- Databáze Hot News SANS News -

Poslední aktualizace v 10.09.2016 12:53:47

 

"6tus Layer Specification" - Qin Wang, Xavier Vilajosana, Thomas Watteyne
"A Common Operational Problem in DNS Servers - Failure To Respond." - Mark Andrews
"A framework for RPs to use IKEv2 KMP" - Uma Chunduri, Albert Tian, Joseph Touch
"A Framework for Semantic IPv6 Prefix" - Sheng Jiang, Qiong Sun, Ian Farrer, Yang Bo
"A Generic Bundle Mechanism for the Session Description Protocol (SDP)" - Dale Worley
"A Reputation Query Protocol" - Nathaniel Borenstein, Murray Kucherawy
"A Security Threat Analysis for Routing over Low-Power and Lossy Networks" - Tzeta Tsao, Roger Alexander, Mischa Dohler, Vanesa Daza, Angel Lozano
"A Simple Secure Address Generation Scheme for IPv6 AutoConfiguration (SSAS)" - Hosnieh, Christoph Meinel
"A Summary of Various Mechanisms Deployed at L-Root for the Identification of Anycast Nodes" - Joe Abley
"A workaround for termination of IPv4 network services" - Hiroaki Hazeyama, Atsushi Onoe, Osamu Nakamura
"Allocating and Retiring Special Purpose MPLS Labels" - Kireeti Kompella, Adrian Farrel
"Allocating and Retiring Special Purpose MPLS Labels" - Kireeti Kompella, Loa Andersson, Adrian Farrel
"Analysis of Comparisons between OpenFlow and ForCES" - Susan Hares
"Applicability of Access Node Control Mechanism to PON based Broadband Networks" - Nabil Bitar, Sanjay Wadhwa, Thomas Haag, Li Hongyu
"Attribute-Value Pairs For Provisioning Customer Equipment Supporting IPv4-Over-IPv6 Transitional Solutions" - Cathy Zhou, Tom Taylor
"Authenticated Identity Management in the Session Initiation Protocol (SIP)" - Jon Peterson, Cullen Jennings, Eric Rescorla
"Autonomous Extensible Internet with Network Address Translation(AEIP NAT)" - Diao Yongping, Ming Liao, Yuping Diao
"Benchmarking Neighbor Discovery Problems" - William Cerveny
"BGP FRR Protection against Edge Node Failure Using Vector Labels" - Ahmed Bashandy, Nagendra Kumar, Maciek Konstantynowicz
"BGP IP VPN Data Center Interconnect" - Luyuan Fang, Rex Fernando, Dhananjaya Rao, Dhananjaya Rao
"BGPSEC Protocol Specification" - mlepinski.ietf@gmail.com
"Binary Encodings for JavaScript Object Notation: JSON-B, JSON-C, JSON-D" - Phillip Hallam-Baker
"Careerbuilder Job Application" email scam with Dynamic DNS 
"CDNI Control Interface / Triggers" - Rob Murray, Ben Niven-Jenkins
"CLUE Signaling" - Paul Kyzivat, Lennard Xiao, Christian Groves
"CLUE Switching Mixer Example" - Mark Duckworth
"Controlled Delay Active Queue Management" - Kathleen Nichols, Van Jacobson
"CUSAX: Combined Use of the Session Initiation Protocol (SIP) and the Extensible Messaging and Presence Protocol (XMPP)" - Emil Ivov, Enrico Marocco, Peter Saint-Andre
"CUSAX: Combined Use of the Session Initiation Protocol (SIP) and the Extensible Messaging and Presence Protocol (XMPP)" - Emil Ivov, Peter Saint-Andre, Enrico Marocco
"DANE TLSA implementation and operational guidance" - Viktor Dukhovni
"DECADE: DECoupled Application Data Enroute" - Richard Alimi, Akbar Rahman, Dirk Kutscher, Yang Yang, Haibin Song, Kostas Pentikousis
"Definition of Managed Objects for the Optimized Link State Routing Protocol version 2" - Ulrich Herberg, Robert Cole, Thomas Clausen
"Delay Tolerant Networking Email Convergence Layer Protocol" - Bjoern Gernert, Sebastian Schildt
"DHCPv4 over A+P softwires" - Ole Troan
"Diameter Overload Control Solution Issues" - Ben Campbell
"Distributed Mobility Management: Service flows distribution and handoff technique based on MIPv6" - Liu Min, Yuwei Wang
"DNS Root Name Service Protocol and Deployment Requirements" - Marc Blanchet, Lars-Johan Liman
"Domain Name Registration Data Access Protocol Object Inventory Analysis" - Linlin Zhou, Ning Kong, Sean Shen, Steve Sheng
"Dynamic RP encodings in BGP based MVPNs" - Pavan Kurapati, Marco Rodrigues, Kurt Windisch, Saud Asif
"Emergency Services Support in WebRTC" - Bernard Aboba, Martin Thomson
"Event Publishing Extensions to iCalendar" - Mike Douglass
"Explicit RPF Vector" - Javed Asghar, IJsbrand Wijnands, Sowmya Krishnaswamy, Apoorva Karan, Vishal Arya
"Extending an IPv6 /64 Prefix from a 3GPP Mobile Interface to a LAN" - Cameron Byrne, Dan Drown, Vizdal Ales
"Extensions to RSVP-TE for P2MP LSP Egress Local Protection" - Huaimo Chen, So Ning, Autumn Liu, Fengman Xu, Mehmet Toy, Lei Liu
"Extensions to Secure Shell Public Key Subsystem" - Mark Joseph, Jim Susoy
"Free" exchange rate conversion 
"Gotchas" to Look for When Hiring an ERP Consultant
"Guidelines for Choosing RTP Control Protocol (RTCP) Canonical Names (CNAMEs)" - Ali Begen, Colin Perkins, Dan Wing, Eric Rescorla
"Home Documents for HTTP Services: XML Syntax" - Erik Wilde
"HTTP Client Hints" - Ilya Grigorik
"HTTP Digest Update" - Rifaat Shekh-Yusef, David Ahrens
"HTTP Origin and Hop Hints" - Mark Nottingham
"HTTP Session Management" - Phillip Hallam-Baker
"Channel Binding Signalling for the Generic Security Services Application Programming Interface" - Nico Williams
"IANA Considerations and IETF Protocol and Documentation Usage for IEEE 802 Parameters" - Donald Eastlake, Joe Abley
"IANA Guidance for Managing the ULE Registry" - Gorry Fairhurst
"ICANN Registry Interfaces" - Gustavo Lozano
"IGP Extensions for Stateful PCE Discovery" - Siva Sivabalan, Jan Medved, Xian Zhang
"In-Band Authentication Extension for Protocol Independent Multicast" - Manav Bhatia, Dacheng Zhang, Bharat Joshi
"Indoor Signal Position Conveyance" - Kipp Jones, Christopher Steger
"Instant Messaging and Presence Purpose for the Call-Info Header in the Session Initiation Protocol (SIP)" - Peter Saint-Andre
"Interoperability between the Session Initiation Protocol (SIP) and the Extensible Messaging and Presence Protocol (XMPP)" - Chris Christou, Michael Lundberg, Christopher Ross, Peter Saint-Andre
"Interworking between the Session Initiation Protocol (SIP) and the Extensible Messaging and Presence Protocol (XMPP): Addresses and Error Conditions" - Peter Saint-Andre, Avshalom Houri, Joe Hildebrand
"Interworking between the Session Initiation Protocol (SIP) and the Extensible Messaging and Presence Protocol (XMPP): Groupchat" - Peter Saint-Andre, Salvatore Loreto, Saul Corretge, Fabio Forno
"Interworking between the Session Initiation Protocol (SIP) and the Extensible Messaging and Presence Protocol (XMPP): Media Sessions" - Peter Saint-Andre
"Interworking between the Session Initiation Protocol (SIP) and the Extensible Messaging and Presence Protocol (XMPP): One-to-One Text Chat" - Peter Saint-Andre, Salvatore Loreto, Eddy Gavita, Nazin Hossain
"IODEF Usage Guidance" - Panos Kampanakis
"IPv6 Email Authentication" - Douglas Otis, David Rand
"Key Wrapping with AES GCM for JWE" - Michael Jones
"Lawful-Intercept Support for SP Wi-Fi Deployments" - Byju Pularikkal, Sri Gundavelli, Mark Grayson, Rajat Ghai
"Layer 2 (L2) LISP Encapsulation Format" - Michael Smith, Dinesh Dutt, Dino Farinacci, Fabio Maino
"Link Management Protocol (LMP) Test Messages Extensions for Evolutive Optical Transport Networks (OTN)" - Daniele Ceccarelli, Diego Caviglia, Francesco Fondelli, Fatai Zhang, Dan Li, Dieter Beller
"LISP Based FlowMapping for Scaling NFV" - sbarkai@gmail.com, Dino Farinacci, David Meyer, Fabio Maino, Vina Ermagan
"LISP Based FlowMapping for Scaling NFV" - Sharon Barkai, Dino Farinacci, David Meyer, Fabio Maino, Vina Ermagan
"Macros Nixed by Major Providers" - Douglas Otis, David Rand
"Management of Networks with Constrained Devices: Problem Statement, Use Cases and Requirements" - Mehmet Ersue, Dan Romascanu, Juergen Schoenwaelder
"Managing SSH Keys for Automated Access - Current Recommended Practice" - Tatu Ylonen, Greg Kent
"Middlebox considerations in NVO3 overlay networks" - Melinda Shore, Gu Yingjie, Senthil Sivakumar
"Mounting YANG-Defined Information from Remote Datastores" - Alex Clemm, Jan Medved, Eric Voit
"Multiplexing Negotiation Using Session Description Protocol (SDP) Port Numbers" - Christer Holmberg, Harald Alvestrand, Cullen Jennings
"Multi-Upstream Interfaces IGMP/MLD Proxy" - Hong-Ke Zhang, Thomas Schmidt
"Network Management of Mobile Ad hoc Networks (MANET): Architecture, Use Cases, and Applicability" - James Nguyen, Robert Cole, Ulrich Herberg, Jiazi Yi, Justin Dean
"Network Virtualization Overlay Control Protocol Requirements" - Lawrence Kreeger, Dinesh Dutt, Thomas Narten, David Black, Murari Sridharan
"New" slammer and BHO's 
"NVGRE Router Alert Option" - Kanwar Singh, Pradeep Jain, Florin Balus, Wim Henderickx
"NVGRE-EXT: Network Virtualization using Generic Routing Encapsulation Extensions" - Murari Sridharan, Yu-Shun Wang, Pankaj Garg, Praveen Balasubramanian
"OAuth 2.0 Token Revocation" - Torsten Lodderstedt, Stefanie Dronia, Marius Scurtescu
"OmniBroker Protocol" - Phillip Hallam-Baker
"Operational Considerations Regarding Reputation Services" - Murray Kucherawy
"OSPF Incremental Link State Database Synchronization" - Alvaro Retana, Acee Lindem
"P6R's Secure Shell Public Key Subsystem" - Mark Joseph, Jim Susoy
"PCP Considerations for WebRTC Usage" - Reinaldo Penno, Tirumaleswar Reddy, Dan Wing, Mohamed Boucadair
"PCP Extension for Third Party Authorization" - Dan Wing, Tirumaleswar Reddy, Prashanth Patil, Reinaldo Penno
"Precursor Notification for dynamic MANET On-demand (AODVv2) Routing" - Charles Perkins
"Prefix Delegation Support for Proxy Mobile IPv6" - Xingyue Zhou, Jouni Korhonen, Carl Williams, Sri Gundavelli, Carlos Bernardos
"Problems with STUN Authentication for TURN" - Tirumaleswar Reddy, Ram R, Muthu Perumal, Alper Yegin
"Profile Support for the Atom Syndication Format" - Erik Wilde
"Proposed Refactoring of JOSE to Align Encryption and Key Wrapping" - Richard Barnes
"Protocol to Access White Space (PAWS) Database: Use Cases and Requirements" - Anthony Mancuso, Scott Probasco, Basavaraj Patil
"PSC protocol updates for non-revertive operation" - Tae-sik Cheung, Alessandro D'Alessandro, Huub van Helvoort
"Pseudowire Setup and Maintenance using the Label Distribution Protocol" - Luca Martini, Giles Heron
"RADIUS Attribute for 4rd" - Sheng Jiang, Yu Fu, Bing Liu
"RADIUS Extensions for DS-Lite Multicast" - Jie Hu, Wei Meng, Cui Wang
"Reconfigure Triggered by DHCPv6 Relay Agents" - Mohamed Boucadair, Xavier Pougnard
"Recursive PCP" - Stuart Cheshire
"Redirection Service for Registration Data Access Protocol" - Carlos Martinez, Arturo Servin, Linlin Zhou, Dario Gomez, Gerardo Rada
"Registration of Second-Level URN Namespaces Under "ietf"" - Barry Leiba
"Requirements for Ethernet VPN (E-VPN)" - Ali Sajassi, Rahul Aggarwal, Nabil Bitar, Aldrin Isaac
"Resource ReserVation Protocol-Traffic Engineering (RSVP-TE) extension for recording TE Metric of a Label Switched Path" - Zafar Ali, George Swallow, Clarence Filsfils, Matt Hartley, Kenji Kumaki, Ruediger Kunze
"Router Advertisement based privacy extension in IPv6 autoconfiguration" - Hosnieh, Christoph Meinel
"Routing for IPv4-embedded IPv6 Packets" - Dean Cheng, Mohamed Boucadair, Alvaro Retana
"RTCP XR Report Block for One Way Delay metric Reporting" - Ray van Brandenburg, Kevin Gross, Wenson Wu, Fernando Boronat, Mario Montagud
"RTCWeb Data Channels" - Randell Jesup, Salvatore Loreto, Michael Tuexen
"RTP payload format for Enhanced Variable Rate Narrowband-Wideband plus 2kbps Codec (EVRC-NW2K)" - Alok Gupta
"rxgk: GSSAPI based security class for RX" - Simon Wilkinson, Benjamin Kaduk
"Scenarios and Requirements for IP in Intelligent Transportation Systems" - Alexandru Petrescu, Christophe Janneteau, Michael Boc, Witold Klaudel
"SDP for the WebRTC" - Suhas Nandakumar, Cullen Jennings
"Segment Routing with IS-IS Routing Protocol" - Stefano Previdi, Clarence Filsfils, Ahmed Bashandy, Martin Horneffer, Bruno Decraene, Stephane Litkowski, Igor Milojevic, Rob Shakir, Saku Ytti, Wim Henderickx, Hannes Gredler
"Segment Routing with IS-IS Routing Protocol" - Stefano Previdi, Clarence Filsfils, Ahmed Bashandy, Martin Horneffer, Bruno Decraene, Stephane Litkowski, Igor Milojevic, Rob Shakir, Saku Ytti, Wim Henderickx, Jeff Tantsura
"Significance of IPv6 Interface Identifiers" - Brian Carpenter, Sheng Jiang
"Sophisticated Android Trojan" identified
"Supporting the Exercise command for PSC linear protection protocol" - Alessandro D'Alessandro, Jeong-dong Ryoo, Huub van Helvoort
"Survey of P2P Streaming Applications" - Gu Yingjie, Ning Zong, Yunfei Zhang, Francesca Piccolo, Shihui Duan
"Survey Report on PIM-SM Implementations and Deployments" - Lianshu Zheng, Jeffrey Zhang, Rishabh Parekh
"Terrorist" Lyrics Land High Schooler In Jail
"The Applicability of the PCE to Computing Protection and Recovery Paths for Single Domain and Multi-Domain Networks." - Huaimo Chen, Dhruv Dhody
"The application/firmware, application/firmware-receipt, and application/firmware-error media types" - Sean Turner, Russ Housley
"The IETF Profile URI Registry" - Markus Lanthaler
"The Internet Numbers Registry System" - Russ Housley, John Curran, Geoff Huston, David Conrad
"The LLN On-demand Ad hoc Distance-vector Routing Protocol - Next Generation (LOADng)" - Thomas Clausen, Axel Verdiere, Jiazi Yi, Afshin Niktash, Yuichi Igarashi, Hiroki Satoh, Ulrich Herberg, Cedric Lavenu, Thierry Lys, Charles Perkins
"the question is not “why should we have CME IDs” but “how do we make CME IDs work?" 
"The Subnetwork Encapsulation and Adaptation Layer (SEAL)" - Fred Templin
"The WebSocket Protocol as a Transport for the Session Initiation Protocol (SIP)" - Inaki Castillo, Jose Millan, Victor Pascual
"TMCH functional specifications" - Gustavo Lozano
"Transaction SIGnature (TSIG) using CGA Algorithm in IPv6" - Hosnieh, martin@v.loewis.de, Christoph Meinel
"Transparent Interconnection of Lots of Links (TRILL) Use of IS-IS" - Donald Eastlake, Anoop Ghanwani, Radia Perlman, Dinesh Dutt, Ayan Banerjee
"Transport of London" Malicious E-Mail
"Transporting Timing messages over MPLS Networks" - Shahram Davari, Amit Oren, Manav Bhatia, Peter Roberts, Laurent Montini
"Traversal Using Relays around NAT (TURN) Extensions for Websocket Allocations" - Chen Xin
"TRILL: Adjacency" - Donald Eastlake, Radia Perlman, Anoop Ghanwani, Vishwas Manral
"Trust Requirements in a Federated World" - Josh Howlett, Rhys Smith, Margaret Wasserman
"Tunneling Compressed Multiplexed Traffic Flows (TCMTF)" - Jose Saldana, Dan Wing, Julian Navajas, Muthu Perumal, Fernando Blanco
"Using Extended Key Usage (EKU) for REsource LOcation And Discovery (RELOAD) X.509 Certificates" - Marc Petit-Huguenin
"Virtual Private Lan Services (VPLS) Management Information Base" - Thomas Nadeau, Kiran Koushik, Rohit Mediratta
"VPLS external Loop Protection Mechanism (VLPM)" - Richard Boldy
"Vulnerability Data Model" - harold.booth@nist.gov, Karen Scarfone
"VXLAN DCI Using EVPN" - Sami Boutros, Ali Sajassi, Samer Salam, Dennis Cai
"VxLAN Router Alert Option" - Kanwar Singh, Pradeep Jain, Florin Balus, Wim Henderickx
"X.509v3 TLS Feature Extension" - Phillip Hallam-Baker
"XML Schemas for Reverse DNS Management" - Terry Manderson
#49, Does Your Search Engine Need A Tune-up?, On The Soapbox, Auld Lang Syne 
#DF12 Dreamforce - the Social Trade Show
#DF12 Dreamforce Notes - CMO and Platform Dominate the Discussion
#DF12 Salesforce - More than Sales and CRM
#DF12 The Cloud - Is Corporate IT Missing the Party?
$5 Sensor Turns LCD Monitors Into Touchscreens
(Another) AOL Pwstealer 
(Update #Last : 23:00GMT) Cisco! Pancho!; MetaMetasploit?; BrightStor Exploits/Scanner; It Takes a Village...; Mystery; GHH 
(Updated) Additional info on yesterday's Linksys item, the importance of patching 
(Updated) Another Russian Bank Scam, New Exploit for MS04-020 
* {update #2} .org dns problems, RFI - Russian IIS Hacks? 
* 0-Day Win32 holes, Oracle&DB2 Revisited, Snort DoS Update, IRC over SMTP, Santy Poll Results 
* A Critical IE Patch Released / Why the Internet is Like an Elephant 
* Back to Green 
* DNS Cache Poisoning Report; Increase in Port Activity 
* DNS Cache Poisoning Report; Increase in Port Activity; SANS Conference 
* Internet Explorer 0-day exploit 
* Microsoft Patch for IFRAME vulnerability 
* Microsoft Patches Coming Today 
* Microsoft Releases 8 Critical Security Patches, etc. 
* Microsoft Security Bulletins for June 2004 
* MS06-040 exploit in the wild 
* MS06-042 reissue 
* MySQL Bot 
* New DNS cache poisoning server; DNS Poisoning stats; Bluemountain; Win2k3 SP1; awstat.pl Details; port 1025; MS05-002 problem 
* New exploit released for the WMF vulnerability - YELLOW 
* Update on Windows WMF 0-day 
* UPDATE: phpBB Worm. Holiday Security Guide, Predictions for 2005, Sign that you take security too serious. (1 Comments)
* UPDATE: Possible MySQL Bot. New Juniper Vuln, Advice on managing X Windows security, Request for input on 2005 Critical Threats 
* Updated: Serious Symantec Vulnerability, 1-day exploits, and the missing 13th patch 
* Veritas Backup Exec 0-day; POC code available for multiple updated MS vulns; P2P on the Vista 
* VML Update Released 
* VMWare vulnerability announced and fixed 
* Windows WMF 0-day exploit in the wild 
*Intel Centrino Vulnerabilities 
*Santy worm defaces websites using php bug 
*Santy Worm Update, Snort 2.2 DoS, IRC over SMTP, SSH Scanning, An InfoSec Christmas Story 
*WebViewFolderIcon ActiveX control exploit(s) in the wild 
.COM.COM Used For Malicious Typo Squatting
.MSI installer file for WMF flaw available 
.PUB Analysis
.wmf FAQ Translations 
/ Reading Logs / More Phishing / TCP 135, Welchia and Lovgate / Sasser slowing / Egress Filtering and You /
/dev/random 
/tmp, %TEMP%, ~/Desktop, T:\, ... A goldmine for pentesters!
‘FinFisher’ spyware can take over an iPhone or Android phones remotely
“Banned” iPhone 5 commercial
“Car Talk” on NPR to end soon
“Order” e-mails and how to block them 
“Patch Tuesday” (14Mar13) is upon us
<em>Among Others</em> Wins Hugo For Best Novel
<em>Team Fortress 2</em> Beta Patch Adds Files Referring To Linux Support
<em>The Oatmeal</em> Begins a Fundraiser for a Nikola Tesla Museum
<i>Angry Birds</i> boss: Piracy helps us 'get more business'
03/09 Webcast Update; Possible Adware/Spyware Infection Via Worm; The Pain of Dealing With IRCBot's 
0-day exploit for Microsoft PowerPoint 
0day this, 0day that, I've got the 0day blah's, as does Microsoft Office 2000 PPT 
0-Day Thursday: PoC for Powerpoint Vulnerability 
0x01 trojan update (ev1.net host), openssl proof of concept exploit, HP mystery ssh patch 
1 compromised site - 2 campaigns
10 commandments of Windows security
10 Disruptive Online Services Enterprises Should Ban From the Network
10 questions for Layer 7 Technologies CTO Scott Morrison
10 Signs that your project may be doomed
10 things you need to know today: March 21, 2013
100% Compliant (for 65% of the systems), (Fri, Jun 7th)
100K Google Android Apps Pose Potensial Security Risk: Bit9 Report
12 questions you may like to ask when recruiting an enterprise architect
12/23/03 CitiBank/Visa Account Phishing, ISS IE URL Spoofing filter, Dameware scanning, Apple patch links 
12-year-old boy charged in Ashton Kutcher hoax
16 ultimate SSH hacks
17th Century Microscope Book Is Now Freely Readable
18 Carriers Sign Up for Firefox OS Phones
1976 Polaroids of an Apple-1 Resurface
2 Cisco Vulnerabilities, New Auto-Executing Virus Capabilities (Bugbear.C), MacOS X Security Update, Metasploit Framework Release 
2004 - A Look Back - Your Choice for Diary of the Year - Happy New Years 
2005 SANS Top 20 
2006 Predictions 
2006, Week 1: A Look at the Numbers 
2013 Security Breaches: A Bad Year Already
2016-11-18 example of KaiXin EK activity
21st IOCCC Source Code Released
2222/tcp Probe Increase 
2222/tcp Probes 
24 BEA WebLogic Vulnerabilities and Security Issues 
2-factor auth poll-results; Sticky firewall question; Handling Incidents Involving Dynamic DNS; Sybase Buffer Overflow Vulnerability Details to Be Announced; Mac OS X Issues Released; Belated Happy N 
2nd generation WMF 0day Exploit Spammed 
2nd generation WMF exploit: status of the anti-virus products after one day. 
3 Questions to Ask "Cloud Computing Job Candidates"
300 blogs
3D Printers For Peace Contest
40 Essential Mashable Stories You May Have Missed in 2012
404dnserror Adware 
419 Scams Now In Chat Rooms (1 Comments)
4242/TCP Activity is up 
5 Microsoft Advisories 
5 Questions to Ask your IoT Vendors; But Do Not Expect an Answer.
5 signs that you've lost control over your cloud apps
5. PTF Identification (Part 1) URL and Page
50 Million Potentially Vulnerable To UPnP Flaws
50 Years of Research and Still No Microwave Weapons
52 Digital Media Resources You May Have Missed
522 Error Code for the Win
6 adorable animals that interrupted sporting events
6 bagle versions in 1 day 
6 Black Friday Scams to Fear
6 of the saddest Valentine's Day apps (and one good one)
6101 and 6129 scans on the rise; “infected links”; A reader Query; A Goodie Basket for Grandma 
65 Digital Media Resources You May Have Missed
7 Craziest Intelligence Leaks in US History
7 Modeling Tools To Help Assess Cloud ROI
7. PTF File Access
72% of Xbox 360 Gamers Approve of "More Military Drone Strikes"
7sir7 Mass Hack Update / DNS Cache Poisoning / Phishing with a twist 
8.7 million mobile customers hacked in S.Korea
802.11ad Will Knock Your Socks Off, Says Interop Panel
80FFTs Per Second To Detect Whistles (and Switch On Lights)
9 Data Centers: Unexpected Beauty
A $5,000 vulnerability in Facebook
A (Mostly) 3-D Printed Race Car Hits 140 Km/h
A .BUP File Is An OLE File
A Blood Test That Screens For Cancer
A Bump in the Wire 
A Bunch Of Bull in a China Shop 
A busy Black Tuesday coming up..... 
A cavity in Linux Bluetooth? 
A Close Look at PayPal Overpayment Scams That Target Craigslist Sellers
A Collaborative Way of Working: Oracle E-Business Suite Integration
A Conversation with the President of the Open Source Initiative (Video)
A couple of handy iptables tutorials 
A Day Early, Google's at it With 8-Bit Google Maps - for April Fools' 2012
A day in the life of a pentester, or is my job is too sexy for me?
A Few Improvements for Firefox's Android UI
A few Mirai Updates: MIPS, PPC version; a bit less scanning
A few preliminary log analysis thoughts 
A Few Thoughts on the Recent MySpace Worm 
A Glimpse At Piracy In the UK and Beyond
A Good Day for Phishing; SSH Followup; NIMDA, Still There; Tip for the Day 
A handful of bugs, a fix, and some good reading 
A Humanoid Robot Named "Baxter" Could Revive US Manufacturing
A Lesson Learned from the Mailbox 
A loan offer or two 
A Look at the Mandiant M-Trends 2016 Report
A Look Inside a Dirty Computer 
A look through the spam filters - examining waves of Upatre malspam
A Major Shift in Cyber Security of Industrial Control Systems (February 5, 2013)
A malware jungle 
A new botnet - Mocbot 
A new DB2 for z/OS Redbook draft is now available for download
A new tool to detect & remove malware
A Nonsensical Proposal - Beta Patches 
A Peek Into The MailBag 
A phased approach to IPv6 that's so easy, you'll almost think you're still ignoring it
A Piezoelectric Pacemaker That Is Powered By Your Heartbeat
A possible first example of user interface exploits in Internet Explorer; Holiday gift-giving 
A Quarter of Sun-Like Stars Host Earth-Size Worlds
A question; New MSBA; Finding zlib; Evading Snort; Some Reading; FTBM VI: Hypnotized and EULAgized 
A Quick Guide-BI Platform & Implementation Strategy
A quiet day on the Internet 
A Real-Time Map of Global Cyberattacks
A recent decline in traffic associated with Operation Windigo
A recent example of wire transfer fraud
A Report from the Field 
A Report on ICANN 43: New gTLDs and DNSSEC
A Robot With a Chainsaw!
A Sad-day for Customer Service 
A Sea Story: the Wreck of the Replica HMS Bounty
A Security Sampler 
A slew (well, a couple) of new vulns, more on weird DNS traffic and a mystery app 
A Snapshot of the Inside of an Atom
A sober New Years update. 
A TCP/IP mystery (solved) 
A Terrifying Tale of TCP ... Terror 
A Tip For The Analysis Of MIME Files
A Tool to Create PS Role Matrix with Navigations
A Trail of Clicks, Culminating In Conflict
A trip through the spam filters: more malspam with zip attachments containing .js files
A trojan that deletes spyware? - More botnet fun - World record attempt 
A TWiki Vulnerability Allows Remote Code Execution 
A very [word beginning with 'q' deleted] day and helpful links 
A Wall Against Cryptowall? Some Tips for Preventing Ransomware
A Wi-Fi Wardriving Motorbike — With Plans Available
A wild ride last month.
Aaron Swartz Isn't the First Hacker to Commit Suicide in the Face of a Federal Investigation
Aaron Swartz's Estate Seeks Release of Documents
Aaron's Law: Violating a Site's ToS Should Not Land You in Jail
Abuse handling and the misfortunes of the good Samaritan 
Abusing Oracles
Academia joins in battling Android malware
ACDSee Fotoslate DLL Loading Arbitrary Code Execution Vulnerability
ACDSee Photo Editor 2008 DLL Loading Arbitrary Code Execution Vulnerability
ACDSee Picture Frame Manager DLL Loading Arbitrary Code Execution Vulnerability
ACLU: Most US police don't seek warrants before tracking cell phones
Acrobat Reader Vulnerabilities - FreeBSD Security Benchmark - Phishing Season 
Acronis vmProtect 7 Tightens vSphere Integration
Active exploit of Open Conference Systems web application 
ActiveX Kill Bit Can Be Bypassed - Another Reason to Apply MS05-054? 
Activists urge Skype: Tell us who is spying on us
Activity increase on Port 12345; More Phishing; Ethereal Exploit 
Actor that tried Neutrino exploit kit now back to Angler
Actor using Angler exploit kit switched to Neutrino
Actor using Rig EK to deliver Qbot - update
Actors using exploit kits - How they change tactics
acts of terrorism trojan 
Actual Final Third Party Debate Tonight
ACTUALIZA1-Chinas Huawei, Zte deben ser excluidas EEUU: comisión
Ad Blocking – a Coming Legal Battleground?
AD Security's Unofficial Guide to Mimikatz & Command Reference
Adafruit Launches Educational Show Aimed At Kids
Adaware corrects their false positives 
Additional notes on Stumbler. 
ADF BC, Overriding prepareSession, and PL/SQL
Administrata; MS05-026 exploits in the field? No, not really; OpenRBL ist Kaput; Passive Reconnaissance and the Disaster Response threat-space; mod_jrun exploit sweep 
Adobe Acrobat and Reader Pre-Announcement
Adobe Acrobat Update 
Adobe backpedals, will now patch software for free
Adobe backs down, patches critical Photoshop CS5 hole
Adobe backs down, will release patches for critical holes
Adobe Connect Security Breach Exposes Personal Data of 150K Users
Adobe Flash Player Bug Spreading Via Word Documents in Emails
Adobe Flash Player Update
Adobe Flash Player update http://www.adobe.com/support/security/bulletins/apsb12-22.html, (Tue, Oct 9th)
Adobe Flash player upgrade time 
Adobe Flash Update
Adobe Flash update available 
Adobe Flash update closes several critical holes
Adobe Flash Update: Here we go again!!
Adobe Hopes Pop-up Warnings Will Stop Office-Borne Flash Attacks
Adobe Issues Another Flash Player Fix (March 5, 2012)
Adobe Issues Emergency Flash Player Patches to Block Cyber Attacks
Adobe Issues Reader, Acrobat Security Updates to Stave Off Attacks
Adobe January 2017 Patches
Adobe open sources Malware Classifier tool
Adobe Patch Tuesday - February 2016
Adobe patches critical Flash bugs, ships sandboxed plug-in for Firefox
Adobe patches new Flash zero-day bug with emergency update
Adobe Reader Update 
Adobe releases critical security updates for Reader, Flash Player and ColdFusion
Adobe releases open source malware classification tool
Adobe Releases Surprise Shockwave Player Patch
Adobe Revoking Code Signing Certificate Used To Sign Malware
Adobe scrambles to revoke stolen cert
Adobe switches Flash fix schedule to Patch Tuesdays
Adobe Update to Vulnerabilities, (Sat, May 12th)
Adobe Updates Flash Player, Shockwave and PDF Reader
Adobe Updates for Flash Player. More info can be found here --> http://www.adobe.com/support/security/bulletins/apsb12-14.html, (Sat, Jun 9th)
Adobe Updates Shockwave Player
Adobe will be changing Creative Suite to a subscription model after CS6
Adobe Working on Patches for Newly Discovered Zero-Day Code Flaws
Adobe: Pay upgrade price to patch critical bugs
Adobe: Photoshop is not a target for attackers
Adobe's Creative Cloud Illustrates How the Cloud Costs You More
Adobe's security chief praises Apple for Flash-crippling move
ADODB.connection Vuln 
Adore-ng 0.31 released and POC code for do_mremap() 
Advance info for Patch Tuesday; Yellow; DNS cache poisoning update 
Adventures in Hunting Rogue Wireless Access Points 
Advocacy group takes aim at antiporn bill requiring ISP data retention
Adwind: another payload for botnet-based malspam
African Robotics Network Challenge Spurs Rash of $10 Robots
African Soil Mapped For the Very First Time
After 24 hours of fun we are back online! 
After Aaron Swartz's Death, the Focus Now Falls On the Prosecutors
After Flash, what will exploit kits focus on next?
After Weeks of Trying, UK Cryptographers Fail To Crack WWII Code
Aftermath of Microsoft's October Bulletins, more bots, and Linux rootkits 
Agile Development Teams CAN build secure software
AI System Invents New Card Games (For Humans)
aim for a gdi exploit. 
AIM Phishing, Windows file integrity flashback, pstools vulnerability 
AIM worm and AV... 
Air Force Looking To Beef Up Spacecraft Network Security
Air Quality Apps and Bottled Air Thrive On Beijing's Pollution
Airlines Face Acute Pilot Shortage
Akamai Problems, New Angle(r) On An Old Phish 
Akamai problems. Quiet, well kinda quiet, day on the Internet 
Akamai/Internet DNS Problems (Updated), Exploitation of IE URL Spoofing, MS Re-Releases NT 4.0 Patch, ISC Site Under Heavy Load 
Al Jazeera says hackers sent false mobile texts
Alan Cox: Fedora 18 "The Worst Red Hat Distro," Switches To Ubuntu
Alcatel CEO to leave after company swings to 2012 loss
ALERT - Black Ice Worm 
All CVE Details at Your Fingertips
All Five Star Trek Captains Share a Stage
All I want for christmas are my exploits.... 
All quiet on the MAE Western front 
All-At-Once Operations in SQL: A Flaw In The Language?
All's quiet on the Internet ... 
Ally Financial latest U.S. bank to face cyber attack
Ally Financial latest U.S. bank to face cyber attacks
Alpha Centauri Has an Earth-Sized Planet
Always get permission - VA stolen laptop recovered 
Amarok 2.6 Music Player Released
Amateurs battle malware, hackers in UK cybergames
Amazing Mindreader Reveals Scary Truth [VIDEO]
Amazon and Google Barred From UK Government Cloud
Amazon Buys Sunlight Readable Color Display Company Liquavista
Amazon Charges Sales Tax On "Shipping and Handling"
Amazon launches Android app store in China
Amazon Recalling Sony CRM CD's 
Amazon To Launch Sydney Data Center
Amazon Woes 
Amazon woos enterprise with Virtual Private Cloud
Amazon, Microsoft Partner Up for Cloud Management
AMD Files Suit Against Former Employees For Alleged Document Theft
AMD Forums Uh-Oh 
AMD Launches New Mobile APU Lineup, Kabini Gets Tested
AMD Next-Gen Graphics May Slip To End of 2013
AMD Releases UVD Engine Source Code
AMD Reportedly Preparing Massive Layoff
AMD Trinity APUs Stack Up Well To Intel's Core 3
AMD Unveils Elite A-Series APUs With Enhanced Performance, Improved Efficiency
AMD, Intel Partner to Form Cyber Security Research Alliance
AMD's Next-Gen Steamroller CPU Could Deliver Where Bulldozer Fell Short
American democracy activist returns to US, lands in LA after 9-month detention in Vietnam
Amid Fiscal Uncertainty Venture Capital Is Way Down In Silicon Valley
Amnesty International's UK website compromised to infect visitors with cyberspying malware
Amsterdam Using Airbnb Listings To Identify Illegal Hotels
An Analysis of Jester's QR Code Attack. (Guest Diary), (Sun, Mar 11th)
An anti-virus goof; security awareness; and a return visit from some old friends; phishers, and sasser 
An Assessment of the Oracle Password Hashing Algorithm 
An Assignment From Professor Packetslinger of the School of Loose Screws 
An Impromptu Lesson on Passwords .., (Mon, Apr 30th)
An ISC Back to School Special 
An oldie but a goodie - 419 Death Scam
An Oven That Runs Android
An Overview of the FreeVideo Player Trojan 
An unpatched IE exploit invokes a second older unpatched IE exploit 
Analysis of botnet spamming trojan (SecureWorks) 
Analysis of Mocbot Goals 
Analyze of a Linux botnet client source code
Analyze of a malicious Word document with an embedded payload
Analyzing evidence of DNS attacks in PIX firewall logs; Trojans for industrial espionage; openrbl.org offline? 
Analyzing Malicious RTF Files Using OfficeMalScanner's RTFScan, (Fri, Sep 14th)
Analyzing Office Maldocs With Decoder.xls
Analyzing outgoing network traffic, (Thu, Aug 23rd)
Analyzing Quarantine Files
Analyzis of a Malicious .lnk File with an Embedded Payload
Anatomy of a global bank cyber theft
Ancestor of All Placental Mammals Revealed
Ancient Egyptian Tech May Be Key To Printing 3D Ceramics
Ancient vulnerability sparks world-wide hypegasm
And *another* 0-day Linux kernel vulnerability 
and little flaws in IVE 
And now, for something completely different! A novel use for an iPad..
And Now, the Cartoon News
And the SHA-3 title goes to .....Keccak, (Thu, Oct 4th)
And Today is Super Tuesday 
Android a photo-slurper too: report
Android adware capability a vulnerability, claim boffins
Android Apps Don't Need Permission to See Your Data
Android bot attacks rooted smartphones
Android in enterprises 'severely limited' by weak management support from Google
Android Malware "Obad" Called Most Sophisticated Yet
Android Malware Botnet Claims Doubted as Researchers Review Evidence
Android Malware Intercepts Text Messages, Forwards To Criminals
Android malware writers exploit Instagram craze to distribute SMS Trojan horse
Android Phone Hacked by Researchers via NFC - Security - News & Reviews - eWeek.com
Android smartphones infected via drive-by exploit
Android smartphones: USSD calls can kill SIM cards
Android Stagefright multimedia viewer prone to remote exploitation
Android threats growing in number and complexity, report says
Android Trojan distracts Japanese with anime and porn
Android Trojan leaves 100,000 users out of pocket
Android, iOS bugs expose phones to voyeurs, data thieves
Angler EK campaign targeting several .co domains deploying teslacrypt 3.0 malware
Angler exploit kit generated by "admedia" gates
Angler Exploit Kit, Bedep, and CryptXXX
Angler's best friends
Animation Sophistication: The Croods</em> Required 80 Million Compute Hours
Announcing ISCAlert - Email Worms Bog Down ISPs 
Annual "Worst CEO" List Released
Anomaly Detection 
Anonymous attacks Israeli websites over Gaza bombings
Anonymous Australia Disavows Self-Proclaimed LulzSec Leader
Anonymous blows off WikiLeaks, calls Assange a sellout after Lady Gaga dinner
Anonymous Claims Attack on Facebook
Anonymous claims it hacked a DOJ site
Anonymous doxes Cambodia after Pirate Bay arrest
Anonymous Files Petition To Make DDoS Legal Form of Protest
Anonymous Group Hackers Claim Top Universities Are Easy Targets
Anonymous Hackers Claim Protest Attacks Hit Zynga, Facebook, Others
Anonymous Hacking Tool Infected With Trojan (March 5, 2012)
Anonymous hater claims responsibility for Pirate Bay DDoS attack
Anonymous releases sample of Australian telco's data
Anonymous stalking Australian spooks
Anonymous takes down UK government websites in Assange attack
Anonymous takes out Indian CERT as attacks continue
Anonymous targets Home Office and other government websites
'Anonymous' targets Israeli websites over Gaza war
Anonymous threat shutters Gitmo WiFi
Anonymous threatens cyberwar on North Korea, steals 15,000 passwords
Anonymous threatens to DDOS root Internet servers
Anonymous wants DDoS attacks recognized as speech
Another 0-Day Exploit - CVE-2006-4777 
Another Active Day 
Another backdoor in networking hardware for industrial systems
Another Day - Another Ransomware Sample
Another day in the life - Padobot, ports 5000, 135, 445 
Another day, another bot being spammed 
Another Day, Another Malicious Behaviour
Another Day, Another Spam...
Another Day, Another Wave of Phishing Emails
Another EUSecWest NFC Trick: Ride the Subway For Free
Another example of Angler exploit kit pushing CryptoWall 3.0
Another great course, but this time for prestigious jobs seekers
Another IE Exploit makes the rounds... 
Another Java Exploit For Sale
Another Juniper problem - Juniper Bulletin PSN-2005-11-003 from 11/04/05 
Another Malicious Document, Another Way to Deliver Malicious Code
Another month another password disclosure breach, (Thu, Nov 15th)
Another new Word 0-day, information & dat released by McAfee 
Another Phishing Trick; More Osama Messages; Crunchy-Gooey Security Designs 
Another Player In the World of Free, Open Online CS Courseware
Another PnP Worm; Feedback from Microsoft; Reader Mailbag; Johannes Redux; Apple Security Patches 
Another round of DNS cache poisoning 
Another Virus, ISC Poll Results, Port 1433 scans 
Another wave of virus / New Gaobot / HP Web JetAdmin Vulnerability exploitation 
Another WMF attack vector? 
Anthropologist Spends Three Years Living With Hackers
Anti-Israel hackers leak nuclear watchdog email addresses
Antiphishing.org Trend Report 
Antisec Exposes 1 Million Apple Device IDs Following 'FBI Hack'
AntiSec hackers release 1 million stolen Apple device IDs – are you affected?
Anti-spam list shutoff; Special report on "phishing" attacks 
Antivirus Firms "Won't Co-operate" With PC-Hacking Dutch Police
ANU puts quantum random numbers online
AOL ICQ vulnerabilities 
AOL: the Good, the Bad and the Ugly 
AP Exclusive: Iran poised for big nuke expansion (AP)
AP PHOTOS: In a digital age, paper stocks hang on
Apache attack drives traffic to malware
Apache CloudStack Becomes a Top-level Project
Apache POI CVE-2012-0213 Denial Of Service Vulnerability
Apache Traffic Server update closes important security hole
APAR Friday: A new optimization DSNZPARM keyword (HIPER)
APAR Friday: Another performance enhancement for UNLOAD
APAR Friday: Enhance REORG TABLESPACE PART performance
APAR Friday: Here's a list of APARs you should be checking out this week
Apple "Patch Tuesday"
Apple AirPort Firmware Update 
Apple and Cisco Security Advisories 19 SEP 2012, (Thu, Sep 20th)
Apple and Mozilla take on Java vulnerabilities
Apple Angers Mac Users With Silent Shutdown of Java 7
Apple apologizes in China after service criticism
Apple banishes Java from Mac browsers
Apple blocks Java on the Mac over security concerns
Apple closes numerous holes in Mac OS X and Safari
Apple delivers Flashback malware hunter-killer
Apple Denies FBI Had Access To UDIDs
Apple Faces Lawsuit For Retina MacBook Pro 'Ghosting' Issue
Apple finally flips switch on HTTPS by default in App Store
Apple Firms Up Their Firmware 
Apple fixes security vulnerabilities with Apple TV 5.1 update
Apple Flashback Trojan infection shows weekend decline
Apple ID Leaks Traced to Application Developer
Apple iOS 10 and 10.0.1 Released
Apple iOS SMS Issue Enables Sender Identity Spoofing
Apple iOS7 Will Include Activation Lock Security Measures (June 11, 2013)
Apple Is Now the Most Valuable Company In History
Apple Issues Java Security Update
Apple land-grabs iThingy feature management patent
Apple logging passwords in plain text
Apple Mac OS X security patch bundle 2006-002 
Apple Mobile Devices Cleared For Use On US Military Networks
Apple Nabs Java Exploit That Bypassed Disabled Plugin
Apple OS X patches out 
Apple OSX Patches, 2006-003 
Apple Patents Alternative To NFC
Apple Patents Page Turn Animation
Apple Patches "Trident" Vulnerabilities in OS X / Safari
Apple Patches Everything
Apple Pays Only 2% Corporate Tax Outside US
Apple plugs Java hole after Flashback Trojan intrusion
Apple prompting some users for extra App Store security details
Apple publishes standalone Flashback malware removal tool
Apple Quicktime 7.1.3 released 
Apple QuickTime 7.7.4 for Windows updated, MANY security vulnerabilities: http://support.apple.com/kb/HT1222, (Wed, May 22nd)
Apple QuickTime and iTunes continued 
Apple releases Java update with Flashback removal tool - Update
Apple Remote Desktop update fixes no encryption issue, (Wed, Aug 22nd)
Apple Said To Be Working On a 'Watch-Like Device'
Apple Security Update 2005-009 
Apple Security Update 2006-001 (more details) 
Apple Security Update: OS X Server v.2.2.1 now available http://support.apple.com/kb/HT5644 , (Tue, Feb 5th)
Apple Suit Against Motorola Over FRAND Licensing Rates Dismissed
Apple taking technical, legal action against Flashback malware
Apple to end support for original iPhone: report
Apple updates Airport Drivers 
Apple Updates Everything (Again)
Apple Updates MacBooks and Mac Pro Desktop With Haswell, "Unified Thermal Core"
Apple updates OS X
Apple Updates the Update 
Apple updates to 10.4.8 and Security Update 2006-006 
Apple Wants Another $707 Million From Samsung
Apple Working on Exchange-Crippling iOS 6.1 Bug
Apple, Amazon Change Security Policies After Hack of Journalist`s Accounts
Apple, Amazon, close password door after horse bolts
Apple, Google tumble off top 20 trusted companies list
Apple, Oracle, Google Lead Major Vendors with Software Vulnerabilities in Q1, Security Report Says
Apple's latest release to OS X; phpBB posts new release 
Apple's Ode to Hackers 
Apple's Secret Plan To Join iPhones With Airport Security
Apple's soon-to-be-slurped securo firm shrugs off crypto warning
APPLE-SA-2006-12-19 
Application Associate Consultant Certification Exam for SAP BusinessObjects Access Control 10.0 (C_GRCAC_10) - Review Questions and Answers
Application Aware and Critical Control 2
Application Portfolio Management Survey–What is your organization doing?
Arctic Investigation Underway Into Solar Storm Sat-Nav Disruption
Arctic Sea Ice Hits Record Low
Arctic Sea Ice Hits Record Low Extent
Are App.net's Crowdfunders Being Taken For a Ride?
Are Desktop Computers Gone?
Are there any websites that are NOT compromised?, (Wed, May 8th)
Are Windows XP/7 Users Smarter Than a 3-Year-Old?
Are you a "Hunter"?
Are you a DB2 Version 8 user? Here's a warning...
Are you a security pirate? 
Are you being harassed or stalked online? 
Are you dissatisfied with ‘Send to mail recipient’ ? Here’ show to fix it.
Are you getting I-CANNED ?
Are you looking to setup your own Malware Sandbox?
Are you mentoring the next in line?
Are You Protecting your "Backdoor" ?
Are you ready for more Ron Burgundy? Anchorman 2 is coming...
Are you sure you're as prepared as you think you are? 
Are you using MQTs?
Arch Linux For Newbies? Manjaro Is Here!
Architecture Definition Requirements Report
Architecture Definition: The System Blueprint (Expanded)
Architecture Firm and ESA To 3D Print Building On the Moon
Archiving the snort tips 
Archos Gamepad Released In the USA
Arkeia remote exploit scan activity; More MyDoom; Where is Tokelau?; IRC Botnet 
Arnold muscles in to put the smackdown on phishers. 
Art School's Expensive Art History Textbook Contains No Actual Art
Artemis Project's N-Eye 
Artificial Muscles Pack a Mean Punch
Aruba's 802.11ac Rollout Cleans Up Sticky Clients
As cyber threats build against U.S., CEOs ask for "light touch"
As the Bot Turns 
Asian hackers p0wned by Eastern European rivals
Asian political activists whacked in Mac backdoor hack attack
Asigra Updates Cloud Backup, Extends NetApp Partnership
Ask Personal Audio's James Logan About Patents, Playlists, and Podcasts
Ask Slashdot: Advice For Getting Tech Career Back On Track
Ask Slashdot: Anti-Theft Devices For Luggage?
Ask Slashdot: Best Approach To Reenergize an Old Programmer?
Ask Slashdot: Best Book Or Game To Introduce Kids To Programming?
Ask Slashdot: Best Cell Phone Carrier In the US?
Ask Slashdot: Best Incentives For IT Workers?
Ask Slashdot: Best Linux Game For Young Kids?
Ask Slashdot: Best Pay-as-You-Go Plan For Text and Voice Only?
Ask Slashdot: Best Practices For Collecting and Storing User Information?
Ask Slashdot: Best Use For an Old Smartphone?
Ask Slashdot: Best VPN Service For Australia?
Ask Slashdot: Best Way To Block Noise In a Dorm?
Ask Slashdot: Dealing With a Fear of Technological Change?
Ask Slashdot: Encrypted Digital Camera/Recording Devices?
Ask Slashdot: Explaining Role-Playing Games To the Uninitiated?
Ask Slashdot: Explaining Version Control To Non-Technical People?
Ask Slashdot: Geekiest Way To Cook a Turkey?
Ask Slashdot: Hackable Portable Music Player For Helicopters?
Ask Slashdot: Hearing Aids That Directly Connect To Smart Phones?
Ask Slashdot: How Do You Deploy Small Office Wi-Fi SSIDs?
Ask Slashdot: How Do You Handle SPF For Spam Filtering?
Ask Slashdot: How Do You Sell an Algorithm To Venture Capitalists?
Ask Slashdot: How Much Is a Fun Job Worth?
Ask Slashdot: How To Avoid Working With Awful Legacy Code?
Ask Slashdot: How To Convince a Company Their Subscriber List Is Compromised?
Ask Slashdot: How To Convince a Team To Write Good Code?
Ask Slashdot: How To Get Paid For Open-Sourcing Your Work?
Ask Slashdot: How To Make a DVD-Rental Store More Relevant?
Ask Slashdot: How Would You Convince Someone To Give Up an Old System?
Ask Slashdot: How Would You Feel About Recording Your Entire Life?
Ask Slashdot: Is Samba4 a Viable Alternative To Active Directory?
Ask Slashdot: Is the Rise of Skeuomorphic User Interfaces a Problem?
Ask Slashdot: Job Search Or More Education?
Ask Slashdot: Mac To Linux Return Flow?
Ask Slashdot: Math and Science iOS Apps For Young Kids?
Ask Slashdot: New To Linux; Which Distro?
Ask Slashdot: Open Source Remote Application Access?
Ask Slashdot: Open-Source Forensic Surveillance Analysis Software?
Ask Slashdot: Options For FOSS Remote Support Software?
Ask Slashdot: Server Room Toolbox?
Ask Slashdot: Should Bitcoin Be Regulated?
Ask Slashdot: Should Hosting Companies Have Change Freezes?
Ask Slashdot: To AdBlock Or Not To AdBlock?
Ask Slashdot: What Equipment and Furniture For an Electronics Hardware Lab?
Ask Slashdot: What Is Your Favorite Monitor For Programming?
Ask Slashdot: What To Do About Patent Trolls Seeking Wi-fi License Fees?
Ask Slashdot: What Video Games Keep You From Using Linux?
Ask Slashdot: What Were You Taught About Computers In High School?
Ask Slashdot: What Would You Look For In a Prosthetic Hand?
Ask Slashdot: Where Should a Geek's Charitable Donations Go?
Ask slashdot: Which 100+ User Virtualization Solution Should I Use?
Ask Slashdot: Which International Online Music Stores Are Legit?
Ask Slashdot: Which Virtual Machine Software For a Beginner?
Ask Slashdot: Why Buy a Raspberry Pi When I Have a Perfectly Good Cellphone?
Ask Slashdot: Why Is It So Hard To Make An Accurate Progress Bar?
Ask Slashdot: Why Won't Companies Upgrade Old Software?
Ask Slashdot: Will You Shop Local Like President Obama, Or Online?
Ask Slashdot: Wiring Home Furniture?
Ask Slashdot: Worth Going For a Graduate Degree In the Middle of Your Career?
Ask the Expert – James Jardine
Ask the Expert – John Steven
Ask the Expert – Nick Galbreath
Ask the Expert – Rohit Sethi
Ask the Expert – Chenxi Wang
Ask the Expert – Jeremiah Grossman
ASLR on Android 4 found wanting
ASN.1 Attacks / MS04-007 
ASN.1 DoS exploit hostname resolution, Recent Scan Increases, anti spam effort 
ASN.1 vuln keeps on a'chugging. 
ASN.1 vuln, Windows integrity checker 
ASP.NET MVC and Knockout - MVC (vs?) MVVM
Assange bids for Senate seat
Assange calls for help from … Quakers?
Assange film "Underground" focuses on early years in Australia
Assange Makes Statement Calling For an End To the "Witch Hunt"
Assange movie debuts this weekend
Assange movie portrays hero as cold war rebel
Assange movie portrays leaker as cold war rebel
Assange movie portrays leaker as teen rebel
Assange Seeks To Sue Prime Minister Gillard For Defamation
Assange<sup>TM</sup> TV broadcasts this week
Assessing Remote Certificates with Powershell
Asteroid Apophis Just Got Bigger
Astronomers Probe Mysterious Gas In Titan's Atmosphere
Astronomers Want To Hunt Down Earth's Mini-Moons
At Galaxy unveiling, Samsung will have insurance plan in back pocket
At WICSA 2012 this week
AT&T Network Outage 
AT&T, et al Privacy Suit Dies as Supreme Court Refuses to Hear Appeal
Attacking NoSQL applications
Attacks against Joomla com_peoplebook 
Attacks on Iranian oil industry led to Flame malware find
Attachmate Reflection DLL Loading Arbitrary Code Execution Vulnerability
Attention Crypto Nerds: Gutmann's Godzilla Crypto Tutorial is Available for Download
Auditing a Network for VOIP Call Quality Metrics, (Wed, Sep 5th)
Aug 21 Sun JAVA patch fixes problems that May Allow Applets and Applications to Run With Unpatched JRE's installed 
August 2015 Microsoft Patch Tuesday
AUP/Terms of Service Agreements 
Aurora attack tried to pinch secret list of Chinese spies
Aurora Attackers Were Looking For Google's Surveillance Database
Australia central bank says no information lost in cyber attacks
Australia Passes 'Lite' Data Retention Laws
Australia puts digital frontier at heart of national security plan
Australia puts digital frontier at heart of security strategy
Australian cops bust Romanian credit card theives
Australian cops bust Romanian credit card thieves
Australian Govt Forces Apple, Adobe, Microsoft To Explain Price Hikes
Australian gov't under pressure over hacking claim
Australian Intelligence HQ Blueprints Hacked
Australian Police Move To Make 3D Printed Guns Illegal
Australian Scientists Discover Potential Aids Cure
Australian spy HQ plans stolen by Chinese hackers: report
Australian Telcos Declare SMS Unsafe For Bank Transactions
Australians Urged To Spoof IP Addresses For Better Prices
Australia's Biggest Telco Sold Routers With Hardcoded Passwords
Australia's central Bank hoses down Chinese hack report
Australia's de-facto net filter has ZERO regulation
Australia's Mandatory Data Breach Notification Bill Revealed
Austrian ID card vulnerable to spoofing attack
Austrian Skydiver Prepared to Leap From Edge of Space
AuthenTec sells out to Apple to the sound of 1,000 lawsuits
Authentication Issues between entities during protocol message exchange in SCADA Systems, (Sun, Aug 19th)
Author of Sasser worm and Phatbot caught; New Sasser Worm Variant; SANS Security Newsletters and Digests
Automated DMCA Takedown Notices Request Censorship of Legitimate Sites
Automatic MIME attachments triage
Automating Metrics using RTIR REST API
Automating Phishing Analysis using BRO
Automating Vulnerability Scans
Autoruns and VirusTotal
Autoruns updated October 6th 
AV Diversification, Next Generation Network Defense 
AV Phone Scan via Fake BSOD Web Pages
Avere, Fujitsu Team Up for New Storage Offering
AWStats Exploits, Port 7162/TCP and 24212/TCP traffic, spamvertised site redirected to Al'Jazeera 
AWSTATS 
Back to Green / Previous Sasser Traffic Analysis / Phatbot Source Code / Netsky.AC / CheckPoint VPN-1 Vulnerability 
Back to Green on the Snort BO Buffer Overflow 
Back to Green, A Word From Microsoft 
Back to green, but the exploits are still running wild 
Backbone issues? 
