NC locations included in UPS data breach | www.wsoctv.com
www.arnnet.com.au
www.arnnet.com.au
Westcon Group and Palo Alto Networks extend global partnership - ARN
www.wfaa.com
www.wfaa.com
UPS says 51 retail stores breached by malware | wfaa.com Dallas - Fort Worth
www.theregister.co.uk
www.theregister.co.uk
Amazon flicks switch on CloudFront security features • The Register
www.newyorker.com
www.newyorker.com
Why Are Chinese Patients Violently Attacking Their Doctors?
www.benzinga.com
www.benzinga.com
UPDATE: UPS's UPS Store Notifies Customers of Potential Data Breach, Discovered 51 Locations Malware In 24 States | Benzinga
www.itpro.co.uk
www.itpro.co.uk
Heartbleed bug reportedly behind major Community Health Systems data breach | IT PRO
healthitsecurity.com
healthitsecurity.com
CHSI data breach result of Heartbleed bug, says TrustedSec | HealthITSecurity.com
www.securitytube.net
www.securitytube.net
Black Hat Usa 2014 - Breaking The Security Of Physical Devices By Silvio Cesare
www.itnews.com.au
www.itnews.com.au
Heartbleed behind massive healthcare data breach - Security - News - iTnews.com.au
in.reuters.com
in.reuters.com
Fitch Affirms St. Jude Medical's at 'A'; Outlook Stable| Reuters
mashable.com
mashable.com
Hackers Reportedly Exploited Heartbleed Bug to Steal 4.5 Million Patient Records
www.smh.com.au
www.smh.com.au
US hospital breach biggest yet to exploit Heartbleed bug
www.smh.com.au
www.smh.com.au
Parallels Desktop 10: run Windows on your Yosemite Mac
townhall.com
townhall.com
Hospital Network Hacked, 4.5 Million Patient Records Stolen - Leah Barkoukis
www.npr.org
www.npr.org
Macy's To Pay $650,000 In Settlement Over Alleged Racial Profiling : The Two-Way : NPR
www.tripwire.com
www.tripwire.com
Attackers Are Using High-Profile Vulnerabilities to Evade Detection - The State of Security
www.itworld.com
www.itworld.com
5 cool new security research breakthroughs | ITworld
www.theregister.co.uk
www.theregister.co.uk
Slapdash SSL code puts tons of top Android Play Store apps in hack peril • The Register
www.greatfallstribune.com
www.greatfallstribune.com
Bioterror lab errors cloaked in secrecy
www.vocativ.com
www.vocativ.com
Why Hackers Want Your Twitter Account More Than Your Credit Card
www.techtimes.com
www.techtimes.com
Hackers tapped Heartbeat Internet flaw in massive healthcare data breach : PERSONAL TECH : Tech Times
bioprepwatch.com
bioprepwatch.com
ASPR seeks development of disaster recovery best practices | BioPrepWatch.com
www.healthdatamanagement.com
www.healthdatamanagement.com
Top Health Data Breaches Caused by Hackers
www.cbs6albany.com
www.cbs6albany.com
The Real Deal: Car Hacking - WRGB CBS6 - Top Stories
www.reuters.com
www.reuters.com
FBI warns healthcare firms they are targeted by hackers| Reuters
lwn.net
lwn.net
Ftrace: The hidden light switch [LWN.net]
www.securitytube.net
www.securitytube.net
Black Hat Usa 2014 - Badusb - On Accessories That Turn Evil By Karsten Nohl + Jakob Lell
gigaom.com
gigaom.com
Researchers propose new Android security framework that could aid BYOD schemes — Tech News and Analysis
www.scmagazine.com
www.scmagazine.com
2014 Women in IT Security: Kristin Lovejoy - SC Magazine
www.gulfcoastnewstoday.com
www.gulfcoastnewstoday.com
South Baldwin Regional Medical Center reports hacking - GulfCoastNewsToday.com: News
twitter.com
twitter.com
Microsoft Security on Twitter: Want a chance to win an #Xbox One? Submit Pass-the-Hash related questions to #AskPtH #sweeps and be entered to win http://t.co/swIvUROqQc
www.sci-tech-today.com
www.sci-tech-today.com
Cost of Target Data Breach: $148 Million Plus Loss of Trust | Sci-Tech Today
www.bbc.com
www.bbc.com
BBC News - Entering the 'house of hacking horrors'
forums.juniper.net
forums.juniper.net
Gainspeed Voted Most Innovative at CableLabs Summe... - J-Net Community
www.securitytracker.com
www.securitytracker.com
Cisco WebEx MeetMeNow Server Input Validation Flaw Lets Remote Authenticated Users View Files - SecurityTracker (RSS)
www.csoonline.com
www.csoonline.com
Researchers build security framework for Android | CSO Online
www.securitytracker.com
www.securitytracker.com
Cisco ASR Router Packet Data Network Gateway Session Manager Lets Remote Users Deny Service - SecurityTracker (RSS)
packetstormsecurity.com
packetstormsecurity.com
Panda Security 2014 Privilege Escalation ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
WordPress Mobile Pack 2.0.1 Information Disclosure ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Delphi And C++ Builder VCL Library Buffer Overflow ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Ubuntu Security Notice USN-2320-1 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Red Hat Security Advisory 2014-1084-01 ≈ Packet Storm
tratt.net
tratt.net
Laurence Tratt: An editor for composed programs
www.securitytracker.com
www.securitytracker.com
Cisco NX-OS Nexus 5000/6000 SNMP Bug Lets Remote Users Obtain Potentially Sensitive Information - SecurityTracker (RSS)
www.law360.com
www.law360.com
Visa, MasterCard Severed From Target Data Breach MDL - Law360
www.ecommercetimes.com
www.ecommercetimes.com
Dropbox's Mailbox Lands on Mac Desktop | Cloud Computing | E-Commerce Times
packetstormsecurity.com
packetstormsecurity.com
RiseCON 2014 Call For Papers ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
51 UPS Branches Pwned By Malware ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
ESET Windows Products 7.0 Privilege Escalation ≈ Packet Storm
www.eastasiaforum.org
www.eastasiaforum.org
Collective self-defence: What Japan’s new defence policy means for international cooperation on cyber security | East Asia Forum
www.symantec.com
www.symantec.com
Hacking as a Service: How Much Does it Cost to Hack an Account? | Symantec Connect
www.jewishjournal.com
www.jewishjournal.com
Israeli officers learn to fight cyber-war | Israel | Jewish Journal
www.mobilewebuser.com
www.mobilewebuser.com
Avast VS AVG Antivirus: Protection Guaranteed From A Free Software
www.gamerheadlines.com
www.gamerheadlines.com
Avast Free Antivirus software update 19 August improves performance
www.digitaljournal.com
www.digitaljournal.com
4.5 Million Patient Records Leaked in Healthcare Data Breach - Press Release - Digital Journal
www.usatoday.com
www.usatoday.com
Computer virus caused data breach at UPS stores in 24 states
vrt-blog.snort.org
vrt-blog.snort.org
VRT: Discovering Dynamically Loaded API in Visual Basic Binaries
twitter.com
twitter.com
Twitter / Jofo : Oh my god. Intern was fucking ...
www.bsminfo.com
www.bsminfo.com
IoT Adoption And Its Impact On Manufacturing
www.huffingtonpost.com
www.huffingtonpost.com
The Internet of Things 2014 [Slideshare] | Vala Afshar
www.techspot.com
www.techspot.com
Hacking traffic lights is easy if you have the right gear and some basic know-how - TechSpot
www.propertycasualty360.com
www.propertycasualty360.com
You can hack that? Here are 5 new cyber risks associated with the Internet of Things | PropertyCasualty360
vsr.edgl.com
vsr.edgl.com
Study Reveals 70 Percent of IoT Devices Vulnerable to Attack | News | Vertical Systems Reseller (VSR)
www.todayonline.com
www.todayonline.com
KL, Interpol probe hacking of MH370 data | TODAYonline
www.cnet.com
www.cnet.com
UPS Store hacked, possibly compromising user data - CNE
securitywatch.pcmag.com
securitywatch.pcmag.com
Hackers Were Busy at Black Hat
defensesystems.com
defensesystems.com
New hacking scenario emerges: Wi-Fi signal-sniffing drones -- Defense Systems
www.eweek.com
www.eweek.com
Juniper Ethernet Switches Target BYOD, Cloud Environments
www.mobilewebuser.com
www.mobilewebuser.com
Mozilla Firefox vs Google Chrome: Which Should Assert Its Dominance
www.pcmag.com
www.pcmag.com
Panda Free Antivirus 2015 Review & Rating | PCMag.com
www.thestar.com.my
www.thestar.com.my
US Community Health says 4.5mil peoples' data stolen in cyber attack from China - Business News | The Star Online
www.nextgov.com
www.nextgov.com
Pro-Palestinian Hackers Deface Delaware State Treasury Site - Nextgov.com
online.wsj.com
online.wsj.com
Antivirus Works Too Well, Gripe Cybercops - WSJ
www.theguardian.com
www.theguardian.com
Boot up: Google's AdSense clawback, HTC's Windows M8, data carpentry | Technology | theguardian.com
www.tripwire.com
www.tripwire.com
UPS Confirms Data Breach at 51 Retail Stores Nationwide - The State of Security
www.wallstreetandtech.com
www.wallstreetandtech.com
Driving Information Security, From Silicon Valley to Detroit - Wall Street & Technology
www.securitytube.net
www.securitytube.net
Black Hat Usa 2014 - The State Of Incident Response By Bruce Schneier
somerville.wickedlocal.com
somerville.wickedlocal.com
Bike theft numbers drop in Somerville - News - Somerville Journal - Somerville, MA
www.marketwatch.com
www.marketwatch.com
Global Digital Solutions, Inc. (GDSI) Announces New Details - And Photo - Regarding Its Planned Shipment of High-End, Mobile Command and Control Vehicle to Sadara, a $20 Billion Petrochemical Joint Venture Between Dow Chemical and Saudi Aramco, the Global Petroleum and Chemicals Enterprise Owned by the Kingdom of Saudi Arabia - MarketWatch
mspmentor.net
mspmentor.net
How to Upgrade Your Customers to Next Gen Security Services | MSPmentor Blog
www.theregister.co.uk
www.theregister.co.uk
Oi! Rip Van Winkle: PATCH, already • The Register
www.natlawreview.com
www.natlawreview.com
Payment Card Industry (PCI) Data Security Standard 3.0: New Guidance to Consider When Engaging Service Providers | The National Law Review
www.chicagotribune.com
www.chicagotribune.com
UPS Store warns of data breach at 51 locations nationwide - Chicago Tribune
www.channelpartnersonline.com
www.channelpartnersonline.com
Will California Ruling Put Brakes on BYOD Trend?
