NetSecu

aws.amazon.com
aws.amazon.com
Route 53 Update - Domain Name Registration, Geo Routing, and a Price Reduction
www.securitytube.net
www.securitytube.net
Owasp Global Webinar - Initiatives Owasp Projects
www.tripwire.com
www.tripwire.com
Another Potential Retail Mega Breach At Sandwich Chain Jimmy Johns - The State of Security
finance.yahoo.com
finance.yahoo.com
Is Your Bank Account Safe From the Latest Phishing Scam? - Yahoo Finance
motherboard.vice.com
motherboard.vice.com
The Internet of Things Can't Keep Your Data Safe | Motherboard
www.cmswire.com
www.cmswire.com
CrossIdeas Acqusition Underlines IBM's Security Drive
metronews.ca
metronews.ca
Cyberattack breached personal data: watchdog | Metro
www.latimes.com
www.latimes.com
Target names an outsider as new CEO - LA Times
redmondmag.com
redmondmag.com
Survey Suggests IT Pros Slow To React on Windows XP Migrations -- Redmondmag.com
insurancenewsnet.com
insurancenewsnet.com
Seccuris Partners with iScan Online to Deliver Data Breach Prevention Solutions - Top News - InsuranceNewsNet.com
techday.com
techday.com
Techday – Over 4 million gamers participated in Destiny beta
www.jdsupra.com
www.jdsupra.com
New Mandatory Exclusions in Standard CGL Policies Limit Coverage for Data Breaches | Proskauer - Insurance Recovery & Counseling - JDSupra
www.lightreading.com
www.lightreading.com
Cloudwatt Builds Snoop-Proof Cloud | Light Reading
www.slate.com
www.slate.com
Hackers can modify USB firmware to spread malware.
www.chron.com
www.chron.com
Ex-NASA 'hackers' use ingenuity, technology to rescue first-ever moon photos - Houston Chronicle
www.usnews.com
www.usnews.com
CIA Director Apologizes to Senate Leaders - US News
www.theregister.co.uk
www.theregister.co.uk
Microsoft must let US feds into its overseas servers, says US court • The Register
www.securityfocus.com
www.securityfocus.com
Microsoft Office CVE-2013-5057 ASLR Security Bypass Vulnerability (RSS)
blog.trendmicro.com
blog.trendmicro.com
22 Jump Street, Transformers Are Top Movie Lures for Summer | Security Intelligence Blog | Trend Micro
www.telegraph.co.uk
www.telegraph.co.uk
CIA admits spying on US senate committee - Telegraph
www.scpr.org
www.scpr.org
CIA Hacking: Agency apologizes for spying on Senate staff | 89.3 KPCC
www.marketwatch.com
www.marketwatch.com
CIA director apologizes for spying on Senate staffers - The Wall Street Journal - MarketWatch
indianapublicmedia.org
indianapublicmedia.org
Former Senator Evan Bayh Will Chair CIA Accountability Board | News - Indiana Public Media
www.nbcnews.com
www.nbcnews.com
CIA Director Brennan Apologizes to Senate Leaders for Computer 'Hack' - NBC News
business.newsfactor.com
business.newsfactor.com
IBM Beefs Up Identity Intelligence Security Solutions | NewsFactor Business
www.rawstory.com
www.rawstory.com
China slams Canada for ‘irresponsible’ hacking accusations
www.ksat.com
www.ksat.com
POL-cia-spying-senate-apologize-1
www.cio-today.com
www.cio-today.com
IBM Beefs Up Identity Intelligence Security Solutions - Data Security on CIO Today
tools.cisco.com
tools.cisco.com
Alert Details - Security Center - Cisco Systems (RSS)
www.theregister.co.uk
www.theregister.co.uk
Grabby baddie scours Paddy Power's towers: 650k punters leaked and it took 4 years to admit it • The Register
www.schneier.com
www.schneier.com
Schneier on Security: The Fundamental Insecurity of USB (RSS)
twitter.com
twitter.com
Twitter / CiscoSecurity : Only a few days left until ...
www.insidecounsel.com
www.insidecounsel.com
The BYOD horse is out of the barn: Implementing the right mobile policy for your organization
www.kashmirdispatch.com
www.kashmirdispatch.com
Companies behind Israel's Iron Dome missile shield hacked by China - Latest Kashmir News & Analysis - - Kashmir Dispatch
www.cmswire.com
www.cmswire.com
Why AirWatch by VMWare Stands Out from the EFSS Crowd
talkincloud.com
talkincloud.com
IBM Acquires CrossIdeas to Expand Security Offerings | Cloud Computing Mergers and Acquisitions content from Talkin' Cloud
www.bbc.co.uk
www.bbc.co.uk
BBC News - Alasdair McDonnell to be investigated over 'serious data breach'
www.lfpress.com
www.lfpress.com
China slams Canada for hacking accusations | The London Free Press
ww2.cfo.com
ww2.cfo.com
Telecommuting Not Good Buffer From Hackers
www.wvec.com
www.wvec.com
Riverside Health offers credit monitoring after data breach | WVEC.com Norfolk - Hampton Roads
www.cnet.com
www.cnet.com
Ford invites hackers to use Los Angeles city data - CNE
www.virtual-strategy.com
www.virtual-strategy.com
LiquidFrameworks Announces the Launch of a New Blog | Virtual-Strategy Magazine
www.macobserver.com
www.macobserver.com
Basic Tips for Using the Dock and Trash in OS X - The Mac Observer
www.securityfocus.com
www.securityfocus.com
Schneider Electric OPC Factory Server Local Stack Buffer Overflow Vulnerability (RSS)
www.scpr.org
www.scpr.org
CIA director apologizes to Senate leaders over searches; Feinstein responds | 89.3 KPCC
recode.net
recode.net
Hackers Can Tap USB Devices, Researcher Warns | Re/code
www.philly.com
www.philly.com
Target taps outsider as CEO for needed shakeup
www.newsfactor.com
www.newsfactor.com
New 'Backoff' Malware Slips Undetected into Retail Systems | NewsFactor Network
www.timminspress.com
www.timminspress.com
Hackers can tap USB devices: Researcher | Timmins Press
www.informationweek.com
www.informationweek.com
Microsoft's Device Strategy: 3 Unanswered Questions - InformationWeek
www.thescore.ie
www.thescore.ie
Had a Paddy Power account in 2010? You need to read this · The Score
wonkette.com
wonkette.com
CIA, On Careful Reflection, Remembers It Hacked Senate Computers After All | Wonkette
www.broadwayworld.com
www.broadwayworld.com
bigtincan Recognized in Seven of Analyst Firm's Hype Cycle Reports - BWWGeeksWorld
www.pcmag.com
www.pcmag.com
MetaGeek inSSIDer Wi-Fi Helper Review & Rating | PCMag.com
globalnews.ca
globalnews.ca
Cyberattack breached system holding personal data: privacy watchdog - National | Globalnews.ca
www.zdnet.com
www.zdnet.com
BadUSB: Big, bad USB security problems ahead | ZDNet
www.extremetech.com
www.extremetech.com
Massive, undetectable security flaw found in USB: It’s time to get your PS/2 keyboard out of the cupboard | ExtremeTech
www.csoonline.com
www.csoonline.com
CISOs still struggle for respect from peers | CSO Online
krebsonsecurity.com
krebsonsecurity.com
Sandwich Chain Jimmy John’s Investigating Breach Claims — Krebs on Security
www.net-security.org
www.net-security.org
BitTorrent's decentralized chat app keeps content, metadata safe
www.newsfactor.com
www.newsfactor.com
IBM Beefs Up Identity Intelligence Security Solutions | NewsFactor Network
www.crn.com
www.crn.com
IBM Acquires CrossIdeas For Identity Analytics, Access Governance - Page: 1 | CRN
www.independent.ie
www.independent.ie
Massive data breach at Paddy Power bookmakers - Independent.ie
www.cloudwedge.com
www.cloudwedge.com
IBM Buys CrossIdeas for Cloud Security Auditing | CloudWedge
www.thestar.com
www.thestar.com
Cyberattack on federal government breached system holding personal data, privacy watchdog says | Toronto Star
www.ctvnews.ca
www.ctvnews.ca
Chinese cyberattack infiltrated system holding personal data | CTV News
www.reuters.com
www.reuters.com
CIA concedes it spied on Senate investigators, apologizes| Reuters
www.siliconrepublic.com
www.siliconrepublic.com
Data breach impacts nearly 650,000 Paddy Power customers - Enterprise - | siliconrepublic.com - Ireland's Technology News Service
host.madison.com
host.madison.com
Irish bookmaker apologizes for 2010 data breach : Madisondotcom
www.cpapracticeadvisor.com
www.cpapracticeadvisor.com
Why Office 365 Is Good for Your Practice | CPA Practice Advisor
qctimes.com
qctimes.com
Idea Lab discusses cyber security for small businesses : Business
www.your4state.com
www.your4state.com
Cyber Security Grant Awarded to HCC - Your4State.com
www.securityfocus.com
www.securityfocus.com
AT&T Connect Participant Application '.SVT' File Processing Buffer Overflow Vulnerability (RSS)
www.securityfocus.com
www.securityfocus.com
Oxwall '/admin/settings/user' Multiple Arbitrary PHP Code Execution Vulnerabilities (RSS)
www.thedailybeast.com
www.thedailybeast.com
CIA: We Improperly Accessed Senate Files - The Daily Beast
thecable.foreignpolicy.com
thecable.foreignpolicy.com
CIA to Senate: Whoops, We Actually Did Break Into Your Computers
www.grandhaventribune.com
www.grandhaventribune.com
10 things to know today | Grand Haven Tribune
www.clickondetroit.com
www.clickondetroit.com
CIA interrogation report could be released next week | Politics - Home
www.mintpressnews.com
www.mintpressnews.com
Pushing Release Of CIA Torture Report, Senators Threaten Use Of Special Rule
www.thenewsreports.com
www.thenewsreports.com
India to spend over $1billion in security market
www.bbc.co.uk
www.bbc.co.uk
BBC News - Leaked memo on CIA says 'No American proud' of abuse
timesofindia.indiatimes.com
timesofindia.indiatimes.com
US State Department: 'No American is proud' of CIA tactics - The Times of India
commonhealth.wbur.org
commonhealth.wbur.org
Lessons From Boston Children’s: When Hackers Attack Your Hospital | CommonHealth
www.politico.com
www.politico.com
Senate’s CIA report could come out in August - Burgess Everett - POLITICO.com
boingboing.net
boingboing.net
White House 'accidentally emailed' torture report talking points to AP reporter - Boing Boing
www.salon.com
www.salon.com
Feinstein was right: CIA admits it hacked Senate computers - Salon.com
live.huffingtonpost.com
live.huffingtonpost.com
HuffPost Live
www.smh.com.au
www.smh.com.au
White House accidentally emails torture report memo to reporter
www.mcclatchydc.com
www.mcclatchydc.com
WASHINGTON: CIA improperly accessed Senate computers, agency finds | National Security & Defense | McClatchy DC
rcpmag.com
rcpmag.com
Survey Underscores Windows XP's Staying Power -- Redmond Channel Partner
www.sfgate.com
www.sfgate.com
10 Things to Know for Thursday - SFGate
www.reuters.com
www.reuters.com
UPDATE 4-Target names outsider as CEO after data breach| Reuters
boingboing.net
boingboing.net
The CIA lied: agency admits it hacked Senate computers to snoop on torture investigations - Boing Boing
www.tripwire.com
www.tripwire.com
Massive Breach at Paddy Power Bookmakers Affects Nearly 650,000 Customers - The State of Security
forums.juniper.net
forums.juniper.net
My Friend Drives me Mad, but all in the Cause of B... - J-Net Community
www.infosecisland.com
www.infosecisland.com
Windows Meets Industrial Control Systems (ICS) Through HAVEX.RAT – It Spells Security Risks
www.newyorker.com
www.newyorker.com
Last Call - The New Yorker
www.securitytube.net
www.securitytube.net
25c3 - All Your Bases Are Belong To Us
www.wired.com
www.wired.com
Why the Security of USB Is Fundamentally Broken | Threat Level | WIRED
www.globalpost.com
www.globalpost.com
US warns retailers on data-stealing malware | GlobalPost
www.cnbc.com
www.cnbc.com
US government warns retailers about malicious software
talkincloud.com
talkincloud.com
Which Antivirus Software Works Best? Here's What Experts Have to Say | Cloud Computing Security content from Talkin' Cloud
www.itnewsonline.com
www.itnewsonline.com
IT News Online > - Panda Security Tops Trinity of Tests
www.huffingtonpost.com
www.huffingtonpost.com
CIA Director John Brennan Apologizes For Hacking Of Senate Computers
allafrica.com
allafrica.com
allAfrica.com: Nigeria: Hackers May Target Nigeria's Payment Cards Over Security Loopholes
twitter.com
twitter.com
Twitter / Lora_Phillips : .@FCousteau discusses his ...
www.infosecurity-magazine.com
www.infosecurity-magazine.com
Infosecurity - 1 in 10 Android Apps Are Virus-Infected
support.kaspersky.com
support.kaspersky.com
How to add and renew license for Kaspersky PURE 3.0
twitter.com
twitter.com
Twitter / TrendMicro : The Original Computer ...
www.infosecisland.com
www.infosecisland.com
Is it Cheaper to Keep it? Reevaluating Your IAM Solutions
www.theglobeandmail.com
www.theglobeandmail.com
Canada’s ‘baseless’ hacking claims a blow to relations, Beijing says - The Globe and Mail
www.sourcewire.com
www.sourcewire.com
Truth, not Trust – Big Data Governance, Integrity and Security Solved
lethbridgeherald.com
lethbridgeherald.com
Cyberattack breached system holding personal data: privacy watchdog › The Lethbridge Herald – myLH.ca
www.theblaze.com
www.theblaze.com
CIA Apologizes for Hacking Senate Computers | TheBlaze.com
nakedsecurity.sophos.com
nakedsecurity.sophos.com
Android “FakeID” security hole causes a pre-BlackHat stir | Naked Security
www.heraldscotland.com
www.heraldscotland.com
George Galloway's former parliamentary secretary spared jail over data breach | Herald Scotland
www.washingtontimes.com
www.washingtontimes.com
CIA admits improperly hacking Senate computers in search of Bush-era information - Washington Times
www.thebitbag.com
www.thebitbag.com
Best Android Antivirus Apps To Protect Your Precious Smartphone and Tablet
www.mediaite.com
www.mediaite.com
CIA Admits to Hacking into Senate Computers | Mediaite
www.usnews.com
www.usnews.com
Irish bookmaker apologizes for 2010 data breach - US News
www.torontosun.com
www.torontosun.com
China slams Canada for 'irresponsible' hacking accusations | News | Tech | Toron
www.telegraph.co.uk
www.telegraph.co.uk
Paddy Power: hackers stole details of 600,000 users - Telegraph
twitter.com
twitter.com
Twitter / Lora_Phillips : First @Symantec Green Talk ...
twitter.com
twitter.com
Twitter / JuniperNetworks : A thing of beauty! Snapshot ...
www.net-security.org
www.net-security.org
Malicious USB device firmware the next big infection vector?
www.symantec.com
www.symantec.com
Russian ransomware author takes the easy route | Symantec Connect
www.itworld.com
www.itworld.com
Hacker group targets video game companies to steal source code | ITworld
www.mirror.co.uk
www.mirror.co.uk
Jealous copper spied on George Galloway's assistant claiming it was part of 'anti terror investigation' - Mirror Online
www.marketwatch.com
www.marketwatch.com
Bit9 + Carbon Black and Stroz Friedberg Form Partnership for Incident Response - MarketWatch
in.reuters.com
in.reuters.com
Fitch Affirms Whitbread at 'BBB'; Outlook Stable| Reuters
www.motorauthority.com
www.motorauthority.com
Subaru BRZ, Scion FR-S Earn IIHS Top Safety Pick Rating
www.bbc.com
www.bbc.com
BBC News - Israeli Iron Dome firms 'infiltrated by Chinese hackers'
www.worldtribune.com
www.worldtribune.com
'Pre-9/11 moment': Officials say Al Qaida planning massive cyber attack on U.S. - World Tribune | World Tribune
www.techtimes.com
www.techtimes.com
OS X Yosemite public beta a huge hit with Mac users : PERSONAL TECH : Tech Times
blogs.technet.com
blogs.technet.com
General Availability for Enhanced Mitigation Experience Toolkit (EMET) 5.0 - MSRC - Site Home - TechNet Blogs
www.youtube.com
www.youtube.com
Cybercrime Exposed: How to Spot a Phishing Scam - YouTube
www.theguardian.com
www.theguardian.com
Bug spotting: Germans hold 'nature walks' to observe rare NSA spy | World news | The Guardian
www.bbc.co.uk
www.bbc.co.uk
BBC News - George Galloway's ex-aide discharged over data breach
www.ashdowngroup.com
www.ashdowngroup.com
Gartner: Be cautious over data lakes | IT News | Ashdown Group
www.nationaljournal.com
www.nationaljournal.com
CIA Admits to Improperly Hacking Senate Computers - NationalJournal.com
www.fenderbender.com
www.fenderbender.com
Chevy Volt Earns Top Safety Pick in Recent Tests - FenderBender - July 2014 - United States
www.cnet.com
www.cnet.com
China rebuffs Canada for 'irresponsible' hacking claims - CNE
venturebeat.com
venturebeat.com
Why you can no longer trust any USB device plugged into your PC | VentureBeat | Business | by Simon Cohen
in.reuters.com
in.reuters.com
Hackers can tap USB devices in new attacks, researcher warns| Reuters
healthitsecurity.com
healthitsecurity.com
Internal data breach, identity fraud at Riverside Health | HealthITSecurity.com
reason.com
reason.com
CIA Admits Fault for Snooping on Senate Computers - Hit & Run : Reason.com
www.thestar.co.uk
www.thestar.co.uk
Data breach couple spared prison - The Star
www.youtube.com
www.youtube.com
The Sound of dial-up Internet - YouTube
abcnews.go.com
abcnews.go.com
Irish Bookmaker Apologizes for 2010 Data Breach - ABC News
www.networkworld.com
www.networkworld.com
BlackBerry buying German firm for voice encryption | Network World
packetstormsecurity.com
packetstormsecurity.com
80% Of IoT Devices Are Vulnerable To Data Theft ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Russia Wants SAP, Apple Source Code To Prove They Aren't Spies ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Tor Attack May Have Unmasked Dark Net Users ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
China Rebuffs Canada For 'Irresponsible' Hacking Claims ≈ Packet Storm
inhomelandsecurity.com
inhomelandsecurity.com
Feds admit cooperation remains an obstacle with corporations and cyber threats | In Homeland Security
scienceblog.com
scienceblog.com
High schoolers hacking for a good cause | ScienceBlog.com
www.sourcewire.com
www.sourcewire.com
Bit9 + Carbon Black Announces Bit9 Security Platform Version 7.2
www.csoonline.com
www.csoonline.com
Security Manager's Journal: A ransomware flop, thanks to security awareness | CSO Online
www.csoonline.com
www.csoonline.com
Hacker group targets video game companies to steal source code | CSO Online
www.csoonline.com
www.csoonline.com
No patch yet for zero day in Symantec Endpoint Protection software driver | CSO Online
www.csoonline.com
www.csoonline.com
In a hyper-social world, some seek a little privacy | CSO Online
blog.trendmicro.com
blog.trendmicro.com
Simply Security News, Views and Opinions from Trend Micro, IncOnline Banking Challenges: Cybercriminals are Leveling Up » Simply Security News, Views and Opinions from Trend Micro, Inc
gizmodo.com
gizmodo.com
USB Has a Fundamental Security Flaw That You Can't Detect
www.jpost.com
www.jpost.com
Chinese hackers allegedly stole Iron Dome designs | JPost | Israel News
www.prnewswire.com
www.prnewswire.com
AirWatch Awarded Multiple Patents for Watermarking Technology -- ATLANTA, July 31, 2014 /PRNewswire/ --
www.v3.co.uk
www.v3.co.uk
Microsoft updates OneNote app for iPhone, iPad and Mac users - IT News from V3.co.uk
www.fortmcmurraytoday.com
www.fortmcmurraytoday.com
Hackers can tap USB devices: Researcher | Fort McMurray Today
www.cmswire.com
www.cmswire.com
Mac News: OneNote Upgraded, But What About Office?
