SANS Database 3

SANS Database - Úvod  1  2  3  4  5  6  7  8

Poslední aktualizace v 06.07.2017 15:53:27

 

David Rice introduces his course SEC 616, Defensible .NET
David Willetts: UK firms need to 'fess up to security boobs
Daylight Saving Time 
DB2 10 and DB2 9 for z/OS Product Publication refreshes for April 2013
DB2 10 and DB2 9 for z/OS Product Publications refreshes for November 2012
DB2 10 HADR Multiple Standby's
DB2 10, DB2 9, and DB2 V8 Product Publications have been refreshed for April 2012
DB2 Editions and Features
DB2 for LUW Continues to Mature -- MONREPORT Reporting Module
DB2 LUW -- Hide SQL Body with GET ROUTINE and PUT ROUTINE
DB2 Resource Constraint Analysis -- Continued (3)
DDoS Attackers, Network Defense Firms Record Banner Year
DDoS crooks: Do you want us to blitz those phone lines too?
DDOS is down, but still a concern for ISPs
Deadly Device Hacks May Be Coming Soon
Dean Kamen Invents Stomach Pump For Dieters
Death Knell For Righthaven In 9th Circuit Decision
Debian development server compromised 
Decade Old KDE Bug Fixed
December 2015 Microsoft Patch Tuesday
December 2016 Patch Tuesday Brief and Updates
Declassified LBJ Tapes Accuse Richard Nixon of Treason
Decoding malware 
Decoding Pseudo-Darkleech (#1)
Decoding Pseudo-Darkleech (Part #2)
Deep Rants; CYA from botnets to phisherZ ; Malware Acquisition postponed 
Defacement Contest 
Default ‘Do Not Track’ Is Best Choice for Internet Explorer 10 Users
Default Password in Cisco MARS 
Defcon, vendor-hacker-shmoozing, and Storm Center Handlers in the Desert 
Defeating A/V by inserting forged data 
Defense Distributed Has 3D-Printed an Entire Gun
Defense chief calls cyberspace battlefront of the future
DefenseCode turns up Linksys zero-day
Defining Threat Intelligence Requirements
deja vu - "25 new unpackers added in one week" 
Deja Vu - Advances in Rootkit malware 
Deja Vu - PHP(BB) attack increase reports 
Deja Vu - Request for W32.Pasobir Malware Sample 
Deja Vu - Snow.A 
Deja Vu - worm attacks Windows and Windows Mobile powered devices 
Delays on Windows Update & the Death of SUS 
Delhi - [ Min 26.4 °C
Delhi - [ Min 26.6 °C
Delhi - [ Min 31.4 °C
Dell Buys Enstratius, Extends Cloud Reach
Derangement with an Exclamation Mark
De-registering vgx.dll in an enterprise 
Design Spec: Design Overview
Design Specification : Conversion Specifications
Design Specification : User Help Design
Design Spec–System Test Specifications
Despite new security in Galaxy S4, BlackBerry remains king
Detecting attacks against servers 
Detecting BlackWorm Without Signatures 
Detecting DNS Tunneling
Detecting file changes on Microsoft systems with FCIV
Detecting Random - Finding Algorithmically chosen DNS names (DGA)
Detecting XCodeGhost Activity
Detection and Deployment Guidance 
Determining Sun Java Vulnerability 
Developer wins appeal - code is not physical property
Development timeline key to linking Stuxnet, Flame malware
Device Sniffs Out Signs of Life After Disasters
Devs cook up 'leakproof' all-Tor untrackable platform
DHCP exploit publicly available (MS06-036) 
DHCP OS Fingerprinting 
DHS Can Seize Your Electronics Within 100 Mi.of US Border, Says DHS
DHS wants your comments. 
DHS warns of vulns in hospital medical equipment
DHS, FBI Warn of Denial of Service Attacks on Emergency Telephone Systems
DHS: America's water and power utilities under daily cyber-attack
Diary Update for Cisco Greeting and ARCserve Exploits and Scanner; Regular Diary: Kismet / Metasploit / New Buffer overflows ARCserve/ New Nigerian Scam / Google update / PwStealers project / Power Ou 
Diary Updates- Got WINS Packets - Brazil Welcomes You - Framed! - Mailbag 
Dick Parry: Culture change
Did Internet Sales Tax Backers Bribe Congress? (Video)
Did Sweden Pay Cambodia For the Pirate Bay Co-founder?
Did Syrian hackers take over The Onion's Twitter account?
Did you know there was a bunch of other stuff announced last week?
Did you know you can make DB2 LOAD run faster?
Did ZDI snub your 0-day attack? Packet Storm will buy it for $7k
Different strokes for different folks, spyware and browsers 
Different ways of looking at security bugs
Digg Hints Its Replacement For Google Reader Will Include Social Media Content
Digital Citizenship Toolkit - Brochures, Factsheets & Tip Cards
Digital Pen Vibrates To Indicate Bad Spelling, Grammar and Penmanship
Director General of BBC Resigns Over "Poor Journalism"
Disaster Recovery Lessons You Might Have Missed
Disaster Recovery Starts with a Plan
Discourse: Next-Generation Discussion/Web Forum Software
Discovery of Early Human Tools Hint at Earlier Start
Dish on national security PR offensive against SoftBank
Disney sitcom says open source is insecure
Distributed FTP Brute Force Scans - Is radmin back? 
Distributed FTP/Port 21 scan follow-up; Port 23 scan increases; 
DNA barcodes leap out of the lab
DNS abnormalitities 
DNS and DHCP Recon using Powershell
DNS cache poisoning again! 
DNS Cache Poisoning Again; InfoCon Alert Status Calibration; NIST HIPAA Guide 
DNS cache poisoning, again. 
DNS Changer goes away on July 9th, 2012
DNS Misbehaving 
DNS problems at Network Solutions; Potential Problems with MS05-019; Filtering SSL 
DNS problems? 
DNS Reconnaissance using nmap
DNS Snort Signatures; Acrobat Reader Vuln;TCP Port 1025 Traffic; Excellent DNS Article 
DNS vulnerability announced by NISCC today 
DNSChanger Shutdown, Despite Laggards, Is a Good Thing
Do Extortionists Get Paid?
Do I have requirements for a separate business process flow
Do Insecure Open Source Components Threaten Your Apps?
Do we Know our enemy? 
Do We Need a Longer School Year?
Do you find a Redbook useful?
Dockerized DShield SSH Honeypot
DoD Descends On DEFCAD
Does it Matter If You Cover Your Webcam?
Does Scientific Literacy Make People More Ethical?
DOJ asks FCC to delay Sprint-Softbank review
DOJ, MIT, JSTOR Seek Anonymity In Swartz Case
Dolphins Can Sleep One-half of Their Brain At a Time Say Researchers
Domain Hi-jacking Nightmare 
Domain registrar attacked, customer passwords reset
Domaincop malpsam
Dominion Announces Plans To Close Kewaunee Nuclear Power Station In 2013
DommJuice variant / AOL IM issue / ISC webcast / Microsoft Patches 
Donations for Katrina victims - be careful 
Don's Halloween Trick 
Don't Build a Database of Ruin
Don't buy that security software!
