| Researcher creates proof-of-concept malware that infects BIOS, network cards |
| Researcher releases exploit code that can allegedly crash pcAnywhere |
| Researcher to demonstrate feature-rich malware that works as a browser extension |
| Researcher: 200,000 Windows PCs vulnerable to pcAnywhere hijacking |
| Researchers Build Objects With 3D Printing Using Simulated Moon Rocks |
| Researchers Create Short-term Memories In Rat Brains |
| Researchers Create Vomiting Robot To Analyze Contagions |
| Researchers Demonstrate 3D Spy Trojan for Mobile Phones |
| Researchers Devise New Attack Techniques Against SSL |
| Researchers Lift Lid on Government-Distributed Cyber-Spy Trojans |
| Researchers Mine Old News To Predict Future Events |
| Researchers Use Lasers For Cooling |
| Researchers warn of cyber flaws in Honeywell control systems |
| Researching Information Security Issues |
| Resistance against US cyber security act is growing |
| Resolution(s) For The New Year |
| Resolving erratic behavior of an Oversized PST using advanced PST File Splitter tool |
| Resources: Windows Auditing & Monitoring, Linux 2FA |
| Results vs. Relationships - Finding Your Balance on the Seesaw |
| Reuters staffer accused of aiding hackers maintains innocence -lawyer |
| Reuters staffer accused of aiding hackers maintains innocence: lawyer |
| Reuters suffers double hack |
| Reuters suffers second hack this month |
| Revealed: Chrome Really Was Exploited At Pwnium 2013 |
| Reverse Cross-Site Request (RCSR) vulnerability |
| Review: Google Compute Engine |
| RFC 6598 - Carrier Grade NAT |
| RFC2142 is a two-way street |
| RFP criteria for how to build an agile data infrastructure |
| Rhombus Tech A10 EOMA-68 CPU Card Schematics Completed |
| RIAA says Google piracy policies are lacking |
| Rick Kelly: Value focus |
| Rig Exploit Kit from the Afraidgate Campaign |
| Richard III Suffered an Ignominious Burial, Researchers Find |
| Risk... in the most obscure places |
| Risks of boomerangs a reality in world of cyberwar |
| Risks on the Rise: Making a Case for IT Disaster Recovery |
| Riverbed, 6connect, Ixia Unveil New Products, Services at Interop |
| Robot Learning To Recognize Itself In Mirror |
| Robot Serves Up 360 Hamburgers Per Hour |
| Robot Snake Could Aid Search and Rescue Operations |
| Robot Snakes To Fight Cancer Via Natural Orifice Surgery |
| Robotic Bartender Assembles Your Drink, Monitors Alcohol Consumption |
| RockBox + Refurbished MP3 Players = Crowdsourced Audio Capture |
| Rocket boffinry in pictures: Gulp the Devil's venom and light a match |
| Rogue US Airways-themed emails distribute ZeuS-based malware |
| Romanian authorities dismantle hacker group targeting government websites |
| Romney Campaign Accidentally Launches Transition Web Site |
| Rootkit Findings |
| Rootkit infects Linux web servers |
| Root-Level Exploit for OSX LaunchD Service |
| Rough Roving: Curiosity's Wheels Show Damage |
| Rover Finds Ancient Streambed On Martian Surface |
| Rover Fuel Came From Russian Nuke Factory, But Supplies Running Low |
| Royal Canadian Air Force Sees More Sims In the Future of Fighter Pilot Training |
| RPC DCOM Update |
| RPC DCOM Update: sdbot variant |
| RPC DCOM WORM (MSBLASTER) |
| RSA Conference 2012 sneak peek: cloud, big data, and mobile |
| RSA Conference 2012: Former NSA director says secure clouds can't come fast enough |
| RSA Conference 2012: Stress and burnout in infosec careers |
| RSA teams to bolster security for Apple, Google, RIM devices |
| rtfdump |
| RuggedCom fails key management 101 on Rugged Operating System (ROS), (Tue, Aug 21st) |
| Rumors about IIS 6.0 issues |
| Running InfoSphere Software in a Virtual Environment without ILMT May Cost you Millions |
| Russian botnet operators infected 6 million computers |
| Russian Cyber Criminal Unmasked As Creator of "Most Successful" Apple Malware |
| Russian EBookseller LitRes Gets Competing EBook Apps Booted From Google Play |
| Russian charged with hacking into brokerage accounts |
| Russian malware spies on US ATMs |
| Russian start-up claims BitTorrent-killer |
| Russian Univ. Launches Course Based On ReactOS Led By Alex Bragin |
| Russian upstart claims BitTorrent-killer |
| Russia's Former KGB Invests In Political Propaganda Spambots |
| Russia-speaking cybercriminals earned $4.5 billion in 2011, researchers estimate |
| s_ta_ts.js, anyone? |
| Sacre Bleu! US fingered for Flame attack on Élysée Palace |
| Safari 5.1.7 - an interesting feature, (Thu, May 10th) |
| Safemode rootkit & DRM |
| Safer Online Shopping Guide |
| Samba - Buffer Overrun, HP Remote Command Execution, Top 15 Worms, Hosts File, Sasser/Dabber Activity |
| Samba security patch fixes critical remote code execution hole |
| Samba vulnerability, Veritas BackupExec vulnerability, PowerPoint attachments, and some light reading. |
| Sample needed - of Spybot.ZIF, which scans for vulnerable Cisco Routers |
| Samsung Claims iPad Mini, iPad 4, New iPod Touch Also Infringe Patents |
| Samsung May Start Making ARM Server Chips |
| Samsung network printer vulnerability discovered |
| Samsung Opens New Apple Store In Australia |
| Samsung opens new R&D facility in Nokia's backyard |
| Samsung printers have secret admin account |
| Samsung Unveils the Galaxy S4 |
| Samsung will issue fix for security hole in printers |
| Samsung: Android's Multitouch Not As Good As Apple's |
| Samsung? BlackBerry? Who Will Win the Containerization Wars? |
| San Diego Zoo Creates Biomimicry Incubator |
| Sandia Lab Fires Up 300,000 Virtual Android Devices To Test Out Security |
| SANS 2006 |
| SANS Boston 2008 |
| SANS Industrial Control Systems (ICS) Security Training is coming to Houston! |
| SANS Institute Announces Annual Security East Training Event in New Orleans featuring SANS Technology Institute's ... |
| SANS Institute to Offer World-Class Information Security and Computer Forensics Training at SANS Secure Singapore 2013 |
| SANS Institute to Offer World-Class Virtualization and Private Cloud Security Training at SANS October Singapore 2012 |
| SANS ISC (once again) and Microsoft - Flatten Compromised Systems |
| SANS ISC presentation in Brazil |
| SANS ISC Receives Award |
| SANS Network Security 2007 -- Vegas |
| SANS offering TREATS too. |
| SANS Survey Results Announced: Mobility Policy in the Enterprise |
| Sans Top 20 - 2004 - How does it compare to 2003 Top 20; Microsoft ASP.NET ValidatePath Module; IRC Botnet Servers |
| SANS Top 20 Spring Update |
| SANS Top 20 Update |
| SANS/ISC Webcast; MS05-017 Exploit; They're Baaaaaack...; Follow the Bouncing Malware : A Fresh Bounce (Updated: 22:30 GMT) |
| SANSFIRE 2006 |
| SANSFIRE: Internet Storm Center Training Event |
| SANS's Alan Paller discusses the threat of cyberterrorism on CNN, (Sun, Apr 28th) |