www.washingtonpost.com
www.washingtonpost.com
Target’s biggest challenge isn’t bouncing back from the data breach - The Washington Post
www.marketwatch.com
www.marketwatch.com
Target lowers outlook, reeling from data breach - MarketWatch
www.mainenewsonline.com
www.mainenewsonline.com
Hackers steal patients’ information from Trinity | Maine News Online
www.theregister.co.uk
www.theregister.co.uk
Need a green traffic light all the way home? Easy with insecure street signals, say researchers • The Register
gizmodo.com
gizmodo.com
Scientists Hack Cryptography Keys By Simply Touching a Laptop
kjzz.org
kjzz.org
Data Breach Hits Four UPS Stores In Arizona | KJZZ
gadgets.ndtv.com
gadgets.ndtv.com
FBI Probing Reported Theft of 1.2 Billion Passwords by Russian Hackers | NDTV Gadgets
www.wbhm.org
www.wbhm.org
Kyle Whitmire: There Will Be A Dome? (WBHM - Your NPR News Station)
www.latinpost.com
www.latinpost.com
New York City's Herald Square Macy's Department Store to Pay Thousands for Racial Profiling, Report on New Policies for 3 Years : Business : Latin Post
www.healthdatamanagement.com
www.healthdatamanagement.com
CHS Starts Notification Process Following Huge Breach - HDM Top Stories Article | Health Data Management
firstlook.org
firstlook.org
U.S. Military Bans The Intercept - The Intercept
www.pnj.com
www.pnj.com
Hospital chain says it has cyber security insurance
twitter.com
twitter.com
Twitter / ramirahim : Impressed with our interns! ...
newyork.cbslocal.com
newyork.cbslocal.com
Data Breach Strikes 51 UPS Stores Around U.S. « CBS New York
www.tctmd.com
www.tctmd.com
Meta-Analysis: Worse Clinical Outcomes But Less Bleeding With Bivalirudin in PCI - Journal News - TCTMD
edition.cnn.com
edition.cnn.com
Chairless Chair, an invisible chair that you can wear - CNN.com
venturebeat.com
venturebeat.com
7 reasons why we're going to see more card data breaches at our favorite retail stores | VentureBeat | Security | by Slava Gomzin, security and payments expert, HP
www.americanbanker.com
www.americanbanker.com
Data Breaches May Drive Consumers Back to Cash - Bank Think Article - American Banker
www.realwire.com
www.realwire.com
Parallels Announces Parallels Desktop® 10 for Mac with OS X Yosemite Integration
www.ocala.com
www.ocala.com
Munroe: Hospital not affected by computer hacking | Ocala.com
www.toptechnews.com
www.toptechnews.com
Cost of Target Data Breach: $148 Million - Network Security on Top Tech News
www.tampabay.com
www.tampabay.com
Community Health opens toll-free line for patients who may be data-breach victims | Tampa Bay Times
www.pcmag.com
www.pcmag.com
7 Scary Things Employees Can Do With Their Mobile Devices | PCMag.com
www.infosecisland.com
www.infosecisland.com
Preparing for a Successful IAM Integration Project (Part 1 of 2)
www.scmagazine.com
www.scmagazine.com
Community Health Systems attackers exploited Heartbleed bug for access, firm says - SC Magazine
www.philly.com
www.philly.com
Computer hackers in China hit area hospitals, steal patient data
www.itbusinessedge.com
www.itbusinessedge.com
Most Companies Admit They Don’t Have a Very Effective Security Response Plan
www.securityfocus.com
www.securityfocus.com
EMC RSA Archer GRC CVE-2014-2517 Unspecified Privilege Escalation Vulnerability (RSS)
www.securityfocus.com
www.securityfocus.com
RSA Archer GRC CVE-2014-0641 Unspecified Cross Site Request Forgery Vulnerability (RSS)
www.securityfocus.com
www.securityfocus.com
EMC RSA Archer GRC CVE-2014-2505 Unspecified Remote Code Execution Vulnerability (RSS)
www.securityfocus.com
www.securityfocus.com
RSA Archer GRC CVE-2014-0640 Unspecified Information Disclosure Vulnerability (RSS)
www.scmagazine.com
www.scmagazine.com
UPS announces breach impacting 51 U.S. locations - SC Magazine
www.youtube.com
www.youtube.com
Troubleshooting Services in Contrail - YouTube
rachelbythebay.com
rachelbythebay.com
fork() can fail: this is important
blogs.cisco.com
blogs.cisco.com
Snowshoe Spam Attack Comes and Goes in a Flurry
www.securitytube.net
www.securitytube.net
Scripting Wi-Fi Pentesting Tools In Python - Scapy Basics
www.nydailynews.com
www.nydailynews.com
2015 Subaru Legacy and Outback earn IIHS Top Safety Pick+ awards - NY Daily News
www.thehindu.com
www.thehindu.com
Malaysia probes apparent hacking of MH370 data - The Hindu
www.esecurityplanet.com
www.esecurityplanet.com
Big Data Overwhelms Security Teams - eSecurity Planet
www.itbusinessedge.com
www.itbusinessedge.com
Community Health Breach Highlights Security Problems in Health Care Industry
www.scienceworldreport.com
www.scienceworldreport.com
Hackers from China Stole Data on 4.5 Million Patients
www.thenational.ae
www.thenational.ae
Nato can help UAE cyber security | The National
www.ibtimes.co.uk
www.ibtimes.co.uk
Google Voice Search On Android Smartphones Could be Exploited by Malware
windows.microsoft.com
windows.microsoft.com
Two-step verification: FAQ - Windows Help
www.dailymail.co.uk
www.dailymail.co.uk
Chinese hackers 'stole classified data from Malaysia's MH370 investigation | Mail Online
www.tennessean.com
www.tennessean.com
East Nashville Farmers Market gets its website back
www.extremetech.com
www.extremetech.com
The PS4 is still selling much faster than expected – and Sony doesn’t know why | ExtremeTech
www.bizjournals.com
www.bizjournals.com
Target cuts outlook as data breach costs hit earnings again - Dallas Business Journal
www.twitch.tv
www.twitch.tv
Twitch
www.networkworld.com
www.networkworld.com
Hacking traffic lights with a laptop is easy | Network World
www.marketwatch.com
www.marketwatch.com
PernixData Raises $35M in Series C Financing, Closes First FiscalYear With Record Revenue - MarketWatch
www.toptechnews.com
www.toptechnews.com
Chinese Hackers Nab Info on Millions of U.S. Patients - Network Security on Top Tech News
www.cbronline.com
www.cbronline.com
Four Anonymous hackers have pleaded guilty to minor charges - Computer Business Review
www.tuaw.com
www.tuaw.com
Daily Deals for August 20, 2014, last chance on VPN Unlimited Premium Plan | TUAW: Apple news, reviews and how-tos since 2004
www.youtube.com
www.youtube.com
Blocked by Symantec Endpoint Protection - YouTube
www.securityfocus.com
www.securityfocus.com
IBM Rational Directory Server CVE-2014-3089 Local Information Disclosure Vulnerability (RSS)
www.scmagazine.com
www.scmagazine.com
Health care breaches continue to rise, over 30M affected - SC Magazine
www.broadwayworld.com
www.broadwayworld.com
Parallels Announces Parallels Desktop 10 for Mac with OS X Yosemite Integration Plus Faster AND Better Battery Life! - BWWGeeksWorld
www.marketwatch.com
www.marketwatch.com
Sophos in Leader's Quadrant in 2014 Unified Threat Management MagicQuadrant for 3rd Consecutive Year - MarketWatch
www.reuters.com
www.reuters.com
Macy's to pay $650,000 to resolve 'shop-and-frisk' probe| Reuters
www.gurufocus.com
www.gurufocus.com
A Leader in the Global Security Software - GuruFocus.com
www.canadianreviewer.com
www.canadianreviewer.com
Parallels Desktop 10 for Mac with OS X Yosemite integration announced - Canadian Reviewer - News, Reviews and Opinion with a Canadian Perspective
www.scmagazine.com
www.scmagazine.com
CryptoLocker copycat, TorrentLocker, discovered by researchers - SC Magazine
krebsonsecurity.com
krebsonsecurity.com
Counterfeit U.S. Cash Floods Crime Forums — Krebs on Security
blog.coresecurity.com
blog.coresecurity.com
Our Latest Vulnerability Advisory: Delphi and C++ Builder VCL library Buffer Overflow | Core Security
www.wyomingbusinessreport.com
www.wyomingbusinessreport.com
Evanston hospital endures data breach | Today's News | Wyoming Business Report
www.slate.com
www.slate.com
Roman Mars 99 Percent Invisible: Jules Yap hacks Ikea products at IkeaHackers.net.