Don't launch that file Adobe Reader!
Doomjuice/MyDoom.C, Sharp Increase in port 445 and 139 scans 
DoS Exploit for MS05-053 released 
DoS exploit publicly released for Cisco Aironet AP 
DoS from 127.0.0.1; Server compromise at gnome.org; Netsky.P still spreading 
Dotcom says new site legal, no revenge for Megaupload saga
Doubleclick DDoS'd, W32.Zindos.A Microsoft DoS, FXMYDOOM Feedback 
Download.Ject Detection and Recovery -- New Phishing Attack Technique 
Draft Computer Fraud and Abuse Act Update Expands Powers and Penalties
Dremel-Based Project Accepted As Apache Incubator
Dridex malspam example from January 2016
Driver Trapped In Speeding Car At 125 Mph
Driver Update Addresses Radeon Frame Latency Issues
Drone security project to go open source
Drone Swarm Creates Star Trek Logo In London Sky
Dropbox gets a black eye in spam attack
Dropbox Phishing via Compromised Wordpress Site
Drupal Wishlist Module Cross Site Scripting Vulnerability
Drupal.org & group.drupal.org password disclosure, (Thu, May 30th)
Drupal.org User Accounts Compromised
Drupal's Creator Aims For World Domination
DSD's 'don't be stupid' mitigation strategies still work
Dshield down, Sun releases Solaris 10, Bots new?, Some links, Vuln in Skype 
DShield is Famous 
DSL Modem Flaw Lets Attackers Infect Millions of Computers in Brazil
DST Cisco Surprise 
Dual-Booting PengPod Tablet Can Run Linux/Android
Duke Nuken 3D</em> Code Review
DUNZIP32.dll Buffer Overflow 
Duqu malware resurfaces after five-month holiday
Dutch Architect Plans 3D Printed Building
Dutch Bill Seeks To Give Law Enforcement Hacking Powers
Dutch police arrest 17-year-old suspected of breaching hundreds of KPN servers
Dwindling Server Market?
Dyn.com DDoS Attack
Dynamic SQL Performance Tuning -- Continued (3)
e Equals One, Not MC-Squared
e H Roundup - Java vulnerability, Fedora 18 and Red October
EA Is the Game Company Disney Was Looking For
EA Makes Minor Tweaks To FIFA 12 For the Wii, Releases It As FIFA 13
Early Discussions of Computer Security in the Media 
Early vote count in Iran gives Rowhani wide lead
Easter Eggs FUN to find in your yard, BAD to find in your software. 
Eavesdropping on Bluetooth Headsets
eBay CISO receiving security industry lifetime achievement award
ebay.co.uk 
eBay/Paypal Phishing; Shame on that prophet; iframeDOLLARS; Cyber Extortion; OSX hardening; Incident Responder Analysis Tools 
EC Software Help & Manual 'ijl15.dll' DLL Loading Arbitrary Code Execution Vulnerability
Educational Linux Distro Provides Tech-Bundle For Kids and Educators
Edward Tufte's Defense of Aaron Swartz and the "Marvelously Different"
EE.UU. culpa a Irán de ciberataques
eEye Releases Free Scanner for MS06-040 
eEye Upcoming Advisory - both uses and abuses Symantec security applications 
EFF Jumps In To Defend Bloggers Being Sued By Prenda
EFF Resumes Accepting Bitcoin Donations After Two Year Hiatus
EFF Sues to Block New Internet Sex-Offender Law
Effective File Search (EFS) DLL Loading Arbitrary Code Execution Vulnerability
EFI rootkit for Macs demonstrated
E-Gold Scams 
Egyptian Forces Capture 3 Divers Trying To Cut Undersea Internet Cable
Eight People Charged in International Cybercrime Scheme (June 12 & 13, 2013)
Einstein Letter Critical of Religion To Be Auctioned On EBay
Election poll shot down by DDoS-ers
Election Security Risks, Potential Voting Failures Loom
Eliminating 911 Misdials in Your MLTS/PBX
Elon Musk Lays Out His Evidence That NYT Tesla Test Drive Was Staged
Elon Musk Will Usher In the Era of Electric Cars
Email attachment vector for IE createTextRange() Remote Command Execution 
Email From Beyond - Tell us your own Halloween stories 
Email from Guy Rosen at Blue Security 
Email hacks router
Email Ploy;Cisco Password Leak Source;Cisco CCO Password Reset Reply-To Spoof Concern;Patch Tuesday Preview;Windows 2000 SP4 Rollup 1 Re-Release 
Emails Sent To The Handlers 
E-mails with malicious links targeting Australia 
Embedded systems vendors careless says Metasploit author
Embedded systems vendors careless says Metasploit author HD Moore
Embotics Tackles Virtual Machine Management With V-Commander
EMC IRM License Server DoS Server 4.6.1.1995
EMC Navigates the IT Transformation Waters
EMC vuln gives mere sysadmins the power of storage admins
EMCworld 2013: VIPR, ONTAP, and the hidden burden of software-defined storage
EMET 5.5 Released
Empty emails? 