Backdoor found in popular FPGA chip
Backdoor in industrial networking hardware
Backdoor Targeting Apache Servers Spreads To Nginx, Lighttpd
Backdoor Trojans significant and tangible threat to Windows users - MS Antimalware Team 
Backdoors left behind by worms; DHCP connection 
BackTrack 5 update expands security toolkit
Backup the PST File Efficiently and Prevent Data Loss
Back-ups, archives, and Pogoplug
Bad Grammar Make Bestest Password, Research Say
BadNews not so bad, says Google
Ballmer Tells the BBC There's More MS Hardware On the Way
Bank card-slurp nasty 'infects tills, ATMs', corrupt staff fingered
Bank group warns of heightened risk of cyber attacks
Bank of America website slows; Prophet film threat made
Bank Puts a Billion Transaction Records Behind Analytics Site
Banking Trojan hijacks live chat to run real-time fraud
'Bankrupt' Australian Surgeon Sues Google For Auto-Complete
Banks on the business end of DDoS attack surge - report
Banks use non-ssl login forms. 
Barack Obama Retains US Presidency
Barclaycard pay-by-bonk fraud risk exposes Amazon's security
Barclays contactless card users exposed to fraud
Bargain: 10'000 infected PC's for only 25$ 
Barnes & Noble confirms PIN pad tampering
Barnes & Noble Founder Wants to Take Retail Division Private
Barnes & Noble halts use of PIN pad devices after data breach
Barnes & Noble says PIN pads in 63 stores hacked
Barracuda Networks outage statement 
Bartalex malspam pushing Pony/Dyre
Basic Defenses Absent at Most Breached Sites
Battle of the ISP's 
BBC Criticized For Snooping Under RIPA Powers
BBC Radiophonic Workshop Revived Online
BBC Turns Off CEEFAX Service After 38 Years
Be Careful What You Filter and Anti-Spyware Infrastructure Ideas 
Be on the Lookout for PHP compromises; Will New Anti-Spam Protocols Work?; Internet Survival Time by Sophos; phpBB: anti santy worm again ? 
Beagle Backdoor Port, Wakeup Call from NetSky.G and NetSky.H 
Beagle Exploit, SSL NULL encryption (update), port 12345 and 1026 
BeagleBone Black Ships With New Linux 3.8 Kernel
Beer Drone Delivery Service For South African Music Festival
Bees Communicate With Electric Fields
Behavioral Analysis of Rootkit Malware 
Behind the Scenes With Samsung's Factory Workers
Belated "deja vu" - IR for rootkits that run in safe mode 
Belgian Consumer Organization Sues Apple For Not Respecting Warranty Law
Belize wants to quiz anti-computer virus guru McAfee in murder probe
Bellsouth.(net|com) troubles 
Benevolent malware? reincarna/Linux.Wifatch
Berners-Lee hits out at government web snooping plans
Best of Interop 2013 Winners Announced
BEST Study Finds Temperature Changes Explained by GHG Emissions and Volcanoes
Beta Testers Wanted: Use a Raspberry Pi as a DShield Sensor
Better Brain Implants With Ultrathin Carbon Fiber Electrodes
Better onion anonymity possible: researcher
Beware the malware-tipped SPEAR TRAP in your inbox
Beyond The Fence
BHO FAQ, Survival Time, and auth/ident activity 
BHO scanning tool and New Scam Targets Bank Customers 
BHO, Browsers and related / Port 3705 / ISCAlert Portuguese version 
BI Solution-Design Strategies
Big Brother is prosecuting you: More cops to use court vid chats
Big Business surrounding Internet Fraud 
Big data analytics defining new malware strategy
Big Data to Overtake Hadoop in 2013
Big Honkin' Botnet - 1.5 Million! 
Big Change
Bill Gates Answers Questions From Redditors
Bill Gates Regains the Position of World's Richest Person
BIND 8 and 9 Vulnerabilities / ISP Blocking Traffic yet / Sharing thoughts 
BIND 9 patched against remote crash vuln
BIND 9 Security Updates, (Mon, Jul 30th)
BioShock: Infinite</em> Released
BioWare Founders Announce Retirement
Bit9 Hacked, Stolen Certs Used To Sign Malware
Bit9 Hacked: Stolen Digital Keys Used to Sign Malware
Bit9 wants to bin 'broken' antivirus, install whitelisting tech
Bitcoin Exchange BitFloor Says It Will Replace Stolen Coins
Bitcoin exchange shuts after heist
Bitcoin Foundation vows to clean up currency's bad rep
BitCoin Gets a Futures Market
Bitcoinica Bitcoin site breached
Bitcoin's Success With Investors Alienates Earliest Adopters
BitInstant CEO Says World Operates "On an Inferior Monetary System"
BitInstant Continues Bitcoin Paycard Plan
BitTorrent Sees Sync Users Share Over 1PB of Data
BizCN gate actor changes from Fiesta to Nuclear exploit kit
BizCN gate actor sends CryptoWall 4.0
BizCN gate actor update
Black Hat: Researcher pinpoints promising ways to attack Windows 8
Black tuesday - the day after 
Black Tuesday 4 vulnerabilites, Wins Traffic flow diagrams 
Black Tuesday Advance Notice 
Black Tuesday Patch Roundup, Panic and/or Mayhem ensues 
Black Tuesday Summary 
BlackBerry 10 Can BBM Anything You're Watching, Even Porn
BlackBerry 10 passes US defence department tests
BlackBerry 10 reportedly delayed until March, near-term licensing deals deemed ‘unlikely’
BlackBerry 10 Review: Good, But Too Late?
BlackBerry still trumps Android for security, analysis finds
BlackBerry Users in Europe, Africa Suffer 3-Hour Outage - Mobile and Wireless - News & Reviews - eWeek.com
BlackBerry10 passes US defence department tests
BlackEnergy .XLS Dropper
Blackworm Notifications 
BlackWorm Summary 
Blackworm/Nyxem Animation of Infections 
Blame crap mobe apps for swap-by-bonk hacks, say NFC bods
Blaster Worm Cleanup 
Blaster Worm Update - Power Outage 
Blaster Worm Update 
Bleeding Snort Domain. 
Bleeding Snort Sigs Available 
Blizzard Compromise-- what they missed in their user communication, (Fri, Aug 10th)
Blizzard Entertainment Hack Hits Battle.net Users
Blizzard Reportedly Planning A Linux Game For 2013
Blizzard Says Battle.Net Has Been Hacked
Blocking Powershell Connection via Windows Firewall. 
Blog Reveals a Chinese Military Hacker's Life Is One of Boredom and Bitterness
Bloggers Put Scientific Method To the Test
Bloodhound.Exploit.52 (Flash Player 7) detections 
Blue Coat WinProxy Vuln 
Blue Coat, Skype and QQ named as government surveillance helpers
Blue for Reset?, (Fri, Jan 4th)
Bluetooth 0day hacking 
Bluetooth Auditing 
Bluetooth Followup Links 
Bluetooth Used To Track Traffic Times
Boffins demo passwords even users don’t know
Boffins foul VM sandboxes with CPU-sniffing hack
Boffins hide messages in Skype ‘silence packets’
Boffins receive quantum key from moving plane
Bofra/IFrame After Action Review 
Bofra/IFrame Exploits on More Web Sites (updated); IFRAME vulnerability summary; Two more IE Exploits 
Bofra/IFrame Exploits Update 
Bogus anti-hacking tool targets Syrian activists
Book Review: Why Does the World Exist?
Book that makes learning statistics fun - "What is P-value Anyway?"
Booleans Extreme
Bot C&C Servers on Port 80 
Bot herds exploring vertical markets 
Bot Nets - Moving to Prime Time, AV Vendors Taking Out Valuable Resource, 
Bot with Veritas; Internet crash in Pakistan; MS Security Bulletin Scam; MS05-017 Exploit 
Botnet Malware code modifier's competition continues 
Botnet Report; MD5 Checksum; Handlers Update, Live from Las Vegas 
Botnet Research 
Botnet responsible for 18% of the world's spam shut down
Botnet traffic using TOR 
Botnets and Adwares-Spywares connection 
BotNets and Security Awareness in Academia; Potpourri of MS04-028 Scanning Tools from MS 
Botnets Host DNS; 'leet Names and Security Tools 
Botnets spreading Dridex still active
Botnets, PHP includes 
Bots installed through IM and Packet Capture howto 
Bots looking for FlashChat App 
Bots: They are not just for Windows anymore. 
Bounced emails with viral attachments 
Box becomes first third-party app on Good's platform
BP engineer charged over oil spill data deletion from iPhone
Brain Scans of Rappers and Jazz Musicians Shed Light On Creativity
Brazilian Judge Orders 24-hour Shutdown of Google and Youtube
Breakthrough In Drawing Complex Venn Diagrams: Goes to 11
Bredolab botnet author sentenced to 4 years in prison in Armenia
Brennan defends drone strikes, even on Americans
BrewPi: Raspberry Pi and Arduino Powered Fermentation Chamber
BRFPlus Functions: An Overview of Operation Modes
Brian Krebs Gets SWATted
Brig counsellor: Manning's history, behaviour outweighed doctor's opinion of self-harm risk
Bright(?) FUD, Heise bounty, Google thinks you are malware, Tom Liston sees his shadow, and more 
Brit upstart flogs cloudy SaaS to clipboard-waving bods
British car parks start reading number plates
British Minister likens Anonymous to fascists and racists
Broadcom Wireless Vulnerability 
Brocade Announces New Hardware, Software for Data Center Strategy
Brocade Gets Virtual Networking with Vyatta Acquisition
Brown Signs California Bill For Free Textbooks
Browser *does* matter, not only for vulnerabilities - a story on JavaScript deobfuscation 
Browser Bug of the Month Club 
Browser vendors rush to block fake google.com site cert
Browser Vulnerabilities (all browsers), MS04-030 and -032 POC exploit released 
Browzar, the privacy that may not be 
Bruce Perens: The Day I Blundered Into the Nuclear Facility
Brute force scanning against MS SQL server accounts; Are you paranoid enough? 
BSDCan 2013 Registration
BT: Olympics cyber attackers were amateurs
Btcd - a Bitcoind Alternative Written In Go!
Bugtraq: [ MDVSA-2012:086 ] acpid
Bugtraq: [SE-2011-01] Additional materials released for SAT TV research
Bugtraq: [SE-2012-01] An issue with new Java SE 7 security features
Bugtraq: [security bulletin] HPSBMU02785 SSRT100526 rev.1 - HP LoadRunner Running on Windows, Remote Execution of Arbitrary Code
Bugtraq: [security bulletin] HPSBMU02884 rev.1 - HP Service Manager and HP ServiceCenter, Cross Site Scripting (XSS) and Disclosure of Information
Bugtraq: [SECURITY] [DSA 2446-1] libpng security update
Bugtraq: [SECURITY] [DSA 2483-1] strongswan security update
Bugtraq: [SECURITY] [DSA 2550-2] asterisk regression update
Bugtraq: [SECURITY] [DSA 2554-1] iceape security update
Bugtraq: [SECURITY] [DSA 2670-1] wordpress security update
Bugtraq: [SECURITY] [DSA 2675-2] libxvmc regression update
Bugtraq: [TSI-ADV-1201] Path Traversal on Polycom Web Management Interface
Bugtraq: [TSI-ADV-1202] Polycom Web Management Interface O.S. Command Injection
Bugtraq: 0day full - Free Monthly Websites v2.0 - Multiple Web Vulnerabilities
Bugtraq: 11in1 CMS v1.2.1 - SQL Injection Vulnerabilities
Bugtraq: APPLE-SA-2012-08-20-1 Apple Remote Desktop 3.6.1
Bugtraq: b2ePMS 1.0 Authentication Bypass Vulnerability
Bugtraq: CA20130213-01: Security Notice for CA ControlMinder
Bugtraq: Cisco Security Advisory: Cisco Catalyst 4500E Series Switch with Cisco Catalyst Supervisor Engine 7L-E Denial of Service Vulnerability
Bugtraq: Cisco Security Advisory: Cisco IOS Software Malformed Border Gateway Protocol Attribute Vulnerability
Bugtraq: Cisco Security Advisory: Cisco IOS Software Network Address Translation Vulnerabilities
Bugtraq: Cisco Security Advisory: Cisco Unified Communications Manager Session Initiation Protocol Denial of Service Vulnerability
Bugtraq: CONFidence 2013 - Call for Papers - 28-29.05.2013 Krakow, Poland
Bugtraq: CORE-2013-0430 - Buffer overflow in Ubiquiti airCam RTSP service
Bugtraq: DEFCON London - DC4420 - June CFP - Lightning talks!!! - Tuesday 25th June 2013
Bugtraq: Drupal 7.14 <= Full Path Disclosure Vulnerability
Bugtraq: Drupal 7.14 <= Full Path Disclosure Vulnerability (Update)
Bugtraq: Elcom CMS - Community Manager Insecure File Upload Vulnerability - Security Advisory - SOS-12-008
Bugtraq: ESA-2012-013: RSA SecurID(r) Software Token Converter buffer overflow vulnerability
Bugtraq: ESA-2013-010: EMC AlphaStor Buffer Overflow Vulnerability
Bugtraq: Fortinet FortiMail 400 IBE - Multiple Web Vulnerabilities
Bugtraq: Free Monthly Websites v2.0 - Multiple Web Vulnerabilities
Bugtraq: Kaspersky Password Manager 5.0.0.164 - Software Filter Vulnerability
Bugtraq: Kohana Framework v2.3.3 - Directory Traversal Vulnerability
Bugtraq: Liferay users can assign themselves to organizations, leading to possible privilege escalation
Bugtraq: MitM-vulnerability in Palo Alto Networks GlobalProtect
Bugtraq: Multiple Vulnerabilities in D'Link DIR-600 and DIR-300 (rev B)
Bugtraq: My ROP mitigation
Bugtraq: NGS00241 Patch Notification: SysAid Helpdesk blind SQL injection
Bugtraq: NGS00254 Patch Notification: Apple Mac OS X Lion USB Hub Class Hub Descriptor Arbitrary Code Execution
Bugtraq: Open-Realty CMS 2.5.8 (2.x.x) <= Cross Site Request Forgery (CSRF) Vulnerability
Bugtraq: OpenSSL 1.0.1 Buffer Overflow Vulnerability
Bugtraq: Re: [#1298868584] Copy&paste from web browser considered dangerous
Bugtraq: Re: [Full-disclosure] XSS and SQL Injection Vulnerabilities in Jara
Bugtraq: Re: Drupal 7.14 <= Full Path Disclosure Vulnerability
Bugtraq: Sonicwall OEM Scrutinizer v9.5.2 - Multiple Vulnerabilities
Bugtraq: Sonicwall Scrutinizer v9.5.2 - SQL Injection Vulnerability
Bugtraq: Sourcefire Defense Center - multiple vulnerabilities.
Bugtraq: Unauthenticated remote access to D-Link DCS cameras
Bugtraq: Universal Reader Filename Denial Of Service Vulnerability
Bugtraq: XSS in OSSEC wui 0.3
Building Babbage's Analytical Engine
Building New Materials With Light
Business Highlights
Business Intelligence Trends: ERP and Business Intelligence
Businesses urged to test updates after McAfee glitch
But it worked FINE in Dev!
Buyers Beware 
Buying American in Tehran: Apples, razors and Coke
By the Numbers: How Google Compute Engine Stacks Up To Amazon EC2
BYOD boon: Make identities part of the cloud OS
BYOD Security: Do You Really Need MDM?
CA BrightStor ARCserve Backup 11.5 remote vulnerability 
CA eTrust Antivirus [was] flagging lsass.e x e 
CA iGateway debug mode HTTP GET request bo vulnerability/exploit 
CA Leak Highlights Weakness in Net Security, Again
Cable Modem Hacker Convicted (March 2, 2012)
Cacti remote code and SQL injection vulnerability 
CAIDA Report on Blackworm 
California To License Self-Driving Cars
California Wants Genetically Modified Foods To Be Labelled
California's Unspoken Health Problem: Brain Parasites
Call 1-866-727-2338 for free virus and security-related support from Microsoft 
Call centers under attack in targeted cyber-blackmail scheme
Call for mandatory data breach notifications renewed
Call for packets TCP/UDP port 48318 
Call for some logs and/or packets for requests to a2billing/customer/templates/default/header.tpl
Call for Volunteers ; Red Cross Associated Sites ; Katrina Related Fraud Continues 
Caltech and UVic Set 339Gbps Internet Speed Record
Cameras leak credentials, live video
Can a New GPU Rejuvenate a 5 Year Old Gaming PC?
Can Anyone Become a Programmer?
Can Congress Protect the Nation's Critical Infrastructure?
Can Fotobar Make Polaroid Relevant Again?
Can Innovation Be Automated?
Can Legacy Dual-Core CPUs Drive Modern Graphics Cards?
Canada aware of second hacking attack, this time on energy firm
Canada aware of two cyber attacks, won't say if China involved
Canada Prepares For Crackdown On BitTorrent Movie Pirates
Canada Revenue Agency To Tax BitCoin Transactions
Canada's Supreme Court Tosses Viagra Patent For Vagueness
Canadian Court Rules You Have the Right To Google a Lawyer
Canadian government may block Huawei from its network
Canadian Government Scrapping Internet Predators Act
Canadian Researchers Debut PaperTab, the Paper-Thin Tablet
Canonical and China Announce Ubuntu Collaboration
Canonical Could Switch To Rolling Releases For Ubuntu 14.04 and Beyond
Carbon Dating Gets an Update
Card skimmers targeting more than ATMs, says EU
Careful with the seasonal attachments! 
Carnegie Mellon, NSA seek high school hackers
Carrier IQ Hopes to Allay Users' Privacy Concerns
Cash from the Cache; Port 32772 
Catch of the Day; Scripted mass hack; Not-so-black Tuesday ahead 
CC Theft Worries Manipulated; Unusual FrontPage Hack; War Spying/Viewing 
CCTV Hack Takes Casino For $33 Million
CDC Says 10,000 At Risk of Hantavirus In Yosemite Outbreak
CERN's LHC Powers Down For Two Years
CERTs warn about old java bug being exploited 
CES Ditches CNET After CBS Scandal Over Dish's Hopper
CGI Email Script Scanning Update, MS SQL Server scanning, Bagle Source Code Released, Comments on 802.11i 
CIA Director David Petraeus Resigns, Citing Affair
CICS communication history
Cingular wireless outage 
CIO Success Simplified in 3 Steps
Cisco 7920 Wireless IP Phone 
Cisco Advisories 
Cisco and iRobot Create Sheldonbot-Like Telepresence System
Cisco and Juniper - ISAKMP Protocol - Multiple Vulnerability Issues 
Cisco ASA SNMP Remote Code Execution Vulnerability
Cisco BGP DoS - Updates Galore! 
Cisco Cloud Web Security DNS Hijack
Cisco content switch SSL vulnerability 
Cisco Continues SDN Evolution With vCider Acquisition
Cisco EIGRP Vulnerability and VLAN spoofing issue 
Cisco Exits the Consumer Market, Sells Linksys To Belkin
Cisco IKE Resource Exhaustion Attack 
Cisco inadvertently weakens password encryption in its IOS operating system
Cisco Innovates to Provide More Nimble Network Security
Cisco introducing Cisco Security Notices 16 JAN 2013, (Tue, Jan 15th)
Cisco IOS - we are aware 
Cisco IOS / IOS XE security advisories
Cisco IOS DHCP vulnerability; Rumours about vulnerabilities in Win XP SP2 
Cisco IOS Firewall vulnerability update. 
Cisco IOS Interface Denial of Service Vulnerability 
Cisco IOS local privilege escalation 
Cisco IOS Security Advisory Bundle - http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep12.html, (Thu, Sep 27th)
Cisco IOS Security Advisory 
Cisco Malformed IKE Packet Vulnerability 
Cisco MARS vulnerabilities 
Cisco PIX Issue 
Cisco PSIRT reporting Customers affected by ASA VPN DoS attacks
Cisco Response to OpenSSL Vulnerability 
Cisco Security Advisory: Default Password in Wireless Location Appliance 
Cisco sgbp DoS 
Cisco Telnet DoS Vulnerability / Suspicious GIF files being mailed? / Paranoia, the right dosage 
Cisco VP To Memo Leaker: Finding You Now 'My Hobby'
Cisco VPN 3000 crafted HTTP attack 
cisco vtp vulnerabilities 
Cisco Vulnerability in the VPN Client Software 
Cisco Wireless Access Point Vulnerability Announced 
Cisco, Apple, Netgear Offer Wireless Routers for Businesses on a Budget - Enterprise Networking - News & Reviews - eWeek.com
CISPA Cybersecurity Bill, Reborn: 6 Key Facts
Citadel takedown took down security researchers too
Citadel Trojan Moves from Crime to Espionage
Cities' Heat Can Affect Temperatures 1000+ Miles Away
Citrix Access Gateway Advanced Access Control remote and local vulnerability reported 
Citrix Merges Repeater Features With CloudBridge
ClamAV 0.87.1 released, fixes multiple security vulnerabilities 
ClamAV fixes multiple vulnerabilities 
ClamAV versions up to 0.88.3 DoS 
ClamAV vulnerability; Con-fu 
Clarifying Levels of PCI Compliance
Clashes over Internet rules to mark Dubai meeting
Classified Information Confetti
Clearwire to pull Huawei from network
CLICKbot 
Client-Side Exploits - The Mother Lode? 
Climate Contrarians Seek Leadership of House Science Committee
Climb a small mountain... 
Cloaking Technology Could Protect Offshore Rigs From Destructive Waves
Cloud Computing 101: What is it and how can you take advantage?
Cloud Computing Needs To Embrace the Linux Model, Says Rackspace CTO
Cloud in the Real World
Cloud is a Continuum
Cloud is the answer!
'Cloud' may open up new IT security problems
Cloud providers need to step up on security, say analysts
Cloud Relative Market Sizes
Cloud Security Measures Too Opaque For Customers
Cloud security: Four customers' approaches
Cloud service cracks VPN passwords in 24 hours
Cloud support brings WikiLeaks back online
Cloud wars
Cloud, BYOD Increases Need for Automated IAM Systems
Cloud-Economical Computing Model
Cloudy admin? Here's how to ward off Call of Duty-playing teens
'Clueless' boards risk lawsuits, threaten national security
Clueless users: 10 more tales of the absurd
CME was officially lauched 
CME-24 (again) 
CME-24 aka blackworm update 
CME-24 Analysis: The destruction does not appear to spread across Windows network shares 
CME-24: It Has Begun 
CNOOC, Nexen reapply for U.S. deal approval
Cockroaches Evolving To Avoid Roach Motels
Coffee and Intellectual Property
Cogent having problems... 
CoLinux - Cooperative Linux that runs in native mode on Windows
Collecting Logs from Security Devices at Home, (Sun, Dec 2nd)
Collecting Users Credentials from Locked Devices
Colocation Provider PRQ Raided; Wikileaks and Many Torrent Sites Offline
Color My Logs: Providing Context for Your Logs Using Our Data
Color Printing Reaches Its Ultimate Resolution
Color-Screen TI-84 Plus Calculator Leaked
Combating phishing for banks / Story of a former worm target / Disaster preparation 
Combined exploits of MS vulnerabilities, port 1981 increase 
Come fly with me**.....
Coming soon: Certification for mobile app developers
Command and Control Channels Using "AAAA" DNS Records
Comment: LinkedIn and its password problems
Comments on 0day 
Comments on Oracle Vulnerabilities, WinZip, MIT Kerberos, Seeking Wireless Compromise Stories, More Weak Password Hacks? 
Commercial cyberspying and theft gives rich payoff
Commercial cyberspying, theft promise rich payoff
Commercial enterprises are putting our critical infrastructure at risk
Compaction Process - Perfect way for optimization of free space in Outlook
Companies House website security 'a bit of a mess'
Companies slow to react to mobile security threat
Compaq Web Management, BJs Alerts of Possible Credit Card Theft 
Compliance isn't security, but companies still pretend it is, according to survey
Compromised Magento sites led to Neutrino exploit kit
Compromised Web Sites Infect Web Surfers 
CompSci boffins tout file encryption for Google Docs
Computerized elections, some thoughts 
Computing Difficulties in Business Spreadsheet Software: How to Overcome Them?
Confessions of a Spyware Author 
Congrats March's Top 10 New Members!
Congress halts posting of civilian, military officials' assets
Congress report warns: drones will track faces from the sky
Congress urged to probe Chinese cyber: espionage
Congressional Report: US Power Grid Highly Vulnerable To Cyberattack
Consensus gathering on log analysis and correlation in enterprise environment 
Considerations for modernizing your network
Consumer Reports: Free anti-malware software for Windows, Mac is effective
Contacting the ISC, good practices for response 
Continued great response to call for Volunteers 
Continued Sighting of Download.Ject; WiFi Security 
Continuous Monitoring for Random Strings
Continuous multi-exploit scanning / Sadmind exploit 
Converting RSS Feeds To a Dynamic 3D Scene In 120 Lines of Code
Coolwebsearch / Trafficadvance got a new home... 
Cooperation seen as crucial in facing U.S. cyber threats
Copies of anti-censorship software used in Iran and Syria contain keylogger
Cops cuff premium-rate SMS Android malware suspects
Copyright Claim Thwarts North Korean Propaganda
Corn Shortage Hampers US Ethanol Production
Corporate Espionage Made Easy with Spyware; Honeynet KYE: Phishing paper Published; Some New Vulnerabilities
Corrected: From the mailbag 
Corrupted Nyxems 
Costa Rica: Digital currency site founder arrested
Could Flying Cars Actually Be On Their Way?
Could New York City Cut Emissions 90% By 2050?
Councils spunk £515m in 4 years on CCTV
Couple ISC Site Updates 
Couple updates and reminders
Courion Access Insight Detects Data Security Risks at HCR ManorCare
Court: Aereo TV Rebroadcast Is Still Legal
Coverity and Wind River target development insecurity with new alliance
Craigslist Drops Exclusive License To Your Posts
Crap PINs give wallet thieves 1-in-11 jackpot shot
Cray Unveils XC30 Supercomputer
Create your own Job World Economic Forum thoughts
Creating a Bastioned Centralized Audit Server with GroundWork Open Source Log Monitoring for Event Signatures
Creationist Bets $10k In Proposed Literal Interpretation of Genesis Debate
Credit report breach has link to Zeus banking malware
Creeping Government Surveillance Now Without Warrants
Crims take to Facebook to flog ZeuS kits
Critical Cisco ASA IKEv2/v2 Vulnerability. Active Scanning Detected
Critical denial-of-service flaw in BIND software puts DNS servers at risk
Critical Firefox Update Today
Critical Flash Player Update APSB16-36
Critical flaw exposes Oracle database passwords
Critical Java SE update due Tuesday fixes 40 flaws
Critical Patch to the XP SP2 Firewall Released / New Linux 2.4 and 2.6 Kernel Exploits Released / The Virus Year in Review 
Critical Ruby on Rails security vulnerability 
Critical Security Controls: Getting to know the unknown
Critical security update: PHPMailer 5.2.18 (CVE-2016-10033)
Critical security vulnerability in WinZip 10 
Critical Vulnerabilities in Palo Alto Networks PAN-OS 
Critical vulnerability in IrfanView plugin
Critical vulnerability in Sophos Anti-Virus products 
Critical vulnerability in vBSEO patched
Critical Xen PV guests vulnerabilities
Crooks break into Casino CCTV systems to nab 33 Million
Cross platform virus PoC 
Crowdsourced Coders Take On Immunology Big Data
Cryptanalyst on British Postage Stamps
CryptoWall sent by Angler and Neutrino exploit kits or through malicious spam
CS Faculty and Students To Write a Creative Commons C++ Textbook
CSO Online E-Crime Survey Results 
CSO's Ultimate Guide to Social Engineering
CSOs warned of serious cyber-espionage attack
CSS Zen Garden Turns 10
CTO Says Al-Khabaz Expulsion Shows CS Departments Stuck In "Pre-Internet Era"
Curiosity Gearing Up for Drive to Next Study Location
Curiosity Rover Fires First Laser Beam At Martian Rock
Curious SNMP Traffic Spike
Custom Android ROM Developers Get OTA Update Capabilities Like Carriers
CVE-2006-7250 (openssl)
CVE-2007-6752 (drupal)
CVE-2007-6753 (windows_2000, windows_7, windows_server_2008, windows_vista, windows_xp)
CVE-2008-7309 (insoshi)
CVE-2008-7310 (spree)
CVE-2009-0693
CVE-2009-0693 (wyse_device_manager)
CVE-2009-0695
CVE-2009-0695 (wyse_device_manager)
CVE-2009-5030 (openjpeg)
CVE-2009-5031
CVE-2009-5031 (modsecurity)
CVE-2009-5112 (webglimpse)
CVE-2009-5113 (webglimpse)
CVE-2009-5114 (webglimpse)
CVE-2009-5128 (websense_v10000)
CVE-2009-5129 (websense_v10000)
CVE-2009-5130 (websense_email_security)
CVE-2009-5131 (websense_email_security)
CVE-2009-5132 (websense_web_filter, websense_web_security)
CVE-2010-2021
CVE-2010-2021 (global_redirect)
CVE-2010-4562 (windows_2000, windows_2003_server, windows_7, windows_server_2008, windows_vista,...)
CVE-2010-4563 (linux_kernel)
CVE-2010-4666
CVE-2010-4666 (libarchive)
CVE-2010-5063 (virtual_war)
CVE-2010-5064 (virtual_war)
CVE-2010-5065 (virtual_war)
CVE-2010-5066 (virtual_war)
CVE-2010-5067 (virtual_war)
CVE-2010-5086 (bitweaver)
CVE-2010-5097 (typo3)
CVE-2010-5098 (typo3)
CVE-2010-5099
CVE-2010-5099 (typo3)
CVE-2010-5100 (typo3)
CVE-2010-5137
CVE-2010-5137 (bitcoind, wxbitcoin)
CVE-2010-5138
CVE-2010-5138 (bitcoind, wxbitcoin)
CVE-2010-5139
CVE-2010-5139 (bitcoind, wxbitcoin)
CVE-2010-5140
CVE-2010-5140 (bitcoind, wxbitcoin)
CVE-2010-5141
CVE-2010-5141 (bitcoind, wxbitcoin)
CVE-2010-5189 (proxysg, proxysg_sg210-10, proxysg_sg210-25, proxysg_sg210-5, proxysg_sg510-10, p...)
CVE-2010-5190 (proxysg, proxysg_sg210-10, proxysg_sg210-25, proxysg_sg210-5, proxysg_sg510-10, p...)
CVE-2010-5191 (avos, proxyav)
CVE-2010-5192 (proxysg, proxysg_sg210-10, proxysg_sg210-25, proxysg_sg210-5, proxysg_sg510-10, p...)
CVE-2010-5279 (virtual_war)
CVE-2011-1162 (kernel)
CVE-2011-1385
CVE-2011-1385 (aix, vios)
CVE-2011-1390
CVE-2011-1390 (rational_clearquest)
CVE-2011-1394
CVE-2011-1394 (maximo_asset_management, maximo_asset_management_essentials, tivoli_asset_managem...)
CVE-2011-1395
CVE-2011-1395 (maximo_asset_management, maximo_asset_management_essentials)
CVE-2011-1396
CVE-2011-1396 (maximo_asset_management, maximo_asset_management_essentials)
CVE-2011-1397
CVE-2011-1397 (maximo_asset_management, maximo_asset_management_essentials, tivoli_asset_managem...)
CVE-2011-1473
CVE-2011-1473 (openssl)
CVE-2011-1759 (linux_kernel)
CVE-2011-1761
CVE-2011-1761 (libmodplug)
CVE-2011-1767 (linux_kernel)
CVE-2011-1768 (linux_kernel)
CVE-2011-1777
CVE-2011-1777 (libarchive)
CVE-2011-1778
CVE-2011-1778 (libarchive)
CVE-2011-1779
CVE-2011-1779 (libarchive)
CVE-2011-1923
CVE-2011-1927 (linux_kernel)
CVE-2011-2082
CVE-2011-2082 (rt)
CVE-2011-2083
CVE-2011-2083 (rt)
CVE-2011-2084
CVE-2011-2084 (rt)
CVE-2011-2085
CVE-2011-2085 (rt)
CVE-2011-2182 (linux_kernel)
CVE-2011-2183 (linux_kernel)
CVE-2011-2199
CVE-2011-2199 (tftp-hpa)
CVE-2011-2203 (kernel)
CVE-2011-2208 (linux_kernel)
CVE-2011-2209 (linux_kernel)
CVE-2011-2210 (linux_kernel)
CVE-2011-2211 (linux_kernel)
CVE-2011-2393 (freebsd, netbsd)
CVE-2011-2478
CVE-2011-2478 (sketchup)
CVE-2011-2502
CVE-2011-2503
CVE-2011-2512 (qemu-kvm)
CVE-2011-2527 (qemu)
CVE-2011-2545 (spa8000_8-port_ip_telephony_gateway, spa8000_8-port_ip_telephony_gateway_firmware...)
CVE-2011-2657
CVE-2011-2658
CVE-2011-2709 (libgssglue, libgssapi)
CVE-2011-2722 (linux_imaging_and_printing_project)
CVE-2011-2866 (itunes, webkit)
CVE-2011-2911
CVE-2011-2911 (libmodplug)
CVE-2011-2912
CVE-2011-2912 (libmodplug)
CVE-2011-2913
CVE-2011-2913 (libmodplug)
CVE-2011-2914
CVE-2011-2914 (libmodplug)
CVE-2011-2915
CVE-2011-2915 (libmodplug)
CVE-2011-3016 (chrome)
CVE-2011-3017 (chrome)
CVE-2011-3018 (chrome)
CVE-2011-3019 (chrome)
CVE-2011-3020 (chrome)
CVE-2011-3021 (chrome)
CVE-2011-3022 (chrome)
CVE-2011-3023 (chrome)
CVE-2011-3024 (chrome)
CVE-2011-3025 (chrome)
CVE-2011-3026 (chrome, libpng)
CVE-2011-3027 (chrome)
CVE-2011-3031
CVE-2011-3032
CVE-2011-3033
CVE-2011-3034
CVE-2011-3035
CVE-2011-3036
CVE-2011-3037
CVE-2011-3038
CVE-2011-3039
CVE-2011-3040
CVE-2011-3041
CVE-2011-3042
CVE-2011-3043
CVE-2011-3044
CVE-2011-3045 (chrome)
CVE-2011-3047 (chrome)
CVE-2011-3048
CVE-2011-3048 (libpng)
CVE-2011-3058 (chrome)
CVE-2011-3059 (chrome)
CVE-2011-3060 (chrome)
CVE-2011-3061 (chrome)
CVE-2011-3062 (chrome)
CVE-2011-3063 (chrome)
CVE-2011-3064 (chrome)
CVE-2011-3065 (chrome)
CVE-2011-3066
CVE-2011-3066 (chrome)
CVE-2011-3067
CVE-2011-3067 (chrome)
CVE-2011-3068
CVE-2011-3068 (chrome)
CVE-2011-3069
CVE-2011-3069 (chrome)
CVE-2011-3070
CVE-2011-3070 (chrome)
CVE-2011-3071
CVE-2011-3071 (chrome)
CVE-2011-3072
CVE-2011-3072 (chrome)
CVE-2011-3073
CVE-2011-3073 (chrome)
CVE-2011-3074
CVE-2011-3074 (chrome)
CVE-2011-3075
CVE-2011-3075 (chrome)
CVE-2011-3076
CVE-2011-3076 (chrome)
CVE-2011-3077
CVE-2011-3077 (chrome)
CVE-2011-3078 (chrome)
CVE-2011-3079 (chrome)
CVE-2011-3080 (chrome)
CVE-2011-3081 (chrome)
CVE-2011-3083
CVE-2011-3084
CVE-2011-3085
CVE-2011-3085 (chrome)
CVE-2011-3086
CVE-2011-3086 (chrome)
CVE-2011-3087
CVE-2011-3087 (chrome)
CVE-2011-3088
CVE-2011-3088 (chrome)
CVE-2011-3089
CVE-2011-3089 (chrome)
CVE-2011-3090
CVE-2011-3090 (chrome)
CVE-2011-3091
CVE-2011-3091 (chrome)
CVE-2011-3092
CVE-2011-3092 (chrome)
CVE-2011-3093
CVE-2011-3093 (chrome)
CVE-2011-3094
CVE-2011-3094 (chrome)
CVE-2011-3095
CVE-2011-3095 (chrome)
CVE-2011-3096
CVE-2011-3096 (chrome)
CVE-2011-3097
CVE-2011-3097 (chrome)
CVE-2011-3098
CVE-2011-3098 (chrome)
CVE-2011-3099
CVE-2011-3099 (chrome)
CVE-2011-3100
CVE-2011-3100 (chrome)
CVE-2011-3101
CVE-2011-3101 (chrome)
CVE-2011-3103 (chrome)
CVE-2011-3104 (chrome)
CVE-2011-3105 (chrome)
CVE-2011-3106 (chrome)
CVE-2011-3107 (chrome)
CVE-2011-3108 (chrome)
CVE-2011-3109 (chrome)
CVE-2011-3110 (chrome)
CVE-2011-3111 (chrome)
CVE-2011-3112 (chrome)
CVE-2011-3148
CVE-2011-3148 (linux-pam)
CVE-2011-3149
CVE-2011-3149 (linux-pam)
CVE-2011-3174
CVE-2011-3175
CVE-2011-3175 (zenworks_configuration_management)
CVE-2011-3176
CVE-2011-3176 (zenworks_configuration_management)
CVE-2011-3193 (pango, qt)
CVE-2011-3194 (qt)
CVE-2011-3361
CVE-2011-3361 (backuppc)
CVE-2011-3443 (safari)
CVE-2011-3444 (mac_os_x, mac_os_x_server)
CVE-2011-3446 (mac_os_x, mac_os_x_server)
CVE-2011-3447 (mac_os_x, mac_os_x_server)
CVE-2011-3448 (mac_os_x, mac_os_x_server)
CVE-2011-3449 (mac_os_x, mac_os_x_server)
CVE-2011-3450 (mac_os_x, mac_os_x_server)
CVE-2011-3452 (mac_os_x, mac_os_x_server)
CVE-2011-3453 (mac_os_x, mac_os_x_server)
CVE-2011-3457 (mac_os_x, mac_os_x_server)
CVE-2011-3458 (mac_os_x, mac_os_x_server)
CVE-2011-3459 (mac_os_x, mac_os_x_server)
CVE-2011-3460 (mac_os_x, mac_os_x_server)
CVE-2011-3462 (mac_os_x, mac_os_x_server)
CVE-2011-3463 (mac_os_x, mac_os_x_server)
CVE-2011-3464
CVE-2011-3562
CVE-2011-3626 (logsurfer, logsurfer+)
CVE-2011-3637 (linux_kernel)
CVE-2011-3671 (firefox, seamonkey, thunderbird)
CVE-2011-3829
CVE-2011-3829 (support_incident_tracker)
CVE-2011-3830
CVE-2011-3830 (support_incident_tracker)
CVE-2011-3831
CVE-2011-3831 (support_incident_tracker)
CVE-2011-3832
CVE-2011-3832 (support_incident_tracker)
CVE-2011-3833
CVE-2011-3833 (support_incident_tracker)
CVE-2011-3846 (system_management_homepage)
CVE-2011-3874 (android)
CVE-2011-4031 (ffmpeg)
CVE-2011-4042 (frontvue, pcvue, plantvue)
CVE-2011-4043 (frontvue, pcvue, plantvue)
CVE-2011-4044 (frontvue, pcvue, plantvue)
CVE-2011-4045 (frontvue, pcvue, plantvue)
CVE-2011-4077 (kernel)
CVE-2011-4097 (linux_kernel)
CVE-2011-4105
CVE-2011-4105 (lightdm)
CVE-2011-4110 (kernel)
CVE-2011-4112 (linux_kernel)
CVE-2011-4113
CVE-2011-4113 (views)
CVE-2011-4131 (linux_kernel)
CVE-2011-4132 (kernel)
CVE-2011-4133 (moodle)
CVE-2011-4185 (iprint)
CVE-2011-4186 (iprint)
CVE-2011-4187 (iprint)
CVE-2011-4188
CVE-2011-4188 (imanager)
CVE-2011-4189
CVE-2011-4189 (groupwise)
CVE-2011-4278 (moodle)
CVE-2011-4279 (moodle)
CVE-2011-4280 (moodle, spike_phpcoverage)
CVE-2011-4281 (moodle)
CVE-2011-4282 (moodle)
CVE-2011-4283 (moodle)
CVE-2011-4284 (moodle)
CVE-2011-4285 (moodle)
CVE-2011-4286 (moodle)
CVE-2011-4287 (moodle)
CVE-2011-4288 (moodle)
CVE-2011-4289 (moodle)
CVE-2011-4290 (moodle)
CVE-2011-4291 (moodle)
CVE-2011-4292 (moodle)
CVE-2011-4293 (moodle)
CVE-2011-4294 (moodle)
CVE-2011-4295 (moodle)
CVE-2011-4296 (moodle)
CVE-2011-4298 (moodle)
CVE-2011-4299 (moodle)
CVE-2011-4300 (moodle)
CVE-2011-4301 (moodle)
CVE-2011-4302 (moodle)
CVE-2011-4303 (moodle)
CVE-2011-4304 (moodle)
CVE-2011-4305 (moodle)
CVE-2011-4306 (moodle)
CVE-2011-4307 (moodle)
CVE-2011-4308 (moodle)
CVE-2011-4309 (moodle)
CVE-2011-4314 (jboss_enterprise_application_platform, kay_framework, openid4java)
CVE-2011-4320
CVE-2011-4320 (ejabberd)
CVE-2011-4325 (kernel)
CVE-2011-4326 (linux_kernel)
CVE-2011-4328 (gnash)
CVE-2011-4330 (kernel)
CVE-2011-4337
CVE-2011-4337 (support_incident_tracker)
CVE-2011-4358
CVE-2011-4408 (ubuntu_linux)
CVE-2011-4409 (ubuntu)
CVE-2011-4447
CVE-2011-4447 (bitcoind, wxbitcoin)
CVE-2011-4458
CVE-2011-4458 (rt)
CVE-2011-4459
CVE-2011-4459 (rt)
CVE-2011-4460
CVE-2011-4460 (rt)
CVE-2011-4486
CVE-2011-4487
CVE-2011-4535 (modbustagserver, scadaphone, turbopower_abbrevia)
CVE-2011-4594 (linux_kernel)
CVE-2011-4599 (international_components_for_unicode)
CVE-2011-4608 (jboss_enterprise_application_platform)
CVE-2011-4611 (linux_kernel)
CVE-2011-4614
CVE-2011-4614 (typo3)
CVE-2011-4621 (linux_kernel)
CVE-2011-4622 (kvm)
CVE-2011-4638 (webtitan)
CVE-2011-4639 (webtitan)
CVE-2011-4640 (webtitan)
CVE-2011-4816
CVE-2011-4816 (maximo_asset_management, maximo_asset_management_essentials, tivoli_asset_managem...)
CVE-2011-4817
CVE-2011-4817 (maximo_asset_management, maximo_asset_management_essentials, tivoli_asset_managem...)
CVE-2011-4818
CVE-2011-4818 (maximo_asset_management, maximo_asset_management_essentials)
CVE-2011-4819
CVE-2011-4819 (maximo_asset_management, maximo_asset_management_essentials)
CVE-2011-4871 (opcsystems.net)
CVE-2011-4874 (promotic)
CVE-2011-4880 (webmi2ads)
CVE-2011-4881 (webmi2ads)
CVE-2011-4882 (webmi2ads)
CVE-2011-4883 (webmi2ads)
CVE-2011-4898
CVE-2011-4898 (wordpress)
CVE-2011-4899
CVE-2011-4899 (wordpress)
CVE-2011-4923
CVE-2011-4923 (backuppc)
CVE-2011-4956 (wordpress)
CVE-2011-4957 (wordpress)
CVE-2011-4963
CVE-2011-5000 (openssh)
CVE-2011-5067
CVE-2011-5068
CVE-2011-5069
CVE-2011-5070
CVE-2011-5071
CVE-2011-5072
CVE-2011-5073
CVE-2011-5074
CVE-2011-5075
CVE-2011-5081
CVE-2011-5081 (backuppc)
CVE-2011-5082 (s2member)
CVE-2011-5083
CVE-2011-5083 (dotclear)
CVE-2011-5084
CVE-2011-5084 (movable_type)
CVE-2011-5084 (movable_type, movabletype)
CVE-2011-5085
CVE-2011-5085 (movable_type)
CVE-2011-5085 (movable_type, movabletype)
CVE-2011-5086 (unitronics_uniopc)
CVE-2011-5087 (trace_mode_data_center)
CVE-2011-5088
CVE-2011-5088 (bizviz, genesis32)
CVE-2011-5089
CVE-2011-5089 (genesis32, bizviz)
CVE-2011-5090
CVE-2011-5090 (grboard)
CVE-2011-5091
CVE-2011-5091 (grboard)
CVE-2011-5092
CVE-2011-5092 (rt)
CVE-2011-5093
CVE-2011-5093 (rt)
CVE-2011-5094
CVE-2011-5094 (network_security_services)
CVE-2011-5095
CVE-2011-5096 (aura_application_server_5300)
CVE-2011-5124 (proxyone, proxysg)
CVE-2012-0002
CVE-2012-0002 (remote_desktop_protocol, windows_7, windows_server_2003, windows_server_2008, win...)
CVE-2012-0006
CVE-2012-0006 (windows_server_2003, windows_server_2008)
CVE-2012-0008
CVE-2012-0008 (visual_studio)
CVE-2012-0016
CVE-2012-0016 (expression_design)
CVE-2012-0018
CVE-2012-0018 (visio_viewer)
CVE-2012-0036
CVE-2012-0036 (curl, libcurl)
CVE-2012-0037
CVE-2012-0038 (linux_kernel)
CVE-2012-0041 (wireshark)
CVE-2012-0042 (wireshark)
CVE-2012-0043 (wireshark)
CVE-2012-0044 (linux_kernel)
CVE-2012-0047 (wicket)
CVE-2012-0054
CVE-2012-0054 (golismero)
CVE-2012-0058 (linux_kernel)
CVE-2012-0060 (rpm)
CVE-2012-0061 (rpm)
CVE-2012-0066 (wireshark)
CVE-2012-0121
CVE-2012-0121 (data_protector_express)
CVE-2012-0122
CVE-2012-0122 (data_protector_express)
CVE-2012-0123
CVE-2012-0123 (data_protector_express)
CVE-2012-0124
CVE-2012-0124 (data_protector_express)
CVE-2012-0125 (hp-ux)
CVE-2012-0126 (hp-ux)
CVE-2012-0127
CVE-2012-0127 (performance_manager)
CVE-2012-0128 (onboard_administrator)
CVE-2012-0129 (onboard_administrator)
CVE-2012-0130 (onboard_administrator)
CVE-2012-0133 (procurve_switch_5400zl, procurve_switch_5400zl_management_module, procurve_switch...)
CVE-2012-0134
CVE-2012-0135 (system_management_homepage)
CVE-2012-0141
CVE-2012-0141 (excel, excel_viewer, office, office_compatibility_pack)
CVE-2012-0142
CVE-2012-0142 (excel, excel_viewer, office, office_compatibility_pack)
CVE-2012-0143
CVE-2012-0143 (excel, office)
CVE-2012-0146
CVE-2012-0146 (forefront_unified_access_gateway)
CVE-2012-0147
CVE-2012-0147 (forefront_unified_access_gateway)
CVE-2012-0151
CVE-2012-0151 (windows_7, windows_server_2003, windows_server_2008, windows_vista, windows_xp)
CVE-2012-0152
CVE-2012-0152 (remote_desktop_protocol, windows_7, windows_server_2008)
CVE-2012-0156
CVE-2012-0156 (windows_7, windows_server_2008, windows_vista)
CVE-2012-0157
CVE-2012-0157 (windows_7, windows_server_2003, windows_server_2008, windows_vista, windows_xp)
CVE-2012-0158
CVE-2012-0158 (office, office_web_components, sql_server, biztalk_server, commerce_server, visua...)
CVE-2012-0159
CVE-2012-0159 (office, windows_7, windows_8, windows_server_2008, windows_vista, windows_xp, sil...)
CVE-2012-0160
CVE-2012-0160 (.net_framework)
CVE-2012-0161
CVE-2012-0161 (.net_framework)
CVE-2012-0162
CVE-2012-0162 (.net_framework)
CVE-2012-0163
CVE-2012-0163 (.net_framework)
CVE-2012-0164
CVE-2012-0164 (.net_framework)
CVE-2012-0165
CVE-2012-0165 (office, windows_server_2008, windows_vista)
CVE-2012-0167
CVE-2012-0167 (office)
CVE-2012-0168
CVE-2012-0168 (ie)
CVE-2012-0169
CVE-2012-0169 (ie)
CVE-2012-0170
CVE-2012-0170 (ie)
CVE-2012-0171
CVE-2012-0171 (ie)
CVE-2012-0172
CVE-2012-0172 (ie)
CVE-2012-0173
CVE-2012-0173 (windows_7, windows_server_2003, windows_server_2008, windows_vista, windows_xp)
CVE-2012-0174
CVE-2012-0174 (windows_7, windows_server_2008, windows_vista)
CVE-2012-0175
CVE-2012-0175 (windows_2003_server, windows_7, windows_server_2003, windows_server_2008, windows...)
CVE-2012-0176
CVE-2012-0176 (silverlight)
CVE-2012-0177
CVE-2012-0177 (office, works, works_6-9_file_converter)
CVE-2012-0178
CVE-2012-0179
CVE-2012-0179 (windows_7, windows_server_2008)
CVE-2012-0180
CVE-2012-0180 (windows_7, windows_server_2003, windows_server_2008, windows_vista, windows_xp)
CVE-2012-0181
CVE-2012-0181 (windows_7, windows_server_2003, windows_server_2008, windows_vista, windows_xp)
CVE-2012-0183
CVE-2012-0183 (office, office_compatibility_pack, word)
CVE-2012-0184
CVE-2012-0184 (excel, excel_viewer, office, office_compatibility_pack)
CVE-2012-0185
CVE-2012-0185 (excel, excel_viewer, office_compatibility_pack)
CVE-2012-0195
CVE-2012-0195 (maximo_asset_management, maximo_asset_management_essentials, tivoli_asset_managem...)
CVE-2012-0201 (personal_communications)
CVE-2012-0206
CVE-2012-0206 (powerdns)
CVE-2012-0207 (linux_kernel)
CVE-2012-0210 (devscripts)
CVE-2012-0211 (devscripts)
CVE-2012-0212 (devscripts)
CVE-2012-0215
CVE-2012-0215 (trytond)
CVE-2012-0216
CVE-2012-0216 (apache2)
CVE-2012-0217
CVE-2012-0217 (windows_7, windows_server_2003, windows_server_2008, windows_xp)
CVE-2012-0220
CVE-2012-0220 (ikiwiki)
CVE-2012-0221
CVE-2012-0221 (factorytalk, rslogix_5000)
CVE-2012-0222
CVE-2012-0222 (factorytalk, rslogix_5000)
CVE-2012-0223 (termis)
CVE-2012-0224 (aquis, termis)
CVE-2012-0225
CVE-2012-0225 (wonderware_information_server)
CVE-2012-0226
CVE-2012-0226 (wonderware_information_server)
CVE-2012-0228
CVE-2012-0228 (wonderware_information_server)
CVE-2012-0246 (integraxor)
CVE-2012-0247
CVE-2012-0247 (imagemagick)
CVE-2012-0248
CVE-2012-0248 (imagemagick)
CVE-2012-0253
CVE-2012-0253 (pluck_sitelife)
CVE-2012-0256
CVE-2012-0256 (traffic_server)
CVE-2012-0257
CVE-2012-0257 (archestra_application_object_toolkit, foxboro_control_software, infusion_control_...)
CVE-2012-0258 (archestra_application_object_toolkit, foxboro_control_software, infusion_control_...)
CVE-2012-0259 (imagemagick)
CVE-2012-0260 (imagemagick)
CVE-2012-0276
CVE-2012-0277
CVE-2012-0278 (flashpix_plugin)
CVE-2012-0279
CVE-2012-0282
CVE-2012-0283
CVE-2012-0284 (linksys_playerpt_activex_control)
CVE-2012-0289
CVE-2012-0289 (endpoint_protection, network_access_control)
CVE-2012-0291 (pcanywhere, altiris_client_management_suite_pcanywhere_solution, altiris_deployme...)
CVE-2012-0293
CVE-2012-0293 (altiris_wise_package_studio)
CVE-2012-0294
CVE-2012-0294 (endpoint_protection)
CVE-2012-0295
CVE-2012-0295 (endpoint_protection)
CVE-2012-0300
CVE-2012-0301
CVE-2012-0302
CVE-2012-0303
CVE-2012-0315 (alftp)
CVE-2012-0316 (android_activities, android_mykitchen)
CVE-2012-0317
CVE-2012-0317 (movable_type_open_source, movable_type_enterprise, movable_type_advanced, movable...)
CVE-2012-0318 (movable_type_open_source, movable_type_enterprise, movable_type_advanced, movable...)
CVE-2012-0319 (movable_type_open_source, movable_type_enterprise, movable_type_advanced, movable...)
CVE-2012-0320 (movable_type_open_source, movable_type_enterprise, movable_type_advanced, movable...)
CVE-2012-0321
CVE-2012-0326
CVE-2012-0326 (twicca)
CVE-2012-0328
CVE-2012-0328 (janetter)
CVE-2012-0330
CVE-2012-0331
CVE-2012-0359
CVE-2012-0366
CVE-2012-0367
CVE-2012-0368
CVE-2012-0369
CVE-2012-0370
CVE-2012-0371
CVE-2012-0376 (unified_communications_manager)
CVE-2012-0378 (5500_series_adaptive_security_appliance, adaptive_security_appliance_software)
CVE-2012-0381 (ios, ios_xe)
CVE-2012-0382 (ios, ios_xe)
CVE-2012-0383 (ios)
CVE-2012-0384 (ios, ios_xe)
CVE-2012-0385 (ios)
CVE-2012-0386 (ios, ios_xe)
CVE-2012-0387 (ios)
CVE-2012-0388 (ios)
CVE-2012-0399
CVE-2012-0399 (envision)
CVE-2012-0400
CVE-2012-0400 (envision)
CVE-2012-0401
CVE-2012-0401 (envision)
CVE-2012-0402
CVE-2012-0402 (envision)
CVE-2012-0403
CVE-2012-0403 (envision)
CVE-2012-0409 (autostart)
CVE-2012-0410 (groupwise)
CVE-2012-0441 (firefox, firefox_esr, network_security_services, seamonkey, thunderbird, thunderb...)