| Santa IM Worm (bot) update |
| Santa IM Worm |
| Santy Variant?; Year End Poll |
| SAP GUI DLL Loading Arbitrary Code Execution Vulnerability |
| SAP NetWeaver Portal as SAP GRC 10.0 Front-End |
| Saudi Arabia Blocks Viber Messaging Service |
| Saudi Aramco Reveals Cyber Attack Hit 30,000 Workstations |
| SAV botnet revival ? |
| sav worm and its cc |
| SAV Worm Update |
| Save the Web From Software Patents |
| SC gov. admits hacking errors; revenue chief quits |
| SCADA kit has hidden factory account, password |
| SCADA security is better and worse than we think |
| Scammer tying in on disasters |
| Scanner Identifies Malware Strains, Could Be Future of AV |
| Scanning for Fortinet ssh backdoor |
| Scanning tricks with scapy |
| Scans for CA LM Vulnerability; MSFT Update #1: MS05-002; MSFT Update #2: MS05-015; MSFT Update #3: Malicious Software Removal Tool |
| SCANS, Babel (not Bagel/Bagle/Beagle) & Halloween |
| Scapy vs. CozyDuke |
| Scientific American's Fred Guterl Explores the Threats Posed By Technology |
| Scientists Create New Gasoline Substitute Out of Plants |
| Scientists Develop Sixty Day Bread |
| Scientists Growing New Crystals To Make LED Lights Better |
| Scientists Inducted Into Chemistry "Hall of Fame" |
| Scientists Invent Electronics That Dissolve In the Body |
| Scientists Match Dream Images To Photos |
| Scientists May Have Detected Neutrinos From Another Galaxy |
| Scientists Set Bold Plan For Future Exploration of the Sun |
| Scientists Take Most Accurate Reading Yet of Universe's Cooling |
| Scottish Scientists Create World's Smallest Smart Antenna |
| ScreenOS vulnerability affects Juniper firewalls |
| Script kiddie scavenging with Shellbot.S, (Wed, Sep 19th) |
| Scripting the Unofficial .wmf Patch |
| Scripting Web Categorization |
| Scrum/Agile Now Used To Manage Non-Tech Projects |
| SDBot sniffs, blings |
| SDN Is Business, OpenFlow Is Technology |
| SDN Vendor Comparison Launches |
| SDN: From Slideware to Software in 2013? |
| SDN's Potential in the Data Center and On the WAN |
| Sea Chair Project Harvests Plastic From the Oceans To Create Furniture |
| Seafood Raised on Animal Feces Approved for Consumers |
| Sealed-Box Macs: Should Computers Be Disposable? |
| Searching money, finding exploit |
| Searching Through the VirusTotal Database |
| Seasonal Malwares and other trends |
| Seattle Police Want More Drones, Even While Two Sit Unused |
| SEC staffers used government computers for personal use: report |
| SEC505 DFIR capture script: snapshot.ps1 |
| Secunia Advisory for IE; meeneemee.exe |
| Secunia PSI 3.0 Beta: plugging security vulnerabilities made easy |
| Secure Boot complaint filed against Microsoft |
| Secure Remote Services / MyDoom and IFRAME / MS04-039 revision / ISC Webcast |
| Security Audit Finds Company's Top Dev Outsourced His Work To China |
| Security audit finds dev OUTSOURCED his JOB to China |
| Security audit finds developer OUTSOURCED his JOB to China |
| Security Awareness (from students point of view) |
| Security Awareness and Collaboration |
| Security Awareness for Security Professionals |
| Security boffins say music could trigger mobile malware |
| Security concerns over Firefox's "new tab" thumbnail feature |
| Security damn well IS a dirty word, actually |
| Security Features Nobody Implements |
| Security Firm Mandiant Says China's Army Runs Hacking Group APT1 |
| Security Firm Reveals Weaknesses in DDoS Attack Toolkits |
| Security Fix for Apache |
| Security History Poll Results |
| Security History Poll |
| Security hole in Sudo's debug option closed |
| Security Challenges and Games |
| Security improvements in Opera 12 beta |
| Security in the Cloud Is All About Visibility and Control |
| Security Information on Website |
| Security Infrastructure Market to Top $86 Billion in 2016: Gartner |
| Security Log Retention |
| Security Mailing Lists for Academia |
| Security Management vs Chaos: Understanding the Butterfly Effect to Manage Outcomes & Reduce Chaos |
| Security mess sends Kiwi auction site titsup in two days |
| Security Onion 12.04 Beta Released at DerbyCon (plus informational video) |
| Security patches for Mozilla Firefox/Thunderbird/SeaMonkey |
| Security problem in VMware vSphere 5 |
| Security Pros Love Python? and So Do Malware Authors! |
| Security Researcher Finds Critical Flaws in Sophos Anti-Virus Engine |
| Security Researchers Document Wiper Malware`s Disappearing Act |
| Security Talks for portuguese community |
| Security Tip of the day: Handling brute-force login attempts |
| Security Update - Cisco 7900 Phones - cisco-sa-20130109-uipphone privilege escallation issue - advisory at: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130109-uipphone, (Wed, Jan 9th) |
| Security Updates from Microsoft; Multiple Vendors - ICMP Affecting TCP Sessions |
| Security Vulnerability Found On US Federal Government Contractors Site |
| Security vulnerability in NVIDIA's proprietary Linux drivers fixed |
| Security Worker Shortfall is Putting Organizations at Risk |
| Self-Assembling Robots Using Flying Drones |
| Senate committee approves privacy protections for cloud, email |
| Senator Asks FTC to Investigate Google and Apple Over Possible App Privacy Violations (March 5, 2012) |
| Senators propose law to combat cyber theft |
| Sendmail DoS Vulnerability |
| Sendmail Multi-Part MIME Message Handling Denial of Service vulnarability |
| Sendmail vuln |
| September 2015 Microsoft Patch Tuesday |
| Sequoia Supercomputer Sets Record With 'Time Warp' |
| Serious flaw on OS X in Apple Safari |
| Serious Problems With USB and Ethernet On the Raspberry Pi |
| Set up of Risk Terminator in SAP GRC AC 10.0 |
| SETI@Home site problems |
| Setslice Killbit Apps (1 Comments) |
| Seven Tips to Start Your Cloud Due Diligence |
| SHA1 Phase Out Overview |
| SHA-3 Winner Announced |
| Shamrocks and March Madness; Perl bots; MS05-004 update |
| Sharing HBO Go Accounts Could Result In Prison |
| Sharp Warns That It Might Collapse |
| Shellbot |
| Shelley Stewart: Business view |
| Sheryl Sandberg: Facebook's Home App Needs Some Work |
| Should Developers Be Sued For Security Holes? |
| Should Inventions Be Automatically Owned By Your Employer? |
| Should the Start of Chinese New Year Be a Federal Holiday? |
| Should the US Really Limit Chinese-Government Influenced IT Systems? |
| Should TV Networks Put Pilots Online For Judgement Like Amazon Is Doing? |
| SHOUTCAST <= 1.9.4 Vulnerability, Exploit Available |
| Shuttle Endeavour Embarking to Los Angeles Museum |
| Schmidt slams China as world's most prolific hacker |
| Schmidt, Daughter Talk About North Korea Trip |
| Schneier: We Don't Need SHA-3 |
