Archives for December 2015

#SecureTheVillage: The Rise Of Community-Based Information Security – DARKRreading ow.ly/WoMh9

#CitadelOnSecurity: Weekend Vulnerability and Patch Report, December 27, 2015 – Citadel Information Group ow.ly/WlYuD

#CitadelOnSecurity: Cyber Security News of the Week, December 27, 2015 – Citadel Information Group ow.ly/WlYcY

#CyberMisc: Steptoe Cyberlaw Podcast – Interview with Mike Daugherty | Steptoe Cyberblog ow.ly/WjXIp

#CyberMisc: Steptoe Cyberlaw Podcast – Interview with Rod Beckstrom | Steptoe Cyberblog ow.ly/WjXFu

#CyberCrime: 2015 Ransomware Wrap-Up – DARKReading ow.ly/WjXt4

#CyberWarning: Business Email Compromise – Security Vendors Report Uptick in Whaling, Phishing Scams – DARKReading ow.ly/WjXjJ

#CyberLaw: Obama Signs Cyberthreat Information Sharing Bill – BankInfoSecurity ow.ly/WjXb3

#NationalCyberSecurity: Who Backdoored Juniper’s Code? – BankInfoSecurity ow.ly/WjX1v

#CyberThreat: Survey: When Leaving Company, Most Insiders Take Data They Created – DARKReading ow.ly/WjWOw

#CyberThreat: A Hidden Insider Threat: Visual Hackers – DARKReading ow.ly/WjWMX

#CyberMisc: ESET predictions and trends for cybercrime in 2016 ow.ly/WjWfX

#CyberLawEnforcement: Cyber crime investigation challenges – San Diego in crosshairs of hackers | SanDiegoUnionTribune.com

#CyberPrivacy: Apple Pushes Against British Talk of Softening Encryption – The New York Times ow.ly/WjW0j

#CyberLaw: How the Cybersecurity Act of 2015 changes the Internet surveillance laws – The Washington Post ow.ly/WjVNn

#CyberMisc: 2015: The Year That Was in Information Security | GoCertify ow.ly/WjVnw

#CyberSecurityMgmt: 5 information security trends that will dominate 2016 | CIO ow.ly/WjVeM

#CyberMisc: Raspberry Pi was offered money for installing malware on their computers » TechWorm ow.ly/WjUSs

#CyberCrime: The Year’s 11 Biggest Hacks, From Ashley Madison to OPM | WIRED ow.ly/WiKlr

#CyberWarning: The Top Three Online Security Menaces You Should Worry About In 2016 – Fast Company ow.ly/WiKfh

#CyberLaw: Oracle, LifeLock Settle FTC Deception Charges — @krebsonsecurity ow.ly/WiK1G

#CyberDefense: Two Factor Auth List: List of websites and whether or not they support 2FA. ow.ly/WiJWQ

#CyberDefense: Expect Phishers to Up Their Game in 2016 — @krebsonsecurity ow.ly/WiJNq

#CyberCrime: Malware-Driven Card Breach at Hyatt Hotels — @krebsonsecurity ow.ly/WiJFt

#CyberSunshine: U.S. Arrests Hacker; Allege He Stole IDs and Unreleased Scripts From Host of Celebrities – NY Times ow.ly/WfLz0

#CyberPrivacy: How to Destroy a Hard Drive–Permanently – Scientific American ow.ly/W9F5y

#CyberDefense: Juniper updates list of vulnerable enterprise firewall OS versions | InfoWorld ow.ly/WbSwh

#CitadelOnSecurity: Weekend Vulnerability and Patch Report, December 20, 2015 – Citadel Information Group ow.ly/W8UW1

#CitadelOnSecurity: Cyber Security News of the Week, December 20, 2015 – Citadel Information Group ow.ly/W8UT6

#CyberWarning: Outlook “letterbomb” exploit could auto-open attacks in e-mail | Ars Technica ow.ly/W7Dgs