www.pnj.com
www.pnj.com
Data breach at UWF
inventorspot.com
inventorspot.com
Internet of Everything Is Hackable
www.wired.co.uk
www.wired.co.uk
Nasa validates 'impossible' space drive (Wired UK)
www.net-security.org
www.net-security.org
Security contest rewards builders of secure systems
www.theregister.co.uk
www.theregister.co.uk
Pentagon hacker McKinnon reinvents himself as SEO guru • The Register
www.securitytube.net
www.securitytube.net
25c3 - Evoting After Nedap And Digital Pen
www.heraldonline.com
www.heraldonline.com
News, sports and weather for Rock Hill, SC | The Herald & Heraldonline.com
www.wired.com
www.wired.com
Hackers Can Control Your Phone Using a Tool That’s Already Built Into It | Threat Level | WIRED
www.techinsider.net
www.techinsider.net
Microsoft Corporation (MSFT) Facing Trouble in China | Tech Insider
online.wsj.com
online.wsj.com
StrikeForce's ProtectID(R) Out-of-Band Authentication Technology Now Secures Microsoft Office 365 - WSJ.com
www.presstv.ir
www.presstv.ir
PressTV - China slams Canada hacking allegation
www.cio-today.com
www.cio-today.com
Will OS X Yosemite Bring More Grief for Apple? - Enterprise Software on CIO Today
www.thestreet.com
www.thestreet.com
5 Reasons Target’s New CEO Is Boring Chic - TheStreet
abcnews.go.com
abcnews.go.com
China Denies Hacking Canadian Tech Research Group - ABC News
www.trustedreviews.com
www.trustedreviews.com
Google Drive vs iCloud Drive vs Dropbox vs OneDrive - Opinion - Trusted Reviews
www.channelnews.com.au
www.channelnews.com.au
9 Things Microsoft Should Consider For Windows 9 Success - Channel News
jutiagroup.com
jutiagroup.com
Stock Update: Cisco Systems Inc (NASDAQ:CSCO) – Cisco Broadens Storage Networking Portfolio to Address Massive Data Growth Across Small to Cloud-Scale Storage Networks
www.kolotv.com
www.kolotv.com
Facebook Hacking Scam
www.politico.com
www.politico.com
Scoop: Gillibrand introducing cyber bill today – Microsoft case front and center today, but is it obsolete? - POLITICO Morning Cybersecurity - POLITICO.com
forum.kaspersky.com
forum.kaspersky.com
How to report undetected viruses or false positives to the viruslab - Kaspersky Lab Forum
about-threats.trendmicro.com
about-threats.trendmicro.com
Pitfalls of Public Cloud Storage
forums.juniper.net
forums.juniper.net
Readiness, Benefits and Barriers: An SDN Progress ... - J-Net Community
www.infoworld.com
www.infoworld.com
No patch yet for zero day in Symantec Endpoint Protection software driver | Security - InfoWorld
www.infoworld.com
www.infoworld.com
IBM buys access control and identity management firm CrossIdeas | Security - InfoWorld
idahobusinessreview.com
idahobusinessreview.com
The 5 most common cyber security mistakes | Idaho Business Review
healthitsecurity.com
healthitsecurity.com
Healthcare CIO talks network security, efficiency balance | HealthITSecurity.com
www.irishtimes.com
www.irishtimes.com
Paddy Power to contact 650,000 customers over data breach
www.breakingnews.ie
www.breakingnews.ie
120,000 Irish Paddy Power customers affected by massive data breach | BreakingNews.ie
www.wfaa.com
www.wfaa.com
Target names Pepsi's Cornell as chairman, CEO | wfaa.com Dallas - Fort Worth
www.marketwatch.com
www.marketwatch.com
AirWatch Awarded Multiple Patents for Watermarking Technology - MarketWatch
www.independent.co.uk
www.independent.co.uk
Hack Attack by Nick Davies, book review: A panoramic account of the hacking scandal - Reviews - Books - The Independent
www.forbes.com
www.forbes.com
VMware Secures Patent To Take Mobile Devices Back To The Dark Ages - Forbes
www.dailymail.co.uk
www.dailymail.co.uk
USB security flaw that lets hackers take over computers discovered | Mail Online
www.siliconindia.com
www.siliconindia.com
Most Powerful Antivirus Software of 2014
www.fmprc.gov.cn
www.fmprc.gov.cn
Foreign Ministry Spokesperson Qin Gang's Remarks on the Statement Released by the Canadian Side Saying that Chinese Hackers Attacked Canada's National Research Council
www.reuters.com
www.reuters.com
China slams Canada for 'irresponsible' hacking accusations| Reuters
www.usnews.com
www.usnews.com
Target names Pepsi's Cornell as chairman, CEO - US News
www.cheddarvalleygazette.co.uk
www.cheddarvalleygazette.co.uk
More organisations demand business partners meet international information security standards, says SGS | Cheddar Valley Gazette
arstechnica.com
arstechnica.com
Active attack on Tor network tried to decloak users for five months | Ars Technica
www.forbes.com
www.forbes.com
What Brian Cornell Must Do To Succeed At Target - Forbes
time.com
time.com
Target Announces New CEO To Lead Data Breach Recovery - TIME
www.aljazeera.com
www.aljazeera.com
Russia: RIP freedom of speech? - Opinion - Al Jazeera English
www.marketwatch.com
www.marketwatch.com
StrikeForce's ProtectID(R) Out-of-Band Authentication Technology NowSecures Microsoft Office 365 - MarketWatch
www.pcworld.com
www.pcworld.com
Hacker group targets video game companies to steal source code | PCWorld
www.independent.ie
www.independent.ie
Breaking: Massive data breach at Paddy Power bookmakers - Independent.ie
www.charlotteobserver.com
www.charlotteobserver.com
Target names Pepsi's Cornell as chairman, CEO | CharlotteObserver.com
timesofindia.indiatimes.com
timesofindia.indiatimes.com
Beware, USB devices offer hackers direct route to computers - The Times of India
seclists.org
seclists.org
Information Security News: Man Arrested After Security Breach At The Oklahoma County Jail
www.utm.edu
www.utm.edu
mdmss
www.infoworld.com
www.infoworld.com
Many antivirus products are riddled with security flaws | Security - InfoWorld
www.streetwisetech.com
www.streetwisetech.com
Anti virus face off: Avast vs AVG vs Microsoft Security Essentials - Who's got the best features?
www.reuters.com
www.reuters.com
Fitch Rates Thailand-based CP ALL's Secured Bonds 'A+(tha)'| Reuters
www.marketwatch.com
www.marketwatch.com
CloudPassage Taps Security Industry Veteran Amrit Williams as ChiefTechnology Officer - MarketWatch
www.startribune.com
www.startribune.com
Target names PepsiCo executive as its next CEO | Star Tribune
abcnews.go.com
abcnews.go.com
Target Names Pepsi's Cornell as Chairman, CEO - ABC News
economictimes.indiatimes.com
economictimes.indiatimes.com
Target to hire Pepsi executive Brian Cornell as CEO: Report - The Economic Times
www.streetwisetech.com
www.streetwisetech.com
Baidu Anti Virus - Always free and forever Free
online.wsj.com
online.wsj.com
NXT-ID's Next Generation Biometric Smart Wallet Featured on NewsWatch Consumer Show on the History Channel and FYI Network Today, July 31st - WSJ.com
www.bloomberg.com
www.bloomberg.com
Target Chooses Former Pepsi Executive Cornell as Next CEO - Bloomberg
www.thestar.com
www.thestar.com
Target hires Pepsi exec to help it recover from data breach, Canadian troubles | Toronto Star
news.nocamels.com
news.nocamels.com
Microsoft, Akamai Technologies and JVP Partner In Cyber Security Accelorator Program | NoCamels News Flash
www.schneier.com
www.schneier.com
Schneier on Security: Debit Card Override Hack (RSS)
phys.org
phys.org
You don't need a fast car to rob a bank any more, just malware
online.wsj.com
online.wsj.com
IBM Named a Leader in Gartner Magic Quadrant for Security Information and Event Management - WSJ.com
thefusejoplin.com
thefusejoplin.com
Top 5 Free Antivirus 2014 – The Ones That Protect You the Most - The Fuse Joplin
www.vulnerability-lab.com
www.vulnerability-lab.com
None
www.stockhouse.com
www.stockhouse.com
Press Releases - News - Stockhouse
www.securitytube.net
www.securitytube.net
25c3 - Analyzing Rfid Security
www.businesswire.com
www.businesswire.com
Capella University Announces New Online Master's Degree in Information Assurance and Security | Business Wire
motherboard.vice.com
motherboard.vice.com
Canada and China Are Still Waging a Cyber War | Motherboard
seekingalpha.com
seekingalpha.com
Akamai Technologies' (AKAM) CEO Thomson Leighton on Q2 2014 Results - Earnings Call Transcript | Seeking Alpha
allafrica.com
allafrica.com
allAfrica.com: Nigeria: End of Support for Windows 2003 Puts 25 Million Payment Cards At Risk
www.cso.com.au
www.cso.com.au
Next-gen firewalls protect crews in concert at Melbourne and Olympic Parks - CSO | The Resource for Data Security Executives
www.infosecurity-magazine.com
www.infosecurity-magazine.com
Infosecurity - Chinese Hackers Use APTs to Target Gaming Companies
www.huffingtonpost.co.uk
www.huffingtonpost.co.uk
IT On the Verge of a Mobile Meltdown: Why BYOD and Mobile Application Management are Driving Businesses Crazy | Vincent Smyth
www.pcworld.com
www.pcworld.com
Attackers use domino effect to compromise your accounts | PCWorld
seclists.org
seclists.org
Information Security News: Commentary: Cyber Deterrence Is Working
seclists.org
seclists.org
Information Security News: Zambia: First Cyber Security Lab Unveiled
seclists.org
seclists.org
Bugtraq: RE: [FD] Beginner's error: import function of Windows Mail executes rogue program C:\Program.exe with credentials of other account
seclists.org
seclists.org
Bugtraq: Re: [FD] Beginner's error: import function of Windows Mail executes rogue program C:\Program.exe with credentials of other account
www.securityfocus.com
www.securityfocus.com
SecurityFocus (RSS)
www.securityfocus.com
www.securityfocus.com
Elasticsearch CVE-2014-3120 Arbitrary Java Code Execution Vulnerability (RSS)
www.theregister.co.uk
www.theregister.co.uk
Securobods claim Middle East govts' fingerprints all over malware flung at journos • The Register
ca.reuters.com
ca.reuters.com
China slams Canada for 'irresponsible' hacking accusations| Canada| Reuters
www.theglobeandmail.com
www.theglobeandmail.com
July 31: Caught in the Net – and other letters to the editor - The Globe and Mail
mybroadband.co.za
mybroadband.co.za
Your PC can be hacked with a USB mouse
betanews.com
betanews.com
XP is still used in 53 percent of businesses
www.startribune.com
www.startribune.com
How to Inspect Your Own House, Part 2: Exterior Water Management | The Home Inspector | StarTribune.com
eandt.theiet.org
eandt.theiet.org
USB offers hackers direct route to computers - E & T Magazine
seclists.org
seclists.org
Bugtraq: [ MDVSA-2014:144 ] live
www.thestar.com
www.thestar.com
Ottawa warned about its vulnerability to hackers, lack of strategy | Toronto Star
www.independent.co.uk
www.independent.co.uk
Hack attack by Nick Davies; The news machine by James Hanning with Glenn Mulcaire - Reviews - Books - The Independent
techday.com
techday.com
Techday – Gartner: Beware of the Data Lake Fallacy…
en.itar-tass.com
en.itar-tass.com
ITAR-TASS: World - US court on Guam rejects motion to release Russia’s hacking suspect
www.pcr-online.biz
www.pcr-online.biz
Security roundup: USB drives, mice and keyboards can be hacked | The latest news from the Computer and IT Industry | PC Retail
www.infoworld.com
www.infoworld.com
Gartner gets the 'data lake' concept all wrong | Application Development - InfoWorld
www.design-engineering.com
www.design-engineering.com
NRC computers attacked by Chinese hackers, spy agency says - Design Engineering
www.triplepundit.com
www.triplepundit.com
What Does Corporate Responsibility Mean When It Comes To NSA Data Requests?