in.reuters.com
in.reuters.com
U.S. hospital breach biggest yet to exploit Heartbleed bug: expert| Reuters
www.theblaze.com
www.theblaze.com
Hackers Successfully Attacked U.S. Nuclear Agency Three Times in Three Years | TheBlaze.com
www.bbc.com
www.bbc.com
BBC News - US hospital hack 'exploited Heartbleed flaw'
finance.yahoo.com
finance.yahoo.com
HP earnings may show how much further PC rebound will bound - Yahoo Finance
www.bnd.com
www.bnd.com
Metro-east news from Belleville, IL | Belleville News-Democrat
www.cnet.com
www.cnet.com
Staying safe on public Wi-Fi - CNE
www.pcr-online.biz
www.pcr-online.biz
Parallels' new Desktop 10 brings Windows to Yosemite Mac | The latest news from the Computer and IT Industry | PC Retail
www.nwaonline.com
www.nwaonline.com
Hospitals: Few clients call in over files breach | NWAonline
www.marketwatch.com
www.marketwatch.com
What to do if your Social Security number was stolen - MarketWatch
www.computerdealernews.com
www.computerdealernews.com
Palo Alto Networks goes global with Westcon Group | Computer Dealer News
blogs.technet.com
blogs.technet.com
What will cybersecurity look like in 2025?, Part 2: Microsoft envisions an optimistic future - Microsoft Security Blog - Site Home - TechNet Blogs
www.net-security.org
www.net-security.org
Reveton ransomware now comes with password stealers
usa.kaspersky.com
usa.kaspersky.com
Kaspersky Lab Recognized with Top Honors in CRN 2014 Annual Report Card | Kaspersky Lab US
www.nola.com
www.nola.com
New Orleans, LA Local News, Breaking News, Sports & Weather - NOLA.com
thehackernews.com
thehackernews.com
'AdThief' Chinese Malware Infects Over 75,000 Jailbroken iOS devices
www.scmagazine.com
www.scmagazine.com
'Backoff' malware compromises POS devices in New Orleans restaurant - SC Magazine
www.scmagazine.com
www.scmagazine.com
FBI begins investigation into 1.2 billion stolen credentials - SC Magazine
www.securityfocus.com
www.securityfocus.com
RiverBed Stingray Traffic Manager Virtual Appliance Cross Site Scripting Vulnerability (RSS)
www.securityfocus.com
www.securityfocus.com
IBM WebSphere Application Server CVE-2014-0965 Unspecified Information Disclosure Vulnerability (RSS)
www.securityfocus.com
www.securityfocus.com
Baidu Spark Browser Stack Overflow Denial of Service Vulnerability (RSS)
www.11alive.com
www.11alive.com
Health network reports 4.5 million patients had information hacked
www.necn.com
www.necn.com
Shaw's, Star Market Data Breach: How to Protect Yourself | NECN
www.yorkdispatch.com
www.yorkdispatch.com
Memorial Hospital's operator reports data breach affecting 4.5 million people - York Dispatch
www.bizjournals.com
www.bizjournals.com
Hackers get 4.5 million hospital patients’ names, addresses, Social Security numbers - Atlanta Business Chronicle
www.ihealthbeat.org
www.ihealthbeat.org
About 30.1M Patients Affected by Health Data Breaches Since 2009 - iHealthBeat
newssun.suntimes.com
newssun.suntimes.com
News-Sun Editorial: No reason to feel safe after hospital data breach | Lake County News-Sun
twitter.com
twitter.com
Twitter / SecurityTube : Say Hello to WiDy! Our Wi-Fi ...
www.securitytube.net
www.securitytube.net
Black Hat Usa 2014 - Mission Mpossible By Nils + Jon Butler
www.tripwire.com
www.tripwire.com
Researchers Discover Google Chrome Is Plagued With Malicious Browser Extensions - The State of Security
www.mercurynews.com
www.mercurynews.com
From the archive, 2002: Symantec in demand as viruses, security create huge need - San Jose Mercury News
www.nbcnews.com
www.nbcnews.com
Macy's Settles Shopper-Profiling Probe for $650K - NBC News
www.ihealthbeat.org
www.ihealthbeat.org
Calif. Court's Cell Phone Ruling Could Affect Hospitals' BYOD Policies - iHealthBeat
truth-out.org
truth-out.org
New Police Hacking Technologies Raise Familiar Questions About Civil Liberties
insurancenewsnet.com
insurancenewsnet.com
Attorney General Patrick Morrisey Warns Consumers About Data Breach at West Virginia Hospitals
baltimorepostexaminer.com
baltimorepostexaminer.com
What are the top three anti-virus security programs?Baltimore Post-Examiner
www.king5.com
www.king5.com
P.F. Chang's in Bellevue, Lynnwood affected by data breach
www.edtechmagazine.com
www.edtechmagazine.com
Colleges Expand into Mobile Content Management | EdTech Magazine
www.citeworld.com
www.citeworld.com
Google's retreat on Pointer Events makes life harder for web developers | CITEworld
healthitsecurity.com
healthitsecurity.com
Children's Mercy Hospital notifies employees of data breach | HealthITSecurity.com
www.cincinnati.com
www.cincinnati.com
Macy's settles racial profiling complaints at NY store
jutiagroup.com
jutiagroup.com
Market Update (NASDAQ:CSCO): Why Cisco (CSCO) Stock Is Still a ‘Buy’ at TheStreet
www.newsday.com
www.newsday.com
Macy's to pay $650,000 to settle allegations of racial profiling at Herald Square store - Newsday
www.tripwire.com
www.tripwire.com
Dropbox beefs up security of shared links - for business users
forums.juniper.net
forums.juniper.net
Pass the popcorn! Juniper’s 1TB Line Card Takes t... - J-Net Community
www.ibj.com
www.ibj.com
'Bring your own device' creates privacy issues for employees | 2014-08-20 | Indianapolis Business Journal | IBJ.com
www.finextra.com
www.finextra.com
Finextra: Flash virtualisation startup PernixData raises $35m
www.bizjournals.com
www.bizjournals.com
Target cuts outlook as data breach costs hit earnings again - Minneapolis / St. Paul Business Journal
boingboing.net
boingboing.net
Australian surveillance law will legalize snooping on and hacking the entire Internet - Boing Boing
www.cbsnews.com
www.cbsnews.com
Still reeling from data breach, Target cuts forecast - CBS News
www.pehub.com
www.pehub.com
PE HUB » Storage software company PernixData raises $35 mln from Menlo, KP, Benioff and others
www.infosecisland.com
www.infosecisland.com
Vulnerability Management: Just Turn It Off! PART III
www.datacenterknowledge.com
www.datacenterknowledge.com
Storage Virtualization Startup Closes $35M Round by Benioff, Luczo, VCs
blogs.avg.com
blogs.avg.com
The latest numbers: Who is really on Facebook?
blogs.cisco.com
blogs.cisco.com
NSS Labs Report on Cyber Resilience Highlights the Need for a New Approach to Security
assetservicingtimes.com
assetservicingtimes.com
State Street gets a positive 'A+' | Asset Servicing news | assetservicingtimes.com
www.iol.co.za
www.iol.co.za
Anonymous hackers plead guilty - IOL SciTech | IOL.co.za
www.infoworld.com
www.infoworld.com
Heartbleed to blame for Community Health Systems breach | Security - InfoWorld
www.technologyreview.com
www.technologyreview.com
Touching a Laptop Can Break Its Encryption | MIT Technology Review
www.tripwire.com
www.tripwire.com
How To Ruin Your Day But Save Your Year - The State of Security
www.bloomberg.com
www.bloomberg.com
Data for 4.5 Million Patients Stolen From Hospital Group - Bloomberg
packetstormsecurity.com
packetstormsecurity.com
HP Security Bulletin HPSBMU03101 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
HP Security Bulletin HPSBUX03091 SSRT101667 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
HP Security Bulletin HPSBUX03092 SSRT101668 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
HP Security Bulletin HPSBUX03095 SSRT101674 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Deutsche Telekom CERT Advisory DTC-A-20140820-001 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
ManageEngine Desktop Central / Password Manager Pro / IT360 SQL Injection ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
ArticleFR 3.0.4 SQL Injection ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
WordPress All In One SEO Pack 2.2.2 Cross Site Scripting ≈ Packet Storm
newsroom.cisco.com
newsroom.cisco.com
FOCUS: Connected Travel | The Network
mspmentor.net
mspmentor.net
Profit Without CapEx: Disaster Recovery as a Service (DRaaS) | Managed Services content from MSPmentor
www.csoonline.com
www.csoonline.com
Spam industry reinvented as messages containing malicious links surge | CSO Online
www.csoonline.com
www.csoonline.com
'Reveton' ransomware upgraded with powerful password stealer | CSO Online
www.scmagazine.com
www.scmagazine.com
Bug in iOS Instagram app fixed, impacts Facebook accounts - SC Magazine
www.scmagazine.com
www.scmagazine.com
Professor hacks University Health Conway in demonstration for class - SC Magazine
packetstormsecurity.com
packetstormsecurity.com
Red Hat Security Advisory 2014-1083-01 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Debian Security Advisory 3007-1 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Red Hat Security Advisory 2014-1082-01 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Ubuntu Security Notice USN-2319-1 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Red Hat Security Advisory 2014-1078-01 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
HP Security Bulletin HPSBMU03094 ≈ Packet Storm
www.marketwatch.com
www.marketwatch.com
Citrix Cites Strong Customer Demand For Comprehensive Enterprise Mobility Management - MarketWatch
www.wlwt.com
www.wlwt.com
Macy's pays $650k to settle racial discrimination probe | Local News - WLWT Home
www.virtual-strategy.com
www.virtual-strategy.com
Citrix Sees Growing Demand for Industry-Tailored File Sharing Solutions | Virtual-Strategy Magazine
arstechnica.com
arstechnica.com
To solve Android’s update woes, Google should look to the PC | Ars Technica
www.thelawyer.com
www.thelawyer.com
Cyber security: SMEs more vulnerable than ever to cyber crime | Briefings | The Lawyer