| School Board Considers Copyright Ownership of Student and Teacher Works |
| Sidewalk: Certifications in Business Analysis: CCBA & CBAP from IIBA |
| Sidewalk: Do we really need Business Analysts? |
| Sidewalk: Tablet Wars |
| SIEM is not a product, its a process... |
| Sigcheck and VirusTotal |
| Sigcheck and VirusTotal for Offline Machine |
| Sigcheck and virustotal-search |
| Significant increase on 38566 |
| Silent Drop vs Reject Firewall rules |
| Silent Traitors - Embedded Devices in your Datacenter, (Mon, Feb 25th) |
| Silicon Valley's Dirty Little Secret: Age Bias |
| Silly PuTTY; crime pays; if it quacks like a duck get the orange sauce. |
| Simple Way to Recover Password of MS Outlook or Outlook PST File |
| Simulation Using LRO Data Shows More Locations With Ice on the Moon |
| sinFP-2.03 release |
| Singapore allows pre-crime strikes against online crooks |
| Singapore inquiry into U.S. engineer's death to start in May |
| Singapore police to share evidence with FBI on engineer's death |
| Singaporeans get hard token baked into credit card |
| Singer Reportedly Outbids NASA for Space Tourist's Seat |
| Single NFC bonk subjugated Samsung Galaxy SIII and slurped it out |
| Siri's Creator Challenges Texting-While-Driving Study |
| Site Updates: ISC/DShield API and ipinfo_ascii.html Page |
| SKorea misidentifies China as cyberattack origin |
| SKorea ready for more cyberattacks; banks recover |
| Sky News Google Play page defaced |
| Skype Disables Password Reset Function After Security Scare |
| Skype for Linux hotfix plugs security hole |
| Skype hits back at angry wiretap reports: Rat finks? Not us |
| Skype investigates tool that reveals users' IP addresses |
| Skype Worm Spreads Ransomware, Botnet Links |
| Skype 'worm' whinnies... |
| Skype worm |
| Skype; Grepping Weblogs; COAST; ISTS News |
| Slackware 14.0 Arrives |
| Slashdot Asks: SATA DVD Drives That Don't Suck for CD Ripping? |
| Slate's Mini-Biography of Aaron Swartz |
| SLOTH, attack on TLS using MD5 |
| Slow day |
| Slow Sunday; CA Message Queuing Vulns; Process Explorer Vuln; Infocon: Green Redux |
| Small Results With Big Indexes |
| Smart meter hack framework goes open-source |
| Smart TVs riddled with DUMB security holes |
| Smartest Light Bulbs Ever, Dumbest Idea Ever? |
| Smart-Grid Control Software Maker Hacked |
| Smartphone 4Q sales rise 36 pct led by Samsung |
| Smartphones overtake 'dumb' phones worldwide |
| Smoothing MODEL, K? |
| Smooth-Talking Hacker Remote-Wipes Reporter's iPad, MacBook |
| Sniffer tool displays other people's WhatsApp messages |
| Sniffers in Perl?!? |
| SNMP Issues in Cisco Routers; Vulnerability Issues in TCP; SANS Top-20 Call for Experts |
| SNMP Pwn3ge |
| Snort 2.4.2 Released |
| Snort BO pre-processor Vulnerability |
| Snort BO status update |
| Snort bypass vulnerability |
| Snort Denial of Service Vulnerability |
| Snort Rule released on BleedingSnort for the Windows Javascript vulnerability |
| Snort rule update |
| Snort rulez management |
| Snort Sig for MS06-040 |
| Snort signature and standalone detection tool |
| Snort Sigs for MS06-042 and ICMP tunnel mentioned in Diary |
| Snort URL evasion vulnerability patched and version 2.6.0 available |
| Snow Leopard users most prone to Flashback infection |
| So many devices, so little policy |
| So what passwords are those ssh scanners trying?, (Tue, May 14th) |
| So you broke our encrypted files? Ha! They were DOUBLY encrypted |
| So, what causes recession? |
| So, when is a security advisory, not a security advisory? |
| Soap Boxing |
| Sober Virus (CME-151) |
| Sober, Bagles, and Mytobs ad nauseum... |
| Sober.I is on the go; Quiet day on the net |
| SoberD@MM from spoofed Microsoft email addresses, new version of Netsky |
| SoBig Virus Update |
| SOBIG.F |
| Sobig-F and Nachia update |
| Sobig-F hybernation |
| SOC Resources for System Management |
| Social Commerce Is Future of Electronic Commerce |
| Social Media, Companies and Data Volumes |
| Social Networking Security in the Workplace |
| Social Networking Sites- An Educational Tool |
| Socialite's climb halted by unfolding scandal |
| SoftBank would appoint "security director" to Sprint board |
| Software DEP Classified Script 2.5 SQL Injection Vulnerability |
| Software exploits dropped to new low in 2011, says IBM X-Force |
| Software Patches, Nortel, User Privacy Top Week's Security News |
| Solaris 9 in.ftpd security flaw |
| Solaris telnet/rlogin cont.; Timezones; DNS queries |
| SolusOS Forks Gnome 3 Fallback Mode |
| Solution to the TCP 1433 Traffic |
| Some Android phones can be reset to factory default by clicking on links, (Wed, Sep 26th) |
| Some more 0-days from ZDI |
| Some password advice |
| Some Smart Meters Broadcast Readings in the Clear |
| Some tools updates |
| Some useful volatility plugins |
| Somebody, Probably Anonymous, Hacked the Fed During the Superbowl |
| Something new on Telnet? |
| Sony Announces 'Superslim' PS3 |
| Sony Announces the PS4 |
| Sony cuts sales target for cameras, smartphones for 2014-15 |
| Sony DRM Rootkit to be removed automatically by Microsoft |
| Sony Fined $390K in U.K. for 2011 PlayStation Network Data Breach |
| Sony mobile customers emails, names hacked in China |
| Sony PS Vita exploit opens the door for unauthorized apps, piracy |
| Sony redo of PlayStation Store links games, movies |
| Sony to assess spin-off plan; cuts targets for cameras, smartphones |
| Sony To Make Its Last MiniDisc System Next Month |
| Sony Touts 25 Hour Battery Life For Haswell-Equipped Vaio Pro |
| SOPA, PIPA, Anonymous: Can I have a little hope? |
| Sophos buys mobile device management vendor Dialogs |
| Sophos dangles free Android antivirus to tempt BYOD-friendly biz |
| Sophos false positives on Mac OS X |
| Sophos Reveals the "Dirty Dozen" |
| Sourcefire VRT MS-WORD 0DAY recommendations, Rules and tool Advisory |
| South Carolina tax chief resigns after taxpayers hit in cyber attack |
| South Korea Backtracks On China As Source of Cyberattack |
| South Korea cyberattacks hold lessons for U.S. |
| South Korean crackers arrested |
| SP2 breaks nmap, others - *Anti*phishing - Application exploits |
| Space Diving: Iron Man Meets Star Trek Suit In Development |
| Space Shuttle Endeavour's Final Journey |
| Space Station Saved By a Toothbrush? |
| Space Station Spacewalkers Stymied By Stubborn Bolt |
| SpaceX Dragon Set To Launch |
| SpaceX: Lessons Learned Developing Software For Space Vehicles |
| Spaf on reexamining |
| Spain's Extremadura Starts Move To GNU/Linux, Open Source |
| Spam - spam - spam |
| Spam ahoy! |
| Spam Backscatter |
| Spam blocking by RBL, when is a good thing too much? |
| Spam Delivered via .ICS Files |
| SPAM in German is Still SPAM |
| Spam Increase |
| Spam reporting addresses |