www.sourcewire.com
www.sourcewire.com
Bit9 + Carbon Black Announces Carbon Black Version 4.2
www.theregister.co.uk
www.theregister.co.uk
AVG stung as search revenue from freebie scanners dries up • The Register
www.securityfocus.com
www.securityfocus.com
ppc64-diag CVE-2014-4039 Multiple Insecure File Permissions Vulnerabilities (RSS)
www.symantec.com
www.symantec.com
Looking for the Right Data Backup Solution for the Virtual World? Ask Yourself These Three Questions | Symantec Connect
www.gamerheadlines.com
www.gamerheadlines.com
Microsoft Security Essentials fails to make top 5 AntiVirus list
www.marketwatch.com
www.marketwatch.com
Newscast: Hackers key on remote access software - Market Update - MarketWatch
www.theepochtimes.com
www.theepochtimes.com
Chinese Hacking Barely Mentioned in Ottawa - The Epoch Times
www.techweekeurope.co.uk
www.techweekeurope.co.uk
McAfee Warns About Dangers Posed By Advanced Evasive Techniques
security.itbusinessnet.com
security.itbusinessnet.com
Global Survey Reveals Impact of Data Breaches on Customer Loyalty
www.pcworld.idg.com.au
www.pcworld.idg.com.au
Microsoft faces anti-monopoly probe in China over Windows, Office - Good Gear Guide by PC World Australia
daveyarwood.github.io
daveyarwood.github.io
20 cool Clojure functions :: Dave Yarwood
www.click2houston.com
www.click2houston.com
Chevy Volt is insurance group's Top Safety Pick | Money - Home
tech.firstpost.com
tech.firstpost.com
USB pen drives under threat, as researchers show new vulnerability - Tech2
www.themalaymailonline.com
www.themalaymailonline.com
Hackers can tap USB devices in new attacks, researcher warns | Tech/Gadgets | The Malay Mail Online
www.theregister.co.uk
www.theregister.co.uk
Fiendishly complex password app extension ships for iOS 8 • The Register
www.securityfocus.com
www.securityfocus.com
phpMyAdmin 'functions.js' Multiple Cross Site Scripting Vulnerabilities (RSS)
www.securityfocus.com
www.securityfocus.com
phpMyAdmin CVE-2014-4987 Remote Security Bypass Vulnerability (RSS)
www.securityfocus.com
www.securityfocus.com
phpMyAdmin 'rte_list.lib.php' Cross Site Scripting Vulnerability (RSS)
www.securityfocus.com
www.securityfocus.com
phpMyAdmin 'structure.lib.php' Cross Site Scripting Vulnerability (RSS)
www.net-security.org
www.net-security.org
How security analytics help identify and manage breaches
insurancenewsnet.com
insurancenewsnet.com
Range of Ratings: Small Car Ratings Run the Gamut in Challenging Small Overlap Front Test - Top News - InsuranceNewsNet.com
www.guampdn.com
www.guampdn.com
Judge denies motion to release Russian hacking suspect | Pacific Daily News | guampdn.com
en.itar-tass.com
en.itar-tass.com
ITAR-TASS: World - US court turns down Russian suspected hacker’s lawyer request for release
www.wateronline.com
www.wateronline.com
MWH Global And CSC Partner On Cybersecurity Offerings For Critical Utility Infrastructure
www.securitytracker.com
www.securitytracker.com
HP NonStop NetBatch Unspecified Flaw Lets Remote Users Execute Arbitrary NetBatch Jobs - SecurityTracker (RSS)
www.net-security.org
www.net-security.org
PC gamers increasingly under attack
www.net-security.org
www.net-security.org
PCI compliance contributes to false sense of security
www.net-security.org
www.net-security.org
Failure is an option
www.net-security.org
www.net-security.org
The role of the cloud in the modern security architecture
www.teslamotors.com
www.teslamotors.com
Panasonic and Tesla Sign Agreement for the Gigafactory | Press Releases | Tesla Motors
www.securitytube.net
www.securitytube.net
25c3 - Messing Around With Garage Doors
insurancenewsnet.com
insurancenewsnet.com
PCI Urges Revere Residents Affected by Monday's Tornado to Use Caution When Hiring a Contractor - Top News - InsuranceNewsNet.com
insurancenewsnet.com
insurancenewsnet.com
PCI Testifies on Flood Insurance Claims Process Lessons Learned and Potential Improvements - Top News - InsuranceNewsNet.com
www.itpro.co.uk
www.itpro.co.uk
Tor network users may have been identified by hackers | IT PRO
www.darkreading.com
www.darkreading.com
Internet Of Things Contains Average Of 25 Vulnerabilities Per Device
www.truenorthtimes.ca
www.truenorthtimes.ca
Chinese Hackers Try To Infiltrate National Research Council | The True North Times
online.wsj.com
online.wsj.com
MobileIron Security Expert Mike Raggo to Present at BlackHat, DEF CON and BSidesLV - WSJ.com
www.smarthouse.com.au
www.smarthouse.com.au
9 Things Microsoft Should Consider For Windows 9 Success - Smart House
www.lightreading.in
www.lightreading.in
Gartner Says India Security Market To Grow 8% In 2014 - Light Reading – India Telecom News, Telecommunication News
www.net-security.org
www.net-security.org
Whitepaper: Security strategies for success
www.itwebafrica.com
www.itwebafrica.com
Is Kenya’s government clueless on curbing cyber attacks? - ITWeb Africa
www.prweb.com
www.prweb.com
Fasoo Announces New Report on Preventing Insider Threats in the Workplace
www.bovinevetonline.com
www.bovinevetonline.com
10 commandments for business continuity
securityaffairs.co
securityaffairs.co
Attacks to compromise TOR Network and De-Anonymize users | Security Affairs
www.reuters.com
www.reuters.com
Fitch Affirms Bosch at 'F1'| Reuters
www.expressandstar.com
www.expressandstar.com
Travellers pitch up on Bilston road for sixth time this year « Express & Star
www.imediaethics.org
www.imediaethics.org
2 more Journalists charged with Phone Hacking Conspiracy
www.theregister.co.uk
www.theregister.co.uk
Russia to SAP, Apple: Hand over source code to prove you're not spies • The Register
getprismatic.com
getprismatic.com
Cyber security : how Cisco use graph analytics to identify threats - Prismatic
www.thehindubusinessline.com
www.thehindubusinessline.com
Moser Baer becomes the first domestic brand to launch information-security token with 80 KB memory to augment the Governments thrust on domestic manufacturing | Business Line
allafrica.com
allafrica.com
allAfrica.com: Kenya to Launch Unified Web Portal to Protect Against Hackers
www.digit.in
www.digit.in
India's security market to reach $1.06 billion in 2015: Gartner | Digit.in
vpncreative.net
vpncreative.net
Tokyo Police Launch Formal Mt. Gox Investigation Over Missing Bitcoin | VPN Creative
www.isn.ethz.ch
www.isn.ethz.ch
Exporting Surveillance: A New International Security Issue / ISN
www.globalpost.com
www.globalpost.com
Bitcoins stolen from Mt. Gox several times through hacking | GlobalPost
blogs.wsj.com
blogs.wsj.com
Tokyo Police Formally Investigate Missing Bitcoin - Japan Real Time - WSJ
www.scmp.com
www.scmp.com
‘Chinese hackers’ stole data on Israel’s Iron Dome missile shield | South China Morning Post
www.streetwisetech.com
www.streetwisetech.com
Lavasoft Ad-aware Antivirus: The Best Antivirus Software in the Market
www.siliconrepublic.com
www.siliconrepublic.com
Gigglebit: ‘I hacked before hacking was cool …’ - Enterprise - | siliconrepublic.com - Ireland's Technology News Service
www.thestar.com.my
www.thestar.com.my
Connected devices have huge security holes: study - Tech News | The Star Online
www.streetwisetech.com
www.streetwisetech.com
Trend Micro Titanium Antivirus: All-in-One Protection Offer
www.skynews.com.au
www.skynews.com.au
Cyber attack causes major disruption
researchcenter.paloaltonetworks.com
researchcenter.paloaltonetworks.com
Reusable Mobile App Libraries Introduce Reusable Security Issues ‹ Palo Alto Networks BlogPalo Alto Networks Blog
fullcomment.nationalpost.com
fullcomment.nationalpost.com
Today’s letters: ‘The free world will stand strong and prevail’ | National Post
tech.firstpost.com
tech.firstpost.com
India's security market to hit $1.06 billion by 2015: Gartner - Tech2
media.watoday.com.au
media.watoday.com.au
Mass pitch invasion overwhelms security
www.thestar.com.my
www.thestar.com.my
Home security systems vulnerable to hackers, cyberattacks - Tech News | The Star Online
aeon.co
aeon.co
Where do children’s earliest memories go? – Kristin Ohlson – Aeon
www.securitytube.net
www.securitytube.net
Owasp Global Webinar - Php Security Project
in.reuters.com
in.reuters.com
UPDATE 1-Israel's 'Iron Dome' makers were hit by hackers, expert says| Reuters
www.tulsaworld.com
www.tulsaworld.com
Walgreens' new pharmacy safes installed to deter drug robberies - Tulsa World: Homepage3
www.bbc.com
www.bbc.com
BBC News - Smart home kit proves easy to hack, says HP study
vpncreative.net
vpncreative.net
Senate Bill Proposes Sweeping NSA Reform...Again | VPN Creative
en.ria.ru
en.ria.ru
NSA Spying Could Cost American Companies Billions - US Report | World | RIA Novosti
tech.firstpost.com
tech.firstpost.com
Enterprise security has huge potential in India, to hit $1.06 billion by 2015: Gartner - Tech2
www.healthcare.gov
www.healthcare.gov
Health Insurance Marketplace, Affordable Care Act | HealthCare.gov
www.kyivpost.com
www.kyivpost.com
Telegraph: Tor admits hackers have unmasked 'anonymous' users
hamptonroads.com
hamptonroads.com
Riverside warns of data breach; ex-employee charged | HamptonRoads.com | PilotOnline.com
www.tirebusiness.com
www.tirebusiness.com
Small cars struggle in latest round of crash tests - News - Tire Business - The Tire Dealer's No. 1 News Source
tech.firstpost.com
tech.firstpost.com
India's security market to reach $1.06 billion in 2015: Gartner - Tech2
appadvice.com
appadvice.com
Russia wants Apple to hand over its iOS and OS X source code -- AppAdvice
www.engineering.com
www.engineering.com
Beware of Internet of Things Hacking > ENGINEERING.com
www.thehindu.com
www.thehindu.com
DMK wants Katju removed from PCI post - The Hindu
www.symantec.com
www.symantec.com
SSL Ciphers - Beyond Private key and Certificate | Symantec Connect
www.newsday.com
www.newsday.com
U.S. tech business losses foreseen if NSA spying isn't curbed - Newsday
tech.firstpost.com
tech.firstpost.com
India security market to touch $1.06 billion in 2015, says Gartner study - Tech2
www.theregister.co.uk
www.theregister.co.uk
BitTorrent launches decentralised crypto-fied chat app • The Register
time.com
time.com
Martha Stewart: Why I Love My Drone - TIME
www.tripwire.com
www.tripwire.com
Security Slice: The Problem with Password Solutions - The State of Security
www.tripwire.com
www.tripwire.com
Where Does Security Rank When Choosing Your New Language? - The State of Security
seekingalpha.com
seekingalpha.com
Lumber Liquidators Holdings' (LL) CEO Robert Lynch on Q2 2014 Results - Earnings Call Transcript | Seeking Alpha
www.monroenews.com
www.monroenews.com
Small cars fare poorly in crash tests | MonroeNews.com
www.dallasnews.com
www.dallasnews.com
Hackers exploit remote access to enter systems | Dallas Morning News
www.reuters.com
www.reuters.com
UPDATE 3-In rare move, Canada accuses Chinese of trying to hack govt network| Reuters
www.huffingtonpost.com
www.huffingtonpost.com
Chinese Hackers Stole 'Large Amounts' Of Tech Behind Israel's Iron Dome: Report
www.houstonchronicle.com
www.houstonchronicle.com
Small cars fare poorly in crash tests - Houston Chronicle
triblive.com
triblive.com
Feds admit cooperation remains an obstacle with corporations and cyber threats | TribLIVE
www.theregister.co.uk
www.theregister.co.uk
Multipath TCP speeds up the Internet so much that security breaks • The Register
www.koreaittimes.com
www.koreaittimes.com
Global Survey Reveals Impact of Data Breaches on Customer Loyalty | Korea IT Times
ahamlett.com
ahamlett.com
Blog - Alan Hamlett
www.cbronline.com
www.cbronline.com
Did Chinese hackers steal Israel’s Iron Dome missile data? - Computer Business Review
www.securitytube.net
www.securitytube.net
Owasp Global Webinar - Josh Sokol - Simple Risk
www.apppicker.com
www.apppicker.com
Apple seeds OS X Mavericks 10.9.5 beta to developers - Apppicker news 17092
www.asianage.com
www.asianage.com
Canada claims hacking by China | The Asian Age
mediamatters.org
mediamatters.org
As Murdoch Tries To Buy Time Warner, Two More Charged With Phone Hacking | Blog | Media Matters for America
tech.esper.com
tech.esper.com
Algebraic Data Types | Esper Tech Blog
www.securitytracker.com
www.securitytracker.com
Symantec Endpoint Protection Lets Local Users Gain Elevated Privileges - SecurityTracker (RSS)
www.scnow.com
www.scnow.com
County, city focusing on cyber security - SCNow: Living
money.cnn.com
money.cnn.com
Iron Dome makers got hacked, says cybersecurity firm - Jul. 29, 2014
www.youtube.com
www.youtube.com
4 Months to 40 Minutes - YouTube
www.zdnet.com
www.zdnet.com
Microsoft antitrust probe in China: the plot thickens | ZDNet
www.tulsaworld.com
www.tulsaworld.com
Walgreens' new pharmacy safes installed to deter robberies of controlled substances - Tulsa World: Homepage3
bgr.com
bgr.com
BlackBerry global market share: Too small to be counted | BGR
www.reuters.com
www.reuters.com
Fitch Revises P4 Sp zoo's Outlook to Stable on Subordinated PIK Plan| Reuters
green.autoblog.com
green.autoblog.com
Chevy Volt 'acceptable,' Nissan Leaf 'poor' in new IIHS safety tests
www.net-security.org
www.net-security.org
97% of Global 2000 remain vulnerable to due to Heartbleed
www.thisdaylive.com
www.thisdaylive.com
Absence of Cybercrime Law Worries Information Security Society, Articles | THISDAY LIVE
packetstormsecurity.com
packetstormsecurity.com
Joomla Kunena Forum 3.0.5 Cross Site Scripting ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
D-Link AP 3200 Missing Authentication / Cleartext Secret Storage ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
D-Link DWR-113 Cross Site Request Forgery ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Facebook For Android Information Disclosure / Open Proxy ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
HP Security Bulletin HPSBMU03078 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Elastic Search 1.1.1 Arbitrary File Read ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
SkaDate Lite 2.0 CSRF / Cross Site Scripting ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
SkaDate Lite 2.0 Remote Code Execution ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Fwknop Port Knocking Utility 2.6.3 ≈ Packet Storm
www.thisdaylive.com
www.thisdaylive.com
End of Support for Windows 2003 Puts 25m Payment Cards at Risk, Articles | THISDAY LIVE
www.smh.com.au
www.smh.com.au
Assistive technology puts creativity within reach
www.wbhm.org
www.wbhm.org
Kyle Whitmire: Uber Stalls In Birmingham (WBHM - Your NPR News Station)
www.securitytracker.com
www.securitytracker.com
dhcpcd Overloaded Options Processing Flaw Lets Remote Users Deny Service - SecurityTracker (RSS)
www.scmagazine.com
www.scmagazine.com
Symantec Endpoint Protection vulnerabilities enable privilege escalation - SC Magazine
packetstormsecurity.com
packetstormsecurity.com
Mandriva Linux Security Advisory 2014-139 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Mandriva Linux Security Advisory 2014-141 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Mandriva Linux Security Advisory 2014-140 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Ubuntu Security Notice USN-2302-1 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Debian Security Advisory 2992-1 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Joomla Kunena Forum 3.0.5 SQL Injection ≈ Packet Storm
www.richsoil.com
www.richsoil.com
micro heaters cut 87% off my electric heat bill
www.securitytube.net
www.securitytube.net
Owasp Global Webinar - Owasp Media Project
www.bankinfosecurity.com
www.bankinfosecurity.com
4 Facts About Operation Emmental - BankInfoSecurity
www.scmagazineuk.com
www.scmagazineuk.com
Nasdaq's 2010 brush with disaster only now truly understood - SC Magazine UK
www.jpost.com
www.jpost.com
IAI refutes claim that Iron Dome makers were hacked | JPost | Israel News
www.newsbiscuit.com
www.newsbiscuit.com
McAfee unveils first homeopathic antivirus software | NewsBiscuit
blog.trendmicro.com
blog.trendmicro.com
Simply Security News, Views and Opinions from Trend Micro, IncYour Journey to the Cloud: Securing the Modern Data Center » Simply Security News, Views and Opinions from Trend Micro, Inc
jutiagroup.com
jutiagroup.com
Market Update: Cisco Systems Inc (NASDAQ:CSCO) – Cisco Schedules Conference Call for Q4 Fiscal Year 2014 Financial Results
www.iclarified.com
www.iclarified.com
iClarified - Apple News - Russia Asks Apple to Hand Over iOS and Mac Source Code
www.telegraph.co.uk
www.telegraph.co.uk
Average Internet of Things device has 25 security flaws - Telegraph
www.informationweek.com
www.informationweek.com
HP Warns Of IoT Security Risks - InformationWeek
www.scmagazine.com
www.scmagazine.com
A five-month-long Tor attack attempting to 'deanonymize' users - SC Magazine
blogs.wsj.com
blogs.wsj.com
Sprint Will Sell a $12 Wireless Plan that Only Connects to Facebook or Twitter - Digits - WSJ
www.csoonline.com
www.csoonline.com
Tor hints at possible U.S. government involvement in recent attack | CSO Online
www.csoonline.com
www.csoonline.com
Internet of things devices contain high number of vulnerabilities, study finds | CSO Online
www.csoonline.com
www.csoonline.com
Antivirus products riddled with security flaws, researcher says | CSO Online
it-tna.com
it-tna.com
A Replication Feature is NOT a Disaster Recovery Plan - IT-TNA | IT-TNA
www.symantec.com
www.symantec.com
How does SSL work? What is an SSL handshake? | Symantec Connect
www.technewsworld.com
www.technewsworld.com
Hackers Back to Their Old Tricks | Hacking | TechNewsWorld
www.scmagazine.com
www.scmagazine.com
Leahy bill would end bulk data collection, introduce reforms - SC Magazine
www.tulsaworld.com
www.tulsaworld.com
New "pharmacy safe" placed in Tulsa Walgreens could lower robberies - Tulsa World: Homepage3
www.scmagazine.com
www.scmagazine.com
House passes two cyber security bills - SC Magazine
blogs.cars.com
blogs.cars.com
Not All Small Cars Shine in Latest IIHS Crash Tests - KickingTires
www.dailytech.com
www.dailytech.com
DailyTech - Windows Phone 8.1 Update Adds "Live Folders", Expands Cortana Support
www.forbes.com
www.forbes.com
Is BlackBerry Smart? - Forbes
www.linkedin.com
www.linkedin.com
Redirecting...