www.zdnet.com
www.zdnet.com
Yale profs propose openness, crypto for disciplined surveillance | ZDNet
techcrunch.com
techcrunch.com
Cloud Storage Is Eating The World Alive | TechCrunch
packetstormsecurity.com
packetstormsecurity.com
Lazy Sysadmins Rooted In Looming Mozilla Cert Wipeout ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Microsoft Warns Of Fake Virus Alert Hitting Windows Users ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Cryptolocker Flogged On YouTube ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
US Hospital Hack 'Exploited Heartbleed Flaw' ≈ Packet Storm
www.wearecentralpa.com
www.wearecentralpa.com
Area Patients Victims of Cyber Attack - WeAreCentralPA.com - your one stop community web portal for all your Central Pennsylvania News, Sports and Weather, powered by WTAJ Your News Leader
www.zdnet.com
www.zdnet.com
iPhone 6: A delicate compromise | ZDNet
www.sltrib.com
www.sltrib.com
Data breach impact: Target earnings off 62 percent | The Salt Lake Tribune
www.bloomberg.com
www.bloomberg.com
Heartbleed Flaw Said Used by Chinese in Hospital Hacking - Bloomberg
www.net-security.org
www.net-security.org
CHS hackers exploited the Heartbleed bug
www.pentesteracademy.com
www.pentesteracademy.com
Learn Pentesting Online
www.net-security.org
www.net-security.org
Analysis reveals many malicious Chrome extensions
www.securitytube.net
www.securitytube.net
Black Hat Usa 2014 - Cellular Exploitation On A Global Scale: The Rise And Fall Of The Control Protocol
Host.net
Host.net
Host.net | Home
qz.com
qz.com
Target’s customers haven’t forgiven it for that data breach – Quartz
www.networkworld.com
www.networkworld.com
Nuclear Regulatory Commission hacked 3 times in 3 years | Network World
www.csmonitor.com
www.csmonitor.com
Target (TGT) slashes annual profit forecast. Blame Canada. - CSMonitor.com
www.technologyreview.com
www.technologyreview.com
The Next Battleground In The War Against Quantum Hacking | MIT Technology Review
www.virtual-strategy.com
www.virtual-strategy.com
Citrix Cites Strong Customer Demand For Comprehensive Enterprise Mobility Management | Virtual-Strategy Magazine
www.usnews.com
www.usnews.com
Target cuts annual profit outlook - US News
www.cio.com
www.cio.com
Workers Going Rogue With BYOD (and BYOA) | CIO
mspmentor.net
mspmentor.net
Is BYOD Nothing But Hot Air? | Managed Services content from MSPmentor
www.todayonline.com
www.todayonline.com
M’sia, Interpol probe hacking of MH370 data | TODAYonline
www.usatoday.com
www.usatoday.com
New device will help monitor Parkinson's patients
nakedsecurity.sophos.com
nakedsecurity.sophos.com
5 excuses for doing nothing about computer security! | Naked Security
www.forbes.com
www.forbes.com
Michael J. Fox Smart Watches Are Right On Time For Parkinson's Breakthrough - Forbes
www.christianpost.com
www.christianpost.com
US Companies Can't Protect Citizens? Chinese Hackers Steal 4.5 Million Patients Info, Including Social Security Numbers
www.wired.com
www.wired.com
Researchers Easily Slipped Weapons Past TSA’s X-Ray Body Scanners | Threat Level | WIRED
www.heraldonline.com
www.heraldonline.com
DUBLIN: Research and Markets: Business Continuity and Scenario Planning: 2-day In-person Seminar, Johannesburg, South Africa - 4th-5th December 2014 | Business Wire | Rock Hill Herald Online
www.itweb.co.za
www.itweb.co.za
Leadership - a business continuity risk | ITWeb
www.youtube.com
www.youtube.com
St. Kate’s & Juniper Build a Unified Wired & Wireless Network Solution - YouTube
en.itar-tass.com
en.itar-tass.com
ITAR-TASS: Non-political - Scientists find traces of sea plankton on ISS surface
www.f-secure.com
www.f-secure.com
Data vs. Metadata - F-Secure Weblog : News from the Lab (RSS)
www.virtual-strategy.com
www.virtual-strategy.com
Archive Systems Recognized in Gartner Hype Cycle for Human Capital Management | Virtual-Strategy Magazine
arstechnica.com
arstechnica.com
Meet John Tye: the kinder, gentler and by-the-book whistleblower | Ars Technica
www.broadwayworld.com
www.broadwayworld.com
UPDATE - Latisys Announces PCI Compliance and HIPAA Risk Assessment for Cloud-Enabled Systems Infrastructure - BWWGeeksWorld
www.broadwayworld.com
www.broadwayworld.com
vArmour Raises $36 Million to Protect the Data Defined Perimeter - BWWGeeksWorld
www.healthcaredive.com
www.healthcaredive.com
California BYOD ruling could impose new costs on hospitals | Healthcare Dive
online.wsj.com
online.wsj.com
Target Lowers Earnings Outlook, Still Reeling From Data Breach - WSJ
www.northjersey.com
www.northjersey.com
Macy's to pay $650,000 in shopper-profiling probe - Business - NorthJersey.com
www.forbes.com
www.forbes.com
Target Cuts Full-Year Forecast As Effects From Data Breach Linger - Forbes
www.v3.co.uk
www.v3.co.uk
Parallels adds support for Yosemite in Desktop 10 for Mac - IT News from V3.co.uk
www.dailyfinance.com
www.dailyfinance.com
Target Cuts Annual Profit Outlook in Wake of Data Breach - DailyFinance
www.pehub.com
www.pehub.com
PE HUB » vArmour grabs $36 mln
gigaom.com
gigaom.com
Security startup vArmour targets the hybrid cloud with a $21M funding round — Tech News and Analysis
articles.dailypress.com
articles.dailypress.com
Poquoson to test drive "Bring Your Own Device" program - Daily Press
www.securityfocus.com
www.securityfocus.com
Review Board CVE-2014-5027 Unspecified Cross Site Scripting Vulnerability (RSS)
www.securityfocus.com
www.securityfocus.com
Cacti Multiple Cross Site Scripting Vulnerabilities (RSS)
www.forbes.com
www.forbes.com
Data Breach Bulletin: Chinese Hackers Allegedly Steal 4.5 Million Patient Records - Forbes
www.cioinsight.com
www.cioinsight.com
What to do When a Data Breach Occurs
www.montrealgazette.com
www.montrealgazette.com
Target cuts annual profit outlook as the discounter continues to reel from breach
www.theobserver.ca
www.theobserver.ca
Patient data accessed via Heartbleed bug: expert | Sarnia Observer
pointofsale.com
pointofsale.com
Centralized Point of Sale Management – Five Reasons Why Now is the Time for Transformation | Point of Sale News | POS News, Information and Resources
newyork.cbslocal.com
newyork.cbslocal.com
Macy’s To Pay $650,000 To Settle Racial Profiling Allegations « CBS New York
www.macworld.com
www.macworld.com
Five ways to keep your student's digital life safe | Macworld
www.news-sentinel.com
www.news-sentinel.com
Letters going out beginning Wednesday to Lutheran Health patients affected by hackers' data theft - News-Sentinel.com
www.cnbc.com
www.cnbc.com
Macy's to pay $650,000 in shopper-profiling probe
www.sddt.com
www.sddt.com
San Diego Source > News > Corporate boards must focus on data security
www.consumeraffairs.com
www.consumeraffairs.com
A "Top Safety Pick+" rating for Subaru
www.net-security.org
www.net-security.org
Crooks trying out new tactics to spread fake AV
seclists.org
seclists.org
Bugtraq: SQL Injection Vulnerability in ArticleFR
seclists.org
seclists.org
Bugtraq: CVE-2014-4973 - Privilege Escalation in ESET Windows Products
seclists.org
seclists.org
Information Security News: Attend Cyber Security EXPO - October 8-9, 2014
seclists.org
seclists.org
Information Security News: Heartbleed to blame for Community Health Systems breach
www.infoworld.com
www.infoworld.com
Many Chrome browser extensions do sneaky things | Security - InfoWorld
www.businesswire.com
www.businesswire.com
Research and Markets: Business Continuity and Scenario Planning: 2-day In-person Seminar, Johannesburg, South Africa - 4th-5th December 2014 | Business Wire
www.wctv.tv
www.wctv.tv
Hackers Steal Info of 4.5 Million Hospital Patients
blogs.wsj.com
blogs.wsj.com
The Morning Download: Community Health Systems Breach Stirs Up Heartbleed Fears - The CIO Report - WSJ
www.telegraph.co.uk
www.telegraph.co.uk
'Chinese' hackers target MH370 investigators - Telegraph
wenham.wickedlocal.com
wenham.wickedlocal.com
Beacon Hill Roll Call - News - Wicked Local Wenham - Wenham, MA
www.reuters.com
www.reuters.com
Solomons town first in Pacific to relocate due to climate change| Reuters
www.marketwired.com
www.marketwired.com
Sophos in Leader's Quadrant in 2014 Unified Threat Management Magic Quadrant for 3rd Consecutive Year
www.theregister.co.uk
www.theregister.co.uk
Heartbleed implicated in US hospital megahack • The Register
www.securityfocus.com
www.securityfocus.com
WordPress WP Content Source Control Plugin 'download.php' Directory Traversal Vulnerability (RSS)
www.securityfocus.com
www.securityfocus.com
OpenStack Neutron CVE-2014-3555 Denial of Service Vulnerability (RSS)
www.securityfocus.com
www.securityfocus.com
Microsoft Windows Installer Service CVE-2014-1814 Local Privilege Escalation Vulnerability (RSS)
www.itinflections.com
www.itinflections.com
Phishing Frenzy: How to Protect Your Company - ITInflections
online.wsj.com
online.wsj.com
Citrix Cites Strong Customer Demand For Comprehensive Enterprise Mobility Management - WSJ.com
www.techtimes.com
www.techtimes.com
HTC One M8 now comes in Windows Phone form. Will you buy it? : PERSONAL TECH : Tech Times
www.datacenterdynamics.com
www.datacenterdynamics.com
GuardiCore raises US$11m to protect against cyber attacks | Datacenter Dynamics
seclists.org
seclists.org
Bugtraq: [SECURITY] [DSA 3007-1] cacti security update
www.youtube.com
www.youtube.com
Barracuda Networks Web Security Flex - Filter Bypass & Persistent Web Vulnerabilities - YouTube
blog.faroo.com
blog.faroo.com
1000x Faster Spelling Correction algorithm | FAROO Blog
www.securitytube.net
www.securitytube.net
Black Hat Usa 2014 - Saving Cyberspace By Jason Healey