CVE-2012-0451
CVE-2012-0454
CVE-2012-0455
CVE-2012-0456
CVE-2012-0457
CVE-2012-0458
CVE-2012-0459
CVE-2012-0460
CVE-2012-0467 (firefox, firefox_esr, thunderbird, thunderbird_esr, seamonkey)
CVE-2012-0468 (firefox, thunderbird, seamonkey)
CVE-2012-0469 (firefox, firefox_esr, thunderbird, thunderbird_esr, seamonkey)
CVE-2012-0470 (firefox, firefox_esr, thunderbird, thunderbird_esr, seamonkey)
CVE-2012-0471 (firefox, firefox_esr, thunderbird, thunderbird_esr, seamonkey)
CVE-2012-0472 (firefox, firefox_esr, seamonkey, thunderbird, thunderbird_esr)
CVE-2012-0473 (firefox, firefox_esr, thunderbird, thunderbird_esr, seamonkey)
CVE-2012-0474 (firefox, firefox_esr, thunderbird, thunderbird_esr, seamonkey)
CVE-2012-0475 (firefox, thunderbird, seamonkey)
CVE-2012-0477 (firefox, firefox_esr, thunderbird, thunderbird_esr, seamonkey)
CVE-2012-0478 (firefox, firefox_esr, thunderbird, thunderbird_esr, seamonkey)
CVE-2012-0479 (firefox, firefox_esr, thunderbird, thunderbird_esr, seamonkey)
CVE-2012-0507
CVE-2012-0507 (jre)
CVE-2012-0540
CVE-2012-0561 (peoplesoft_products)
CVE-2012-0562 (peoplesoft_products)
CVE-2012-0564 (peoplesoft_products)
CVE-2012-0584
CVE-2012-0634 (itunes, webkit)
CVE-2012-0636 (itunes, webkit)
CVE-2012-0637 (itunes, webkit)
CVE-2012-0638 (itunes, webkit)
CVE-2012-0639 (itunes, webkit)
CVE-2012-0640
CVE-2012-0647
CVE-2012-0648 (itunes, webkit)
CVE-2012-0649 (mac_os_x, mac_os_x_server)
CVE-2012-0651 (mac_os_x, mac_os_x_server)
CVE-2012-0652 (mac_os_x)
CVE-2012-0654 (mac_os_x, mac_os_x_server)
CVE-2012-0655 (mac_os_x, mac_os_x_server)
CVE-2012-0656 (mac_os_x)
CVE-2012-0657 (mac_os_x, mac_os_x_server)
CVE-2012-0658 (mac_os_x, mac_os_x_server)
CVE-2012-0659 (mac_os_x, mac_os_x_server)
CVE-2012-0660 (mac_os_x, mac_os_x_server)
CVE-2012-0661 (mac_os_x, mac_os_x_server)
CVE-2012-0662 (mac_os_x, mac_os_x_server)
CVE-2012-0675 (mac_os_x, mac_os_x_server)
CVE-2012-0676 (safari)
CVE-2012-0677
CVE-2012-0677 (itunes)
CVE-2012-0679
CVE-2012-0680
CVE-2012-0682
CVE-2012-0682 (safari)
CVE-2012-0683
CVE-2012-0683 (safari)
CVE-2012-0688 (silver_fabric_activematrix_service_grid_distribution, activematrix_service_bus, a...)
CVE-2012-0708
CVE-2012-0708 (rational_clearquest)
CVE-2012-0709
CVE-2012-0709 (db2)
CVE-2012-0710
CVE-2012-0710 (db2)
CVE-2012-0711
CVE-2012-0711 (db2)
CVE-2012-0712
CVE-2012-0712 (db2)
CVE-2012-0715
CVE-2012-0716 (websphere_application_server)
CVE-2012-0717 (websphere_application_server)
CVE-2012-0720 (websphere_application_server)
CVE-2012-0723
CVE-2012-0723 (aix, vios)
CVE-2012-0724
CVE-2012-0724 (chrome)
CVE-2012-0725
CVE-2012-0725 (chrome)
CVE-2012-0726
CVE-2012-0726 (tivoli_directory_server)
CVE-2012-0740
CVE-2012-0740 (tivoli_directory_server)
CVE-2012-0742
CVE-2012-0742 (tivoli_event_pump)
CVE-2012-0743
CVE-2012-0743 (tivoli_directory_server)
CVE-2012-0772 (flash_player, adobe_air)
CVE-2012-0773 (flash_player, flash_player_for_android, adobe_air)
CVE-2012-0774
CVE-2012-0774 (acrobat_reader)
CVE-2012-0775
CVE-2012-0775 (acrobat_reader)
CVE-2012-0776
CVE-2012-0776 (acrobat_reader)
CVE-2012-0777
CVE-2012-0777 (acrobat_reader)
CVE-2012-0782 (wordpress)
CVE-2012-0792 (moodle)
CVE-2012-0793 (moodle)
CVE-2012-0794 (moodle)
CVE-2012-0795 (moodle)
CVE-2012-0796 (moodle)
CVE-2012-0797 (moodle)
CVE-2012-0798 (moodle)
CVE-2012-0799 (moodle)
CVE-2012-0800 (moodle)
CVE-2012-0801 (moodle)
CVE-2012-0802
CVE-2012-0802 (spamdyke)
CVE-2012-0804
CVE-2012-0804 (cvs)
CVE-2012-0805 (sqlalchemy)
CVE-2012-0808
CVE-2012-0808 (as31)
CVE-2012-0809
CVE-2012-0817 (samba)
CVE-2012-0838
CVE-2012-0863 (mumble)
CVE-2012-0865 (cubecart)
CVE-2012-0866 (postgresql)
CVE-2012-0867 (postgresql)
CVE-2012-0868 (postgresql)
CVE-2012-0872
CVE-2012-0872 (oxwall)
CVE-2012-0878
CVE-2012-0879 (linux_kernel)
CVE-2012-0883 (http_server)
CVE-2012-0884
CVE-2012-0911
CVE-2012-0911 (tikiwiki, tikiwiki_cms/groupware)
CVE-2012-0920 (dropbear_ssh_server)
CVE-2012-0932
CVE-2012-0933
CVE-2012-0934
CVE-2012-0935
CVE-2012-0936
CVE-2012-0937 (wordpress)
CVE-2012-0942 (helix_server, helix_mobile_server)
CVE-2012-0946
CVE-2012-0946 (unix_driver)
CVE-2012-0948
CVE-2012-0948 (ubuntu_linux, update-manager-core)
CVE-2012-0949
CVE-2012-0950
CVE-2012-0950 (ubuntu_linux)
CVE-2012-0954
CVE-2012-0954 (apt)
CVE-2012-0975 (image_hosting_script_dpi)
CVE-2012-0976 (silverstripe)
CVE-2012-0977 (lurawave_jp2_activex_control)
CVE-2012-0985
CVE-2012-0985 (smartwi_connection_utillity, vaio_easy_connect, vaio_pc_wireless_lan_wizard, vaio...)
CVE-2012-0993 (zenphoto)
CVE-2012-0994 (zenphoto)
CVE-2012-0995 (zenphoto)
CVE-2012-1012
CVE-2012-1012 (kerberos)
CVE-2012-1013
CVE-2012-1013 (kerberos)
CVE-2012-1014
CVE-2012-1014 (kerberos)
CVE-2012-1015
CVE-2012-1015 (kerberos)
CVE-2012-1037
CVE-2012-1037 (glpi)
CVE-2012-1039
CVE-2012-1039 (dotclear)
CVE-2012-1053
CVE-2012-1053 (puppet, puppet_enterprise_users)
CVE-2012-1054
CVE-2012-1054 (puppet, puppet_enterprise_users)
CVE-2012-1089 (wicket)
CVE-2012-1090 (linux_kernel)
CVE-2012-1097 (linux_kernel)
CVE-2012-1113
CVE-2012-1113 (gallery)
CVE-2012-1126 (firefox_mobile, freetype)
CVE-2012-1127 (firefox_mobile, freetype)
CVE-2012-1128 (firefox_mobile, freetype)
CVE-2012-1129 (firefox_mobile, freetype)
CVE-2012-1130 (firefox_mobile, freetype)
CVE-2012-1131 (firefox_mobile, freetype)
CVE-2012-1132 (firefox_mobile, freetype)
CVE-2012-1145 (network_satellite)
CVE-2012-1146 (linux_kernel)
CVE-2012-1147 (expat)
CVE-2012-1148 (expat)
CVE-2012-1162
CVE-2012-1162 (libzip)
CVE-2012-1163
CVE-2012-1163 (libzip)
CVE-2012-1172
CVE-2012-1172 (php)
CVE-2012-1174
CVE-2012-1174 (systemd)
CVE-2012-1179 (linux_kernel)
CVE-2012-1180
CVE-2012-1180 (nginx)
CVE-2012-1181
CVE-2012-1181 (http_server)
CVE-2012-1182
CVE-2012-1182 (samba)
CVE-2012-1185 (imagemagick)
CVE-2012-1186 (imagemagick)
CVE-2012-1191 (djbdns)
CVE-2012-1192 (unbound)
CVE-2012-1193 (powerdns_recursor)
CVE-2012-1194 (windows_server_2008)
CVE-2012-1195 (lenovo_thinkmanagement_console)
CVE-2012-1196 (lenovo_thinkmanagement_console)
CVE-2012-1197 (acdsee)
CVE-2012-1198 (basic_analysis_and_security_engine)
CVE-2012-1199 (basic_analysis_and_security_engine)
CVE-2012-1200 (nova_cms)
CVE-2012-1214 (yoono_desktop)
CVE-2012-1215 (yoono_for_firefox)
CVE-2012-1216 (pbboard)
CVE-2012-1217 (sths_v2_web_portal)
CVE-2012-1218 (freelancerkit)
CVE-2012-1219 (freelancerkit)
CVE-2012-1220 (gazie)
CVE-2012-1221 (r2/)
CVE-2012-1222 (r2/extreme)
CVE-2012-1223 (r2/extreme)
CVE-2012-1224 (contentlion_alpha)
CVE-2012-1225 (dolibarr)
CVE-2012-1236
CVE-2012-1236 (janetter)
CVE-2012-1237
CVE-2012-1237 (sencha_sns)
CVE-2012-1238
CVE-2012-1238 (sencha_sns)
CVE-2012-1239
CVE-2012-1239 (e-studio)
CVE-2012-1240 (dokodemo_rikunabi_2013)
CVE-2012-1241
CVE-2012-1241 (activescriptruby)
CVE-2012-1243
CVE-2012-1243 (twitrocker2_android)
CVE-2012-1246 (web_mart)
CVE-2012-1247 (web_mart)
CVE-2012-1248 (basercms)
CVE-2012-1249 (ilunascape_android)
CVE-2012-1250
CVE-2012-1250 (lan-w300n/r, lan-w300n/r_firmware, lan-w300n/rs, lan-w300n/rs_firmware, lan-w300n...)
CVE-2012-1251
CVE-2012-1251 (opera)
CVE-2012-1251 (opera_browser)
CVE-2012-1252
CVE-2012-1252 (rssowl)
CVE-2012-1253
CVE-2012-1253 (roundcube_webmail)
CVE-2012-1254 (segue)
CVE-2012-1255 (segue)
CVE-2012-1256 (easyvista)
CVE-2012-1264
CVE-2012-1264 (gom_media_player)
CVE-2012-1297
CVE-2012-1297 (contao_cms)
CVE-2012-1310 (ios)
CVE-2012-1311 (ios, ios_xe)
CVE-2012-1312 (ios)
CVE-2012-1314 (ios)
CVE-2012-1315 (ios)
CVE-2012-1324 (ios)
CVE-2012-1327 (ios)
CVE-2012-1338
CVE-2012-1339
CVE-2012-1340
CVE-2012-1342
CVE-2012-1344
CVE-2012-1364 (unified_computing_system_software)
CVE-2012-1365 (unified_computing_system_software)
CVE-2012-1367 (ios)
CVE-2012-1370 (anyconnect_secure_mobility_client)
CVE-2012-1410 (kadu)
CVE-2012-1413 (zen_cart)
CVE-2012-1418 (ac700_chromebook, chrome_os, cr-48_chromebook, series_5_chromebook)
CVE-2012-1419 (clamav, quick_heal)
CVE-2012-1420 (antivirus, command_antivirus, f-prot_antivirus, fortinet_antivirus, kaspersky_ant...)
CVE-2012-1421 (endpoint_protection, norman_antivirus_&_antispyware, quick_heal, rising_antivirus)
CVE-2012-1422 (nod32_antivirus, norman_antivirus_&_antispyware, quick_heal, rising_antivirus)
CVE-2012-1423 (anti-malware, antivirus, command_antivirus, f-prot_antivirus, fortinet_antivirus,...)
CVE-2012-1424 (avl_sdk, jiangmin_antivirus, norman_antivirus_&_antispyware, pc_tools_antivirus, ...)
CVE-2012-1425 (anti-malware, antivir, avl_sdk, endpoint_protection, fortinet_antivirus, gateway,...)
CVE-2012-1426 (antivirus, command_antivirus, f-prot_antivirus, norman_antivirus_&_antispyware, q...)
CVE-2012-1427 (norman_antivirus_&_antispyware, quick_heal, sophos_anti-virus)
CVE-2012-1428 (norman_antivirus_&_antispyware, quick_heal, sophos_anti-virus)
CVE-2012-1429 (anti-malware, bitdefender, comodo_antivirus, esafe, f-secure_anti-virus, gateway,...)
CVE-2012-1464
CVE-2012-1464 (netdecision)
CVE-2012-1465
CVE-2012-1465 (netdecision)
CVE-2012-1466
CVE-2012-1471 (ocportal)
CVE-2012-1472
CVE-2012-1493
CVE-2012-1493 (big-ip_1000, big-ip_11000, big-ip_11050, big-ip_1500, big-ip_1600, big-ip_2400, b...)
CVE-2012-1502 (pypam)
CVE-2012-1515 (esxi)
CVE-2012-1518
CVE-2012-1518 (workstation, player, fusion, esxi)
CVE-2012-1520
CVE-2012-1520 (safari)
CVE-2012-1521 (chrome)
CVE-2012-1522
CVE-2012-1522 (internet_explorer)
CVE-2012-1523
CVE-2012-1523 (ie)
CVE-2012-1524
CVE-2012-1524 (internet_explorer)
CVE-2012-1557
CVE-2012-1558
CVE-2012-1569
CVE-2012-1569 (gnutls, libtasn1)
CVE-2012-1570 (maradns)
CVE-2012-1571
CVE-2012-1573
CVE-2012-1573 (gnutls)
CVE-2012-1574 (hadoop, cloudera_cdh)
CVE-2012-1575
CVE-2012-1575 (cumin)
CVE-2012-1583 (linux_kernel)
CVE-2012-1589 (drupal)
CVE-2012-1601 (linux_kernel)
CVE-2012-1602 (nextbbs)
CVE-2012-1603 (nextbbs)
CVE-2012-1610 (imagemagick)
CVE-2012-1620
CVE-2012-1620 (slock)
CVE-2012-1661 (arcgis, arcmap)
CVE-2012-1667 (bind)
CVE-2012-1670
CVE-2012-1670 (php_grade_book)
CVE-2012-1671 (phppaleo)
CVE-2012-1711 (jdk, jre)
CVE-2012-1713 (jdk, jre, javafx)
CVE-2012-1716 (jdk, jre)
CVE-2012-1728 (siebel_crm)
CVE-2012-1729 (hyperion)
CVE-2012-1730 (e-business_suite)
CVE-2012-1731 (siebel_crm)
CVE-2012-1732 (siebel_crm)
CVE-2012-1733 (peoplesoft_products)
CVE-2012-1734 (mysql)
CVE-2012-1735 (mysql)
CVE-2012-1736 (fusion_middleware)
CVE-2012-1737 (database_server, enterprise_manager_grid_control)
CVE-2012-1738 (iplanet_web_server, sun_products_suite_java_system_web_server)
CVE-2012-1739 (e-business_suite)
CVE-2012-1740 (application_express_listener)
CVE-2012-1741 (fusion_middleware)
CVE-2012-1742 (siebel_crm)
CVE-2012-1743 (industry_applications)
CVE-2012-1744 (fusion_middleware)
CVE-2012-1745 (database_server)
CVE-2012-1746 (database_server)
CVE-2012-1747 (database_server)
CVE-2012-1774
CVE-2012-1792 (online_merchant)
CVE-2012-1798 (imagemagick)
CVE-2012-1799 (scalance_s_firmware, scalance_s602, scalance_s612, scalance_s613)
CVE-2012-1800 (scalance_s_firmware, scalance_s602, scalance_s612, scalance_s613)
CVE-2012-1801 (interlink_module, quickteach, robotstudio_lite, robotstudio_s4, s4_opc_server, we...)
CVE-2012-1802 (scalance_x414-3e, scalance_x414-3e_firmware, scalance_x308-2m, scalance_x308-2m_f...)
CVE-2012-1804
CVE-2012-1805
CVE-2012-1805 (h0-ecom, h0-ecom100, h2-ecom, h2-ecom-f, h2-ecom100, h4-ecom, h4-ecom-f, h4-ecom100)
CVE-2012-1806
CVE-2012-1806 (h0-ecom, h0-ecom100, h2-ecom, h2-ecom-f, h2-ecom100, h4-ecom, h4-ecom-f, h4-ecom100)
CVE-2012-1807
CVE-2012-1807 (h0-ecom, h0-ecom100, h2-ecom, h2-ecom-f, h2-ecom100, h4-ecom, h4-ecom-f, h4-ecom100)
CVE-2012-1808
CVE-2012-1808 (h0-ecom, h0-ecom100, h2-ecom, h2-ecom-f, h2-ecom100, h4-ecom, h4-ecom-f, h4-ecom100)
CVE-2012-1809
CVE-2012-1809 (h0-ecom, h0-ecom100, h2-ecom, h2-ecom-f, h2-ecom100, h4-ecom, h4-ecom-f, h4-ecom100)
CVE-2012-1814
CVE-2012-1814 (deltav, deltav_proessentials_scientific_graph, deltav_workstation)
CVE-2012-1815
CVE-2012-1815 (deltav, deltav_proessentials_scientific_graph, deltav_workstation)
CVE-2012-1816
CVE-2012-1816 (deltav, deltav_proessentials_scientific_graph, deltav_workstation)
CVE-2012-1817
CVE-2012-1817 (deltav, deltav_proessentials_scientific_graph, deltav_workstation)
CVE-2012-1818
CVE-2012-1818 (deltav, deltav_proessentials_scientific_graph, deltav_workstation)
CVE-2012-1821
CVE-2012-1821 (endpoint_protection)
CVE-2012-1823 (php)
CVE-2012-1824 (scadapro_client, scadapro_server)
CVE-2012-1825
CVE-2012-1825 (counteract)
CVE-2012-1826
CVE-2012-1826 (dotcms)
CVE-2012-1827 (autoform_pdm_archive)
CVE-2012-1828 (autoform_pdm_archive)
CVE-2012-1829 (autoform_pdm_archive)
CVE-2012-1830
CVE-2012-1830 (kingview)
CVE-2012-1831
CVE-2012-1831 (kingview)
CVE-2012-1832
CVE-2012-1832 (kingview)
CVE-2012-1849
CVE-2012-1849 (lync)
CVE-2012-1854
CVE-2012-1854 (office, visual_basic_for_applications, visual_basic_for_applications_sdk)
CVE-2012-1855
CVE-2012-1855 (.net_framework)
CVE-2012-1857
CVE-2012-1857 (dynamics_ax)
CVE-2012-1858
CVE-2012-1858 (lync, office_communicator, ie)
CVE-2012-1859
CVE-2012-1859 (office_web_apps, sharepoint_foundation, sharepoint_server)
CVE-2012-1860
CVE-2012-1860 (office_web_apps, sharepoint_server)
CVE-2012-1861
CVE-2012-1861 (office_web_apps, sharepoint_foundation, sharepoint_server)
CVE-2012-1862
CVE-2012-1862 (sharepoint_server)
CVE-2012-1863
CVE-2012-1864
CVE-2012-1864 (windows_2003_server, windows_7, windows_server_2003, windows_server_2008, windows...)
CVE-2012-1865
CVE-2012-1865 (windows_2003_server, windows_7, windows_server_2003, windows_server_2008, windows...)
CVE-2012-1866
CVE-2012-1867
CVE-2012-1868
CVE-2012-1870
CVE-2012-1872
CVE-2012-1873
CVE-2012-1874
CVE-2012-1875
CVE-2012-1876
CVE-2012-1877
CVE-2012-1890
CVE-2012-1891
CVE-2012-1893
CVE-2012-1894
CVE-2012-1902
CVE-2012-1902 (phpmyadmin)
CVE-2012-1904 (realplayer, realplayer_sp)
CVE-2012-1906
CVE-2012-1906 (puppet, puppet_enterprise_users)
CVE-2012-1907 (privawall_antivirus)
CVE-2012-1909
CVE-2012-1909 (bitcoin-qt, bitcoind, wxbitcoin)
CVE-2012-1910
CVE-2012-1910 (bitcoin-qt)
CVE-2012-1916
CVE-2012-1916 (atmail_open)
CVE-2012-1917
CVE-2012-1917 (atmail_open)
CVE-2012-1918
CVE-2012-1918 (atmail_open)
CVE-2012-1919
CVE-2012-1919 (atmail_open)
CVE-2012-1920
CVE-2012-1920 (atmail_open)
CVE-2012-1923 (helix_server, helix_mobile_server)
CVE-2012-1924
CVE-2012-1924 (opera)
CVE-2012-1925
CVE-2012-1925 (opera)
CVE-2012-1926
CVE-2012-1926 (opera)
CVE-2012-1927
CVE-2012-1927 (opera)
CVE-2012-1928
CVE-2012-1928 (opera)
CVE-2012-1929
CVE-2012-1929 (opera)
CVE-2012-1930
CVE-2012-1930 (opera)
CVE-2012-1931
CVE-2012-1931 (opera)
CVE-2012-1937 (firefox, firefox_esr, seamonkey, thunderbird, thunderbird_esr)
CVE-2012-1938 (firefox, thunderbird, seamonkey)
CVE-2012-1939 (firefox_esr, thunderbird_esr)
CVE-2012-1940 (firefox, firefox_esr, seamonkey, thunderbird, thunderbird_esr)
CVE-2012-1941 (firefox, firefox_esr, seamonkey, thunderbird, thunderbird_esr)
CVE-2012-1942 (firefox, seamonkey, thunderbird)
CVE-2012-1968 (bugzilla)
CVE-2012-1969
CVE-2012-1969 (bugzilla)
CVE-2012-1979
CVE-2012-1979 (syndeocms)
CVE-2012-1984 (helix_server, helix_mobile_server)
CVE-2012-1985 (helix_server, helix_mobile_server)
CVE-2012-1986
CVE-2012-1986 (puppet, puppet_enterprise_users)
CVE-2012-1987
CVE-2012-1987 (puppet, puppet_enterprise_users)
CVE-2012-1988
CVE-2012-1988 (puppet, puppet_enterprise_users)
CVE-2012-1989 (puppet, puppet_enterprise_users)
CVE-2012-1990 (3.0, 6.0)
CVE-2012-1993 (system_management_homepage)
CVE-2012-2010 (openvms)
CVE-2012-2011 (web_jetadmin)
CVE-2012-2018
CVE-2012-2034
CVE-2012-2034 (flash_player, air)
CVE-2012-2035
CVE-2012-2035 (flash_player, air)
CVE-2012-2036
CVE-2012-2036 (flash_player, air)
CVE-2012-2037 (flash_player, air)
CVE-2012-2038 (flash_player, air)
CVE-2012-2039 (flash_player, air)
CVE-2012-2040 (flash_player, air)
CVE-2012-2042 (illustrator, illustrator_cs5.5)
CVE-2012-2080 (node_limitnumber)
CVE-2012-2082 (chaos_tool_suite)
CVE-2012-2084 (print)
CVE-2012-2088
CVE-2012-2089
CVE-2012-2089 (nginx)
CVE-2012-2090
CVE-2012-2091
CVE-2012-2093 (gajim)
CVE-2012-2101
CVE-2012-2110
CVE-2012-2111 (samba)
CVE-2012-2113
CVE-2012-2118 (x11)
CVE-2012-2120 (texlive-extra-utils)
CVE-2012-2121 (linux_kernel)
CVE-2012-2122
CVE-2012-2122 (mysql, mariadb)
CVE-2012-2123 (linux_kernel)
CVE-2012-2131
CVE-2012-2131 (openssl)
CVE-2012-2138
CVE-2012-2138 (org.apache.sling.servlets.post)
CVE-2012-2139 (mail_gem)
CVE-2012-2140 (mail_gem)
CVE-2012-2143
CVE-2012-2152 (dhcpcd)
CVE-2012-2154 (cdn2_video)
CVE-2012-2155 (cdn2_video)
CVE-2012-2159 (security_appscan_source, spss_data_collection)
CVE-2012-2161 (security_appscan_source, spss_data_collection)
CVE-2012-2162
CVE-2012-2163
CVE-2012-2163 (scale_out_network_attached_storage)
CVE-2012-2170 (websphere_application_server)
CVE-2012-2173 (security_appscan_source)
CVE-2012-2174 (lotus_notes)
CVE-2012-2175 (lotus_inotes)
CVE-2012-2176 (lotus_quickr)
CVE-2012-2181 (websphere_portal)
CVE-2012-2186 (open_source, certified_asterisk, digiumphones, business_edition)
CVE-2012-2188 (power_hardware_management_console_firmware, systems_director_management__console_...)
CVE-2012-2211 (egroupware)
CVE-2012-2214 (pidgin)
CVE-2012-2215
CVE-2012-2217
CVE-2012-2230 (cloudera_manager, cloudera_service_and_configuration_manager)
CVE-2012-2234
CVE-2012-2234 (teampass)
CVE-2012-2235 (support_incident_tracker)
CVE-2012-2267 (helix_server, helix_mobile_server)
CVE-2012-2268 (helix_server, helix_mobile_server)
CVE-2012-2276
CVE-2012-2277
CVE-2012-2278
CVE-2012-2279
CVE-2012-2280
CVE-2012-2281
CVE-2012-2296 (rpx)
CVE-2012-2302 (sitedoc)
CVE-2012-2303 (spaces)
CVE-2012-2305 (node_gallery)
CVE-2012-2306 (drupal)
CVE-2012-2307 (addressbook)
CVE-2012-2308 (taxonomy_grid_catalog)
CVE-2012-2309 (glossify_internal_links_auto_seo)
CVE-2012-2310 (cctags)
CVE-2012-2311 (php)
CVE-2012-2314 (anaconda)
CVE-2012-2318 (pidgin)
CVE-2012-2320 (connman)
CVE-2012-2321 (connman)
CVE-2012-2322 (connman)
CVE-2012-2329 (php)
CVE-2012-2333
CVE-2012-2334
CVE-2012-2335 (php)
CVE-2012-2336 (php)
CVE-2012-2337 (sudo)
CVE-2012-2341 (take_control)
CVE-2012-2351
CVE-2012-2351 (mahara)
CVE-2012-2352
CVE-2012-2353 (moodle)
CVE-2012-2354 (moodle)
CVE-2012-2355 (moodle)
CVE-2012-2356 (moodle)
CVE-2012-2357 (moodle)
CVE-2012-2358 (moodle)
CVE-2012-2359 (moodle)
CVE-2012-2360 (moodle)
CVE-2012-2361 (moodle)
CVE-2012-2362 (moodle)
CVE-2012-2363 (moodle)
CVE-2012-2364 (moodle)
CVE-2012-2365 (moodle)
CVE-2012-2366 (moodle)
CVE-2012-2367 (moodle)
CVE-2012-2369
CVE-2012-2369 (pidgin-otr)
CVE-2012-2374
CVE-2012-2374 (tornado)
CVE-2012-2376 (php)
CVE-2012-2380 (roller)
CVE-2012-2381 (roller)
CVE-2012-2386
CVE-2012-2386 (php)
CVE-2012-2388 (strongswan)
CVE-2012-2396
CVE-2012-2399 (wordpress)
CVE-2012-2400 (wordpress)
CVE-2012-2401 (plupload, wordpress)
CVE-2012-2402 (wordpress)
CVE-2012-2403 (wordpress)
CVE-2012-2404 (wordpress)
CVE-2012-2405
CVE-2012-2405 (gallery)
CVE-2012-2406 (realplayer, realplayer_sp)
CVE-2012-2411 (realplayer, realplayer_sp)
CVE-2012-2414 (open_source)
CVE-2012-2416 (open_source)
CVE-2012-2417
CVE-2012-2418 (quickbooks)
CVE-2012-2419 (quickbooks)
CVE-2012-2420 (quickbooks)
CVE-2012-2421 (quickbooks)
CVE-2012-2422 (quickbooks)
CVE-2012-2423 (quickbooks)
CVE-2012-2424 (quickbooks)
CVE-2012-2425 (quickbooks)
CVE-2012-2426 (xarrow)
CVE-2012-2427 (xarrow)
CVE-2012-2428 (xarrow)
CVE-2012-2429 (xarrow)
CVE-2012-2435 (pligg_cms)
CVE-2012-2436 (pligg_cms)
CVE-2012-2442 (pc_suite)
CVE-2012-2446
CVE-2012-2446 (netsweeper)
CVE-2012-2447
CVE-2012-2447 (netsweeper)
CVE-2012-2451 (config-inifiles)
CVE-2012-2459 (bitcoin-qt, bitcoind)
CVE-2012-2486 (telepresence_multipoint_switch, telepresence_multipoint_switch_software, telepres...)
CVE-2012-2488 (asr_9000_rsp440_router, ios_xr, crs_performance_route_processor)
CVE-2012-2515
CVE-2012-2515 (captiva_quickscan_pro, documentum_applicationxtender_desktop, intelligent_platfor...)
CVE-2012-2516
CVE-2012-2516 (intelligent_platforms_proficy_batch_execution, intelligent_platforms_proficy_hist...)
CVE-2012-2559
CVE-2012-2559 (kinghistorian)
CVE-2012-2560
CVE-2012-2560 (kingview)
CVE-2012-2568 (blackarmor_nas)
CVE-2012-2595 (wincc)
CVE-2012-2596 (wincc)
CVE-2012-2597 (wincc)
CVE-2012-2598 (wincc)
CVE-2012-2603 (scrumworks)
CVE-2012-2614 (lattice_diamond_programmer)
CVE-2012-2626 (sonicwall_scrutinizer, sonicwall_scrutinizer_with_flow_analytics_module)
CVE-2012-2627 (sonicwall_scrutinizer, sonicwall_scrutinizer_with_flow_analytics_module)
CVE-2012-2630
CVE-2012-2630 (madomagi-ip_android)
CVE-2012-2630 (puella_magi_madoka_magica)
CVE-2012-2632 (b1, b1_firmware, x1, x2, x86_firmware)
CVE-2012-2633 (wassup_plugin)
CVE-2012-2634 (feeddemon)
CVE-2012-2635 (dolphin_browser_hd, dolphin_for_pad)
CVE-2012-2636
CVE-2012-2636 (web_patio)
CVE-2012-2637
CVE-2012-2637 (web_patio)
CVE-2012-2638
CVE-2012-2638 (smallpict)
CVE-2012-2639 (python)
CVE-2012-2640
CVE-2012-2641
CVE-2012-2642
CVE-2012-2642 (mt4i)
CVE-2012-2643 (yy-board)
CVE-2012-2644 (mt4i)
CVE-2012-2647 (toolbar)
CVE-2012-2653
CVE-2012-2653 (arpwatch)
CVE-2012-2655 (postgresql)
CVE-2012-2660 (ruby_on_rails)
CVE-2012-2661 (ruby_on_rails)
CVE-2012-2667
CVE-2012-2668
CVE-2012-2670
CVE-2012-2671
CVE-2012-2672
CVE-2012-2673
CVE-2012-2674
CVE-2012-2675
CVE-2012-2676
CVE-2012-2677
CVE-2012-2691
CVE-2012-2692
CVE-2012-2693
CVE-2012-2694 (ruby_on_rails)
CVE-2012-2695 (ruby_on_rails)
CVE-2012-2702
CVE-2012-2702 (ubercart_product_keys)
CVE-2012-2703
CVE-2012-2703 (advertisement)
CVE-2012-2705
CVE-2012-2705 (smart_breadcrumb)
CVE-2012-2706
CVE-2012-2706 (post_affiliate_pro)
CVE-2012-2707
CVE-2012-2707 (hostmaster)
CVE-2012-2708
CVE-2012-2708 (hostmaster)
CVE-2012-2710
CVE-2012-2710 (zen)
CVE-2012-2711
CVE-2012-2711 (taxonomy_list)
CVE-2012-2712
CVE-2012-2712 (search_api)
CVE-2012-2713
CVE-2012-2713 (browserid)
CVE-2012-2715
CVE-2012-2715 (amadou)
CVE-2012-2717 (mobile_tools)
CVE-2012-2719
CVE-2012-2719 (filedepot)
CVE-2012-2720
CVE-2012-2720 (tokenauth)
CVE-2012-2721
CVE-2012-2721 (organic_groups)
CVE-2012-2722 (node_embed)
CVE-2012-2723 (maestro)
CVE-2012-2725 (6.x-1.0)
CVE-2012-2726 (protest)
CVE-2012-2727 (janrain_capture)
CVE-2012-2737
CVE-2012-2738
CVE-2012-2738 (vte)
CVE-2012-2742 (revelation)
CVE-2012-2743 (revelation)
CVE-2012-2747 (joomla)
CVE-2012-2748 (joomla!)
CVE-2012-2751
CVE-2012-2752 (vma)
CVE-2012-2753
CVE-2012-2759 (login_with_ajax)
CVE-2012-2760
CVE-2012-2762
CVE-2012-2763
CVE-2012-2763 (gimp)
CVE-2012-2812 (libexif)
CVE-2012-2813 (libexif)
CVE-2012-2814 (libexif)
CVE-2012-2836 (libexif)
CVE-2012-2847 (chrome)
CVE-2012-2848 (chrome)
CVE-2012-2849 (chrome)
CVE-2012-2850 (chrome)
CVE-2012-2851 (chrome)
CVE-2012-2852 (chrome)
CVE-2012-2853 (chrome)
CVE-2012-2854 (chrome)
CVE-2012-2901
CVE-2012-2901 (joomla_content_editor)
CVE-2012-2902
CVE-2012-2902 (joomla_content_editor)
CVE-2012-2903
CVE-2012-2903 (php_address_book)
CVE-2012-2904
CVE-2012-2904 (jw_player)
CVE-2012-2905
CVE-2012-2905 (artiphp_cms)
CVE-2012-2906
CVE-2012-2906 (artiphp_cms)
CVE-2012-2907
CVE-2012-2907 (aberdeen)
CVE-2012-2908 (viscacha)
CVE-2012-2909 (viscacha)
CVE-2012-2910 (phpthumb())
CVE-2012-2911 (backupdb())
CVE-2012-2912 (leaguemanager)
CVE-2012-2913 (leaflet_maps_marker_plugin)
CVE-2012-2914 (captcha)
CVE-2012-2915 (pac-designer)
CVE-2012-2916 (simple_anti_bot_registration_engine_plugin)
CVE-2012-2917 (share_and_follow)
CVE-2012-2927 (tempo, tempo6.3.0, tempo6.3.2)
CVE-2012-2928 (jira, confluence, gliffy)
CVE-2012-2935 (online_merchant)
CVE-2012-2936 (pligg_cms)
CVE-2012-2937 (pligg_cms)
CVE-2012-2938 (travelon_express)
CVE-2012-2939 (travelon_express)
CVE-2012-2940 (real-draw_pro)
CVE-2012-2941 (yandex.server_2010)
CVE-2012-2944 (nut)
CVE-2012-2947
CVE-2012-2947 (certified_asterisk, open_source)
CVE-2012-2948
CVE-2012-2948 (certified_asterisk, open_source)
CVE-2012-2949
CVE-2012-2949 (score_m)
CVE-2012-2951
CVE-2012-2951 (plogger)
CVE-2012-2952
CVE-2012-2952 (jaow)
CVE-2012-2962
CVE-2012-2962 (sonicwall_scrutinizer, sonicwall_scrutinizer_with_flow_analytics_module)
CVE-2012-2970
CVE-2012-2970 (sy-780/a_time_&_attendance_terminal)
CVE-2012-2974 (smc8024l2_switch)
CVE-2012-3003 (wincc)
CVE-2012-3005 (foxboro_control_software, infusion_ce/fe/scada, intouch, intouch/wonderware_appli...)
CVE-2012-3006
CVE-2012-3006 (mguard_smart, mguard_industrial_rs, mguard_delta, mguard_pci, mguard_blade, eagle...)
CVE-2012-3007
CVE-2012-3007 (dasabcip, daserver_runtime_components, dassidirect, intouch/wonderware_applicatio...)
CVE-2012-3016 (simatic_s7-400_cpu_412-2_pn, simatic_s7-400_cpu_414-3_pn/dp, simatic_s7-400_cpu_4...)
CVE-2012-3017 (simatic_s7-400_cpu_414-3_pn/dp, simatic_s7-400_cpu_416-3_pn/dp, simatic_s7-400_cp...)
CVE-2012-3018 (genesis32, bizviz)
CVE-2012-3073 (telepresence_multipoint_switch, telepresence_multipoint_switch_software, telepres...)
CVE-2012-3074 (telepresence_system_1300_65, telepresence_system_3000, telepresence_system_3010, ...)
CVE-2012-3075 (telepresence_system_1300_65, telepresence_system_3000, telepresence_system_3010, ...)
CVE-2012-3076 (telepresence_recording_server)
CVE-2012-3174 (jdk, jre)
CVE-2012-3231 (web@all)
CVE-2012-3238
CVE-2012-3238 (security_gateway, security_gateway_software, unified_threat_management, unified_t...)
CVE-2012-3240
CVE-2012-3241
CVE-2012-3287 (md5crypt)
CVE-2012-3288
CVE-2012-3289
CVE-2012-3290
CVE-2012-3291
CVE-2012-3292
CVE-2012-3347 (autoform_pdm_archive)
CVE-2012-3356
CVE-2012-3357
CVE-2012-3358 (openjpeg)
CVE-2012-3360
CVE-2012-3361
CVE-2012-3362
CVE-2012-3368 (dtach)
CVE-2012-3372 (cyberoam_unified_threat_management)
CVE-2012-3374 (pidgin)
CVE-2012-3376
CVE-2012-3383
CVE-2012-3384
CVE-2012-3385
CVE-2012-3399
CVE-2012-3426 (essex, horizon, keystone)
CVE-2012-3442
CVE-2012-3443
CVE-2012-3444
CVE-2012-3533 (3.1.0.5, ovirt, ovirt-engine-cli)
CVE-2012-3553
CVE-2012-3555
CVE-2012-3556
CVE-2012-3557
CVE-2012-3558
CVE-2012-3559
CVE-2012-3560
CVE-2012-3561
CVE-2012-3562
CVE-2012-3563
CVE-2012-3564
CVE-2012-3565
CVE-2012-3577
CVE-2012-3578
CVE-2012-3585
CVE-2012-3587
CVE-2012-3588
CVE-2012-3589
CVE-2012-3590
CVE-2012-3591
CVE-2012-3592
CVE-2012-3593
CVE-2012-3594
CVE-2012-3595
CVE-2012-3596
CVE-2012-3597
CVE-2012-3792
CVE-2012-3793
CVE-2012-3794
CVE-2012-3795
CVE-2012-3796
CVE-2012-3797
CVE-2012-3802 (post_affiliate_pro)
CVE-2012-3805
CVE-2012-3811 (ip_office_customer_call_reporter)
CVE-2012-3812
CVE-2012-3814 (font_uploader)
CVE-2012-3815 (winlog_pro)
CVE-2012-3816 (winradius)
CVE-2012-3828 (joomla!)
CVE-2012-3847 (intouch, wonderware_application_server)
CVE-2012-3848 (sonicwall_scrutinizer, sonicwall_scrutinizer_with_flow_analytics_module)
CVE-2012-3859
CVE-2012-3863 (asterisk, asteriske, certified_asterisk, asterisk_business_edition)
CVE-2012-3881
CVE-2012-3951 (sonicwall_scrutinizer)
CVE-2012-3979 (android, firefox, firefox_esr, firefox_mobile)
CVE-2012-4008 (cybozu_live)
CVE-2012-4009 (cybozu_live)
CVE-2012-4024
CVE-2012-4025
CVE-2012-4028 (niagra_ax_framework)
CVE-2012-4033 (zingiri_web_shop)
CVE-2012-4045
CVE-2012-4520 (django)
CVE-2012-4598 (mcafee_virtual_technician, epo_mcafee_virtual_technician)
CVE-2012-4599 (smartfilter_administration)
CVE-2012-4730 (rt)
CVE-2012-4731 (rtfm)
CVE-2012-4732 (rt)
CVE-2012-4734 (rt)
CVE-2012-4824 (lotus_notes_traveler)
CVE-2012-4825 (lotus_notes_traveler)
CVE-2012-5173 (bigace)
CVE-2012-5220 (storage_data_protector)
CVE-2012-5307 (lotus_notes_traveler)
CVE-2012-5308 (lotus_notes_traveler)
CVE-2012-5309 (lotus_notes_traveler)
CVE-2012-5328 (mingle-forum)
CVE-2012-5329 (typsoft_ftp_server)
CVE-2012-5330 (asaancart)
CVE-2012-5331 (asaancart)
CVE-2012-5332 (reverse_proxy)
CVE-2012-5333 (pre_printing_press)
CVE-2012-5526 (cgi.pm)
CVE-2012-5668 (freetype)
CVE-2012-5669 (freetype)
CVE-2012-5756 (websphere_datapower_xc10_appliance)
CVE-2012-5758 (websphere_datapower_xc10_appliance)
CVE-2012-5759 (websphere_datapower_xc10_appliance)
CVE-2012-5861 (esolar_duo_photovoltaic_system_monitor, esolar_light_photovoltaic_system_monitor,...)
CVE-2012-5862 (esolar_duo_photovoltaic_system_monitor, esolar_light_photovoltaic_system_monitor,...)
CVE-2012-5863 (esolar_duo_photovoltaic_system_monitor, esolar_light_photovoltaic_system_monitor,...)
CVE-2013-0637 (flash_player, flash_player_for_android, adobe_air, adobe_air_sdk)
CVE-2013-0727 (global_mapper)
CVE-2013-0728 (erdas_apollo_ecwp)
CVE-2013-1178 (nexus_7000, nexus_7000_10-slot, nexus_7000_18-slot, nexus_7000_9-slot, nx-os, mds...)
CVE-2013-1182 (unified_computing_system_6120xp_fabric_interconnect, unified_computing_system_614...)
CVE-2013-1215 (5500_series_adaptive_security_appliance, adaptive_security_appliance_software, as...)
CVE-2013-2017 (linux_kernel)
CVE-2013-2306 (jigbrowser+)
CVE-2013-2338
CVE-2013-2696 (all-in-on-webmaster)
CVE-2013-2783
CVE-2013-3056 (joomla!)
CVE-2013-3057 (joomla!)
CVE-2013-3238 (phpmyadmin)
CVE-2013-3240 (phpmyadmin)
CVE-2013-3241 (phpmyadmin)
CVE-2013-3957
CVE-2013-3958
CVE-2013-3959
CVE-2015-7547: Critical Vulnerability in glibc getaddrinfo
CVE-2016-2208 Symantec Antivirus Engine Malformed PE Header Parser Memory Access Violation
CVS/Subversion remote holes - Reporting MS vulnerabilities 
CVSHOME.ORG back on-line 
CyanogenMod Drops ROM Manager In Favor of OTA Updates
CyanogenMod is working on privacy mode for apps
CyanogenMod logged lockscreen swipe gestures
Cyber attack stops access to JPMorgan Chase site
Cyber attacks against media on the rise, rights group says
Cyber Attacks Sound Scarier When You Call Them the New Cold War
Cyber blaggers autoplunder bulging accounts on Euro pay network
Cyber Criminals Tying Up Emergency Phone Lines Through TDoS Attacks, DHS Warns
Cyber disputes loom large as Obama meets China's Xi
Cyber extortion. Podcast-style. 
Cyber Security Awareness Month - Day 12 PCI DSS, (Fri, Oct 12th)
Cyber Security Awareness Month - Day 18 - Vendor Standards: The vSphere Hardening Guide, (Thu, Oct 18th)
Cyber Security Awareness Month - Day 7 - Rollup Review of CSAM Week 1, (Sun, Oct 7th)
Cyber Security Awareness Month - Day 8 ISO 27001, (Mon, Oct 8th)
Cyber Security Awareness Month: Protecting Your Network From "Dave"
Cyber Storm Exercise 
Cyber war trends: good, bad and scary
Cyber warfare in sights at government training conference
Cyber-attack on South Korea may not have come from China after all: regulator
Cyber-attack on South Korea may not have come from China after all-regulator
Cyber-Attacks Eclipse Terrorism in Impact, US Leaders Say
Cyberattacks Target Russian Broadcasters, Ustream CEO Responds
CyberAwareness Month - Day 15, Standards Body Soup (pt2), Same Soup Different Cook., (Tue, Oct 16th)
Cyber-Conflict Escalates in Midst of North Korean Tensions
Cybercrime now major drag on financial services, PwC finds
Cybercrims dump email for irresistible Twitter, Facebook spam
Cyberespionage For Everyone
CyberLink LabelPrint Multiple Insecure Library Loading Arbitrary Code Execution Vulnerabilities
CyberLink PowerProducer Multiple DLL Loading Arbitrary Code Execution Vulnerabilities
CyberLink StreamAuthor Insecure Library Loading Multiple Arbitrary Code Execution Vulnerabilities
Cyber-Looting update 
Cybersecurity Report Stresses Need for Cooperation
Cybersecurity report: All countries lag behind the bad guys
Cyber-security startup to flash major Android soft spots at RSA
Cyberspies send ZOMBIES to steal DRUGS from medical research firms
Cyberterrorism threat shouldn't be underestimated, some security experts say
Cyber-Terrorists Attacking U.S. Banks Are Well-Funded
Cyberwar! 5 key questions answered
Cyber-war: Just how dangerous are China's military hackers?
Cyclope Employee Surveillance Solution v6 SQL Injection
Dallas man linked to Anonymous hackers indicted
Dameware Traffic and mailbag 
Dancing MODEL Links: Part III(b)-- Sample Data Representation, Revised
Dancing MODEL Links: Part IV - eXploring the Solution Space
DARPA Seeks To Secure Data With Electronics That Dissolve On Command
DARPA Wants Huge Holy Grail of Mobile Ad Hoc Networks
DARPA: New Threats Demand New Technologies
Dart Is Not the Language You Think It Is
Data Analytics without SQL Experience
Data breach? Virtual bounty hunters will hunt it down
Data Center Decision Time: Stay Or Go?
Data Classification For the Masses
Data in possible credit card breach appears to be old
Data Visualization,What is your Tool of Choice
Data, Laws, Cyber-Weapons Biggest Threats to Information Security
Database of 12 Million Apple UDIDs Leaked
Dates and numbers
Dating site eHarmony confirms password breach
David Rice introduces his course SEC 616, Defensible .NET
David Willetts: UK firms need to 'fess up to security boobs
Daylight Saving Time 
DB2 10 and DB2 9 for z/OS Product Publication refreshes for April 2013
DB2 10 and DB2 9 for z/OS Product Publications refreshes for November 2012
DB2 10 HADR Multiple Standby's
DB2 10, DB2 9, and DB2 V8 Product Publications have been refreshed for April 2012
DB2 Editions and Features
DB2 for LUW Continues to Mature -- MONREPORT Reporting Module
DB2 LUW -- Hide SQL Body with GET ROUTINE and PUT ROUTINE
DB2 Resource Constraint Analysis -- Continued (3)
DDoS Attackers, Network Defense Firms Record Banner Year
DDoS crooks: Do you want us to blitz those phone lines too?
DDOS is down, but still a concern for ISPs
Deadly Device Hacks May Be Coming Soon
Dean Kamen Invents Stomach Pump For Dieters
Death Knell For Righthaven In 9th Circuit Decision
Debian development server compromised 
Decade Old KDE Bug Fixed
December 2015 Microsoft Patch Tuesday
December 2016 Patch Tuesday Brief and Updates
Declassified LBJ Tapes Accuse Richard Nixon of Treason
Decoding malware 
Decoding Pseudo-Darkleech (#1)
Decoding Pseudo-Darkleech (Part #2)
Deep Rants; CYA from botnets to phisherZ ; Malware Acquisition postponed 
Defacement Contest 
Default ‘Do Not Track’ Is Best Choice for Internet Explorer 10 Users
Default Password in Cisco MARS 
Defcon, vendor-hacker-shmoozing, and Storm Center Handlers in the Desert 
Defeating A/V by inserting forged data 
Defense Distributed Has 3D-Printed an Entire Gun
Defense chief calls cyberspace battlefront of the future
DefenseCode turns up Linksys zero-day
Defining Threat Intelligence Requirements
deja vu - "25 new unpackers added in one week" 
Deja Vu - Advances in Rootkit malware 
Deja Vu - PHP(BB) attack increase reports 
Deja Vu - Request for W32.Pasobir Malware Sample 
Deja Vu - Snow.A 
Deja Vu - worm attacks Windows and Windows Mobile powered devices 
Delays on Windows Update & the Death of SUS 
Delhi - [ Min 26.4 °C
Delhi - [ Min 26.6 °C
Delhi - [ Min 31.4 °C
Dell Buys Enstratius, Extends Cloud Reach
Derangement with an Exclamation Mark
De-registering vgx.dll in an enterprise 
Design Spec: Design Overview
Design Specification : Conversion Specifications
Design Specification : User Help Design
Design Spec–System Test Specifications
Despite new security in Galaxy S4, BlackBerry remains king
Detecting attacks against servers 
Detecting BlackWorm Without Signatures 
Detecting DNS Tunneling
Detecting file changes on Microsoft systems with FCIV
Detecting Random - Finding Algorithmically chosen DNS names (DGA)
Detecting XCodeGhost Activity
Detection and Deployment Guidance 
Determining Sun Java Vulnerability 
Developer wins appeal - code is not physical property
Development timeline key to linking Stuxnet, Flame malware
Device Sniffs Out Signs of Life After Disasters
Devs cook up 'leakproof' all-Tor untrackable platform
DHCP exploit publicly available (MS06-036) 
DHCP OS Fingerprinting 
DHS Can Seize Your Electronics Within 100 Mi.of US Border, Says DHS
DHS wants your comments. 
DHS warns of vulns in hospital medical equipment
DHS, FBI Warn of Denial of Service Attacks on Emergency Telephone Systems
DHS: America's water and power utilities under daily cyber-attack
Diary Update for Cisco Greeting and ARCserve Exploits and Scanner; Regular Diary: Kismet / Metasploit / New Buffer overflows ARCserve/ New Nigerian Scam / Google update / PwStealers project / Power Ou 
Diary Updates- Got WINS Packets - Brazil Welcomes You - Framed! - Mailbag 
Dick Parry: Culture change
Did Internet Sales Tax Backers Bribe Congress? (Video)
Did Sweden Pay Cambodia For the Pirate Bay Co-founder?
Did Syrian hackers take over The Onion's Twitter account?
Did you know there was a bunch of other stuff announced last week?
Did you know you can make DB2 LOAD run faster?
Did ZDI snub your 0-day attack? Packet Storm will buy it for $7k
Different strokes for different folks, spyware and browsers 
Different ways of looking at security bugs
Digg Hints Its Replacement For Google Reader Will Include Social Media Content
Digital Citizenship Toolkit - Brochures, Factsheets & Tip Cards
Digital Pen Vibrates To Indicate Bad Spelling, Grammar and Penmanship
Director General of BBC Resigns Over "Poor Journalism"
Disaster Recovery Lessons You Might Have Missed
Disaster Recovery Starts with a Plan
Discourse: Next-Generation Discussion/Web Forum Software
Discovery of Early Human Tools Hint at Earlier Start
Dish on national security PR offensive against SoftBank
Disney sitcom says open source is insecure
Distributed FTP Brute Force Scans - Is radmin back? 
Distributed FTP/Port 21 scan follow-up; Port 23 scan increases; 
DNA barcodes leap out of the lab
DNS abnormalitities 
DNS and DHCP Recon using Powershell
DNS cache poisoning again! 
DNS Cache Poisoning Again; InfoCon Alert Status Calibration; NIST HIPAA Guide 
DNS cache poisoning, again. 
DNS Changer goes away on July 9th, 2012
DNS Misbehaving 
DNS problems at Network Solutions; Potential Problems with MS05-019; Filtering SSL 
DNS problems? 
DNS Reconnaissance using nmap
DNS Snort Signatures; Acrobat Reader Vuln;TCP Port 1025 Traffic; Excellent DNS Article 
DNS vulnerability announced by NISCC today 
DNSChanger Shutdown, Despite Laggards, Is a Good Thing
Do Extortionists Get Paid?
Do I have requirements for a separate business process flow
Do Insecure Open Source Components Threaten Your Apps?
Do we Know our enemy? 
Do We Need a Longer School Year?
Do you find a Redbook useful?
Dockerized DShield SSH Honeypot
DoD Descends On DEFCAD
Does it Matter If You Cover Your Webcam?
Does Scientific Literacy Make People More Ethical?
DOJ asks FCC to delay Sprint-Softbank review
DOJ, MIT, JSTOR Seek Anonymity In Swartz Case
Dolphins Can Sleep One-half of Their Brain At a Time Say Researchers
Domain Hi-jacking Nightmare 
Domain registrar attacked, customer passwords reset
Domaincop malpsam
Dominion Announces Plans To Close Kewaunee Nuclear Power Station In 2013
DommJuice variant / AOL IM issue / ISC webcast / Microsoft Patches 
Donations for Katrina victims - be careful 
Don's Halloween Trick 
Don't Build a Database of Ruin
Don't buy that security software!
Don't launch that file Adobe Reader!
Doomjuice/MyDoom.C, Sharp Increase in port 445 and 139 scans 
DoS Exploit for MS05-053 released 
DoS exploit publicly released for Cisco Aironet AP 
DoS from 127.0.0.1; Server compromise at gnome.org; Netsky.P still spreading 
Dotcom says new site legal, no revenge for Megaupload saga
Doubleclick DDoS'd, W32.Zindos.A Microsoft DoS, FXMYDOOM Feedback 
Download.Ject Detection and Recovery -- New Phishing Attack Technique 
Draft Computer Fraud and Abuse Act Update Expands Powers and Penalties
Dremel-Based Project Accepted As Apache Incubator
Dridex malspam example from January 2016
Driver Trapped In Speeding Car At 125 Mph
Driver Update Addresses Radeon Frame Latency Issues
Drone security project to go open source
Drone Swarm Creates Star Trek Logo In London Sky
Dropbox gets a black eye in spam attack
Dropbox Phishing via Compromised Wordpress Site
Drupal Wishlist Module Cross Site Scripting Vulnerability
Drupal.org & group.drupal.org password disclosure, (Thu, May 30th)
Drupal.org User Accounts Compromised
Drupal's Creator Aims For World Domination
DSD's 'don't be stupid' mitigation strategies still work
Dshield down, Sun releases Solaris 10, Bots new?, Some links, Vuln in Skype 
DShield is Famous 
DSL Modem Flaw Lets Attackers Infect Millions of Computers in Brazil
DST Cisco Surprise 
Dual-Booting PengPod Tablet Can Run Linux/Android
Duke Nuken 3D</em> Code Review
DUNZIP32.dll Buffer Overflow 
Duqu malware resurfaces after five-month holiday
Dutch Architect Plans 3D Printed Building
Dutch Bill Seeks To Give Law Enforcement Hacking Powers
Dutch police arrest 17-year-old suspected of breaching hundreds of KPN servers
Dwindling Server Market?
Dyn.com DDoS Attack
Dynamic SQL Performance Tuning -- Continued (3)
e Equals One, Not MC-Squared
e H Roundup - Java vulnerability, Fedora 18 and Red October
EA Is the Game Company Disney Was Looking For
EA Makes Minor Tweaks To FIFA 12 For the Wii, Releases It As FIFA 13
Early Discussions of Computer Security in the Media 
Early vote count in Iran gives Rowhani wide lead
Easter Eggs FUN to find in your yard, BAD to find in your software. 