| Spam with Obfuscated Javascript |
| Spam, Recon or ??: You make the call!! |
| Spamassassin - upgrade |
| Spamhaus DDoS Attack Investigation Results in Arrest of Dutch Man |
| SPAM-Let the time fit the crime; |
| Spammers attempt to defeat Bayesian filters; Malaysia terrorism warning; MSN Messenger worm |
| Spammers dodge junk filters with Google Translate |
| Spammers unleash DIY phone number slurping web tool |
| Spammers, phishers escape proper punishment |
| Spamming as 'terror' tactic |
| Spanish Open Source Group Files Complaint Over Microsoft Use of UEFI Secure Boot |
| Spanish police arrest suspected developer of BKA trojan |
| Spat between two Dutch companies sparks record-breaking 300Gbps DDoS attack |
| Speaking of Predictions |
| Speaking of Said Upgrades… Firefox 1.0.7 |
| Special Microsoft Bulletin Patching Remote Code Execution Flaw in OpenType Font Drivers |
| Special Ops Takes Its Manhunts Into Space |
| Spectacular New Views of Saturn's Polar Vortex |
| Speed traders eyed after Twitter hack attack: regulator |
| Speech-to-text drives motorists to distraction |
| SplitRXMode - Taking VMware Multicasting to the Next Level |
| Sploits Du Jour: Veritas NetBackup & Ethereal. Watch Oracle and Snort! |
| Sporadic Problems, Internet Health Monitors, IE Attacks, and HTTP GET |
| Spy Gadgets: A Visit With the Real-Life Q |
| Spyware Report Disected and Thanks For The Malware |
| Spyware Tool Kit, OSPF Filtering & Authentication, Port 559 Traffic Spike |
| SQL Injection Flaw in Ruby on Rails, (Wed, Jan 9th) |
| SQL Injection Lilupophilupop style, Part 2, (Thu, Aug 9th) |
| SQL Injection: Paper & Worm, WINS, Asking for Input. |
| SQL Model Clause: References and Recommendations |
| Square Kilometre Array Pathfinder Goes Live |
| SquirrelMail 1.4.8 released |
| SSD Prices Fall Dramatically In 2012 But Increase In Q4 |
| SSH Honeypot Capture, Follow The Bouncing Malware (Part III) |
| SSH Honeypots (Ab)used as Proxy |
| SSH scanning continues, some simple advice; IPS comparison article |
| SSH Scanning Resolved; First Things First Guide |
| SSL 2.0 Rollback in OpenSSL |
| SSL Phishing Scam / FreeBSD DoS Vulnerability / Acrobat Reader Flaw |
| SSL Requests sent to port 80 (request for help/input), (Thu, Sep 6th) |
| SSL, SSL - Where Art Thou SSL? |
| Standard Kilogram Gains Weight |
| Stanford Study Flawed: Organic Produce May Be More Nutritious After All |
| Stanford Uses Million-Core Supercomputer To Model Supersonic Jet Noise |
| Stanford's Flying Fish Glider |
| Staples Starts Selling 3-D Printer |
| Startup decloaks, rolls out cloudy security 'conductor' |
| State of the Union: Full text of President Obama's address |
| State social media privacy laws a mixed bag for businesses |
| Statistical Tools For Detecting Electoral Fraud |
| Statistics Key To Success In Run-and-Gun Basketball |
| Staying Secure During ERP Implementation: What to Look Out For |
| Stealing photos and spying: backdoors to networked cameras |
| Stealthy Apache Exploit Redirects Victims to Blackhole Malware |
| Stealthy Group Steals Data Using Zero-Day, 'Watering Hole' Attack |
| Stealthy, malware-spewing server attack not limited to Apache |
| Steam spawns vulnerabilities, say researchers |
| Steelie Neelie admits laptop hack during IGF |
| Stem Cell Treatment Found Effective For Rare Brain Disorder |
| Steps to Mitigate Office Vulnerabilities |
| Steve Jobs Movie Clip Historically Inaccurate, Says Woz |
| Still a Microsoft Most Valuable Professional (6th year!) |
| Still More MyDoom, a Few Twists on IDS, and a New Phishing Threat |
| Stolen Laptops |
| Stop calling it a ransomware "attack" |
| Stopping Spam by Extrusion Detection |
| Storage and expertise - the PureSystems box |
| Storm Center in the News |
| Storm Season |
| Strange file names being requested from a web server |
| Strange Http request... |
| Strange phishing/spam e-mails |
| Strange Spam; Update on Port 3001; New Discussion Forum; Small Website Change; Cisco Humor; SANS Washington DC |
| Strange UDP Packets, Amazon.com and LATAM NIC Issues |
| Stratfor Hacker Could Be Sentenced to Life, Says Judge |
| Stress-Testing Software For Deep Space |
| Student mules, More database holes, Microsoft spyware beta |
| Student privacy activists due to meet with Facebook |
| Student Refusing RFID Badge Now Fights Expulsion Order |
| Students Calculate What Hyperspace Travel Would Actually Look Like |
| Study Finds Universe Is 100 Million Years Older Than Previously Thought |
| Study says malware attacks are on the rise, mobile threats becoming more serious |
| Study Urges CIOs To Choose Open Source First |
| Study: Geolocation apps draw users, despite privacy concerns |
| Study: Limiting Bidding On Spectrum Could Cost Billions |
| Study: Online Social Influence Has the Strongest Effect On Voting Behavior |
| Study: the Universe Has Almost Stopped Making New Stars |
| Stuxnet worm planted on Iranian PCs via USB stick, site claims |
| Submitting Malware - Unpatched IE Hole Being Exploited - eJihad or iHysteria? |
| Substantial Increase in Infected System Numbers (is it real?) |
| Sudo For Windows |
| Sugar Batteries Could Store 20% More Energy Than Li-Ions |
| Summer/Winter Vacation Book Suggestions and Hacking Challenges |
| Sun bulletins, MS04-040 discussion, anti-spam vigilante-ism dumb, did you know? |
| Sun Java JRE sandbox bypass vulnerability |
| Sun Java Runtime Environment XML Parsing Denial of Service Vulnerability |
| Sun Java SDK and JRE Updates |
| Sun JDK 5.0 Update 10 |
| Sun JRE Privilege Escalation, Opera Vulnerability, Pocket PC Trojan in the wild |
| Sun ONE Messaging Server Vulnerability; Weaknesses in Wireless LAN Session Containment; Credit Card Breach |
| Sunday P & Q; Happy Birthday OpenSSH; RBOT Snort Sig; Bacula |
| Sunday, little to report, and backups |
| SunJava 1.5.0_09 Released |
| Super Bacteria Create Gold |
| Supercomputer Repossessed By State, May Be Sold In Pieces |
| Supercomputers' Growing Resilience Problems |
| Super-Earth Discovered In Stars' Habitable Zone |
| Superfish 2.0: Dell Windows Systems Pre-Installed TLS Root CA |
| 'Super-powerful' Flame worm actually boring BLOATWARE |
| Superstition |
| Support Forums Reveal SCADA Infections |
| Supreme Court To Decide If Monsanto GMO Patents Are Valid |
| Surface Pro Sold Out; Was It Just Understocked? |
| Surface Pro: 'Virtually Unrepairable' |
| Surfing Robot Tracks Great White Sharks |
| Surge in Exploit Attempts for Netis Router Backdoor (UDP/53413) |
| Surveillance software: Gamma Group's offshore companies uncovered |
| Survey on Application Portfolio Management–What is your organization doing? |
| Survey Reveals a Majority Believe "the Cloud" Is Affected by Weather |
| Survey Suggests P2P Users Buy More Music |