Emscripten Compiler Gets Optimizations, Now Self-Hosting
Encryption of "data at rest" in servers
End of passwords' predictions are premature - Cambridge boffin
Energy assets in front line of cyber war
Energy Production Is As 'Dirty' As Ever
e-netprotections.su ?, (Fri, May 17th)
Enforcing USB Storage Policy with PowerShell
English May Have Retained Words From an Ice Age Language
Enhancing pentesting recon with nmap
ENISA recommends "assume all PCs are infected"
Ensuring that mobile applications are truly secure, part 2
Enter the Trial in Steubenville, Where the Cast Is Not Merely Football Players
Enterprise Architecture state and causes (v)
Enterprise Architecture state and causes in ten points
Enterprise Architecture state and causes, (ii)
Enterprise Architecture supports business methods application rather than replaces them
Entertaining Bug in Microsoft Word 
Entire Cities In World of Warcraft Dead, Hack Suspected
Entries Open For First Ever 24-Hour Raspberry Pi Hackathon
EP.net DNS Survey 
EPA Makes a Rad Decision
EPA Report That Lowers Methane-Leak Estimates Further Divides Fracking Camps
EPA: No Single Cause For Colony Collapse Disorder
Epic and Mozilla Bring HTML5 OpenGL Demo To the Browser
Eric Cowperthwaite: Connect the dots
Erlang Getting Too-Big-To-Fail Process Flag
Ernesto domain name registrations up 
ERP on the move
ERP Orchestration
ERP Selection and Implementation: It's All in the Timing
ERP Systems: Where E = Education
Errata, Mea Culpa, "latest" "Date released" and "Date Published" 
Escaping the P2P-induced alert onslaught 
Espionage - How Things Have Changed
E-Sports League Stuffed Bitcoin Mining Code Inside Client Software
Essays Related to NSA Spying Documents
Ethereal Advisory 
Ethereal becomes Wireshark 
Ethereal Security Issue 
Ethereal Vulnerabilities / NetSky.P 
Ethereal Vulnerability 
Ethics / SSH brute forcing continues 
Etsy Is Trying to Pop Silicon Valley's Meritocracy Bubble
Etymology; Homographic Attacks; and other BIG words 
EU Antitrust Chief: Google "Diverting Traffic" & Will Be Forced To Change
EU Authorities To Demand Reversal of Google Privacy Policy
EU Calls for Unified Approach to Allocating "White Space" Spectrum
EU Court Asked To Rule On Private Copying
EU Data Protection Proposal Taken Word For Word From US Lobbyists
EU duties on Chinese solar panels losing member: state support
EU Passes Resolution Against ITU Asserting Control Over Internet
EU Privacy Watchdog To ICANN: Law Enforcement WHOIS Demands "Unlawful"
EU regulators side with Microsoft in IE10's 'Do Not Track controversy
EU says ready to launch trade dispute over China telecoms
EU Set To Charge Microsoft Over Ruling Breach
EU To Ban Neonicotinoid Insecticides
European Commission Launches $12 Billion Chip Support Campaign
European hackers suspected in Utah Medicaid files breach
European Parliament Decides Not To Ban Internet Porn
Even Windows 8 Users Prefer Windows 7
Everyday is April Fools Day in your Mailbox 
Everything old is new again - Blackhole exploit kit since November 2015
Evidence for Unconscious Math, Language Processing Abilities
evilcode.class, (Sun, Mar 25th)
Evildoers can now turn all sites on a Linux server into silent hell-pits
Evolutions in the honeypot/honeynet arena 
Example of Getting Analysts & Researchers Away
Excel Issue Scorecard 
Excel new vuln FAQ 
Ex-CIA Director Sees New Phase Of Warfare Where Cyberweapons Create Physical Destruction (March 4, 2012)
EXCLUSIVE - Microsoft, Symantec disrupt cyber ring, halt searches
Exclusive: Huawei CFO linked to firm that offered HP gear to Iran
Exclusive: Japan's Sharp cuts iPad screen output
Exclusive: Microsoft, FBI take aim at global cyber crime ring
Ex-Employee Busted For Tampering With ERP System
eXchange POP3 
Ex-Marine Detained For Facebook Posts Deemed "Terrorist in Nature"
Experiment Will Determine Dinosaur's Skin Color
Experts finger disk-wiping badness used in S Korea megahack
Experts: Iran and North Korea are looming cyberthreats to U.S.
Experts: Network security deteriorating, privacy a lost cause
Exploit #2 released for for Windows Services Insecure ACLs Local Privilege Escalation 
Exploit Attempts for Drupal RESTWS .x Module Vulnerability
Exploit Available For Cisco IKEv1 and IKEv2 Buffer Overflow Vulnerability
Exploit available for MS05-011, Rumored spikes in 445 scanning 
Exploit circulating for newly patched Oracle bug 
Exploit Code for MS05-047 
Exploit code reported for CVS Vulnerability 
Exploit for Cisco Vulnerabilities Released 
Exploit for Snort BO available! 
Exploit Kits are a mess, (Sun, May 13th)
Exploit o' the day: DROWN
Exploit: NCMedia Sound Editor Pro v7.5.1 SEH&DEP
Exploiting (pretty) blind SQL injections
Exploits Available For MS04-11 Vulns – **PATCH NOW** 
Exploits for most recent Microsoft Patches 
Exploits for new microsoft vulnerabilities. 
Exploits in the wild for several PHP-based web apps 
Explosive Detecting Devices Face Off With Bomb Dogs
Exposing the Machinery of the Resistome
Exposure to Backlit Displays Reduces Melatonin Production
Extending the range
Extracting Malware Transmitted Via Telnet
Extracting pcap from memory 
Extracting Shellcode From JavaScript
EyeRing Could Help Blind People See Objects
Facebook acquires Face.com
Facebook Adds Privacy, Security Controls for Page Administrators
Facebook and physicians: Not good medicine
Facebook attacked with credential-harvesting malware
Facebook Banter More Memorable Than Lines From Recent Books
Facebook Begins Eliminating Fake Likes, Page Fan Counts Drop
Facebook Enables HTTPS By Default for North America
Facebook Faces High-Level Staff Exodus
Facebook gets freakier with Take This Lollypop
Facebook hacker comes clean on 'what really happened'
Facebook joins Google in warning DNSChanger victims
Facebook Joins Linaro Linux-on-ARM Effort
Facebook 'Likes' Used to Predict Personality Traits, Social Preferences
Facebook offers just a week of free Android AV
Facebook proposes more changes to privacy policy
Facebook Pushes Back Against Employers Wanting Passwords
Facebook scammers host Trojan horse extensions on the Chrome Web Store
Facebook SDK hole leaves accounts vulnerable
Facebook Sued By Rembrandt IP For Two Patent Violation
Facebook Switching To HTTPS By Default
Facebook Tests 'Want' Button To Hoard User Data, Save Its Stock Price
Facebook warns employers not to ask job applicants for log-in credentials
Facebook's Hackathons Get a Rethink
Factbox: Key companies in the phablet space
Failure Is An Option
Fake Adobe Flash Update OS X Malware
Fake Android antivirus app likely linked to Zeus banking Trojan, researchers say
Fake fingers fool Brazilian biometrics
Fake Chrome update for Android
Falling Windows RT Tablet Prices Signify Slow Adoption
False positive on sfc.dll 
Famed Hacker Guilty of 'Stealing' iPad User Data
Family News Network of the ICRC - Hurricane Katrina 
Fans Bring Back Half Life Game Series: Black Mesa Mod Launches 9/14
Fantastic js1k Submissions
FAQ on PowerPoint 0-day 
FAQ: Flame, the "super spy"
Farewell 6Bone 
FAST MOVING EMAIL VIRUS, More IE scripting concerns 
Fast-Food Logos Burned Into Pleasure Center of Children's Brains
FBI Agent's Laptop 'Hacked' To Grab 12 Million Apple IDs - UPDATED
FBI could be shutting down 13800 UK internet connections
FBI denies hackers' claims on Apple data
FBI denies leak of Apple codes
FBI frets about dumb security in smart meters
FBI Launches $1 Billion Nationwide Face Recognition System
FBI Looking Into HP's Charges Against Autonomy [REPORT]
FBI says Apple ID heist claim is TOTALLY FALSE
FBI: Cyberattacks could shove aside terrorism as No. 1 threat to US
FBI: Cyberattacks grow as national security menace
FCC asks for comments on mobile network shutdowns for public safety
FCC Moves To Boost Wireless Speeds
FCC posts Enquiry Documents on Google Wardriving , (Mon, Apr 30th)
FCC Seeking Public Comment on Cell Phone Blocking (March 3, 2012)
FCC To Review the Relative Value of Low, High, and Super-high Spectrum Licenses
FCC To Update 1996 Cell Phone Radiation Standard
FDA urges protection of medical devices from cyber threats
Fear and Imagination
February 2013 (RSU1301) service package has been tested and is now available
Fed says internal site breached by hackers, no critical functions affected
Fed says still determining extent of hacker breach, FBI probing
Fed still gauging extent of hacker breach, FBI on case
Federal Agencies and Fortune 500 Companies Eradicating DNSChanger (March 1, 2012)
Federal IT pros look at BYOD security, management concerns
Federal Reserve, DOE Confirm Hackers Breached Servers, Stole Data
Fedora 18 Installer: Counterintuitive and Confusing?