Eavesdropping on Bluetooth Headsets
eBay CISO receiving security industry lifetime achievement award
ebay.co.uk 
eBay/Paypal Phishing; Shame on that prophet; iframeDOLLARS; Cyber Extortion; OSX hardening; Incident Responder Analysis Tools 
EC Software Help & Manual 'ijl15.dll' DLL Loading Arbitrary Code Execution Vulnerability
Educational Linux Distro Provides Tech-Bundle For Kids and Educators
Edward Tufte's Defense of Aaron Swartz and the "Marvelously Different"
EE.UU. culpa a Irán de ciberataques
eEye Releases Free Scanner for MS06-040 
eEye Upcoming Advisory - both uses and abuses Symantec security applications 
EFF Jumps In To Defend Bloggers Being Sued By Prenda
EFF Resumes Accepting Bitcoin Donations After Two Year Hiatus
EFF Sues to Block New Internet Sex-Offender Law
Effective File Search (EFS) DLL Loading Arbitrary Code Execution Vulnerability
EFI rootkit for Macs demonstrated
E-Gold Scams 
Egyptian Forces Capture 3 Divers Trying To Cut Undersea Internet Cable
Eight People Charged in International Cybercrime Scheme (June 12 & 13, 2013)
Einstein Letter Critical of Religion To Be Auctioned On EBay
Election poll shot down by DDoS-ers
Election Security Risks, Potential Voting Failures Loom
Eliminating 911 Misdials in Your MLTS/PBX
Elon Musk Lays Out His Evidence That NYT Tesla Test Drive Was Staged
Elon Musk Will Usher In the Era of Electric Cars
Email attachment vector for IE createTextRange() Remote Command Execution 
Email From Beyond - Tell us your own Halloween stories 
Email from Guy Rosen at Blue Security 
Email hacks router
Email Ploy;Cisco Password Leak Source;Cisco CCO Password Reset Reply-To Spoof Concern;Patch Tuesday Preview;Windows 2000 SP4 Rollup 1 Re-Release 
Emails Sent To The Handlers 
E-mails with malicious links targeting Australia 
Embedded systems vendors careless says Metasploit author
Embedded systems vendors careless says Metasploit author HD Moore
Embotics Tackles Virtual Machine Management With V-Commander
EMC IRM License Server DoS Server 4.6.1.1995
EMC Navigates the IT Transformation Waters
EMC vuln gives mere sysadmins the power of storage admins
EMCworld 2013: VIPR, ONTAP, and the hidden burden of software-defined storage
EMET 5.5 Released
Empty emails? 
Emscripten Compiler Gets Optimizations, Now Self-Hosting
Encryption of "data at rest" in servers
End of passwords' predictions are premature - Cambridge boffin
Energy assets in front line of cyber war
Energy Production Is As 'Dirty' As Ever
e-netprotections.su ?, (Fri, May 17th)
Enforcing USB Storage Policy with PowerShell
English May Have Retained Words From an Ice Age Language
Enhancing pentesting recon with nmap
ENISA recommends "assume all PCs are infected"
Ensuring that mobile applications are truly secure, part 2
Enter the Trial in Steubenville, Where the Cast Is Not Merely Football Players
Enterprise Architecture state and causes (v)
Enterprise Architecture state and causes in ten points
Enterprise Architecture state and causes, (ii)
Enterprise Architecture supports business methods application rather than replaces them
Entertaining Bug in Microsoft Word 
Entire Cities In World of Warcraft Dead, Hack Suspected
Entries Open For First Ever 24-Hour Raspberry Pi Hackathon
EP.net DNS Survey 
EPA Makes a Rad Decision
EPA Report That Lowers Methane-Leak Estimates Further Divides Fracking Camps
EPA: No Single Cause For Colony Collapse Disorder
Epic and Mozilla Bring HTML5 OpenGL Demo To the Browser
Eric Cowperthwaite: Connect the dots
Erlang Getting Too-Big-To-Fail Process Flag
Ernesto domain name registrations up 
ERP on the move
ERP Orchestration
ERP Selection and Implementation: It's All in the Timing
ERP Systems: Where E = Education
Errata, Mea Culpa, "latest" "Date released" and "Date Published" 
Escaping the P2P-induced alert onslaught 
Espionage - How Things Have Changed
E-Sports League Stuffed Bitcoin Mining Code Inside Client Software
Essays Related to NSA Spying Documents
Ethereal Advisory 
Ethereal becomes Wireshark 
Ethereal Security Issue 
Ethereal Vulnerabilities / NetSky.P 
Ethereal Vulnerability 
Ethics / SSH brute forcing continues 
Etsy Is Trying to Pop Silicon Valley's Meritocracy Bubble
Etymology; Homographic Attacks; and other BIG words 
EU Antitrust Chief: Google "Diverting Traffic" & Will Be Forced To Change
EU Authorities To Demand Reversal of Google Privacy Policy
EU Calls for Unified Approach to Allocating "White Space" Spectrum
EU Court Asked To Rule On Private Copying
EU Data Protection Proposal Taken Word For Word From US Lobbyists
EU duties on Chinese solar panels losing member: state support
EU Passes Resolution Against ITU Asserting Control Over Internet
EU Privacy Watchdog To ICANN: Law Enforcement WHOIS Demands "Unlawful"
EU regulators side with Microsoft in IE10's 'Do Not Track controversy
EU says ready to launch trade dispute over China telecoms
EU Set To Charge Microsoft Over Ruling Breach
EU To Ban Neonicotinoid Insecticides
European Commission Launches $12 Billion Chip Support Campaign
European hackers suspected in Utah Medicaid files breach
European Parliament Decides Not To Ban Internet Porn
Even Windows 8 Users Prefer Windows 7
Everyday is April Fools Day in your Mailbox 
Everything old is new again - Blackhole exploit kit since November 2015
Evidence for Unconscious Math, Language Processing Abilities
evilcode.class, (Sun, Mar 25th)
Evildoers can now turn all sites on a Linux server into silent hell-pits
Evolutions in the honeypot/honeynet arena 
Example of Getting Analysts & Researchers Away
Excel Issue Scorecard 
Excel new vuln FAQ 
Ex-CIA Director Sees New Phase Of Warfare Where Cyberweapons Create Physical Destruction (March 4, 2012)
EXCLUSIVE - Microsoft, Symantec disrupt cyber ring, halt searches
Exclusive: Huawei CFO linked to firm that offered HP gear to Iran
Exclusive: Japan's Sharp cuts iPad screen output
Exclusive: Microsoft, FBI take aim at global cyber crime ring
Ex-Employee Busted For Tampering With ERP System
eXchange POP3 
Ex-Marine Detained For Facebook Posts Deemed "Terrorist in Nature"
Experiment Will Determine Dinosaur's Skin Color
Experts finger disk-wiping badness used in S Korea megahack
Experts: Iran and North Korea are looming cyberthreats to U.S.
Experts: Network security deteriorating, privacy a lost cause
Exploit #2 released for for Windows Services Insecure ACLs Local Privilege Escalation 
Exploit Attempts for Drupal RESTWS .x Module Vulnerability
Exploit Available For Cisco IKEv1 and IKEv2 Buffer Overflow Vulnerability
Exploit available for MS05-011, Rumored spikes in 445 scanning 
Exploit circulating for newly patched Oracle bug 
Exploit Code for MS05-047 
Exploit code reported for CVS Vulnerability 
Exploit for Cisco Vulnerabilities Released 
Exploit for Snort BO available! 
Exploit Kits are a mess, (Sun, May 13th)
Exploit o' the day: DROWN
Exploit: NCMedia Sound Editor Pro v7.5.1 SEH&DEP
Exploiting (pretty) blind SQL injections
Exploits Available For MS04-11 Vulns – **PATCH NOW** 
Exploits for most recent Microsoft Patches 
Exploits for new microsoft vulnerabilities. 
Exploits in the wild for several PHP-based web apps 
Explosive Detecting Devices Face Off With Bomb Dogs
Exposing the Machinery of the Resistome
Exposure to Backlit Displays Reduces Melatonin Production
Extending the range
Extracting Malware Transmitted Via Telnet
Extracting pcap from memory 
Extracting Shellcode From JavaScript
EyeRing Could Help Blind People See Objects
Facebook acquires Face.com
Facebook Adds Privacy, Security Controls for Page Administrators
Facebook and physicians: Not good medicine
Facebook attacked with credential-harvesting malware
Facebook Banter More Memorable Than Lines From Recent Books
Facebook Begins Eliminating Fake Likes, Page Fan Counts Drop
Facebook Enables HTTPS By Default for North America
Facebook Faces High-Level Staff Exodus
Facebook gets freakier with Take This Lollypop
Facebook hacker comes clean on 'what really happened'
Facebook joins Google in warning DNSChanger victims
Facebook Joins Linaro Linux-on-ARM Effort
Facebook 'Likes' Used to Predict Personality Traits, Social Preferences
Facebook offers just a week of free Android AV
Facebook proposes more changes to privacy policy
Facebook Pushes Back Against Employers Wanting Passwords
Facebook scammers host Trojan horse extensions on the Chrome Web Store
Facebook SDK hole leaves accounts vulnerable
Facebook Sued By Rembrandt IP For Two Patent Violation
Facebook Switching To HTTPS By Default
Facebook Tests 'Want' Button To Hoard User Data, Save Its Stock Price
Facebook warns employers not to ask job applicants for log-in credentials
Facebook's Hackathons Get a Rethink
Factbox: Key companies in the phablet space
Failure Is An Option
Fake Adobe Flash Update OS X Malware
Fake Android antivirus app likely linked to Zeus banking Trojan, researchers say
Fake fingers fool Brazilian biometrics
Fake Chrome update for Android
Falling Windows RT Tablet Prices Signify Slow Adoption
False positive on sfc.dll 
Famed Hacker Guilty of 'Stealing' iPad User Data
Family News Network of the ICRC - Hurricane Katrina 
Fans Bring Back Half Life Game Series: Black Mesa Mod Launches 9/14
Fantastic js1k Submissions
FAQ on PowerPoint 0-day 
FAQ: Flame, the "super spy"
Farewell 6Bone 
FAST MOVING EMAIL VIRUS, More IE scripting concerns 
Fast-Food Logos Burned Into Pleasure Center of Children's Brains
FBI Agent's Laptop 'Hacked' To Grab 12 Million Apple IDs - UPDATED
FBI could be shutting down 13800 UK internet connections
FBI denies hackers' claims on Apple data
FBI denies leak of Apple codes
FBI frets about dumb security in smart meters
FBI Launches $1 Billion Nationwide Face Recognition System
FBI Looking Into HP's Charges Against Autonomy [REPORT]
FBI says Apple ID heist claim is TOTALLY FALSE
FBI: Cyberattacks could shove aside terrorism as No. 1 threat to US
FBI: Cyberattacks grow as national security menace
FCC asks for comments on mobile network shutdowns for public safety
FCC Moves To Boost Wireless Speeds
FCC posts Enquiry Documents on Google Wardriving , (Mon, Apr 30th)
FCC Seeking Public Comment on Cell Phone Blocking (March 3, 2012)
FCC To Review the Relative Value of Low, High, and Super-high Spectrum Licenses
FCC To Update 1996 Cell Phone Radiation Standard
FDA urges protection of medical devices from cyber threats
Fear and Imagination
February 2013 (RSU1301) service package has been tested and is now available
Fed says internal site breached by hackers, no critical functions affected
Fed says still determining extent of hacker breach, FBI probing
Fed still gauging extent of hacker breach, FBI on case
Federal Agencies and Fortune 500 Companies Eradicating DNSChanger (March 1, 2012)
Federal IT pros look at BYOD security, management concerns
Federal Reserve, DOE Confirm Hackers Breached Servers, Stole Data
Fedora 18 Installer: Counterintuitive and Confusing?
Fedora Core 4 goes into maintenance mode, FC1 and FC2 end-of-life 
Feds Drop CFAA Charges Against 'Hacker' Who Exploited Poker Machines
Feds issue final 'Do Not Track' privacy recommendations
Feds say Megaupload user content could be deleted this week
Feds Warn of Cyber Threats, Seek Expanded Authority for DHS
Feedback On Simcity Gets User Banned From EA Forums
Feeding DShield with OSSEC Logs
Feeling a little tracked and monitored online
Fewer than half of Facebook and Google users understood the sites' privacy policies
FF/TB Updates 
FFmpeg 0.10 "Freedom" released - Update
Field Day Exercise 
Fifth Debian 6.0 "Squeeze" update released
Fighting TSA Harassment of Disabled Travelers
File-Sharing For Personal Use Declared Legal In Portugal
Fill out your email! 
Final weeks of support arrive for service-pack-free Windows 7
Finally, why supercomputing?
Financial services under more frequent DDOS attacks
FinCen quicknews hacked 
Finding abuse contacts for a domain 
Fingerprint reader reveals passwords
Fingerprinting Phishers 
Finland a haven for vulnerable SCADA systems
Finland Hosts Mobile Phone Throwing Championships
Fireflies Bring Us Brighter LEDs
Firefox "new tab" feature tweaked following privacy concerns
Firefox ... 
Firefox 1.0.1 fixes vulns; RootkitRevealer output; more on port 41523 
Firefox 1.0.3 Alternate Workaround; OhMyGodGoogleIsGone!, Update: IPSec vuln announced 
Firefox 1.0.4; DNSSEC Tools; Phisher's benefit use Google link; Viewing Chat Logs; Web Browser Forensics; Gecko Based Browers HTTP Authentication Prompt Vulnerability 
Firefox 1.5 beta 1 released 
Firefox 1.5 Released 
Firefox 1.5.0.3 Vulnerability Update 
Firefox 1.5.0.6 release imminent 
Firefox 12 released - can now update itself
Firefox 20 and Thunderbird 17.0.5 updates , (Wed, Apr 3rd)
Firefox 3.6.x approaches end of life
Firefox and Thunderbird 1.5.0.4 released 
Firefox and Thunderbird Updates, (Wed, Jan 9th)
FireFox DoS exploit public 
Firefox fix 1.5.0.3 / MySQL Patches 
Firefox Is the First Browser To Pass the MathML Acid2 Test
Firefox patches; MS DoSed my Grandma; MS05-019 Exploit published 
Firefox to spit out third-party cookies
Firefox update time 
Firefox v 17.0 just released, more here: http://www.mozilla.org/en-US/firefox/17.0/releasenotes/, (Tue, Nov 20th)
Firefox v1.0.7 Released 
Firefox Vulnerability 
Firesheep's Scarier, More Muscular Half-Brother Cookie Cadger Released! Sort of.
First California lawsuit over mobile privacy issues crashes
First Evidence That Some Insects May Rely On Photosynthesis
First Exploit Attempts For Juniper Backdoor Against Honeypot
First Hurricane Matthew related Phish
First Impressions Inside the Project Holodeck VR Game World
First Known 'Social Chromosome' Found
First Mammals Observed Regenerating Tissue
First Mummies May Have Been Inspired by Field of Corpses
First Shift ! 
First Vulnerability for Firefox 1.5 (released version) Announced - PoC available 
Five Years of Storming 
Fizzer Virus / Backdoor 
FLAC Gets First Update In 6 Years
'Flame' cyber-weapon went undiscovered for at least four years
Flame Malware: All You Need to Know
Flame spy virus gets order to vanish: experts
Flame worm's makers fail to collect Epic 0wnage award
Flamer Malware Spied on Middle East for More Than Five Years
Flamer Malware Spied on Middle East for More Than Five Years - Security - News & Reviews - eWeek.com
Flame's Windows Update hack required world-class cryptanalysis, researchers say
Flash Player 11.2 fixes critical vulnerabilities, adds silent updates
Flash Player update but no announcement, check your version http://www.adobe.com/software/flash/about/, (Thu, Sep 20th)
'Flashback' Mac Malware: One More Reason to Switch to Linux
Flashback Mac Trojan earned $14,000 from ad clicks, Symantec
Flashback numbers not going down - still over half a million
Flashback trojan exploits unpatched Java vulnerability
Flashback Trojan still on 650,000 Macs, security company discovers
Flavours of Pi
Flaw with GPG Signature Verification 
Flaws in Checkpoint and RealOne; MyDoom Update; AntiVirus Software; Data Call 
Follow the Bouncing EMule 
Follow the Bouncing Malware IX: eGOLDFINGER 
Followup on challenge "Spam, Recon or ??" 
Fondly reminiscing the past 
Footy lovers hit in Wembley playoff card snatch scam
For Android Users, 2012 Is Still the Year of Gingerbread
For Business Analysts and Project Managers: Creating Proper Business Requirements for Integration Projects
For Your Inspection: Source Code For Photoshop 1.0
Ford and GM Open Car Software To Outside Developers
Foreign hacks in China hit with malicious emails
Forensic Analysis on iOS Devices
Forensicating Docker, Part 1
Forgery FBI email / Virus W32.Bugbros / New PoC for Linux Vulnerability 
Forget about Top Chef, Chopped, American idol… Here comes….. Be the Next Microsoft Employee
Forget phones, PRISM plan shows internet firms give NSA <i>everything</i>
Forget the word “cyberwar” says Marcus Ranum
Form Spam: Increasing the Attacker's work function. 
Former FBI Agent: All Digital Communications Stored By US Gov't
Former GOP Staffer Derek Khanna Speaks On Intellectual Property
Former Hacker: Today's Hacks Are All About the Money
Former Tribune staffer denies giving hackers log-in credentials
Forms Authentication: Remember Me? Its Hard Not Too!
Fortinet Debuts Secure Wireless LAN Platform
Fortinet Targets MSSPs, Enterprises With New Security Blade
Four Anons cuffed in Italy
Four how-to's on finding stuff in your inbox
Four Ways ShoreTel Dock Helps Drive UC
Fox News Parent NewsCorp May Face Corruption Investigation
Foxconn Denies Plans For New US Operations
Foxconn International shares drop 4 percent after profit warning
Foxconn International surges 35 percent as Citi report lifts iPhone hopes
Foxconn Int'l says unaware of any reason for stock jump
Foxconn Sees New Source of Cheap Labor: The United States
Foxconn shares surge on brokerage report on iPhone orders
Foxconn Thinks the iPhone 5 Is a Pain
Foxconn Workers On Strike Over iPhone 5 Production
Foxit Reader 'dwmapi.dll' DLL Loading Arbitrary Code Execution Vulnerability
Fox's Attempt To Block Ad-skipping TV Recorder Autohop Fails
F-Prot Anti-Virus Scanning Engine Bypass 
Fragmentation Comes To iOS
Fragmentation Leads To Android Insecurities
fragmented packet challenge 
Fraud: Evil People Doing Evil Things 
Fraudsters nick BILLIONS from China's e-commerce Wild West
Fraudsters tempt Olympic fans with bogus streaming websites
Fred Flintstone, we'd like to help... 
Free Font Helps People With Dyslexia
Free Software Quick Security Checklist
Free time? 
Free tool to encrypt DNS requests released for Windows
Free Tools to Wipe Your Drives Securely
FreeBSD packet filter (pf) DoS using fragments. 
FreeBSD Project Servers Compromised - http://www.freebsd.org/news/2012-compromise.html, (Sun, Nov 18th)
FreePBX Multiple Cross Site Scripting and Remote Command Execution Vulnerabilities
French Company Building a Mobile Internet Just For Things
freq.py super powers?
Fresh Apple Patches 
Fresh batch of Microsoft patches next week , (Fri, Nov 9th)
Fresh food fans debunk anti–organic food report, get hacked
Friday Squid Blogging: Another Squid Comic
Friday Squid Blogging: Controlling Squid Chromatophores with Music
Friday Squid Blogging: Eating Giant Squid
Friday Squid Blogging: Efforts to Film a Live Giant Squid
Friday Squid Blogging: Giant Squid Engraving from the 1870s
Friday Squid Blogging: Sperm Consumption in the Southern Bottletail Squid
Friday Squid Blogging: Squid Escape Artist
Friday Squid Blogging: Squid Ink as a Condiment
Friday Squid Blogging: Squid Insurance
Friday Squid Blogging: Squid Recipe
Friday Squid Blogging: Squid Sacrifices Arms to Avoid Predators
Friday Squid Blogging: Squirming Tentacle USB Drive
Friday Squid Blogging: The Search for the Colossal Squid
From a NAND Gate To Tetris
From Data on the Web to Data Analysis - Python Quickstart
From extreme to in depth 
From 'Quantified Self' To 'Quantified Car'
From the mailbag - 
Front Page Hack Update, Veritas Advisories 
FrSIRT exploits for MS05-044, MS05-045, and MS05-048 
F-Secure Security Bulletin 
F-Secure Vulnerability; More on Symantec UPX and Microsoft patch set 
F-Secure Vulnerability; Symantec Patch/Update; Microsoft patch set; IDS Vendor Review 
F-Secure web console buffer overflow 
FSF Certifies Atheros-Based ThinkPenguin 802.11 N USB Adapter
FSF Opens Nominations For Free Software Awards 2012
FTC chairman: Do-not-track law may not be needed
FTC issues guidelines on facial recognition technology
FTC Releases Google Privacy Audit, Blacks Out the Details
FTC settles spying charges on rent-to-own computers
FTC sues Wyndham Worldwide over data breaches
FTC: ID theft again tops consumer concerns
FTP Scans - Universities only? : BHODemon followup 
FTP Vulnerability & Accompanying Activity 
FTP-Brute Force Attacks and Password Management 
FUD flies as Raytheon reveals social media analysis tool
Fujitsu trials anti-phone fraudster tech
Fukushima's Fallout of Fear
Full Packet Capture for Dummies
Fun - data integrity / PHP up to date ? / WINS 
Fun With Windows Netstat 
Further Review of Port 2525 Activity; K-OTik.com reveals new English version of Website 
Fusion-io Buys Hybrid Startup NexGen
Future Enterprise- The Future of Big Data
Gadgets add complexity to brutal bank layoffs
GAIM buffer overflow, Aitel paper and more XP SP2 
Galaxy S 4 Dominates In Early Benchmark Testing
Game Closure "DevKit" For Mobile HTML5 Games Is Open Source
Gamification Goes To College
Gaming app ENSLAVES punter PCs in Bitcoin mining ring
GAO Finds US Military's Critical Technologies List Outdated, Useless
GAO Report on DHS; ezSTUB; Worm.Gibe.F; BlueTooth Security? ClamAv MACosX 
Gartner Buzzword Tracker Says "Cloud Computing" Still on Hype Wave
Gartner predicts huge rise in monitoring of employees' social media use
Gauss Espionage Malware Stealing Banking Data in Middle East
Gauss Malware Detected Through Unique Palida Narrow Font
GD DoS 
GDI Attacks via Email; Natural Disasters and Data Recovery / Data Security 
GDI Scanner Released 
GDI Vulnerabilities : An open letter to Microsoft 
GDI+ exploit mutation lessons and How to (not) report an attack to a large organization 
Geeks On a Plane Proposed To Solve Global Tech Skills Crisis
Gene Therapy May Protect Against Flu
Genesco Sues Visa Over PCI Noncompliance Fines
Genetically Modified Plants To Produce Natural Lighting
Genuine TCP Port 0 activity; Osama was not caught, but some Windows users were; New RBOT variants using SQL & IIS 
Georgia Tech and Udacity Partner for Online M.S. in Computer Science
Georgian police chiefs cuffed in cyber spy plot
German Court Rejects Apple's Privacy Policy
German Court: ISPs Must Hand Over File Sharer Info
German Federal Court Rules That Internet Connection Is Crucial To Everyday Life
German Government: Stay Away From Internet Explorer
German Police Stop Man With Mobile Office In Car
German Researchers Hit 40 Gbps On Wireless Link
German Spam (concise version); MS05-021 and Snort Signatures; Is it a security problem? 
German spam source found, Real services vulnerability 
German Spam...Maybe?; Academia Security Awareness 
Get a 40% discount on your hotel room!, (Thu, Nov 8th)
Get up to speed with modern data bases/data stores quickly (SQL and NoSQL)
Get your fresh Firefox updates 
Get Zapped While Playing Video Games
Getting Better Transparency From Oil Refineries
Getting out in front of BYOD
Getting Ready for Badlock
Getting Ready for macOS Sierra: Upgrade Securely
Getting Ready for the Holidays 
Getting spamfiltered? 
Getting viruses out of the AVG virus vault 
GFI Scoops up MDM Technology From VizualMobile - Mobile and Wireless - News & Reviews - eWeek.com
Ghost of Christmas Botnets? 
Ghoulies and Ghosties 
GCHQ attempts to downplay amazing plaintext password blunder
Gift card from Marriott?
Giving Your Computer Interface the Finger
Glasses That Hack Around Colorblindness
Glenn Beck Reports CIA Plot Between Embassy Killing and Something Awful
Global action takes down tech support scam
Global Arrests And Charges Against Members of Lulzsec Hacking Group (March 6, 2012)
Global DNS cache poisoning attack?; Update... 
Global telecoms giant ZTE sees gold in Chinese roots
Global Warming Felt By Space Junk and Satellites
Global Warming Has Made the North Greener
globalSCAPE CuteZIP Stack Buffer Overflow
Gmail javascript vulnerability (fixed) 
Gmail SSL Cert Expiration 
GNOME 3.8 To Scrap Fallback Mode
GnuPG (GPG) 2.1.9 release announced
GnuPG 1.4.5 released - remote execution possible 
GnuPG new versions-upgrade now 
Godzilla wreaks revenge on Pakistani government web sites
Going Up?
Gold Artifact To Orbit Earth In Hope of Alien Retrieval
Good Cop; Bad Cop; Domain Cop?
Goodyear's 'On TheGo' Self Inflating Tire
Google $22.5 Settlement With FTC Over Privacy Criticized by Industry Group
Google Apps for Business receives ISO 27001 certification
Google Backs Down On Maps Redirect
Google Bad and Google Good
Google Betting Its Google+ Systems Know What's Best For You
Google Blocks Author's Ads For Offering Torrent Of His Own Book
Google Blogger: Vietnamese HS Students Excelling At CS
Google Bolsters Email Security Defenses Against Hackers, Spammers
Google Desktop Has New Features 
Google Developer Competition Aims at Chrome OS Security
Google Develops Context-Aware Voice Search For TV
Google Doubts Apple Will Approve Its New Maps Application
Google Fiber Draws Startups To Kansas City
Google Fiber turned Kansas City into a magnet for tech startups
Google Fined $22.5M Over Safari Privacy Violation
Google Formally Puts Palestine On Virtual Map
Google Gets Into Politics With Civic Info API
Google Gives 15,000 Raspberry Pis To UK Schools
Google Go language gets used: For file-scrambling trojan, though
Google Grants for summer of code 
Google Hiccup, CGI Email Script Scanning, New NIST Doc, SANSFIRE 
Google hit by building automation security FAIL
Google Chrome 25 Will Serve Searches Over SSL From the Omnibox For All Users
Google Chrome 27 Is Out: 5% Faster Page Loads
Google Chrome can pin web links to the taskbar
Google Chrome Introduces Do Not Track
Google increases vulnerability bounties to $20,000
Google Invests $1 Billion To Build New London HQ
Google launches privacy plan amid protests
Google offers exploit bounties for Pwn2Own and Pwnium
Google Offers Help, Advice for Hacked Website Owners
Google Ordered Back To UK Parliament To "Explain Itself" Following Investigation
Google patches 9 Chrome bugs, pays more to top researchers
Google patches Chrome for second time in eight days
Google Patches Chrome, Changes Mixed Content Warnings 
Google pays $40K to 'Pinkie Pie' for partial hack of Chrome OS
Google plonks reCAPTCHA on Street View, makes users ID your house
Google ploughs ahead with privacy changes, as EU concerns remain
Google Privacy Director Alma Whitten Leaving
Google Privacy Policies Assailed by EU: Report
Google Pulls Access To Unsupported But Popular Weather API
Google puts $1M on the line for Chrome exploit rewards
Google raises ante for next Chrome hacking contest to $2M
Google Reader Being Retired
Google readying on-device malware scanner for Android
Google Reconnaissance, Sprinter-style
Google Redesigns Image Search, Raises Copyright and Hosting Concerns
Google Releases Glass Factory System Image, Rooted Bootloader
Google Reports Government Surveillance Requests Continue to Rise
Google Search Appliance Vulnerability 
Google Security Engineer Issues Sophos Warning
Google Snaps Up Security Firm VirusTotal
Google Strangeness: Is It New?; Filthy Minkey; New phpBB; FTBM VII: Afterglow 
Google Takes Street View To the Galapagos Islands
Google Talks About the Dangers of User Content
Google Tests White Space Spectrum For School Broadband In South Africa
Google to double encryption key lengths for SSL certs by year's end
Google to face fresh ICO scrutiny over WiFi snooping
Google Unveils New Search Features, Including iOS Voice Search
Google Updates Chrome (March 5, 2012)
Google ups bug bounty to $20,000 per flaw
Google ups the ante in cloud storage–15GB
Google warns 20,000 websites they could be infected with malware
Google Web Accelerator continued; phpBB 2.0.15 released; Backdoors more popular than Viruses?; Anti-Spyware poll results; Google.com DNS glitch; SQL server 2000 SP4 
Google Web Accelerator; Snort with ClamAV; RSA SecurID WebAgent Overflow 
Google Wins FTC Award for Robocall Prevention Technology
Google, Facebook May See Tougher Data Use Rules in Europe
Google, Microsoft butt heads over IE privacy skirting
Google, Oracle Deny Direct Payments To Media
Google: BadNews Malware Wasn't Really Bad, After All
Google's new privacy policy breaches European law, say data regulators
Google's Nexus Q Successor Hits the FCC
Google's Pwnium ends with no winners
Google's reCAPTCHA briefly cracked
Google's Self-Driving Cars: 300,000 Miles Logged, Not a Single Accident
Google's trap for Chrome exploit writers leads to crashes for users
GOP Brief Attacks Current Copyright Law
GOP Senators revise cybersecurity bill
Got packets? Interested in TCP/8909, TCP/6666, TCP/9415, TCP/27977 and UDP/7, (Mon, May 14th)
Government admits seizing two months of AP phone records
Government Agencies, Utilities Among Targets in ‘VOHO’ Cyber-Spy Attack
Government, business, military are internet security threats
Governments should invest more in catching cybercriminals, researchers say
GPL Nessus Forks (1 Comments)
Grampa's backup 
GRCC Student placed 3rd in a CTF contest at GrrCON 2012
Great Firewall architects fingered for GitHub attack
Greatfire Keeps Tabs On Chinese Censorship, Automatically
Green Party Releases International Joint Statement Criticizing the TPP
Greetings awareness - Awareness greetings ? 
Grisoft AVG False Positive 
Group Behind 'Aurora' Attack on Google Still Active
Group files FTC complaint against Google for privacy changes
Group questions Google government contract claims
GTK+ 3.8 Released With Support For Wayland
Guest Diary: Linux Capabilities - A friend and foe
Guest Diary: Xavier Mertens - Integrating VirusTotal within ELK
Guide to Finding Safe Online Merchants 
Guided Tour of the Clearwater HIPAA Privacy and Breach Notification Assessment Software
Gunman takes potshots at Dell HQ, chopper search ensues
H&R Block Software Glitch To Delay 600,000 U.S. Tax Refunds
h00d IRC bot, localhost port 80 traffic 
Hack Bill Challenge Winners Announced 
Hack on Saudi Aramco hit 30,000 workstations, oil firm admits
Hacked BitCoin Exchange Sued By Customers
Hacker Activity 
Hacker Bypasses Windows 7/8 Address Space Layout Randomization
Hacker Grabs 150k Adobe User Accounts Via SQL Injection
Hacker jailed for stealing identities of 8 million UK citizens
Hacker leaks source code of old VMware software
Hacker vs. Counter-Hacker — a Legal Debate
Hacker warns of zombies on 2 Mich. TV broadcasts
Hackers breached security firm Bit9, then attacked its customers
Hackers claim 12 million Apple IDs from FBI *new!
Hackers claim 12-M Apple IDs
Hackers claim to have "confidential" IAEA information
Hackers claim to have Mitt Romney's tax records
Hackers deface Indonesian president’s website
Hackers Dump Millions of Records From Banks, Politicians
Hackers get into Utah health department records
Hackers hit Major League Baseball teams' Facebook sites
Hackers chop down UN eco-agency, release rare data into wild
Hackers infect WordPress 3.2.1 blogs to distribute TDSS rootkit
Hackers now pick tools from script kiddies' toybox –Âreport
Hackers Stole Michael Jackson's Entire Catalog From Sony (March 5, 2012)
Hackers target Israel government websites
Hackers topple Huawei routers
Hackers Turned Defense Contractor QinetiQ Into Intelligence Playground
Hacking breach made us stronger says RSA
Hacking by the Syrian Government
Hacking the Emergency Alert System Is Funny Until It's Not
Hacking Tor, the anonymity onion routing network 
Hacking Wireless Drivers for Fun and Profit 
Hactivism: A Growing Concern for Network Security
Haiku OS Ported To Intel 64-Bit Architecture
Half of Ex-Employees Walk Off with Corporate Data: Symantec Survey Findings
Hallo Steffi! German spyware developers try their hand at humour
Hancitor Maldoc Bypasses Application Whitelisting
Hancitor Maldoc Videos
Hancitor/Pony/Vawtrak malspam
Handheld Black Hornet Nano Drones Issued To UK Soldiers
Handler Candy 
Handlers - Down and Out in the Magic Kingdom 
Handlers in Orlando 
Handlers in Vegas - Slow Diary Day 
Handlers On Duty 
Handling Malware Samples
Handling phishing attack (2 Comments)
Hands On With Virtual Reality's Greatest Hope
Handset makers scurry to join Year of the Phablet
Hands-On With Intel's "Next Unit of Computing" Mini PC
Happy birthday, disk drive 
Happy Father's Day 
Happy Independence Day; Impending Storm; Spam Challenge Protocol Pros and Cons 
Happy Mother's Day 
Happy New Year 
Happy now? Mobiles, cloud, big data now 'a growing security risk'
Happy Thanksgiving 
Happy turkey day 
Happy Valentines Day and Black Tuesday 
Happy Valentine's Day; ARCserve probes?; OWA issue; new Opera version 
Harris kills hosted cloud service program
Harvard Creates Cyborg Tissues
Has CES Lost Its Star Appeal?
hashcat and oclHashcat are now open source
Have you noticed a decline in the amount of Spam? This could be the reason!
Hawaii connectivity 
Haxdoor Incident Details at Honeyblog.Org 
Haxdoor.KI Deja Vu 
Heads Up: new flaw in McAfee 
Healthcare CRM in the Cloud
Healthcare in the Cloud - My Office Visit and ObamaCare
Healthcare industry group builds cybersecurity threat center
Heap overflow vulnerability in Opera 9.0, 9.01 
Help eliminate unquoted path vulnerabilities, (Wed, Nov 7th)
Help us out with a Christmas story 
Help Wanted: Please help test our experimental PFSense Client
Helpdesk outsourcing quagmire at heart of whistleblower lawsuit
Helpful Tips For Successful CRM Implementation
Here are some technology predictions that didn’t quite hit the mark (or the side of a barn either)
Here are some useful tools (free) to help out IT Pros (and others)
Here it is -- Your turn to be heard 
Here’s an update on my “If you have a laptop with a fingerprint reader, beware…” post
Here’s another tip on customizing Outlook. Changing some defaults
Here's What China Thinks of Ed Snowden and the NSA
Here's your opportunity to learn more about DB2 for z/OS and WLM
'Heroes' creator Tim Kring working on conspiracy thriller with interactive elements
Hexing MAC address reveals Wifi passwords
Hidden IFrame Remains Popular With Browse-By Exploit Authors 
Hidden Viral Gene Discovered In GMO Crops
Higgs boson exists
High End Graphics Cards Tested At 4K Resolutions
High Security Animal Disease Lab Faces Uncertain Future
High Tech Vending Machines Transform IT Support At Facebook
Highlights from the 2016 HPE Annual Cyber Threat Report
High-Risk SAP HANA Vulnerabilities Patched
High-Voltage Fences For Zapping Would-Be Copper Thieves
HIPAA and HITECH January 2013 eNewsletter Published
HIPAA log clarification; Mozilla/Firefox/Thunderbird vuln reported & fixed 
Hiring Developers By Algorithm
HITRUST Backs 'Community Defense' Approach to Health Care Cyber-Security
HIV Vaccine Safe Enough To Pass Phase 1 Human Trials
Hobbyist Builds Working Replica of Iron Man's Laser Gauntlet
'Holey code, Batman!' Microsoft to patch 12 vulns on Tuesday
Hollywood studios pushing for secure, next-generation "digital home library"
Homeland Security Level Raised to Orange, increase in DameWare (port 6129) scans and exploit, Microsoft Retires Products (Including Windows 98), And Earthlink Users Being Targeted by Scam Using IE bug 
Hon Hai, Mozilla to launch mobile device running on Firefox
Honda's "Micro Commuter" Features Swappable Bodies
Honeyd 1.5 Released 
Honeynet looks to trap USB malware
Honeyports, powershell script
Honeypot Abnormality 
Honeypot Mirroring .edu domains under .eu / Active Threat 
Hong Kong web host jailed for DDoS stunt
Horde exploit attempts in the wild 
Horde exploit downloading Perl/Shellbot 
Hosting Provider Automatically Fixes Vulnerabilities In Customers' Websites
Hotfix for MSIE problem related to MS06-042 
Hotmail and MSN problems 
Hotmail seeing some temporary access issues, (Wed, Jan 9th)
Hounded By Recruiters, Coders Put Themselves Up For Auction
House Approves Extending the Warrantless Wiretapping Act
House Subcommittee Holds Hearing On TSA's "Scanner Shuffle"
Housewives On Trial In China For Smuggling In iPhones
How a 'Catch-22' Turns into a 'Shame on You' 
How Apple's Story Is Like <em>Breaking Bad</em>
How Beer Gave Us Civilization
How Big Data Became So Big
How big of a deal is the new Benghazi testimony?
How CIOs Can Learn to Catch Insider Crime
How Cosmological Supercomputers Evolve the Universe All Over Again
How Do We Protect Ourselves from our Frienemies?
How do you deploy? 
How Do You Spot a Genius?
How Does the Tiny Waterbear Survive In Outer Space?
How EVE Online</em> Dealt With a 3,000-Player Battle
How Facebook Will Power Graph Search
How Free Speech Died On Campus
How Google and Apple exposed their Achilles heels this week
How Hair Can be Used To Track Where You've Been
How China's Top Digital Spies Got Outed by Facebook and Twitter
How long until Skynet?
How many ?Epoch? times? Epocalypse.py timestamp converter
How Million-Dollar Frauds Turned Photo Conservation Into a Mature Science
How Mobile Devices Kill Your Creativity
How Much Beef Is In Your Burger?
How Newegg Saved Online Retail
How Noah Kagan Got Fired From Facebook and Lost $100 Million
How Not To Launch a Gadget
How online black markets work
How Open Source Could Benefit Academic Research
How Red Hat Hires
How Secure Is the Cloud? IT Pros Speak Up
How Stolen iOS Devices Are Unlocked
How Technology Might Avert an Apocalypse
How That 'Extra </nobr>.9%' Could Ward Off a Zombie Apocalypse
How the Critics of the Apollo Program Were Proven Wrong
How the Super Bowl Will Reach US Submarines
How the Syrian Electronic Army Hacked The Onion
How To Communicate Faster-Than-Light
How To Conduct a Bona Fide HIPAA Security Risk Analysis....
How to contribute your data to DShield / ISC 
How to create an e-book
How to Create Governance Policies in InfoSphere Business Glossary 9.1
How to deal with Oracle patches? 
How to Elegantly Neglect Explain Plans and Radically Transform SQL
How to Fix America's Harmful Hacking Laws
how to get published plus life, parenting, and dogs catching Frisbee
How to hack
How To Hack Twitter's Two-Factor Authentication
How to Meet Instant Demands for Business Analytics?
How To Promote Stage Comedy In a Geeky Way?
How to Recover Pictures from Corrupt Memory Card
How to Remove Duplicate Emails from 'Sent Items' Folder of MS Outlook 2007
How To Report A BotNet, Glitch In The Matrix?, Bouncing Malware -IS- In The Works 
How To Safeguard Loose Nukes
How to Set Up Your Own Malware Trap
How to setup penetration testing exercises. 
How to Stop the Next Viral Facebook Post Outbreak
How To Talk Like a CIO
How Will Amazon, Barnes & Noble Survive the iPad Mini?
How you can help; Strange Spam Update; port 3001 update 
How Your #Naked Pictures Ended Up on the Internet
How your Webhosting Account is Getting Abused, (Tue, Mar 26th)
How Your Webhosting Account is Getting Hacked, (Mon, Mar 25th)
How's business?
How-to Build Your Own Custom Integration Components
HP Discontinue OpenVMS
HP EVI vs. Cisco OTV: A Technical Look
HP Hires Ex-Nokia Exec, Spins Off WebOS, Reportedly Returning To Tablets
HP JetDirect Vulnerabilities Discussed, (Sun, Jan 27th)
HP Offers that “Cloud Thing”
HP ProCurve switches shipped with malware
HP Upgrades Mobile Thin Clients
HP's "System Management Homepage" web interface vulnerable
HTTP Public Key Pinning: How to do it right
Huawei CEO breaks silence, claims company isn’t a threat to U.S. security
Huawei denies spying, calls for global security standards
Huawei doesn’t expect to gain any ground in the U.S. this year
Huawei founder gives first ever media interview
Huawei checking claims of vulnerabilities in its routers
Huawei is betting big with a new metal smartphone
Huawei is now the world’s third largest smartphone vendor, but still far behind Samsung and Apple
Huawei says U.S. probe unlikely to affect other business
Huawei says U.S. probe unlikely to affect other overseas business
Huawei says US stance is “protectionism”
Huawei says US stance is 'protectionism'
Huawei to continue talking with government over network issue - CEO
Huawei to continue talking with UK government over network issue: CEO
Huawei told not to apply for Australian broadband project
Huawei USB modems vulnerable
Huawei: 'trust us, we are being transparent'
Huawei’s Ascend W1 Windows Phone 8 smartphone revealed in leaked photos
Hubble Discovers 'Planetary Graveyard' Around White Dwarf
Huge amount of Visa and Mastercard information hacked
Huge cyber bank theft spans 27 countries
Hugo Awards Live Stream Cut By Copyright Enforcement Bot
Human Rights Watch proposes new laws of robotics
Hunting for Executable Code in Windows Environments
Hunting for IOC's with ioc-parser
Hunting for Juicy Information
Hurricane Katrina Follow-UP 
Hurricane Katrina Preparations; Broken Mytob? 
Hurricane Katrina; ShellBOT/awstats; Long Registry Value Names 
Hurricane Rita Scams ALREADY! 
HyTrust Adds �Secondary Approval` Security to Protect Virtual Environments
Challenge Update 
Challenge: What can you do with Funky Directory Names (Part 2), (Mon, Apr 16th)
Changed Infocon status to Yellow, re: Windows Internet Explorer vulnerability 
Changing Profile Picture in Lync 2013
Changing Threat Models 
Chat Logs Location; Microsoft Security Advisories 
Cheap Four-fingered Robot Hand Edges Closer To Human Dexterity
Check Point harnesses cloud security to deter botnet infections in enterprise
Check Point Outbound Traffic Mystery 
Checking for .wmf Vulnerabilities 
Checking Media Type from Python
Chernobyl Plus 7 Years 
Chief's Picks: Videos from BlackHat Briefings USA 2012
China calls U.S. the "real hacking empire" after Pentagon report
China companies plan to step up Europe investment
China cracks down on mail servers 
China derides U.S. "Cold War mentality" towards telecoms firm Huawei
China fingered for Coca Cola hack - report
China Hacked the New York Times for Four Months Straight
China is world's most malware-ridden nation
China options limited as U.S. panel outcasts Huawei, ZTE
China rechaza acusaciones de EEUU contra firmas telecomunicación
China's Alibaba To Outsell Amazon, eBay Combined
China's Android users warned of giant botnet
China's Huawai criticizes US security complaints
China's Huawei criticizes US security complaints as trade protectionism, promises transparency
China's Huawei says it has done poor job communicating
China's Huawei says will increase transparency
China's Huawei vows to become more transparent
China's internet security giant Qihoo planning global domination
China's Radical New Space Drive
China's Wanda in talks with "well-known" hotels for U.S. buys
China's Yearly Budget For High-Speed Rail: $100 Billion
China's ZTE slumps to quarterly loss, margins bleed
Chinese Android trojan buys applications
Chinese arrest 9,000 cyber-crims
Chinese arrests 9,000 cyber-crims
'Chinese' attack sucks secrets from US defence contractor
Chinese Automaker Launches Remote-Control Family Car
Chinese Blogger Becomes Celebrity Exposing Corruption
Chinese Cyber-Spying Shows Why U.S. Must Bolster Network Defenses
Chinese diplomat accused of spying on Japanese military
'Chinese hack' scoops plan to Oz spook HQ
Chinese Hackers Compromise NY Times, WSJ to Steal Sources
Chinese Hackers Infiltrate US Army Database, Compromise Safety of Dams
Chinese Hackers Spied on the 2008 Elections, Too
Chinese hacktivists launch cyber attack on Japan
Chinese Man Builds His Own Prosthetic Hands
Chinese man on trial for smuggling hi-tech military secrets
Chinese Man Pleads Guilty To $100M Piracy Operation
Chinese military contractor hits back at hacktivist Hardcore Charlie
Chinese PLA unit 'masterminds cyber-espionage Cold War'
Chinese residents charged with selling $100M worth of pirated software
Chinese Students Say They Are Being Forced To Build Your Next iPhone
Chinese Supplier Gets Dumped By Apple For Fraudulently Using Underage Labor
Chip and Pin "Weakness" Exposed By Cambridge Researchers
Christmas . exe is making the rounds 
Christmas Botnet Follow-up 
Chrome 24.0.1312.52 has been updated for Windows, Mac, Linux, and Chrome Frame, (Wed, May 22nd)
Chrome extensions malware hijacks Facebook profiles
Chrome, Thunderbird updates
I might look again at Java 8
I Wear The Chain I Forged in Life, I Made It Link by Link
I would pay more for open source
IaaS Is a Stepping-Stone on the Path to PaaS
Iberdrola awarded a 2012 European SCADA Security Innovation Award
Ibex Virtual Reality Desktop Beta For Mac Released
IBM makes QRadar security event management product more intelligent
IBM open sources new approach to crypto
IBM Slides on Gartner Magic Quadrant for Data Quality Tools 2012
IBM Takes System/z To the Cloud With COBOL Update
IBM Tivoli Storage Manager Buffer Overflow Vulns and Patches 
IBM websphere: Last Call 
IBM/ISS protection suites - content update problem 
IBM: Role of Chief Security Officer is Evolving
IBM's Watson Gets a Swear Filter After Learning the Urban Dictionary
ICANN To Replace 'Digital Archery' Program With Raffle
ICMP - call for packets ? 
ICMP Echo/HTTP Pattern, HP Mystery Patch Explained, DNS Reflector Attack(?) 
ICQ/MSN Messenger Fraud 
ICQ-Based Bizex Worm, MyDoom.F, Checking Your Server Logs 
I'd rather go to the dentist than do a performance review
Identity Theft: Accounts Stolen vs Accounts Used - Reader Input 
IDS Trolling - Anything new?, (Sat, Jun 2nd)
IE + WMF security advisory released by Microsoft (913333) 
IE 10 Almost Finished For Windows 7 With Final Preview
IE 6 SP1 and Direct X downloads 
IE Exploit Email; DNS Vulnerability; Microsoft Patch Day 
IE exploit on the loose, going to yellow 
IE Fixes Available, (Thu, Sep 20th)
IE Changes Due: What You Can Expect 
IE IFRAME Exploit, Sun Java Web Proxy Buffer Overflow, SSH Scanning Continues, Yesterday's Diary 
IE Standardization Fading Fast
IE unspecified remote code execution vulnerability 
IE URL Bug; Phishing Attacks; Port 6129 Remains High; Proper Incident Response 
IE vulnerability / MS Patches issues / Cisco CatOS vulnerabilities 
IE7 to hit the streets 
IEEE data breach exposes 100,000 plain text passwords
IETF Starts Work On Next-Generation HTTP Standards
If DDOS Attacks are Natural Disasters, is it Time to Update your DR Plan?
If IE Suddenly Says "Se Habla Espanol" ... 
If It Sounds Too Good To Be True..., Don't Let This Happen To You, Updated MS04-039 
If it's Free, YOU are the Product
If it's May it must be Madness
If MS05-054 doesn't apply correctly... 
If you are having trouble resetting your Apple ID over the phone, read on…
If you buy a computer between June 2, 2012 and January 31, 2013, You can upgrade to Windows 8 for $15
If you have migrated to a WIndows 8 computer, here’s some tips on using it more effectively
If you own an Android smart phone, read on.
If you saw Armageddon, sorry, it couldn’t have worked
If you see 'URGENT tax rebate download' in an inbox, kill it with fire
If you Skype, be careful what you write!
If you use Microsoft Live Mesh, read on before installing Windows Essentials 2012
If you wanted to have a bootable Windows 7 USB stick, read on
If You're a Foreigner Using GPS In China, You Could Be a Spy
iframeDOLLARS.biz redux ; P2P == Prepare to Patch ; I'm the MAP ; Remote Malware Acquisition 
IIS 5.1 DoS exploit released 
IIS Exploit released / Gagobot.XZ 
Ilfak Guilfanov's website, Hexblog.com back again 
Illinois Prof Calls for a Federal Law To Safeguard Digital Afterlives
IllumiRoom To Take Gaming Visuals Outside the Box and Onto the Living Room
Illusions of security 
Illusions of Security: wrap-up for Mac OS X 
IM and Malware 
I'm In Love - With Logstalgia
ImageTragick: Another Vulnerability, Another Nickname
IMAP scans, password protected image, database update, sco hack, cdi east. 
Impact of Leadership on Innovation Culture in an organisation
impad4d Vulnerability & Patch Released 
Impending CA Sales Tax Sparks Amazon Buying Frenzy
Implant Translates Written Words To Braille, Right On the Retina
Important Clam AV Update 
Important RH kernel security advisory 
Improving Bash Forensics Capabilities
In Australia, secure your Wi-Fi -- or face a visit from the police
In Calculator Arms Race, Casio Fires Back: Color Touchscreen ClassPad
In letter to Congress, Google defends privacy changes
In Malaysia, online election battles take a nasty turn
In Need of a OTP Manager Soon?
Incident Handling: Home Heating 101 
Incident Response and Malware investigations via SecCheck 
Incidents Report: Web Application Exploit 
Increase in HTTP PUT Requests; DDoS Against Authorize.net; More JPEG Comments 
Increase in ICMP scans 
Increase in Port 1025 scan 
Increase in port 2525; Ethereal released new version; New phishing attack trend 
Increase in Port 6101 Activity 
Increase in Protocol 47 denys
Increase in TCP 5554 activity; Fragmented IP traffic towards port 16191; Please patch your Symantec/Norton firewall products 
Increase in udp/24585 Activity 
Increased activity on TCP port 5250 
Increased SSL Activity; Exploits for MS04-022; Mailbag 
Incredible New Photographs of Live Coelacanths
Index Savant, Part II: Usability of Auto-Created Index Partitions
India Bars ZTE, Huawei, Others From Sensitive Government Projects
India introduces Central Monitoring System
India joins list of nations vetting Huawei, ZTE
India overtakes U.S. as the world's top email spam source
India To Develop Military Robots For Warfare
India To Develop Miltary Robots For Warfare
India: We DO have the BlackBerry encryption keys
Indian 'attacks' Norwegian telco to get at Pakistan, China
Indian Government Mulls Giving Away Mobile Phones To the Poor
Indian Minister Says Telecom Companies Should Only Charge For Data
Indian Prime Minister Formally Announces Mars Mission
Indian School Textbook Says Meat-Eaters Lie and Commit Sex Crimes
Indian Supreme Court Denies Novartis Cancer Drug Patent
India's tough new security plan: a brochure with every device
Indonesia to build crack IT-trained military unit to deflect attacks
Indonesian hackers protest hacker's arrest ... by hacking
Industry on Cybersecurity Act of 2012: Not so fast
INetSim as a Basic Honeypot
Infocon back to green 
INFOCON back to GREEN; Cisco "device" Zotob & Rbot problems, Spanish Zotob description, Sun LPD remote exploit; More about Msdds.dll issue 
Infocon gone yellow; Patch available for Internet Explorer (.Net) 0day Exploit; Open letter; OS-X Patches; 1433 scans after Zotob; Zotob MSRT updated 
Infocon Changes; Remote DOS 
InfoCon Returning to Green 
Infocon Yellow: Juniper Backdoor (CVE-2015-7755 and CVE-2015-7756)
Infocon Yellow: Snort BO Vulnerability 
Infocon Yellow; Windows and Backup Exec exploits are out, where are the exploits, NIST drafts, Snort signatures 
Infocon: green
INFOCUS: Education and the JDE Alliance
Information to Help Track Down Infections From WGAREG.EXE 
InfoSec 2012: IBM launches new threat analytics engine
Innovation Reigns at Wireless Expo
Insecure SCADA kit has hidden factory account, password
Inserting Parent/Child Relationships in EF 4
Inside an Amazon Warehouse
Inside SANS Institute; Conference Links from Reader Submissions 
Inside the Eastern European Cybercrime Network That Brought Down NASA
Insider threat study, and Fun in the trenches, Windows surprise update, Why is change control a good idea? 
insidious botnets, MSN phishing, the honor of thieves. 
Insight: Experts hope to shield cars from computer viruses
Insight: Lockheed's F-35 logistics system revolutionary but risky
Installing a Patch Silently 
Insurer Measures Driver Safety With Smartphone App To Calculate Premiums
Integer Overflow Bug Leads To Diablo III</em> Gold Duping
Intel CEO Paul Otellini Retiring
Intel Demos McAfee Social Protection
Intel Details Power Management Advancements in Haswell
Intel Embraces Oil Immersion Cooling For Servers
Intel Gets Go-Ahead For $4 Billion Chip Plant In Ireland
Intel LAN Driver Buffer Overflow Local Privilege Escalation 
Intel launches cloud-based single sign-on service
Intel Predicts Ubiquitous, Almost-Zero-Energy Computing By 2020
Intel To Debut Limited-Run Ivy Bridge Processor
Intel To Help Stephen Hawking Communicate Faster
Intel To Launch Paid Web TV Service With Set-Top Box
Intel Unveils 10-Watt Haswell Chip
Intellectual Ventures Tied To 1,300 Shell Companies
Intel-McAfee developing cloud-security strategy
Intel's Haswell Moves Voltage Regulator On-Die
Intel's Linux OpenGL Driver Faster Than Apple's OS X Driver
Interesting Potential Attack Vector 
Interesting reads for Friday 18 JAN 2013, (Fri, Jan 18th)
Internal Security Audits Play Critical Role in Preventing Breaches: PwC
International Challenge To Computationally Interpret Protein Function
Internet blackout looms for thousands
Internet Brands Sues People For Forking Under CC BY-SA
Internet Explorer 7.0 High Priority Update 
Internet Explorer becomes Korean election issue
Internet Explorer Shines in NSS Labs Browser Security Test
Internet Explorer XML Vulnerability 
Internet Explorer Zero-Day Attack Targets Nuclear Researchers
Internet security better but foul exploits grow, IBM says
Internet Systems Consortium BIND Denial of Service Vulnerabilities 
Internet ultrarrápida atrae empresas a Kansas
Internet Wide Scanners Wanted
Interop: Open Compute Project To Tackle Network Switching
Interviews: Ask Derek Khanna About Government Regulations and Technology
Inventor of OpenFlow SDN Admits Most SDN Today Is Hype
Invision Board being exploited 
Invision Power Board Vulnerability 
Inviting papers and presentations to workshop on architectures for knowledge discovery
IOD 2012 - Day 1 (3 more to go)
iOS 6 Security Roundup, (Fri, Sep 21st)
iOS 6.1.3 Beta 2 Patches evasi0n Jailbreak
iOS 6.x hack allows personal data export, free calls
IP Addresses Triage
iPad beats 'e-trespassing' rap
iPhone 5 and the Enterprise: How to Make the Best Business Decision - Mobile and Wireless - News & Reviews - eWeek.com
iPhone 5 GeekBench Results
iPhone 5's Passbook Is Apple's NFC Alternative - Mobile and Wireless - News & Reviews - eWeek.com
iPhone Bug Allows SMS Spoofing
iPhone growth stalls as Android continues to nip away at Apple’s market share
iPhone, iPad Popularity Could Threaten Enterprise Security: Zscaler
iPhones now 'safe' for Restricted UK.gov info, but not Secret
iPod Engineer Tony Fadell On the Unique Nature of Apple's Design Process
IPSEC / ISAKMP Vulnerability wrapup 
IPsec vulnerability and more public Ethereal exploits! 