| SUS: deadline extended - XP SP1 not supported anymore |
| Suspicious eFax Spear Phishing Messages, (Fri, Aug 17th) |
| Swartz' death fuels debate over computer crime |
| Swedish Data Center Saves $1M a Year Using Seawater For Cooling |
| Swedish School Makes Minecraft Lessons Compulsory |
| Sweet Treats from the Honeynet group. |
| Swiss security day |
| Switching Tasks Changes Worker Bee DNA |
| Syfy Reality Show Will Feature Giant Boxing Robots |
| Symantec Antivirus Scan Engine: Web Service Administrative Interface Buffer Overflow |
| Symantec AV linked to Verisign certificate problem, DUGallery, False Weather Alerts, more phishing |
| Symantec AV RAR library vulnerability |
| Symantec AV Vulnerability Latest |
| Symantec beats estimates on demand for security products |
| Symantec CEO takes over global sales chief's job, shows him door |
| Symantec detecting NSIS as trojan.zlob. |
| Symantec DOS Exploit Code, Sasser Backdoor Exploit Capture, Reading Material |
| Symantec finds Linux wiper malware used in S. Korean attacks |
| Symantec forecasts weak results as yen depreciates |
| Symantec Patch Posted |
| Symantec Products Vulnerabilties / Worm Password List / Mailbag-Netsky |
| Symantec retires low-end security software |
| Symantec Scan Engine Multiple Vulnerabilities |
| Symantec Sees Links Between 2011, 2013 Cyber-Attacks on South Korea |
| Symantec update blocks access to AOL |
| Symantec VERITAS Storage Exec DCOM Server BO's |
| Symantec: don't blame us for New York Times hack |
| Symantec: Flashback malware netted upwards of $10,000 a day |
| Symbian operating system - Nokia series 60 mobile phones - 3 new Trojans |
| Symbian Sells Millions, Despite Nokia Pushing Windows Phone |
| SYN-ACK Packets With Data |
| Syncing Between Devices |
| Synthetic Materials Set New World Record For Greatest Amount of Surface Area |
| Syria drops from Internet 7th May 2013, (Wed, May 8th) |
| Syria Falls Off the Internet Again |
| Sysadmin Appreciation Day |
| Syslog'n with the best of 'em; |
| System Architecture Test Plan (Expanded) |
| System Documentation: Application Software |
| System Documentation: Working System |
| System Resource Utilization Monitor |
| System Spec: External (Human) Interface |
| System Store Trojan, Infection Persistence, Save the Pr0n |
| TACC "Stampede" Supercomputer To Go Live In January |
| Taiwan Earthquakes cut undersea cables |
| Taiwan security official warns of crippling Chinese cyberattacks |
| Taiwan to ramp up cyberwar efforts |
| Taiwan's civil servants caught by sexy email trap |
| Take a Free Networking Class From Stanford |
| Take Back Wednesday? SQL Slammer... still alive but barely kicking |
| Taking a Hard Look At SSD Write Endurance |
| Taking a Look at the FreeVideo Player Trojan |
| Taking Action For Free JavaScript |
| Talented and Creative Group We Are |
| Taliban official's email blunder leaks 400+ contacts |
| Talking to Kids About Online Porn: How One Dad Handled it |
| Tap Gigabit Networks on the Cheap |
| Targeted attack: experience from the trenches |
| Targeted attack: Word exploit - Update |
| Targeted Attacks Increased, Became More Diverse in 2011 |
| Targeted IPv6 Scans Using pool.ntp.org . |
| Targeted Trojan attacks? |
| Tata Intends To Sell Air-Powered Car In India |
| Tax Day and associated risk |
| Tax Day and recovering from San Diego; Oracle patches; IRC spam worm |
| TCP 554 scanning; Linux mremap local root exploit posted |
| tcp bindshell with password prompt in 162 bytes |
| TCP Fuzzing with Scapy, (Thu, Sep 13th) |
| TCP port 10000 cont. / Connecting mismatched protocols |
| TCP port 1025 activity; continued DNS poisonings; 802.11 security primer |
| TCP Port 8181 Puzzle |
| tcp/135 and ICMP Continue to Decline; Solaris 8 Hacks |
| TCP/1433 spike: Call for Packets. |
| Teenager Makes Discovery About Galaxy Distribution |
| Teens arrested in connection with attack on UK Police Agency |
| Teens Drug Parents To Get Web Access |
| Teens, Social Media, and Privacy |
| Tech tip follow-up: Using the data Invoked with R's system command |
| Tech tip: Invoke a system command in R |
| TechCrunch:Expanded DMCA Still Has Limits |
| Technical document on WMF vulnerability and Guilfanov's patch available |
| Technical Mujahid Magazine |
| Television Network Embeds Android Device In Magazine Ads |
| Telnet client vulnerability; DNS posioning re-appearing |
| Telstra Bigpond To Use Outlook.com As Email Handler |
| Temporary Patches for createTextRange Vulnerability |
| Tens of millions of hackers target Israel government websites |
| Tesla CTO Talks Model S, Batteries and In-car Linux |
| TeslaCrypt ransomware sent using malicious spam |
| Test File: PDF With Embedded DOC Dropping EICAR |
| Test Gallery - VMware |
| Testing for DNS recursion and avoiding being part of DNS amplification attacks |
| TestLink v1.9.3 Arbitrary File Upload Vulnerability |
| Tests Show That Deadly New Flu Could Spread Among People |
| Texan schoolgirl expelled for refusing to wear RFID tag |
| Texas Attorney General Warns International Election Observers |
| Texas Company's Antique Computers Are For Production, Not Display |
| Texas School Board Searching For Alternatives To Evolutionary Theory |
| Texas State Rep. Files 2 Bills To Ban RFID In Schools |
| Thai PM's site defaced with smutty abuse |
| Thanks for info on chat monitoring; PanadaLabs report; Hyper-Threading vulnerability |
| Thanx to our readers |
| That Peculiar Genetics of Mathematics |
| The "Yes, but..." syndrome |
| The 1 Train Hackers Stole $2.4 Million from 2,904 ATMs in Just 10 Hours |
| The 3D Un-Printer |
| The 7 Craziest Intelligence Leaks in US History |
| The 80's called - They Want Their Mainframe Back!, (Wed, Jan 9th) |
| The 866-PC-SAFETY poll |
| The Agony And Ecstasy Of The Oracle 11gR2 Upgrade |
| The Algorithmic Copyright Cops: Streaming Video's Robotic Overlords |
| The AP Twitter hack: Wall Street's tweet-scraping technology that sparked a 145-point nosedive |
| The Arcati Mainframe Yearbook 2013 |
| The asymmetry implicit in Internet data retention |
| The ATF Not Concerned About 3D Printed Guns... Yet |
| The Beast |
| The best anti-Obama book I've read |
| The biggest cyberattack in Internet history |
| The Biggest Financial Fraud of All Time |
| The British Have All The Fun |
| The Bronies Get Their Own Charity |
| The Case For Targeted Ads |
| The Case for UC Interoperability |
| The CIA and Jeff Bezos Bet $30 Million On Quantum Computing Company |
| The Cloud Ecosystem - Just Getting Started |
| The Cloud Wars |
| The Coming Internet Video Crash |
| The Computer Science Behind Facebook's 1 Billion Users |
| The Current Cloud Landscape |
| The cyber debate goes public |
| The Cyber Threat To the Global Oil Supply |