venturebeat.com
venturebeat.com
U.S. Senator Patrick Leahy's latest privacy bill culls NSA surveillance | VentureBeat | Business | by Ruth Reader
www.nextgov.com
www.nextgov.com
Hackers Raided Israeli Contractors That Built Iron Dome Missile Shield - Nextgov.com
www.scmagazine.com
www.scmagazine.com
Breach index: Encryption used in 4 percent of Q2 incidents - SC Magazine
forums.juniper.net
forums.juniper.net
Innovation Is A Human Condition And Shakespeare De... - J-Net Community
www.securitytracker.com
www.securitytracker.com
Tor 'relay_early' Cell Protocol Lets Certain Remote Users Conduct Traffic Confirmation Attacks - SecurityTracker (RSS)
bizblog.blackberry.com
bizblog.blackberry.com
How BlackBerry And Trend Micro Protect You From Malicious Apps | Inside BlackBerry for Business Blog
siliconangle.com
siliconangle.com
Cisco warns that network virtualization does have its downsides | SiliconANGLE
www.ft.com
www.ft.com
Two ex-News of the World journalists face phone hacking charges - FT.com
thevarguy.com
thevarguy.com
The New Security Sale: Network Virtualization for Micro-Segmentation | The VAR Guy Blog
www.hollywoodreporter.com
www.hollywoodreporter.com
Hacking: One Former 'News of the World' Journalist Charged, Another One Set to Be Charged
www.nbcnews.com
www.nbcnews.com
'Internet of Things' Devices Vulnerable to Attack: Report - NBC News
www.scmagazine.com
www.scmagazine.com
BlackBerry acquires voice and data encryption firm Secusmart - SC Magazine
www.securitytracker.com
www.securitytracker.com
Subversion Symlink Flaw in 'svnwcsub.py', 'irkerbridge.py', and 'daemonize.py' Lets Local Users Gain Elevated Privileges - SecurityTracker (RSS)
www.tripwire.com
www.tripwire.com
Everyday IoT Devices Packed With Alarming Number of Vulnerabilities - The State of Security
www.scmagazine.com
www.scmagazine.com
OTI report exposes economic costs of NSA spying - SC Magazine
blogs.avg.com
blogs.avg.com
How to keep your PC free from Adware
www.scmagazine.com
www.scmagazine.com
Breach index: Encryption used in 23 percent of Q2 incidents - SC Magazine
www.iol.co.za
www.iol.co.za
China probes Microsoft for OS monopoly - IOL SciTech | IOL.co.za
www.autoevolution.com
www.autoevolution.com
Scion FR-S (Toyota GT 86) Gets 2014 Top Safety Pick in IIHS Small Overlap Crash [Video]
www.bit-tech.net
www.bit-tech.net
Microsoft under monopoly investigation in China | bit-tech.net
www.techzone360.com
www.techzone360.com
Two SafeNet Surveys Show It is Pretty Ugly Out There Regarding Data Breaches
www.tulsaworld.com
www.tulsaworld.com
New "pharmacy safe" placed in Tulsa Walgreens could lower robberies - Tulsa World: Homepagelatest
www.securitytube.net
www.securitytube.net
Owasp Global Webinar - Owasp Passfault Project
www.csoonline.com
www.csoonline.com
10 new social media scams to watch out for | CSO Online
www.bizjournals.com
www.bizjournals.com
FAU seeks entrepreneurs to create cybersecurity solutions - South Florida Business Journal
www.symantec.com
www.symantec.com
NetBackup 7.6.0.3 (NetBackup 7.6 Maintenance Release 3) is now available! | Symantec Connect
www.symantec.com
www.symantec.com
Criminal Motives Are Simple but Tactics are Crafty | Symantec Connect
www.macgasm.net
www.macgasm.net
Tor Network Breached, Your IP Isn't As Safe As You May Think
uk.reuters.com
uk.reuters.com
Two former senior Murdoch editors charged over UK phone-hacking| Reuters
techday.com
techday.com
Techday – Harré heads to Helensville to hassle Key on Internet economy
machinedesign.com
machinedesign.com
Design for Real-Time Control: Embedded Computing on Multicore Processors | Embedded content from Machine Design
www.scmagazine.com
www.scmagazine.com
House of Lords subcommittee highlights 'right to be forgotten' flaws - SC Magazine
washingtonexaminer.com
washingtonexaminer.com
Class action lawsuit filed against eBay over data breach | WashingtonExaminer.com
www.scmagazine.com
www.scmagazine.com
Programming error results in CVS Caremark mailing blunder - SC Magazine
www.autoevolution.com
www.autoevolution.com
IIHS Top Safety Pick+ Awarded to 2014 Chevrolet Volt [Video]
www.itproportal.com
www.itproportal.com
America's self harm problem: How the NSA is killing the US economy | ITProPortal.com
www.claimsjournal.com
www.claimsjournal.com
Small Cars Still Need to Improve in Overlap Front Crash Test: IIHS
tools.cisco.com
tools.cisco.com
Cisco Security Advisory: Multiple Vulnerabilities in Cisco IronPort Encryption Appliance (RSS)
www.csoonline.com
www.csoonline.com
Tor releases updates to address traffic confirmation attacks | CSO Online
blog.credit.com
blog.credit.com
Operation Emmental: Could Your Bank Get Hacked? | Credit.com
www.securityfocus.com
www.securityfocus.com
Trusted Boot 'loader.c' Security Bypass Vulnerability (RSS)
www.indctraining.com
www.indctraining.com
JRE - Junos Routing Essentials - INDC
www.usnews.com
www.usnews.com
2 tabloid journalists charged with phone hacking - US News
www.independent.co.uk
www.independent.co.uk
Neil Wallis, Andy Coulson’s deputy, once cleared of suspicion, faces hacking charges - Crime - UK - The Independent
www.eweek.com
www.eweek.com
Microsoft Offers OneNote With Apple-Flavored Updates
www.net-security.org
www.net-security.org
Managing BYOD & Enterprise Mobility USA 2014
hhvm.com
hhvm.com
Announcing a specification for PHP « HHVM
globenewswire.com
globenewswire.com
PCI Announces Definitive Agreement to Acquire Penn Pharma
www.stlamerican.com
www.stlamerican.com
Data breach is everybody’s business - St. Louis American: Guest Columnists
abcnews.go.com
abcnews.go.com
2 Tabloid Journalists Charged With Phone Hacking - ABC News
www.pcmag.com
www.pcmag.com
Asus C200 Chromebook Review & Rating | PCMag.com
www.rawstory.com
www.rawstory.com
Canada accuses China of hacking science agency computers
www.informationweek.com
www.informationweek.com
Windows Phone 8.1 Update: 7 Key Facts - InformationWeek
www.huffingtonpost.com
www.huffingtonpost.com
Two Former Senior Murdoch Editors Charged With Phone Hacking
www.bloomberg.com
www.bloomberg.com
Hackers Pose Threat to Business, U.S. Official Warns - Bloomberg
www.securityfocus.com
www.securityfocus.com
CMSimple 'required_classes.php' Remote File Include Vulnerability (RSS)
www.startribune.com
www.startribune.com
Canadian government says Chinese hackers infiltrated top research and development organization | Star Tribune
motherboard.vice.com
motherboard.vice.com
The DIY Neuroenhancers Hacking Their Brains With Electricity | Motherboard
www.princegeorgecitizen.com
www.princegeorgecitizen.com
National Research Council only the most recent victim of computer hacking - National - Prince George Citizen
sfist.com
sfist.com
Uber Still Illegally Working SFO, Allegedly Hacking The App To Do So: SFist
www.moneycontrol.com
www.moneycontrol.com
India IT security mkt to touch $1.06 bn in 2015: Gartner - Moneycontrol.com
www.cnbc.com
www.cnbc.com
Microsoft latest US tech target in Beijing
www.cio.com.au
www.cio.com.au
Microsoft faces anti-monopoly probe in China over Windows, Office - CIO
www.itbusinessedge.com
www.itbusinessedge.com
Data Breaches: On the Rise and Chasing Away Customers
www.expressandstar.com
www.expressandstar.com
Wallis dubs hack probe 'vindictive' « Express & Star
www.nybooks.com
www.nybooks.com
Can Congress Rein In the Spies? by David Cole | NYRblog | The New York Review of Books
blog.torproject.org
blog.torproject.org
Tor security advisory: "relay early" traffic confirmation attack | The Tor Blog
roscidus.com
roscidus.com
My first unikernel - Thomas Leonard's blog
www.darkreading.com
www.darkreading.com
SSL After The Heartbleed
www.cnet.com
www.cnet.com
​BitTorrent unwraps chat app Bleep - CNE
www.broadwayworld.com
www.broadwayworld.com
Vaulterus launches BitCan'' - Next Generation Cloud Backup and Recovery Service for Databases and Files - BWWGeeksWorld
www.washingtontimes.com
www.washingtontimes.com
Chinese hackers stole 'huge quantities' of sensitive data on Israel's Iron Dome - Washington Times
betabeat.com
betabeat.com
BitTorrent Debuts Ultra Secure Chat App to Protect Messages from Hackers | | Betabeat
news.sky.com
news.sky.com
NOTW Journalists Charged With Phone Hacking
adtmag.com
adtmag.com
Java Devs Get Mac OS X Support in Open Source Zulu -- Application Development Trends: For Software Development Professionals
about-threats.trendmicro.com
about-threats.trendmicro.com
Mobile Security and the Internet of Everything: The Smartphone Remote Hub Problem - Monthly Mobile Review - Mobile Threat Information Hub
web.orange.co.uk
web.orange.co.uk
NOTW Journalists Charged With Phone Hacking | Orange UK
ca.reuters.com
ca.reuters.com
Two former senior Murdoch editors charged over UK phone-hacking| Top News| Reuters
www.nydailynews.com
www.nydailynews.com
IIHS front overlap crash test proves difficult for small car models - NY Daily News
www.macobserver.com
www.macobserver.com
Ford Ditching BlackBerry for iPhone for Global Corporate Use - The Mac Observer
www.benchmarkmonitor.com
www.benchmarkmonitor.com
Microsoft (NASDAQ:MSFT) Facing ‘Anti-Monopoly’ Investigation in China as Technology ‘Cold War’ Heats Up | Benchmark Monitor
www.businessweek.com
www.businessweek.com
Hackers Pose Threat to Business, U.S. Official Warns - Businessweek
www.microsoft.com
www.microsoft.com
Get Smart About Mobile Phone Safety | Microsoft Security
www.bbc.com
www.bbc.com
BBC News - UK to allow driverless cars on public roads in January
www.securitytube.net
www.securitytube.net
Owasp Global Webinar - Owasp Reverse Engineering And Code Modification Project
www.net-security.org
www.net-security.org
Layered security in the cloud
www.marketwired.com
www.marketwired.com
Solix Announces Solix Big Data Suite: First ILM Application Framework for Enterprise Analytics on a Petabyte Scale
www.autospies.com
www.autospies.com
MINI Countryman Comes Out On Top In Latest Round Of Small Car Crash Testing - AutoSpies Auto News
www.huffingtonpost.co.uk
www.huffingtonpost.co.uk
Heads in the Sand When It Comes to Small Business Security | David Emm
www.cultofmac.com
www.cultofmac.com
Russia tells Apple it wants to check its source code for spying | Cult of Mac
www.infosecisland.com
www.infosecisland.com
Facebook “Enter Details Here to Enable Your Account”
twitter.com
twitter.com
Twitter / CiscoSecurity : You’ve got a friend in us! ...
www.csoonline.com
www.csoonline.com
Tor Attack Confirmed | CSO Online
www.pcmag.com
www.pcmag.com
Protect Yourself From Cyber-Snoops, Stalkers, and Thieves at School | PCMag.com
www.telegraph.co.uk
www.telegraph.co.uk
How much would you pay to recover your digital life? - Telegraph
www.infosecisland.com
www.infosecisland.com
Real Hacks of Critical Infrastructure are Occurring – Information Sharing is Not Working
www.pcworld.com
www.pcworld.com
Antivirus products riddled with security flaws, researcher says | PCWorld
www.ctvnews.ca
www.ctvnews.ca
Small car crash tests: All but one fare poorly | CTV News | Autos
www.thelawyer.com
www.thelawyer.com
No harm, no foul — appellate court finds no CMIA claim without actual injury | Briefings | The Lawyer
hamptonroads.com
hamptonroads.com
Riverside Health warns 2,000 of possible data breach | HamptonRoads.com | PilotOnline.com
www.citeworld.com
www.citeworld.com
Despite bolstering its offerings, BlackBerry is still stuck in the past | CITEworld
a16z.com
a16z.com
The Happy Demise of the 10X Engineer | Andreessen Horowitz
www.cardiovascularbusiness.com
www.cardiovascularbusiness.com
Use of quality measures prevents kidney injuries in 1 in 5 PCI patients | Cardiovascular Business
www.forbes.com
www.forbes.com
Can You Completely Trust Tor To Protect Your Privacy? Fresh Attacks Would Suggest Not - Forbes
www.buryfreepress.co.uk
www.buryfreepress.co.uk
Man charged in US with hacking will face no UK charges - Bury Free Press
www.telegraph.co.uk
www.telegraph.co.uk
Tor admits hackers have unmasked 'anonymous' users - Telegraph
www.wcti12.com
www.wcti12.com
Chevy Volt is insurance group's Top Safety Pick | Money - WCTI NewsChannel 12
kdvr.com
kdvr.com
Chevy Volt is insurance group’s Top Safety Pick | kdvr.com
www.v3.co.uk
www.v3.co.uk
Hackers caught hunting Tor hidden services - IT News from V3.co.uk
www.anandtech.com
www.anandtech.com
AnandTech | Microsoft Details Next Windows Phone Update With Folders, Expanded Cortana, and More
www.infosecurity-magazine.com
www.infosecurity-magazine.com
B.Y.O.E: Bring Your Own Encryption - Prevent a Data Breach and Stay out of the Headlines - Infosecurity
www.itproportal.com
www.itproportal.com
Hang your heads in shame: 70% of us spend more time with phones and tablets than family and friends | ITProPortal.com
www.huffingtonpost.com
www.huffingtonpost.com
Make Information Security a Priority | Robert Siciliano
blog.trendmicro.com
blog.trendmicro.com
Simply Security News, Views and Opinions from Trend Micro, IncWhen Cyber Thieves Disrupt Your Life – Online Financial Threats » Simply Security News, Views and Opinions from Trend Micro, Inc
www.securityfocus.com
www.securityfocus.com
ol-commerce Multiple SQL Injection and Multiple Cross Site Scripting Vulnerabilities (RSS)
www.securityfocus.com
www.securityfocus.com
Concrete5 Cross Site Scripting and Path Disclosure Vulnerabilities (RSS)
www.securityfocus.com
www.securityfocus.com
IP.Board Cross Site Scripting Vulnerability (RSS)
www.securityfocus.com
www.securityfocus.com
MyConnection Server 'test.php' Multiple Cross Site Scripting Vulnerabilities (RSS)
www.symantec.com
www.symantec.com
How safe is your quantified self? Tracking, monitoring, and wearable tech | Symantec Connect
www.theregister.co.uk
www.theregister.co.uk
Tor attack nodes RIPPED MASKS off users for 6 MONTHS • The Register
www.forbes.com
www.forbes.com
The Company Keeping Your Favorite (And Least Favorite) Websites Online - Forbes
www.chiswickw4.com
www.chiswickw4.com
Neil Wallis Facing Phone- Hacking Charge
www.chinatopix.com
www.chinatopix.com
How Hackers Hack: the Six Steps to Successful Hacking : Tech : Chinatopix
www.federaltimes.com
www.federaltimes.com
Can Big Data better secure DoD networks? | Federal Times | federaltimes.com
www.bbc.com
www.bbc.com
BBC News - Canada National Research Council 'hacked by Chinese spies'
windowsitpro.com
windowsitpro.com
Microsoft Improves Windows Phone for the Enterprise with Update 1 | Windows Phone content from Windows IT Pro
www.darkreading.com
www.darkreading.com
Security Holes Found In Some DLP Products
www.net-security.org
www.net-security.org
0-days found in Symantec Endpoint Protection
www.heraldonline.com
www.heraldonline.com
PORTLAND, Ore.: Tripwire Retail Survey: PCI Compliance Contributes To False Sense of Security | Business Wire | Rock Hill Herald Online
gmailblog.blogspot.fr
gmailblog.blogspot.fr
Official Gmail Blog: Send money to friends with Gmail and Google Wallet
www.csoonline.com
www.csoonline.com
iPhone gets first free app for encrypting voice calls | CSO Online
www.sdbmagazine.com
www.sdbmagazine.com
Study shows link between data breach and fraud vic - SDB - Storage & Destruction Business
www.sequoyahcountytimes.com
www.sequoyahcountytimes.com
Disaster recovery grant possible - Sequoyah County Times: News
rcpmag.com
rcpmag.com
Microsoft Study Touts Disaster Recovery in Public Cloud -- Redmond Channel Partner
packetstormsecurity.com
packetstormsecurity.com
DDoS Takes Down Cirrus Comms ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Hackers Hitting The Video Games Industry With IP-Stealing Attacks ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
UK To Allow Driverless Cars On Public Roads In January ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Researcher Finds Exploitable Flaws In 14 AV Engines ≈ Packet Storm
www.recordnet.com
www.recordnet.com
NSA should target those worth targeting | Recordnet.com
www.miltonkeynes.co.uk
www.miltonkeynes.co.uk
Milton Keynes police offering online tips to beat the burglars - Milton Keynes Citizen
boingboing.net
boingboing.net
The magic of hacking reality - Boing Boing
www.lifehacker.co.in
www.lifehacker.co.in
Most Popular Desktop Antivirus Application: Avast! Free Antivirus | Life Hacker India
www.gamerevolution.com
www.gamerevolution.com
Two Tribes Announces RIVE
www.huffingtonpost.co.uk
www.huffingtonpost.co.uk
Phone Hacking: Neil Wallis And Jules Stenson, Former News Of The World Journalists, Charged
economictimes.indiatimes.com
economictimes.indiatimes.com
India security market to touch $1.06 billion in 2015: Gartner - The Economic Times
www.fieldtechnologiesonline.com
www.fieldtechnologiesonline.com
DMI Recognized In Gartner Magic Quadrant For Managed Mobility Services For Second Year In A Row Evaluation Based On Completeness Of Vision And Ability To Execute
www.castanet.net
www.castanet.net
Terry Fox day in Manitoba - Canada News - Castanet.net
www.prnewswire.com
www.prnewswire.com
Data Loss Prevention Failures: Discuss Live on Dark Reading Radio -- NEW YORK, July 30, 2014 /PRNewswire/ --
www.scotsman.com
www.scotsman.com
Two News of World’s journalists in hacking charge - The Scotsman
www.gulf-times.com
www.gulf-times.com
Canada accuses Chinese of hacking attempt
comicbook.com
comicbook.com
Norton Launches Hitchhiker's Guide to the Galaxy-Themed Antivirus Site | Comicbook.com
www.standard.co.uk
www.standard.co.uk
Two ex-News of the World journalists charged with conspiracy to hack phones - Crime - News - London Evening Standard
www.dailymail.co.uk
www.dailymail.co.uk
Former News of the World deputy editor Neil Wallis and colleague charged with conspiracy to hack phones  | Mail Online
www.mobilewebuser.com
www.mobilewebuser.com
Why is Microsoft Security Essentials Important?