Ipswitch iMail LDAP Exploit Correlation, Port 3991 activity request 
IPv6 and Security 
IPv6 Focus Month: Kaspersky Firewall IPv6 Vulnerability, (Wed, Mar 13th)
Iran and North Korea Team Up To Fight State-Sponsored Malware
Iran fingered for attacks on US power firms
Iran identifies 'hidden agenda' behind oil terminal cyberattack
Iran rejects US accusations after hacker attack
Iran says its infosec defences foiled oil hack
Iran swipe at Web brings angry reply
Iran's discovery of Flame malware turning into political hot potato
Iran's News Agency Picks Up Onion Story
IRC Botnet Update / Windows Rootkit Detection / Port 23/ ICQ Virus Messages / ISC Contact Form / 2004 SANS Top-20 
IRC Botnet, Solaris in.named Vulnerability, Information about SuckIT Rootkit 
Irish Google, Yahoo Domains Taken Offline Briefly After Security Breach
'Iron Man,' 'Star Trek' Movies Used as Scam Bait
IRS criticized by federal government watchdog agency for lax IT security
Is "2 out of 3" good enough for Anti-Malware?
Is a Computer Science Degree Worth Getting Anymore?
Is an International Nuclear Fuelbank a Good Idea?
Is Anonymous meddling in the North Korea standoff?
Is anyone seeing an increase in port 143 (IMAP) scans? 
Is Application Security the Glaring Hole in Your Defense?
Is Buying an Extended Warranty Ever a Good Idea?
Is Facebook use in the enterprise too risky to allow?
Is hurricane Wilma affecting you? 
Is iPhone Battery Usefulness On the Decline?
Is it a SIP Recon scan or something else 
Is it Really an Attack?, (Sun, Feb 3rd)
Is it Spam or Is it Malware?, (Fri, Feb 8th)
Is MySQL Slowly Turning Closed Source?
Is Non-Prescription ADHD Medication Use Ever Ethical?
Is Sexual Harassment Part of Hacker Culture?
Is someone watching your internet traffic or telephone calls? 
Is that a truncheon in your trousers, officer, or ... an antenna, you say?
Is the CIO Dead?
Is the cloud really ready for prime time?
Is the Concept of 'Cyberspace' Stupid?
Is the Era of Groundbreaking Science Over?
Is there an epidemic of typo squatting?, (Tue, May 7th)
Is your banks Online security policy making it more of a target for Phisher's? 
ISC Briefing: Large DDoS Attack Against Dyn
ISC DHCP Multiple Denial of Service Vulnerabilities
ISC DHCPD buffer overflow exploit code produced in the lab 
ISC Diary and Infocon change E-Mail Notification service (BETA) 
ISC Feature of the Week: Diary/Infocon/Event Notifications, (Wed, Apr 4th)
ISC Feature of the Week: Handler Select News Feed, (Sat, Aug 4th)
ISC Reader's Diary, PHP Include Worm, Trojan in wild that exploits new IE bug , Pacific Earthquake & Tsunami
ISC returning to Green; Comcast Problems; Microsoft Update Spoof 
ISC StormCast for Friday, August 10th 2012 http://isc.sans.edu/podcastdetail.html?id=2728, (Fri, Aug 10th)
ISC StormCast for Friday, August 17th 2012 http://isc.sans.edu/podcastdetail.html?id=2743, (Fri, Aug 17th)
ISC StormCast for Friday, August 24th 2012 http://isc.sans.edu/podcastdetail.html?id=2758, (Fri, Aug 24th)
ISC StormCast for Friday, February 15th 2013 http://isc.sans.edu/podcastdetail.html?id=3127, (Fri, Feb 15th)
ISC StormCast for Friday, February 1st 2013 http://isc.sans.edu/podcastdetail.html?id=3094, (Fri, Feb 1st)
ISC StormCast for Friday, February 8th 2013 http://isc.sans.edu/podcastdetail.html?id=3109, (Fri, Feb 8th)
ISC StormCast for Friday, January 11th 2013 http://isc.sans.edu/podcastdetail.html?id=3046, (Fri, Jan 11th)
ISC StormCast for Friday, January 25th 2013 http://isc.sans.edu/podcastdetail.html?id=3079, (Fri, Jan 25th)
ISC StormCast for Friday, January 4th 2013 http://isc.sans.edu/podcastdetail.html?id=3028, (Fri, Jan 4th)
ISC StormCast for Friday, June 14th 2013 http://isc.sans.edu/podcastdetail.html?id=3368, (Fri, Jun 14th)
ISC StormCast for Friday, June 7th 2013 http://isc.sans.edu/podcastdetail.html?id=3353, (Fri, Jun 7th)
ISC StormCast for Friday, March 15th 2013 http://isc.sans.edu/podcastdetail.html?id=3187, (Fri, Mar 15th)
ISC StormCast for Friday, May 10th 2013 http://isc.sans.edu/podcastdetail.html?id=3299, (Fri, May 10th)
ISC StormCast for Friday, May 11th 2012 http://isc.sans.edu/podcastdetail.html?id=2527, (Fri, May 11th)
ISC StormCast for Friday, May 17th 2013 http://isc.sans.edu/podcastdetail.html?id=3314, (Fri, May 17th)
ISC StormCast for Friday, May 3rd 2013 http://isc.sans.edu/podcastdetail.html?id=3284, (Fri, May 3rd)
ISC StormCast for Friday, November 16th 2012 http://isc.sans.edu/podcastdetail.html?id=2950, (Fri, Nov 16th)
ISC StormCast for Friday, November 9th 2012 http://isc.sans.edu/podcastdetail.html?id=2929, (Fri, Nov 9th)
ISC StormCast for Friday, October 12th 2012 http://isc.sans.edu/podcastdetail.html?id=2869, (Fri, Oct 12th)
ISC StormCast for Friday, October 19th 2012 http://isc.sans.edu/podcastdetail.html?id=2884, (Fri, Oct 19th)
ISC StormCast for Friday, October 5th 2012 http://isc.sans.edu/podcastdetail.html?id=2851, (Fri, Oct 5th)
ISC StormCast for Friday, September 14th 2012 http://isc.sans.edu/podcastdetail.html?id=2806, (Fri, Sep 14th)
ISC StormCast for Friday, September 21st 2012 http://isc.sans.edu/podcastdetail.html?id=2821, (Fri, Sep 21st)
ISC StormCast for Friday, September 28th 2012 http://isc.sans.edu/podcastdetail.html?id=2836, (Fri, Sep 28th)
ISC StormCast for Friday, September 7th 2012 http://isc.sans.edu/podcastdetail.html?id=2785, (Fri, Sep 7th)
ISC StormCast for Monday, April 23rd 2012 http://isc.sans.edu/podcastdetail.html?id=2482, (Mon, Apr 23rd)
ISC StormCast for Monday, April 29th 2013 http://isc.sans.edu/podcastdetail.html?id=3272, (Mon, Apr 29th)
ISC StormCast for Monday, April 2nd 2012 http://isc.sans.edu/podcastdetail.html?id=2437, (Mon, Apr 2nd)
ISC StormCast for Monday, April 30th 2012 http://isc.sans.edu/podcastdetail.html?id=2500, (Mon, Apr 30th)
ISC StormCast for Monday, August 13th 2012 http://isc.sans.edu/podcastdetail.html?id=2731, (Mon, Aug 13th)
ISC StormCast for Monday, August 20th 2012 http://isc.sans.edu/podcastdetail.html?id=2746, (Mon, Aug 20th)
ISC StormCast for Monday, August 27th 2012 http://isc.sans.edu/podcastdetail.html?id=2761, (Mon, Aug 27th)
ISC StormCast for Monday, August 6th 2012 http://isc.sans.edu/podcastdetail.html?id=2716, (Mon, Aug 6th)
ISC StormCast for Monday, December 3rd 2012 http://isc.sans.edu/podcastdetail.html?id=2977, (Mon, Dec 3rd)
ISC StormCast for Monday, February 11th 2013 http://isc.sans.edu/podcastdetail.html?id=3112, (Mon, Feb 11th)
ISC StormCast for Monday, February 20th 2012 http://isc.sans.edu/podcastdetail.html?id=2338, (Mon, Feb 20th)
ISC StormCast for Monday, February 25th 2013 http://isc.sans.edu/podcastdetail.html?id=3145, (Mon, Feb 25th)
ISC StormCast for Monday, February 4th 2013 http://isc.sans.edu/podcastdetail.html?id=3097, (Mon, Feb 4th)
ISC StormCast for Monday, January 14th 2013 Part 2 http://isc.sans.edu/podcastdetail.html?id=3052, (Mon, Jan 14th)
ISC StormCast for Monday, January 21st 2013 http://isc.sans.edu/podcastdetail.html?id=3067, (Mon, Jan 21st)
ISC StormCast for Monday, January 28th 2013 http://isc.sans.edu/podcastdetail.html?id=3082, (Mon, Jan 28th)
ISC StormCast for Monday, January 7th 2013 http://isc.sans.edu/podcastdetail.html?id=3031, (Mon, Jan 7th)
ISC StormCast for Monday, July 16th 2012 http://isc.sans.edu/podcastdetail.html?id=2665, (Mon, Jul 16th)
ISC StormCast for Monday, July 30th 2012 http://isc.sans.edu/podcastdetail.html?id=2698, (Mon, Jul 30th)
ISC StormCast for Monday, July 9th 2012 http://isc.sans.edu/podcastdetail.html?id=2650, (Mon, Jul 9th)
ISC StormCast for Monday, June 11th 2012 http://isc.sans.edu/podcastdetail.html?id=2590, (Mon, Jun 11th)
ISC StormCast for Monday, June 18th 2012 http://isc.sans.edu/podcastdetail.html?id=2608, (Mon, Jun 18th)
ISC StormCast for Monday, June 25th 2012 http://isc.sans.edu/podcastdetail.html?id=2623, (Mon, Jun 25th)
ISC StormCast for Monday, June 4th 2012 http://isc.sans.edu/podcastdetail.html?id=2575, (Mon, Jun 4th)
ISC StormCast for Monday, March 12th 2012 http://isc.sans.edu/podcastdetail.html?id=2389, (Sun, Mar 11th)
ISC StormCast for Monday, March 18th 2013 http://isc.sans.edu/podcastdetail.html?id=3190, (Mon, Mar 18th)
ISC StormCast for Monday, March 19th 2012 http://isc.sans.edu/podcastdetail.html?id=2404, (Mon, Mar 19th)
ISC StormCast for Monday, March 26th 2012 http://isc.sans.edu/podcastdetail.html?id=2422, (Mon, Mar 26th)
ISC StormCast for Monday, March 26th 2013 http://isc.sans.edu/podcastdetail.html?id=3205, (Mon, Mar 25th)
ISC StormCast for Monday, May 14th 2012 http://isc.sans.edu/podcastdetail.html?id=2530, (Mon, May 14th)
ISC StormCast for Monday, May 20th 2013 http://isc.sans.edu/podcastdetail.html?id=3317, (Mon, May 20th)
ISC StormCast for Monday, May 21st 2012 http://isc.sans.edu/podcastdetail.html?id=2548, (Mon, May 21st)
ISC StormCast for Monday, May 27th 2013 http://isc.sans.edu/podcastdetail.html?id=3329, (Sun, May 26th)
ISC StormCast for Monday, May 7th 2012 http://isc.sans.edu/podcastdetail.html?id=2515, (Mon, May 7th)
ISC StormCast for Monday, November 12th 2012 http://isc.sans.edu/podcastdetail.html?id=2932, (Mon, Nov 12th)
ISC StormCast for Monday, November 19th 2012 http://isc.sans.edu/podcastdetail.html?id=2953, (Mon, Nov 19th)
ISC StormCast for Monday, November 5th 2012 http://isc.sans.edu/podcastdetail.html?id=2917, (Mon, Nov 5th)
ISC StormCast for Monday, October 15th 2012 http://isc.sans.edu/podcastdetail.html?id=2872, (Mon, Oct 15th)
ISC StormCast for Monday, October 1st 2012 http://isc.sans.edu/podcastdetail.html?id=2839, (Mon, Oct 1st)
ISC StormCast for Monday, October 8th 2012 http://isc.sans.edu/podcastdetail.html?id=2854, (Mon, Oct 8th)
ISC StormCast for Monday, September 10th 2012 http://isc.sans.edu/podcastdetail.html?id=2788, (Mon, Sep 10th)
ISC StormCast for Monday, September 17th 2012 http://isc.sans.edu/podcastdetail.html?id=2809, (Mon, Sep 17th)
ISC StormCast for Monday, September 24th 2012 http://isc.sans.edu/podcastdetail.html?id=2824, (Mon, Sep 24th)
ISC StormCast for Sunday, April 15th 2012 http://isc.sans.edu/podcastdetail.html?id=2467, (Sun, Apr 15th)
ISC StormCast for Sunday, March 4th 2012 http://isc.sans.edu/podcastdetail.html?id=2368, (Sun, Mar 4th)
ISC StormCast for Sunday, May 5th 2013 http://isc.sans.edu/podcastdetail.html?id=3287, (Mon, May 6th)
ISC StormCast for Thursday, April 4th 2013 http://isc.sans.edu/podcastdetail.html?id=3226, (Thu, Apr 4th)
ISC StormCast for Thursday, August 16th 2012 http://isc.sans.edu/podcastdetail.html?id=2740, (Thu, Aug 16th)
ISC StormCast for Thursday, August 30th 2012 http://isc.sans.edu/podcastdetail.html?id=2770, (Thu, Aug 30th)
ISC StormCast for Thursday, August 9th 2012 http://isc.sans.edu/podcastdetail.html?id=2725, (Thu, Aug 9th)
ISC StormCast for Thursday, February 21st 2013 http://isc.sans.edu/podcastdetail.html?id=3139, (Thu, Feb 21st)
ISC StormCast for Thursday, February 7th 2013 http://isc.sans.edu/podcastdetail.html?id=3106, (Thu, Feb 7th)
ISC StormCast for Thursday, January 10th 2013 http://isc.sans.edu/podcastdetail.html?id=3040, (Thu, Jan 10th)
ISC StormCast for Thursday, January 24th 2013 http://isc.sans.edu/podcastdetail.html?id=3076, (Thu, Jan 24th)
ISC StormCast for Thursday, June 13th 2013 http://isc.sans.edu/podcastdetail.html?id=3365, (Thu, Jun 13th)
ISC StormCast for Thursday, June 6th 2013 http://isc.sans.edu/podcastdetail.html?id=3350, (Thu, Jun 6th)
ISC StormCast for Thursday, March 14th 2013 http://isc.sans.edu/podcastdetail.html?id=3184, (Thu, Mar 14th)
ISC StormCast for Thursday, March 28th 2013 http://isc.sans.edu/podcastdetail.html?id=3211, (Thu, Mar 28th)
ISC StormCast for Thursday, May 23rd 2013 http://isc.sans.edu/podcastdetail.html?id=3326, (Thu, May 23rd)
ISC StormCast for Thursday, May 2nd 2013 http://isc.sans.edu/podcastdetail.html?id=3281, (Thu, May 2nd)
ISC StormCast for Thursday, May 9th 2013 http://isc.sans.edu/podcastdetail.html?id=3296, (Thu, May 9th)
ISC StormCast for Thursday, November 15th 2012 http://isc.sans.edu/podcastdetail.html?id=2947, (Thu, Nov 15th)
ISC StormCast for Thursday, November 29th 2012 http://isc.sans.edu/podcastdetail.html?id=2971, (Thu, Nov 29th)
ISC StormCast for Thursday, November 8th 2012 http://isc.sans.edu/podcastdetail.html?id=2926, (Thu, Nov 8th)
ISC StormCast for Thursday, October 11th 2012 http://isc.sans.edu/podcastdetail.html?id=2866, (Thu, Oct 11th)
ISC StormCast for Thursday, October 18th 2012 http://isc.sans.edu/podcastdetail.html?id=2881, (Thu, Oct 18th)
ISC StormCast for Thursday, October 4th 2012 http://isc.sans.edu/podcastdetail.html?id=2848, (Thu, Oct 4th)
ISC StormCast for Thursday, September 13th 2012 http://isc.sans.edu/podcastdetail.html?id=2797, (Thu, Sep 13th)
ISC StormCast for Thursday, September 20th 2012 http://isc.sans.edu/podcastdetail.html?id=2818, (Thu, Sep 20th)
ISC StormCast for Thursday, September 6th 2012 http://isc.sans.edu/podcastdetail.html?id=2782, (Thu, Sep 6th)
ISC StormCast for Tuesday, April 2nd 2013 http://isc.sans.edu/podcastdetail.html?id=3220, (Tue, Apr 2nd)
ISC StormCast for Tuesday, April 30th 2013 http://isc.sans.edu/podcastdetail.html?id=3275, (Tue, Apr 30th)
ISC StormCast for Tuesday, August 14th 2012 http://isc.sans.edu/podcastdetail.html?id=2734, (Tue, Aug 14th)
ISC StormCast for Tuesday, August 21st 2012 http://isc.sans.edu/podcastdetail.html?id=2749, (Tue, Aug 21st)
ISC StormCast for Tuesday, August 28th 2012 http://isc.sans.edu/podcastdetail.html?id=2764, (Tue, Aug 28th)
ISC StormCast for Tuesday, February 12th 2013 http://isc.sans.edu/podcastdetail.html?id=3115, (Tue, Feb 12th)
ISC StormCast for Tuesday, February 26th 2013 http://isc.sans.edu/podcastdetail.html?id=3148, (Tue, Feb 26th)
ISC StormCast for Tuesday, February 5th 2013 http://isc.sans.edu/podcastdetail.html?id=3100, (Tue, Feb 5th)
ISC StormCast for Tuesday, January 22nd 2013 http://isc.sans.edu/podcastdetail.html?id=3070, (Tue, Jan 22nd)
ISC StormCast for Tuesday, June 11th 2013 http://isc.sans.edu/podcastdetail.html?id=3359, (Tue, Jun 11th)
ISC StormCast for Tuesday, March 12th 2013 http://isc.sans.edu/podcastdetail.html?id=3178, (Tue, Mar 12th)
ISC StormCast for Tuesday, May 14th 2013 http://isc.sans.edu/podcastdetail.html?id=3305, (Tue, May 14th)
ISC StormCast for Tuesday, May 15th 2012 http://isc.sans.edu/podcastdetail.html?id=2533, (Tue, May 15th)
ISC StormCast for Tuesday, May 7th 2013 http://isc.sans.edu/podcastdetail.html?id=3290, (Tue, May 7th)
ISC StormCast for Tuesday, November 13th 2012 http://isc.sans.edu/podcastdetail.html?id=2935, (Tue, Nov 13th)
ISC StormCast for Tuesday, November 20th 2012 http://isc.sans.edu/podcastdetail.html?id=2956, (Tue, Nov 20th)
ISC StormCast for Tuesday, November 6th 2012 http://isc.sans.edu/podcastdetail.html?id=2920, (Tue, Nov 6th)
ISC StormCast for Tuesday, October 16th 2012 http://isc.sans.edu/podcastdetail.html?id=2875, (Tue, Oct 16th)
ISC StormCast for Tuesday, October 2nd 2012 http://isc.sans.edu/podcastdetail.html?id=2842, (Tue, Oct 2nd)
ISC StormCast for Tuesday, September 11th 2012 http://isc.sans.edu/podcastdetail.html?id=2791, (Tue, Sep 11th)
ISC StormCast for Tuesday, September 18th 2012 http://isc.sans.edu/podcastdetail.html?id=2812, (Tue, Sep 18th)
ISC StormCast for Tuesday, September 25th 2012 http://isc.sans.edu/podcastdetail.html?id=2827, (Tue, Sep 25th)
ISC StormCast for Tuesday, September 4th 2012 http://isc.sans.edu/podcastdetail.html?id=2776, (Tue, Sep 4th)
ISC StormCast for Wednesday, April 3rd 2013 http://isc.sans.edu/podcastdetail.html?id=3223, (Wed, Apr 3rd)
ISC StormCast for Wednesday, August 15th 2012 http://isc.sans.edu/podcastdetail.html?id=2737, (Wed, Aug 15th)
ISC StormCast for Wednesday, August 22nd 2012 http://isc.sans.edu/podcastdetail.html?id=2752, (Wed, Aug 22nd)
ISC StormCast for Wednesday, August 29th 2012 http://isc.sans.edu/podcastdetail.html?id=2767, (Wed, Aug 29th)
ISC StormCast for Wednesday, February 13th 2013 http://isc.sans.edu/podcastdetail.html?id=3118, (Wed, Feb 13th)
ISC StormCast for Wednesday, February 6th 2013 http://isc.sans.edu/podcastdetail.html?id=3103, (Wed, Feb 6th)
ISC StormCast for Wednesday, January 16th 2013 http://isc.sans.edu/podcastdetail.html?id=3061, (Wed, Jan 16th)
ISC StormCast for Wednesday, January 23rd 2013 http://isc.sans.edu/podcastdetail.html?id=3073, (Wed, Jan 23rd)
ISC StormCast for Wednesday, January 30th 2013 http://isc.sans.edu/podcastdetail.html?id=3088, (Wed, Jan 30th)
ISC StormCast for Wednesday, March 13th 2013 http://isc.sans.edu/podcastdetail.html?id=3181, (Wed, Mar 13th)
ISC StormCast for Wednesday, May 1st 2013 http://isc.sans.edu/podcastdetail.html?id=3278, (Wed, May 1st)
ISC StormCast for Wednesday, May 22nd 2013 http://isc.sans.edu/podcastdetail.html?id=3323, (Wed, May 22nd)
ISC StormCast for Wednesday, May 8th 2013 http://isc.sans.edu/podcastdetail.html?id=3293, (Wed, May 8th)
ISC StormCast for Wednesday, November 14th 2012 http://isc.sans.edu/podcastdetail.html?id=2941, (Wed, Nov 14th)
ISC StormCast for Wednesday, November 21st 2012 http://isc.sans.edu/podcastdetail.html?id=2959, (Wed, Nov 21st)
ISC StormCast for Wednesday, November 28th 2012 http://isc.sans.edu/podcastdetail.html?id=2968, (Wed, Nov 28th)
ISC StormCast for Wednesday, November 7th 2012 http://isc.sans.edu/podcastdetail.html?id=2923, (Wed, Nov 7th)
ISC StormCast for Wednesday, October 10th 2012 http://isc.sans.edu/podcastdetail.html?id=2860, (Wed, Oct 10th)
ISC StormCast for Wednesday, October 17th 2012 http://isc.sans.edu/podcastdetail.html?id=2878, (Wed, Oct 17th)
ISC StormCast for Wednesday, October 24th 2012 http://isc.sans.edu/podcastdetail.html?id=2893, (Wed, Oct 24th)
ISC StormCast for Wednesday, October 3rd 2012 http://isc.sans.edu/podcastdetail.html?id=2845, (Wed, Oct 3rd)
ISC StormCast for Wednesday, September 12th 2012 http://isc.sans.edu/podcastdetail.html?id=2794, (Wed, Sep 12th)
ISC StormCast for Wednesday, September 19th 2012 http://isc.sans.edu/podcastdetail.html?id=2815, (Wed, Sep 19th)
ISC StormCast for Wednesday, September 26th 2012 http://isc.sans.edu/podcastdetail.html?id=2830, (Wed, Sep 26th)
ISC StormCast for Wednesday, September 5th 2012 http://isc.sans.edu/podcastdetail.html?id=2779, (Wed, Sep 5th)
ISC Two Factor Authentication Update
isc.org provides attack mitigation 
ISC/DShield Network Downtime 
ISCAlert Update 
ISPs and Egress Filtering, Bad News for Reverse Engineers, Broken Spam Message 
Israeli Army Retweeting 1967 War As It Happened
Israeli deputy PM's social media hacked by pro-Palestine group
Israeli government websites under mass hacking attack
Israeli, Hamas Conflict Attracts Anonymous
ISS Default Misconfiguration, New Bagel.U, and a couple 'witty' notes 
Issue with MySQL-PHP-Apache
Issues on MS patches? 
Issues with e-mail notifier 
Issues with MS04-032 patch / Phishings, Spams and Virus story 
IT execs must shift security approaches
IT Help for Katrina victims; More Katrina Malware; Gas shortage hoax e-mail; MS05-043 exploits in the wild?; Scanning for old Cisco vulnerabilities 
IT Industry Presidential Poll: 'Not Sure' Beats Both Obama and Romney
It is all about the risk. 
It is already Feb 3rd! 
IT Managers Worried About Network Monitoring, Security - IT Management - News & Reviews - eWeek.com
IT security problems shift as data moves to 'cloud'
IT security pros failing on risk strategies
IT Support Essentials
It’s A Solid-State Symposium
It's baaaaaaaack... 
It's Easy To Steal Identities (Of Corporations)
It's not meant to be hard
It's that time again! 
It's Time To Start Taking Stolen Phones Seriously
iTunes < 6.0.5 vulnerability & patch released 
Ivan Sutherland Wins Kyoto Prize
J.J. Abrams To Direct Star Wars VII
J2SE Runtime Environment (JRE) & Java SE Developer Kit (JDK) Update 8 
Jabber.Org r00t discovered, Vulnerabilities affect Koffice, Kdegraphics, xpdf viewer, Gpdf, Cups, and Tetex 
Jack Jones: Numbers game
January 2016 Microsoft Patch Tuesday
January 2017 Microsoft Patch Tuesday
Japan Considers '911' Calls From Twitter, Social Networks
Japan forgot data wipe on ship sold to Pyongyang
Japan government investigating small Web breaches after Anonymous attack threats
Japan Launches Two New Spy Satellites
Japan proposes NSA-style agency and new snooping laws
Japanese cops cuff cat carrying remote control virus
Japanese gov builds APT database to study targeted attack info
Japanese Probe Finds Miswiring of Boeing 787 Battery
Java applets run wild inside Notes
Java Trojan/Bot 
Java Zero-Day Attack Threats Widening, Security Experts Warn
JavaScript Deobfuscation Tool
javascript file upload entry 
Javascript/AJAX/Worm Like Behavior 
JBoss CVE-2012-1167 Security Bypass Vulnerability
JBoss Enterprise Application Platform Cross Site Request Forgery Vulnerability
JBoss Enterprise Application Platform CVE-2011-4605 Security Bypass Vulnerability
JBoss Enterprise BRMS Platform JGroups Diagnostics Service Information Disclosure Vulnerability
JD Edwards and mCommerce Integration
Jill Stein and Gary Johnson Debate Online Tonight
John McAfee's Belize Home Burns To Ground
Join the Live Windows 8 Launch Event
Joker.com confirms DDOS Attack on Nameservers 
Jonathan Coulton Offers Some Gleeful Turnabout
Jonathan Coulton Song Used By Glee</em> Without Permission
Joomla Kunena 'id' Parameter SQL Injection Vulnerability
Joomla! 2.5.4 closes more security holes
Journal of PhD research
Journalist's lawyer: Prank doesn't merit prison
JPEG exploit toolkit , JPEG Hacktool, GDIScan Tool, In search of the Botnet - Lessons learned 
JPMorgan Chase customers see zero balances after technical glitch
Judge Orders Child Porn Suspect To Decrypt His Hard Drives
Judge Orders Piracy Trial To Test IP Address Evidence
Julian Assange: "Online Totalitarianism Is Near, Entire Nations Are Intercepted"
July 2015 Microsoft Patch Tuesday
Jump List Files Are OLE Files
Juniper buys web security company for $80 million
Juniper IPv6 vulnerability 
Juniper packs 30 new features into Web security software
Juniper's SDN Strategy Looks Beyond OpenFlow
Just Added - Trend Micro Advisory; Update on PHP worm spreading, Update on Meeneemee.exe, more on RootKitReveal 
Just In Time for the Holidays, Nintendo Wii U Gets Its US Release
Just When I Thought I'd Heard it All..
Kasparov Arrested By Russian Police
Kaspersky Anti-Virus Products Remote Heap Overflow Vulnerability 
Kaspersky Lab Developing Secure OS for Industrial Control Systems
Kaspersky Lab suspends Flashback-fighting tool
Kaspersky plans source code reveal to avoid Huawei's fate
Kaspersky says SabPub is an 'Advanced Persistent Threat'
Kaspersky slips server security into PC software as attackers get crafty
Kaspersky spots Zeus for BlackBerry
kaspersky.com, are you awake? 
Kaspersky's Exploit-Proof OS Leaves Security Experts Skeptical
Katrina Malware; Katrina Donation Scams (now with domain name list); Dameware 
Katrina; MSIE Clipboard; Exchange Security Logs 
KbHook.dll is Not Always Spyware 
KDE 4.10 Beta1 Released
KDE kjs encodeuri/decodeuri heap overflow vulnerability 
Keccak is SHA-3
Keep Old Apps Private, Make New Apps Public
Kernel crimps make Windows 8 a hacker hassle
Khan Academy: the Future of Taxpayer Reeducation?
Kids Build Pill Dispenser To Win Raspberry Pi Award
Killbit apps for current IE exploit 
Killing IE becomes Korean election issue
Kim Dotcom mounts freedom campaign
Kim Dotcom Raid - What Really Happened
Kim Dotcom seizures "null and void"
Kim Dotcom's Mega Claims 1 Million Users Within 24 Hours
Kim Dotcom's Next Venture: Free Broadband To New Zealand
Kinectasploit: Hack Tools Meet Kinect
Knight Trading Losses Attributed To Old, Dormant Software
Known ?Good? DNS, An Observation
Known Issues for the MS06-025 
Korean Mozilla and Thunderbird Distro Site Woes 
Kristin Lovejoy: Enabling innovation
Kurzweil: The Cloud Will Expand Human Brain Capacity
LA Times hack: Security breach or harmless prank?
Lab Rats Given "Sixth Sense"
LAN Airlines scam - Social Engineering Attacks still happening and will keep happening ..., (Sun, Mar 18th)
Lance Armstrong and the Science of Drug Testing
LAND Attack Update; DNS Poisoning Update; ssh attacks; IM Malware; Brazilian Honeynet 
LAND attacks against network devices 
Landsat 8 Satellite Successfully Launches Into Orbit
Large Bitcoin Ponzi Scheme Collapses With a Loss of $5.6 Million
Large botnet in the Netherlands taken down 
Large Child porn Arrest and how to report it. 
Larger Power Outage in Los Angeles 
Largest Moon Rock Ever Auctioned Expected To Sell For $380,000
Largest-Ever DDoS Campaign Demonstrates Danger of New Attack Method
Largest-Known Spiral Galaxy Discovered
Larry Page: You Worry Too Much About Medical Privacy
LASER STRIKES against US planes on the rise
Last Week for IBM IOD 2012 Early Bird Discount
Late Night Paranoia
Latest Viruses, SSL Exploit, Juniper Update, New ISC Features 
Latvian Police Raid Teacher's Home for Uploading $4.00 Textbook
Law Enforcement Shuts Down Dridex Operation
Law firms see big money in healthcare breach cases
Law, spam, and 4899/tcp 
Lawmaker pushes consumer notification bill in wake of Carrier IQ concerns
Lawmaker: Cyberattacks against US getting worse
Lawmakers to introduce new bill to punish cyber theft
LDAP Scan increase. Win98 ASN.1 patch, MyDoom Remover, Win98 free update CD 
Leadership Lessons from Scott Thompson's short tenure at Yahoo!
Leaked Apple IDs came from a publishing company, not the FBI
Leaked exploit prompts researcher to publish blueprint for critical RDP vulnerability
Leaked Photo Shows Touch-Screen BlackBerry 10 Phone
'LeakedIn' Web app checks for compromised LinkedIn passwords
Leap Second 
Leap second: when time stands still 
Learn how to use Wordpress
Legal battle over LinkedIn breach could be costly
Legal Issues within Corporate "Bring Your Own Device" Programs
Legitimate eBook Lending Community Closed After Copyright Complaints
Lenovo, PayPal, launch post-password plan
Let Them Eat Teslas
Let's take a closer look at a few DB2 DDF and thread messages
LibertyReserve.com Shuttered, Founder Arrested In Spain
Libpng and putty vulnerabilities announced today 
Libpng exploit / XP SP2 yet / New MyDoom? / More phishing / ISC Webcast / Corporate Policy 
Libraries and Dependencies - It Really is Turtles All The Way Down!
Library Journal Board Resigns On "Crisis of Conscience" After Swartz Death
LibreOffice vulnerable to multiple buffer overflows
License File Changes in IBM Information Server and DataStage v9.1
License File Changes in InfoSphere Business Glossary v9.1 and BIE v9.1
License Changes, Backup Software, Spin out: VMware Rumors Settled next Week
LightSquared Wants To Share Weather-Balloon Frequencies for LTE
Linguistics Identifies Anonymous Users
Link to 'a new Microsoft patch' being spammed 
LinkedIn Offers Information, Apology for Security Breach
LinkedIn sheds more light on security breach
LinkedIn snarfing contacts from Exchange
Linksys Router Local DoS - Tripwire Privilege Escalation 
Linux kernel 2.6 ICMP bug resulting in remote DoS 
Linux Kernel DRM 'drivers/gpu/drm/crm_crtc.c' IOCTL Local Privilege Escalation Vulnerability
Linux Kernel IPv6 'nf_ct_frag6_reasm()' Remote Denial of Service Vulnerability
Linux kernel local DoS - Yahoo/Google (Akamai?) problems 
Linux kernel PRCTL local privilege escalation 
Linux Kernel Reliable Datagram Sockets (RDS) CVE-2012-2372 Local Denial of Service Vulnerability
Linux Kernel UDF Filesystem Local Buffer Overflow Vulnerability
Linux Kernel Vulnerability, Ethereal Patches 
Linux Mint 14 Is Out
Linux On the TI-Nspire Graphing Calculator
LinuxDevices.com Vanishes From the Web
LIOs Lie
Live Tweeting the Symphony?
Lizard Named For Jim Morrison
LLNL/RPI Supercomputer Smashes Simulation Speed Record
LLSSRV; The end of the Internet; DNS Cache Poisoning; New Handler 
loadadv.exe 
Local Emergency Alert System Hacked, Warns Dead Rising From Graves
Local Leaks Tipsters Allege Steubenville Victim Was Drugged
Lockheed says cyber attacks up sharply, suppliers targeted
Locking Down Facebook, Twitter, Google+ and LinkedIn Accounts - A Guide for Friends and Family
Locky: JavaScript Deobfuscation
Log analysis and marketing decisions don't mix 
Log analysis follow up 
Log Analysis tips? 
Logitech Releases Washable Keyboard
London bombing trojan, update on system monitoring attempts, Updates from Microsoft coming 
London, .us TLD, ... 
Long Range Systems Plan Document
Looking back at "Read-only Switching"
Looking for clues in the secret art work of George W. Bush
Looking for samples of W32.Kiman.A 
Looking for some emails 
Looking for the insider: Forensic Artifacts on iOS Messaging App
Looks like Android is starting to be a major target for Malware
Looks like Microsoft is getting ready to fix random Windows Phon8 reboots
'Looming menace' of evil browser extensions to be demo'd this week
Los Alamos National Labs Has Working Hub-and-Spoke Quantum Network
Losses Claimed By Online Fraud Hit $182 Million 
Lost+Found: Cracked CAPTCHAs and lost ISS codes
Lost+Found: Virus pick 'n' mix, worm plays AC/DC, Flame secrets revealed
Lotus Notes Vulnerable to WMF 0-Day Exploit 
LSASS exploit, SSL PCT exploits, port 559 (tcp) proxy hunter, Bagle.Z 
LTSI Linux Kernel 3.4 Released
LulzSec hackers sentenced for attacking Sony, News Corp and the CIA
Lulzsec Member Raynaldo Rivera Pleads Guilty To Sony Pictures Breach
LulzSec trial: sentence handed down for UK hackers
Lulzsec's Topiary and Ni plead guilty to DDoS attacks
Lynn's Cat is Out of The Bag; Cisco IPv6 Advisory; Log Juggling Courtesy of US Congress 
Lynx user? Upgrade it! 
Mac malware found with valid developer ID at freedom conference
Mac OS X Apple UDIF Disk Image Kernel Memory Corruption 
Mac OS X Bluetooth Worm 
Mac OS X Mountain Lion's Gatekeeper Not Enough to Fight Malware
Mac OS X security updates 
Mac OS X trojan - OSX/Leap 
Mac security software sales jump after Flashback infections make news
Mac Security; Anonymity with Tor; Web Vandals v. Phishers; Paypal Phish Conditioning 
Mac users 'just as easily duped by cybercriminals' as Windows users
MacOS X Java patches 
MacOS X Security Update, more MS04-040 information 
Macromedia Flash Player Vulnerability 
Macromedia, XML-RPC, and Internet Crime 
Macs more likely to carry Windows malware than Mac malware, study finds
Macs under attack, who is safe?
Magellan Telescope First Mega-Mirror Polished and Ready
Magic Finger Turns Any Surface Into a Touch Interface
Magic: the Gathering Is Turing Complete
Machine Learning Allows Actors To Create Games That Understand Body Language
Mail Call Time: More Sony Info and Snort Signatures 
Mailbag - Malware Everywhere, IE Unauthorized Printing 
Mailbag and DShield items generate a post VNC exploitation fun question 
Mailbag Detect info 
Mailbag grab 
Mailbag Items for Ports 1433 and 113 
Mailbag Q&A concerning MS Desktop Search add-on vulnerabilities 
Mailbag Question, ZoneAlarm failure update, Michael Jackson Malware analysis, More on HIDS, IM Name Game submissions 
MailBag Response info about yhoo32-explr, IM malware 
Mailbag 
Mailbag; Upgrade Mozilla Products; Reading Corner 
Major Cisco IOS Vulnerability Announced 
Major Cogent outage 
Major New Trends in Call Centre Software
Major Web Sites Tagged With Malware Notice After Ad Distributor Hacked
Make Your Own LEGO Curiosity Rover
MAKE's 2nd International Maker Meetup: Raspberry Pi
Making our users unlearn what we taught them
Making Robots Mimic the Human Hand
Making sense of mobile device, app, and information management
Making Sure Interviews Don't Turn Into Free Consulting
Malaysia Stages Internet Blackout To Protest New Censorship Law
Malaysian election sparks web blocking/DDoS claims
Maldoc Social Engineering Trick
Maldoc VBA Anti-Analysis
Maldoc VBA Anti-Analysis: Video
Male Scientists More Prone To Misconduct
Malformed MIMEs can bypass AV 
Malfunctioning Malware
Malicious Code Regularly Dodging Defenses, Palo Alto Finds
Malicious RTF Files
Malicious Script; Phish, Bots and What-Nots 
Malicious spam - Subject: RE: Bill
Malicious spam continues to serve zip archives of javascript files
Malicious spam with links to CryptoWall 3.0 - Subject: Domain [name] Suspension Notice
Malicious spam with Word document
Malicious spam with zip attachments containing .js files
Malicious Trojan poses as McAfee alert 
Malicious VBS Script; Mailbag 
Malspam delivers NanoCore RAT
Malware Analysis Project: Tools of the Trade 
Malware Analysis Quiz 5 results 
Malware Analysis Quiz 5 
Malware Analysis Quiz 6 results 
Malware Analysis Quiz 6 
Malware Analysis Quiz 7! 
Malware Analysis Quiz IV 
Malware analysts rejoice! A public submission interface for the CWSandox 
Malware authors expand use of domain generation algorithms to evade detection
Malware Delivered via '.pub' Files
Malware from China; Googkle is gone; IM Worm/Botnet going in circles 
Malware increasingly uses DNS as command and control channel to avoid detection, experts say
Malware Infects US Power Facilities Through USB Drives
Malware propagation information from microsoft. 
Malware quiz 
Malware sample submissions to Microsoft 
Malware samples 
Malware URLs. 
Malware with new features 
Malware 
Malware, eBay, and You. 
Malware: When <!-- comments --> become commands 
Malwares 
Mambo Exploit Confirmed in the Wild 
Mambo exploit making the rounds 
Man arrested for hacking into billing provider
Man facing charges linked to SpyEye virus
Man Pays For Cross-Country Trip Using Bacon As Currency
Manager's Briefing for Microsoft Security Bulletins, MS04-036 Exploit Code, VERITAS Security Patch, Comxt Alternate Data Stream Trojan 
Managing a BYOD Infrastructure
Managing Project Team - Dos & Dont's
Many pcAnywhere systems still sitting ducks
Many vulnerable SAP systems exposed to the internet
Mapping Attack Methodology to Controls
March Microsoft Security Bulletins Released 
MariaDB 5.5.23 arrives with performance improvements
Marketing to Operations: The Organizational Shift for the Small Food Processor
Marlinspike demos MS-CHAPv2 crack
Mars One Contracts Paragon To Investigate Life Support Systems
Mars' Reull Vallis: a River Ran Through It
Mars Rover Solves Metallic Object Mystery, Unearths Another
Massive Amount of Malware Targets Older Java Flaws
Massive Cyber-Espionage Network Targets Valuable Data: Kaspersky
Massive Email Crash Hits Canadian ISP Shaw
Mathematical Breakthrough Sets Out Rules For More Effective Teleportation
Matousec and their Challenge
Matthew Garrett Has a Fix To Prevent Bricked UEFI Linux Laptops
Matthew Keys Has Anonymous-Friendly Lawyers Calling Out 'Crazy Overreach'
MauDweeb: Database Architects of Dune, Chapter 1
MaxForum v1.0.0 Local File Inclusion
Maxmind.com (Ab)used As Anti-Analysis Technique
May 2013 (RSU1304) service package has been tested and is now available
May Microsoft Patches Available 
Maybe don't install that groovy pirated Android keyboard
Maybe With Help From Google and Adobe, Microsoft Can Kill Windows XP
Mayor seguridad por violación en escuela de Ohio
McAfee 4715 DAT False Positive Deletion Reports Follow-up 
McAfee Antivirus vulnerability; Java WebStart vulnerability; pwsteal.bank trojan clarification; 18905/tcp scanning 
McAfee DAT 4715 clean up tool available 
McAfee dumps signatures and proclaims an (almost) end to botnets
McAfee EPO fix 
McAfee May Have Been Captured
McAfee/NAI rolls bad pattern 
McAfee's Top 10 Predictions for 2007 
MD5 Checksum Updated / MD5 Tools for Win32 / Botnets reports 
MEASURING ERP SUCCESS IS LIKE GROWING A GARDEN
Media groups, Filipinos protest tough cyber law
Media groups, Filipinos step up calls for repeal of tough new law against online crimes
Media sanitization NIST website 
Media sanitization 
MediaFire Restores Virus Researcher's Account But Not Individual Files
Medical Firm Sues IRS For 4th Amendment Violation In Records Seizure
Meet "Ophelia," Dell's Plan To Reinvent Itself
Meet Drone Shield, an Ambitious Idea For a $70 Drone Detection System
Meet the 23-Ton X-Wing, the World's Largest Lego Model
Meet the Very First Rover To Land On Mars
Mega Vulnerability Reward Program Starts Payouts: 7 Bugs Fixed In First Week
Melb IT tells ICANN to clear up its clearinghouse act
Merry Christmas to All! 
Merry Christmas to All; More Details on Recent Vulnerabilities 
Merry Christmas 
Merry X-Mas ransomware from Sunday 2017-01-08
Met Police staff guilty of stealing stolen electronic goods
Metasploit Framework 2.6 Released 
Metrics have been enhanced for DB2 stored procedures and UDFs
Mice, Newts Retrieved After a Month Orbiting Earth At 345 Miles Up
Microbes Likely Abundant Hundreds of Meters Below Sea Floor
Micromotors Race About By Turning Water Into Hydrogen Gas
Microservers Take Aim at the Data Center
Microsoft Adds .NET Core, ASP.NET to Bug Bounty Program
Microsoft Advance Notice Out - 11 Patches 
Microsoft advanced bulletin 
Microsoft Advisory 
Microsoft Altering ActiveX in Next Set of Patches 
Microsoft and FBI storm ramparts of Citadel botnets
Microsoft ASP.NET vulnerability, URL obfuscation, more MD5 
Microsoft attacks Zombi Masters. 
Microsoft August 2006 Patches: STATUS 
Microsoft awards $250,000 prize for new mitigation features
Microsoft BITS Used to Download Payloads
Microsoft Black Tuesday - December 2006 overview 
Microsoft black tuesday - October 2006 STATUS 
Microsoft Black Tuesday Overview 
Microsoft Black Tuesday Patches 
Microsoft blames security info-sharing program for attack code leak
Microsoft borks botnet takedown in Citadel snafu
Microsoft Buffer Overrun in RPC 
Microsoft Buys Cloud Gateway Provider StorSimple
Microsoft censors Pirate Bay links from IM
Microsoft December advance patch notification 
Microsoft December Patches 
Microsoft denies Windows 8 app spying via SmartScreen
Microsoft douses "Flame"
Microsoft Emergency Bulletin: Unauthorized Certificate used in "Flame" , (Mon, Jun 4th)
Microsoft Ends Lawsuit as Chinese Botnet Host Settles
Microsoft Essentials protection is declining
Microsoft exploits on Reboot Wednesday 
Microsoft February 2016 Patch Tuesday
Microsoft February Patch Tuesday Advance Notification, (Fri, Feb 8th)
Microsoft 'fesses credit cards exposed by Indian store hack
Microsoft Files Dispute Against Current Owner of XboxOne.com
Microsoft Fixes 19 Security Flaws in November Patch Tuesday Update
Microsoft has reissued Service Pack 2 for Office for Mac 2011
Microsoft helps you choose “good passwords”. 
Microsoft India warns hackers may have compromised customer financial data
Microsoft installs Skype without consent
Microsoft Issues XSS Patches, but Security Researchers Focus on Oct. Update
Microsoft July Security Bulletin Review 
Microsoft latest to 'fess up to Java-based Mac attack
Microsoft leads seizure of Zeus-related cybercrime servers
Microsoft Makes Direct X 11.1 a Windows 8 Exclusive
Microsoft Makes Millions Renting Campus Space to Vendors
Microsoft May Acquire Nook Tablet Business From Barnes and Noble
Microsoft May Be Seeking Protection From Linux With Dell Loan
Microsoft may have leaked attack code for critical Windows bug, says researcher
Microsoft May Replace Xbox Live Chat With Skype
Microsoft non-patch; 8181 TCP; Safer Internet Day 
Microsoft November Bulletins 
Microsoft October Patch Pre-Announcement, (Thu, Oct 4th)
Microsoft October Security Bulletin Advanced Notification 
Microsoft offers workarounds for IE bug
Microsoft Office 2004 - Mac OS X updated 
Microsoft Out of Cycle Patch: IE http://technet.microsoft.com/en-us/security/bulletin/ms13-jan, (Mon, Jan 14th)
Microsoft patch day 
Microsoft patch problems 
Microsoft patch troubles ? 
Microsoft Patch Tuesday Addresses 57 Security Vulnerabilities
Microsoft Patch Tuesday Advance Notice 
Microsoft Patch Tuesday Analysis
Microsoft Patch Tuesday brings four critical updates
Microsoft Patch Tuesday followup: KB3097877 re-issued!
Microsoft patch tuesday problem with Symantec Cloud Endpoint protection?
Microsoft Patch Tuesday Summary for April 2016
Microsoft Patch Tuesday Summary for May 2016
Microsoft Patch Tuesday, August 2016
Microsoft Patch Tuesday: Expected Exchange patch problems. 
Microsoft patches are out; Port 80 spike; Mail bag; Firefox 1.0.5 released; Oracle and Apple too! 
Microsoft Patches Internet Explorer Zero-Day Flaw in Security Update - Security - News & Reviews - eWeek.com
Microsoft Patches Released 
Microsoft patches released; H.323 vulnerabilities; Anti-virus engine vulnerabilities; Citibank anti-fraud measures
Microsoft Patching Observations 
Microsoft pays big to strengthen software defense
Microsoft Phases Out XNA and DirectX?
Microsoft Powerpoint Security Advisory Released 
Microsoft Prepares Rethink On Windows 8
Microsoft promises two-step IE fix
Microsoft Release 2007 Time Zone Update for Windows Operating Systems 
Microsoft Releases 3 Critical Patches - Hilarity Does Not Ensue; MS Patches Reset Settings in Program Defaults? 
Microsoft Releases Fix It Tool to Fight IE Zero-Day Flaw
Microsoft Releases Fix It Tool to Fight IE Zero-Day Flaw - Security - News & Reviews - eWeek.com
Microsoft Releases IE Cumulative Patch (MS04-004) 
Microsoft Releases Updates (1 - Critical, 2 - Important) 
Microsoft Releases Updates 
Microsoft Reportedly Working On Xbox TV Device
Microsoft Retiring Messenger, Replacing It With Skype
Microsoft RPCSS Vulnerability 
Microsoft rushes Explorer 8 patch release
Microsoft says don't use PPTP and MS-CHAP
Microsoft Security Advance Bulletin (7 updates, at least 2 Critical) 
Microsoft Security Advisory (917077) 
Microsoft Security Advisory (927892) 
Microsoft Security Bulletin Advanced Notification 
Microsoft Security Bulletin MS06-037 
Microsoft Security Bulletin MS06-038 
Microsoft Security Bulletin MS06-052 
Microsoft Security Bulletin MS06-053 
Microsoft Security Bulletin MS06-054 
Microsoft Security Bulletin MS15-093 - Critical OOB - Internet Explorer RCE
Microsoft Security Bulletins / You got a Postcard! 
Microsoft Security Bulletins Released for April, ISC Webcast on Wednesday 
Microsoft Security Bulletins 
Microsoft security patches for September 2006 
Microsoft Security Patches, VBS/Inor Trojan Variant, Phrack 62 Release, BHODemon Mirror 
Microsoft Sept Patches and Weblogic vulnerability 
Microsoft slams Google over iPhone, Mac privacy boner
Microsoft Surface Pro Arrives Feb. 9
Microsoft SUS not playing well 
Microsoft takes Bing Streetside offline in Germany after privacy complaints
Microsoft takes down ZeuS botnets
Microsoft time (cont.); Firefox exploits; PAWS exploit; port 445 
Microsoft To Abandon Windows Phone?
Microsoft to close critical IE hole with a temporary Fix-it
Microsoft to devs: Bug users about security … <i>now!</i>
Microsoft to devs: Bug users about security … <i>now</i>!
Microsoft to Patch Adobe Flash Player in Windows 8 'Shortly'
Microsoft to release fixes for latest IE security exposure
Microsoft unleashes Windows attack tool
Microsoft Upcoming Bulletins Release 
Microsoft Update on Windows 98, Microsoft Outlook 
Microsoft Updated Security Advisory (917077) and APWG Report released 
Microsoft updates - overview 
Microsoft urges customers to install security tool
Microsoft Urges Users to Patch Internet Explorer Flaw - Security - News & Reviews - eWeek.com
Microsoft Urging Safari Users To Use Bing
Microsoft warns on Internet Explorer security flaw
Microsoft Windows RPCSS Vulnerability Update 
Microsoft Windows Update Errors 
Microsoft Word Vulnerability 
Microsoft XP SP2 blocker tool expiration ; Microsoft JetDB Engine DB File Buffer Overflow ; (Unintentional) DNS Cache poisoning ; Are you a spambot? 
Microsoft XP SP2 wireless hotfix 
Microsoft, FBI Takedown Citadel Botnet
Microsoft, Oracle Patch Serious Security Flaws Targeted by Attackers
Microsoft: Pirates at high risk of malware infection
Microsoft-Built Smartphone Could Irritate Hardware Partners, Harm Nokia
Microsoft's September Updates 
Microsoft's Surprise Box / Port 42 and 8634 / My personal poll 
Middle Management kills a lot of leaders?
Michigan Physicians Benefit From HIPAA Compliant E-Prescribing
Mikko Hypponen's Malware Odyssey
Military Dolphins Discover 1800s Torpedo
MIMAIL/MyDoom/Novarg Email Virus Continues; H.323 Problems in Firewalls 
Minecraft now available for free on the Raspberry Pi
Mirai - now with DGA
Mirai Scanning for Port 6789 Looking for New Victims
Misc. Items 
Miscellaneous news 
MISP - Malware Information Sharing Platform
Missile Test Creates Huge Expanding Halo of Light Over Hawaii
Missouri Legislation Redefines Science, Pushes Intelligent Design
Missouri Republican Wants Violent Video Game Tax
Mistakes over GCHQ codebreaker's death crippled inquiry
MIT Research Tweaks Smartphone Amplifier Voltage To Gain Battery Life
MIT Researchers Show Dash Font Choice Affects Distraction
MIT To End Open-Network Policy In Response To Recent Attacks
MIT Warned of a JSTOR Death Sentence Due To Swartz
Mitglieder hell 
Mitigating New Cyber Threats Targeting Michigan Businesses with Secure Michigan Hosting
Mixed bag for a quiet Sunday 
Mixed Messages : Novel Phishing Attempts Trying to Steal Your E-mail Password Goes Wrong
Mobile CRM for on-the-go
Mobile dev site: We never knew about Facebook, Apple hacks
Mobile device management: Getting started
Mobile Devices Will Outnumber People By 2017
Mobile location data identifies individuals
Mobile Operator Grabs 4G Lead In UK — But Will Anything Work On It?
Mobile Recruitment on the Move?
MobileCartly 1.0 Remote File Upload Vulnerability
Mobiles susceptible to radio hacks
Mobility, cloud computing, security issues to dominate Interop
Modeling Color Spaces With Blender
Modified Malware for the IE Expoit 
Mojang Releases Minecraft: Pi Edition</em> For the Raspberry Pi
Monitoring Network Traffic for Android Devices
Monitoring your kids on Facebook? That's so 2009.
Monthly Threat Update Webcast 
Moore's Law Is Becoming Irrelevant, Says ARM's Boss
Moore's Law leaves mobile networks ripe for attack
More .wmf Woes 
More 802.11 soup 
More about the host based firewall on Windows XP SP2 
More agobot/phatbot/polybot variants, cPanel resetpass exploit 
More Brute-Force PW Scans, Opteron Exposed, Follow the Bouncing Malware - Part I 
More CA BrightStor ARCserve Backup... Is your IDS/IPS Dead?... And Persistent Netcat Listener with While Loop 
More Cisco/Blackhat 
More CVS woes 
More DNS Tricks 
More Email Tips 
More Fragmentation; What is Normal Part II 
More From Canonical Employee On: "Why Mir?"
more https scanning reports 
More IFRAME, phishing and BHOs; Java Security 
More Malicious JavaScript Obfuscation
More MS06-042 woes 
More Multi-Architecture IoT Malware
More on Blackmal/Grew/Nyxem (file deletion payload) 
More on blue security DDOS - DDOS response 
More on encoded malware 
More on hunting rogue access points 
More on MS04-007 
More on Nyxem 
More on Outlook Anti-Phishing Feature 
More on Protocol 47 denys
More on Registry Concealment; suspected Zotob author arrested 
More on Symantec vulnerabilities 
More patch tuesday: adobe released security update for adobe flash player
More patches! This time from Apple to Safari, OS X and OS X server
more phpBB 2.0.12 fun; Identity theft; alternative browser java exploit 
More RPC DCOM - SDBot News 
More Sober Variants 
More SoBig comments, and Whack-A-Scam, Ultr@VNC Vulnerability 
More spam for your inbox 
More tools, Google summer of code 
More Veritas Backup Exec fun / The search for open relays continues / Santy still running around making trouble / Mailbag 
More WMF Signatures 
Most Companies Will Require You To Bring Your Own Mobile Device By 2017
Most SSDs Now Under a Dollar Per Gigabyte
Most UK GPs Have Prescribed Placebos
'Most US banks' were DDoSed last year - survey
Most webmasters don't know how their websites got hacked, report says
Mostly Quiet Weekend -- Educating Users on Mass Mailing Viruses 
Mother Nature - Please Help Us Cool Our Server Room 
Move Over Apple - Samsung Files For a Patent On Page Turn
Move to Yellow, Potential PCT worm, No Osama has NOT been captured, New Virus, Symantec Firewall Vulnerability 
Moving Precautions for the Security Paranoid Types 
Mozilla blocklists Java on older Mac OS X systems
Mozilla Combines Social API and WebRTC
Mozilla Firefox 1.5.0.8 and Thunderbird 1.5.0.8 Released 
Mozilla Firefox 2 officially released 
Mozilla Firefox vulnerabilities and upgrade 
Mozilla Foundation Security Advisory 2015-112
Mozilla gives CAs a chance to come clean about certificate policy violations
Mozilla Launches Firefox OS 3.0 Simulator
Mozilla Thunderbird 1.5 Release 
Mozilla's Firefox update fixes three critical holes
MP Seeking To Outlaw Written Accounts of Child Abuse
MplayerX Leaving Mac App Store
MS 06-034 Update 
MS 06-034 woes? 