| The Danger In Exempting Wireless From Net Neutrality |
| The dangers of shared web hosts |
| The Dark Side of Certificate Transparency |
| The Data Crunchers Who Helped Win The Election |
| The Empire Hacks Back Challenge: Test Your Windows Command-Line Kung Fu |
| The era of big DDOS? |
| The Family System Administrator |
| The Faraway Cloud: Measuring Cloud Performance |
| The FBI Is Now Investigating the Steubenville Backlash |
| The FBI will turn off the Internet on Monday (or not), (Mon, Jul 9th) |
| The FBI's reported new plan to read your emails |
| The Foldable Readius Ereader Is Dead |
| The Foundation of Your ATS Should be a CRM |
| The Free State Project, One Decade Later |
| The FSF Adopts the Kickstarter Approach To Fund-raising |
| The Full Text of President Obama's 2013 State of the Union Address |
| The Gates Foundation Engages Its Critics |
| The government wants to know what it doesn't know |
| The H Roundup - AMD fires developers, Android turns 5, E17 alpha arrives |
| The H Roundup - Bogus leap seconds, EFI rootkits and cloud cracking |
| The H Roundup - Linux Mint 15 RC, WebM patents, Google drops XMPP |
| The H Roundup for the week ending 12 May |
| The H Roundup for the week ending 14 July |
| The H Roundup for the week ending 17 March |
| The H Roundup for the week ending 18 February |
| The H Roundup for the week ending 19 May |
| The H Roundup for the week ending 2 June |
| The H Roundup for the week ending 23 June |
| The H Roundup for the week ending 24 March |
| The H Roundup for the week ending 28 July |
| The H Roundup for the week ending 9 June |
| The H Roundup for the week ending May 5 |
| The History of the Floppy Disk |
| The Hunt For LulzSec's Missing Sixth Member |
| The chocolate / attack correlation |
| The importance of ongoing dialog |
| The Intelligence Cycle for a Vulnerability Intelligence program on-the-cheap |
| The Internet Plays Role of Stupidity Amplifier |
| The ISC is not Trying to Trojan Your Machines |
| The Largely Unknown Success Story of Afghanistan's Television Network |
| The Linux-Proof Processor That Nobody Wants |
| The Long Reach of US Extradition |
| The Mathematics of the Lifespan of Species |
| The Matthew Keys Case Shows Just How Big a Bully the Feds Can Be |
| The missing Microsoft patches |
| The Mobile App Design Tail Wags the Desktop Software Design Dog |
| The most hated IP address of 2005 ? |
| The MS Claria debate; Intrusions via MS05-017; some more light reading |
| The New AI: Where Neuroscience and Artificial Intelligence Meet |
| The New Series of Doctor Who: Fleeing From Format? |
| The Olympic Live Stream: Observations, Recommendations, Predictions |
| The other Juniper vulnerability - CVE-2015-7756 |
| The Passing of the Personal Computer Era |
| The Passwords You Should Never Use |
| The Perils of Vendor Bloatware |
| The Pirate Bay supporters hack Virgin Media |
| The Pirate Bay's Oldest Torrent Is Revolution OS</em> |
| The Pitfall Of Two Factor Authentication |
| The Privacy Illusion |
| The Prototype Still Works; Insider Threat Paper; More Keylogging; Translation |
| The Rapid Rise of License Plate Readers |
| The reasons you should attend IOD 2012 aren't always technical |
| The Release Candidate For Linux Mint 14 "Nadia" Is Out |
| The Return of CISPA |
| The Rise of Paid Wikipedia Consulting |
| The Risks of Trusting Experts |
| The Science Behind Building a Space Gun |
| The security risks and rewards of big data |
| The Short Life of a Vulnerable DVR Connected to the Internet |
| The Shumway Open SWF Runtime Project |
| The Sleuth Kit (TSK) for Windows released |
| The Snort Top 10 |
| The SPAM People;Thanks;Package Verification |
| The Strange Nature of the Nigerian App Market |
| The Struggles of Getting Into the App Store |
| The Tech Behind Felix Baumgartner's Stratospheric Skydive |
| The Three Pillars of Data Warehousing |
| The Tiny Console Killers Taking On the PS4 and Xbox 720 |
| The Top 10 - The Best Conversations Happening Right Now |
| The Top 5 Reasons Cloud Computing Projects Fail |
| The Top Paying Tech Companies For Interns |
| The trouble with talking to computers. |
| The Twelve Days of Christmas Packet Challenge |
| The Two Big Problems With Online College Courses |
| The Ultimate OS X Hardening Guide Collection, (Mon, Feb 20th) |
| The ultimate tips box |
| The Value a "Fresh Set Of Eyes" (FSOE) |
| The White House's Next Enemy: Botnets |
| The Wordpress Plugins Playground |
| The World Remains Five Minutes From Midnight |
| The worst security snafus of 2012 – so far |
| There are no more Passive Exploits |
| There Is No Reason At All To Use MySQL: MariaDB, MySQL Founder Michael Widenius |
| They didn't predict that: Astrologers! blamed! after! Yahoo! hack! |
| They Work Long Hours, But What About Results? |
| Think Tank's Website Rejects Browser Do-Not-Track Requests |
| Third Party Debates Moderated by Larry King: Discuss |
| Third-party apps ripe targets for cybercriminals, Secunia says |
| Thirty Six Days to Dreamforce |
| This Article is Brought to You By the Letter ノ |
| 'This Is Your Second and Final Notice' Robocallers Revealed |
| This Week's Top 10 Discussions |
| This Week's Top 10 Discussions - April 29, 2013 |
| This Week's Top 10 Discussions - May 6, 2013 |
| Thomson Reuters employee indicted for aiding hackers -court filing |
| Those never-ending waves of Locky malspam |
| Thoughts about Informix |
| Thoughts on PCI (Payment Card Industry) compliance requirements |
| Thoughts on VoIP, Holiday recommended reading |
| Thousands of Kuwaitis protest against voting changes |
| Thousands of Publicly Accessible Printers Searchable On Google |
| Thousands of Publicly Addressable Printers Searchable On Google |
| Threats in the Cloud Environment SSH Scanners |
| Three Mile Island Shuts Down After Pump Failure |
| Three reasons you shouldn't neglect your application security |
| Three Ways Cloud Computing Providers Shoot Themselves in the Foot |
| Thunderbird Download Link |
| Tibetan and Uyghur activists targeted with Android malware |
| Tim Bryce - COMMON COURTESY - 9/24/2012 |
| Tim O'Reilly Steps In To Debate Open Government and Linux |
| Time for some predictions |
| Time to run Windows Update - - Microsoft Updates KB2755801 for Windows RT / IE10 / Flash Player - http://technet.microsoft.com/en-us/security/advisory/2755801, (Wed, Oct 24th) |
| Time to update Mozilla/Firefox/Thunderbird and Ethereal; also: sightings of infected IIS 6 servers. |
| Time to upgrade Ethereal... |
| Time Zone Updates, Part 2 |
| Times sued over police hacking |
| Tiny Pill Relays Body Temperature of Firefighters In Real-time |
| Tip of the Day - Backup and Backup Management for Home or Small Business Users |
| Tip of the Day - Color and Bar Coded Daily Risk Analysis |