www.esecurityplanet.com
www.esecurityplanet.com
Sony Settles Data Breach Lawsuit for $15 Million - eSecurity Planet
insurancenewsnet.com
insurancenewsnet.com
PCI Announces Definitive Agreement to Acquire Penn Pharma - Top News - InsuranceNewsNet.com
www.csoonline.com
www.csoonline.com
Zero-day flaws found in Symantec's Endpoint Protection | CSO Online
www.csoonline.com
www.csoonline.com
Homeland Security wants corporate board of directors more involved in cyber-security | CSO Online
www.csoonline.com
www.csoonline.com
British hacker Gary McKinnon launches SEO start-up | CSO Online
www.csoonline.com
www.csoonline.com
Defunct Koler ransom Trojan attacked 200,000 Android users in matter of weeks | CSO Online
www.securitytube.net
www.securitytube.net
Owasp Appsec Europe 2014 - Mobile Track
www.nintendo-insider.com
www.nintendo-insider.com
Two Tribes announce robot hacking shooter RIVE | Nintendo Insider
www.biztechafrica.com
www.biztechafrica.com
Gartner: Beware of the Data Lake fallacy | BiztechAfrica Mobile,Technology & IT News Africa
www.latimes.com
www.latimes.com
Mini Cooper Countryman wins insurance group's top rating in crash test - LA Times
www.marketwatch.com
www.marketwatch.com
NCP engineering Appoints Patrick Oliver Graf as CEO - MarketWatch
www.forbes.com
www.forbes.com
Small Cars, Including Two Electric Models, Show Mixed Results In New Crash Tests - Forbes
img.ly
img.ly
New racks packed full of @JuniperNetworks gear! EX45/4200 stack that replaced Cisco Cat6509 I posted. @JNETCommunity - img.ly
www.theinquirer.net
www.theinquirer.net
Security researcher finds exploitable flaws in 14 major anti-virus engines- The Inquirer
www.cnet.com
www.cnet.com
Canada accuses China of hacking into National Research Council - CNE
www.virtual-strategy.com
www.virtual-strategy.com
Global Survey Reveals Impact of Data Breaches on Customer Loyalty | Virtual-Strategy Magazine
www.net-security.org
www.net-security.org
IoT devices are filled with security flaws, researchers warn
usa.kaspersky.com
usa.kaspersky.com
Kaspersky Internet Security Awarded MRG Effitas Online Banking Browser Security Certification | Kaspersky Lab US
www.cbronline.com
www.cbronline.com
Are Android hackers using fake IDs to get into mobiles? - Computer Business Review
www.express.co.uk
www.express.co.uk
Phone-hacking scandal: Two more News of the World journalists charged | UK | News | Daily Express
freepressjournal.in
freepressjournal.in
India security mkt to touch $1.06 bn in 2015: Gartner - Free Press Journal
www.skynews.com.au
www.skynews.com.au
Connected devices have huge security holes
www.bloomberg.com
www.bloomberg.com
Two Ex-News Corp. Editors Charged With Hacking in U.K. - Bloomberg
edition.cnn.com
edition.cnn.com
The hackers who recovered NASA's lost lunar photos - CNN.com
www.highdefdigest.com
www.highdefdigest.com
'Toki Tori' Dev Announces 'RIVE' | High-Def Digest
www.yourlocalguardian.co.uk
www.yourlocalguardian.co.uk
News of the World journalist charged with phone hacking (From Your Local Guardian)
money.cnn.com
money.cnn.com
Chevy Volt top safety pick says insurance group - Jul. 30, 2014
community.norton.com
community.norton.com
Android Security Bug Uses “Fake ID” To Access User... - Norton Community
www.securitytracker.com
www.securitytracker.com
Google Android Certificate Chain Validation Flaw Lets Applications Gain Elevated Privileges - SecurityTracker (RSS)
www.darkreading.com
www.darkreading.com
Bayshore Networks Extends PallatonCapabilities for High-Value IP Protection
www.financialexpress.com
www.financialexpress.com
Indian security market to grow 8 pct in 2014: Gartner - Financial Express
www.skynews.com.au
www.skynews.com.au
Ex-Murdoch journalists face hacking charges
www.sci-tech-today.com
www.sci-tech-today.com
Android 'Fake ID' Puts Millions of Users at Risk | Sci-Tech Today
www.marketwatch.com
www.marketwatch.com
Adaptiva TechEd Survey Reveals Over Half Still Running XP, WithStronger Than Expected Windows 8 Adoption Plans - MarketWatch
www.itnews.com.au
www.itnews.com.au
A ten-point plan for disrupting security - Strategy - Security - Blogs - iTnews.com.au
insurancenewsnet.com
insurancenewsnet.com
Senate Environment and Public Works Subcommittee on Clean Air and Nuclear Safety Hearing - Top News - InsuranceNewsNet.com
www.virtual-strategy.com
www.virtual-strategy.com
Vaultize Releases New File Sync and Share Platform With Integrated Enterprise Mobility Management and Mobile-first User Experience | Virtual-Strategy Magazine
seclists.org
seclists.org
Information Security News: Utilities ignorant of IT security despite pounding by hackers: Ponemon
seclists.org
seclists.org
Bugtraq: Vulnerabilities in Facebook and Facebook Messenger for Android [STIC-2014-0529]
www.securityfocus.com
www.securityfocus.com
phpMyAdmin CVE-2014-4349 Multiple Cross Site Scripting Vulnerabilities (RSS)
www.securityfocus.com
www.securityfocus.com
phpMyAdmin CVE-2014-4348 Multiple Cross Site Scripting Vulnerabilities (RSS)
www.securityfocus.com
www.securityfocus.com
Cisco Unified Customer Voice Portal CVE-2014-3325 Multiple Cross Site Scripting Vulnerabilities (RSS)
www.networkworld.com
www.networkworld.com
New SSL server rules go into effect Nov. 1 | Network World
www.expressandstar.com
www.expressandstar.com
Trinity allots £4m for hack claims « Express & Star
www.techworld.com.au
www.techworld.com.au
Microsoft's Windows Phone 8.1 update takes Cortana to China, UK, and three other countries - Techworld
globenewswire.com
globenewswire.com
Verdasys Promotes Peter Tyrrell to Chief Operating Officer
www.skynews.com.au
www.skynews.com.au
Small cars fare poorly in crash tests
www.consumeraffairs.com
www.consumeraffairs.com
IIHS gives mixed ratings to small cars in small overlap front crash test
www.bbc.com
www.bbc.com
BBC News - Two ex-News of the World journalists charged over hacking - CPS
www.marketwatch.com
www.marketwatch.com
375 Million Customer Data Records Compromised in 2014 - Retail Industry Hit Hardest - MarketWatch
www.insurancejournal.com
www.insurancejournal.com
Most Electric and Small Cars Come Up Short in IIHS Safety Ratings
seclists.org
seclists.org
Bugtraq: [security bulletin] HPSBMU03078 rev.1 - HP CloudSystem Foundation and HP CloudSystem Enterprise Software running OpenSSL, Remote Unauthorized Access or Disclosure of Information
seclists.org
seclists.org
Bugtraq: [ MDVSA-2014:140 ] owncloud
www.zdnet.com
www.zdnet.com
NSA Playset, 911 hacked and war cats: A wild ride at DEF CON 22 | ZDNet
tuoitrenews.vn
tuoitrenews.vn
Canada says China hacked science agency computers
www.infoworld.com
www.infoworld.com
Mobile management: Making sense of your options | Consumerization Of It - InfoWorld
www.thetimes.co.uk
www.thetimes.co.uk
Two charged with phone hacking after probe into NoTW features desk | The Times
www.infoworld.com
www.infoworld.com
3 zero-day flaws found in Symantec's Endpoint Protection | Security - InfoWorld
www.marketwatch.com
www.marketwatch.com
Bayshore Networks(R) Extends Pallaton(TM) Capabilities for High-ValueIP Protection - MarketWatch
www.infoworld.com
www.infoworld.com
iPhone gets first free app for encrypting voice calls | Security - InfoWorld
www.belfasttelegraph.co.uk
www.belfasttelegraph.co.uk
Wallis dubs hack probe 'vindictive' - BelfastTelegraph.co.uk
www.marketwatch.com
www.marketwatch.com
Medidata Selects Sumo Logic and The Herjavec Group for NewAdvancements in Data Security - MarketWatch
insurancenewsnet.com
insurancenewsnet.com
NIST, HHS Sponsor 7th Annual Conference on Healthcare Information Security - Top News - InsuranceNewsNet.com
indiatoday.intoday.in
indiatoday.intoday.in
Microsoft's Cortana AI comes to India as an alpha : News, News - India Today
www.harrogateadvertiser.co.uk
www.harrogateadvertiser.co.uk
'Hack plot' journalists charged - Harrogate Advertiser
www.whatech.com
www.whatech.com
Global Bring Your Own Device and Enterprise Mobility Market 2019 Forecast and Analysis - WhaTech
www.telegraph.co.uk
www.telegraph.co.uk
Former News of the World executives charged with phone hacking offences - Telegraph
www.net-security.org
www.net-security.org
Free iPhone app for encrypted phone calls released
seclists.org
seclists.org
Bugtraq: [Onapsis Security Advisory 2014-024] Hard-coded Username in SAP FI Manager Self-Service
seclists.org
seclists.org
Bugtraq: [Onapsis Security Advisory 2014-023] HTTP verb tampering issue in SAP_JTECHS
www.securityfocus.com
www.securityfocus.com
Moodle Repositories CVE-2014-3541 PHP Code Injection Vulnerability (RSS)
www.businessinsider.com
www.businessinsider.com
Hack To Save Your Snapchats Forever - Business Insider
ibnlive.in.com
ibnlive.in.com
Microsoft Xbox One to be launched in China on September 23 - IBNLive
betanews.com
betanews.com
Internet of Things devices open up new avenues for hackers
www.themalaymailonline.com
www.themalaymailonline.com
Former ‘News of the World’ editors charged over UK phone-hacking | World | The Malay Mail Online
www.independent.ie
www.independent.ie
Two former NOTW journalists to be charged for phone hacking - Independent.ie
www.clickondetroit.com
www.clickondetroit.com
Chevy Volt is insurance group's Top Safety Pick | Business - Home
www.computerworld.com.au
www.computerworld.com.au
LG G3 deep-dive review: A phone with great specs, but real-world issues - Computerworld
www.theglobeandmail.com
www.theglobeandmail.com
Chinese hacked government computers, Ottawa says - The Globe and Mail
www.belfasttelegraph.co.uk
www.belfasttelegraph.co.uk
'Hack plot' journalists charged - BelfastTelegraph.co.uk
www.nydailynews.com
www.nydailynews.com
Two former senior Murdoch editors charged over UK phone-hacking - NY Daily News
www.theregister.co.uk
www.theregister.co.uk
iWallet: No BONKING PLEASE, we're Apple • The Register
www.securitytube.net
www.securitytube.net
Owasp Appsec Europe 2014 - Malware &Amp; Defence Track
seclists.org
seclists.org
Bugtraq: [Onapsis Security Advisory 2014-025] Multiple Cross Site Scripting Vulnerabilities in SAP HANA XS Administration Tool
seclists.org
seclists.org
Bugtraq: [Onapsis Security Advisory 2014-026] Missing authorization check in function modules of BW-SYS-DB-DB4
www.brianmadden.com
www.brianmadden.com
EMM Smackdown: Head-to-head analysis of Airwatch by VMware, Citrix, Good Technology, Microsoft Enterprise Mobility Suite, MobileIron, IBM MaaS360 and more! - Ruben Spruijt - BrianMadden.com
www.youtube.com
www.youtube.com
Ferrari Case Study - YouTube
www.networkworld.com
www.networkworld.com
Microsoft's Windows Phone 8.1 update takes Cortana to China, UK, and three other countries | Network World
www.streetwisetech.com
www.streetwisetech.com
AVG Antivirus: Giving Optimum Security -
www.macworld.co.uk
www.macworld.co.uk
Apple Aperture vs Adobe Photoshop Lightroom - Review - Macworld UK
money.cnn.com
money.cnn.com
Contract Announcements, Financial Results, Recognitions, and Market Activity - Research Reports on Fortinet, NeuStar, Ruckus Wireless, ChannelAdvisor and Silicom
www.infosecurity-magazine.com
www.infosecurity-magazine.com
Infosecurity - Comment Crew Chinese Hackers Blamed for Stealing Israeli Missile Secrets
www.macleans.ca
www.macleans.ca
Canadian spy agency says Chinese hacked into NRC computers
www.security-faqs.com
www.security-faqs.com
Heartbleed Research Shows Top Companies Are Slow To Mitigate Threat
seclists.org
seclists.org
Bugtraq: [SECURITY] [DSA 2992-1] linux security update
seclists.org
seclists.org
Bugtraq: WiFi HD v7.3.0 iOS - Multiple Web Vulnerabilities
www.cnnvd.org.cn
www.cnnvd.org.cn
中国国家信息安全漏洞库
www.securityfocus.com
www.securityfocus.com
Moodle CVE-2014-3546 Multiple Information Disclosure Vulnerabilities (RSS)
www.securityfocus.com
www.securityfocus.com
Moodle CVE-2014-3543 XML External Entity Information Disclosure Vulnerability (RSS)
www.securityfocus.com
www.securityfocus.com
Moodle Shibboleth Plugin CVE-2014-3552 Authentication Bypass Vulnerability (RSS)
www.securityfocus.com
www.securityfocus.com
Moodle Quiz CVE-2014-3545 Remote Code Execution Vulnerability (RSS)
www.theguardian.com
www.theguardian.com
Phone hacking: NoW’s Neil Wallis and Jules Stenson to be charged | UK news | theguardian.com
www.belfasttelegraph.co.uk
www.belfasttelegraph.co.uk
Ex-NotW pair face hacking charges - BelfastTelegraph.co.uk
www.kelownadailycourier.ca
www.kelownadailycourier.ca
National Research Council only the most recent victim of computer hacking - Daily Courier: National News
www.siliconindia.com
www.siliconindia.com
Gartner Says India Security Market is on Pace to Grow 8 Percent in 2014
www.infotechlead.com
www.infotechlead.com
InfotechLead.com | Security vendor revenue to grow to $953 mn in 2014 from $882 mn in 2013: Gartner
in.reuters.com
in.reuters.com
In rare move, Canada accuses Chinese of trying to hack govt network| Reuters
www.kidsandcars.org
www.kidsandcars.org
KidsAndCars.org
www.trust.org
www.trust.org
Two former senior Murdoch editors charged over UK phone-hacking
www.osnews.com
www.osnews.com
Another day, another sensationalist, unfounded security story
www.itv.com
www.itv.com
Two former NotW journalists charged with phone hacking - ITV News
www.scmagazineuk.com
www.scmagazineuk.com
Chinese hackers steal confidential documents on Israeli missile defence system - SC Magazine UK
www.nbcnews.com
www.nbcnews.com
How Technology Is Intensifying Gaza War Between Israel and Hamas - NBC News
seclists.org
seclists.org
Information Security News: OIG audit criticizes HHS access controls
seclists.org
seclists.org
Information Security News: Nigeria: Over 25 Million Payment Cards in Nigeria At Risk
seclists.org
seclists.org
Bugtraq: Kunena Forum Extension for Joomla Multiple Reflected Cross-Site Scripting Vulnerabilities
www.symantec.com
www.symantec.com
Cyber Shakedowns: A Hacker's New Payday | Symantec Connect
www.irishexaminer.com
www.irishexaminer.com
Congress urges Obama ‘not to take action’ | Irish Examiner
www.13wham.com
www.13wham.com
Congress shows support for Israel - 13WHAM ABC Rochester NY - Top Stories
www.digitaltrends.com
www.digitaltrends.com
Windows Phone 8.1 Update Concentrates on Cortana | Digital Trends
www.stripes.com
www.stripes.com
With Israel at war, US lawmakers give full support - Middle East - Stripes
www.newsobserver.com
www.newsobserver.com
WASHINGTON: Lawmakers struggle to seal $225M Iron Dome package | National Politics | NewsObserver.com
AllAfrica.com
AllAfrica.com
allAfrica.com: Home
whatwillilooklike.com
whatwillilooklike.com
What will I look like?
www.thehindubusinessline.com
www.thehindubusinessline.com
Gartner: Indian security market on pace to grow 8% in 2014 | Business Line
www.net-security.org
www.net-security.org
6 best practices to assure PCI compliance
www.firstpost.com
www.firstpost.com
Hackers stole documents from makers of Israeli defence system: Experts
www.tdtnews.com
www.tdtnews.com
Duo deny computer hacking charge - Temple Daily Telegram: News
www.prnewswire.co.uk
www.prnewswire.co.uk
Vaultize Releases New File Sync and Share Platform... -- NEW YORK and LONDON, July 30, 2014 /PR Newswire UK/ --
www.washingtonpost.com
www.washingtonpost.com
How Anonymous and other hacktivists are waging war on Kenya - The Washington Post
betanews.com
betanews.com
Cleaning up after viruses -- which antivirus solutions are best?
www.virtual-strategy.com
www.virtual-strategy.com
Peerlyst Poised to Redefine Information Security Collaboration at Black Hat USA Conference | Virtual-Strategy Magazine
www.infoworld.com
www.infoworld.com
Who's managing your managed services? You, ultimately | Data Center - InfoWorld
fox17online.com
fox17online.com
Chevy Volt is insurance group’s Top Safety Pick | Fox17
time.com
time.com
Canada Accuses Chinese Hackers of Cyberattack - TIME
www.crikey.com.au
www.crikey.com.au
More Edward Snowdens to blow the whistle on the NSA | Crikey
www.net-security.org
www.net-security.org
Looking at insider threats from the outside
www.securitytube.net
www.securitytube.net
Owasp Appsec Europe 2014 - Security Management &Amp; Training Track
www.pcworld.com
www.pcworld.com
5 unexpectedly useful apps | PCWorld
globalnews.ca
globalnews.ca
Chinese hackers hit NRC computers, network shut down - National | Globalnews.ca
www.net-security.org
www.net-security.org
375 million customer records compromised in 2014
www.westerlynews.ca
www.westerlynews.ca
National Research Council only the most recent victim of computer hacking - National News - Tofino Ucluelet Westerly
www.cbsnews.com
www.cbsnews.com
Cyber warfare: The next front in the Israel-Gaza conflict? - CBS News
gadgets.ndtv.com
gadgets.ndtv.com
Canada Accuses China of Hacking Key Government Network | NDTV Gadgets
www.prweb.com
www.prweb.com
Peerlyst Poised to Redefine Information Security Collaboration at Black Hat USA Conference
www.newyorker.com
www.newyorker.com
Nukes of Hazard - The New Yorker
www.smh.com.au
www.smh.com.au
Hackers plundered Israeli firms that built Iron Dome missile defence system
www.cso.com.au
www.cso.com.au
Utilities ignorant of IT security despite pounding by hackers: Ponemon - CSO | The Resource for Data Security Executives
allafrica.com
allafrica.com
allAfrica.com: Nigeria: Over 25 Million Payment Cards in Nigeria At Risk
www.streetwisetech.com
www.streetwisetech.com
Kaspersky Internet Security - Version 2015 -
www.newvision.co.ug
www.newvision.co.ug
Microsoft to comply with China amid probe
www.theregister.co.uk
www.theregister.co.uk
Firm issues soft denial against Iron Dome hack • The Register
www.scmagazineuk.com
www.scmagazineuk.com
4% of Googlebots are fake and can launch attacks - SC Magazine UK
www.dqindia.com
www.dqindia.com
EMC makes Redefine Possible - Dataquest
www.playstationlifestyle.net
www.playstationlifestyle.net
Rive PS4, Xbox One, Wii U & PC Versions Planned, Say Two Tribes
www.scmagazine.com
www.scmagazine.com
Report: Hackers stole data from Israeli defense firms - SC Magazine
www.itnewsonline.com
www.itnewsonline.com
IT News Online > - Bit9 + Carbon Black Announces Bit9 Security Platform Version 7.2
www.independent.ie
www.independent.ie
China regulator announces anti-monopoly probe of Microsoft - Independent.ie
www.belfasttelegraph.co.uk
www.belfasttelegraph.co.uk
China 'hacks data' from Israel's Iron Dome missile shield, says report - BelfastTelegraph.co.uk
www.itnewsonline.com
www.itnewsonline.com
IT News Online > - Bit9 + Carbon Black Announces Integrated Endpoint Threat Prevention, Detection and Response Solution
in.reuters.com
in.reuters.com
Israel's 'Iron Dome' makers were hit by hackers, expert says| Reuters
www.lexology.com
www.lexology.com
Appellate Court rules medical information must actually have been viewed by an unauthorized person for a plaintiff to recover under the California Confidentiality of Medical Information Act - Lexology
www.insidermonkey.com
www.insidermonkey.com
Details on Microsoft Corporation (MSFT)’s Investigations in China Over Monopoly Allegations - Insider Monkey
www.net-security.org
www.net-security.org
Continuous monitoring for enterprise incident response
www.theregister.co.uk
www.theregister.co.uk
DDOS takes down Cirrus Communications • The Register
www.theregister.co.uk
www.theregister.co.uk
Malware gets your Android blabbering to HACKERS • The Register
www.dailystar.com.lb
www.dailystar.com.lb
U.S. lawmakers try to seal $225M aid package for Israel | News , Middle East | THE DAILY STAR
www.itproportal.com
www.itproportal.com
Chinese hackers pull off Israel Iron Dome hack | ITProPortal.com
www.tasnimnews.com
www.tasnimnews.com
Tasnim News Agency - Chinese Hackers Obtained Info on Israel’s Iron Dome System
news.xinhuanet.com
news.xinhuanet.com
Brazilian firm launches new antivirus products - Xinhua | English.news.cn
www.macon.com
www.macon.com
Recent editorials from Texas newspapers | Health | Macon.com
www.defenseone.com
www.defenseone.com
China Has Iron Dome - Defense One
www.independentmail.com
www.independentmail.com
Lawmakers try to seal $225M aid package for Israel - Independent Mail
forward.com
forward.com
Living Under the Iron Dome – Forward.com
forward.com
forward.com
Three Israeli Contractors Behind Iron Dome Were Hit By Chinese Hackers – Forward.com
www.smarthouse.com.au
www.smarthouse.com.au
HTC One M8 Gets Android 4.4.3 Update - Smart House
www.globes.co.il
www.globes.co.il
Globes English - Chinese hackers stole Iron Dome secrets - report
www.carbonated.tv
www.carbonated.tv
American Lawmakers Ready $225M Aid Package To Reward Israel For The Gaza Massacre - Carbonated.TV
www.sfgate.com
www.sfgate.com
Lawmakers struggle to seal $225M Iron Dome package - SFGate
www.aljazeera.com
www.aljazeera.com
A war to market the Iron Dome - Opinion - Al Jazeera English
insurancenewsnet.com
insurancenewsnet.com