www.reuters.com
www.reuters.com
'Anonymous' hackers plead guilty to minor charge in U.S. for cyberattacks| Reuters
www.virtual-strategy.com
www.virtual-strategy.com
Dell Recognized as a Leader in Gartner 2014 Magic Quadrant for Unified Threat Management (UTM) | Virtual-Strategy Magazine
insurancenewsnet.com
insurancenewsnet.com
Ocean Energy Management Bureau Seeks Comments on Proposed Rulemaking for Risk Management, Financial Assurance, and Loss Prevention Regulations
www.aviationtoday.com
www.aviationtoday.com
Avionics Magazine :: Wind River Virtualizes RTOS
www.sharonherald.com
www.sharonherald.com
Sharon Regional responds to Community Health's cyber theft - The Herald: News
www.islandpacket.com
www.islandpacket.com
ALBANY, N.Y.: Macy's to pay $650,000 in shopper-profiling probe | Business | The Island Packet
www.net-security.org
www.net-security.org
Machete cyber espionage campaign targeting Latin America
www.net-security.org
www.net-security.org
Using the iStorage datAshur Personal secure USB flash drive Review
www.net-security.org
www.net-security.org
Nullcon 2015
seclists.org
seclists.org
Bugtraq: ICETC2014 - IEEE Extended Submission until Aug. 28, 2014
seclists.org
seclists.org
Bugtraq: Deutsche Telekom CERT Advisory [DTC-A-20140820-001] check_mk vulnerabilities
www.novinite.com
www.novinite.com
Novinite.com - Sofia News Agency
www.securityfocus.com
www.securityfocus.com
Microsoft Windows Kernel 'Win32k.sys' CVE-2014-0318 Local Privilege Escalation Vulnerability (RSS)
www.securityfocus.com
www.securityfocus.com
HybridAuth 'install.php' Remote Code Execution Vulnerability (RSS)
www.securityfocus.com
www.securityfocus.com
FFmpeg 'libavcodec/proresenc_kostya.c' Buffer Overflow Vulnerability (RSS)
www.securityfocus.com
www.securityfocus.com
FFmpeg 'libavcodec/iff.c' Memory Corruption Vulnerability (RSS)
www.trustedsec.com
www.trustedsec.com
CHS Hacked by Heartbleed (Exclusive to TrustedSec)
www.streetwisetech.com
www.streetwisetech.com
Avast Antivirus: The Perfect Solution to PC Problems
www.bnd.com
www.bnd.com
Lawsuit: Hackers may have stolen credit card info from Shop 'n Save customers | Top Stories | News Democrat
www.streetwisetech.com
www.streetwisetech.com
Total Defense Anti-Virus: Guaranteed Protection from an Outstanding Software
appadvice.com
appadvice.com
Apple releases OS X Yosemite Developer Preview 6 -- AppAdvice
gigaom.com
gigaom.com
RISC creator is pushing open source chips for cloud computing and the internet of things — Tech News and Analysis
betanews.com
betanews.com
Microsoft detects fall in fake antivirus traffic
www.nydailynews.com
www.nydailynews.com
Macy's agrees to pay $650G to settle state probe into racial profiling at its Herald Square store - NY Daily News
www.cso.com.au
www.cso.com.au
Customers welcome C-suite advocate, CipherCloud chief trust officer reports - CSO | The Resource for Data Security Executives
www.information-age.com
www.information-age.com
The top 10 ways why BYOD initiatives fail | Information Age
seclists.org
seclists.org
Bugtraq: [security bulletin] HPSBUX03091 SSRT101667 rev.1 - HP-UX running Java7, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities
seclists.org
seclists.org
Bugtraq: [security bulletin] HPSBUX03092 SSRT101668 rev.1 - HP-UX running Java6, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities
www.v3.co.uk
www.v3.co.uk
Hackers break into Nuclear Regulatory Commission computers - IT News from V3.co.uk
betanews.com
betanews.com
Clean up after over 30 antivirus tools with Antivirus Remover
www.scmagazine.com
www.scmagazine.com
2014 Women in IT Security: Samara Moore - SC Magazine
www.infoworld.com
www.infoworld.com
How to solve Java's security problem | Application security - InfoWorld
seclists.org
seclists.org
Bugtraq: [security bulletin] HPSBMU03094 rev.1 - HP Connect-IT, running OpenSSL, Remote Disclosure of Information or Unauthorized Access
seclists.org
seclists.org
Bugtraq: [security bulletin] HPSBMU03101 rev.1 - HP Asset Manager, CloudSystem Chargeback, running OpenSSL, Remote Disclosure of Information or Unauthorized Access
www.virtual-strategy.com
www.virtual-strategy.com
IBHS’ Business Continuity Planning Resources Included in Leading Disaster Planning Guides for Communities and Small Businesses | Virtual-Strategy Magazine
www.wndu.com
www.wndu.com
Kosciusko Co. hospital patient information hacked
www.circleofblue.org
www.circleofblue.org
California Lawmakers Move to Protect the State’s Collapsing Groundwater Supply | Circle of Blue WaterNews
www.heraldtribune.com
www.heraldtribune.com
Hackers steal info of 4.5M hospital patients | HeraldTribune.com
www.forbes.com
www.forbes.com
Smarter Chips Will Mobilize Compassion - Forbes
argyllfreepress.com
argyllfreepress.com
Hacked – Data breach in Jewel-Osco stores reveals customer data Argyll Free Press
www.scmagazineuk.com
www.scmagazineuk.com
All your vulnerabilities belong to us: The rise of the exploit - SC Magazine UK
www.theregister.co.uk
www.theregister.co.uk
Brother, can you spare a DIME for holy grail of secure webmail? • The Register
blog.qt.digia.com
blog.qt.digia.com
Adding LGPL v3 to Qt | Qt Blog
www.schneier.com
www.schneier.com
Schneier on Security: US Air Force is Focusing on Cyber Deception (RSS)
www.mobilewebuser.com
www.mobilewebuser.com
Webroot Secure Anywhere versus Trend Micro Titanium+6 Internet Security: Which Performs Best?
www.williamsondailynews.com
www.williamsondailynews.com
WMH not hit by security breach4.5 million people affected by computer hack - Williamson Daily News - williamsondailynews.com
www.streetwisetech.com
www.streetwisetech.com
Total Defense Antivirus: The Best Things Offered By An Antivirus Software
www.net-security.org
www.net-security.org
Mobile device security: Tackling the risks
www.anandtech.com
www.anandtech.com
AnandTech | NAS Units as VM Hosts: QNAP's Virtualization Station Explored
www.reuters.com
www.reuters.com
U.S. hospital breach biggest yet to exploit Heartbleed bug-expert| Reuters
www.eturbonews.com
www.eturbonews.com
Who is hacking Malaysia Airlines on MH370? - eTurboNews.com
www.net-security.org
www.net-security.org
Infographic: How secure is Bitcoin?
imgur.com
imgur.com
1 KB Hard Drive in Vanilla Minecraft - Imgur
www.securitytube.net
www.securitytube.net
Bsides Las Vegas 2014 - Clusterf*Ck - Actionable Intelligence From Machine Learning
www.cio-today.com
www.cio-today.com
Community Health Systems Hacked, 4.5 Million Patients Affected - CIO Issues on CIO Today
www.wsaz.com
www.wsaz.com
Some in Our Region Affected by Healthcare Data Breach
www.news.com.au
www.news.com.au
Missing Malaysia Airlines plane MH370: Alleged hacking of officials’ computers linked to the search |News.com.au
www.cio-today.com
www.cio-today.com
Community Health Systems Hacked, 4.5 Million Patients Affected - Data Security on CIO Today
www.toptechnews.com
www.toptechnews.com
Chinese Hackers Nab Info on Millions of U.S. Patients - CIO Issues on Top Tech News
www.wusa9.com
www.wusa9.com
Shoppers Food customers may be affected by data breach
procyonic.org
procyonic.org
Clocks
www.news-journalonline.com
www.news-journalonline.com
Hackers steal info of 4.5M hospital patients | News-JournalOnline.com
www.kpvi.com
www.kpvi.com
Albertsons Warns Customers of Data Breach - KPVI News 6 - Pocatello, ID
arstechnica.com
arstechnica.com
Parallels upgrade brings more Windows-on-Mac integration for $80 | Ars Technica
www.govtech.com
www.govtech.com
Dissecting Microsoft's Redefined Core
www.zawya.com
www.zawya.com
QFF launches "Elem Sendai" - Qatar's latest contribution to 3/11 disaster recovery in Japan - Zawya
www.bbc.co.uk
www.bbc.co.uk
BBC News - Community Health Systems data hack hits 4.5 million
venturebeat.com
venturebeat.com
Community Health Systems' data breach will likely be the first of many in health care | VentureBeat | Health | by Mark Sullivan
www.slideshare.net
www.slideshare.net
Backup Exec Blueprints▶ Deduplication
www.thestar.com.my
www.thestar.com.my
Hacker targets info on MH370 probe - Nation | The Star Online
www.iclarified.com
www.iclarified.com
iClarified - Apple News - Parallels Announces Parallels Desktop 10 for Mac With Support for Yosemite [Video]
www.streetwisetech.com
www.streetwisetech.com
Vipre Antivirus: Results on Its Configuration Matters
appadvice.com
appadvice.com
Parallels Desktop 10 for Mac features OS X Yosemite integration and more -- AppAdvice
news.msn.com
news.msn.com
Macy's to pay $650,000 in shopper-profiling probe
www.cso.com.au
www.cso.com.au
The week in security: Old malware continues onslaught as new devices found vulnerable - CSO | The Resource for Data Security Executives
www.themalaymailonline.com
www.themalaymailonline.com
MH370 probe hacked and sent to China; Malaysia-Interpol investigating | Malaysia | The Malay Mail Online
www.telegraph.co.uk
www.telegraph.co.uk
UK funds development of 'world wide web for machines' - Telegraph
www.theregister.co.uk
www.theregister.co.uk
Malware married to software in undetectable attack • The Register
wordperhect.net
wordperhect.net
Word Perhect
tucson.com
tucson.com
Tucson patient data breached in massive cyber attack
virtualizationreview.com
virtualizationreview.com
Windows 9 in 2015? -- Virtualization Review
www.sfchronicle.com
www.sfchronicle.com
Macy's to pay $650,000 in shopper-profiling probe - San Francisco Chronicle
www.neowin.net
www.neowin.net
Baidu Antivirus 5.0.2.82122 Beta - Neowin
www.streetwisetech.com
www.streetwisetech.com
Microsoft Security Essentials: What Can it Offer to Its Users?