| Tip of the Day - Fleshing out the details in email policy |
| Tip of the Day - Home Wireless Gateways |
| Tip of the Day - If you don't need it on, turn it off. |
| Tip of the Day - Like a Kid in a WMIC Candy Store |
| Tip of the Day - Making the Switch |
| Tip of the Day - PHP Security |
| Tip of the Day - Protecting HP JetDirect-based Printers |
| Tip of the Day - Turn the NICs off during installation |
| Tip of the Day : snort rule management |
| Tip Of The Day |
| Tip of the Day: Audit |
| Tip of the Day: Be unpredictable and diverse |
| Tip of the Day: Don't be a victim (well try to not be a victim) - security toolbars |
| Tip of the Day: Logbooks |
| Tip of the Day: mount options |
| Tip of the Day: Protect the Single Points of Compromise |
| Tip of the Day: Read e-mail in plain text (as God intended) :) |
| Tip of the Day: Remove Default Route |
| Tip of the Day: Secure Surfing at the Coffee Shop (or Hacker Conferences) |
| Tip of the Day: Standards |
| Tip of the Day: Strong Passwords |
| Tip of the Day: Surviving the monthly patch cycle |
| Tip of the day: Test, don't ping |
| Tip of the Day: The -they shall not be broken into- challenge |
| Tip of the Day: Turn off your Computer |
| Tip of the Day: Use ssh keys |
| Tip of the Day: Use the features of your switches |
| Tip of the day: using host based firewall on Windows XP SP2 |
| Tip: Quick Analysis of Office Maldoc |
| Tippingpoint IPS DoS |
| Tips for Stopping Ransomware |
| T-Mobile patches Wi-Fi eavesdrop vuln |
| To protest Israel's Gaza offensive, 'Anonymous' launches millions of cyberattacks |
| To report any scams/malware related to Hurricane Matthew, use our contact form: https://isc.sans.edu/contact.html |
| To SSL or not to SSL - send us your links! |
| ToD - Configuration Management - maintaining security awareness |
| Today's Locky Variant Arrives as a Windows Script File |
| Tolkien Estate Sues Over Lord of the Rings</em> Slot Machines |
| Tomcat IR with XOR.DDoS |
| Tool Released to Decrypt Petya Ransomware Infected Disks |
| Tool Tip: Kansa Stafford released, PowerShell for DFIR |
| Tool updates and Win 8, (Sun, May 6th) |
| Tools released at Defcon can crack widely used PPTP encryption in under a day |
| toolsmith #112: Red vs Blue - PowerSploit vs PowerForensics |
| Top 100 security tools |
| Top 20 Internet Status Sites |
| Top 20 update; IM malware and IRC bots are the flavor of the day; Sober variant |
| Top 6 Mashable Comments This Week (Mashable) |
| Top20 List Updated; TCP/1433 Remains Elevated; ZoneAlarm 6.0 Released; The Penetrating Packets: Spam E-Mail |
| TOR servers seized by police in Germany |
| Torvalds Takes Issue With De Icaza's Linux Desktop Claims |
| Total Solar Eclipse Bedazzles Northern Australians |
| Tour of the Deep Underground Science and Engineering Lab |
| TR-069 NewNTPServer Exploits: What we know so far |
| Tracking HTTP POST data with ELK |
| Tracking Privileged Accounts in Windows Environments |
| Tracking SSL Certificates |
| Trade Group: US Software Developer Wages Fell 2% Last Year |
| Trading Privacy for Convenience |
| Traits of a Software Professional |
| Treasure Your Trials |
| Trend Micro unearths more links between China and hacker group |
| Trends in malware installers, Oddbob is back, .ANI file followup, and SMTP oddities redux. |
| Treo 700w DST Ooooops! |
| Trevor Eddolls - IBM Champion 2012 |
| Tricks for DLL analysis |
| Trisquel 6.0 'Toutatis' Is Now Available |
| Trojan attack on Maplesoft customers |
| Trojan Disguised as Microsoft Patch; Identity Theft |
| Trojan dropper in Power Point - a new issue? |
| Trojan exploiting MS05-053 - TROJ_EMFSPLOIT.A |
| Trojan postcards; Using authorized apps to do bad things; More IE and Outlook problems? |
| Trojan.Mdropper.Q / Email Attachment Practices |
| Trojanized SSH Daemon In the Wild, Sending Passwords To Iceland |
| Trouble At OnLive |
| Trouble Brewing? - Port 106 Activity |
| Trusteer Identifies Universal Man-in-the-Browser Attack Technique |
| Trustworthy Computing |
| TSA Says Screening Drinks Purchased Inside Airport Terminal Is Nothing New |
| Tsunami.exe, Oracle critical patch update, got packets? |
| Turkey Lurkey brings state of calm to the net -- well, almost |
| Turkish agency blamed by U.S. companies for intercepted Web pages |
| Turkish Registrar Enabled Phishing Attacks Against Google |
| Turning SF's Bay Bridge Into a Giant LED Display |
| TV station hacker warns of zombies in Montana |
| Twas the night before Christmas, when all through the house Not a creature was stirring, not even a mouse. |
| Tweet-to-buy? American Express says yes |
| Twin Craft To Study Space Weather From Within Earth's Radiation Belts |
| Twitter Based "Ted" System Warns of Earthquakes Earlier |
| Twitter Breached, 50k Accounts Posted to Internet |
| Twitter clients stay signed in with pre-breach passwords |
| Twitter hires Apple’s hacker nemesis to boost its security team |
| Twitter jumps on Do Not Track bandwagon |
| Twitter locks down logins by adding two-factor authentication |
| Twitter Resets 250,000 User Passwords After Cyber-Attack |
| Twitter spam campaign infects users with fake antivirus programs |
| Twitter stumble causes outage, not hactivist |
| Twitter suffers malware spam outbreak |
| Twitter Tells News Organizations to Expect Even More Hacks in the Future |
| Twitter's Vine App Ready To Bomb Internet With GIF-Like Videos |
| Two great books for aspiring "data scientists" |
| Two Heads Are Better Than One For Brain-Computer Interfaces |
| Two Changes To Quirky Could Change The World |
| Two new Internet Explorer vulnerabilities disclosed including PoC |
| Two New Sober Viruses on the Loose Today |
| Two subsystem parameters (DSNZPARM keywords) have been added in support of DDF (and other DDF enhancements...) |
| Two subsystem parameters have been added in support of DDF (and other DDF enhancements...) |
| Two Things I Wish Companies Cared More About: Cloud & Acquisitions Risks |
| Two-factor authentication Defense Mechanisms |
| Two-Way Firewall in Windows Vista and Microsoft OneCare |
| Tylenol May Ease Pain of Existential Distress, Social Rejection |
| Typo Squatting Charities for Fake Tech Support Schemes |
| Typo-Squatting and Password Best Practices |
| U.N. nuclear agency says hackers stole information |
| U.S Law Enforcement Agencies Increase Warrantless Electronic Snooping |
| U.S. Army, Target, others advertising on pirate sites |
| U.S. bank website hackers used advanced botnets, diverse tools |
| U.S. carriers line up against texting while driving |
| U.S. Congress urged to probe Chinese cyber-espionage |
| U.S. cyber warrior accuses China of targeting Pentagon |
| U.S. defense chief says pre-emptive action possible over cyber threat |