MS Advisory on the Vulnerability in RDP; Port 3389; FormMail Attempts 
MS Black Tuesday? 
MS Desktop Search add-on vulnerabilities - Trustworty Computing gone too far 
MS genuinely surprised 250,000 unique systems infected with Alcan.B 
MS Help For SP2 Setup Problems, The Phishin' Hole, Follow the Bouncing Malware, Part II 
MS Monthly Updates Released 
MS November Security Bulletin Advance Notification 
MS Office 2013 - New Macro Controls - Sorta ...
MS Office buffer overflow vuln, still more botnets, and don't be a baddie, be a goodie!, 2004 SANS Top 20 List 
MS Office vulnerabilities (-058, -059, -060, -062) 
MS Patch Tuesday Advance Notice 
MS Responds to IE Vulnerabilites With Patch 
MS Security Alert Advanced Notice, Cisco PIX Source Code Reported Stolen, Open Letter to Anti-Virus Software Companies 
MS SMB zero-day? 
MS to Release Update on Jan 10 
MS tool to help ensure that your application does not have administrator access as a dependency 
MS Update to MS06-015 and a Separate Fix for AEC.SYS Issue 
MS Windows Memory Allocation Denial of Service Via RPC 
MS04-007 Exploit released 
MS04-009 Upgraded to Critical, Disable Outlook HTML Parser, 'Phatbot', NetSky Day 
MS04-028 PoCs and Exploits released / UPDATE: Snort Rules 
MS04-028 Proof of Concept Rumors; Beyond Patching; Mailbag 
MS04-028 Public Exploit Attempts, VENDORS TAKE NOTE, Contacting ISC 
MS05-019 update troubleshooting; Practicing safe forwarding in BIND; 9999/TCP spike;TCPDump Buffer Overflows; MS05-020 POC Released;Spyware Lawsuit 
MS05-036 Color Management Exploit Code in Wild; mod_jrun exploit scanning from Europe; Insecure by Design 
MS05-039 Worm in the wild 
MS05-044 Folder View for FTP Sites - mailbag item 
MS05-044 Windows FTP Client File Transfer Location Tampering 
MS05-045: Network connection Manager DoS 
MS05-046 Client Service for NetWare Vulnerability 
MS05-047 Vulnerability in PnP Could Allow Remote Code Execution 
MS05-048 CDO Object Remote Code Execution 
MS05-049 Windows Shell Vulnerability 
MS05-050 Vulnerability in DirectShow 
MS05-051 (MSDTC) Malware / Port 1025 
MS05-051 exploit info and rumors 
MS05-051 exploit spotted 
MS05-051 POC Exploit 
MS05-051 Vulnerabilities in MSDTC and COM+ 
MS05-052 Cumulative Security Update for Internet Explorer (896688) 
MS05-053 - More Graphic Rendering Buffer Overflow Vulnerabilities 
MS06-005 proof of concept exploit released 
MS06-011 Updated 
MS06-015 will not provide patch for windows 98 and ME. 
MS06-021: Internet Explorer patch 
MS06-022: buffer overflow in ART image rendering library 
MS06-023: Microsoft's JScript remote code execution 
MS06-024: buffer overflow in windows media player 
MS06-025: RRAS arbitrary code execution 
MS06-026: Graphics Rendering Engine / Remote Code Execution 
MS06-027: MS Word object pointer / Remote Code Execution 
MS06-028: PowerPoint malformed record / Remote Code Execution 
MS06-029: Script injection through Exchange/OWA 
MS06-030: Microsoft SMB Vulnerabilities 
MS06-031: RPC Mutual Authentication Vulnerability 
MS06-032: Source routing buffer overflow 
MS06-034 - unchecked IIS buffer vulnerability in ASP files processing 
MS06-035 - Patch now! 
MS06-036 - unchecked buffer Vulnerability in DHCP Client Service Could Allow Remote Code Execution (914388) 
MS06-039: vulnerabilities in Microsoft Office GIF and PNG parsers 
MS06-040 and MS06-042 updates 
MS06-040 exploit(s) publicly available 
MS06-040 wgareg / wgavm update 
MS06-040 Worm 
MS06-040: BOLO -- Be On the LookOut 
MS06-040: Server Service 
MS06-041: Vulnerability in DNS Resolution Could Allow Remote Code Execution (920683) 
MS06-042 and CA Unicenter Service Desk 
MS06-042 and IE 6.0 SP1 issues 
MS06-042: Internet Explorer Rollup Patch 
MS06-043: Vulnerability in Microsoft Windows Could Allow Remote Code Execution (920214) 
MS06-044: Microsoft Management Console Cross Site Scripting. 
MS06-045: Windows Explorer Remote Code Excution Vulnerability 
MS06-046: HTML Help Remote Code Execution 
MS06-047: Office & Visual Basic for Application 
MS06-048: Microsoft Office Remote Code Execution Vulnerabilities 
MS06-049 re-release 
MS06-049: W2k Kernel Bug 
MS06-050: Vulnerabilities in Microsoft Windows Hyperlink Object Library Could Allow Remote Code Execution (920670) 
MS06-051: Vulnerability in Windows Kernel 
MS06-053 revisited ? 
MS06-056: ASP.NET XSS Information Disclosure Vulnerability (moderate) 
MS06-057: Vulnerability in Windows Shell Could Allow Remote Code Execution (926043) 
MS06-061 
MS06-061: XSLT/MSXML Buffer Overflow Code Execution Vulnerability (moderate) 
MS06-063: Mailslot DoS (Server service) 
MS06-064: Vulnerabilities in IPv6 
MS06-065: Remote Code Excution in Windows Object Packager 
MS06-066: Netware Client Service Buffer Overflow 
MS06-067: Internet Explorer DirectAnimation and HTML Rendering Vulnerability 
MS06-068: Microsoft Agent 
MS06-069: Adobe Flash Player 
MS06-070 Remote Exploit 
MS06-070: Workstation service 
MS06-071 is available via SUS 1.0 
MS06-071: MSXML Core Services 
MS06-072: Cumulative Security Update for Internet Explorer (925454) 
MS06-073: WMI Object Broker Vulnerability (CVE-2006-4704) 
MS06-074: SNMP Buffer Overflow (CVE2006-5583) 
MS06-075: csrss local privilege escalation (CVE-2006-5585) 
MS06-076: Windows Address Book Contact Record flaw (CVE-2006-2386) 
MS06-077: Remote Installation Service (RIS) remote exploit 
MS06-078: 2 Windows Media Format Vulnerabilities (CVE-2006-4702, CVE-2006-6134) 
MS12-045 - Critical : Vulnerability in Microsoft Data Access Components Could Allow Remote Code Execution (2698365) - Version: 1.2
MS12-052 - Critical : Cumulative Security Update for Internet Explorer (2722913) - Version: 1.1
MS12-060 - Critical : Vulnerability in Windows Common Controls Could Allow Remote Code Execution (2720573) - Version: 1.1
MS12-062 - Important : Vulnerability in System Center Configuration Manager Could Allow Elevation of Privilege (2741528) - Version: 1.1
MS12-066 - Important : Vulnerability in HTML Sanitization Component Could Allow Elevation of Privilege (2741517) - Version: 1.2
MS12-069 - Important : Vulnerability in Kerberos Could Allow Denial of Service (2743555) - Version: 1.1
MS12-072 - Critical : Vulnerabilities in Windows Shell Could Allow Remote Code Execution (2727528) - Version: 1.1
MS12-073 - Moderate : Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Information Disclosure (2733829) - Version: 2.0
MS13-004 - Important : Vulnerabilities in .NET Framework Could Allow Elevation of Privilege (2769324) - Version: 2.0
MS13-005 - Important : Vulnerability in Windows Kernel-Mode Driver Could Allow Elevation of Privilege (2778930) - Version: 1.1
MS13-005 - Important : Vulnerability in Windows Kernel-Mode Driver Could Allow Elevation of Privilege (2778930) - Version: 1.2
MS13-006 - Important : Vulnerability in Microsoft Windows Could Allow Security Feature Bypass (2785220) - Version: 1.1
MS13-009 - Critical : Cumulative Security Update for Internet Explorer (2792100) - Version: 1.1
MS13-010 - Critical : Vulnerability in Vector Markup Language Could Allow Remote Code Execution (2797052) - Version: 1.1
MS13-038 - Critical : Security Update for Internet Explorer (2847204) - Version: 1.1
MS13-040 - Important : Vulnerabilities in .NET Framework Could Allow Spoofing (2836440) - Version: 1.1
MS13-044 - Important : Vulnerability in Microsoft Visio Could Allow Information Disclosure (2834692) - Version: 1.1
MS13-048 - Important : Vulnerability in Windows Kernel Could Allow Information Disclosure (2839229) - Version: 1.1
MSFT Patches / DrudgeReport headline - ...huge computer attack... 
MSFT Reaches Out To Hackers: 'Do Epic $#!+'
MSIE DirectAnimation ActiveX 0-day update 
MSIE IE7 Popup Address Bar Spoofing Vulnerability 
MSIE 'Sploit du Jour 
MSIE: One patched, one pops up again (setslice) 
MSN Messenger; Notable Activity on Port 903, 1063, 1978; Steps to Beat Phishing 
MSN-Worms exploit MS pif filter vulnerability 
MSRC Blog Entry about POC of MS06-035 
MSXML 4.0 exploit in the wild 
MTBF Blues 
Multinationals in China fear IP theft by local staff
Multi-platform spyware penetrates smartphones and VMs
MultiPlatform/MultiBrowser Java Vuln, Yo! Microsoft!, Open Letter To Anti-Virus Software Companies - A Response, No Bounce 
Multiple anti-virus software evasion 
Multiple Cisco Products affected by IKEv1 Vulnerability
Multiple DoS Vulnerabilities in Wireshark 
Multiple Exploits Avaliable for MS06-005 and MS06-006 
Multiple Exploits targeting Microsoft MS-04-011 vulnerabilities threaten networks. 
Multiple Greeting Card scams; MSFT time server; Sober next Monday; Netscape 8.01; Pharming 
Multiple Linksys WRT54G Vulnerabilities 
Multiple security vulnerabilities in Secure Elements Class 5 AVR (EVM) 
Multiple Studies Show Used Electronics Exports To Third World Mostly Good
Multiple vulnerabilities fixed in Firefox, Thunderbird and Seamonkey 
Multiple vulnerabilities in Symantec Veritas NetBackup 
Multi-Tenancy Revisited
Multitenant Architectures Must Balance Security, Availability
Musings and More WMF Information 
Musings on the Internet Explorer 0-day vulnerability 
Mwcollect and Nepenthes merging (1 Comments)
My book got a bad review... and a good one
My Information Governance presentations at IBM IOD 2012
MyDoom Details, ssh password brute forcing. 
MyDoom.A Timeline, MyDoom.B DDoS a Non-Event 
MyDoom.B Update 
MyDoom-O hits search engines hard. 
MySpace QuickTime Worm 
MySQL MERGE Table Privilege Revoke Bypass 
Mystery port 3072 and MS04-22 Exploit code available 
Nagios vulnerability 
Nachia B Worm, Microsoft XML 
Nachia Decline; Increased Activity on Port 1026 
Name.com Resets All Passwords Following Security Breach
named/bind error messages - solved 
Nameserver dynamic DNS abuse attack trend, 
Nanoscale 3D Printer Now Commercially Available
NASA "Mohawk Guy" To Host Radio Show
NASA and CSA Begin Testing Satellite Refueling On the ISS
NASA Cancels Nanosat Challenge
NASA Craft To Leave Vesta Heads For Dwarf Planet Ceres
NASA Fires Up Experimental Space Internet For Robot Control
NASA IG Paints Bleak Picture For Agency Projects
NASA Morpheus Lander Test Ends In Explosion
NASA Mulling Earth-Moon L2 Point for Mars Staging Station
NASA Planes Fly Over Bay Area To Measure Air Pollution Levels
NASA Pondering L2 Outpost, Return To Moon
NASA Releases Orbital Photos of Beijing's Air Pollution
NASA Says Asteroid Will Buzz Earth Closer Than Many Satellites
NASA Suffered Intrusion at Jet Propulsion Lab (March 1, 2 & 5, 2012)
NASA Teams With LEGO To Offer Model Competition
NASA TESS Observatory Will Hunt For Alien Life On "Super-Earth" Exoplanets
NASA Testing Supersonic X-51A Jet Tomorrow
NASA To Face $1.3 Billion Cut Next Year Under Sequestration
NASA Trailer To Be Shown Before Star Trek: Into Darkness</em>
NASA Wants New Space Net To Sustain Big Data Dumps; Moon and Mars Trips
NASA: Mission Accomplished, Kepler – Now Look Harder Still
NASA's Fermi Spacecraft Dodged a Defunct Russian Satellite
Nasty Games of Hide and Seek in the Registry; Nepenthes 
Nate Silver, Microsoft Research Predict the Oscars
National Security Letters Ruled Unconstitutional, Banned
NATO Holds Annual Cyber Defense Exercise
'Natural health' website apparently hacked by sinister forces
Nature Lover Vladimir Putin Flies With the Cranes
NBN Co hoses down 'scary Russian crackers' report
Nearest Alien Planet Gets New Name
Nebraska Sheriff Wardriving, Sending Letters About Unsecured Wi-Fi
Nebula Debuts 'Cloud Computer' Based On OpenStack
Neil deGrasse Tyson Pinpoints Superman's Home Star System
Nessus and Powershell is like Chocolate and Peanut Butter!
Net Neutrality and Information Security 
Netcraft Report - HostGator servers exploited via cPanel, allowing redirection & VML exploitation 
Netflix Gives Data Center Tools To Fail
Netflix Using HTML5 Video For ARM Chromebook
Netscape URL Domain Name Buffer Overflow 
Netsky.b Virus / Win98 ASN.1 patch / new Mremap PoC 
Netsky.P Triggered, MSVC++ Constructed ISAPI Applications DoS 
NetSol Worldnic DNS server issues 
Network Engineering Q&A Site Launched
Networked Cars: Good For Safety, Bad For Privacy
NetworkSolutions Down Again - Not a DoS Attack 
NetworkSolutions down 
Neutrino exploit kit sends Cerber ransomware
New {Phat|Ago|Gao}bot Variant(s) ? - Followup on port 1981 increase 
New Acrobat release (including reader) available. Version 11. Some security improvements more here -->http://blogs.adobe.com/adobereader/, (Wed, Oct 17th)
New Adobe vulnerability 
New AIM worm 
New and Improved Honeynet Tools availability 
New app from Finland takes crime fighting to phone screen
New approaches to combat 'sources of evil' and other security issues
New AV Updates; TEMPEST makes a comeback 
New backdoor - Trojan.Kaht - exploits WebDav vulnerability 
New Bagle in Encrypted Zip File Attachments 
New Bagle Making the Rounds? 
New Bagle Variant Spreading 
New Bagle variant 
New Bagle variants 
New Bagle/Beagle Variants, Fragmentation Attacks, Gmail XSS Hole 
New Bagle; RECon REPort; DC702 Summit 
New Beagle on the war path 
New Beagle/Bagle-Related Malware Variants; A Note from David Litchfield 
New Botnet? 
New Burp Feature - ClickBandit
New Camera Sensor Filter Allows Twice As Much Light
New critical Java flaw claimed
New Data Center Modeled After a Space Station
New Data Retention Rules Effective Today 
New Device Sniffs Out Black Powder Explosives
New Diary Format 
New DNS modifying malcode 
New DRM-Free Label Announced
New DVD Training - Learning Oracle 11g
New email virus making the rounds 
New Ethereal released; A different Kind of Storm Center 
New Excel 0day (Are we evolving or going in circles?) 
New Exploit for HTML Help Workshop vulnerability 
New Exploits and Vulnerabilities; tcp/445 Wrap-up; 40 Million Credit Cards; HP .gif; Geek Wall Art 
New feature at isc.sans.org 
New Features for Microsoft Patch Data
New Federal Mobile IT Strategy Must Address Security
New Firefox Vulnerability 
New Firefox Vulnerability(?) 
New Flat Lens Focuses Without Distortion
New Fraudulent email from MS; e-voting software co. compromised 
New FTP Brute Force? - German publisher DOSed 
New Hacker Challenge 
New HAL Exoskeleton: A Brain-Controlled Full Body Suit To Be Used In Fukushima
New Handler Pages Are Here! 
New Handler: Mohammed Haron 
new Haxdoor 
New Honeynet Forensics Challenge! Deadline is Feb 15 2013. Check https://www.honeynet.org/challenges/2012_13_message_picture, (Thu, Jan 3rd)
New Challenge: Hack Bill! 
New I.E Exploit Security Advisiory Released 
New IE 0-Day Drag-N-Drop-N-PopUnder-N-GrabFocus-N-DoTheHokeyPokey Vuln. 
New IE 0-Day Exploit in Wild 
New IE Exploit PoC; phpBB notes; new book 
New IE Vulnerability 
New IM Worm Exploiting WMF Vulnerability 
New Information from Symantec regarding the NSIS false positive 
New Internet Explorer and an old vulnerability 
New ISC PGP Key 
New ISC Poll - Are you currently using a Security Information and Event Management (SIEM) solution to collect security logs?, (Sun, Jul 15th)
New Jersey lawmakers want copier hard drives wiped to prevent ID theft
New LAND Attack on Windows XP and 2003 Server; Instant Messenger Malware 
New Linux/Unix Backdoor; Another Windows Backdoor 
New list of Trendnet Web Cams posted on paste bin - bonus you get a Google map too
New LSASS RPC exploit; Port 443; The Week Ahead 
New Malware for MS06-047 
New Mambo, Joomla releases fix security vulnerabilities 
New mass mailer spreading (Blackmal/Grew/Nyxem) 
New Mass Mailing Virus 
New MassMailing Virus - Sober.C; Limit Exposure During Breaks; Upcoming Repeat Virus Outbreaks 
New Microsoft Updates 
New Monster Phish Bait 
New Mydoom / Hurricanes 
New MyDoom In The Wild 
New MyDoom Variant uses unpatched exploit, Phishing tip, AV False Positive, Virus Naming 
New mydoom variant; ARCserve exploitation has begun... got Port 41523 TCP packets? 
New MyDoom Variation; SHA1; an increase in port scanning on ports 137 and 445; port 41523 captures 
New Netsky Variant 
New old virus; Apple patches; Corporations at large 
New OpenFlow Controller, Virtual Switch Debut from NEC
New OS X PoC virus 
New Phishing Technique / Vulnerability Data Base Resource 
New Poll: Top 5 Unresolved Security Problems of 2012, (Tue, Nov 20th)
New poll; DNS spikes; Witty worm analysis; LISTSERV vuln; ZoneAlarm clarification 
New PostgreSQL versions released (SQL injection issue with multi-byte encodings) 
New release of PCI DSS (version 3.2) is available
New release of snort is available Snort 2.9.4.5, details on www.snort.org (thanks Bill) , (Wed, Apr 3rd)
New Sasser Worm FTP exploit and Java DOS 
New Skype vulnerabilities 
New Snort signature for SSL Bomb DoS; Continued MS Exploit Development; Port 905 Slight Increase 
New Sober variant in the wild 
New Sober Variant, Compromised Servers Deliver Spy/Adware?, Phishing Reports, No Honor Among Thieves II
New Study Shows Universe Still Expanding On Schedule
New Switchvox Products Highlight Role of Hardware
New target for 419 fraudsters: Struggling 'weak' banks
New tool to diagnose and repair .NET Framework 4
New tool: docker-mount.py
New UrSnif/Haxdoor Variant 
New variant of CryptoWall - Is it right to call it 4.0?
New variant of mambo exploit making the rounds 
New Veritas Exploit on the wild / Geek Wall art summary / Portuguese Language Community 
New Version of MYTOB is causing an escalation of Risk Alert 
New version of Netsky 
New version of OSX available 
New Version of PHP, Cisco Advisory, BurstNET DoS'd 
New version of QuickTime (7.0.3) 
New Virus Behavior / GDIScan Questions 
New Virus Masquerades as Microsoft Support (Palyh) 
New virus, exploits, and old tricks. 
New Viruses This Week; Possible Decrease in Phishing emails; This Handler's observation 
New Vulnerability Announcement and patches from Apple 
New WiFi Protocol Boosts Congested Wireless Network Throughput By 700%
New Windows Kernel Issue (MoKB) 
new Windows RPC issue (race condition), RANDEX.Q virus 
New Windows service ACL security advisory released (914457) 
New Windows update; Katrina information still flowing 
New Workflows using Your Tablet
New Year's Resolution: Build Your Own Malware Lab?
New Years Resolutions
New York Times says Chinese hackers hit its networks as paper investigated leader's wealth
New York Times says targeted by China hackers after Wen report
New Zealand Draft Patent Law Rewritten After Microsoft Meeting
New Zealand's internet bad boy wants to see top lawman
New Zealand's internet bad boy wants to see top U.S. lawman
Newly Spotted Comet May Shine Among Brightest In History
News From Microsoft 
News Roundup: UC, Storage and Security
News Summary: Brand new laptop has malware
Next Mars Mission Selected For Funding
NHTSA and DOT Want Your Car To Be Able To Disable Your Cellphone Functions
NIMH Distances Itself From DSM Categories, Shifts Funding To New Approaches
Nintendo Power To Shut Down
Nintendo Wii U Teardown Reveals Simple Design
Nissan Develops Emergency Auto-Steering System
Nissan says hackers stole user IDs, hashed passwords
NIST Publishes Draft Guidelines For Server BIOS Protection
NKorea accuses US, SKorea of cyberattacks
NMAP + XML + PERL = Fun 
nmap 4.00 released 
nmap 6.01 released - http://nmap.org/download.html, (Sun, Jun 24th)
Nmap 7.00 is out!
nmap-4.20 released 
No Bomb Powerful Enough To Destroy an On-Rushing Asteroid, Sorry Bruce Willis
No DVD playback in Windows 8 (unless you want to pay for it)
No GPS in the iPad Mini Wi-Fi: People are right to criticise
No microsoft patches are available at www.NOT-A-Microsoft-security-site.com 
No Microsoft patches for December 
No More "Asperger's Syndrome"
No more Bagel, Bagle, Beagle 
No more WIndows Home Server
No partisan fight over cybersecurity bill, GOP senator says
No Skype traffic released to cops or spooks, insists Microsoft
No Wi-Fi Around Huge Radio Telescope
Nokia "Suspends" Its Free Developer Program
Nokia Bets Big On Mapping
Nokia Claims a Memory Card Slot Would Have "Defiled" New Phone
Nokia decrypts browser traffic, assures public not to worry
Nokia determined to win race to the bottom with dirt-cheap $20 handset
Nokia Receives $1.35B Grant To Develop Graphene Tech
Nokia Siemens Networks to tap markets for 700 million euros: FT
Nokia Spinning Featurephones as Smartphones
Non-Microsoft Patch available for IE bug 
Non-standard Incident Prediction 
Non-Volatile DIMMs To Ship This Year
NORKS says USA attack took it offline ... as if anyone could tell
Norman Sandbox under DDoS Attack 
North Korea Declares a State of War
North Korean crackers hit South Korean hacks
Norwegian Study: Global Warming Less Severe Than Feared
Norwegian teens arrested over SOCA DDoS attack
NOT a Quiet Day 
Not done yet: Oracle to ship revised Java fix on February 19
'Not guilty' plea in Utah cop site hacking case
Notable quotes from RSA 2012
Notable Tidbits 
Notepad++ web site compromised
Notes from the DShield Forum 
Notification UI Overhauled in KDE 4.10 (And a Plan For Modernized Notifications)
Novel method for slowing down Locky on Samba server using fail2ban
Novell ZENworks Asset Management Remote Execution
November 2015 Microsoft Patch Tuesday
November 2016 Microsoft Patch Day
NSA Documents on 'PerfectCitizen' Program Raise Many More Questions
NSA chief asks hackers at Defcon for help securing cyberspace
NSA PRISM-gate: Relax, GCHQ spooks 'keep us safe', says Cameron
NSA security expert worries about mobility, cloud
NSA: 'Dozens of attacks' prevented by our snooping
NSA: 'Dozens of attacks' prevented by snooping
NSW Information Commissioner sends email to wrong list
NT 4.0 Protection 
NT botnet submitted 
Nuclear Arms Cuts, Supported By 56% of Americans, Would Make the World Safer
Nuclear EK traffic patterns in August 2015
Nuclear plant safety report on USB stick lost by official
Nuclear Rocket Petition On White House Website
Nuevo virus informático ataca a venezolanos
'Nuke-busting' Stuxnet BOOSTED Iran nuke effort, says brainiac
'Nuke-busting' Stuxnet HELPED Iranian nuke project, says boffin
Number Theory 
Number-munching clouds are godsend for cybercrooks - experts
Numbers Spam Solved 
NVIDIA and AMD Launch New High-End Workstation, Virtualization, and HPC GPUs
NVIDIA GeForce GTX TITAN Uses 7.1 Billion Transistor GK110 GPU
NVIDIA Launches GeForce 700M Mobile GPUs With Improved Power Management
NY Attorney General Subpoena's Craigslist For Post-Sandy Price Gougers
NY Times' Broder Responds To Tesla's Elon Musk
NY Times says Chinese hacked paper's computers
NY wife: Officer wanted to kill me, eat others
NYC wife: Officer wanted to kill me, eat others
NYPD: iPhone thefts rising ten times rate of other crimes
NZ Broke the Law Spying On Kim Dotcom, PM Apologizes
NZ To Investigate Illegally Intercepted Data In Dotcom Case
OAuth 2.0 editor resigns and takes name off spec
Obama Announces Open Data Policy With Executive Order
Obama considers Twitter lawyer Wong as Internet, privacy adviser
Obama executive order seeks better defense against cyber attacks
Obama Is Now America's Hacker in Chief
Obama may issue order Wednesday on defense against cyber attacks: sources
Obama's State of the Union speech
Obfuscated MIME Files
Observations on the Family System Administrator 
October 2015 Microsoft Patch Tuesday
October Microsoft Security Bulletins 
Oculus Rift Guillotine Simulation
Odd behavior after MS-SQL scan 
Odd DNS Traffic. Large scale name server finger printing? 
Odd DNS TXT Record. Anybody Seen This Before?
Odd Packet: Any ideas where this comes from?
Odd Packets 
Of the Love of Oldtimers - Dusting Off a Sun Fire V1280 Server
Offensive Countermeasures against stolen passswords
Office Printers Succumb To Virus
Official: US blames Iran hackers for cyberattacks
Officials: Cyberattack suspect had bunker in Spain
Offline Microsoft Patching 
Off-Site Backup for Home Users 
Oh Yeah....I forgot about that 
Oi, missile boffins! Stop ogling web filth at work - Pentagon
OLAP Revolutionary: From Train to Car
Old Cisco exploit tries to make a return: 
Old Inkjet Becomes New Bio-Materials Printer
Old Webmin bug still being exploited 
Oldest infected .wmf? 
OLPC To Sell 7-Inch XO Tablet In Wal-Mart
Omnistar Mailer v7.2 Multiple Vulnerabilities
On Dasher 
On Second Thought, Polaris Really Does Seem 434 Light Years Away
On the Heels of Wheezy, Aptosid Releases 2013-01
On the surface
One in four don't clean their stinky old browsers - especially Firefoxers
One In Six Amazon S3 Storage Buckets Are Ripe For Data-Plundering
One Musician's Demand From Pandora: Mandatory Analytics
One Piece of Advice for Every Laptop Owner: Plan for Trouble
One Step Toward a Babel Fish: Real-Time Voice Translation For Phones
One, if by email, and two, if by EK: The Cerbers are coming!
One-click-fraud apps go from PC to Android
Ongoing Flash Vulnerabilities
Ongoing IMAP Scan, Anyone Else?
Ongoing Scans Below the Radar
Online backup strategy 
Online electronics retailer has successful trial with bitcoin-only transactions
Online Security Scanner from Microsoft - Windows Live Safety Center 
OnLive Acquires OnLive
Only English <em>Final Fantasy 2</em> NES Cartridge On Sale for $50K
Open Compute Hardware Adapted For Colo Centers
Open Compute Wants To Make Biodegradable Servers
Open source code libraries seen as rife with vulnerabilities
Open Source ExFAT File System Reaches 1.0 Status
Open Source Raspberry Pi WebIDE Alpha Released
Open Source Software Licenses Versus Business Models
OpenDNS Research Used to Predict Threat
OpenOffice.org Vulnerabilities 
openrbl.org is back; hackiis6.com is down? ; ezArmor upgrade issue; Memorial Day 
Open-Source Movements Bicker Over Logo
Open-source Newsbits 
OpenSSH 3.9 has just been released, Rumors of new Download.Ject Worm, SEC Warning about Telephone Fraud Scam, My Favorite Quote of the Day 
OpenSSH 4.4 (and 4.4p1) released 
OpenSSH 7.1p2 released with security fix for CVE-2016-0777
OpenSSH Protocol Mismatch In Response to SSL Client Hello
OpenSSH scp Issue 
OpenSSH Vulnerability (New) 
Openssl patches ASN.1 flaw 
OpenSSL Security Update Planned for 1 March Release
OPENSSL update fixes Certificate Verification issue
OpenSSL Update Released
OpenSSL Vulnerabilities 
OpenStack: An Overview
OpenStreetMap Adds Easier Reporting of Map Problems
Opera 12 update closes important security holes
Opera 9 long href PoC 
Opera 9.0 released 
Opera Confirms It Will Follow Google and Ditch WebKit For Blink
Opera Fix/Safari Work-around for Window Injection Vuln, APB: UDP Fragment Data, Reading Room 
Opera updates, too 
Operation of Risk Terminator in SAP GRC AC 10.0
Operations management still growing
Opportunity Begins 10th Year on Mars
Oracle - Multiple Vulnerabilities/ XP SP2 Forum / VNC Brute Force / Web Hacking 
Oracle Application Server Web Cache Vulnerabilities; Port 65506 
Oracle CPU note; Google != Googkle; Obligatory Wireles Factoid 
Oracle Critical Patch Update and Security Alert 
Oracle Critical Patch Update for Q1 2015 (Includes Java Updates)
Oracle Critical Patch Update October, (Wed, Oct 17th)
Oracle critical updates released
Oracle databases vulnerable to injected listeners
Oracle EBusiness Suite Vulnerabilities; Netgear WG602 Accesspoint Vulnerability; Harry Potter and the Worm of Doom 
Oracle Java SE CVE-2012-1718 Remote Java Runtime Environment Vulnerability
Oracle July 2012 Critical Patch Pre-Release Announcement, (Sun, Jul 15th)
Oracle knew about critical Java flaws since April
Oracle Latest Java Update Comes With Security Holes, Researchers Say
Oracle Patches Database Security Flaw Disclosed at Black Hat
Oracle patches Java 0-day, goes to Defcon 2
Oracle Patches 
Oracle Quarterly Critical Patch Update (Oct 2006) 
Oracle quarterly patch update 
Oracle quarterly patches 
Oracle says Java is fixed; feds maintain warning
Oracle Security Alert for CVE-2012-3132, (Sun, Aug 12th)
Oracle Ships Java 7 Update 11 With Vulnerability Fixes
Oracle to change Java version numbers
Oracle to issue 14 patches for Java SE
Oracle to patch 14 critical Java SE holes on Tuesday
Oracle updates Java, security experts say bugs remain
Oracle WebLogic Server: CVE-2015-4852 patched
Oracle Worm Proof-of-concept 
Oracle: DBMS Market Share Or Market Domination?
Oracle's Sparc T5 Chip Evidently Pushed Back to 2013
ORDB Shutting down 
Oreans Technologies Themida TMD File Buffer Overflow Vulnerability
Oreans WinLicense Unspecified Memory Corruption Vulnerability
Oregon Lawmakers Propose Mileage Tax On Fuel Efficient Vehicles
Original Batmobile Sells For $4.2 Million
Original Motorola DROID made relevant again with unofficial Jelly Bean update [video]
OS X 10.11.1 (El Capitan) File System Deep Directory Buffer Overflow
OS X is clearly on the radar of exploit-developers. 
OS X Software Update to 10.4.5, and now I wonder if I missed one? 
OS X VPN vuln; XSS from unexpected places; some ramblings on storage 
Oslo Needs Your Garbage
OSU's Microbial Fuel Cell Could Make Waste Treatment an Energy Source
OSX Ransomware Spread via a Rogue BitTorrent Client Installer
Other Microsoft Updates Released 
OTN Interview on Youtube
Our future cyberdefenders set to face off
Our Solar System: Rare Species In Cosmic Zoo
Out of cycle oracle patch part II 
Out of cycle Oracle patch? 
Out Share! Now it's up to you. 
Outage on Verio and Level3 
Outlook Client Vulnerability and Spring Cleaning 
Outlook Express Weakness / Solaris Apache Bug / Winamp Exploitation / Translations / End of Internet / Social Engineering Story 
Out-of Order Java Update
Out-of-Band iOS Patch Fixes 0-Day Vulnerabilities
Outrage In India Over Arrests For Facebook Posts
Out-Share or Die! 
Over $24 billion Dollars at Risk of Theft from Spyware in US Alone 
'Over half' of Android devices have unpatched holes
Over the Antarctic, the Smallest Ozone Hole In a Decade
Overview of the WMF related articles at the ISC 
Oxy-morons 
Oz gov cyber-safety unit mislays user information
Oz states count cars using Bluetooth
Pacemakers, defibrillators open to attack
Packet Analysis Challenge 
Packet Analysis Challenge: The Solution 
Packet Capture Options
Packet Challenge: Fragments and a Blast from the Past 
PacketFence 3.5.0 adds new web-based configurator
Packet-Filtering Malware;XMLRPC Vulnerabilities;phpBB highlight vulnerability;Fake MS Bulletins 
Pain reliever with serious side effects 
Pakistan Boycotting Call of Duty</em>, Medal of Honor</em> Games
Palo Alto Networks courts investors with $175 million IPO
Palo Alto Networks expands product range, partners with VMware
Panic Storm Over MS04-028 Reaches Category 4, Mozilla Responds With Vulnerabilites Of It's Own! 
Panix DNS Hijack; tcp/3306 Increase; Osama Captured SPAM;Wireless Thoughts 
Paragon Software releases a free image backup software for Windows 8 and Server 2012.
Parallella: an Open Multi-Core CPU Architecture
Parcel Sensor Knows When Your Delivery Has Been Dropped
Parents and Computers 
Parents withdraw from inquiry into death of U.S. engineer Shane Todd
parishilton.scr 
Parliamentary report details German police snoop-spend
Particle Physicists Confirm Arrow of Time Using B Meson Measurements
Partisan Food Fight Erupts Over NASA, Commercial Space
Passive OS Fingerprinting Update 
Password Buddies: A Better Way To Reset Passwords
Password Reuse Remains a Danger After Living Social Breach
'Password' Tops List of Worst Passwords of 2012 [VIDEO]
Patent System Not Broken, Argues IBM's Chief Patent Counsel
Patent Troll Goes After Facebook, Apple, Microsoft, Yahoo, IBM, Others
Path iOS app now hashes address book data
Path-conversion weakness in major AV products reported 
Patch day fallout minor, Sun Java updates, and What to do about Windows NT? 
Patch management still big stumbling block in risk management, survey shows
Patch Mozilla ASAP 
Patch often: Cyber-crim toolkits love stinky old gaping holes
Patch Refresher; MS05-038 Issues 
Patch reminder 
Patch Tuesday deja vu: Adobe patches Flash ... again
Patch Tuesday Fallout 
Patch Tuesday' is tomorrow - Continued FTP Scans 
Patch Tuesday Warmup: Internet Explorer Sunset and Windows XP Embedded End of Support
Patching in 2 days? - "tell him he's dreaming"
Paul Ryan's Record On Science and Government
Paypal Phishing landing pages hosted at HostGator
Paypal scam site using SSL spotted 
PayPal To Replace VMware With OpenStack
PayPal Unveils New Android SDK, Available To US Developers May 15
PCI Compliance 
PDF + maldoc1 = maldoc2
PDF vulnerabilities 
Pedagogical Bundle Lets You Pay What You Want For Educational Software
Pedro's Malware Analysis Quiz 
peercast update and exploit 
Pentagon nod shows Android can be as secure as BlackBerry
Pentest Time Machine: NMAP + Powershell + whatever tool is next
People - Greatest Asset and Biggest Vulnerability 
Peppers Seem To Protect Against Parkinson's
Performing network forensics with Dshell. Part 1: Basic usage
Periodic reminder of best practices for cleaning up after infection. 
Perl bot exploiting vulnerabilities in Joomla and Mambo components 
Perl/Exploit SQLinject; Increased Activity on Port 1039 
Persistent router botnets on the horizon, researcher says at Defcon
Personal Disaster Recovery 
Pervasive Wireless Means Persistent Frustrations
PETA Wants To Sue Anonymous HuffPo Commenters
Petition For Metric In US Halfway To Requiring Response From the White House
Pharming and Phishing Attack; Mailbag 
Phatbot and stealthy polymorphic Alphabot Soup, ISS Product ICQ parsing vuln. 
PhatBot exploiting LSASS? 
Phatbot/Agobot/Gaobot; More on MS SSL exploit; Mailbag 
Phederal Phishing Offenses (FBI and a Census report) 
Phil Zimmermann's New App Protects Smartphones From Prying Ears
Philippines accuses 16 Taiwanese of retiree scam
Phishers Don't Like Monday 
Phishers use urlencoding to obfuscate hostnames 
Phishes, Phlaws and Phurther Network Phollies 
Phishing and Spamming via IM (SPIM) 
Phishing arms race 
Phishing by proxy 
Phishing for Payroll with unpatched Java, (Sun, Aug 5th)
Phishing Messages May Include Highly-Personalized Information 
Phishing via NFC
Phishing/spam via SMS, (Wed, Aug 22nd)
Phishing: Saudi style 
Phlooding newest marketing phabrication; Call for ph-words 
Phollow the Phlopping Phish 
Phone, phablet and tablet. Whats next?
Phony version of Bad Piggies installs malware; 82,000 victims so far
php - a defacement file information request 
PHP - shared hosters, take note. 
PHP 5.1 update with several security fixes 
PHP 5.1.1 released 
PHP 5.x Security Updates
PHP and phpBB releases 
php boxing continues 
php icalendar vulnerability 
PHP Notes 
PHP patches - see http://www.php.net/ChangeLog-5.php - fixes CVE2013-2110, (Fri, Jun 7th)
PHP Security Update 
PHP security: the scene might change 
PHP Vulnerabilities 
PHP Worm, Winace exploit, new toys 
PHP 
PHP/BackDoor.gen 
PHP: time to upgrade! 
phpAdsNew log items, vulnerabilities, fix and patch information 
phpBB <= 2.0.17 exploit code in the wild 
phpbb 0 day worm or just too many unpatched boxes? 
phpBB 2.0.19 released 
phpBB 2.0.20 upgrade time 
phpBB 2.0.21 
phpBB 2.0.22 - upgrade time 
phpBB bots/worms 
Phpbb include vuln scanning, via Google, generating new IRC botnet 
phpBB Problems Continue, Ethereal Update Released, FTC Shuts Down Fake Anti-Spyware Vendor 
PHPbb Scanning; Information Leaks; Usenix Paper 
phpBB Update; Potential IE Vulnerability; Update Rollup for Win2k; Updated Package Installer for WinXP 
phpBB worms continued; Phishing; Spyware from the developers point of view; New server 
phpMyChat scan 
Phpworm and awstats yet... / Bright Tuesday / Last diary personal poll 
Physicists Attempting To Test 'Time Crystals'
Physicists Create Quantum Link Between Photons That Don't Exist At the Same Time
Physicists Propose "Perpetual Motion" Time Crystals
Piecemeal patches from QNAP
Ping floods at multiple sites 
Pinging All The Way
Pirate Bay Documentary Film Now Available On TPB
Pirate Bay site sinks, Swedish police raid its ISP
Pirates and Patches blackhat censorship? IPsec vulnerabilies adding up; Ethereal vulerabilities; Who's SAPing you 
Pirates of the Caribbean: the Pirate Bay Moves To Island of Sint Maarten
Piriform Asks BleachBit To Remove Winapp2.ini Importer
PlaceRaider Builds a Model of Your World With Smartphone Photos
Planetary Resources To Build Crowdfunded Public Space Telescope
Plans For Widespread Monitoring of Communication In Europe Revealed
Plaxo online address book service warns of security breach
Play time: Built a DB2 Wordle
Playing With Sandboxes Like a Boss
Please enter a headline here, (Tue, Oct 16th)
Plesk 0-day: Real or not?, (Fri, Jun 7th)
Pligg CMS 'status' Parameter SQL Injection Vulnerability
Plugin auto-installation a good thing? 
Plug-in pwning challenge brings Pwn2Own prizes to $US560k
PnP Worm out; More on the current Veritas vuln; Microsoft Update and Win 2K3 w/o SP1; new gaim version 
PoC for local elevation of privilege on Windows 2000 SP4 upwards 
Pod2g Confirms IOS 6, IOS 6.1 Beta 4 Untethered Jailbreak
Podcast Interview with Marty Roesch 
Poetry attack?
Poking Holes In Samsung's Android Security
Police agency: 3,600 crime gangs active in EU
Police arrest suspect in BIGGEST DDoS ATTACK IN HISTORY
Police Raid Home of 9-Year-Old Pirate Bay User, Seize "Winnie the Pooh" Laptop
Poll-Based System Predicts U.S. Election Results For President, Senate
Poor training blamed for hospital losing unencrypted USB sticks
PopAdStop.com Scanning Component 
Popular Android Anti-Virus Software Fooled By Trivial Techniques
Popular Android ROM Accused of GPL Violation
Porn is Evil; Workarounds vs Patching; Hopster; SSH Scans; phpBB Issue; Darwin was Right 
Porn portal's user database open and accessible on the net
Port 10 traffic; 139 &1433 report; DCE RPC Vectors 
Port 10000; ssh brute forcing; yet another bagle? 
Port 1025 increase, MS04-11 update problems 
Port 1025/6000 Action (Part II) 
Port 1026-1031 increase 
Port 1026-1031 update 
Port 1070, Dumaru Worm, Email Disguised as Microsoft Patch 
Port 1080, 3127 and 3128; Apache-SSL Optional Client Certificate Vulnerability 
Port 113 - Korgo worm variants 
Port 12345 / NAT fingerprint 
port 135 spikes, Lovegate, Welchia.K, Mailbag, Unix Security 
Port 135 Traffic Increase Due To Bobax.C 
Port 13701 spikes 
Port 13722 hacktool log scan report- NetBackup clients and servers - Did You Patch? 
Port 1433 TCP scanning is up!; Firefox 1.0.6 available - Critical Update; MySQL patches zlib remote vuln; Glitch in The Matrix - Port 2100; One RingTone to Rule Them All?; SlimFTPd vuln PoC released; 
Port 16191 fragment update, mail server dictionary attack, top 10 signs that you are infected 
Port 2000 spike; New IIS PCT exploit?; Following the bouncing MS patches 
Port 20168, Windows Update Virus. 
Port 32000 spike, got packets? 
Port 37777 "MapTable" Requests
Port 38566, Update to Firefox weakness, Packetfoo site launched! 
Port 39999; Possible Vesser/W32.HLLW.Deadhat activity 
Port 41523; Linux Exploit; Phishing Name server; New Feature: tcp %; ssh attacks; MSRC blog 
Port 42, New Old Patch, Scams 
Port 5000 increase due to two worms: Bobax and Kibuv 
Port 5000 Traffic Continues; Fragmented tcp/16191 Update 
Port 51616 - Got Packets?, (Sun, May 19th)
Port 53 Back on the Radar 
Port 533 spike; Planned maintenance completed; Java WebStart Cross Platform Vulnerability, cont. 
Port 554 increase, Solar flare activity continues 
Port 559 and 65506 
Port 6346 increase; Mail bag: trojan Win32/Small.AR; SSH Advice for Repeated Hack Attempts 
Port 6346; Improved Signature for Trojan Win32/Small.AR; Clarification on SSH Advice for Repeated Hack Attempts 
Port 7212 spike 
Port 7547 SOAP Remote Code Execution Attack Against DSL Modems
Port 80 traffic: Sources Increase 
Port 80 UDP Malware 
Port 8008; Quiet Day, Thanks!; Money-Back Guarantee; Follow the Bouncing Malware VII: All That Glitters Is Not Gold 
Port 8181 update; Trojan.Comxt.B; Mail Bag 
Port 8443 Spike 
Port 8555 and 2967 activity 
port 901 surge 
Port Scanners: The Good and The Bad
Portal</em> Now Available On Linux
Possibility for disaster?; Preparing for a storm 
Possible Fake-AV Ads from Doubleclick Servers, (Mon, Nov 5th)
Possible GNU Strings Denial Of Service Vulnerability 
Possible IM attack gearing up. 
Possible MSIE Zero-Day; Analysis of Zotob versions; Why are we still Green; 
Possible NetDevil Scanning, RH Linux 7.1, 7.2, 7.3 and 8.0 End-of-Life 
Possible new multi-exploit bot or worm (request for information), Rose IP Fragmentation, Scammers making use of backdoored machines 
Possible new wave of worms, TCP reset tool for Windows released, New IIS 5 SSL Remote Root Exploit - patch now. 
Possible New Zero-Day Exploit for Realplayer 
Possible Patch Problems 
Possible Problem with MS05-050 Patch 
Possible Qmail Vulnerability / KDE vulnerability / New SoBig wave ?/ and more... 
Post Mortem of GunnAllen IT Meltdown
Post-ACTA Agreement CETA Moving Forward With Similar Provisions
Postcard.exe - Let the mutations begin 
postcard.exe 
postcard.gif.exe; virus numbers!; IE7.beta warez bugged; Black Tuesday: be prepared 
PostgreSQL updates close security holes
Postini Spam Filter 
Posts by hacking group activist rankle authorities
Potential New AOL Chait Virus 
Potential Patch Problem with MS06-025 
Potential phpBB Hack Coming? 
Potential Risks of Personalized Portal Start Pages 
Power Outage Impact - Nachia Worm - Sobig F 
Power Problems Force Seattle To Throttle City Data Center For Days
Powerpoint Vulnerabilty and MalCode Review 
Powerpoint, yet another new vulnerability 
Powershell and HTTPS ? It Ain?t All Rainbows And Lollipops! (or is it?)
Powershell Malware - No Hard drive, Just hard times
PPM, ALM and Governance
Precautions to avoid Outlook PST Password Loss
Predicting Microsoft 
Prediction Market Site InTrade Bans US Customers
Pre-election phishing spike blasts Iranian Gmail accounts
Prepaid iPhone sales exploded in Q1
Preparing for Battle 
Preparing for Feb 3rd(CME-24) 
Press, Bloggers Fall For iPhone Cup Holder 'Joke'
Pretty Quiet Day 
Preview of Synaptics's Next Generation Input Devices
Preview! Def Con Documentary Sneak Peek Online
Preying on Users After Major Security Incidents, (Sun, Jun 10th)
Prime Surrogates for Demented Denormalization
Printer Hacking for Fun and Profit 
PRISM snitch claims NSA hacked Chinese targets since 2009
Privacy Advocates Frustrated By FCC's Decision on Google Street View
Privacy advocates slam Google Drive's privacy policies
Privacy group calls for new hearings on Google Street View snooping
Privacy groups launch protest against CISPA bill
Pro Oracle SQL, A Review And More
Probable php shell/web defacement tool usage on the rise 
Probes for Cisco Web Interface 
Problem in IE Patch?; Mailbag 
Problem with Trend Micro Virus Sig 594; Trojan Vundo; Update on Problem with MS05-019; Phishing Site?; DNS Poisoning 
Problems with Bloodhound.Exploit.45 pattern in Symantec AV 
Problems with Intel wireless drivers 
Problems with Java and internet proxies solved
Problems with MS patch KB913446 (for the IGMP issue, MS06-007) 
Process Pushing with a View for Performance Improvement
Profiling SSL Clients with tshark
Programs That Request A Lot Of Contiguous Memory May Fail After Security Update Is Applied 
Project Lifecycle Governance (PLG) vs. Project Lifecycle Management (PLM) vs. Application Lifecycle Management, (ALM)
Project Management Lite: Intro to Code-based Estimating
Project Orca: How an IT Disaster Destroyed Republicans' Get-Out-The-Vote Effort
Project To Turn Classical Scores Into Copyright-Free Music Completed
Proof of Concepts, engine for innovation
Proposed US cyber security bill criticised
Prosecutors to question Manning in WikiLeaks case
Protecting Powershell Credentials (NOT)
Protecting Users and Enterprises from the Mobile Malware Threat
Proteins Made To Order
ProtonMail Back Online Following Six-Day DDoS Attack
pseudoDarkleech Rig EK
Psst: Heard the one about the National Pupil Database? Thought not
PSVita Hacked, Native Homebrew Loader Coming Soon
Public release of exploits against the windows help system 
Public vs. private cyberattack responsibility debate heats up
Pump and Dump' Spam Messages 
Purported Relativity Paradox Resolved
Push your cloud supplier to participate in CSA STAR
Pushdo botnet's smokescreen traffic hits legitimate websites
PUT requests and Using Web Server Logs, trillian exploit, sudo exploit. 
Pwnie Express Releases Pwn Pad Ahead of Schedule
PWS Bankers 2.0 
Pwstealers - evolution 
py2exe Decompiling - Part 1
Python Gets a Big Data Boost From DARPA
Python updates for hash collison DoS problems
Python updates for hash collison DoS problems - Update
Quadcopter Drone Network Will Transport Supplies For Disaster Relief
Quantum computing is here! But does it run Linux?
Quantum Cryptography Conquers Noise Problem
Quantum Key Exchange With an Airplane
Quantum Measurements Leave Schrödinger's Cat Alive
Qubes OS bakes in virty system-level security
Querying the DShield API from RTIR
Quick Analysis of a Recent MySQL Exploit
Quick Audit of *NIX Systems
Quick Launch toolbar spyware (1 Comments)
Quick plug: Netcat in the Hat 
Quicktime patches for Mac and Windows 
Quicktime upgrade time 
Quiet day for incidents, IRC channel for discussion 
Quiet Day; U.S. CERT Summary; Scott's Toolkit for Windows 
Quiet Day;TCP/443; Firefox GIF image handling heap overflow exploit; MS javaprxy.dll update 
quiet holiday weekend 
Quiet Weekend - not much news 
Qwest having problems? 
QWest Problems 
R and the Pirates
R, SQL and Data Munging and Sculpting
R, SQL and the Predicate
R, SQL and the Rosetta Stone
R, SQL*PLUS, and Startup Scripts: Fortunate For The Forgetful
Radare2: rahash2
Rails developers close another "extremely critical" flaw
Rails updates to 3.2.13 to close denial of service and XSS holes
Ralph Nader Moderates One Last 3rd-Party Debate for 2012
Random stuff from the mailbag 
Random thoughts for a quiet Sunday 
Ransom32: The first javascript ransomware
Ransomware & Entropy
Ransomware & Entropy: Your Turn
Ransomware & Entropy: Your Turn -> Solution
Ransomware Operators Cold Calling UK Schools to Get Malware Through
Rant-of-the-day: on the dangers of orphaned software (the dark side of open source) 
RapidShare Urges US To Punish Linking Sites and Not File-Sharing Sites
Rare Earth Elements Found In Jamaican Mud
Rare Form of Autism Could Be Curable With Protein Supplements
Rare Water-Rich Mars Meteorite Discovered
Raspberry Pi As Hardware Backdoor
RAT-flingers target human right activists in watering-hole attack
Raw Sockets; Trend 594 Update; Mac Trojan & More 
Ray Harryhausen, Visual Effects Master, Dies Aged 92
Reader Report from Botnet Master Christopher Maxwell's sentencing 
Reader's Diary and Update of Windows XP: Surviving the First Day 
Reader's tip of the day: ratios vs. raw counts 
Reading and Calculating With Your Unconscious
Real Player critical patch for two vulnerabilities 
RealPlayer (et al) vulnerabilities & Joomla/Mambo Worm 
RealPlayer Patches, DejaVu & some Mailbag Contributions 
RealServer Vulnerability, Exploit and Scans 
Real-Time Cyber-Attack Map
Real-Time Fact Checking With "Truth Teller"
Real-Time Gmail Spying a 'Top Priority' For FBI This Year
Realtors Be Aware: You Are a Target
RealVNC 4.1.1 authentication bypass vulnerability reported 
RealVNC exploits in the wild 
RealVNC Exploits 
Recent Apple Java Update Doesn't Fix Critical Java Flaw Claims Researcher
Recent Conference Keynote 
Recent Developments in Password Cracking
Recent example of KaiXin exploit kit
Recent spike in port 53 activity 
Recent trends in Nuclear Exploit Kit activity
Recent Two factor authentication attacks 
Recommended Block List 
Recommended Reading: Intrusion Detection Using Indicators of Compromise Based on Best Practices and Windows Event Logs
Recovering Data From Broken Hard Drives and SSDs (Video)
Recovering LOST files from a hardrive 
Red Alert: Potential loss of data for DB2 v10 users on z/OS 1.12 and 1.13 releases
Red faces as Pentagon leases Chinese satellite
Red Light Cameras Raise Crash Risk, Cost
Red peril paranoia hits Twitter
Red Team Tools Updates: hashcat and SpiderFoot
Redhat Kernel Packages (one AMD64 CVE security item), Bagel AV Vendor Summary 
Redmond probes new IE 8 vulnerability
Reducing False Positives with Open Data Sources
'Regular' PS3 gamers who've cancelled credit cards? You FOOLS!