Fedora Core 4 goes into maintenance mode, FC1 and FC2 end-of-life 
Feds Drop CFAA Charges Against 'Hacker' Who Exploited Poker Machines
Feds issue final 'Do Not Track' privacy recommendations
Feds say Megaupload user content could be deleted this week
Feds Warn of Cyber Threats, Seek Expanded Authority for DHS
Feedback On Simcity Gets User Banned From EA Forums
Feeding DShield with OSSEC Logs
Feeling a little tracked and monitored online
Fewer than half of Facebook and Google users understood the sites' privacy policies
FF/TB Updates 
FFmpeg 0.10 "Freedom" released - Update
Field Day Exercise 
Fifth Debian 6.0 "Squeeze" update released
Fighting TSA Harassment of Disabled Travelers
File-Sharing For Personal Use Declared Legal In Portugal
Fill out your email! 
Final weeks of support arrive for service-pack-free Windows 7
Finally, why supercomputing?
Financial services under more frequent DDOS attacks
FinCen quicknews hacked 
Finding abuse contacts for a domain 
Fingerprint reader reveals passwords
Fingerprinting Phishers 
Finland a haven for vulnerable SCADA systems
Finland Hosts Mobile Phone Throwing Championships
Fireflies Bring Us Brighter LEDs
Firefox "new tab" feature tweaked following privacy concerns
Firefox ... 
Firefox 1.0.1 fixes vulns; RootkitRevealer output; more on port 41523 
Firefox 1.0.3 Alternate Workaround; OhMyGodGoogleIsGone!, Update: IPSec vuln announced 
Firefox 1.0.4; DNSSEC Tools; Phisher's benefit use Google link; Viewing Chat Logs; Web Browser Forensics; Gecko Based Browers HTTP Authentication Prompt Vulnerability 
Firefox 1.5 beta 1 released 
Firefox 1.5 Released 
Firefox 1.5.0.3 Vulnerability Update 
Firefox 1.5.0.6 release imminent 
Firefox 12 released - can now update itself
Firefox 20 and Thunderbird 17.0.5 updates , (Wed, Apr 3rd)
Firefox 3.6.x approaches end of life
Firefox and Thunderbird 1.5.0.4 released 
Firefox and Thunderbird Updates, (Wed, Jan 9th)
FireFox DoS exploit public 
Firefox fix 1.5.0.3 / MySQL Patches 
Firefox Is the First Browser To Pass the MathML Acid2 Test
Firefox patches; MS DoSed my Grandma; MS05-019 Exploit published 
Firefox to spit out third-party cookies
Firefox update time 
Firefox v 17.0 just released, more here: http://www.mozilla.org/en-US/firefox/17.0/releasenotes/, (Tue, Nov 20th)
Firefox v1.0.7 Released 
Firefox Vulnerability 
Firesheep's Scarier, More Muscular Half-Brother Cookie Cadger Released! Sort of.
First California lawsuit over mobile privacy issues crashes
First Evidence That Some Insects May Rely On Photosynthesis
First Exploit Attempts For Juniper Backdoor Against Honeypot
First Hurricane Matthew related Phish
First Impressions Inside the Project Holodeck VR Game World
First Known 'Social Chromosome' Found
First Mammals Observed Regenerating Tissue
First Mummies May Have Been Inspired by Field of Corpses
First Shift ! 
First Vulnerability for Firefox 1.5 (released version) Announced - PoC available 
Five Years of Storming 
Fizzer Virus / Backdoor 
FLAC Gets First Update In 6 Years
'Flame' cyber-weapon went undiscovered for at least four years
Flame Malware: All You Need to Know
Flame spy virus gets order to vanish: experts
Flame worm's makers fail to collect Epic 0wnage award
Flamer Malware Spied on Middle East for More Than Five Years
Flamer Malware Spied on Middle East for More Than Five Years - Security - News & Reviews - eWeek.com
Flame's Windows Update hack required world-class cryptanalysis, researchers say
Flash Player 11.2 fixes critical vulnerabilities, adds silent updates
Flash Player update but no announcement, check your version http://www.adobe.com/software/flash/about/, (Thu, Sep 20th)
'Flashback' Mac Malware: One More Reason to Switch to Linux
Flashback Mac Trojan earned $14,000 from ad clicks, Symantec
Flashback numbers not going down - still over half a million
Flashback trojan exploits unpatched Java vulnerability
Flashback Trojan still on 650,000 Macs, security company discovers
Flavours of Pi
Flaw with GPG Signature Verification 
Flaws in Checkpoint and RealOne; MyDoom Update; AntiVirus Software; Data Call 
Follow the Bouncing EMule 
Follow the Bouncing Malware IX: eGOLDFINGER 
Followup on challenge "Spam, Recon or ??" 
Fondly reminiscing the past 
Footy lovers hit in Wembley playoff card snatch scam
For Android Users, 2012 Is Still the Year of Gingerbread
For Business Analysts and Project Managers: Creating Proper Business Requirements for Integration Projects
For Your Inspection: Source Code For Photoshop 1.0
Ford and GM Open Car Software To Outside Developers
Foreign hacks in China hit with malicious emails
Forensic Analysis on iOS Devices
Forensicating Docker, Part 1
Forgery FBI email / Virus W32.Bugbros / New PoC for Linux Vulnerability 
Forget about Top Chef, Chopped, American idol… Here comes….. Be the Next Microsoft Employee
Forget phones, PRISM plan shows internet firms give NSA <i>everything</i>
Forget the word “cyberwar” says Marcus Ranum
Form Spam: Increasing the Attacker's work function. 
Former FBI Agent: All Digital Communications Stored By US Gov't
Former GOP Staffer Derek Khanna Speaks On Intellectual Property
Former Hacker: Today's Hacks Are All About the Money
Former Tribune staffer denies giving hackers log-in credentials
Forms Authentication: Remember Me? Its Hard Not Too!