| U.S. group studying breach at Schneider unit |
| U.S. lawmakers to introduce new bill to punish cyber theft |
| U.S. looks into claims of security flaw in Siemens gear |
| U.S. panel urges wariness as Chinese investment grows |
| U.S. report says major weapons designs compromised by Chinese |
| U.S. Seeks Power to Wiretap Web Services, Including Google, Facebook |
| U.S. seeks to tackle trade secret theft by China, others |
| U.S. seeks to tackle trade-secret theft by China, others |
| U.S. Senator Takes Wrong Turn on DOJ's GPS Tracking Requests |
| U.S.-Israel project with Motorola leads to security-hardened industrial control system |
| UAC Bypass in JScript Dropper |
| Ubisoft assassinates Uplay flaw, denies DRM rootkit |
| Ubisoft DRM opens backdoor |
| Ubuntu Developing Its Own Package Format, Installer |
| Ubuntu Gnome Remix 12.10 Arrives For Testing |
| Ubuntu install passwd in log |
| Ubuntu Isn't Becoming Less Open, Says Shuttleworth |
| Ubuntu Touch Developers Aim for Daily Phone Usability Before June |
| uCertify Online Prep Kit - Software Review |
| UDP port 1434 directed attack to AS13489 IP ranges, (Fri, May 24th) |
| UDP Port 47290 |
| UDP traffic to port 50368 |
| UDP/1030 (continued) |
| udp/1030 Increase |
| UDP/4081 Spike |
| UK Authorities Threaten To Storm Ecuadorian Embassy To Arrest Julian Assange |
| UK biz pays heavy price for skimping on security - PwC |
| UK Broadband Plan Set To Clear EU Approval |
| UK cookies cop changes own policy to ‘implied consent’ |
| UK Court: MPAA Not Entitled To Profits From Piracy |
| UK Critical Infrastructure and Business Trojan Attacks (Updated), imap scanning, Opera vulns, Adobe Reader/Acrobat vuln, NIST Control Tool, Mailbag |
| UK Government Owns 16.9 Million Unused IPv4 Addresses |
| UK Government Spending £6,000 Per Computer Every Year To Maintain Desktops |
| UK Gov't Official Advises Using Fake Details On Social Networks |
| UK hacker jailed for nicking PayPal, banking data from MILLIONS |
| UK charges teenager for alleged jamming of anti-terrorist hotline |
| UK lawmakers say Huawei-BT deal exposes flawed security controls |
| UK License Plate Cameras Have "Gaps In Coverage" |
| UK Ministers' Private Communications Subject To Freedom of Information Act |
| UK Police Fined For Using Unencrypted Memory Sticks |
| UK Police Now Double As CCTV Cameras |
| UK police: Man charged in UK soldier's murder |
| UK.gov to spunk £2m a year policing global cyber-security |
| UKNova TV Torrent Tracker Shut Down After FACT Issues C&D |
| Ultra-hackable Google Glass could be a security nightmare |
| UN: More international cooperation needed to fight cyberterrorism |
| Unauthorized Change Detected! |
| Unencrypting Extortion Malware |
| Unidentified E-mail worm, PHP server vulnerabilities, MS SMS Client DoS |
| Uninstalling Problem Applications using Powershell |
| Unity Makes Strength |
| Universal IPSec VPN client for Android 4.0 |
| University Security Problems and Another CHM exploit in the Wild |
| Unix/Linux Steals the Show! |
| Unpatched exploit gets publicity |
| Unpatched Vulnerability in Firefox used to Attack Tor Browser |
| Unreal Engine Heap Overflow, RBOT.CC, ISCAlert |
| Unscrambling an Android Telephone With FROST |
| Unspecified Vulnerabilities in Flash |
| Unusual Discovery of New African Monkey Species |
| Unusual New Species of Dinosaur Identified |
| Update - Symantec RAR File Parser Remote Heap Overflow |
| Update 20:10 GMT 2004-1-28: New variant of Novarg/MyDoom found, Microsoft Changing IE's URL Handling, Solaris Local Privilege Escalation |
| Update Firefox to 1.5.0.1, the exploit is out |
| Update for Intel(R) PRO/Wireless 3945ABG Network Connection Software bugs |
| Update for Windows Update has teething troubles |
| Update from Microsoft Not Included in April 2006 Bulletin |
| Update on MS06-042 and CA Unicenter Service Desk |
| Update on Postcard virus emails |
| Update on Symantec Elevation of Privilege Vulnerability |
| Update on the Paypal Phish Phlaw |
| Update on the SUS issues |
| Update on the UDP strange packets |
| Update on TrendMicro Pattern 594 Issue; W2K Mainstream Support Ending June 30, 2005; My Computer Has a Rash |
| Update on Word 0-Day Issue |
| -UPDATE- Sasser Worm , Week in Review; LSASS Exploit Analysis; SANSFIRE 2004 |
| Update to MS04-025; Windows 2003 Guides Released; Port 3072; Your Daily Phish |
| Update/Fix for MS06-049 |
| Update: Malware Analysis: Tools of the Trade |
| Update: New Windows XP SP2 vulnerability; MS Patches reports; Bad, Bad Spam... |
| Update: Paypal Phish Conditioning; DNS Denial of Service Vulnerability; CA Vet Library Vulnerability; Combating Windows Malware Tutorial |
| Update: Sasser.d to start the work week, clean up tools may not be adequate |
| Updated (13:45 3/18 GMT): OpenSSL DoS Vulnerability, New Bagel Variants |
| Updated Acrobat Snort Sig / Cisco Advisory / Distributed Vulnerable Scripts Scans/ Diary Foot-note |
| Updated DShield Blocklist |
| Updated Malware Domain List |
| Updated Model Puts Earth On the Edge of the Habitable Zone |
| Updated MSIE VML Remote Buffer Overflow Exploit Code Released |
| Updated Packet Attack flash animation |
| Updated PFSense Client |
| Updated RSS Feed |
| Updated Twiki Snort Sig |
| Updated version of Ilfak Guilfanov's patch |
| Updated Windows Registry Concealment Info;Symantec AV Vulnerability |
| Updated(2): Checkpoint VPN-1 ASN.1 vulnerability, RADIUS and wireless, reminder about home routers |
| Updated: Bagle C Virus. New Vulnerability in RealSecure and BlackIce Products, Solaris 8 and 9 passwd(1) bulletin, WinZip flaw, IE cross-frame scripting issue |
| Updated: IWAP_WWW account on compromised IIS servers |
| Updated: MS04-011 LSASRV Exploit; Sasser Worm Update: Sasser.b |
| Updated: Security bulletins from Sun, more Dameware |
| Updates on DNS Poisoning / Peru Offline / Mailbag and other stories... |
| Updates on IE vulnerability |
| Updating early and often; NPR gets it right |
| UPEK fingerprint scanners insecure, says Elcomsoft |
| Upgrading ODI to 11g |
| Upgrading Software From 350 Million Miles Away |
| UPnP Problems |
| UPnP scan shows 50 million network devices open to packet attack |
| UPS raises dividend to 62 cents from 57 cents |
| URGENT: New version of Beagle hitting |
| US accused of hypocrisy over cyber warfare |
| US activist released from Vietnam after 9 months |
| US Activists Oppose US Govt Calls To Weaken EU Privacy Rules |
| US Air Force Scraps ERP Project After $1 Billion Spent |
| US Authorities Start Extradition Process in Megaupload Case (March 5, 2012) |
| US banks hit by more than a week of cyberattacks |
| US blaming Iran for Persian Gulf cyberattacks |
| US CEO Says French Workers Have Three-Hour Work Day |