Regularly scheduled MS updates 
Regulation of facial recognition may be needed, US senator says
Reimagining Cisco: You Aren't a Box Seller
Rejected Papers Get More Citations When Eventually Published
Relay reject woes 
Reminder about MS06-025 
Reminder: Daylight Savings Ends Sunday At 02:00 
Reminder: Slashdot Anniversary Meetups, Free T-Shirts
Remote Admin Tools May Not Be Clever Enough For Their Own Good
Remote Diagnostics with PSR, (Fri, Nov 9th)
Remote DoS in Firefox 1.5.0.7 and Firefox 2 
Remote DoS released targets Windows Firewall/Internet Connection Sharing (ICS) service component 
Remote Network Access: 10 Signs Its Time to Deploy Updated Control Software - Enterprise Networking - News & Reviews - eWeek.com
Remotely Exploitable CodeGrrl PHP Products File Inclusion Vulnerability 
Replacing Alice and Bob
Report claims Chinese hackers are working for government
Report Child Porn 
Report of possible Malware coming from Chinanet 
Report: DDoS attacks now MORE ANGRY, complex and targeted
Report: Dutch government was unprepared for SSL hack
Report: China IP theft now equal in value to US exports to Asia
Report: iOS vulnerability sold for $250,000
Report: IPv6 sees first DDoS attacks
Report: Plans for Australia spy HQ hacked by China
Reported Shockwave issue with Myspace.com 
Reports of Bots exploiting pmwiki and tikiwiki 
Reports of Excel 0-Day 
Reports of multiple OS X vulnerabilities with PoC 
Reports of Other DDos Attacks Taking Place 
Reports of web forums running Invision Power Board being compromised 
Reports on IE exploit 
Republican filibuster blocks Senate Cybersecurity bill
Republican senators introduce their own cybersecurity bill
Request for AIM IDs Involved with GDI Exploits; GDIscan Tutorial 
Request for Data 
Request for Help, OOB Chat Room Keeps London Working During Attack 
Request for packets 50032 
Request for Packets TCP 4786 - CVE-2016-6385
Research Discovery Could Revolutionize Semiconductor Manufacturing
Research lab extends host-based cyber sensor project to open source
Research on a Fraudulent site 
Researcher Claims To Have Chrome Zero-Day, Google Says "Prove It"
Researcher creates proof-of-concept malware that infects BIOS, network cards
Researcher releases exploit code that can allegedly crash pcAnywhere
Researcher to demonstrate feature-rich malware that works as a browser extension
Researcher: 200,000 Windows PCs vulnerable to pcAnywhere hijacking
Researchers Build Objects With 3D Printing Using Simulated Moon Rocks
Researchers Create Short-term Memories In Rat Brains
Researchers Create Vomiting Robot To Analyze Contagions
Researchers Demonstrate 3D Spy Trojan for Mobile Phones
Researchers Devise New Attack Techniques Against SSL
Researchers Lift Lid on Government-Distributed Cyber-Spy Trojans
Researchers Mine Old News To Predict Future Events
Researchers Use Lasers For Cooling
Researchers warn of cyber flaws in Honeywell control systems
Researching Information Security Issues 
Resistance against US cyber security act is growing
Resolution(s) For The New Year 
Resolving erratic behavior of an Oversized PST using advanced PST File Splitter tool
Resources: Windows Auditing & Monitoring, Linux 2FA
Results vs. Relationships - Finding Your Balance on the Seesaw
Reuters staffer accused of aiding hackers maintains innocence -lawyer
Reuters staffer accused of aiding hackers maintains innocence: lawyer
Reuters suffers double hack
Reuters suffers second hack this month
Revealed: Chrome Really Was Exploited At Pwnium 2013
Reverse Cross-Site Request (RCSR) vulnerability 
Review: Google Compute Engine
RFC 6598 - Carrier Grade NAT
RFC2142 is a two-way street 
RFP criteria for how to build an agile data infrastructure
Rhombus Tech A10 EOMA-68 CPU Card Schematics Completed
RIAA says Google piracy policies are lacking
Rick Kelly: Value focus
Rig Exploit Kit from the Afraidgate Campaign
Richard III Suffered an Ignominious Burial, Researchers Find
Risk... in the most obscure places
Risks of boomerangs a reality in world of cyberwar
Risks on the Rise: Making a Case for IT Disaster Recovery
Riverbed, 6connect, Ixia Unveil New Products, Services at Interop
Robot Learning To Recognize Itself In Mirror
Robot Serves Up 360 Hamburgers Per Hour
Robot Snake Could Aid Search and Rescue Operations
Robot Snakes To Fight Cancer Via Natural Orifice Surgery
Robotic Bartender Assembles Your Drink, Monitors Alcohol Consumption
RockBox + Refurbished MP3 Players = Crowdsourced Audio Capture
Rocket boffinry in pictures: Gulp the Devil's venom and light a match
Rogue US Airways-themed emails distribute ZeuS-based malware
Romanian authorities dismantle hacker group targeting government websites
Romney Campaign Accidentally Launches Transition Web Site
Rootkit Findings 
Rootkit infects Linux web servers
Root-Level Exploit for OSX LaunchD Service 
Rough Roving: Curiosity's Wheels Show Damage
Rover Finds Ancient Streambed On Martian Surface
Rover Fuel Came From Russian Nuke Factory, But Supplies Running Low
Royal Canadian Air Force Sees More Sims In the Future of Fighter Pilot Training
RPC DCOM Update 
RPC DCOM Update: sdbot variant 
RPC DCOM WORM (MSBLASTER) 
RSA Conference 2012 sneak peek: cloud, big data, and mobile
RSA Conference 2012: Former NSA director says secure clouds can't come fast enough
RSA Conference 2012: Stress and burnout in infosec careers
RSA teams to bolster security for Apple, Google, RIM devices
rtfdump
RuggedCom fails key management 101 on Rugged Operating System (ROS), (Tue, Aug 21st)
Rumors about IIS 6.0 issues 
Running InfoSphere Software in a Virtual Environment without ILMT May Cost you Millions
Russian botnet operators infected 6 million computers
Russian Cyber Criminal Unmasked As Creator of "Most Successful" Apple Malware
Russian EBookseller LitRes Gets Competing EBook Apps Booted From Google Play
Russian charged with hacking into brokerage accounts
Russian malware spies on US ATMs
Russian start-up claims BitTorrent-killer
Russian Univ. Launches Course Based On ReactOS Led By Alex Bragin
Russian upstart claims BitTorrent-killer
Russia's Former KGB Invests In Political Propaganda Spambots
Russia-speaking cybercriminals earned $4.5 billion in 2011, researchers estimate
s_ta_ts.js, anyone? 
Sacre Bleu! US fingered for Flame attack on Élysée Palace
Safari 5.1.7 - an interesting feature, (Thu, May 10th)
Safemode rootkit & DRM 
Safer Online Shopping Guide 
Samba - Buffer Overrun, HP Remote Command Execution, Top 15 Worms, Hosts File, Sasser/Dabber Activity
Samba security patch fixes critical remote code execution hole
Samba vulnerability, Veritas BackupExec vulnerability, PowerPoint attachments, and some light reading. 
Sample needed - of Spybot.ZIF, which scans for vulnerable Cisco Routers 
Samsung Claims iPad Mini, iPad 4, New iPod Touch Also Infringe Patents
Samsung May Start Making ARM Server Chips
Samsung network printer vulnerability discovered
Samsung Opens New Apple Store In Australia
Samsung opens new R&D facility in Nokia's backyard
Samsung printers have secret admin account
Samsung Unveils the Galaxy S4
Samsung will issue fix for security hole in printers
Samsung: Android's Multitouch Not As Good As Apple's
Samsung? BlackBerry? Who Will Win the Containerization Wars?
San Diego Zoo Creates Biomimicry Incubator
Sandia Lab Fires Up 300,000 Virtual Android Devices To Test Out Security
SANS 2006 
SANS Boston 2008
SANS Industrial Control Systems (ICS) Security Training is coming to Houston!
SANS Institute Announces Annual Security East Training Event in New Orleans featuring SANS Technology Institute's ...
SANS Institute to Offer World-Class Information Security and Computer Forensics Training at SANS Secure Singapore 2013
SANS Institute to Offer World-Class Virtualization and Private Cloud Security Training at SANS October Singapore 2012
SANS ISC (once again) and Microsoft - Flatten Compromised Systems 
SANS ISC presentation in Brazil 
SANS ISC Receives Award 
SANS Network Security 2007 -- Vegas 
SANS offering TREATS too. 
SANS Survey Results Announced: Mobility Policy in the Enterprise
Sans Top 20 - 2004 - How does it compare to 2003 Top 20; Microsoft ASP.NET ValidatePath Module; IRC Botnet Servers 
SANS Top 20 Spring Update 
SANS Top 20 Update 
SANS/ISC Webcast; MS05-017 Exploit; They're Baaaaaack...; Follow the Bouncing Malware : A Fresh Bounce (Updated: 22:30 GMT) 
SANSFIRE 2006 
SANSFIRE: Internet Storm Center Training Event 
SANS's Alan Paller discusses the threat of cyberterrorism on CNN, (Sun, Apr 28th)
Santa IM Worm (bot) update 
Santa IM Worm 
Santy Variant?; Year End Poll 
SAP GUI DLL Loading Arbitrary Code Execution Vulnerability
SAP NetWeaver Portal as SAP GRC 10.0 Front-End
Saudi Arabia Blocks Viber Messaging Service
Saudi Aramco Reveals Cyber Attack Hit 30,000 Workstations
SAV botnet revival ? 
sav worm and its cc 
SAV Worm Update 
Save the Web From Software Patents
SC gov. admits hacking errors; revenue chief quits
SCADA kit has hidden factory account, password
SCADA security is better and worse than we think
Scammer tying in on disasters 
Scanner Identifies Malware Strains, Could Be Future of AV
Scanning for Fortinet ssh backdoor
Scanning tricks with scapy
Scans for CA LM Vulnerability; MSFT Update #1: MS05-002; MSFT Update #2: MS05-015; MSFT Update #3: Malicious Software Removal Tool 
SCANS, Babel (not Bagel/Bagle/Beagle) & Halloween 
Scapy vs. CozyDuke
Scientific American's Fred Guterl Explores the Threats Posed By Technology
Scientists Create New Gasoline Substitute Out of Plants
Scientists Develop Sixty Day Bread
Scientists Growing New Crystals To Make LED Lights Better
Scientists Inducted Into Chemistry "Hall of Fame"
Scientists Invent Electronics That Dissolve In the Body
Scientists Match Dream Images To Photos
Scientists May Have Detected Neutrinos From Another Galaxy
Scientists Set Bold Plan For Future Exploration of the Sun
Scientists Take Most Accurate Reading Yet of Universe's Cooling
Scottish Scientists Create World's Smallest Smart Antenna
ScreenOS vulnerability affects Juniper firewalls
Script kiddie scavenging with Shellbot.S, (Wed, Sep 19th)
Scripting the Unofficial .wmf Patch 
Scripting Web Categorization
Scrum/Agile Now Used To Manage Non-Tech Projects
SDBot sniffs, blings 
SDN Is Business, OpenFlow Is Technology
SDN Vendor Comparison Launches
SDN: From Slideware to Software in 2013?
SDN's Potential in the Data Center and On the WAN
Sea Chair Project Harvests Plastic From the Oceans To Create Furniture
Seafood Raised on Animal Feces Approved for Consumers
Sealed-Box Macs: Should Computers Be Disposable?
Searching money, finding exploit 
Searching Through the VirusTotal Database
Seasonal Malwares and other trends 
Seattle Police Want More Drones, Even While Two Sit Unused
SEC staffers used government computers for personal use: report
SEC505 DFIR capture script: snapshot.ps1
Secunia Advisory for IE; meeneemee.exe 
Secunia PSI 3.0 Beta: plugging security vulnerabilities made easy
Secure Boot complaint filed against Microsoft
Secure Remote Services / MyDoom and IFRAME / MS04-039 revision / ISC Webcast 
Security Audit Finds Company's Top Dev Outsourced His Work To China
Security audit finds dev OUTSOURCED his JOB to China
Security audit finds developer OUTSOURCED his JOB to China
Security Awareness (from students point of view) 
Security Awareness and Collaboration
Security Awareness for Security Professionals
Security boffins say music could trigger mobile malware
Security concerns over Firefox's "new tab" thumbnail feature
Security damn well IS a dirty word, actually
Security Features Nobody Implements
Security Firm Mandiant Says China's Army Runs Hacking Group APT1
Security Firm Reveals Weaknesses in DDoS Attack Toolkits
Security Fix for Apache 
Security History Poll Results 
Security History Poll 
Security hole in Sudo's debug option closed
Security Challenges and Games 
Security improvements in Opera 12 beta
Security in the Cloud Is All About Visibility and Control
Security Information on Website 
Security Infrastructure Market to Top $86 Billion in 2016: Gartner
Security Log Retention 
Security Mailing Lists for Academia 
Security Management vs Chaos: Understanding the Butterfly Effect to Manage Outcomes & Reduce Chaos
Security mess sends Kiwi auction site titsup in two days
Security Onion 12.04 Beta Released at DerbyCon (plus informational video)
Security patches for Mozilla Firefox/Thunderbird/SeaMonkey 
Security problem in VMware vSphere 5
Security Pros Love Python? and So Do Malware Authors!
Security Researcher Finds Critical Flaws in Sophos Anti-Virus Engine
Security Researchers Document Wiper Malware`s Disappearing Act
Security Talks for portuguese community 
Security Tip of the day: Handling brute-force login attempts 
Security Update - Cisco 7900 Phones - cisco-sa-20130109-uipphone privilege escallation issue - advisory at: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130109-uipphone, (Wed, Jan 9th)
Security Updates from Microsoft; Multiple Vendors - ICMP Affecting TCP Sessions 
Security Vulnerability Found On US Federal Government Contractors Site
Security vulnerability in NVIDIA's proprietary Linux drivers fixed
Security Worker Shortfall is Putting Organizations at Risk
Self-Assembling Robots Using Flying Drones
Senate committee approves privacy protections for cloud, email
Senator Asks FTC to Investigate Google and Apple Over Possible App Privacy Violations (March 5, 2012)
Senators propose law to combat cyber theft
Sendmail DoS Vulnerability 
Sendmail Multi-Part MIME Message Handling Denial of Service vulnarability 
Sendmail vuln 
September 2015 Microsoft Patch Tuesday
Sequoia Supercomputer Sets Record With 'Time Warp'
Serious flaw on OS X in Apple Safari 
Serious Problems With USB and Ethernet On the Raspberry Pi
Set up of Risk Terminator in SAP GRC AC 10.0
SETI@Home site problems 
Setslice Killbit Apps (1 Comments)
Seven Tips to Start Your Cloud Due Diligence
SHA1 Phase Out Overview
SHA-3 Winner Announced
Shamrocks and March Madness; Perl bots; MS05-004 update 
Sharing HBO Go Accounts Could Result In Prison
Sharp Warns That It Might Collapse
Shellbot 
Shelley Stewart: Business view
Sheryl Sandberg: Facebook's Home App Needs Some Work
Should Developers Be Sued For Security Holes?
Should Inventions Be Automatically Owned By Your Employer?
Should the Start of Chinese New Year Be a Federal Holiday?
Should the US Really Limit Chinese-Government Influenced IT Systems?
Should TV Networks Put Pilots Online For Judgement Like Amazon Is Doing?
SHOUTCAST <= 1.9.4 Vulnerability, Exploit Available 
Shuttle Endeavour Embarking to Los Angeles Museum
Schmidt slams China as world's most prolific hacker
Schmidt, Daughter Talk About North Korea Trip
Schneier: We Don't Need SHA-3
School Board Considers Copyright Ownership of Student and Teacher Works
Sidewalk: Certifications in Business Analysis: CCBA & CBAP from IIBA
Sidewalk: Do we really need Business Analysts?
Sidewalk: Tablet Wars
SIEM is not a product, its a process...
Sigcheck and VirusTotal 
Sigcheck and VirusTotal for Offline Machine
Sigcheck and virustotal-search
Significant increase on 38566 
Silent Drop vs Reject Firewall rules 
Silent Traitors - Embedded Devices in your Datacenter, (Mon, Feb 25th)
Silicon Valley's Dirty Little Secret: Age Bias
Silly PuTTY; crime pays; if it quacks like a duck get the orange sauce. 
Simple Way to Recover Password of MS Outlook or Outlook PST File
Simulation Using LRO Data Shows More Locations With Ice on the Moon
sinFP-2.03 release 
Singapore allows pre-crime strikes against online crooks
Singapore inquiry into U.S. engineer's death to start in May
Singapore police to share evidence with FBI on engineer's death
Singaporeans get hard token baked into credit card
Singer Reportedly Outbids NASA for Space Tourist's Seat
Single NFC bonk subjugated Samsung Galaxy SIII and slurped it out
Siri's Creator Challenges Texting-While-Driving Study
Site Updates: ISC/DShield API and ipinfo_ascii.html Page
SKorea misidentifies China as cyberattack origin
SKorea ready for more cyberattacks; banks recover
Sky News Google Play page defaced
Skype Disables Password Reset Function After Security Scare
Skype for Linux hotfix plugs security hole
Skype hits back at angry wiretap reports: Rat finks? Not us
Skype investigates tool that reveals users' IP addresses
Skype Worm Spreads Ransomware, Botnet Links
Skype 'worm' whinnies... 
Skype worm 
Skype; Grepping Weblogs; COAST; ISTS News 
Slackware 14.0 Arrives
Slashdot Asks: SATA DVD Drives That Don't Suck for CD Ripping?
Slate's Mini-Biography of Aaron Swartz
SLOTH, attack on TLS using MD5
Slow day 
Slow Sunday; CA Message Queuing Vulns; Process Explorer Vuln; Infocon: Green Redux 
Small Results With Big Indexes
Smart meter hack framework goes open-source
Smart TVs riddled with DUMB security holes
Smartest Light Bulbs Ever, Dumbest Idea Ever?
Smart-Grid Control Software Maker Hacked
Smartphone 4Q sales rise 36 pct led by Samsung
Smartphones overtake 'dumb' phones worldwide
Smoothing MODEL, K?
Smooth-Talking Hacker Remote-Wipes Reporter's iPad, MacBook
Sniffer tool displays other people's WhatsApp messages
Sniffers in Perl?!? 
SNMP Issues in Cisco Routers; Vulnerability Issues in TCP; SANS Top-20 Call for Experts 
SNMP Pwn3ge
Snort 2.4.2 Released 
Snort BO pre-processor Vulnerability 
Snort BO status update 
Snort bypass vulnerability 
Snort Denial of Service Vulnerability 
Snort Rule released on BleedingSnort for the Windows Javascript vulnerability 
Snort rule update 
Snort rulez management 
Snort Sig for MS06-040 
Snort signature and standalone detection tool 
Snort Sigs for MS06-042 and ICMP tunnel mentioned in Diary 
Snort URL evasion vulnerability patched and version 2.6.0 available 
Snow Leopard users most prone to Flashback infection
So many devices, so little policy
So what passwords are those ssh scanners trying?, (Tue, May 14th)
So you broke our encrypted files? Ha! They were DOUBLY encrypted
So, what causes recession?
So, when is a security advisory, not a security advisory? 
Soap Boxing 
Sober Virus (CME-151) 
Sober, Bagles, and Mytobs ad nauseum... 
Sober.I is on the go; Quiet day on the net 
SoberD@MM from spoofed Microsoft email addresses, new version of Netsky 
SoBig Virus Update 
SOBIG.F 
Sobig-F and Nachia update 
Sobig-F hybernation 
SOC Resources for System Management
Social Commerce Is Future of Electronic Commerce
Social Media, Companies and Data Volumes
Social Networking Security in the Workplace
Social Networking Sites- An Educational Tool
Socialite's climb halted by unfolding scandal
SoftBank would appoint "security director" to Sprint board
Software DEP Classified Script 2.5 SQL Injection Vulnerability
Software exploits dropped to new low in 2011, says IBM X-Force
Software Patches, Nortel, User Privacy Top Week's Security News
Solaris 9 in.ftpd security flaw 
Solaris telnet/rlogin cont.; Timezones; DNS queries 
SolusOS Forks Gnome 3 Fallback Mode
Solution to the TCP 1433 Traffic 
Some Android phones can be reset to factory default by clicking on links, (Wed, Sep 26th)
Some more 0-days from ZDI
Some password advice
Some Smart Meters Broadcast Readings in the Clear
Some tools updates
Some useful volatility plugins 
Somebody, Probably Anonymous, Hacked the Fed During the Superbowl
Something new on Telnet? 
Sony Announces 'Superslim' PS3
Sony Announces the PS4
Sony cuts sales target for cameras, smartphones for 2014-15
Sony DRM Rootkit to be removed automatically by Microsoft 
Sony Fined $390K in U.K. for 2011 PlayStation Network Data Breach
Sony mobile customers emails, names hacked in China
Sony PS Vita exploit opens the door for unauthorized apps, piracy
Sony redo of PlayStation Store links games, movies
Sony to assess spin-off plan; cuts targets for cameras, smartphones
Sony To Make Its Last MiniDisc System Next Month
Sony Touts 25 Hour Battery Life For Haswell-Equipped Vaio Pro
SOPA, PIPA, Anonymous: Can I have a little hope?
Sophos buys mobile device management vendor Dialogs
Sophos dangles free Android antivirus to tempt BYOD-friendly biz
Sophos false positives on Mac OS X 
Sophos Reveals the "Dirty Dozen" 
Sourcefire VRT MS-WORD 0DAY recommendations, Rules and tool Advisory 
South Carolina tax chief resigns after taxpayers hit in cyber attack
South Korea Backtracks On China As Source of Cyberattack
South Korea cyberattacks hold lessons for U.S.
South Korean crackers arrested
SP2 breaks nmap, others - *Anti*phishing - Application exploits 
Space Diving: Iron Man Meets Star Trek Suit In Development
Space Shuttle Endeavour's Final Journey
Space Station Saved By a Toothbrush?
Space Station Spacewalkers Stymied By Stubborn Bolt
SpaceX Dragon Set To Launch
SpaceX: Lessons Learned Developing Software For Space Vehicles
Spaf on reexamining 
Spain's Extremadura Starts Move To GNU/Linux, Open Source
Spam - spam - spam 
Spam ahoy! 
Spam Backscatter 
Spam blocking by RBL, when is a good thing too much? 
Spam Delivered via .ICS Files
SPAM in German is Still SPAM 
Spam Increase 
Spam reporting addresses 
Spam with Obfuscated Javascript
Spam, Recon or ??: You make the call!! 
Spamassassin - upgrade 
Spamhaus DDoS Attack Investigation Results in Arrest of Dutch Man
SPAM-Let the time fit the crime; 
Spammers attempt to defeat Bayesian filters; Malaysia terrorism warning; MSN Messenger worm 
Spammers dodge junk filters with Google Translate
Spammers unleash DIY phone number slurping web tool
Spammers, phishers escape proper punishment
Spamming as 'terror' tactic 
Spanish Open Source Group Files Complaint Over Microsoft Use of UEFI Secure Boot
Spanish police arrest suspected developer of BKA trojan
Spat between two Dutch companies sparks record-breaking 300Gbps DDoS attack
Speaking of Predictions 
Speaking of Said Upgrades… Firefox 1.0.7 
Special Microsoft Bulletin Patching Remote Code Execution Flaw in OpenType Font Drivers
Special Ops Takes Its Manhunts Into Space
Spectacular New Views of Saturn's Polar Vortex
Speed traders eyed after Twitter hack attack: regulator
Speech-to-text drives motorists to distraction
SplitRXMode - Taking VMware Multicasting to the Next Level
Sploits Du Jour: Veritas NetBackup & Ethereal. Watch Oracle and Snort! 
Sporadic Problems, Internet Health Monitors, IE Attacks, and HTTP GET 
Spy Gadgets: A Visit With the Real-Life Q
Spyware Report Disected and Thanks For The Malware 
Spyware Tool Kit, OSPF Filtering & Authentication, Port 559 Traffic Spike 
SQL Injection Flaw in Ruby on Rails, (Wed, Jan 9th)
SQL Injection Lilupophilupop style, Part 2, (Thu, Aug 9th)
SQL Injection: Paper & Worm, WINS, Asking for Input. 
SQL Model Clause: References and Recommendations
Square Kilometre Array Pathfinder Goes Live
SquirrelMail 1.4.8 released 
SSD Prices Fall Dramatically In 2012 But Increase In Q4
SSH Honeypot Capture, Follow The Bouncing Malware (Part III) 
SSH Honeypots (Ab)used as Proxy
SSH scanning continues, some simple advice; IPS comparison article 
SSH Scanning Resolved; First Things First Guide 
SSL 2.0 Rollback in OpenSSL 
SSL Phishing Scam / FreeBSD DoS Vulnerability / Acrobat Reader Flaw 
SSL Requests sent to port 80 (request for help/input), (Thu, Sep 6th)
SSL, SSL - Where Art Thou SSL?
Standard Kilogram Gains Weight
Stanford Study Flawed: Organic Produce May Be More Nutritious After All
Stanford Uses Million-Core Supercomputer To Model Supersonic Jet Noise
Stanford's Flying Fish Glider
Staples Starts Selling 3-D Printer
Startup decloaks, rolls out cloudy security 'conductor'
State of the Union: Full text of President Obama's address
State social media privacy laws a mixed bag for businesses
Statistical Tools For Detecting Electoral Fraud
Statistics Key To Success In Run-and-Gun Basketball
Staying Secure During ERP Implementation: What to Look Out For
Stealing photos and spying: backdoors to networked cameras
Stealthy Apache Exploit Redirects Victims to Blackhole Malware
Stealthy Group Steals Data Using Zero-Day, 'Watering Hole' Attack
Stealthy, malware-spewing server attack not limited to Apache
Steam spawns vulnerabilities, say researchers
Steelie Neelie admits laptop hack during IGF
Stem Cell Treatment Found Effective For Rare Brain Disorder
Steps to Mitigate Office Vulnerabilities 
Steve Jobs Movie Clip Historically Inaccurate, Says Woz
Still a Microsoft Most Valuable Professional (6th year!)
Still More MyDoom, a Few Twists on IDS, and a New Phishing Threat 
Stolen Laptops 
Stop calling it a ransomware "attack"
Stopping Spam by Extrusion Detection 
Storage and expertise - the PureSystems box
Storm Center in the News 
Storm Season 
Strange file names being requested from a web server 
Strange Http request... 
Strange phishing/spam e-mails 
Strange Spam; Update on Port 3001; New Discussion Forum; Small Website Change; Cisco Humor; SANS Washington DC 
Strange UDP Packets, Amazon.com and LATAM NIC Issues 
Stratfor Hacker Could Be Sentenced to Life, Says Judge
Stress-Testing Software For Deep Space
Student mules, More database holes, Microsoft spyware beta 
Student privacy activists due to meet with Facebook
Student Refusing RFID Badge Now Fights Expulsion Order
Students Calculate What Hyperspace Travel Would Actually Look Like
Study Finds Universe Is 100 Million Years Older Than Previously Thought
Study says malware attacks are on the rise, mobile threats becoming more serious
Study Urges CIOs To Choose Open Source First
Study: Geolocation apps draw users, despite privacy concerns
Study: Limiting Bidding On Spectrum Could Cost Billions
Study: Online Social Influence Has the Strongest Effect On Voting Behavior
Study: the Universe Has Almost Stopped Making New Stars
Stuxnet worm planted on Iranian PCs via USB stick, site claims
Submitting Malware - Unpatched IE Hole Being Exploited - eJihad or iHysteria? 
Substantial Increase in Infected System Numbers (is it real?) 
Sudo For Windows 
Sugar Batteries Could Store 20% More Energy Than Li-Ions
Summer/Winter Vacation Book Suggestions and Hacking Challenges 
Sun bulletins, MS04-040 discussion, anti-spam vigilante-ism dumb, did you know? 
Sun Java JRE sandbox bypass vulnerability 
Sun Java Runtime Environment XML Parsing Denial of Service Vulnerability
Sun Java SDK and JRE Updates 
Sun JDK 5.0 Update 10 
Sun JRE Privilege Escalation, Opera Vulnerability, Pocket PC Trojan in the wild 
Sun ONE Messaging Server Vulnerability; Weaknesses in Wireless LAN Session Containment; Credit Card Breach 
Sunday P & Q; Happy Birthday OpenSSH; RBOT Snort Sig; Bacula 
Sunday, little to report, and backups 
SunJava 1.5.0_09 Released 
Super Bacteria Create Gold
Supercomputer Repossessed By State, May Be Sold In Pieces
Supercomputers' Growing Resilience Problems
Super-Earth Discovered In Stars' Habitable Zone
Superfish 2.0: Dell Windows Systems Pre-Installed TLS Root CA
'Super-powerful' Flame worm actually boring BLOATWARE
Superstition 
Support Forums Reveal SCADA Infections
Supreme Court To Decide If Monsanto GMO Patents Are Valid
Surface Pro Sold Out; Was It Just Understocked?
Surface Pro: 'Virtually Unrepairable'
Surfing Robot Tracks Great White Sharks
Surge in Exploit Attempts for Netis Router Backdoor (UDP/53413)
Surveillance software: Gamma Group's offshore companies uncovered
Survey on Application Portfolio Management–What is your organization doing?
Survey Reveals a Majority Believe "the Cloud" Is Affected by Weather
Survey Suggests P2P Users Buy More Music
SUS: deadline extended - XP SP1 not supported anymore 
Suspicious eFax Spear Phishing Messages, (Fri, Aug 17th)
Swartz' death fuels debate over computer crime
Swedish Data Center Saves $1M a Year Using Seawater For Cooling
Swedish School Makes Minecraft Lessons Compulsory
Sweet Treats from the Honeynet group. 
Swiss security day 
Switching Tasks Changes Worker Bee DNA
Syfy Reality Show Will Feature Giant Boxing Robots
Symantec Antivirus Scan Engine: Web Service Administrative Interface Buffer Overflow 
Symantec AV linked to Verisign certificate problem, DUGallery, False Weather Alerts, more phishing 
Symantec AV RAR library vulnerability 
Symantec AV Vulnerability Latest 
Symantec beats estimates on demand for security products
Symantec CEO takes over global sales chief's job, shows him door
Symantec detecting NSIS as trojan.zlob. 
Symantec DOS Exploit Code, Sasser Backdoor Exploit Capture, Reading Material 
Symantec finds Linux wiper malware used in S. Korean attacks
Symantec forecasts weak results as yen depreciates
Symantec Patch Posted 
Symantec Products Vulnerabilties / Worm Password List / Mailbag-Netsky 
Symantec retires low-end security software
Symantec Scan Engine Multiple Vulnerabilities 
Symantec Sees Links Between 2011, 2013 Cyber-Attacks on South Korea
Symantec update blocks access to AOL 
Symantec VERITAS Storage Exec DCOM Server BO's 
Symantec: don't blame us for New York Times hack
Symantec: Flashback malware netted upwards of $10,000 a day
Symbian operating system - Nokia series 60 mobile phones - 3 new Trojans 
Symbian Sells Millions, Despite Nokia Pushing Windows Phone
SYN-ACK Packets With Data
Syncing Between Devices
Synthetic Materials Set New World Record For Greatest Amount of Surface Area
Syria drops from Internet 7th May 2013, (Wed, May 8th)
Syria Falls Off the Internet Again
Sysadmin Appreciation Day 
Syslog'n with the best of 'em; 
System Architecture Test Plan (Expanded)
System Documentation: Application Software
System Documentation: Working System
System Resource Utilization Monitor
System Spec: External (Human) Interface
System Store Trojan, Infection Persistence, Save the Pr0n 
TACC "Stampede" Supercomputer To Go Live In January
Taiwan Earthquakes cut undersea cables 
Taiwan security official warns of crippling Chinese cyberattacks
Taiwan to ramp up cyberwar efforts
Taiwan's civil servants caught by sexy email trap
Take a Free Networking Class From Stanford
Take Back Wednesday? SQL Slammer... still alive but barely kicking
Taking a Hard Look At SSD Write Endurance
Taking a Look at the FreeVideo Player Trojan 
Taking Action For Free JavaScript
Talented and Creative Group We Are 
Taliban official's email blunder leaks 400+ contacts
Talking to Kids About Online Porn: How One Dad Handled it
Tap Gigabit Networks on the Cheap
Targeted attack: experience from the trenches 
Targeted attack: Word exploit - Update 
Targeted Attacks Increased, Became More Diverse in 2011
Targeted IPv6 Scans Using pool.ntp.org .
Targeted Trojan attacks? 
Tata Intends To Sell Air-Powered Car In India
Tax Day and associated risk 
Tax Day and recovering from San Diego; Oracle patches; IRC spam worm 
TCP 554 scanning; Linux mremap local root exploit posted 
tcp bindshell with password prompt in 162 bytes 
TCP Fuzzing with Scapy, (Thu, Sep 13th)
TCP port 10000 cont. / Connecting mismatched protocols 
TCP port 1025 activity; continued DNS poisonings; 802.11 security primer 
TCP Port 8181 Puzzle 
tcp/135 and ICMP Continue to Decline; Solaris 8 Hacks 
TCP/1433 spike: Call for Packets. 
Teenager Makes Discovery About Galaxy Distribution
Teens arrested in connection with attack on UK Police Agency
Teens Drug Parents To Get Web Access
Teens, Social Media, and Privacy
Tech tip follow-up: Using the data Invoked with R's system command
Tech tip: Invoke a system command in R
TechCrunch:Expanded DMCA Still Has Limits
Technical document on WMF vulnerability and Guilfanov's patch available 
Technical Mujahid Magazine 
Television Network Embeds Android Device In Magazine Ads
Telnet client vulnerability; DNS posioning re-appearing 
Telstra Bigpond To Use Outlook.com As Email Handler
Temporary Patches for createTextRange Vulnerability 
Tens of millions of hackers target Israel government websites
Tesla CTO Talks Model S, Batteries and In-car Linux
TeslaCrypt ransomware sent using malicious spam
Test File: PDF With Embedded DOC Dropping EICAR 
Test Gallery - VMware
Testing for DNS recursion and avoiding being part of DNS amplification attacks
TestLink v1.9.3 Arbitrary File Upload Vulnerability
Tests Show That Deadly New Flu Could Spread Among People
Texan schoolgirl expelled for refusing to wear RFID tag
Texas Attorney General Warns International Election Observers
Texas Company's Antique Computers Are For Production, Not Display
Texas School Board Searching For Alternatives To Evolutionary Theory
Texas State Rep. Files 2 Bills To Ban RFID In Schools
Thai PM's site defaced with smutty abuse
Thanks for info on chat monitoring; PanadaLabs report; Hyper-Threading vulnerability 
Thanx to our readers 
That Peculiar Genetics of Mathematics
The "Yes, but..." syndrome
The 1 Train Hackers Stole $2.4 Million from 2,904 ATMs in Just 10 Hours
The 3D Un-Printer
The 7 Craziest Intelligence Leaks in US History
The 80's called - They Want Their Mainframe Back!, (Wed, Jan 9th)
The 866-PC-SAFETY poll 
The Agony And Ecstasy Of The Oracle 11gR2 Upgrade
The Algorithmic Copyright Cops: Streaming Video's Robotic Overlords
The AP Twitter hack: Wall Street's tweet-scraping technology that sparked a 145-point nosedive
The Arcati Mainframe Yearbook 2013
The asymmetry implicit in Internet data retention
The ATF Not Concerned About 3D Printed Guns... Yet
The Beast 
The best anti-Obama book I've read
The biggest cyberattack in Internet history
The Biggest Financial Fraud of All Time
The British Have All The Fun
The Bronies Get Their Own Charity
The Case For Targeted Ads
The Case for UC Interoperability
The CIA and Jeff Bezos Bet $30 Million On Quantum Computing Company
The Cloud Ecosystem - Just Getting Started
The Cloud Wars
The Coming Internet Video Crash
The Computer Science Behind Facebook's 1 Billion Users
The Current Cloud Landscape
The cyber debate goes public
The Cyber Threat To the Global Oil Supply
The Danger In Exempting Wireless From Net Neutrality
The dangers of shared web hosts 
The Dark Side of Certificate Transparency
The Data Crunchers Who Helped Win The Election
The Empire Hacks Back Challenge: Test Your Windows Command-Line Kung Fu 
The era of big DDOS?
The Family System Administrator 
The Faraway Cloud: Measuring Cloud Performance
The FBI Is Now Investigating the Steubenville Backlash
The FBI will turn off the Internet on Monday (or not), (Mon, Jul 9th)
The FBI's reported new plan to read your emails
The Foldable Readius Ereader Is Dead
The Foundation of Your ATS Should be a CRM
The Free State Project, One Decade Later
The FSF Adopts the Kickstarter Approach To Fund-raising
The Full Text of President Obama's 2013 State of the Union Address
The Gates Foundation Engages Its Critics
The government wants to know what it doesn't know
The H Roundup - AMD fires developers, Android turns 5, E17 alpha arrives
The H Roundup - Bogus leap seconds, EFI rootkits and cloud cracking
The H Roundup - Linux Mint 15 RC, WebM patents, Google drops XMPP
The H Roundup for the week ending 12 May
The H Roundup for the week ending 14 July
The H Roundup for the week ending 17 March
The H Roundup for the week ending 18 February
The H Roundup for the week ending 19 May
The H Roundup for the week ending 2 June
The H Roundup for the week ending 23 June
The H Roundup for the week ending 24 March
The H Roundup for the week ending 28 July
The H Roundup for the week ending 9 June
The H Roundup for the week ending May 5
The History of the Floppy Disk
The Hunt For LulzSec's Missing Sixth Member
The chocolate / attack correlation 
The importance of ongoing dialog
The Intelligence Cycle for a Vulnerability Intelligence program on-the-cheap 
The Internet Plays Role of Stupidity Amplifier
The ISC is not Trying to Trojan Your Machines 
The Largely Unknown Success Story of Afghanistan's Television Network
The Linux-Proof Processor That Nobody Wants
The Long Reach of US Extradition
The Mathematics of the Lifespan of Species
The Matthew Keys Case Shows Just How Big a Bully the Feds Can Be
The missing Microsoft patches 
The Mobile App Design Tail Wags the Desktop Software Design Dog
The most hated IP address of 2005 ? 
The MS Claria debate; Intrusions via MS05-017; some more light reading 
The New AI: Where Neuroscience and Artificial Intelligence Meet
The New Series of Doctor Who: Fleeing From Format?
The Olympic Live Stream: Observations, Recommendations, Predictions
The other Juniper vulnerability - CVE-2015-7756
The Passing of the Personal Computer Era
The Passwords You Should Never Use
The Perils of Vendor Bloatware
The Pirate Bay supporters hack Virgin Media
The Pirate Bay's Oldest Torrent Is Revolution OS</em>
The Pitfall Of Two Factor Authentication 
The Privacy Illusion
The Prototype Still Works; Insider Threat Paper; More Keylogging; Translation 
The Rapid Rise of License Plate Readers
The reasons you should attend IOD 2012 aren't always technical
The Release Candidate For Linux Mint 14 "Nadia" Is Out
The Return of CISPA
The Rise of Paid Wikipedia Consulting
The Risks of Trusting Experts
The Science Behind Building a Space Gun
The security risks and rewards of big data
The Short Life of a Vulnerable DVR Connected to the Internet
The Shumway Open SWF Runtime Project
The Sleuth Kit (TSK) for Windows released 
The Snort Top 10 
The SPAM People;Thanks;Package Verification 
The Strange Nature of the Nigerian App Market
The Struggles of Getting Into the App Store
The Tech Behind Felix Baumgartner's Stratospheric Skydive
The Three Pillars of Data Warehousing
The Tiny Console Killers Taking On the PS4 and Xbox 720
The Top 10 - The Best Conversations Happening Right Now
The Top 5 Reasons Cloud Computing Projects Fail
The Top Paying Tech Companies For Interns
The trouble with talking to computers.
The Twelve Days of Christmas Packet Challenge 
The Two Big Problems With Online College Courses
The Ultimate OS X Hardening Guide Collection, (Mon, Feb 20th)
The ultimate tips box
The Value a "Fresh Set Of Eyes" (FSOE)
The White House's Next Enemy: Botnets
The Wordpress Plugins Playground
The World Remains Five Minutes From Midnight
The worst security snafus of 2012 – so far
There are no more Passive Exploits 
There Is No Reason At All To Use MySQL: MariaDB, MySQL Founder Michael Widenius
They didn't predict that: Astrologers! blamed! after! Yahoo! hack!
They Work Long Hours, But What About Results?
Think Tank's Website Rejects Browser Do-Not-Track Requests
Third Party Debates Moderated by Larry King: Discuss
Third-party apps ripe targets for cybercriminals, Secunia says
Thirty Six Days to Dreamforce
This Article is Brought to You By the Letter ノ
'This Is Your Second and Final Notice' Robocallers Revealed
This Week's Top 10 Discussions
This Week's Top 10 Discussions - April 29, 2013
This Week's Top 10 Discussions - May 6, 2013
Thomson Reuters employee indicted for aiding hackers -court filing
Those never-ending waves of Locky malspam
Thoughts about Informix 
Thoughts on PCI (Payment Card Industry) compliance requirements 
Thoughts on VoIP, Holiday recommended reading 
Thousands of Kuwaitis protest against voting changes
Thousands of Publicly Accessible Printers Searchable On Google
Thousands of Publicly Addressable Printers Searchable On Google
Threats in the Cloud Environment SSH Scanners
Three Mile Island Shuts Down After Pump Failure
Three reasons you shouldn't neglect your application security
Three Ways Cloud Computing Providers Shoot Themselves in the Foot
Thunderbird Download Link 
Tibetan and Uyghur activists targeted with Android malware
Tim Bryce - COMMON COURTESY - 9/24/2012
Tim O'Reilly Steps In To Debate Open Government and Linux
Time for some predictions
Time to run Windows Update - - Microsoft Updates KB2755801 for Windows RT / IE10 / Flash Player - http://technet.microsoft.com/en-us/security/advisory/2755801, (Wed, Oct 24th)
Time to update Mozilla/Firefox/Thunderbird and Ethereal; also: sightings of infected IIS 6 servers. 
Time to upgrade Ethereal... 
Time Zone Updates, Part 2 
Times sued over police hacking
Tiny Pill Relays Body Temperature of Firefighters In Real-time
Tip of the Day - Backup and Backup Management for Home or Small Business Users 
Tip of the Day - Color and Bar Coded Daily Risk Analysis 
Tip of the Day - Fleshing out the details in email policy 
Tip of the Day - Home Wireless Gateways 
Tip of the Day - If you don't need it on, turn it off. 
Tip of the Day - Like a Kid in a WMIC Candy Store 
Tip of the Day - Making the Switch 
Tip of the Day - PHP Security 
Tip of the Day - Protecting HP JetDirect-based Printers 
Tip of the Day - Turn the NICs off during installation 
Tip of the Day : snort rule management 
Tip Of The Day 
Tip of the Day: Audit 
Tip of the Day: Be unpredictable and diverse 
Tip of the Day: Don't be a victim (well try to not be a victim) - security toolbars 
Tip of the Day: Logbooks 
Tip of the Day: mount options 
Tip of the Day: Protect the Single Points of Compromise 
Tip of the Day: Read e-mail in plain text (as God intended) :) 
Tip of the Day: Remove Default Route 
Tip of the Day: Secure Surfing at the Coffee Shop (or Hacker Conferences) 
Tip of the Day: Standards 
Tip of the Day: Strong Passwords 
Tip of the Day: Surviving the monthly patch cycle 
Tip of the day: Test, don't ping 
Tip of the Day: The -they shall not be broken into- challenge 
Tip of the Day: Turn off your Computer 
Tip of the Day: Use ssh keys 
Tip of the Day: Use the features of your switches 
Tip of the day: using host based firewall on Windows XP SP2 
Tip: Quick Analysis of Office Maldoc
Tippingpoint IPS DoS 
Tips for Stopping Ransomware
T-Mobile patches Wi-Fi eavesdrop vuln
To protest Israel's Gaza offensive, 'Anonymous' launches millions of cyberattacks
To report any scams/malware related to Hurricane Matthew, use our contact form: https://isc.sans.edu/contact.html
To SSL or not to SSL - send us your links! 
ToD - Configuration Management - maintaining security awareness 
Today's Locky Variant Arrives as a Windows Script File
Tolkien Estate Sues Over Lord of the Rings</em> Slot Machines
Tomcat IR with XOR.DDoS
Tool Released to Decrypt Petya Ransomware Infected Disks
Tool Tip: Kansa Stafford released, PowerShell for DFIR
Tool updates and Win 8, (Sun, May 6th)
Tools released at Defcon can crack widely used PPTP encryption in under a day
toolsmith #112: Red vs Blue - PowerSploit vs PowerForensics
Top 100 security tools 
Top 20 Internet Status Sites 
Top 20 update; IM malware and IRC bots are the flavor of the day; Sober variant 
Top 6 Mashable Comments This Week (Mashable)
Top20 List Updated; TCP/1433 Remains Elevated; ZoneAlarm 6.0 Released; The Penetrating Packets: Spam E-Mail 
TOR servers seized by police in Germany 
Torvalds Takes Issue With De Icaza's Linux Desktop Claims
Total Solar Eclipse Bedazzles Northern Australians
Tour of the Deep Underground Science and Engineering Lab
TR-069 NewNTPServer Exploits: What we know so far
Tracking HTTP POST data with ELK
Tracking Privileged Accounts in Windows Environments
Tracking SSL Certificates
Trade Group: US Software Developer Wages Fell 2% Last Year
Trading Privacy for Convenience
Traits of a Software Professional
Treasure Your Trials
Trend Micro unearths more links between China and hacker group
Trends in malware installers, Oddbob is back, .ANI file followup, and SMTP oddities redux. 
Treo 700w DST Ooooops! 
Trevor Eddolls - IBM Champion 2012
Tricks for DLL analysis
Trisquel 6.0 'Toutatis' Is Now Available
Trojan attack on Maplesoft customers
Trojan Disguised as Microsoft Patch; Identity Theft 
Trojan dropper in Power Point - a new issue? 
Trojan exploiting MS05-053 - TROJ_EMFSPLOIT.A 
Trojan postcards; Using authorized apps to do bad things; More IE and Outlook problems? 
Trojan.Mdropper.Q / Email Attachment Practices 
Trojanized SSH Daemon In the Wild, Sending Passwords To Iceland
Trouble At OnLive
Trouble Brewing? - Port 106 Activity 
Trusteer Identifies Universal Man-in-the-Browser Attack Technique
Trustworthy Computing 
TSA Says Screening Drinks Purchased Inside Airport Terminal Is Nothing New
Tsunami.exe, Oracle critical patch update, got packets? 
Turkey Lurkey brings state of calm to the net -- well, almost 
Turkish agency blamed by U.S. companies for intercepted Web pages
Turkish Registrar Enabled Phishing Attacks Against Google
Turning SF's Bay Bridge Into a Giant LED Display
TV station hacker warns of zombies in Montana
Twas the night before Christmas, when all through the house Not a creature was stirring, not even a mouse. 
Tweet-to-buy? American Express says yes
Twin Craft To Study Space Weather From Within Earth's Radiation Belts
Twitter Based "Ted" System Warns of Earthquakes Earlier
Twitter Breached, 50k Accounts Posted to Internet
Twitter clients stay signed in with pre-breach passwords
Twitter hires Apple’s hacker nemesis to boost its security team
Twitter jumps on Do Not Track bandwagon
Twitter locks down logins by adding two-factor authentication
Twitter Resets 250,000 User Passwords After Cyber-Attack
Twitter spam campaign infects users with fake antivirus programs
Twitter stumble causes outage, not hactivist
Twitter suffers malware spam outbreak
Twitter Tells News Organizations to Expect Even More Hacks in the Future
Twitter's Vine App Ready To Bomb Internet With GIF-Like Videos
Two great books for aspiring "data scientists"
Two Heads Are Better Than One For Brain-Computer Interfaces
Two Changes To Quirky Could Change The World
Two new Internet Explorer vulnerabilities disclosed including PoC 
Two New Sober Viruses on the Loose Today 
Two subsystem parameters (DSNZPARM keywords) have been added in support of DDF (and other DDF enhancements...)
Two subsystem parameters have been added in support of DDF (and other DDF enhancements...)
Two Things I Wish Companies Cared More About: Cloud & Acquisitions Risks
Two-factor authentication Defense Mechanisms 
Two-Way Firewall in Windows Vista and Microsoft OneCare 
Tylenol May Ease Pain of Existential Distress, Social Rejection
Typo Squatting Charities for Fake Tech Support Schemes
Typo-Squatting and Password Best Practices 
U.N. nuclear agency says hackers stole information
U.S Law Enforcement Agencies Increase Warrantless Electronic Snooping
U.S. Army, Target, others advertising on pirate sites
U.S. bank website hackers used advanced botnets, diverse tools
U.S. carriers line up against texting while driving
U.S. Congress urged to probe Chinese cyber-espionage
U.S. cyber warrior accuses China of targeting Pentagon
U.S. defense chief says pre-emptive action possible over cyber threat
U.S. group studying breach at Schneider unit
U.S. lawmakers to introduce new bill to punish cyber theft
U.S. looks into claims of security flaw in Siemens gear
U.S. panel urges wariness as Chinese investment grows
U.S. report says major weapons designs compromised by Chinese
U.S. Seeks Power to Wiretap Web Services, Including Google, Facebook
U.S. seeks to tackle trade secret theft by China, others
U.S. seeks to tackle trade-secret theft by China, others
U.S. Senator Takes Wrong Turn on DOJ's GPS Tracking Requests
U.S.-Israel project with Motorola leads to security-hardened industrial control system
UAC Bypass in JScript Dropper
Ubisoft assassinates Uplay flaw, denies DRM rootkit
Ubisoft DRM opens backdoor
Ubuntu Developing Its Own Package Format, Installer
Ubuntu Gnome Remix 12.10 Arrives For Testing
Ubuntu install passwd in log 
Ubuntu Isn't Becoming Less Open, Says Shuttleworth
Ubuntu Touch Developers Aim for Daily Phone Usability Before June
uCertify Online Prep Kit - Software Review
UDP port 1434 directed attack to AS13489 IP ranges, (Fri, May 24th)
UDP Port 47290 
UDP traffic to port 50368 
UDP/1030 (continued) 
udp/1030 Increase 
UDP/4081 Spike 
UK Authorities Threaten To Storm Ecuadorian Embassy To Arrest Julian Assange
UK biz pays heavy price for skimping on security - PwC
UK Broadband Plan Set To Clear EU Approval
UK cookies cop changes own policy to ‘implied consent’
UK Court: MPAA Not Entitled To Profits From Piracy
UK Critical Infrastructure and Business Trojan Attacks (Updated), imap scanning, Opera vulns, Adobe Reader/Acrobat vuln, NIST Control Tool, Mailbag 
UK Government Owns 16.9 Million Unused IPv4 Addresses
UK Government Spending £6,000 Per Computer Every Year To Maintain Desktops
UK Gov't Official Advises Using Fake Details On Social Networks
UK hacker jailed for nicking PayPal, banking data from MILLIONS
UK charges teenager for alleged jamming of anti-terrorist hotline
UK lawmakers say Huawei-BT deal exposes flawed security controls
UK License Plate Cameras Have "Gaps In Coverage"
UK Ministers' Private Communications Subject To Freedom of Information Act
UK Police Fined For Using Unencrypted Memory Sticks
UK Police Now Double As CCTV Cameras
UK police: Man charged in UK soldier's murder
UK.gov to spunk £2m a year policing global cyber-security
UKNova TV Torrent Tracker Shut Down After FACT Issues C&D
Ultra-hackable Google Glass could be a security nightmare
UN: More international cooperation needed to fight cyberterrorism
Unauthorized Change Detected!
Unencrypting Extortion Malware 
Unidentified E-mail worm, PHP server vulnerabilities, MS SMS Client DoS 
Uninstalling Problem Applications using Powershell
Unity Makes Strength
Universal IPSec VPN client for Android 4.0
University Security Problems and Another CHM exploit in the Wild 
Unix/Linux Steals the Show!
Unpatched exploit gets publicity 
Unpatched Vulnerability in Firefox used to Attack Tor Browser
Unreal Engine Heap Overflow, RBOT.CC, ISCAlert 
Unscrambling an Android Telephone With FROST
Unspecified Vulnerabilities in Flash 
Unusual Discovery of New African Monkey Species
Unusual New Species of Dinosaur Identified
Update - Symantec RAR File Parser Remote Heap Overflow 
Update 20:10 GMT 2004-1-28: New variant of Novarg/MyDoom found, Microsoft Changing IE's URL Handling, Solaris Local Privilege Escalation 
Update Firefox to 1.5.0.1, the exploit is out 
Update for Intel(R) PRO/Wireless 3945ABG Network Connection Software bugs 
Update for Windows Update has teething troubles
Update from Microsoft Not Included in April 2006 Bulletin 
Update on MS06-042 and CA Unicenter Service Desk 
Update on Postcard virus emails 
Update on Symantec Elevation of Privilege Vulnerability 
Update on the Paypal Phish Phlaw 
Update on the SUS issues 
Update on the UDP strange packets 
Update on TrendMicro Pattern 594 Issue; W2K Mainstream Support Ending June 30, 2005; My Computer Has a Rash 
Update on Word 0-Day Issue 
-UPDATE- Sasser Worm , Week in Review; LSASS Exploit Analysis; SANSFIRE 2004 
Update to MS04-025; Windows 2003 Guides Released; Port 3072; Your Daily Phish 
Update/Fix for MS06-049 
Update: Malware Analysis: Tools of the Trade 
Update: New Windows XP SP2 vulnerability; MS Patches reports; Bad, Bad Spam... 
Update: Paypal Phish Conditioning; DNS Denial of Service Vulnerability; CA Vet Library Vulnerability; Combating Windows Malware Tutorial 
Update: Sasser.d to start the work week, clean up tools may not be adequate 
Updated (13:45 3/18 GMT): OpenSSL DoS Vulnerability, New Bagel Variants 
Updated Acrobat Snort Sig / Cisco Advisory / Distributed Vulnerable Scripts Scans/ Diary Foot-note 
Updated DShield Blocklist
Updated Malware Domain List 
Updated Model Puts Earth On the Edge of the Habitable Zone
Updated MSIE VML Remote Buffer Overflow Exploit Code Released 
Updated Packet Attack flash animation 
Updated PFSense Client
Updated RSS Feed 
Updated Twiki Snort Sig 
Updated version of Ilfak Guilfanov's patch 
Updated Windows Registry Concealment Info;Symantec AV Vulnerability 
Updated(2): Checkpoint VPN-1 ASN.1 vulnerability, RADIUS and wireless, reminder about home routers 
Updated: Bagle C Virus. New Vulnerability in RealSecure and BlackIce Products, Solaris 8 and 9 passwd(1) bulletin, WinZip flaw, IE cross-frame scripting issue 
Updated: IWAP_WWW account on compromised IIS servers 
Updated: MS04-011 LSASRV Exploit; Sasser Worm Update: Sasser.b 
Updated: Security bulletins from Sun, more Dameware 
Updates on DNS Poisoning / Peru Offline / Mailbag and other stories... 