Fortinet Debuts Secure Wireless LAN Platform
Fortinet Targets MSSPs, Enterprises With New Security Blade
Four Anons cuffed in Italy
Four how-to's on finding stuff in your inbox
Four Ways ShoreTel Dock Helps Drive UC
Fox News Parent NewsCorp May Face Corruption Investigation
Foxconn Denies Plans For New US Operations
Foxconn International shares drop 4 percent after profit warning
Foxconn International surges 35 percent as Citi report lifts iPhone hopes
Foxconn Int'l says unaware of any reason for stock jump
Foxconn Sees New Source of Cheap Labor: The United States
Foxconn shares surge on brokerage report on iPhone orders
Foxconn Thinks the iPhone 5 Is a Pain
Foxconn Workers On Strike Over iPhone 5 Production
Foxit Reader 'dwmapi.dll' DLL Loading Arbitrary Code Execution Vulnerability
Fox's Attempt To Block Ad-skipping TV Recorder Autohop Fails
F-Prot Anti-Virus Scanning Engine Bypass 
Fragmentation Comes To iOS
Fragmentation Leads To Android Insecurities
fragmented packet challenge 
Fraud: Evil People Doing Evil Things 
Fraudsters nick BILLIONS from China's e-commerce Wild West
Fraudsters tempt Olympic fans with bogus streaming websites
Fred Flintstone, we'd like to help... 
Free Font Helps People With Dyslexia
Free Software Quick Security Checklist
Free time? 
Free tool to encrypt DNS requests released for Windows
Free Tools to Wipe Your Drives Securely
FreeBSD packet filter (pf) DoS using fragments. 
FreeBSD Project Servers Compromised - http://www.freebsd.org/news/2012-compromise.html, (Sun, Nov 18th)
FreePBX Multiple Cross Site Scripting and Remote Command Execution Vulnerabilities
French Company Building a Mobile Internet Just For Things
freq.py super powers?
Fresh Apple Patches 
Fresh batch of Microsoft patches next week , (Fri, Nov 9th)
Fresh food fans debunk anti–organic food report, get hacked
Friday Squid Blogging: Another Squid Comic
Friday Squid Blogging: Controlling Squid Chromatophores with Music
Friday Squid Blogging: Eating Giant Squid
Friday Squid Blogging: Efforts to Film a Live Giant Squid
Friday Squid Blogging: Giant Squid Engraving from the 1870s
Friday Squid Blogging: Sperm Consumption in the Southern Bottletail Squid
Friday Squid Blogging: Squid Escape Artist
Friday Squid Blogging: Squid Ink as a Condiment
Friday Squid Blogging: Squid Insurance
Friday Squid Blogging: Squid Recipe
Friday Squid Blogging: Squid Sacrifices Arms to Avoid Predators
Friday Squid Blogging: Squirming Tentacle USB Drive
Friday Squid Blogging: The Search for the Colossal Squid
From a NAND Gate To Tetris
From Data on the Web to Data Analysis - Python Quickstart
From extreme to in depth 
From 'Quantified Self' To 'Quantified Car'
From the mailbag - 
Front Page Hack Update, Veritas Advisories 
FrSIRT exploits for MS05-044, MS05-045, and MS05-048 
F-Secure Security Bulletin 
F-Secure Vulnerability; More on Symantec UPX and Microsoft patch set 
F-Secure Vulnerability; Symantec Patch/Update; Microsoft patch set; IDS Vendor Review 
F-Secure web console buffer overflow 
FSF Certifies Atheros-Based ThinkPenguin 802.11 N USB Adapter
FSF Opens Nominations For Free Software Awards 2012
FTC chairman: Do-not-track law may not be needed
FTC issues guidelines on facial recognition technology
FTC Releases Google Privacy Audit, Blacks Out the Details
FTC settles spying charges on rent-to-own computers
FTC sues Wyndham Worldwide over data breaches
FTC: ID theft again tops consumer concerns
FTP Scans - Universities only? : BHODemon followup 
FTP Vulnerability & Accompanying Activity 
FTP-Brute Force Attacks and Password Management 
FUD flies as Raytheon reveals social media analysis tool
Fujitsu trials anti-phone fraudster tech
Fukushima's Fallout of Fear
Full Packet Capture for Dummies
Fun - data integrity / PHP up to date ? / WINS 
Fun With Windows Netstat 
Further Review of Port 2525 Activity; K-OTik.com reveals new English version of Website 
Fusion-io Buys Hybrid Startup NexGen
Future Enterprise- The Future of Big Data
Gadgets add complexity to brutal bank layoffs
GAIM buffer overflow, Aitel paper and more XP SP2 
Galaxy S 4 Dominates In Early Benchmark Testing
Game Closure "DevKit" For Mobile HTML5 Games Is Open Source
Gamification Goes To College
Gaming app ENSLAVES punter PCs in Bitcoin mining ring
GAO Finds US Military's Critical Technologies List Outdated, Useless
GAO Report on DHS; ezSTUB; Worm.Gibe.F; BlueTooth Security? ClamAv MACosX 
Gartner Buzzword Tracker Says "Cloud Computing" Still on Hype Wave
Gartner predicts huge rise in monitoring of employees' social media use
Gauss Espionage Malware Stealing Banking Data in Middle East
Gauss Malware Detected Through Unique Palida Narrow Font
GD DoS 
GDI Attacks via Email; Natural Disasters and Data Recovery / Data Security 
GDI Scanner Released 
GDI Vulnerabilities : An open letter to Microsoft 
GDI+ exploit mutation lessons and How to (not) report an attack to a large organization 
Geeks On a Plane Proposed To Solve Global Tech Skills Crisis
Gene Therapy May Protect Against Flu
Genesco Sues Visa Over PCI Noncompliance Fines
Genetically Modified Plants To Produce Natural Lighting
Genuine TCP Port 0 activity; Osama was not caught, but some Windows users were; New RBOT variants using SQL & IIS 
Georgia Tech and Udacity Partner for Online M.S. in Computer Science
Georgian police chiefs cuffed in cyber spy plot
German Court Rejects Apple's Privacy Policy
German Court: ISPs Must Hand Over File Sharer Info
German Federal Court Rules That Internet Connection Is Crucial To Everyday Life
German Government: Stay Away From Internet Explorer
German Police Stop Man With Mobile Office In Car
German Researchers Hit 40 Gbps On Wireless Link
German Spam (concise version); MS05-021 and Snort Signatures; Is it a security problem? 
German spam source found, Real services vulnerability 
German Spam...Maybe?; Academia Security Awareness 
Get a 40% discount on your hotel room!, (Thu, Nov 8th)
Get up to speed with modern data bases/data stores quickly (SQL and NoSQL)
Get your fresh Firefox updates 
Get Zapped While Playing Video Games
Getting Better Transparency From Oil Refineries
Getting out in front of BYOD
Getting Ready for Badlock
Getting Ready for macOS Sierra: Upgrade Securely
Getting Ready for the Holidays 
Getting spamfiltered? 
Getting viruses out of the AVG virus vault 
GFI Scoops up MDM Technology From VizualMobile - Mobile and Wireless - News & Reviews - eWeek.com
Ghost of Christmas Botnets? 