Blackphone Appoints Daniel Ford as Chief Security Officer - Top News - InsuranceNewsNet.com
www.siliconrepublic.com
www.siliconrepublic.com
Hackers targeted tech firms behind Israel’s Iron Dome missile system - Enterprise - | siliconrepublic.com - Ireland's Technology News Service
www.theregister.co.uk
www.theregister.co.uk
'Things' on the Internet-of-things have 25 vulnerabilities apiece • The Register
skullcountry.com
skullcountry.com
C and Go without CGO
www.securitytube.net
www.securitytube.net
Appseceu 2014 - Dan Cornell - Hybrid Analysis Mapping Making Security And Development Tools Play Nice Together
www.financialexpress.com
www.financialexpress.com
Microsoft targeted in apparent Chinese anti-trust probe - Financial Express
seekingalpha.com
seekingalpha.com
2 Big Elephants Afraid Of A Mouse: What Apple Is Not Telling You About BlackBerry - BlackBerry Ltd. (NASDAQ:BBRY) | Seeking Alpha
www.padgadget.com
www.padgadget.com
Researchers Warn Almost all Android Devices Prone to Attack Allowing Hackers to Steal Personal Information | PadGadget
blog.credit.com
blog.credit.com
The Facebook Scam That Tricks You Into Hacking Yourself | Credit.com
www.theregister.co.uk
www.theregister.co.uk
Keep your iPhone calls private, whispers Signal • The Register
www.cio.com
www.cio.com
Can Information Sharing Stop Bots in Their Tracks? | CIO
www.scmagazine.com
www.scmagazine.com
Study: Asian Android users at higher risk of malware exposure - SC Magazine
www.cnbc.com
www.cnbc.com
Electric car batteries pass latest crash tests
www.nextgov.com
www.nextgov.com
British Activist Lauri Love Accused of Hacking Deltek - Nextgov.com
www.reuters.com
www.reuters.com
Israel's Iron Dome makers were hit by hackers-report| Reuters
www.computerworld.in
www.computerworld.in
Computerworld India News | WEDG the Answer to Post-Snowden Data Paranoia: Inventor | Computerworld.in
www.theregister.co.uk
www.theregister.co.uk
Thwarted dev sets Instasheep to graze on Facebook accounts • The Register
www.tripwire.com
www.tripwire.com
A Midsummer Mega Week of Giving - The State of Security
www.tripwire.com
www.tripwire.com
The Information Security Hierarchy of Needs - The State of Security
www.autonews.com
www.autonews.com
Small cars struggle in latest round of IIHS crash tests
www.techvibes.com
www.techvibes.com
National Research Council's Computers Targeted by Chinese Hackers - Techvibes.com
www.ktuu.com
www.ktuu.com
Chevy Volt is insurance group's Top Safety Pick | Business - KTUU.com Anchorage
www.dnaindia.com
www.dnaindia.com
Israel's 'Iron Dome' makers were hit by hackers, expert says | Latest News & Updates at Daily News & Analysis
www.heraldonline.com
www.heraldonline.com
DETROIT: Small cars fare poorly in crash tests | Business | Rock Hill Herald Online
www.csoonline.com
www.csoonline.com
Android users warned of critical vulnerability | CSO Online
www.slideshare.net
www.slideshare.net
Symantec Control Compliance Suite Standards Manager: Automate Securi…
investor.juniper.net
investor.juniper.net
Juniper Networks - Cloudwatt Deploys OpenContrail for Massive Sovereign Cloud Orchestration
deepinmummymatters.com
deepinmummymatters.com
Child Online Safety In Schools - Mummy Matters
nickbradbury.com
nickbradbury.com
Why I Left Indie Development | Nick Bradbury
appleinsider.com
appleinsider.com
New Android 'Fake ID' flaw empowers stealthy new class of super-malware
www.channelnews.com.au
www.channelnews.com.au
HTC One M8 Gets Android 4.4.3 Update in Europe - Channel News
www.nintendoworldreport.com
www.nintendoworldreport.com
Two Tribes Announces Rive for Early 2015 Release - News - Nintendo World Report
arstechnica.com
arstechnica.com
Hackers seed Amazon cloud with potent denial-of-service bots | Ars Technica
usa.chinadaily.com.cn
usa.chinadaily.com.cn
Chinese antitrust agency looking into Microsoft|Business|chinadaily.com.cn
www.trutower.com
www.trutower.com
BBM for Android and iOS Will Be Getting a "More Native" UI Facelift | TruTower
www.afr.com
www.afr.com
How China became Microsoft’s latest headache
talkincloud.com
talkincloud.com
RackWare Adds Cloud Disaster Recovery to Management Solution | Cloud Companies content from Talkin' Cloud
lifecompetes.com
lifecompetes.com
Conway's Multiplayer Game of Life
www.securitytube.net
www.securitytube.net
Appsec Europe 2014 - Winston Bond - Owasp Mobile Top Ten 2014 - The New Lack Of Binary Protection Category
seekingalpha.com
seekingalpha.com
GNC Holdings' (GNC) CEO Joseph Fortunato on Q2 2014 Results - Earnings Call Transcript | Seeking Alpha
www.cio-today.com
www.cio-today.com
Mac OS Yosemite Developer Preview 4 Released - Apple/Mac on CIO Today
www.cio-today.com
www.cio-today.com
Gartner Rates Security Solutions in Annual Magic Quadrant Report - Big Data on CIO Today
pando.com
pando.com
Will our future dystopia be one where privacy is something only the rich can afford? | PandoDaily
www.theregister.co.uk
www.theregister.co.uk
Canada's boffins need A WHOLE YEAR to recover from China hack attack • The Register
www.zdnet.com
www.zdnet.com
Internet of things big security worry, says HP | ZDNet
online.wsj.com
online.wsj.com
Absolute Software Declares Quarterly Dividend - WSJ.com
www.business-standard.com
www.business-standard.com
US tech companies reel as NSA spying tarnishes reputations | Business Standard News
english.vietnamnet.vn
english.vietnamnet.vn
Climate infrastructure needed - News VietNamNet
dailycaller.com
dailycaller.com
Ex-NSA Chief Alexander Charges $1 Million For Cyber-Security | The Daily Caller
www.scmagazine.com
www.scmagazine.com
Seattle University donor checks possibly exposed due to settings error - SC Magazine
recode.net
recode.net
The Internet of Things Is the Hackers’ New Playground | Re/code
www.bnd.com
www.bnd.com
Recent editorials from Texas newspapers | Health | News Democrat
www.ctvnews.ca
www.ctvnews.ca
How do hackers breach institutions like Canada’s NRC? | CTV News
redmondmag.com
redmondmag.com
One Year Post-Snowden: Shattered Trust Is Hard To Repair -- Redmondmag.com
arstechnica.com
arstechnica.com
Android crypto blunder exposes users to highly privileged malware | Ars Technica
www.detroitnews.com
www.detroitnews.com
EVs, small cars get mixed ratings in new crash tests | The Detroit News
chinadigitaltimes.net
chinadigitaltimes.net
Hackers Hit HK Media, Democracy Movement - China Digital Times (CDT)
www.smh.com.au
www.smh.com.au
Canada pushes China on cyberattacks after research breach
www.scmagazine.com
www.scmagazine.com
Instagram iOS and Android apps vulnerable to session hijacking - SC Magazine
allseenalliance.org
allseenalliance.org
AllSeen and All-Embracing Alliance for Symantec - AllSeen Alliance
www.incgamers.com
www.incgamers.com
Rive marks the re-arrival of Two Tribes | IncGamers.com
www.computerandvideogames.com
www.computerandvideogames.com
Two Tribes reveals 'robot hacking shooter' Rive - CVG
www.wired.co.uk
www.wired.co.uk
Chinese military 'hacked' Israel's Iron Dome (Wired UK)
www.hardcoregamer.com
www.hardcoregamer.com
Two Tribes Announce RIVE for Consoles and PC ‹ Hardcore Gamer
www.ecns.cn
www.ecns.cn
Chinese antitrust agency looking into Microsoft - Headlines, features, photo and videos from ecns.cn|china|news|chinanews|ecns|cns
packetstormsecurity.com
packetstormsecurity.com
OpenDNSSEC 1.4.6 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
I2P 0.9.14 ≈ Packet Storm
www.cbts.net
www.cbts.net
CBTS Cyber Security Blog | Still in Hiding, CVE2012-0158
arstechnica.com
arstechnica.com
Instasheep: Coder builds tool to hijack Instagram accounts over Wi-Fi | Ars Technica
www.cio.co.nz
www.cio.co.nz
Beware of the data lake fallacy: Gartner - CIO New Zealand
recode.net
recode.net
Canada Accuses Chinese of Trying to Hack Government Network | Re/code
packetstormsecurity.com
packetstormsecurity.com
SAP_JTECHS HTTP Verb Tampering ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
SAP FI Manager Self-Service Hardcoded Username ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
SAP HANA XS Administration Tool Cross Site Scripting ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
SAP Netweaver Business Warehouse Missing Authorization ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
TOR Virtual Network Tunneling Tool 0.2.4.23 ≈ Packet Storm
www.securitytube.net
www.securitytube.net
Appseceu 2014 - Jerry Hoff - Getting A Handle On Mobile Security
www.csoonline.com
www.csoonline.com
A practical survival guide to Black Hat and DEF CON | CSO Online
www.gamespot.com
www.gamespot.com
ATM Hacked To Give You the Original Doom Instead of Money - GameSpot
packetstormsecurity.com
packetstormsecurity.com
WordPress WhyDoWork AdSense 1.2 XSS / CSRF ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Senate Introduces USA FREEDOM Act To Curb NSA Spying Excesses ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Red Hat Security Advisory 2014-0982-01 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Red Hat Security Advisory 2014-0979-01 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Red Hat Security Advisory 2014-0981-01 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Siemens SIMATIC WinCC Privilege Escalation ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
WiFi HD 7.3.0 LFI / Traversal / Command Injection / CSRF ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Barracuda WAF 6.1.5 / LoadBalancer 4.2.2 Filter Bypass / XSS ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
SAP HANA XS Missing Encryption ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
SAP HANA IU5 SDK Authentication Bypass ≈ Packet Storm
twitter.com
twitter.com
Twitter / JuniperNetworks : Know what you're up against? ...
www.cbc.ca
www.cbc.ca
Chinese cyberattack hits Canada's National Research Council - Politics - CBC News
whispersystems.org
whispersystems.org
Open WhisperSystems >> Blog >> Free, Worldwide, Encrypted Phone Calls for iPhone
www.thestar.com.my
www.thestar.com.my
Israel's 'Iron Dome' makers were hit by hackers, expert says - World | The Star Online
www.standardmedia.co.ke
www.standardmedia.co.ke
Standard Digital News - Kenya : Police set to unveil law to catch hackers
arstechnica.com
arstechnica.com
Former NSA director will file “at least” 9 patents to detect malicious hackers | Ars Technica
www.theregister.co.uk
www.theregister.co.uk
Senate introduces USA FREEDOM Act to curb NSA spying excesses • The Register
www.forbes.com
www.forbes.com
Forget Glass. Here Are Wearables That Protect Your Privacy. - Forbes
www.pbs.org
www.pbs.org
Congress at odds over $225 million aid package for Israel | The Rundown | PBS NewsHour
www.bustle.com
www.bustle.com
Bustle
www.eweek.com
www.eweek.com
Proposed USA Freedom Act Updated for Improved Privacy
beyondearthlyskies.blogspot.fr
beyondearthlyskies.blogspot.fr
Beyond Earthly Skies: A Nuclear Probe to Explore Earth’s Interior
www.kdlt.com
www.kdlt.com
KDLT.com South Dakota News - Steps Outlined For Disaster Recovery In Lincoln, Union Counties
www.csoonline.com
www.csoonline.com
Is the WEDG the answer to post-Snowden data paranoia? Its inventor remains hopeful | CSO Online
www.cio-today.com
www.cio-today.com
Mac OS Yosemite Developer Preview 4 Released - Wireless Security on CIO Today
www.businessweek.com
www.businessweek.com
Google's Android Has a Fake-ID Security Problem - Businessweek
mobilesyrup.com
mobilesyrup.com
BBM for iOS and Android being redesigned to less resemble BB10 | MobileSyrup.com
ottawacitizen.com
ottawacitizen.com
Suspected Chinese cyber attack forces NRC security overhaul | Ottawa Citizen
www.ctvnews.ca
www.ctvnews.ca
Cyberattacks on the rise, but governments getting better at catching them | CTV News
www.theregister.co.uk
www.theregister.co.uk
Android busted for carrying Fake ID: OS doesn't check who really made that 'Adobe' plugin • The Register
www.infoworld.com
www.infoworld.com
BlackBerry adds more security for the sensitive enterprise | Mobile Technology - InfoWorld
seclists.org
seclists.org
WebApp Sec: 6 new vulnerabilities
www.wired.com
www.wired.com
Personal Privacy Is Only One of the Costs of NSA Surveillance | Threat Level | WIRED
www.lfpress.com
www.lfpress.com
London facility juicy and easy spy target | The London Free Press
www.darkreading.com
www.darkreading.com
Dark Reading Radio: Data Loss Prevention (DLP) Fail
www.radioaustralia.net.au
www.radioaustralia.net.au
Canada accuses China of hacking government network | ABC Radio Australia
www.ecommercetimes.com
www.ecommercetimes.com
Chinese Turn the Screws on Microsoft | Government | E-Commerce Times
mobileenterprise.edgl.com
mobileenterprise.edgl.com
What is a Data Lake | News | Mobile Enterprise(ME)
www.datacenterdynamics.com
www.datacenterdynamics.com
Gartner labels ‘data lakes’ a fallacy | Datacenter Dynamics
www.tctmd.com
www.tctmd.com
Regional Quality-Improvement Effort Reduces Contrast-Induced AKI After PCI - Journal News - TCTMD
deeplearning.cs.toronto.edu
deeplearning.cs.toronto.edu
Home - Toronto Deep Learning
www.salon.com
www.salon.com
America’s former spy chief is getting filthy rich “consulting” on cyber-security - Salon.com
wlrn.org
wlrn.org
FAU Calls On Techies And Entrepreneurs To Improve Cyber Security | WLRN
www.scmagazine.com
www.scmagazine.com
Neverquest trojan targets regional banks in Japan - SC Magazine
www.independent.co.uk
www.independent.co.uk
Schematics from Israel's Iron Dome missile shield 'hacked' by Chinese, says report - Gadgets and Tech - Life and Style - The Independent
globenewswire.com
globenewswire.com
Bit9 + Carbon Black Announces Carbon Black Version 4.2
money.cnn.com
money.cnn.com
Microsoft faces China antitrust probe - Jul. 29, 2014
blogs.technet.com
blogs.technet.com
The Microsoft Approach to Compliance in the Cloud - Cloud Computing | Microsoft Trustworthy Computing Blog - Site Home - TechNet Blogs
www.automationworld.com
www.automationworld.com
Hilscher press release: 2-channel PCI card | Automation World
www.scmagazine.com
www.scmagazine.com
HP tests 10 popular IoT devices, most raise privacy concerns - SC Magazine
www.geek.com
www.geek.com
Chinese hackers steal Iron Dome missile defense secrets from Israeli security contractors | News | Geek.com
www.scmp.com
www.scmp.com
Canada blames Chinese hackers for attack on National Research Council | South China Morning Post
www.bloomberg.com
www.bloomberg.com
Canada Pushes China on Cyber-Attack After Research Breach - Bloomberg
phys.org
phys.org
Connected devices have huge security holes: study
cloudtweaks.com
cloudtweaks.com
Cloud Infographic: The Cost Of A Data Breach - CloudTweaks.com
abcnews.go.com
abcnews.go.com
Canada: Chinese Hackers Infiltrated Government Org - ABC News
siliconangle.com
siliconangle.com
ThetaRay raises $10M to expand data-driven threat detection | SiliconANGLE
techday.com
techday.com
Techday – ‘Alarming’ gaps in Kiwi security leave critical infrastructure open
www.timesofisrael.com
www.timesofisrael.com
Report: Hackers 'phish' Iron Dome plans from defense firms | The Times of Israel
www.securityweek.com
www.securityweek.com
Instagram App Exposes Users to Man-in-the-Middle Attacks: Researcher | SecurityWeek.Com
usa.kaspersky.com
usa.kaspersky.com
Free Internet Security Scan | Kaspersky Lab US
www.scmagazine.com
www.scmagazine.com
IG scolds NOAA on security deficiencies, recommends fixes - SC Magazine
www.polygon.com
www.polygon.com
I created my own MMO and lost 100 pounds, interested in signing up? | Polygon
www.securitytube.net
www.securitytube.net
Appseceu 2014 - Appsec Eu 2014 Chapter Leaders Workshop
www.tripwire.com
www.tripwire.com
New ‘Fake ID’ Malware Affects Millions of Android Users - The State of Security
www.gmanetwork.com
www.gmanetwork.com
Connected devices have huge security holes: study | SciTech | GMA News Online
www.securitymanagement.com
www.securitymanagement.com
NSA's Actions Threaten U.S. Economy and Internet Security, New Report Suggests | Security Management
www.dailymail.co.uk
www.dailymail.co.uk
Massive security alert over Android 'Fake ID' bug | Mail Online
innovationinsights.wired.com
innovationinsights.wired.com
Preparing for a Century of Cyberwarfare | Innovation Insights | Wired.com
business.financialpost.com
business.financialpost.com
National Research Council computers hacked by Chinese, says Canadian spy agency | Financial Post
in.reuters.com
in.reuters.com
Fitch Affirms BOI and AIB; Negative Outlooks| Reuters
www.scmagazine.com
www.scmagazine.com
Vulnerability impacting multiple versions of Android could enable device takeover - SC Magazine
www.iwu.edu
www.iwu.edu
Illinois Wesleyan: Simmons' Research Aims to Improve Function for Online Security
blog.trendmicro.com
blog.trendmicro.com
Simply Security News, Views and Opinions from Trend Micro, IncCybercriminals to Online Banks: Check » Simply Security News, Views and Opinions from Trend Micro, Inc
www.healthitoutcomes.com
www.healthitoutcomes.com
Court Says Breach Lawsuit Needs To Prove Harm
www.abc.net.au
www.abc.net.au
Canada accuses China of hacking government network - Australia Network News (Australian Broadcasting Corporation)
dailycaller.com
dailycaller.com
Android Bug Could Let Hackers Take Total Control Of Your Phone | The Daily Caller
www.jdsupra.com
www.jdsupra.com
California Court Dismisses Data Breach Class Action | Traub Lieberman Straus & Shrewsberry LLP - JDSupra
www.tomsguide.com
www.tomsguide.com
Instagram Flaw Leaves iOS Version Vulnerable - Tom's Guide
www.keloland.com
www.keloland.com
KELOLAND.com | Steps Outlined For Disaster Recovery In Lincoln, Union Counties
www.businessweekly.co.uk
www.businessweekly.co.uk
Darktrace stars among new Killer50 companies | Business Weekly | Technology News | Business news | Cambridge and the East of England
www.networkworld.com
www.networkworld.com
Homeland Security wants corporate board of directors more involved in cyber-security | Network World
www.bobsguide.com
www.bobsguide.com
Netwrix: Six Best Practices to Assure PCI Compliance - bobsguide.com
www.columbusceo.com
www.columbusceo.com
U.S. tech companies reel as NSA spying mars image for customers | Columbus CEO
www.fastcompany.com
www.fastcompany.com
Android Security Flaw Allows Hackers To Create "Fake IDs" | Fast Company | Business + Innovation
www.digitaljournal.com
www.digitaljournal.com
AirTight Networks Announces Reseller Agreement with Leading Value-Added Distributor and Solutions Integrator, DataAssure - Press Release - Digital Journal
www.bbc.co.uk
www.bbc.co.uk
BBC News - Android Fake ID bug exposes smartphones and tablets
www.newsobserver.com
www.newsobserver.com
Recent editorials from Texas newspapers | Health & Science | NewsObserver.com
www.miamiherald.com
www.miamiherald.com
TORONTO: Canada: Chinese hackers infiltrated government org - World Wires - MiamiHerald.com
m.military.com
m.military.com
Secret Service Wants to be #1 E-Crime Deterrent | Military.com
www.marketwatch.com
www.marketwatch.com
Bit9 + Carbon Black Announces Bit9 Security Platform Version 7.2 - MarketWatch
www.networkworld.com
www.networkworld.com
9 Tips for CIOs as Summer Vacations Hit | Network World
motherboard.vice.com
motherboard.vice.com
The Iron Dome Hack Shows Phishing Is Still Effective Against Defense Contractors | Motherboard
www.wallstreetandtech.com
www.wallstreetandtech.com
Shore Up Cyber Security Now - Wall Street & Technology
www.toptechnews.com
www.toptechnews.com
Mac OS Yosemite Developer Preview 4 Released - Apple/Mac on Top Tech News
in.reuters.com
in.reuters.com
In rare move, Canada accuses Chinese of trying to hack government network| Reuters
www.industryweek.com
www.industryweek.com
Connected Devices Have Huge Security Holes | Technology content from IndustryWeek
www.scmagazine.com
www.scmagazine.com
Unfair competition: Proactive preemption can save you from litigation - SC Magazine
txt.jazzychad.net
txt.jazzychad.net
gistblog - My iOS Indie-Game Numbers
thevarguy.com
thevarguy.com
Kaspersky Survey: IT Pros Confused about Virtual Security | Network Security and Data Protection Software Solutions content from The VAR Guy
linkis.com
linkis.com
Forbes - Linkis.com
www.macrumors.com
www.macrumors.com
Ford Transitioning From BlackBerries to iPhones for Employees - Mac Rumors
www.gisuser.com
www.gisuser.com
GISuser.com GIS Location Technology - CartoDB Enterprise: next-generation GIS cloud solution for groups
kaspersky-cyberstat.com
kaspersky-cyberstat.com
Kaspersky Cyberstat
www.reportlinker.com
www.reportlinker.com
Find Industry reports, Company profiles and Market Statistics
www.theregister.co.uk
www.theregister.co.uk
14 antivirus apps found to have security problems • The Register
www.inquisitr.com
www.inquisitr.com
Edward Snowden Wants To Build Anti-Surveillance Technology, But Can We Trust Him?