www.net-security.org
www.net-security.org
51% of consumers share passwords
ascii.textfiles.com
ascii.textfiles.com
Screenshots Forever and Ever Until You Can’t Stand it « ASCII by Jason Scott
gadgets.ndtv.com
gadgets.ndtv.com
'Anonymous' Hackers Plead Guilty to Minor Charge in US for Cyber-Attacks | NDTV Gadgets
www.applianceretailer.com.au
www.applianceretailer.com.au
Parallels 10 allows Mac users to reach "new levels of productivity" by running Windows » Appliance Retailer
www.scmp.com
www.scmp.com
Chinese hackers targeted MH370 investigation a day after jet went missing: report | South China Morning Post
townhall.com
townhall.com
Hackers are after more than just personal info - Rachel Marsden - Page 1
www.kxly.com
www.kxly.com
Hospital hack puts 4.5M patients at risk | Spokane/E. WA - KXLY.com
au.ibtimes.com
au.ibtimes.com
MH370: ‘Boeing 777 Found’ E-mail Exposes Classified Information To Hackers - International Business Times
www.cio-today.com
www.cio-today.com
Microsoft Plans Final Windows 8.1 Tweak - Mobile Tech on CIO Today
www.securitytube.net
www.securitytube.net
Bsides Las Vegas 2014 - Know Thy Operator
www.stuff.co.nz
www.stuff.co.nz
Key stands by Collins - dominion-post | Stuff.co.nz
www.toptechnews.com
www.toptechnews.com
Nine Norton Security Products Are Becoming One - Enterprise Software on Top Tech News
www.cpapracticeadvisor.com
www.cpapracticeadvisor.com
Russian Accused of Hacking Small Businesses Set for Trial in Seattle
www.informationweek.com
www.informationweek.com
Cybersecurity Demands New Framework - InformationWeek
www.gazettenet.com
www.gazettenet.com
Target extends hours for night owls | GazetteNet.com
www.bbc.com
www.bbc.com
BBC News - Hacking cars and traffic lights at Def Con
www.bellinghamherald.com
www.bellinghamherald.com
ALBANY, N.Y.: Macy's to pay $650,000 in shopper-profiling probe | National Business News | The Bellingham Herald
weblog.rubyonrails.org
weblog.rubyonrails.org
Riding Rails: Rails 4.2.0 beta1: Active Job, Deliver Later, Adequate Record, Web Console
www.sfgate.com
www.sfgate.com
Macy's to pay $650,000 in shopper-profiling probe - SFGate
siliconangle.com
siliconangle.com
VMworld 2014 Preview: The highlights in video | SiliconANGLE
www.datamation.com
www.datamation.com
Leveraging Cloud-Based Analytics to Make IT Smarter - Datamation
www.al.com
www.al.com
Foley hospital affected by hacking of personal data of 4.5 million patients linked to Community Health Systems | AL.com
www.straitstimes.com
www.straitstimes.com
Hackers target information on MH370 probe: Report
www.theregister.co.uk
www.theregister.co.uk
Lazy sys admins rooted in looming Mozilla cert wipeout • The Register
portlandtribune.com
portlandtribune.com
Wyden: 'Big league' economy needs long-term transportation funding
whnt.com
whnt.com
DeKalb Regional Medical Center also victim of data breach | WHNT.com
www.zdnet.com
www.zdnet.com
OS X Yosemite inspires Parallels to upgrade Desktop | ZDNet
www.networkworld.com
www.networkworld.com
Start-up offers up endpoint detection and response for behavior-based malware detection | Network World
www.businesswire.com
www.businesswire.com
Parallels Announces Parallels Desktop® 10 for Mac with OS X Yosemite Integration, Enables to Launch Office Applications Up to 50 Percent Faster and Delivers Up to 30 Percent Better Battery Life | Business Wire
www.infosecisland.com
www.infosecisland.com
Hackers Exploited Heartbleed Bug to Steal Patient Data from Community Health Systems
www.streetwisetech.com
www.streetwisetech.com
TrustPort Antivirus: The Perfect Software For Windows 8 OS
www.spokesman.com
www.spokesman.com
Hackers steal patient info from parent company of Rockwood Clinic, Deaconess and Valley hospitals - Spokesman.com - Aug. 18, 2014
www.moberlymonitor.com
www.moberlymonitor.com
Cyber hack endangers patients data - News - Moberly Monitor-Index - Moberly, MO - Moberly, MO
tech.firstpost.com
tech.firstpost.com
Cyber security and policing meet in Kochi - Tech2
www.abc17news.com
www.abc17news.com
Moberly Medical Center affected by HIPPA data breach | Local News - Home
www.streetwisetech.com
www.streetwisetech.com
Trend Micro Titanium Antivirus Software vs Avira Antivirus Premium vs Webroot Secure Anywhere: The Battle between the Best Software
www.bizjournals.com
www.bizjournals.com
An easy way to test your disaster recovery plan - The Business Journals
www.streetwisetech.com
www.streetwisetech.com
ZoneAlarm Antivirus: Best Protection Offered by an Intrusive Software
www.streetwisetech.com
www.streetwisetech.com
Microsoft Security Essentials: Security Assurance from a Perfect Software
hackmageddon.com
hackmageddon.com
1-15 August 2014 Cyber Attacks Timeline | Hackmageddon.com
www.japantimes.co.jp
www.japantimes.co.jp
Tokyo combats flood threats with second mammoth reservoir | The Japan Times
news.drweb.com
news.drweb.com
Linux Trojan ported to Windows — Dr.Web - innovation anti-virus security technologies. Comprehensive protection from Internet threats.
news.drweb.com
news.drweb.com
Details on the threat Trojan.DnsAmp.1 — Dr.Web - innovation anti-virus security technologies. Comprehensive protection from Internet threats.
www.securitytube.net
www.securitytube.net
Bsides Las Vegas 2014 - Improving Security By Avoiding Traffic And Still Get What You Want In Data Transfers
www.csoonline.com
www.csoonline.com
5 cool new security research breakthroughs | CSO Online
www.csoonline.com
www.csoonline.com
Healthcare organizations still too lax on security | CSO Online
motherboard.vice.com
motherboard.vice.com
All of Your Tumblr Photos Will Now Be Scanned for Branded Content | Motherboard
smallbusiness.foxbusiness.com
smallbusiness.foxbusiness.com
Bring Your Own Network: Is Your Business Data Secure? | Fox Small Business Center
gazette.com
gazette.com
MONEY & THE LAW: Colorado law protects consumers hit by data breaches
www.theepochtimes.com
www.theepochtimes.com
Chinese Hackers Steal 4.5M U.S. Hospital Patient Records (Video)
www.wfmynews2.com
www.wfmynews2.com
How Hackers Take Control Inside Your Home
www.securitytracker.com
www.securitytracker.com
EMC Documentum WebTop Products Input Validation Flaws in 'startat' and 'entryId' Parameters Permit Cross-Site Scripting Attacks - SecurityTracker (RSS)
www.securitytracker.com
www.securitytracker.com
EMC Documentum Web Development Kit Permits Cross-Site Request Forgery Attacks - SecurityTracker (RSS)
www.allgov.com
www.allgov.com
California and the Nation - Data Breach Alert at 180 Albertsons Stores in Southern California - Ca - News
gplgpu.com
gplgpu.com
GPLGPU now available | ASICSolutions GPLGPU
www.securitytracker.com
www.securitytracker.com
RSA Archer eGRC Flaws Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Conduct Cross-Site Request Forgery Attacks - SecurityTracker (RSS)
www.csoonline.com
www.csoonline.com
Workers at U.S. nuclear regulator fooled by phishers | CSO Online
www.symantec.com
www.symantec.com
Better Website Security and Google Search Rankings for SMB’s with Always On SSL. | Symantec Connect
cloudtweaks.com
cloudtweaks.com
Pinup: Qubole - The Growth Of Big Data as a Service - CloudTweaks.com
www.aviationtoday.com
www.aviationtoday.com
Aviation Today :: Wind River Virtualizes RTOS
www.japantimes.co.jp
www.japantimes.co.jp
U.S. government's nuclear watchdog victim of cyberattacks: report | The Japan Times
www.theregister.co.uk
www.theregister.co.uk
Cryptolocker flogged on YouTube • The Register
www.csoonline.com
www.csoonline.com
Heartbleed to blame for Community Health Systems breach | CSO Online
www-cs-students.stanford.edu
www-cs-students.stanford.edu
Amit’s Game Programming Information
www.securitytracker.com
www.securitytracker.com
EMC Documentum Content Server Bug Lets Remote Authenticated Users Inject DQL Commands, Execute Arbitrary Code, and Obtain Potentially Sensitive Information - SecurityTracker (RSS)
packetstormsecurity.com
packetstormsecurity.com
RSA Archer GRC Platform 5.5 SP1 Privilege Escalation / CSRF / Access Bypass ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Apache OFBiz 11.04.04 / 12.04.03 Cross Site Scripting ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
HybridAuth install.php PHP Code Execution ≈ Packet Storm
www.ktxs.com
www.ktxs.com
Identity theft protection tips in light of hospital data breach | News - Home
au.ibtimes.com
au.ibtimes.com
Kim Dotcom Denies Hacking Blogger Emails, Accuses Slater of Acting in Behalf of NZ National Party - International Business Times
www.thenewscenter.tv
www.thenewscenter.tv
Hospital Data Breach
www.bloomberg.com
www.bloomberg.com
Why Chinese Hackers Stole Information From Hospital Patients: Video - Bloomberg