Ghoulies and Ghosties 
GCHQ attempts to downplay amazing plaintext password blunder
Gift card from Marriott?
Giving Your Computer Interface the Finger
Glasses That Hack Around Colorblindness
Glenn Beck Reports CIA Plot Between Embassy Killing and Something Awful
Global action takes down tech support scam
Global Arrests And Charges Against Members of Lulzsec Hacking Group (March 6, 2012)
Global DNS cache poisoning attack?; Update... 
Global telecoms giant ZTE sees gold in Chinese roots
Global Warming Felt By Space Junk and Satellites
Global Warming Has Made the North Greener
globalSCAPE CuteZIP Stack Buffer Overflow
Gmail javascript vulnerability (fixed) 
Gmail SSL Cert Expiration 
GNOME 3.8 To Scrap Fallback Mode
GnuPG (GPG) 2.1.9 release announced
GnuPG 1.4.5 released - remote execution possible 
GnuPG new versions-upgrade now 
Godzilla wreaks revenge on Pakistani government web sites
Going Up?
Gold Artifact To Orbit Earth In Hope of Alien Retrieval
Good Cop; Bad Cop; Domain Cop?
Goodyear's 'On TheGo' Self Inflating Tire
Google $22.5 Settlement With FTC Over Privacy Criticized by Industry Group
Google Apps for Business receives ISO 27001 certification
Google Backs Down On Maps Redirect
Google Bad and Google Good
Google Betting Its Google+ Systems Know What's Best For You
Google Blocks Author's Ads For Offering Torrent Of His Own Book
Google Blogger: Vietnamese HS Students Excelling At CS
Google Bolsters Email Security Defenses Against Hackers, Spammers
Google Desktop Has New Features 
Google Developer Competition Aims at Chrome OS Security
Google Develops Context-Aware Voice Search For TV
Google Doubts Apple Will Approve Its New Maps Application
Google Fiber Draws Startups To Kansas City
Google Fiber turned Kansas City into a magnet for tech startups
Google Fined $22.5M Over Safari Privacy Violation
Google Formally Puts Palestine On Virtual Map
Google Gets Into Politics With Civic Info API
Google Gives 15,000 Raspberry Pis To UK Schools
Google Go language gets used: For file-scrambling trojan, though
Google Grants for summer of code 
Google Hiccup, CGI Email Script Scanning, New NIST Doc, SANSFIRE 
Google hit by building automation security FAIL
Google Chrome 25 Will Serve Searches Over SSL From the Omnibox For All Users
Google Chrome 27 Is Out: 5% Faster Page Loads
Google Chrome can pin web links to the taskbar
Google Chrome Introduces Do Not Track
Google increases vulnerability bounties to $20,000
Google Invests $1 Billion To Build New London HQ
Google launches privacy plan amid protests
Google offers exploit bounties for Pwn2Own and Pwnium
Google Offers Help, Advice for Hacked Website Owners
Google Ordered Back To UK Parliament To "Explain Itself" Following Investigation
Google patches 9 Chrome bugs, pays more to top researchers
Google patches Chrome for second time in eight days
Google Patches Chrome, Changes Mixed Content Warnings 
Google pays $40K to 'Pinkie Pie' for partial hack of Chrome OS
Google plonks reCAPTCHA on Street View, makes users ID your house
Google ploughs ahead with privacy changes, as EU concerns remain
Google Privacy Director Alma Whitten Leaving
Google Privacy Policies Assailed by EU: Report
Google Pulls Access To Unsupported But Popular Weather API
Google puts $1M on the line for Chrome exploit rewards
Google raises ante for next Chrome hacking contest to $2M
Google Reader Being Retired
Google readying on-device malware scanner for Android
Google Reconnaissance, Sprinter-style
Google Redesigns Image Search, Raises Copyright and Hosting Concerns
Google Releases Glass Factory System Image, Rooted Bootloader
Google Reports Government Surveillance Requests Continue to Rise
Google Search Appliance Vulnerability 
Google Security Engineer Issues Sophos Warning
Google Snaps Up Security Firm VirusTotal
Google Strangeness: Is It New?; Filthy Minkey; New phpBB; FTBM VII: Afterglow 
Google Takes Street View To the Galapagos Islands
Google Talks About the Dangers of User Content
Google Tests White Space Spectrum For School Broadband In South Africa
Google to double encryption key lengths for SSL certs by year's end
Google to face fresh ICO scrutiny over WiFi snooping
Google Unveils New Search Features, Including iOS Voice Search
Google Updates Chrome (March 5, 2012)
Google ups bug bounty to $20,000 per flaw
Google ups the ante in cloud storage–15GB
Google warns 20,000 websites they could be infected with malware
Google Web Accelerator continued; phpBB 2.0.15 released; Backdoors more popular than Viruses?; Anti-Spyware poll results; Google.com DNS glitch; SQL server 2000 SP4 
Google Web Accelerator; Snort with ClamAV; RSA SecurID WebAgent Overflow 
Google Wins FTC Award for Robocall Prevention Technology
Google, Facebook May See Tougher Data Use Rules in Europe
Google, Microsoft butt heads over IE privacy skirting
Google, Oracle Deny Direct Payments To Media
Google: BadNews Malware Wasn't Really Bad, After All
Google's new privacy policy breaches European law, say data regulators
Google's Nexus Q Successor Hits the FCC
Google's Pwnium ends with no winners
Google's reCAPTCHA briefly cracked
Google's Self-Driving Cars: 300,000 Miles Logged, Not a Single Accident
Google's trap for Chrome exploit writers leads to crashes for users
GOP Brief Attacks Current Copyright Law
GOP Senators revise cybersecurity bill
Got packets? Interested in TCP/8909, TCP/6666, TCP/9415, TCP/27977 and UDP/7, (Mon, May 14th)
Government admits seizing two months of AP phone records
Government Agencies, Utilities Among Targets in ‘VOHO’ Cyber-Spy Attack
Government, business, military are internet security threats
Governments should invest more in catching cybercriminals, researchers say
GPL Nessus Forks (1 Comments)
Grampa's backup 
GRCC Student placed 3rd in a CTF contest at GrrCON 2012
Great Firewall architects fingered for GitHub attack
Greatfire Keeps Tabs On Chinese Censorship, Automatically
Green Party Releases International Joint Statement Criticizing the TPP
Greetings awareness - Awareness greetings ? 