www.csoonline.com
www.csoonline.com
Former Coca-Cola CISO joins Accuvant | CSO Online
setosa.io
setosa.io
Markov Chains
www.securitytube.net
www.securitytube.net
Owasp Appsec Europe 2014 - Frameworks And Theories Track
www.yahoo.com
www.yahoo.com
Hilton to Let You Use Your Smartphone as Your Room Key
www.broadwayworld.com
www.broadwayworld.com
Logicalis US to CIOs: Plan for Business Continuity before Implementing Disaster Recovery - BWWGeeksWorld
www.darkreading.com
www.darkreading.com
Cyber security and big data innovator ThetaRay closes $10m oversubscribed series B funding round
www.tomsguide.com
www.tomsguide.com
Facebook Scam Tricks Users Into Hacking Themselves
www.scmagazine.com
www.scmagazine.com
Accuvant taps Coca Cola CISO Guttmann as VP - SC Magazine
www.schneier.com
www.schneier.com
Schneier on Security: The Costs of NSA Surveillance (RSS)
www.informationweek.com
www.informationweek.com
Microsoft Enhances OneNote for Mac, iOS - InformationWeek
www.thestar.com
www.thestar.com
Hacking allegations against China go back years | Toronto Star
narcosphere.narconews.com
narcosphere.narconews.com
U.S. Military: More Counter-Narcotics Funding Will Help Stem Exodus of Children from Central America | the narcosphere
www.fedtechmagazine.com
www.fedtechmagazine.com
How One Agency Takes Windows To Go | FedTech Magazine
o.canada.com
o.canada.com
Chinese hackers break into National Research Council computers, Canadian spy agency says | canada.com
www.juniper.net
www.juniper.net
Junos Cup 2014 - Juniper Networks
www.news.com.au
www.news.com.au
Far-right Israelis caught on camera chanting ‘There’s no school tomorrow, there’s no children left in Gaza’ |News.com.au
betanews.com
betanews.com
No BYOD policy? Now is the time to prioritize user-oriented I
boingboing.net
boingboing.net
Former NSA chief to profit from patented hacker detection tech, charging clients $1M a month - Boing Boing
www.northumberlandtoday.com
www.northumberlandtoday.com
China tried to hack us: Feds | Northumberland Today
www.upi.com
www.upi.com
Canada accuses China of hacking government computers - UPI.com
www.itproportal.com
www.itproportal.com
Microsoft is pounced on by Chinese officials in alleged antitrust investigation | ITProPortal.com
www.marketwatch.com
www.marketwatch.com
Cyber Security Market in the US Government Sector 2014-2018 - MarketWatch
www.infosecisland.com
www.infosecisland.com
Multipath TCP - Black Hat Briefings Teaser
www.haaretz.com
www.haaretz.com
Hackers sought Iron Dome secrets, U.S. security blog says - Business Israel News | Haaretz
securitywatch.pcmag.com
securitywatch.pcmag.com
Antivirus Software for the Morning After
www.theregister.co.uk
www.theregister.co.uk
BlackBerry to slurp encrypted mobile comms firm Secusmart • The Register
www.scmagazine.com
www.scmagazine.com
ICO fines U.K. travel firm £150,000 for 2012 breach - SC Magazine
www.microsoft.com
www.microsoft.com
Trustworthy Computing - Privacy
tools.cisco.com
tools.cisco.com
BYOD With TrustSec - Cisco Online Seminar - Cisco Systems
www.symantec.com
www.symantec.com
Is the perfect storm headed toward purpose-built storage systems? | Symantec Connect
www.cnbc.com
www.cnbc.com
Internet of Things is the hackers' new playground
appadvice.com
appadvice.com
Substantial security flaw found in Instagram’s iPhone app -- AppAdvice
www.theinquirer.net
www.theinquirer.net
Instagram to use HTTPS following discovery of gaping security hole in iOS app- The Inquirer
www.politico.com
www.politico.com
Hacking contests ID cyber talent for government, industry - Tal Kopan - POLITICO.com
frenchtribune.com
frenchtribune.com
Window Phone 8.1 Update Leaked | French Tribune
www.pehub.com
www.pehub.com
PE HUB » Frazier Healthcare’s PCI agrees to acquire Penn Pharma
www.theregister.co.uk
www.theregister.co.uk
Texan firm buys disaster recovery bods Neverfail • The Register
www.net-security.org
www.net-security.org
Almost 1 in 10 Android apps are now malware
jutiagroup.com
jutiagroup.com
Stock Update (NASDAQ:CSCO): [$$] Major M&A Wave Could Hurt Cisco’s Margins
www.bnn.ca
www.bnn.ca
Chinese hacked government computers, Ottawa says - BNN News
www.torontosun.com
www.torontosun.com
Chinese hackers force Canadian government to shut down computer systems: Treasur
www.net-security.org
www.net-security.org
Researchers successfully attack Android through device's speaker
www.symantec.com
www.symantec.com
Apathy or Denial? Google Claims Security Unnecessary on Android Devices, Despite Warnings | Symantec Connect
lwn.net
lwn.net
Debian and the PHP license [LWN.net]
www.infoworld.com
www.infoworld.com
How to protect personal, corporate information when you travel | Security - InfoWorld
www.infoworld.com
www.infoworld.com
The data dangers of free public Wi-Fi | Security - InfoWorld
www.infoworld.com
www.infoworld.com
Android vulnerability allows malware to compromise most devices and apps | Mobile Technology - InfoWorld
www.csoonline.com
www.csoonline.com
Black Hat 2014: How to crack just about everything | CSO Online
www.csoonline.com
www.csoonline.com
Evan Schuman: The data dangers of free public Wi-Fi | CSO Online
www.csoonline.com
www.csoonline.com
Privacy groups call for action to stop Facebook's off site user tracking plans | CSO Online
www.csoonline.com
www.csoonline.com
Using Instagram on public Wi-Fi poses risk of an account hijack, researcher says | CSO Online
www.esecurityplanet.com
www.esecurityplanet.com
Travel Agent Fined $255,000 for Data Breach - eSecurity Planet
www.bsminfo.com
www.bsminfo.com
SSL Certificates Used In Cyber Crime Published In “Blacklist”
www.misco.co.uk
www.misco.co.uk
Online travel services company fined after revealing customer records to hacker - Misco.co.uk
dissenter.firedoglake.com
dissenter.firedoglake.com
Congress Members and Staffers Blocked from Accessing Website for ‘Hackers on Planet Earth’ (#HopeX) Conference | The Dissenter
www.informationweek.com
www.informationweek.com
Fitbit Debuts Windows Phone App - InformationWeek
smartdatacollective.com
smartdatacollective.com
Operational Intelligence Blog I real-time analytics I Vitria | SmartData Collective
in.reuters.com
in.reuters.com
UPDATE 1-Canada says China tried to hack into key computer system| Reuters
www.out-law.com
www.out-law.com
Data protection fines drive up compliance elsewhere across industry, research finds
blog.trendmicro.com
blog.trendmicro.com
Mitigating UAF Exploits with Delay Free for Internet Explorer | Security Intelligence Blog | Trend Micro
www.networkworld.com
www.networkworld.com
5 things you no longer need to do for mobile security | Network World
packetstormsecurity.com
packetstormsecurity.com
Android Fake ID Bug Exposes Smartphones And Tablets ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Hackers Hit Israeli Missile Defense System ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Personal Privacy Is Only One Of The Costs Of NSA Surveillance ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Microsoft Offices In China Raided By Authorities ≈ Packet Storm
gigaom.com
gigaom.com
Data privacy isn’t political — it’s personal — Tech News and Analysis
www.thestar.com
www.thestar.com
Canadian spy agency says Chinese hacked into National Research Council computers | Toronto Star
www.montrealgazette.com
www.montrealgazette.com
China opens anti-monopoly investigation into Microsoft over Windows, Office
www.lexology.com
www.lexology.com
Investigation of aircraft accidents - Lexology
www.globalpost.com
www.globalpost.com
Canada foreign minister protests to China over hacking attempt | GlobalPost
www.gurufocus.com
www.gurufocus.com
Microsoft: 2 Big Developments to watch out for! - GuruFocus.com
www.scmagazineuk.com
www.scmagazineuk.com
Security researcher finds exploitable flaws in 14 antivirus engines - SC Magazine UK
www.prnewswire.co.uk
www.prnewswire.co.uk
Vaultize Launches Integrated Enterprise Mobility Management in... -- NEW YORK, SINGAPORE and MUMBAI, July 29, 2014 /PR Newswire UK/ --
www.technologytell.com
www.technologytell.com
Senate to Announce Extensive NSA Reform bill tomorrow | TechnologyTell
DigitalJournal.com
DigitalJournal.com
Digital Journal: A Global Digital Media Network
www.foreignpolicy.com
www.foreignpolicy.com
The NSA's Cyber-King Goes Corporate
www.forbes.com
www.forbes.com
Data Breach Bulletin: Russian Hacker Claims To Have Infiltrated Both Wall Street Journal and Vice - Forbes
www.politico.com
www.politico.com
Scoop: Trade secrets bill today – Also today: DHS adding to toolkit – First look: The costs of NSA surveillance - POLITICO Morning Cybersecurity - POLITICO.com
www.v3.co.uk
www.v3.co.uk
IT news, reviews and analysis for UK IT professionals - V3.co.uk
www.dbta.com
www.dbta.com
Zettaset Offers Big Data Security Options a la Carte - Database Trends and Applications
www.prnewswire.co.in
www.prnewswire.co.in
Vaultize Launches Integrated Enterprise Mobility Management in... -- NEW YORK, SINGAPORE and MUMBAI, July 29, 2014 /PR Newswire India/ --
www.washingtonpost.com
www.washingtonpost.com
Making ambulances safer for patients and EMTs - The Washington Post
sandiegofreepress.org
sandiegofreepress.org
San Diego’s P100 Program Targets the Poor and Vulnerable While Letting the Rich and Powerful Off the Hook
www.forbes.com
www.forbes.com
Hackers And E-Criminals Want Your E-Data: WePay Expert Sounds Off - Forbes
www.einnews.com
www.einnews.com
Six Best Practices Every Entity Needs to Know to Assure PCI Compliance - EIN News
www.einnews.com
www.einnews.com
97 Percent of Global 2000 External Servers Remain Vulnerable to Cyber Attacks Due to Heartbleed - EIN News
thefusejoplin.com
thefusejoplin.com
The Watch Dogs World – Hacking in the New Realm? - The Fuse Joplin
vpncreative.net
vpncreative.net
Big Data Against Cybercrime – The “Big” Powers and Limitations | VPN Creative
www.bsminfo.com
www.bsminfo.com
New Ransomware Strain Causes Data Breaches KnowBe4 Warns
siliconangle.com
siliconangle.com
The Internet of deadly things: IoT security almost non-existent | SiliconANGLE
www.v3.co.uk
www.v3.co.uk
Hackers hit Israeli missile defence system - IT News from V3.co.uk
www.spokesman.com
www.spokesman.com
Who watches the 'Watch Dogs'? A Review - The Tech Deck - Spokesman.com - July 29, 2014
insurancenewsnet.com
insurancenewsnet.com
Glasswall and NTT Com Security Join Forces to Eliminate the Risk of File-Based Cyber Attacks - Top News - InsuranceNewsNet.com
www.marketwatch.com
www.marketwatch.com
RackWare Brings Cloud-Based Disaster Recovery for Physical andVirtual Workloads - MarketWatch
serversforhackers.com
serversforhackers.com
Using SSL Certificates with HAProxy | Servers for Hackers
tech.firstpost.com
tech.firstpost.com
After Qualcomm, it's Microsoft's turn to face China's monopoly probe
www.virtual-strategy.com
www.virtual-strategy.com
AirTight Networks Announces Reseller Agreement with Leading Value-Added Distributor and Solutions Integrator, DataAssure | Virtual-Strategy Magazine
www.sunnewsnetwork.ca
www.sunnewsnetwork.ca
Sun News : Hackers force National Research Council Canada to shut down its computers
www.technologyreview.com
www.technologyreview.com
Researchers from Nvidia Show a Way to Quadruple the Resolution of Virtual Reality | MIT Technology Review
globalnews.ca
globalnews.ca
Chinese hackers infiltrate Canada’s National Research Council computers - National | Globalnews.ca
www.broadwayworld.com
www.broadwayworld.com
Hillstone Networks Accelerates Network Performance and Improves End-User Experience for Garratt-Callahan - BWWGeeksWorld
www.net-security.org
www.net-security.org
Android Fake ID bug allows malware to impersonate trusted apps
www.virtual-strategy.com
www.virtual-strategy.com
Six Best Practices to Assure PCI Compliance | Virtual-Strategy Magazine
www.fiercepharmamanufacturing.com
www.fiercepharmamanufacturing.com
PCI buys contract manufacturer Penn Pharma in $215M deal - FiercePharma Manufacturing
www.slideshare.net
www.slideshare.net
INFOGRAPHIC: Campuses on Cloud 9: Higher Ed IT’s Drift Towards the Cl…
www.eweek.com
www.eweek.com
Dell Panel: BYOD, IoT Increase Security Challenges
www.vancouversun.com
www.vancouversun.com
Chinese hackers break into National Research Council computers, Canadian spy agency says
www.marketwatch.com
www.marketwatch.com
Contract Announcements, Financial Results, Recognitions, and Market Activity - Research Reports on Fortinet, NeuStar, Ruckus Wireless, ChannelAdvisor and Silicom - MarketWatch
www.marketwatch.com
www.marketwatch.com
Verdasys Promotes Peter Tyrrell to Chief Operating Officer - MarketWatch
timesofindia.indiatimes.com
timesofindia.indiatimes.com
Microsoft faces monopoly investigation in China - The Times of India
www.bloggernews.net
www.bloggernews.net
» Make Information Security a Priority - Blogger News Network
www.infosecisland.com
www.infosecisland.com
"Fake ID" Android Vulnerability in Lets Malicious Apps Impersonate Trusted Apps
www.bankinfosecurity.com
www.bankinfosecurity.com
Attack Response: Before, During, After - BankInfoSecurity
www.infoworld.com
www.infoworld.com
Privacy groups call for action to stop Facebook's off site user tracking plans | Security - InfoWorld
www.broadwayworld.com
www.broadwayworld.com
DMI Recognized in Gartner Magic Quadrant for Managed Mobility Services for Second Year in a Row - BWWGeeksWorld
www.pcworld.com
www.pcworld.com
Microsoft faces anti-monopoly probe in China over Windows, Office | PCWorld
www.marketwatch.com
www.marketwatch.com
97 Percent of Global 2000 External Servers Remain Vulnerable to CyberAttacks Due to Heartbleed - MarketWatch
www.torontosun.com
www.torontosun.com
5 things the Internet has ruined | News | Tech | Toronto Sun
www.globalpost.com
www.globalpost.com
China regulator in anti-monopoly probe of Microsoft | GlobalPost
www.prnewswire.com
www.prnewswire.com
AirTight Networks Announces Reseller Agreement with Leading Value-Added Distributor and Solutions... -- MOUNTAIN VIEW, Calif., July 29, 2014 /PRNewswire/ --
www.drdobbs.com
www.drdobbs.com
Tooling Up for the Marriage of the Internet of Things, Big Data, and Cloud Computing | Dr Dobb's
www.informationweek.in
www.informationweek.in
Internet Of Things: 4 areas IT can prepare - InformationWeek – IT news & articles
www.theregister.co.uk
www.theregister.co.uk
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu • The Register
thevarguy.com
thevarguy.com
Continuity Software Launches Disaster Recovery Partner Program | Big Data Technology Solutions and Information content from The VAR Guy
www.cbronline.com
www.cbronline.com
Work with big data? Here’s how you stay within the law - Computer Business Review
timesofindia.indiatimes.com
timesofindia.indiatimes.com
Facebook scam tricking ‘users’ to reveal passwords - The Times of India
www.prnewswire.com
www.prnewswire.com
Global Digital Solutions, Inc. (GDSI) Announces New Details - And Photo... -- PALM BEACH, Fla., July 29, 2014 /PRNewswire/ --
boingboing.net
boingboing.net
Lawsuit: "Happy Birthday" is not in copyright, and Warner owes the world hundreds of millions for improperly collected royalties - Boing Boing
www.schneier.com
www.schneier.com
Schneier on Security: Conference on Deception (RSS)
www.cio.com
www.cio.com
Is the WEDG the Answer to Post-Snowden Data Paranoia? Its Inventor Remains Hopeful | CIO
drtech.bangordailynews.com
drtech.bangordailynews.com
Antivirus For Your Car! | Dr. Tech
motherboard.vice.com
motherboard.vice.com
This Handbook Explains How to Hack a Car | Motherboard
www.newswire.ca
www.newswire.ca
Absolute Software Corporation | Absolute Software Declares Quarterly Dividend
www.theguardian.com
www.theguardian.com
Chinese hackers steal Israel’s Iron Dome missile data | Technology | theguardian.com
www.net-security.org
www.net-security.org
A peek into Police Locker's distribution infrastructure
www.computing.co.uk
www.computing.co.uk
What are the most sought-after cyber security skills? - 29 Jul 2014 - Computing News
www.ibtimes.co.uk
www.ibtimes.co.uk
'Operation Emmental' Malware Campaign Targeting Banks Across Europe
www.eni.network24.co
www.eni.network24.co
Instagram mobile app vulnerable to hacking
www.wallstreetandtech.com
www.wallstreetandtech.com
Is Big Data a Problem or an Opportunity? - Wall Street & Technology
motherboard.vice.com
motherboard.vice.com
NSA Spying Will Cost US Tech Titans Billions, and That's Just the Start | Motherboard
recode.net
recode.net
At White House Natural Disaster Day, New Apps to Help Recovery | Re/code
www.apple.com
www.apple.com
Apple - MacBook Pro with Retina display - Technical Specifications
www.computing.co.uk
www.computing.co.uk
ICO warns companies over big data initiatives - 28 Jul 2014 - Computing News
www.macworld.co.uk
www.macworld.co.uk