www.washingtonpost.com
www.washingtonpost.com
I’m a cop. If you don’t want to get hurt, don’t challenge me. - The Washington Post
www.securitytracker.com
www.securitytracker.com
EMC Documentum D2 Methods Lets Remote Authenticated Users Gain Elevated Privileges - SecurityTracker (RSS)
packetstormsecurity.com
packetstormsecurity.com
EMC Documentum Cross Site Request Forgery ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
EMC Documentum Cross Site Scripting ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Melkor ELF Fuzzer 1.0 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Red Hat Security Advisory 2014-1075-01 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Red Hat Security Advisory 2014-1076-01 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
EMC Documentum D2 Privilege Escalation ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
EMC Documentum Code Execution / DQL Injection ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Bulletproof FTP Client 2010 Buffer Overflow ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
BlazeDVD Pro 7.0 Buffer Overflow ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Maligno 1.2 ≈ Packet Storm
blogs.technet.com
blogs.technet.com
FireEye and Fox-IT tool can help recover Crilock-encrypted files - Microsoft Malware Protection Center - Site Home - TechNet Blogs
time.com
time.com
Hacking Traffic Lights is Apparently Really Easy - TIME
paleofuture.gizmodo.com
paleofuture.gizmodo.com
How an 80s Book for Kids Predicted Today's Spy Satellites and Cyberwars
www.nextgov.com
www.nextgov.com
Exclusive: Nuke Regulator Hacked by Suspected Foreign Powers - Nextgov.com
www.breitbart.com
www.breitbart.com
Large U.S. Hospital Group Claims 4.5 Million Patients' Personal Data Stolen in Chinese Cyber Attack
www.washingtonpost.com
www.washingtonpost.com
Health care data breaches have hit 30M patients and counting - The Washington Post
www.wlos.com
www.wlos.com
Hospital Patient Data Breach - WLOS - Asheville Top Stories - ABC
www.huffingtonpost.co.uk
www.huffingtonpost.co.uk
Hackers Successfully Crack US Nuclear Regulator For The First Time... Twice
www.securitytracker.com
www.securitytracker.com
OFBiz Input Validation Flaw Permits Cross-Site Scripting Attacks - SecurityTracker (RSS)
www.pharostribune.com
www.pharostribune.com
Homepage » Pharos-Tribune
techcrunch.com
techcrunch.com
YC Demo Day Session 4: Product Hunt, Aptible, One Codex, Traction, Shout, And Others! | TechCrunch
www.securitytube.net
www.securitytube.net
Energetic Bear / Crouching Yeti / Dragonfly - Threat Replication Case Study
www.news-sentinel.com
www.news-sentinel.com
'Some' Lutheran Health Network patients' info stolen in Community Health Systems hacking attack - News-Sentinel.com
www.zetta.net
www.zetta.net
#1 Enterprise Cloud Backup & DR Solution. Server Data Offsite & Online
www.defenseone.com
www.defenseone.com
Foreign Government Agents Suspected of Hacking U.S. Nuclear Regulator - Defense One
www.pahomepage.com
www.pahomepage.com
Hacking Of HealthCare System Has People Asking How Can They Protect Themselves - PAHomepage.com
www.breitbart.com
www.breitbart.com
Chinese Hackers Steal Patient Records From Health System
wkzo.com
wkzo.com
U.S. government's nuclear watchdog victim of cyber attacks: report - News - AM 590 - WKZO Everything Kalamazoo
www.cnet.com
www.cnet.com
Nuclear regulator hacked 3 times in 3 years - CNE
finance.yahoo.com
finance.yahoo.com
Chinese Hackers Stole 4.5 Million Patients’ Data From Hospital Giant - Yahoo Finance
blog.trendmicro.com
blog.trendmicro.com
7 Places to Check for Signs of a Targeted Attack in Your Network | Security Intelligence Blog | Trend Micro
flipboard.com
flipboard.com
Cybersecurity: How safe are you? - Flipboard
www.crn.com
www.crn.com
Black Hat 2014: 10 Cool Hacking Tools To Check Out - Page: 1 | CRN
www.toptechnews.com
www.toptechnews.com
Supervalu Becomes Latest To Suffer Data Breach - Digital Life on Top Tech News
www.businessweek.com
www.businessweek.com
Chinese Hackers Stole 4.5 Million Patients’ Data From Hospital Giant - Businessweek
www.modernhealthcare.com
www.modernhealthcare.com
CHS breach shows skilled hacker will find HIT system flaws, exploit them | Vital Signs | The healthcare business blog from Modern Healthcare
whnt.com
whnt.com
UAH students get scholarships to pursue cyber security | WHNT.com
www.slate.com
www.slate.com
Symantec will start selling Norton Security instead of anti-virus products.
whnt.com
whnt.com
WHNT.com
www.wired.com
www.wired.com
Apple’s iMessage Is Being Taken Over by Spammers | Enterprise | WIRED
www.eweek.com
www.eweek.com
Chinese Hackers Breach 4.5 Million Health Care Records
www.bizjournals.com
www.bizjournals.com
Hackers breach databases at six NM hospitals - Albuquerque Business First
www.cnet.com
www.cnet.com
Symantec to slim Norton line to single security suite - CNE
www.infosecisland.com
www.infosecisland.com
‘BadUSB’ Malware Leaves Terrible Taste at Black Hat 2014
chronicle.augusta.com
chronicle.augusta.com
Hackers steal info from Trinity | The Augusta Chronicle
www.gurufocus.com
www.gurufocus.com
Securing Your Portfolio With Network Security Company - GuruFocus.com
www.cio-today.com
www.cio-today.com
Nine Norton Security Products Are Becoming One - Data Security on CIO Today
risnews.edgl.com
risnews.edgl.com
Hackers Don't Cease: SuperValu Examines Data Breach | Retail News | RIS News: Business/Technology Insights for Retail, Supermarket Executives
www.usatoday.com
www.usatoday.com
2015 Subaru Legacy, Outback earn Top Safety Pick Plus
www.good4utah.com
www.good4utah.com
Hospital network hacked - Good4Utah.com
www.pharostribune.com
www.pharostribune.com
Data breach affects Dukes Memorial Hospital » Local News » Pharos-Tribune
www.chroniclelive.co.uk
www.chroniclelive.co.uk
Bakery giant Greggs targeted by hackers in mock slogan online - Chronicle Live
www.mysuncoast.com
www.mysuncoast.com
Suncoast hospital responds to data breach reports - Sarasota News | Mysuncoast.com and ABC 7: Local News
www.trust.org
www.trust.org
Rail safety must be priority after Lac-Mégantic disaster: mayor
www.trendmicro.com
www.trendmicro.com
Security Conferences - Security Events - Trend Micro USA - Trend Micro USA
www.scmagazine.com
www.scmagazine.com
Russian hacker Seleznev ordered to remain in custody - SC Magazine
www.vox.com
www.vox.com
40 maps that explain the Roman Empire - Vox
trib.com
trib.com
Evanston hospital hit by national data breach
www.cnet.com
www.cnet.com
Hack of hospital chain leads to theft of up to 4.5M users' data - CNE
www.streetwisetech.com
www.streetwisetech.com
Avast Antivirus: Protection Guaranteed from a Free Software
www.streetwisetech.com
www.streetwisetech.com
BullGuard Anti-virus: Get the Latest Features
www.3news.co.nz
www.3news.co.nz
Hack Attack exposes media moguls behaving badly - Story - Paul Henry Show - TV Shows - 3 News
seekingalpha.com
seekingalpha.com
Cisco: Buying Opportunity In A Good Yielding Stock - Cisco Systems, Inc. (NASDAQ:CSCO) | Seeking Alpha
www.paysonroundup.com
www.paysonroundup.com
Hospital hacked | Payson Roundup - Payson, AZ
thehackernews.com
thehackernews.com
Cryptography Expert Says, 'PGP Encryption is Fundamentally Broken, Time for PGP to Die'
www.kbtx.com
www.kbtx.com
Tips for Cyber Security in This Digital World
www.eweek.com
www.eweek.com
Google Strengthens Chrome Browser to Prevent Malware Downloads
www.securityfocus.com
www.securityfocus.com
Cisco ASR 5000 Series Software CVE-2014-3331 Denial of Service Vulnerability (RSS)
forums.juniper.net
forums.juniper.net
To Err is Human but our Networks Work to Higher St... - J-Net Community
www.foliomag.com
www.foliomag.com
When Big Data Isn’t Quite Big Enough - Linda Ruth - Blogs Audience Development @ FolioMag.com
www.techtimes.com
www.techtimes.com
Why did Chinese hackers cyber attack U.S. health records? : T-Lounge : Tech Times
registerguard.com
registerguard.com
Hospitals report breach | News | The Register-Guard | Eugene, Oregon
www.scmagazine.com
www.scmagazine.com
Proofpoint announces plans to hire 94 IT professionals in Northern Ireland - SC Magazine
www.securitytube.net
www.securitytube.net
Bsides Las Vegas 2014 - The Semantic Age - Or - A Young Ontologist's Primer
www.scmagazineuk.com
www.scmagazineuk.com
50% of corporate passwords crackable within a few minutes - SC Magazine UK
www.investmentnews.com
www.investmentnews.com
How to use the cloud securely (because it's not going away)
recode.net
recode.net
Google’s 10 Zaniest Projects in the 10 Years Since the IPO | Re/code
twitter.com
twitter.com
Twitter / JuniperNetworks : Servin' up your weekly ...