Grisoft AVG False Positive 
Group Behind 'Aurora' Attack on Google Still Active
Group files FTC complaint against Google for privacy changes
Group questions Google government contract claims
GTK+ 3.8 Released With Support For Wayland
Guest Diary: Linux Capabilities - A friend and foe
Guest Diary: Xavier Mertens - Integrating VirusTotal within ELK
Guide to Finding Safe Online Merchants 
Guided Tour of the Clearwater HIPAA Privacy and Breach Notification Assessment Software
Gunman takes potshots at Dell HQ, chopper search ensues
H&R Block Software Glitch To Delay 600,000 U.S. Tax Refunds
h00d IRC bot, localhost port 80 traffic 
Hack Bill Challenge Winners Announced 
Hack on Saudi Aramco hit 30,000 workstations, oil firm admits
Hacked BitCoin Exchange Sued By Customers
Hacker Activity 
Hacker Bypasses Windows 7/8 Address Space Layout Randomization
Hacker Grabs 150k Adobe User Accounts Via SQL Injection
Hacker jailed for stealing identities of 8 million UK citizens
Hacker leaks source code of old VMware software
Hacker vs. Counter-Hacker — a Legal Debate
Hacker warns of zombies on 2 Mich. TV broadcasts
Hackers breached security firm Bit9, then attacked its customers
Hackers claim 12 million Apple IDs from FBI *new!
Hackers claim 12-M Apple IDs
Hackers claim to have "confidential" IAEA information
Hackers claim to have Mitt Romney's tax records
Hackers deface Indonesian president’s website
Hackers Dump Millions of Records From Banks, Politicians
Hackers get into Utah health department records
Hackers hit Major League Baseball teams' Facebook sites
Hackers chop down UN eco-agency, release rare data into wild
Hackers infect WordPress 3.2.1 blogs to distribute TDSS rootkit
Hackers now pick tools from script kiddies' toybox –Âreport
Hackers Stole Michael Jackson's Entire Catalog From Sony (March 5, 2012)
Hackers target Israel government websites
Hackers topple Huawei routers
Hackers Turned Defense Contractor QinetiQ Into Intelligence Playground
Hacking breach made us stronger says RSA
Hacking by the Syrian Government
Hacking the Emergency Alert System Is Funny Until It's Not
Hacking Tor, the anonymity onion routing network 
Hacking Wireless Drivers for Fun and Profit 
Hactivism: A Growing Concern for Network Security
Haiku OS Ported To Intel 64-Bit Architecture
Half of Ex-Employees Walk Off with Corporate Data: Symantec Survey Findings
Hallo Steffi! German spyware developers try their hand at humour
Hancitor Maldoc Bypasses Application Whitelisting
Hancitor Maldoc Videos
Hancitor/Pony/Vawtrak malspam
Handheld Black Hornet Nano Drones Issued To UK Soldiers
Handler Candy 
Handlers - Down and Out in the Magic Kingdom 
Handlers in Orlando 
Handlers in Vegas - Slow Diary Day 
Handlers On Duty 
Handling Malware Samples
Handling phishing attack (2 Comments)
Hands On With Virtual Reality's Greatest Hope
Handset makers scurry to join Year of the Phablet
Hands-On With Intel's "Next Unit of Computing" Mini PC
Happy birthday, disk drive 
Happy Father's Day 
Happy Independence Day; Impending Storm; Spam Challenge Protocol Pros and Cons 
Happy Mother's Day 
Happy New Year 
Happy now? Mobiles, cloud, big data now 'a growing security risk'
Happy Thanksgiving 
Happy turkey day 
Happy Valentines Day and Black Tuesday 
Happy Valentine's Day; ARCserve probes?; OWA issue; new Opera version 
Harris kills hosted cloud service program
Harvard Creates Cyborg Tissues
Has CES Lost Its Star Appeal?
hashcat and oclHashcat are now open source
Have you noticed a decline in the amount of Spam? This could be the reason!
Hawaii connectivity 
Haxdoor Incident Details at Honeyblog.Org 
Haxdoor.KI Deja Vu 
Heads Up: new flaw in McAfee 
Healthcare CRM in the Cloud
Healthcare in the Cloud - My Office Visit and ObamaCare
Healthcare industry group builds cybersecurity threat center
Heap overflow vulnerability in Opera 9.0, 9.01 
Help eliminate unquoted path vulnerabilities, (Wed, Nov 7th)
Help us out with a Christmas story 
Help Wanted: Please help test our experimental PFSense Client
Helpdesk outsourcing quagmire at heart of whistleblower lawsuit
Helpful Tips For Successful CRM Implementation
Here are some technology predictions that didn’t quite hit the mark (or the side of a barn either)
Here are some useful tools (free) to help out IT Pros (and others)
Here it is -- Your turn to be heard 
Here’s an update on my “If you have a laptop with a fingerprint reader, beware…” post
Here’s another tip on customizing Outlook. Changing some defaults
Here's What China Thinks of Ed Snowden and the NSA
Here's your opportunity to learn more about DB2 for z/OS and WLM
'Heroes' creator Tim Kring working on conspiracy thriller with interactive elements
Hexing MAC address reveals Wifi passwords
Hidden IFrame Remains Popular With Browse-By Exploit Authors 
Hidden Viral Gene Discovered In GMO Crops
Higgs boson exists
High End Graphics Cards Tested At 4K Resolutions
High Security Animal Disease Lab Faces Uncertain Future
High Tech Vending Machines Transform IT Support At Facebook
Highlights from the 2016 HPE Annual Cyber Threat Report
High-Risk SAP HANA Vulnerabilities Patched
High-Voltage Fences For Zapping Would-Be Copper Thieves
HIPAA and HITECH January 2013 eNewsletter Published
HIPAA log clarification; Mozilla/Firefox/Thunderbird vuln reported & fixed 
Hiring Developers By Algorithm
HITRUST Backs 'Community Defense' Approach to Health Care Cyber-Security
HIV Vaccine Safe Enough To Pass Phase 1 Human Trials
Hobbyist Builds Working Replica of Iron Man's Laser Gauntlet
'Holey code, Batman!' Microsoft to patch 12 vulns on Tuesday
Hollywood studios pushing for secure, next-generation "digital home library"
Homeland Security Level Raised to Orange, increase in DameWare (port 6129) scans and exploit, Microsoft Retires Products (Including Windows 98), And Earthlink Users Being Targeted by Scam Using IE bug 
Hon Hai, Mozilla to launch mobile device running on Firefox
Honda's "Micro Commuter" Features Swappable Bodies
Honeyd 1.5 Released 
Honeynet looks to trap USB malware
Honeyports, powershell script
Honeypot Abnormality 
Honeypot Mirroring .edu domains under .eu / Active Threat 
Hong Kong web host jailed for DDoS stunt
Horde exploit attempts in the wild 
Horde exploit downloading Perl/Shellbot 
Hosting Provider Automatically Fixes Vulnerabilities In Customers' Websites
Hotfix for MSIE problem related to MS06-042 
Hotmail and MSN problems 
Hotmail seeing some temporary access issues, (Wed, Jan 9th)
Hounded By Recruiters, Coders Put Themselves Up For Auction
House Approves Extending the Warrantless Wiretapping Act
House Subcommittee Holds Hearing On TSA's "Scanner Shuffle"
Housewives On Trial In China For Smuggling In iPhones
How a 'Catch-22' Turns into a 'Shame on You' 
How Apple's Story Is Like <em>Breaking Bad</em>
How Beer Gave Us Civilization
How Big Data Became So Big
How big of a deal is the new Benghazi testimony?