Moving to Adobe's Lightroom from Apple's Aperture and iPhoto - How to - Macworld UK
news.sky.com
news.sky.com
Chinese Hackers 'Targeted Israel's Iron Dome'
seclists.org
seclists.org
Information Security News: Hackers Plundered Israeli Defense Firms that Built 'Iron Dome' Missile Defense System
seclists.org
seclists.org
Information Security News: Chinese cyberattack forces computer shutdown at National Research Council
www.infoworld.com
www.infoworld.com
7 indispensable project management tips | Security - InfoWorld
www.infoworld.com
www.infoworld.com
Mobile security: A mother lode of new tools | Security - InfoWorld
www.packagingnews.co.uk
www.packagingnews.co.uk
PCI acquires Penn Pharma for £127m | Packaging News | Jobs | Production | Design | Innovation
www.symantec.com
www.symantec.com
Snifula Banking Trojan Back to Target Japanese Regional Financial Institutions | Symantec Connect
gigaom.com
gigaom.com
Facebook has only “pivoted” on one kind of privacy — in other ways, it’s becoming more dangerous — Tech News and Analysis
www.infosecurity-magazine.com
www.infosecurity-magazine.com
Bring Your Own Encryption - Prevent a Data Breach and Stay out of the Headlines - Infosecurity
www.theguardian.com
www.theguardian.com
Microsoft faces monopoly investigation in China | Technology | theguardian.com
www.channelweb.co.uk
www.channelweb.co.uk
Know your mobile OS and your customer- 29 Jul 2014 - CRN UK Opinion
www.itpro.co.uk
www.itpro.co.uk
Hackers hit the European Central Bank | IT PRO
www.reuters.com
www.reuters.com
Fitch Rates Global Cloud Xchange's USD350m Bond Final 'BB+/RR1'| Reuters
seclists.org
seclists.org
Information Security News: Hackers conference celebrates one of the oldest tricks in the book: Picking locks
www.npr.org
www.npr.org
To Stop Cheating, Nuclear Officers Ditch The Grades : NPR
media.watoday.com.au
media.watoday.com.au
Hospital workers strike for answers
www.techienews.co.uk
www.techienews.co.uk
ICO issues new big data protection guidelines for UK organisations
microwire.info
microwire.info
Check Point 13800 and 21800 Gateways
www.net-security.org
www.net-security.org
Using Hollywood to improve your security program
www.net-security.org
www.net-security.org
I2P patched against de-anonymizing 0-day, Tails integration still to follow
www.infoworld.com
www.infoworld.com
Here's how to stay safe until the Tails privacy tool is patched | Security - InfoWorld
af.reuters.com
af.reuters.com
Fitch Rates Tata Steel's USD1.5bn Notes Final 'BB+'| Metals & Mining| Reuters
www.prweek.com
www.prweek.com
NSA seeks strategic comms leader | PR Week
news.techworld.com
news.techworld.com
Is the WEDG the answer to post-Snowden data paranoia? Its inventor remains hopeful - Techworld.com
vpncreative.net
vpncreative.net
Once Bitten, Twice Shy – Japan Boosts Cyber Security For 2020 Olympics | VPN Creative
indiatoday.intoday.in
indiatoday.intoday.in
Intelligence Bureau notifies recruitment at 27 posts : Government Jobs
www.sciencedaily.com
www.sciencedaily.com
Total darkness at night key to success of breast cancer therapy, study shows -- ScienceDaily
www.securitytube.net
www.securitytube.net
Network Pentesting - Pentesting Windows Endpoints: Hidden Bind Shell Payload
www.realwire.com
www.realwire.com
Six Best Practices to Assure PCI Compliance
www.businesscomputingworld.co.uk
www.businesscomputingworld.co.uk
The Cost Of Failing To Protect IT Infrastructures | BCW
www.ctvnews.ca
www.ctvnews.ca
Chinese cyberattack forces computer shutdown at National Research Council | CTV News
betanews.com
betanews.com
Tech startups working to protect your privacy
www.virtual-strategy.com
www.virtual-strategy.com
A Dynamic Introduction to Cybersecurity | Virtual-Strategy Magazine
www.net-security.org
www.net-security.org
Android ransomware attacks on the increase
www.net-security.org
www.net-security.org
AV engines are riddled with exploitable bugs
www.whatech.com
www.whatech.com
Speaker at Upcoming Cyber Security Event to Use Sci-Fi to ExamineReal-World Security Vulnerabilities - WhaTech
www.toptechnews.com
www.toptechnews.com
Will OS X Yosemite Bring More Grief for Apple? - Applications on Top Tech News
www.sectechno.com
www.sectechno.com
Nasty Snifula Trojan starts targeting users in Japan | SecTechno
continuitycentral.com
continuitycentral.com
International tensions heighten cyber security risks: KPMG
www.cayman27.com.ky
www.cayman27.com.ky
RCIPS issues email hacking warning - Cayman 27
www.compasscayman.com
www.compasscayman.com
Email hackers target Cayman bank accounts :: Cayman Compass
www.net-security.org
www.net-security.org
The value of Bring Your Own Identity
www.securityfocus.com
www.securityfocus.com
WordPress Vitamin Plugin 'path' Parameter Multiple Remote File Disclosure Vulnerabilities (RSS)
www.gamerheadlines.com
www.gamerheadlines.com
AVG Free AntiVirus, why you should consider it for your devices
www.it-director.com
www.it-director.com
Data Classification, it's a people thing! | The Norfolk Punt
www.av-test.org
www.av-test.org
AV-TEST | 17 software packages in a repair performance test after malware attacks | Comparative tests of antivirus software for Windows and reviews of anti-malware Apps for Android
ibnlive.in.com
ibnlive.in.com
China launches probe against Microsoft, orders raids - IBNLive
www.holdthefrontpage.co.uk
www.holdthefrontpage.co.uk
Regional publishers take phone-hacking claims into account - Journalism News from HoldtheFrontPage
www.nextgov.com
www.nextgov.com
Hacker Breached NOAA Satellite Data from Contractor’s PC - Nextgov.com
www.thestar.com.my
www.thestar.com.my
Russia-based Infowatch seeking to implement 20 projects in Malaysia - Business News | The Star Online
www.wsws.org
www.wsws.org
Action “unlikely” against police officers involved in UK secret spying operation - World Socialist Web Site
www.itnews.com.au
www.itnews.com.au
NICTA open sources seL4 secure OS - Software - News - iTnews.com.au
www.cio-today.com
www.cio-today.com
Gartner Rates Security Solutions in Annual Magic Quadrant Report - Enterprise Software on CIO Today
mainichi.jp
mainichi.jp
Steel mill worker reveals blocking view of U.S. aircraft on day of Nagasaki atomic bombing - 毎日新聞
www.securitytube.net
www.securitytube.net
Appseceu 2014 - Maty Siman - Warning Ahead Security Stormsare Brewing In Your Javascript
www.net-security.org
www.net-security.org
Whitepaper: Virtual patching
recode.net
recode.net
Man & Machine: Why Security Needs a Human Touch | Re/code
www.businessweek.com
www.businessweek.com
Tech Companies Reel as NSA's Spying Tarnishes Reputations - Businessweek
www.owensoundsuntimes.com
www.owensoundsuntimes.com
Microsoft targeted in Chinese antitrust probe? | Owen Sound Sun Times
matt.might.net
matt.might.net
Sculpting text with regex, grep, sed and awk
koreajoongangdaily.joins.com
koreajoongangdaily.joins.com
Local activists file suit against Google-INSIDE Korea JoongAng Daily
www.bloomberg.com
www.bloomberg.com
Tech Companies Reel as NSA Spying Mars Image for Clients - Bloomberg
www.standard.co.uk
www.standard.co.uk
Phone hacker Dan Evans spared jail after cutting deal over prosecution of Andy Coulson - Crime - News - London Evening Standard
www.symantec.com
www.symantec.com
Protection from Computer Viruses - Software Security - Latest Threats | Security Response
www.gsnmagazine.com
www.gsnmagazine.com
Mace Security International partners with Pangaea Services and contributes $100,000 to crowd fund the Defender | Government Security News
www.theregister.co.uk
www.theregister.co.uk
Israel's Iron Dome missile tech grasped by Chinese hackers • The Register
time.com
time.com
Unexpected Microsoft Probe Highlights China’s Distrust of U.S. Tech - TIME
www.craveonline.com
www.craveonline.com
Watch These Australian Hackers Play Doom On An ATM
www.theguardian.com
www.theguardian.com
QR codes for the homeless? Why hackers' naivety is still a force for good | Leigh Harris | Comment is free | theguardian.com
tech.firstpost.com
tech.firstpost.com
China launches probe against Microsoft, orders raids - Tech2
www.fortmcmurraytoday.com
www.fortmcmurraytoday.com
Microsoft targeted in Chinese antitrust probe? | Fort McMurray Today
www.financialexpress.com
www.financialexpress.com
China launches raids against Satya Nadella-led Microsoft Corporation, orders probe - Financial Express
www.theregister.co.uk
www.theregister.co.uk
Google Maps community competition falls foul of Indian regulations • The Register
www.securitytube.net
www.securitytube.net
Appseceu 2014 - Simon Bennetts - Owasp Zap Advanced Features
www.techworld.com.au
www.techworld.com.au
NICTA pushes seL4 microkernel beyond drones - Techworld
www.reuters.com
www.reuters.com
JD.com to sell Microsoft's Xbox One games console in China| Reuters
www.sciencewa.net.au
www.sciencewa.net.au
Algae under threat from invasive fish
www.streetwisetech.com
www.streetwisetech.com
Microsoft Security Essentials vs AVG vs Avast - Securing your Windows XP - Street Wise Tech
www.theregister.co.uk
www.theregister.co.uk
Israel's Iron Dome missile tech plundered by Chinese hackers • The Register
www.zdnet.com
www.zdnet.com
Cloud security: Are firms still fretting about the wrong issues? | ZDNet
www.scmagazine.com
www.scmagazine.com
Malware used to compromise payment cards at Wendy's restaurant in Michigan - SC Magazine
www.theguardian.com
www.theguardian.com
The internet of things - the next big challenge to our privacy | Technology | theguardian.com
www.chathamdailynews.ca
www.chathamdailynews.ca
Microsoft targeted in Chinese antitrust probe? | Chatham Daily News
www.belfasttelegraph.co.uk
www.belfasttelegraph.co.uk
Publisher Trinity Mirror sets aside millions for phone hacking allegations - BelfastTelegraph.co.uk
www.csoonline.com
www.csoonline.com
Georgia Tech launches early warning system for cyberthreats | CSO Online
blog.samaltman.com
blog.samaltman.com
Uber vs Car Ownership - Sam Altman
www.securitytracker.com
www.securitytracker.com
Cisco Prime Data Center Network Manager Input Validation Flaw Permits Cross-Site Scripting Attacks - SecurityTracker (RSS)
thehill.com
thehill.com
House passes measure to boost federal agency website security | TheHill
www.asianage.com
www.asianage.com
Sudden goverment official visits at Microsoft’s factories in China | The Asian Age
www.prweb.com
www.prweb.com
InterGuard Adds Log Management and SIEM
www.mydigitalfc.com
www.mydigitalfc.com
Flex IT | mydigitalfc.com
www.scmagazine.com
www.scmagazine.com
Firefox 32 feature could cut undetected malware downloads 'in half' - SC Magazine
www.radioworld.com
www.radioworld.com
Radio World: Strengthening Cyber Security Has Urgency, Notes FCC
www.digitaltrends.com
www.digitaltrends.com
Microsoft Offices Get Surprise Visits From Chinese Govt | Digital Trends
www.chinatopix.com
www.chinatopix.com
Chinatopix
www.reuters.com
www.reuters.com
Microsoft targeted in apparent Chinese antitrust probe| Reuters
packetstormsecurity.com
packetstormsecurity.com
Parallels Tools 9.0 Privilege Escalation ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
SQLmap Cheatsheet 1.0 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
HP Security Bulletin HPSBGN02936 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Oxwall 1.7.0 Cross Site Request Forgery / Cross Site Scripting ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Oxwall 1.7.0 Remote Code Execution ≈ Packet Storm
bitcoinjs.org
bitcoinjs.org
BitcoinJS
siliconangle.com
siliconangle.com
3 options to build private clouds with public cloud perks | SiliconANGLE
packetstormsecurity.com
packetstormsecurity.com
dtSearch Desktop Untrusted Library Loading Execution ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Sagem F@st 3304-V1 Denial Of Service ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
CMSimple 4.4.4 RFI / Code Execution / Default Password ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Barracuda Networks Spam / Virus Firewall 5.1.3 XSS ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
DirPHP 1.0 Local File Inclusion ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Gentoo Linux Security Advisory 201407-05 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Debian Security Advisory 2990-1 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Debian Security Advisory 2991-1 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Red Hat Security Advisory 2014-0949-01 ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
ZeroCMS 1.0 Cross Site Scripting ≈ Packet Storm
packetstormsecurity.com
packetstormsecurity.com
Ground Zero Summit (G0S) 2014 Call For Papers ≈ Packet Storm
www.washingtontimes.com
www.washingtontimes.com
EDITORIAL: The tickled pink states - Washington Times
www.thebaynet.com
www.thebaynet.com
Calvert Democrats rally at park - Southern Maryland News
blog.fortinet.com
blog.fortinet.com
Fortinet Blog | News and Threat Research Changes in the Asprox Botnet
www.techtimes.com
www.techtimes.com
HTC One M8 gets a KitKat update : PERSONAL TECH : Tech Times
www.business2community.com
www.business2community.com
6 Ways to Boost Safety of Your Business’ Mobile Products
www.zdnet.com
www.zdnet.com
Mobility, BYOD and Dell, oh my! | ZDNet
blog.ontoillogical.com
blog.ontoillogical.com
How to take over the computer of any Java (or Clojure or Scala) developer - Ontoillogical
www.securitytube.net
www.securitytube.net
Appseceu 2014 - Gergely Revay - Security Implications Of Cross-Origin Resource Sharing
tools.cisco.com
tools.cisco.com
Alert Details - Security Center - Cisco Systems
silvertonconsulting.com
silvertonconsulting.com
Replacing the Internet? | RayOnStorage Blog
blogs.technet.com
blogs.technet.com
The Cybersecurity Risk Paradox: Measuring the Impact of Social, Economic, and Technological Factors on Cybersecurity - Microsoft Security Blog - Site Home - TechNet Blogs
www.techtimes.com
www.techtimes.com
Microsoft China offices get unexpected visit from regulators : PERSONAL TECH : Tech Times
timesofindia.indiatimes.com
timesofindia.indiatimes.com
Chinese officials pay surprise visit to Microsoft offices - The Times of India
dissenter.firedoglake.com
dissenter.firedoglake.com
Congressman Grayson Requests Answers from Clapper on NSA’s Weakening of Encryption Standards | The Dissenter
www.slideshare.net
www.slideshare.net
DATASHEET: Backup Exec 2014 V-Ray Edition
vpncreative.net
vpncreative.net
Hackers Sneak Back into AWS for DDoS Launch Hub | VPN Creative
economictimes.indiatimes.com
economictimes.indiatimes.com
China launches probe against Microsoft, orders raids - The Economic Times
blogs.avg.com
blogs.avg.com
What Boomers can teach Gen Y about social media
www.scmagazine.com
www.scmagazine.com
EFF asks court to find NSA internet spying a violation of Fourth Amendment - SC Magazine
technet.microsoft.com
technet.microsoft.com
Bring Your Own Device (BYOD) Design Considerations Guide
mil-embedded.com
mil-embedded.com
Ada Watch: Bringing Ada onto the battlefield - Military Embedded Systems
www.voxy.co.nz
www.voxy.co.nz
86% of critical infrastructure providers breached - research | Voxy.co.nz
techday.com
techday.com
Techday – New Apple acquisition… All’s Swell that ends Swell?
krebsonsecurity.com
krebsonsecurity.com
Hackers Plundered Israeli Defense Firms that Built ‘Iron Dome’ Missile Defense System — Krebs on Security
www.washingtonpost.com
www.washingtonpost.com
President Obama’s competence problem is worse than it looks - The Washington Post
www.afr.com
www.afr.com
Microsoft offices visited by Chinese antitrust authorities
insurancenewsnet.com
insurancenewsnet.com
Combine Solicitation - Vault Intrusion Detection System - Top News - InsuranceNewsNet.com
www.nola.com
www.nola.com
Brain-eating amoeba cases, including St. Bernard death, examined by website | NOLA.com
www.scmagazine.com
www.scmagazine.com
Companies accused of peddling bogus AV ordered to pay $5.1M - SC Magazine
www.infoworld.com
www.infoworld.com
Another botched Microsoft patch: Office 365 ProPlus says 'Something went wrong' | Office software - InfoWorld
www.infoworld.com
www.infoworld.com
Surface Pro 3 problems linger despite three firmware patches in a month | Tablets - InfoWorld
www.infoworld.com
www.infoworld.com
Cyber criminals ride Google coattails in DDoS attacks | Security - InfoWorld
blog.trendmicro.com
blog.trendmicro.com
The Role of Smartphones in the Internet of Everything
www.scmagazine.com
www.scmagazine.com
Bug in MailPoet plugin exploited to compromise thousands of WordPress sites - SC Magazine
www.securityfocus.com
www.securityfocus.com
Linux Kernel SCTP NULL Pointer Dereference Denial of Service Vulnerability (RSS)
www.securityfocus.com
www.securityfocus.com
Cisco Prime Data Center Network Manager CVE-2014-3329 Cross Site Scripting Vulnerability (RSS)