www.digitaltrends.com
www.digitaltrends.com
Hackers nab 4.5 million US hospital records | Digital Trends
bringmethenews.com
bringmethenews.com
Data expert: ‘Millions’ could have had info compromised by Supervalu breach - Rick Kupchella's – BringMeTheNews.com
thealternativepress.com
thealternativepress.com
Phoenixville, Pottstown Hospitals Among Those With Security Breach - Lower Providence PA News - The Alternative Press
www.cio-today.com
www.cio-today.com
Chinese Hackers Nab Info on Millions of U.S. Patients - Cybercrime on CIO Today
www.newelectronics.co.uk
www.newelectronics.co.uk
20 years of the Hype Cycle
www.itbusinessedge.com
www.itbusinessedge.com
Gartner Hype Cycle Predicts on Data Science, Predictive Analytics, Connected Home
seekingalpha.com
seekingalpha.com
Target Corporation Has Bitten Off More Than It Could Chew - Target Corporation (NYSE:TGT) | Seeking Alpha
www.technologyreview.com
www.technologyreview.com
Traffic Light Study Reveals Serious Hacking Risk | MIT Technology Review
techcrunch.com
techcrunch.com
YC Demo Day Session 1: Gingko Bioworks, Bikanta, Checkr, WalkSource, ClearTax, And More! | TechCrunch
www.makeuseof.com
www.makeuseof.com
8 In 10 Desktop Computers Runs Windows And So Should You
www.newswire.ca
www.newswire.ca
Subaru Canada Inc. | Subaru Canada: 2015 Legacy and Outback Achieve 2014 IIHS TOP SAFETY PICK+
blouinnews.com
blouinnews.com
Hackers hit hospital chain, 4.5M records stolen | Blouin News
www.eweek.com
www.eweek.com
Itus Networks Taps Kickstarter for Home Gateway Security
arstechnica.com
arstechnica.com
Hackers steal records on 4.5 million patients from healthcare system | Ars Technica
www.thedailyaztec.com
www.thedailyaztec.com
The Daily Aztec : Life, liberty and the pursuit of privacy
www.tripwire.com
www.tripwire.com
Foreign State Actors Hack US Nuke Regulator Through Phishing Attacks - The State of Security
www.youtube.com
www.youtube.com
Locked Down by Symantec Endpoint Protection - YouTube
www.securityfocus.com
www.securityfocus.com
MIT kerberos 5 'ldap_principal2.c' Buffer Overflow Vulnerability (RSS)
www.infosecurity-magazine.com
www.infosecurity-magazine.com
Security Researchers: Supervalu PoS Breach 'Completely Avoidable' - Infosecurity Magazine
www.theautochannel.com
www.theautochannel.com
2015 Subaru Legacy And Outback Vehicles Earn 2014 IIHS TOP SAFETY PICK+ Awards
explorernews.com
explorernews.com
Local hospitals affected in Massive Data Breach - The Explorer: News
www.13wmaz.com
www.13wmaz.com
Health network reports 4.5M patients' information hacked
www.infoworld.com
www.infoworld.com
Why would Chinese hackers want hospital patient data? | Security - InfoWorld
www.latinpost.com
www.latinpost.com
Chromebook vs. HP Stream Price & Specs Comparison 2014: Microsoft Adds Afforadable Laptop to Compete : Tech : Latin Post
www.pennlive.com
www.pennlive.com
Data theft misses Carlisle, Lancaster patients, but hits York Memorial patients | PennLive.com
blogs.cars.com
blogs.cars.com
2015 Subaru Legacy, Outback Earn IIHS' Top Safety Pick Plus Status - KickingTires
thinkprogress.org
thinkprogress.org
Chinese Hackers Collected 4.5 Million American Patients' Private Health Data | ThinkProgress
seclists.org
seclists.org
Bugtraq: ESA-2014-071: RSA Archer® GRC Platform Multiple Vulnerab ilities
twitter.com
twitter.com
Twitter / msftsecurity : Have you heard? We're giving ...
www.convergedigest.com
www.convergedigest.com
Nike Picks Juniper for Next Gen Data Center ~ Converge! Network Digest
www.microsoft.com
www.microsoft.com
Steve Ballmer steps down as board member at Microsoft
www.dailymail.co.uk
www.dailymail.co.uk
American hospital patients' data stolen in cyber attack by Chinese | Mail Online
seekingalpha.com
seekingalpha.com
Cyber Security Industry Helping Verint Grow - Verint Systems Inc. (NASDAQ:VRNT) | Seeking Alpha
windowsitpro.com
windowsitpro.com
Patch Tuesday Tripped Up by Rapid Release Era | Windows content from Windows IT Pro
blog.celingest.com
blog.celingest.com
Taking Golden Manager to the next level | Celingest Blog – Feel the Cloud
blog.celingest.com
blog.celingest.com
An introduction to AWS VPC Peering | Celingest Blog – Feel the Cloud
blog.celingest.com
blog.celingest.com
Benchmark: Boot Time Comparison in OpsWorks | Celingest Blog – Feel the Cloud
www.retailcustomerexperience.com
www.retailcustomerexperience.com
Kaspersky study finds consumers nonchalant about data security | Retail Customer Experience
www.net-security.org
www.net-security.org
Successful strategies to avoid frequent password changes
www.scmagazine.com
www.scmagazine.com
Privacy rights group files complaint over Adobe, AOL Safe Harbor compliance - SC Magazine
www.fiercecio.com
www.fiercecio.com
5 lessons for managing and recruiting in the new federal IT landscape - FierceCIO
www.businessbecause.com
www.businessbecause.com
Cyber And Data Security Unlocks New MBA Career Paths | BusinessBecause
www.bizjournals.com
www.bizjournals.com
A cyber-security expert offers tips for keeping your info from being hacked - Bizwomen
www.csoonline.com
www.csoonline.com
Facebook says most outbound email is encrypted now | CSO Online
sqlmag.com
sqlmag.com
Application High Availability and Disaster Recovery for SQL Server, Part 1 | Database High Availability content from SQL Server Pro
blog.trendmicro.com
blog.trendmicro.com
Wearing Your Tech on Your Sleeve | Security Intelligence Blog | Trend Micro
www.scmagazine.com
www.scmagazine.com
Nuclear Regulatory Commission's computers hacked three times in three years - SC Magazine
www.infosecisland.com
www.infosecisland.com
More Dot-Gov Sites Found Compromised
chairnerd.seatgeek.com
chairnerd.seatgeek.com
High Performance Map Interactions using HTML5 Canvas - ChairNerd
go.sourcefire.com
go.sourcefire.com
Cisco Seminar Series 2014 North America Roadshow
www.securitytube.net
www.securitytube.net
Bsides Las Vegas 2014 - I Am The Cavalry
www.scmagazine.com
www.scmagazine.com
Symantec rolls Norton solutions into single suite - SC Magazine
www.cmswire.com
www.cmswire.com
Gartner Names 7 'Hype Cycle' Technologies
www.sci-tech-today.com
www.sci-tech-today.com
Community Health Systems Hacked, 4.5 Million Patients Affected | Sci-Tech Today
www.forbes.com
www.forbes.com
Why Apple's Mac Product Segment Still Has Room For Growth - Forbes
nakedsecurity.sophos.com
nakedsecurity.sophos.com
US won’t release Russian MP’s son being held on PoS hacking charges | Naked Security
whotv.com
whotv.com
Hospital Network Hacked, 4.5 Million Records Stolen | whotv.com
blog.inetsix.net
blog.inetsix.net
Juniper Firefly - Setup Cluster with virtual SRX
www.kaspersky.co.in
www.kaspersky.co.in
Kaspersky Internet Security 2015 | PC Protection | Kaspersky Lab IN
www.informationweek.com
www.informationweek.com
Why 'Goldilocks Zone' Of Data Center Security Makes Sense - InformationWeek
www.scmagazine.com
www.scmagazine.com
Another breach involving Onsite Health Diagnostics, Kansas City hospital impacted - SC Magazine
www.huffingtonpost.com
www.huffingtonpost.com
Nick Davies, Phone Hacking Reporter: 'I Have No Respect For Piers Morgan'
www.zacks.com
www.zacks.com
Will Target Corp. (TGT) Miss Q2 Earnings On Higher Costs? - August 19, 2014 - Zacks.com
www.bidnessetc.com
www.bidnessetc.com
Target Corporation (NYSE:TGT) News Analysis: Target’s Second-Quarter Earnings: Data Breach Still Driving Away Customers
www.tomsguide.com
www.tomsguide.com
Norton Cuts Antivirus Product Line from Nine to One
www.autoevolution.com
www.autoevolution.com
2015 Subaru Legacy, Outback Earn Top Safety Pick+ Rating from IIHS [Video] - autoevolution
indianexpress.com
indianexpress.com
Have you seen the HP Stream 14? It seems Microsoft wants a $200 Chromebook killer | The Indian Express
www.csoonline.com
www.csoonline.com
Tech pros in healthcare, retail and finance admit they are failing on data compliance | CSO Online
cloudtweaks.com
cloudtweaks.com
Cloud Infographic: The Power Of Cloud Disaster Recovery - CloudTweaks.com
www.scmagazine.com
www.scmagazine.com
New website calls out sites, apps, lacking security - SC Magazine
engineering.columbia.edu
engineering.columbia.edu
In Sync: Columbia Engineering Team First to Run iOS Apps on Android Platform | The Fu Foundation School of Engineering & Applied Science - Columbia University
www.zdnet.com
www.zdnet.com
California court mandates BYOD reimbursement | ZDNet
www.kokomotribune.com
www.kokomotribune.com
Data breach affects Dukes Memorial Hospital » Local News » Kokomo Tribune; Kokomo, Indiana
9to5mac.com
9to5mac.com
Confirmed: Security breach is not reason for Gatekeeper app signing changes | 9to5Mac
www.bankinfosecurity.com
www.bankinfosecurity.com
Supervalu: Linked to Other Breaches? - BankInfoSecurity
roianalyst.alinean.com
roianalyst.alinean.com
None
www.information-age.com
www.information-age.com
The three biggest barriers between business heads and the IT department | Information Age
www.kxly.com
www.kxly.com
Working 4 you: There's been another data breach, now what? | Spokane/E. WA - KXLY.com
www.alternativesjournal.ca
www.alternativesjournal.ca
Redirecting Anti-Wind Energy | A\J – Canada's Environmental Voice
www.macobserver.com
www.macobserver.com
Developer Portal Breach May have Forced Apple's Gatekeeper Changes - The Mac Observer
wrtnode.com
wrtnode.com
WRTnode Opened for $25
blogs.cisco.com
blogs.cisco.com
Cisco 2014 Midyear Security Report: Security Services and Risk Management
securitywatch.pcmag.com
securitywatch.pcmag.com
Microsoft Goes From Cellar to Stellar in New Antivirus Test
www.thespectrum.com
www.thespectrum.com
Hackers breach Mesquite clinic data
newsok.com
newsok.com
Data on 4.5 million hospital patients, including some in Oklahoma, stolen in cyberattack | News OK
online.wsj.com
online.wsj.com
PGi and Thinking Phone Networks Join Forces to Bring Cloud Collaboration to Enterprises - WSJ.com
kstp.com
kstp.com
4.5 Million Patients Victimized in National Hospital Data Breach | KSTP TV - Minneapolis and St. Paul
www.statetechmagazine.com
www.statetechmagazine.com
5 Ways to Reduce Mobile Device Loss | StateTech Magazine
www.lexology.com
www.lexology.com
State AGs in the news - Lexology
www.news965.com
www.news965.com
Massive data breach compromises Central Florida resident’s... | www.news965.com
packetstormsecurity.com
packetstormsecurity.com
Community Health Hospital Claims China Hacked Them ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Think Crypto Hides You From Spooks On Facebook? Think Again ≈ Packet Storm
blogs.hbr.org
blogs.hbr.org
Help Employees Think on Their Feet - Natalie Lehr - Harvard Business Review
www.hlntv.com
www.hlntv.com
4.5 million affected in hospital data breach | HLNtv.com