How CIOs Can Learn to Catch Insider Crime
How Cosmological Supercomputers Evolve the Universe All Over Again
How Do We Protect Ourselves from our Frienemies?
How do you deploy? 
How Do You Spot a Genius?
How Does the Tiny Waterbear Survive In Outer Space?
How EVE Online</em> Dealt With a 3,000-Player Battle
How Facebook Will Power Graph Search
How Free Speech Died On Campus
How Google and Apple exposed their Achilles heels this week
How Hair Can be Used To Track Where You've Been
How China's Top Digital Spies Got Outed by Facebook and Twitter
How long until Skynet?
How many ?Epoch? times? Epocalypse.py timestamp converter
How Million-Dollar Frauds Turned Photo Conservation Into a Mature Science
How Mobile Devices Kill Your Creativity
How Much Beef Is In Your Burger?
How Newegg Saved Online Retail
How Noah Kagan Got Fired From Facebook and Lost $100 Million
How Not To Launch a Gadget
How online black markets work
How Open Source Could Benefit Academic Research
How Red Hat Hires
How Secure Is the Cloud? IT Pros Speak Up
How Stolen iOS Devices Are Unlocked
How Technology Might Avert an Apocalypse
How That 'Extra </nobr>.9%' Could Ward Off a Zombie Apocalypse
How the Critics of the Apollo Program Were Proven Wrong
How the Super Bowl Will Reach US Submarines
How the Syrian Electronic Army Hacked The Onion
How To Communicate Faster-Than-Light
How To Conduct a Bona Fide HIPAA Security Risk Analysis....
How to contribute your data to DShield / ISC 
How to create an e-book
How to Create Governance Policies in InfoSphere Business Glossary 9.1
How to deal with Oracle patches? 
How to Elegantly Neglect Explain Plans and Radically Transform SQL
How to Fix America's Harmful Hacking Laws
how to get published plus life, parenting, and dogs catching Frisbee
How to hack
How To Hack Twitter's Two-Factor Authentication
How to Meet Instant Demands for Business Analytics?
How To Promote Stage Comedy In a Geeky Way?
How to Recover Pictures from Corrupt Memory Card
How to Remove Duplicate Emails from 'Sent Items' Folder of MS Outlook 2007
How To Report A BotNet, Glitch In The Matrix?, Bouncing Malware -IS- In The Works 
How To Safeguard Loose Nukes
How to Set Up Your Own Malware Trap
How to setup penetration testing exercises. 
How to Stop the Next Viral Facebook Post Outbreak
How To Talk Like a CIO
How Will Amazon, Barnes & Noble Survive the iPad Mini?
How you can help; Strange Spam Update; port 3001 update 
How Your #Naked Pictures Ended Up on the Internet
How your Webhosting Account is Getting Abused, (Tue, Mar 26th)
How Your Webhosting Account is Getting Hacked, (Mon, Mar 25th)
How's business?
How-to Build Your Own Custom Integration Components
HP Discontinue OpenVMS
HP EVI vs. Cisco OTV: A Technical Look
HP Hires Ex-Nokia Exec, Spins Off WebOS, Reportedly Returning To Tablets
HP JetDirect Vulnerabilities Discussed, (Sun, Jan 27th)
HP Offers that “Cloud Thing”
HP ProCurve switches shipped with malware
HP Upgrades Mobile Thin Clients
HP's "System Management Homepage" web interface vulnerable
HTTP Public Key Pinning: How to do it right
Huawei CEO breaks silence, claims company isn’t a threat to U.S. security
Huawei denies spying, calls for global security standards
Huawei doesn’t expect to gain any ground in the U.S. this year
Huawei founder gives first ever media interview
Huawei checking claims of vulnerabilities in its routers
Huawei is betting big with a new metal smartphone
Huawei is now the world’s third largest smartphone vendor, but still far behind Samsung and Apple
Huawei says U.S. probe unlikely to affect other business
Huawei says U.S. probe unlikely to affect other overseas business
Huawei says US stance is “protectionism”
Huawei says US stance is 'protectionism'
Huawei to continue talking with government over network issue - CEO
Huawei to continue talking with UK government over network issue: CEO
Huawei told not to apply for Australian broadband project
Huawei USB modems vulnerable
Huawei: 'trust us, we are being transparent'
Huawei’s Ascend W1 Windows Phone 8 smartphone revealed in leaked photos
Hubble Discovers 'Planetary Graveyard' Around White Dwarf
Huge amount of Visa and Mastercard information hacked
Huge cyber bank theft spans 27 countries
Hugo Awards Live Stream Cut By Copyright Enforcement Bot
Human Rights Watch proposes new laws of robotics
Hunting for Executable Code in Windows Environments
Hunting for IOC's with ioc-parser
Hunting for Juicy Information
Hurricane Katrina Follow-UP 
Hurricane Katrina Preparations; Broken Mytob? 
Hurricane Katrina; ShellBOT/awstats; Long Registry Value Names 
Hurricane Rita Scams ALREADY! 
HyTrust Adds �Secondary Approval` Security to Protect Virtual Environments
Challenge Update 
Challenge: What can you do with Funky Directory Names (Part 2), (Mon, Apr 16th)
Changed Infocon status to Yellow, re: Windows Internet Explorer vulnerability 
Changing Profile Picture in Lync 2013
Changing Threat Models 
Chat Logs Location; Microsoft Security Advisories 
Cheap Four-fingered Robot Hand Edges Closer To Human Dexterity
Check Point harnesses cloud security to deter botnet infections in enterprise
Check Point Outbound Traffic Mystery 
Checking for .wmf Vulnerabilities 
Checking Media Type from Python
Chernobyl Plus 7 Years 
Chief's Picks: Videos from BlackHat Briefings USA 2012
China calls U.S. the "real hacking empire" after Pentagon report
China companies plan to step up Europe investment
China cracks down on mail servers 
China derides U.S. "Cold War mentality" towards telecoms firm Huawei
China fingered for Coca Cola hack - report
China Hacked the New York Times for Four Months Straight
China is world's most malware-ridden nation
China options limited as U.S. panel outcasts Huawei, ZTE
China rechaza acusaciones de EEUU contra firmas telecomunicación
China's Alibaba To Outsell Amazon, eBay Combined
China's Android users warned of giant botnet
China's Huawai criticizes US security complaints
China's Huawei criticizes US security complaints as trade protectionism, promises transparency
China's Huawei says it has done poor job communicating
China's Huawei says will increase transparency
China's Huawei vows to become more transparent
China's internet security giant Qihoo planning global domination
China's Radical New Space Drive
China's Wanda in talks with "well-known" hotels for U.S. buys
China's Yearly Budget For High-Speed Rail: $100 Billion
China's ZTE slumps to quarterly loss, margins bleed
Chinese Android trojan buys applications
Chinese arrest 9,000 cyber-crims