Updates on IE vulnerability 
Updating early and often; NPR gets it right 
UPEK fingerprint scanners insecure, says Elcomsoft
Upgrading ODI to 11g
Upgrading Software From 350 Million Miles Away
UPnP Problems 
UPnP scan shows 50 million network devices open to packet attack
UPS raises dividend to 62 cents from 57 cents
URGENT: New version of Beagle hitting 
US accused of hypocrisy over cyber warfare
US activist released from Vietnam after 9 months
US Activists Oppose US Govt Calls To Weaken EU Privacy Rules
US Air Force Scraps ERP Project After $1 Billion Spent
US Authorities Start Extradition Process in Megaupload Case (March 5, 2012)
US banks hit by more than a week of cyberattacks
US blaming Iran for Persian Gulf cyberattacks
US CEO Says French Workers Have Three-Hour Work Day
US congress wants a word with ZTE, Huawei
US Department of Homeland Security Looking For a Few Good Drones
US DHS banking alert 
US DOJ Claims It Did Not Entrap Megaupload
US Educational Scores Not So Abysmal
US Election's Only VP Debate Tonight: Weigh In With Your Reactions
US Freezes Nuclear Power Plant Permits Because of Waste Issues
US Government Monitoring Associated Press Phone Records
US government wants security research on car-to-car nets
US chief spook: Look, we only want to spy on 6.66 BEELLLION of you
US Is Finally Cleaning Up Agent Orange In Vietnam
US ISPs commit to new cybersecurity measures
US Justice Dept. Sues eBay For Anti-Competitive Hiring Practices
US legislation to strengthen mobile data protection proposed
US Looks For Input On "The Next Big Things"
US Military Tested the Effects of a Nuclear Holocaust On Beer
US Mining Data Directly From 9 Silicon Valley Companies
US national vulnerability database hacked
US options exchange reopens after half-day outage
US parents quit Singapore inquest into son's death
US power grid the target of 'numerous and daily' cyber-attacks
US President Ford Dies 
US Presidential Debate #2 Tonight: Discuss Here
US software firm hacked for years after suing China
US Suspects Iran Was Behind a Wave of Cyberattacks
US warning reflects fears of Iranian cyberattack
USA Calling For the Extradition of Snowden
USB cleaning device for the masses
USB Storage Drive Loaded With Malware Shuts Down Power Plant
Use The Privilege
User Awareness and Education, (Sat, Jul 14th)
User Group Notice: July 11, 2012 Houston Area DB2 User Group meeting has been scheduled
User Group Reminder: This Wednesday (July 11, 2012) is the next meeting of the Houston Area DB2 User Group
User Help: Operations Manual
User Help: The User Manual
User questions new WindowsUpdate Fix 
Users Abandon Ship If Online Video Quality Is Not Up To Snuff, Says Study
Users give Facebook's privacy changes a thumbs down
Users still double clicking email attachments, MSJVM Removal Tool 1.0, Upcoming ISC Webcast 
Using daemonlogger as a Software Tap
Using ISA to help block VML exploit 
Using Security Tools to Compromize a Network
Using Solr/Lucene to Surface the Big Data of Social Media
Using the Center for Internet Security (CIS) Benchmarks to Support an Information Security Management System
Using Truth Serum To Confirm Insanity
USPS Discriminates Against 'Atheist' Merchandise
Utah breach may have compromised over 25,000 Social Security numbers
Utah: 750K more victims in health dept data breach
V$process, V$session: FULL OUTER Curiosity
Vacation Rental Property Scam 
Valve Blog Announces Dates For Steam Linux External Beta
Valve Officially Launches Steam For Linux
Vastly Improved Raspberry Pi Performance With Wayland
VBA and P-code
VBA Shellcode and Windows 10
VBS.Pub Worm, RTT Measurement Probes, ARIN in-addr.arpa, IE Exploits 
VCE: Driving the Velocity of Change within the IT industry
Vendors Take Note, Mark II, DHS Cyber Chief Departure 
Vendors: More Patch-Release Options Please, (Sat, Aug 4th)
Venezuela prosecutor to open probe over leaked recording
Verifying SSL/TLS certificates manually
Verisign Site Seal Update 
Veritas Exploit on the web 
VERITAS NetBackup (tm) Enterprise Server/Server 5.0 and 5.1 BO 
VERITAS NetBackup Vulnerability - remote 
Veritas pulls (some) patches for Backup Exec 
Veritas 'Sploits, MS05-002 PoCs, Phishin' through the hoops, Microsoft vs. Porn 
Verizon Data Breach Report Offers Scary Truths About Security
Verizon Ordered To Provide All Customer Data To NSA
VIA Unveils $79 Rock and $99 Paper ARM PCs
Victim of its own success and (ab)used by malwares
Victory For Apple In "Patent Trial of the Century," To the Tune of $1 Billion
Video Inpainting Software Deletes People From HD Video Footage
Virnetx Loses Court Battle To Cisco Over VPN Patent
Virtual Backup Challenges Enterprise IT
Virtual Bitlocker Containers
Virtual Machine Detection in Malware via Commercial Tools 
Virus Alphabet, War!, Port 3389 Spike, WinZip Issues 
Virus could black out nearly 250,000 PCs on Monday
Virus scanning recommendations for Enterprise computers (Revision 53)
Virus spreads from Asus Server 
Virus Tuesday: New Bagels, New Mytob. ; qmail pop3 64bit issues 
Virut Botnet Crippled in Multinational Takedown Effort
Visa Sued for Fines Stemming from Genesco Data Breach
Vista reviewed by Symantec 
Vista: better security [Y/N] ? 
Visual Studio 2005 Remote Code Exploit, Actively Being Exploited 
Visualization of Dasher worm 
VML exploits with OS version detection 
VML vuln being actively exploited 
vMotions a Killer App for 10GbE at Vonage
VMware Acquires Virsto To Enhance Virtual Storage Performance
VMWare Browser 
VMware Hybrid Cloud Plans: Time For Amazon Answer
VMware Patches DoS Vulnerability in Virtualization Software
VMWare Security Advisories VMSA-2016-0005
VMWare Security Advisory
VMWare Security Advisory: VMSA-2012-0014 - http://www.vmware.com/security/advisories/VMSA-2012-0014.html, (Fri, Oct 5th)
VMware Security Bulletins
VMware security update
VMware VMSA-2015-0007.3 has been Re-released
VMware VMSA-2016-0002
VMware's SDN Dilemma: VXLAN or Nicira?
Voice Message Notifications Deliver Ransomware
Volatility Bot: Automated Memory Analysis
Volunteer Response 
Volunteer Response; OpenSSH issues; Bluetooth delay 
Vote On What the Very Large Telescope Observes
Voter Data: What the Candidates Know About You
Voting Machine Problem Reports Already Rolling In
VPN ban makes for nervy times behind Great Firewall
Vsmons.exe / Port 6112 / USBank phishing / MS04-22 Update 
vSphere 5.0 Hardening Guide Officially Released, (Mon, Jun 4th)
Vuln: 389 Directory Server CVE-2013-0312 Remote Denial of Service Vulnerability
Vuln: ActFax Server Multiple Remote Buffer Overflow Vulnerabilities
Vuln: activeCollab Chat Module Arbitrary PHP Code Execution Vulnerability
Vuln: Adobe Acrobat and Reader APSB13-15 Multiple Security Vulnerabilities
Vuln: Adobe Acrobat and Reader CVE-2013-0603 Remote Heap Based Buffer Overflow Vulnerability
Vuln: Adobe Acrobat and Reader CVE-2013-0604 Remote Heap Based Buffer Overflow Vulnerability
Vuln: Adobe Acrobat and Reader CVE-2013-0610 Remote Stack Based Buffer Overflow Vulnerability
Vuln: Adobe Acrobat and Reader CVE-2013-2730 Remote Buffer Overflow Vulnerability
Vuln: Adobe Flash Player and AIR APSB13-14 Multiple Memory Corruption Vulnerabilities
Vuln: Adobe Flash Player and AIR CVE-2012-5275 Buffer Overflow Vulnerability
Vuln: Adobe Flash Player and AIR CVE-2012-5279 Memory Corruption Vulnerability
Vuln: Adobe Flash Player and AIR CVE-2012-5280 Buffer Overflow Vulnerability
Vuln: Adobe Flash Player and AIR CVE-2013-0647 Memory Corruption Vulnerability
Vuln: Adobe Flash Player and AIR CVE-2013-1374 Use After Free Remote Code Execution Vulnerability
Vuln: Adobe Flash Player and AIR CVE-2013-3343 Remote Memory Corruption Vulnerability
Vuln: Adobe Reader Unspecified Remote Code Execution Vulnerability
Vuln: Anacrypt '.tuz' Configuraton File Information Disclosure Vulnerability
Vuln: Apache HTTP Server Terminal Escape Sequence in Logs Command Injection Vulnerability
Vuln: Apache Struts 'ParameterInterceptor' Class OGNL (CVE-2011-3923) Security Bypass Vulnerability
Vuln: Apache Struts2 Skill Name Remote Code Execution Vulnerability
Vuln: Apache Subversion CVE-2013-1968 Remote Denial of Service Vulnerability
Vuln: Apache Tomcat CVE-2012-2733 Denial of Service Vulnerability
Vuln: Apache Tomcat CVE-2012-4431 Cross-Site Request Forgery Vulnerability
Vuln: Apache Tomcat CVE-2012-4534 Denial of Service Vulnerability
Vuln: Apache Tomcat DIGEST Authentication Multiple Security Weaknesses
Vuln: A-PDF All to MP3 Converter '.wav' File Remote Buffer Overflow Vulnerability
Vuln: Apple iOS User Space Stack Cookies CVE-2013-3951 Local Security Bypass Vulnerability
Vuln: Attachmate Reflection DLL Loading Arbitrary Code Execution Vulnerability
Vuln: BackupPC 'index.cgi' Multiple Cross Site Scripting Vulnerabilities
Vuln: Bind DynDB LDAP CVE-2012-3429 Package Remote Denial of Service Vulnerability
Vuln: Broadcom UPnP Stack 'SetConnectionType()' Function Format String Vulnerability
Vuln: Bugzilla Multiple Information Disclosure Vulnerabilities
Vuln: Call of Duty: Modern Warfare 3 Remote Denial of Service Vulnerability
Vuln: Cisco VPN Client for Windows CVE-2012-5429 Local Denial of Service Vulnerability
Vuln: CoDeSys Access Security Bypass Vulnerability
Vuln: CoolPDF Reader CVE-2012-4914 Remote Stack Buffer Overflow Vulnerability
Vuln: Coppermine Photo Gallery 'keywords' Field HTML Injection Vulnerability
Vuln: CryENGINE Remote Code Execution Vulnerability
Vuln: CyberLink PowerProducer Multiple DLL Loading Arbitrary Code Execution Vulnerabilities
Vuln: CyberLink StreamAuthor Insecure Library Loading Multiple Arbitrary Code Execution Vulnerabilities
Vuln: Cyclope Employee Surveillance Solution 'username' Parameter SQL Injection Vulnerability
Vuln: Django 'HttpRequest.get_host()' Information Disclosure Vulnerability
Vuln: Django Multiple Security Vulnerabilities
Vuln: DM FileManager 'album.php' Remote File Include Vulnerability
Vuln: Dnsmasq Multiple Remote Denial of Service Vulnerabilities
Vuln: Dokuwiki 'url' HTML Injection Vulnerability
Vuln: Drupal CDN Module Information Disclosure Vulnerability
Vuln: Drupal Core Multiple Access Bypass and Cross Site Scripting Vulnerabilities
Vuln: Drupal Faster Permissions Module Access Security Bypass Vulnerability
Vuln: Drupal Node Parameter Control Module Access Bypass Vulnerability
Vuln: Drupal Printer, email and PDF versions Cross Site Scripting Vulnerability
Vuln: EC Software Help & Manual 'ijl15.dll' DLL Loading Arbitrary Code Execution Vulnerability
Vuln: Effective File Search (EFS) DLL Loading Arbitrary Code Execution Vulnerability
Vuln: Elxis CMS Multiple Cross Site Scripting Vulnerabilities
Vuln: EMC AlphaStor CVE-2013-0930 Buffer Overflow Vulnerability
Vuln: EMC Avamar Backup Client Insecure File Permissions Vulnerability
Vuln: ERDAS ER Viewer 'ERM_convert_to_correct_webpath()' Function Stack Buffer Overflow Vulnerability
Vuln: FreeIPA CVE-2012-4546 Certificate Revocation List Security Vulnerability
Vuln: Gajim SQL Injection and Code Execution Vulnerabilities
Vuln: Ganglia Unspecified PHP Code Execution Vulnerability
Vuln: gdk-pixbuf 'read_bitmap_file_data()' Remote Integer Overflow Vulnerability
Vuln: GIMP CVE-2012-3402 Buffer Overflow Vulnerability
Vuln: GIMP Multiple Buffer Overflow Vulnerabilities
Vuln: GnuPG CVE-2012-6085 Multiple Remote Memory Corruption Vulnerabilities
Vuln: Google Chrome for Android Prior to 18.0.1025308 Multiple Security Vulnerabilities
Vuln: Google Chrome Prior to 15.0.874.102 Multiple Security Vulnerabilities
Vuln: Google Chrome Prior to 17.0.963.56 Multiple Security Vulnerabilities
Vuln: Google Chrome Prior to 17.0.963.65 Multiple Security Vulnerabilities
Vuln: Google Chrome Prior to 20.0.1132.57 Multiple Security Vulnerabilities
Vuln: HP Insight Diagnostics CVE-2013-3574 Remote Code Injection Vulnerability
Vuln: HP Intelligent Management Center 'FaultDownloadServlet' Information Disclosure Vulnerability
Vuln: HP Intelligent Management Center 'IctDownloadServlet' Information Disclosure Vulnerability
Vuln: HP Intelligent Management Center 'mibFileUpload' Servlet Remote Code Execution Vulnerability
Vuln: HT Editor File Open Remote Stack Buffer Overflow Vulnerability
Vuln: IBM WebSphere Application Server Administrative Access Security Bypass Vulnerability
Vuln: IBM WebSphere Application Server for z/OS Multiple Security Vulnerabilities
Vuln: ICCLIB CVE-2012-4405 Out-of-Bounds Memory Write Remote Code Execution Vulnerability
Vuln: Intel CPU Hardware Local Privilege Escalation Vulnerability
Vuln: IRCD-Hybrid 'try_parse_v4_netmask()' Denial of Service Vulnerability
Vuln: ISC BIND 9 'libdns' Remote Denial of Service Vulnerability
Vuln: ISC DHCP IPv6 Lease Expiration Handling Denial of Service Vulnerability
Vuln: JBoss Enterprise Application Platform Cross Site Request Forgery Vulnerability
Vuln: JBoss Enterprise BRMS Platform JGroups Diagnostics Service Information Disclosure Vulnerability
Vuln: JBoss 'twiddle.sh' Local Information Disclosure Vulnerability
Vuln: Joomla! JCE Component Multiple Directory Traversal Vulnerabilities
Vuln: jPlayer 'Jplayer.swf' Script 'id' Parameter Cross Site Scripting Vulnerability
Vuln: JW Player 'logo.link' Parameter Cross Site Scripting Vulnerability
Vuln: JW Player Multiple Cross Site Scripting Vulnerabilities
Vuln: KDE Plasma Paste Applet Local Password Generation Vulnerability
Vuln: libgdata SSL Certificate Validation Security Bypass Vulnerability
Vuln: LibRaw CVE-2013-2126 Multiple Memory Corruption Vulnerabilities
Vuln: librdmacm 'ib_acm' Service Port Connection Security Vulnerability
Vuln: LibreOffice and OpenOffice Multiple Heap Based Buffer Overflow Vulnerabilities
Vuln: libssh Multiple Buffer Overflow and Denial of Service Vulnerabilities
Vuln: libupnp Multiple Buffer Overflow Vulnerabilities
Vuln: libvirt CVE-2013-1766 Local Security Bypass Vulnerability
Vuln: libxml2 CVE-2012-2807 Multiple Integer Overflow Vulnerabilities
Vuln: libxml2 Hash Collision Denial Of Service Vulnerability
Vuln: lighttpd 'http_request_split_value()' Function Remote Denial of Service Vulnerability
Vuln: Linux GNU Debugger 'debug_gdb_scripts' Loading Arbitrary Code Execution Vulnerability
Vuln: Linux Kernel CVE-2013-0914 Local Information Disclosure Vulnerability
Vuln: Linux Kernel CVE-2013-1763 Local Privilege Escalation Vulnerability
Vuln: Linux Kernel CVE-2013-1826 NULL Pointer Dereference Local Denial of Service Vulnerability
Vuln: Linux Kernel CVE-2013-1827 Multiple NULL Pointer Dereference Local Denial of Service Vulnerability
Vuln: Linux Kernel CVE-2013-3228 Local Information Disclosure Vulnerability
Vuln: Linux Kernel CVE-2013-3232 Local Information Disclosure Vulnerability
Vuln: Linux Kernel CVE-2013-3234 Local Information Disclosure Vulnerability
Vuln: Linux Kernel EXT4 'ext4_fill_flex_info()' Local Denial of Service Vulnerability
Vuln: Linux Kernel ext4 Local Denial of Service Vulnerability
Vuln: Linux Kernel hypervkvpd 'hv_kvp_daemon.c' Netlink Packet Processing Denial of Service Vulnerability
Vuln: Linux Kernel KVM CVE-2013-1798 Denial of Service Vulnerability
Vuln: Linux Kernel 'mmc_ioctl_cdrom_read_data()' Function Local Information Disclosure Vulnerability
Vuln: Linux Kernel 'MSR' Driver Local Privilege Escalation Vulnerability
Vuln: Linux Kernel Netlink Interface CVE-2013-1873 Multiple Information Disclosure Vulnerabilities
Vuln: Linux Kernel 'request_module() OOM' Local Denial Of Service Vulnerability
Vuln: Linux Kernel 'tg3.c' Integer Overflow Vulnerability
Vuln: Linux Kernel XFS Filesystem 'fs/xfs/xfs_acl.c' Integer Overflow Vulnerability
Vuln: Mahara Multiple Cross Site Scripting and HTML Injection Vulnerabilities
Vuln: MantisBT 'match_type' Parameter Cross Site Scripting Vulnerability
Vuln: MantisBT SOAP API Security Bypass Vulnerability
Vuln: MediaWiki CVE-2012-5391 Session Fixation Vulnerability
Vuln: Microsoft Internet Explorer CVE-2012-1876 Col Element Remote Code Execution Vulnerability
Vuln: Microsoft Internet Explorer CVE-2013-1309 Use-After-Free Remote Code Execution Vulnerability
Vuln: Microsoft Internet Explorer CVE-2013-1311 Use-After-Free Remote Code Execution Vulnerability
Vuln: Microsoft Internet Explorer JSON Array CVE-2013-1297 Information Disclosure Vulnerability
Vuln: Microsoft Internet Explorer Time Element Uninitialized Memory Remote Code Execution Vulnerability
Vuln: Microsoft Windows CVE-2013-2554 Security Bypass Vulnerability
Vuln: Microsoft Windows CVE-2013-2556 ASLR Security Bypass Vulnerability
Vuln: Microsoft Windows Kernel 'Win32k.sys' Integer Overflow Privilege Escalation Vulnerability
Vuln: Microsoft Windows Kernel 'Win32k.sys' Local Privilege Escalation Vulnerability
Vuln: Microsoft Windows Object Linking and Embedding (OLE) Automation Remote Code Execution Vulnerability
Vuln: Microsoft Windows 'Win32k.sys' CVE-2013-1271 Local Privilege Escalation Vulnerability
Vuln: Microsoft Windows 'Win32k.sys' CVE-2013-1274 Local Privilege Escalation Vulnerability
Vuln: MIT Kerberos 5 kadmind CVE-2002-2443 Remote Denial of Service Vulnerability
Vuln: ModSecurity POST Parameters Security Bypass Vulnerability
Vuln: Monkey HTTP Daemon Multiple Denial of Service Vulnerabilities
Vuln: Movable Type Multiple SQL Injection and Command Injection Vulnerabilities
Vuln: Mozilla Firefox and SeaMonkey CVE-2013-0751 Information Disclosure Vulnerability
Vuln: Mozilla Firefox and Thunderbird CVE-2013-0801 Memory Corruption Vulnerability
Vuln: Mozilla Firefox and Thunderbird CVE-2013-1678 Memory Corruption Vulnerability
Vuln: Mozilla Firefox and Thunderbird CVE-2013-1680 Use After Free Memory Corruption Vulnerability
Vuln: Mozilla Firefox and Thunderbird CVE-2013-1681 Use After Free Memory Corruption Vulnerability
Vuln: Mozilla Firefox 'app_tmp' Directory Insecure Permissions Vulnerability
Vuln: Mozilla Firefox CVE-2012-1950 Address Bar URI Spoofing Vulnerability
Vuln: Mozilla Firefox CVE-2012-3979 '__android_log_print' Remote Code Execution Vulnerability
Vuln: Mozilla Firefox CVE-2012-4210 Style Inspector Remote Code Execution Vulnerability
Vuln: Mozilla Firefox CVE-2012-5837 Developer Toolbar Cross Site Scripting Vulnerability
Vuln: Mozilla Firefox, SeaMonkey, and Thunderbird Information Disclosure Vulnerability
Vuln: Mozilla Firefox/SeaMonkey CVE-2013-0794 Information Disclosure Vulnerability
Vuln: Mozilla Firefox/Thunderbird/SeaMonkey CVE-2012-1959 Security Bypass Vulnerability
Vuln: Mozilla Firefox/Thunderbird/Seamonkey CVE-2012-1961 Clickjacking Vulnerability
Vuln: Mozilla Firefox/Thunderbird/SeaMonkey CVE-2012-1972 Use-After-Free Memory Corruption Vulnerability
Vuln: Mozilla Firefox/Thunderbird/SeaMonkey CVE-2012-1973 Use-After-Free Memory Corruption Vulnerability
Vuln: Mozilla Firefox/Thunderbird/SeaMonkey CVE-2012-3959 Use-After-Free Memory Corruption Vulnerability
Vuln: Mozilla Firefox/Thunderbird/SeaMonkey CVE-2012-3962 Memory Corruption Vulnerability
Vuln: Mozilla Firefox/Thunderbird/SeaMonkey CVE-2012-3966 Multiple Memory Corruption Vulnerabilities
Vuln: Mozilla Firefox/Thunderbird/SeaMonkey CVE-2012-3967 Memory Corruption Vulnerability
Vuln: Mozilla Firefox/Thunderbird/SeaMonkey CVE-2012-3970 Use-After-Free Memory CorruptionVulnerability
Vuln: Mozilla Firefox/Thunderbird/SeaMonkey CVE-2012-3971 Multiple Memory Corruption Vulnerabilities
Vuln: Mozilla Firefox/Thunderbird/SeaMonkey CVE-2012-3978 Security Bypass Vulnerability
Vuln: Mozilla Firefox/Thunderbird/SeaMonkey CVE-2012-4179 Use After Free Memory Corruption Vulnerability
Vuln: Mozilla Firefox/Thunderbird/SeaMonkey CVE-2012-5836 Denial of Service Vulnerability
Vuln: Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-0757 Security Bypass Vulnerability
Vuln: Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-0761 Use After Free Memory Corruption Vulnerability
Vuln: Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-0763 Use After Free Memory Corruption Vulnerability
Vuln: Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-0771 Heap Buffer Overflow Vulnerability
Vuln: Mozilla Firefox/Thunderbird/SeaMonkey MFSA 2012-91 through -106 Multiple Vulnerabilities
Vuln: M-Player '.mp3' File Denial Of Service Vulnerability
Vuln: Multiple Asterisk Products CVE-2012-5977 Denial of Service Vulnerability
Vuln: Multiple Honeywell Products 'HscRemoteDeploy.dll' Activex Remote Code Execution Vulnerability
Vuln: Multiple Horde Products Multiple Unspecified HTML Injection Vulnerabilities
Vuln: Multiple Products Cookie Authentication Bypass Vulnerability
Vuln: Multiple SonicWALL Products CVE-2013-1359 Authentication Bypass Vulnerability
Vuln: Multiple Symantec Products CAB Files Handling Memory Corruption Vulnerability
Vuln: Mutiny CVE-2012-3001 Command Injection Vulnerability
Vuln: MySQL MyISAM Table Symbolic Link CVE-2012-4452 Local Privilege Escalation Vulnerability
Vuln: Naxsi 'naxsi_unescape_uri()' Function Security Bypass Vulnerability
Vuln: NetIQ Privileged User Manager 'ldapagnt_eval()' Remote Code Execution Vulnerability
Vuln: Network UPS Tools (NUT) 'addchar()' Function Buffer Overflow Vulnerability
Vuln: nfs-utils 'rpc.gssd' DNS Spoofing Vulnerability
Vuln: nspluginwrapper Private Browsing Flash Player Storage Local Information Disclosure Vulnerability
Vuln: NTR ActiveX control Buffer Overflow and Remote Code Execution Vulnerabilities
Vuln: NVIDIA Graphics Driver for Windows CVE-2013-0109 Local Privilege Escalation Vulnerability
Vuln: NVIDIA Graphics Driver for Windows CVE-2013-0110 Local Privilege Escalation Vulnerability
Vuln: NVIDIA Graphics Driver for Windows CVE-2013-0111 Local Privilege Escalation Vulnerability
Vuln: Open Handset Alliance Android Dailer Remote Denial of Service Vulnerability
Vuln: OpenCart 'filemanager.php' Multiple Directory Traversal Vulnerabilities
Vuln: OpenPLI Shell Command Execution and Multiple HTML Injection Vulnerabilities
Vuln: OpenStack Nova CVE-2012-3361 Memory Corruption Vulnerability
Vuln: OpenStack Nova CVE-2012-3447 Memory Corruption Vulnerability
Vuln: OpenVPN 'openvpn_decrypt()' Function Information Disclosure Vulnerability
Vuln: Oracle Business Transaction Management Server Arbitrary File Write Vulnerability
Vuln: Oracle Database Mobile/Lite Server CVE-2013-0363 Remote Vulnerability
Vuln: Oracle E-Business Suite CVE-2012-3190 Remote Security Vulnerability
Vuln: Oracle E-Business Suite CVE-2013-0376 Remote Security Vulnerability
Vuln: Oracle Java Runtime Environment CVE-2012-1682 Remote Code Execution Vulnerability
Vuln: Oracle Java Runtime Environment CVE-2013-2423 Security Bypass Vulnerability
Vuln: Oracle Java SE CVE-2012-0506 Remote Java Runtime Environment Vulnerability
Vuln: Oracle Java SE CVE-2012-0547 Remote Java Runtime Environment Weakness
Vuln: Oracle Java SE CVE-2012-1533 Remote Code Execution Vulnerability
Vuln: Oracle Java SE CVE-2012-1541 Remote Java Runtime Environment Vulnerability
Vuln: Oracle Java SE CVE-2012-1713 Remote Code Execution Vulnerability
Vuln: Oracle Java SE CVE-2012-5070 Remote Java Runtime Environment Vulnerability
Vuln: Oracle Java SE CVE-2012-5074 Remote Java Runtime Environment Vulnerability
Vuln: Oracle Java SE CVE-2012-5085 Remote Java Runtime Environment Vulnerability
Vuln: Oracle Java SE CVE-2012-5088 Remote Java Runtime Environment Vulnerability
Vuln: Oracle Java SE CVE-2013-0351 Java Runtime Environment Remote Security Vulnerability
Vuln: Oracle Java SE CVE-2013-0409 Remote Java Runtime Environment Vulnerability
Vuln: Oracle Java SE CVE-2013-0423 Java Runtime Environment Remote Security Vulnerability
Vuln: Oracle Java SE CVE-2013-0426 Remote Java Runtime Environment Vulnerability
Vuln: Oracle Java SE CVE-2013-0433 Remote Java Runtime Environment Vulnerability
Vuln: Oracle Java SE CVE-2013-0443 Remote Java Runtime Environment Vulnerability
Vuln: Oracle Java SE CVE-2013-1489 Remote Java Runtime Environment Vulnerability
Vuln: Oracle Java SE CVE-2013-2429 Remote Java Runtime Environment Vulnerability
Vuln: Oracle JD Edwards EnterpriseOne Tools CVE-2012-1678 Remote Security Vulnerability
Vuln: Oracle MySQL CVE-2012-2122 User Login Security Bypass Vulnerability
Vuln: Oracle MySQL CVE-2013-1531 Remote MySQL Server Vulnerability
Vuln: Oracle MySQL CVE-2013-1552 Remote MySQL Server Vulnerability
Vuln: Oracle MySQL CVE-2013-2375 Remote MySQL Server Vulnerability
Vuln: Oracle MySQL Server CVE-2013-0367 Remote Security Vulnerability
Vuln: Oracle MySQL Server CVE-2013-0389 Remote Security Vulnerability
Vuln: Oracle MySQL Server CVE-2013-1544 Remote Security Vulnerability
Vuln: Oracle MySQL Server Heap Overflow Vulnerability
Vuln: Oracle Outside In Technology CVE-2012-1768 Remote Code Execution Vulnerability
Vuln: Oracle Outside In Technology CVE-2012-3106 Remote Code Execution Vulnerability
Vuln: Oracle Solaris CVE-2012-3187 Local Security Vulnerability
Vuln: Oracle Solaris CVE-2012-3209 Local Security Vulnerability
Vuln: Oracle Solaris CVE-2012-3211 Local Security Vulnerability
Vuln: Oracle Sun Products Suite CVE-2012-3126 Local Solaris Cluster Vulnerability
Vuln: OTRS 'Body' Field HTML Injection Vulnerability
Vuln: Perl Config::IniFiles Module Insecure Temporary File Creation Vulnerability
Vuln: Perl Dancer.pm CVE-2012-5572 HTTP Header Injection Vulnerability
Vuln: PHP '_php_stream_scandir()' Buffer Overflow Vulnerability
Vuln: PHP 'header()' HTTP Header Injection Vulnerability
Vuln: PHP 'main/SAPI.c' CVE-2012-4388 HTTP Header Injection Vulnerability
Vuln: phpMyAdmin 'server_sync.php' Backdoor Vulnerability
Vuln: Pidgin 'mxit_show_message()' Function Stack-Based Buffer Overflow Vulnerability
Vuln: Pixman CVE-2013-1591 Stack-Based Buffer Overflow Vulnerability
Vuln: PostgreSQL 'SECURITY DEFINER' and 'SET' Attributes Remote Denial of Service Vulnerability
Vuln: Privoxy Proxy Authentication Information Disclosure Vulnerabilities
Vuln: ProFTPD Race Condition Local Privilege Escalation Vulnerability
Vuln: Python CGIHTTPServer Module Information Disclosure Vulnerability
Vuln: Python pip CVE-2013-1888 Insecure Temporary File Creation Vulnerability
Vuln: QEMU KVM QXL Local Denial of Service Vulnerability
Vuln: QEMU KVM 'virtio-blk' Driver Local Privilege Escalation Vulnerability
Vuln: QNX Qconn Remote Arbitrary Command Execution Vulnerability
Vuln: Qt 'QSslSocket::sslErrors()' Certificate Validation Security Weakness
Vuln: Quick Post Widget Plugin Cross Site Scripting and Cross Site Request Forgery Vulnerabilities
Vuln: Rack Multiple Denial of Service Vulnerabilities
Vuln: Rack 'Rack::File()' Insecure Temporary File Creation Vulnerability
Vuln: Rack Timing Attack Remote Code Execution Vulnerability
Vuln: Real Networks RealPlayer Write Access Violation Arbitrary Code Execution Vulnerability
Vuln: Red Hat Certificate System CVE-2013-1885 Multiple Cross Site Scripting Vulnerabilities
Vuln: Red Hat Certificate System CVE-2013-1886 Format String Vulnerability
Vuln: Resource Hacker Heap Based Buffer Overflow Vulnerability
Vuln: RETIRED: Adobe Reader and Acrobat APSB13-15 Prenotification Multiple Vulnerabilities
Vuln: RETIRED: Apple QuickTime Prior To 7.7.3 Multiple Arbitrary Code Execution Vulnerabilities
Vuln: RETIRED: BackupPC 'RestoreFile.pm' Cross Site Scripting Vulnerability
Vuln: RETIRED: MantisBT SOAP API CVE-2012-2691 Security Bypass Vulnerability
Vuln: RETIRED: Microsoft August 2012 Advance Notification Multiple Vulnerabilities
Vuln: RETIRED: Mozilla Firefox/Thunderbird/SeaMonkey MFSA 2012-88/89 Multiple Vulnerabilities
Vuln: RETIRED: Mozilla Firefox/Thunderbird/SeaMonkey MFSA 2013-01 through -20 Multiple Vulnerabilities
Vuln: RETIRED: Open Realty 'select_users_lang' Parameter Local File Include Vulnerability
Vuln: RETIRED: Oracle Java Runtime Environment Multiple Security Vulnerabilities
Vuln: RETIRED:Microsoft Internet Explorer CVE-2013-1313 Use-After-Free Remote Code Execution Vulnerability
Vuln: Ruby '#to_s' Method Incomplete Fix Security Bypass Vulnerability
Vuln: Ruby multi_xml CVE-2013-0175 Remote Arbitrary Command Execution Vulnerability
Vuln: Ruby Phusion Passenger Gem CVE-2013-2119 Insecure Temporary File Creation Vulnerability
Vuln: RubyGems SSL Certificate Validation Security Bypass Vulnerability
Vuln: RubyGems 'thumbshooter' Remote Command Execution Vulnerability
Vuln: Samba CVE-2013-0172 Remote Security Bypass Vulnerability
Vuln: Samba SWAT Cross Site Request Forgery and Clickjacking Vulnerabilities
Vuln: Samsung Kies Air Denial of Service and Security Bypass Vulnerabilities
Vuln: Serva CVE-2013-0145 Remote Buffer Overflow Vulnerability
Vuln: sflog! 'section' Parameter Local File Include Vulnerability
Vuln: sflog! 'uploadContent.inc.php' Arbitrary File Upload Vulnerability
Vuln: Schneider Electric Accutech Manager Heap Buffer Overflow Vulnerability
Vuln: Siemens SIMATIC WinCC Multiple Security Vulnerabilities
Vuln: Spree 'spree_auth_devise' Security Bypass Vulnerability
Vuln: SquidClamav URL Parsing Denial of Service Vulnerability
Vuln: Symantec Messaging Gateway CVE-2012-0308 Cross Site Request Forgery Vulnerability
Vuln: TCExam Prior 11.3.008 Multiple SQL Injection Vulnerabilities
Vuln: TeeChart Professional ActiveX Remote Integer Overflow Vulnerability
Vuln: Telepathy-Gabble CVE-2013-1769 NULL Pointer Dereference Denial of Service Vulnerability
Vuln: TomatoCart 'json.php' Security Bypass Vulnerability
Vuln: Tor Remote Denial of Service Vulnerability
Vuln: TrouSerS CVE-2012-0698 Denial Of Service Vulnerability
Vuln: Twig Templates Directory Traversal Vulnerability
Vuln: TYPO3 Core TYPO3-CORE-SA-2012-001 Multiple Remote Security Vulnerabilities
Vuln: Ushahidi Multiple Security Vulnerabilities
Vuln: Vanilla Forums AboutMe Plugin HTML Injection Vulnerabilities
Vuln: Vanilla Forums LatestComment Plugin Discussion Title HTML Injection Vulnerability
Vuln: Vino CVE-2012-4429 Information Disclosure Vulnerability
Vuln: VLC Media Player HTML Subtitle Multiple Buffer Overflow Vulnerabilities
Vuln: VMware OVF Tool OVF File CVE-2012-3569 Format String Vulnerability
Vuln: VxWorks CVE-2013-0715 Remote Denial of Service Vulnerability
Vuln: VxWorks SSH Server CVE-2013-0711 Denial of Service Vulnerability
Vuln: VxWorks SSH Server CVE-2013-0712 Denial of Service Vulnerability
Vuln: VxWorks Web Server CVE-2013-0716 Remote Denial of Service Vulnerability
Vuln: WAGO IPC 758-870 Hardcoded Password Security Bypass Vulnerability
Vuln: WebKit Cross Site Scripting Filter 'XSSAuditor.cpp' Security Bypass Vulnerability
Vuln: WeeChat Color Decoding Heap Buffer Overflow Vulnerability
Vuln: WellinTech KingView CVE-2012-4711 Memory Corruption Vulnerability
Vuln: Wind River Systems VxWorks CVE-2013-0713 Denial of Service Vulnerability
Vuln: Wind River Systems VxWorks CVE-2013-0714 Denial of Service Vulnerability
Vuln: Wireshark ASN.1 BER Dissector CVE-2013-3556 Denial of Service Vulnerability
Vuln: Wireshark Buffer Underflow and Denial of Service Vulnerabilities
Vuln: Wireshark DCP ETSI Dissector NULL Pointer Dereference Denial of Service Vulnerability
Vuln: Wireshark DTLS Dissector Denial of Service Vulnerability
Vuln: Wireshark DTN Dissector Denial of Service Vulnerability
Vuln: Wireshark ETCH Dissector Denial of Service Vulnerability
Vuln: Wireshark Information Disclosure and Denial of Service Vulnerabilities
Vuln: Wireshark MS-MMC Dissector Denial of Service Vulnerability
Vuln: Wireshark NTLMSSP Dissector Buffer Overflow Vulnerability
Vuln: Wireshark PER Dissector Denial of Service Vulnerability
Vuln: Wireshark Websocket Dissector Denial of Service Vulnerability
Vuln: Wireshark Websocket Dissector 'packet-websocket.c' Denial of Service Vulnerability
Vuln: WordPress BuddyPress 'page' Parameter SQL Injection Vulnerability
Vuln: WordPress Cimy User Manager Plugin Arbitrary File Disclosure Vulnerability
Vuln: WordPress FireStorm Professional Real Estate Plugin 'id' Parameter SQL Injection Vulnerability
Vuln: WordPress User Photo '$_SERVER['REQUEST_URI']' Parameter Cross Site Scripting Vulnerability
Vuln: WordPress WP Cleanfix Plugin Cross Site Request Forgery Vulnerability
Vuln: WordPress WP cleanfix Plugin 'eval()' Function Cross Site Request Forgery Vulnerability
Vuln: X.Org libX11 CVE-2013-1981 Multiple Remote Code Execution Vulnerabilities
Vuln: X.Org libX11 CVE-2013-1997 Multiple Remote Code Execution Vulnerabilities
Vuln: X.Org libX11 CVE-2013-2004 Multiple Denial of Service Vulnerabilities
Vuln: X.Org libXfixes 'XFixesGetCursorImage()' Function Remote Code Execution Vulnerability
Vuln: X.Org libXtst CVE-2013-2063 Remote Code Execution Vulnerability
Vuln: X.Org libXxf86dga CVE-2013-1991 Multiple Remote Code Execution Vulnerabilities
Vuln: X.Org libXxf86dga CVE-2013-2000 Multiple Remote Code Execution Vulnerabilities
Vuln: X.Org X11 File Enumeration Information Disclosure Vulnerability
Vuln: Xen 'ELF' Parser Multiple Security Vulnerabilities
Vuln: Xen PV Domain Builder Kernel Decompression Local Denial Of Service Vulnerability
Vuln: Xfig and Transfig '.fig' File Buffer Overflow Vulnerability
Vuln: YUI 'SWF' File Unspecified Security Vulnerability
Vuln: ZEN Load Balancer Multiple Security Vulnerabilities
Vuln: ZeroClipboard 'ZeroClipboard10.swf' Cross Site Scripting Vulnerability
Vulnerabilities in L-Soft's LISTSERV and Microsoft's Visual Studio 
Vulnerabilities in Macromedia Flash Player from Adobe Could Allow Remote Code Execution (913433) 
Vulnerabilities in phpMyAdmin, Dell's TrueMobile 2300 Wireless Router and couple of PoC exploits. 
Vulnerabilities in RFID-enabled credit cards 
Vulnerabilities in Symantec Products, Dabber Worm, Empty .zip File Attachments 
Vulnerability Assessment Program - Discussions, (Sat, May 5th)
Vulnerability Exploit for Snow Leopard, (Sat, May 5th)
Vulnerability in Microsoft Distributed Transaction Coordinator Could Allow Denial of Service (913580) 
Vulnerability in Microsoft Exchange Could Allow Remote Code Execution (916803) 
Vulnerability in proprietary NVIDIA driver for Linux
Vulnerability in tcpdump, Increase in UDP/1027 activity, Save Your Ship article 
w00tw00t 
W32.Netsky.Q@mm Code indicates a DoS attack 
W32/Feebs again 
W32/HLLP.Phillis.bq - Early release of McAfee DAT file 
Walgreens To Build First Self-Powered Retail Store
Wal-Mart To Join Amazon In Providing In-Store Locker Service
Want To Buy a Used Spaceport?
Wanted: Hackers For Large-Scale Attacks On American Banks
Warp Drive Might Be Less Impossible Than Previously Thought
Was the Brazilian version of Google hijacked two days ago?
Wash. officials say state courts office was hacked
Washington's Exploding Manholes Explained?
Water Bottle Fills Itself From the Air
Watchdog "Not Ready" To Probe Cookie Complaints
WD Builds High-Capacity, Helium-Filled HDDs
WD Explains Its Windows-Only Software-Based SSHD Tech
We Didn't Need Google's Schmidt To Tell Us Android and Chrome Wouldn't Merge
We Gonna Do What They Say Can't Be Done
We The People</em> Petition Signature Requirement Bumped To 100,000
Weak Passwords Still Subvert IT Security
Weakened password hashing found in Cisco devices
Web attacks use smart redirection to evade URL security scanners
Web based GDI Vulnerability Scanner; Yet even more fun with bots; Spybot.Worm and Gaobot; MSN Chat access troubles 
Web Log Analysis and Defense with Mod_Rewrite
WebCalendar Exploitation 
Webcast archive available 
WEBDAV Exploits on the rise 
Website of North Korea human rights group also hacked
Website Pitches Scientific Solutions In Search of Problems
Website vulnerabilities fall, but hackers become more skilled
Website with Malware 
Week of Oracle 0-Day 
Week of Oracle bugs cancelled 
Weekend blues 
Weekend Predictions. 
Weekend Vulnerability Roundup 
Weev gets 41 months in prison for exposing iPad strokers' privates
Welcome New Users; SANSFIRE; Webcast Date Change; Emerging Threats 
Well, it has always worked well, even in Production . . . until just recently.
Wells Fargo website hit by access issues amid cyber threats
We're Phull... Article about Bank Fraud. Google Strangeness. SSH Probe Reveals Big-Time Hack. 
WFTPD Patch available, Dell Open Manager vulnerability 
WFTPD unpatched exploit and potential DDoS against anti-spyware forums 
What Appsec can learn from Devops
What are my plans for the IOD 2012 Conference next week in Las Vegas
What Are the Unwritten Rules of Deleting Code?
What are you Concerned the Most in 2016?
What are YOU doing to give back to the security community?
What are your 2017 infosec predictions?
What Birds Know About Fractal Geometry
What can I say?
What can IT learn from CE?
What Can You Find Out From Metadata?
What crime is this? 
What do the bad guys do with WMF? 
What do you do Matt?
What Does a Pentest Look Like?
What Early Software Was Influential Enough To Deserve Acclaim?
What Happened To Diaspora, the Facebook Killer? It's Complicated
What Happens To Google Employees When They Die?
What I should have said today at IDUG about EXPLAIN and DB2 10 for z/OS
What if..... 
What I'm reading today 
What is Cloud? Infrastructure as a Service
What is Cloud? Platform as a Service
What is Cloud? Software as a Service
What is DB2 for z/OS Accounting Class 2 Not Accounted Time? - - A follow-up
What is Normal? Fake RedHat Advisory; JPEG Repair Utility 
What is the purpose of canonical data model?
What is this "/smoke/" about?
What should I do with these gift cards? 
What Signs Are You Missing?
What the new IBM PureData System for Analytics N2001 could do for the DB2 Analytics Accelerator
What To Do After You Fire a Bad Sysadmin Or Developer
What To Do When an Advised BIOS Upgrade Is Bad?
What To Do With Those First Generation Photo Frames?
What to watch out For on Election Day, (Tue, Nov 6th)
What to watch with your FIM?
What WAN Optimization Can Teach SDN about Tunneling
What Was Old is New Again: Honeypots!
What will 2006 have in store? 
What will the big security stories of 2007 be? 
What You Can Do About the Phone Unlocking Fiasco
What You Need To Know About Phone Unlocking
What? No URL? 
What’s the point of application pen testing?
Whatever Happened to tmUnblock.cgi ("Moon Worm")
What's a super.proxy.scanner and why is it in my logs? 
What's Cool at #MC13LV and Why You Should Care
What's important on your network?, (Sun, Nov 4th)
What's In Store For 2004! 
What's in your DB2 for z/OS library?
What�s Running on Your Network?
What's the situation this week for Neutrino and Angler EK?
What's the threat? And who is noticing it? Nyxem_e versus CME 508 
What's up on Port 139? 
What's up with Oracle and Sun?
When encoding saves the day
When Google Got Flu Wrong
When Hotel Alarms Sound, (Fri, Jun 14th)
When Hunting BeEF, Yara rules (Part 2)
When Hunting BeEF, Yara rules.
When solid state drives should be part of your enterprise storage strategy
Where are all of the articles? 
Where does all the data come from? 
Where Have All the Gadgets Gone?
Where the Candidates Stand On Net Neutrality
Which Debian-based Linux distributions work best for me and why
While working for spies, Snowden was secretly prolific online
White House launches coordinated effort to battle botnets
White House Pulls Down TSA Petition
White House pushes for stalled cybersecurity bill
White House raises concerns over CISPA bill
White House review reportedly clears Huawei of spy charges
White House said to plan executive order on cybersecurity
White House threatens veto of CISPA bill
White House: Use Metric If You Want, We Don't Care
White House-ordered review found no evidence of Huawei spying: sources
Who Holds the Keys?
Who is' your friend! 
Who needs .info/.biz, anyway ? ; Cisco IPV6 vuln ; NIST minimum security requirements 
Who ya gonna contact?, (Sun, Aug 26th)
WHO: Intellectual Property Claims Hindering Research On Deadly Novel Coronavirus
Whole Rack Servers
Who's Attacking Me?
Who's tracking phone calls that target your computer? Stay Tuned to the ISC, (Sun, Apr 29th)
WHSmith Putting DRM In EBooks Without Permission From the Authors
Why America Is Losing the War Against China's Hacker Spies
Why America's School "Lag" Has Never Mattered
Why Apple Is Suing Every Android Manufacturer In Sight
Why are Syrian hackers targeting Western media Twitter accounts?
Why Bad Directors Aren't Thrown Out
Why Big Data Could Sink Europe's 'Right To Be Forgotten'
Why Can't We Be Friends?
Why Corporate File Sharing Services Can't Compete
Why DOJ Didn't Need a "Super Search Warrant" To Snoop On Fox News' E-mail
Why Everyone Gets It Wrong About BYOD
Why I Hate Synonyms, Part II: NON-EXISTENT Issues
Why I think you should try Bro, (Mon, Feb 25th)
Why Iron Dome Might Only Work For Israel
WHY IT MATTERS: Cybersecurity
Why It's Bad That Smartphones Have Banished Boredom
Why JavaScript Is the New Perl
Why Mars Is Not the Limit For Human Space Flight
Why Microsoft Got Into the Console Business
Why Microsoft Office For iOS Will Likely Never See the Light of Day
Why Ray Kurzweil's Google Project May Be Doomed To Fail
Why risk management can succeed in IT
Why shy away from Volunteering Opportunities
Why Social Media is not CNN or BBC or The Times of Lithuania
Why Ultrabooks Are Falling Well Short of Intel's Targets
Why Users Fall For Ransomware
Why We'll Never Meet Aliens
Why Working Remotely Needs To Make a Comeback
Why Worms In the Toilet Might Be a Good Idea
Why Would a Mouse Need To Connect To the Internet?
Why Your Next Phone Will Include Biometric Security
wicd Local Privilege Esclation Exploit
Widespread Compromise Of Yahoo-Backed Email In New Zealand
Widespread Routing Outages 
Widespread use of RPC DCOM Exploit 
WiFi Device Driver Issues 
Wi-Fi Enabled Digital Cameras Easily Exploitable
WiFi Still Remains a Good Attack Vector
Wi-Fi Worm Rumors 
WikiLeaks Party Launching This Week
Wikileaks Releases Docs Before Trial of TPB Founder Warg
WikiLeaks' secrets weren't, says former MI5 chief
WikiLeaks to publish security think tank emails (Reuters)
Wikimedia Foundation Launches Wikivoyage
Wikipedia Scandal: High Profile Users Allegedly Involved In Paid-Editing
Will Developers Finally Start Coding On the iPad?
Will Legitimacy Spoil Bitcoin?
Will Obama preside over the coming of Big Brother?
Will the <em>Star Citizen</em> Project Fund Linux and Mac Ports For CryENGINE 3?
Will Your Next iPhone Be Built By Robots?
Willpower
Wilma Lessons Learned 
Win XP SP 2 and You 
Winamp 5.x Remote Code Execution via Playlists 
Winamp buffer overflow 
Winamp Vulnerability / IFrame - more info / Following the Bouncing Malware - IV 
Window Injection Vulnerability in Browsers/Request for Specific UDP Fragment Data 
Window Size 55808 packets 
Windows "Atom Bombing" Attack
Windows 0 day exploit? ; Yet another trojan; .US resolution response; How to identify when your DNS is not poisoned; and a last minute query tcp port 7393 
Windows 10 and System Protection for DATA Default is OFF
Windows 10 Anniversary Update Available
Windows 7 Still Being Sold On Up To 93% of British PCs
Windows 8 Defeats 85% of Malware Detected In the Past 6 Months
Windows 8 Changes Host File Blocking
Windows 8 Security: What's New
Windows 8 will require immediate activation
Windows 98 support extended. Reports of SQL Slammer, Solaris TTYPROMPT compromises 
Windows Alternate Data Streams Revisited 
Windows Blue 9364 Screenshots Show Feature Enhancements
Windows buffer overflow protection 
Windows Command-Line Kung Fu with WMIC 
Windows Defender expires today 
Windows Events log for IR/Forensics ,Part 1
Windows Events log for IR/Forensics ,Part 2
Windows Firewall Article; Hardware Firewall; Follow up on Previous Diaries 
Windows HIDS; Port 80, IP-hopping scan;Why old exploits are still popular; A Simple Phishing Investigation Tip 
Windows local privilege escalation - Windows access control 
Windows Media Player - ASX Playlist Buffer Overflow 
Windows Phone 8 Users Hit Some Snags
Windows Phone Actually Gaining Market Share In Some Countries
Windows RT Jailbreak Tool Released
Windows Service Accounts - Why They're Evil and Why Pentesters Love them!
Windows Service Trusted Path Privilege Escalation
Windows Source Code; How to Detect ASN.1 Exploits 
Windows Vista Firewall 
Windows Vista security patches 
Windows WMIObjectBroker 0-Day Exploit 
Windows XP SP2 Experience Forum / Exchange 5.5 Security Bulletin / Mac OS X Bulletins 
Windows XP SP2 Patch released; New phpBB Release; Apple Java Update; Wireless Standards 
Windows XP Support Extended 
WinGate HTTP proxy vulnerability, remote DoS & Code Execution 
WinGate Update 
Winners of Bonus Points from Yesterday’s FTBM 
WinRAR and RAR 3.51 Released 
WINS increase, UDP Mystery Solved(?), Black Tuesday Teaser 
WINS Server Vulnerability - Password Aging 
winsnort defaced - use caution 
Winternals/SysInternals acquired by Microsoft 
WinZip 10.0 build 7245 released 
WinZip Vulnerabilities Highlight User Threat 
Wipe the drive! Stealthy Malware Persistence - Part 2, (Thu, Mar 14th)
Wipe the drive! Stealthy Malware Persistence - Part 4, (Fri, Mar 22nd)
Wipe the drive! Stealthy Malware Persistence Mechanism - Part 1, (Wed, Mar 13th)
Wireless security? 
Wireless Thoughts - Part II; Netgear Vulnerabilties;Phishing Creativity 
Wireshark (ex Ethereal) multiple vulnerabilities 
Wireshark 1.10.0rc2 is now available http://www.wireshark.org/download.html, (Thu, May 23rd)
Wireshark Fixes Several Bugs and Vulnerabilities
Wireshark releases v1.8.5 and 1.6.13 - http://www.wireshark.org/download.html and http://www.wireshark.org/docs/relnotes/, (Wed, Jan 30th)
Wireshark Vulnerability 
With Customers, Emotion, not Reason, the Key to Buying Decisions
With Every Patch Tuesday there is a Black Wednesday, Juniper Update, COAST (adware-spyware) is toast, Virus Spreading through MSN?, Comcast downtime 
With troops and techies, U.S. prepares for cyber warfare
Witty Traffic Request / Mailbag 
Witty Worm Wrap-up 
WMF and Indexing 
WMF FAQ 
WMF Generator 
WMF mitigation may cause printer problems. 
WMF: patches and workarounds explained 
WMF: Status of Windows 98 and Windows ME ? 
Word 0-day, recommended defenses. 
Word macro trojan dropper and (another) downloader 
Word Zero-Day, So Sayeth Microsoft 
Wordpress 3.5.1
Wordpress Plugin spider calendar Multiple Vulnerabilities
WordPress security update patches external libraries, several vulnerabilities
Wordpress to accept Bitcoin without confirmations
Working with base64
World of Warcraft Character Becomes Campaign Issue
World of Warcraft Loses 1.3 Million Players in First Quarter of 2013
worldnic DNS servers down 
Worldnic outage 
World's First Bitcoin ATM
World's First Linux Powered Rifle Announced
World's Oldest Tumor Found In a Neanderthal Bone
Worldwide Shortage of Barium
Worm manipulates databases in Iran
Worth Reading: Bypassing Windows' Address Space Layout Randomisation
Worth Reading: Confessions of a botnet operator
Worth Reading: Dropbox is "quite secure"
Would Charles Darwin Have Made a Good Congressman?
WoW cities wiped out by 'exploit'
Woz Applying For Australian Citizenship Because of the NBN
Woz Worries Microsoft Is Now More Innovative Than Apple
Wozniak On the Samsung Patent Verdict
Wrap-up: What? No Link? 
Wrong Fuel Chokes Presidential Limo
WS domain, audio applications, and IP addressing 
WS_FTP buffer overflow, DomainKeys effective?, Phishing explained 
WTFM: Write the Freaking Manual
www.sco.com unreachable 
x86_64 Linux bind TCP port shellcode 
XBMC 12.0 'Frodo' Released: PVR-Support, HD Audio and More
Xbox 360 credit card slurp alert under fire
Xbox 720 Could Require Always-On Connection, Lock Out Used Games
Xbox Originator: "Stupid, Stupid Xbox!!"
Xen-Based Secure OS Qubes Hits 1.0
Xirrus Primes the 802.11ac Pump
xkcd on a Bad Threat Model
Xkcd's Long-running "Time" Comic: Work of Art Or Nerd Sniping?
XML RPC worm - New Variant - ELF_LUPPER.B 
XML-RPC for PHP Vulnerability Attack 
xmlrpc.php - Are you patched? 
XP local privilege escalation demonstated 
XP SP2 Preview, Apache Update,Don't click on that attachment 
XP SP2 Release to manufacturing, and Continued Scanning Trends 
X-Ray Laser For Creating Supercharged Particles
xt:Commerce <= v3.04 SP2.1 Time Based Blind SQL Injection
Xtreme RAT 'dwmapi.dll' DLL Loading Arbitrary Code Execution Vulnerability
YAFP (Yet Another Flash Patch)
Yahoo Board Approves a $1.1B Pricetag For Tumblr
Yahoo Buys UK Teen's Smartphone News App
Yahoo debuts trailer for Anthony Zuiker's "Cybergeddon"
Yahoo Messenger critical update 
Yahoo Messenger worm?; exploited.lsass.cc bot traffic 
Yahoo! et al Status 
Yahoo! Japan says 22 MEELLION User IDs may have been nabbed
Yahoo! Login Server Problems 
Yahoo! mass-mailer 
Yahoo! user account phishing 
Yahoo's Code Verification; Prevalent of Malcodes; Hidden File Finding Problem in XP Pro and Home 
Yatze telnet worm; InfoCon update; rlogin link to telnet maybe? 
Year End Poll 
Year End Surveys
Yellow: MSIE VML exploit spreading 
Yellow: WebViewFolderIcon setslice exploit spreading 
Yes Virginia, Stored XSS's Do Exist!
Yet another Adobe Flash Player Update
Yet Another Bagle 
Yet another hacked web site–This time it’s NVidia
Yet Another IE Flaw (YAIEF) 
Yet another MSIE 0-day: VML 
Yet another OSX/Java Trojan spotted in the wild
You dirty RAT: Trend Micro spots new Asia-wide attack
You Have Got a New Audio Message - Guest Diary by Pasquale Stirparo
You know about XSS. How about XSRF/CSRF? 
You never know...; Exploit for MS04-038 
Young Students Hiding Academic Talent To Avoid Bullying
Your Bill Is Not Overdue today!
Your Security Policy Is So Lame
Your SSH Server On Port 8080 Is No Longer "Hidden" Or "Safe"
You're not cool enough for some malware
YouTube Alters Copyright Algorithms, Will 'Manually' Review Some Claims
YouTube is 8 years old. Here’s the first video ever uploaded to the site!
YYABCAFU - Yes Yet Another Bleeping Critical Adobe Flash Update, (Tue, Aug 21st)
YYABCAU - Yes Yet Another Bleeping Critical Adobe Flash Update, (Tue, Aug 21st)
Zen approach to backups 
Zero Day MySQL Buffer Overflow, (Sun, Dec 2nd)
Zeroday Emergency Response Team (ZERT) 
ZIP With Comment
zlib Security Vulnerability; Protecting Your Privacy 
ZoneAlarm shutdown problem update, MS Black Tuesday 
ZoneAlarm Update, RoadRunner Email, Network Monitoring, Mailbag 
ZTE drops spy tech subsidiary
ZTE posts a first quarterly loss, margins bleed
ZTE sharpens focus on high-end smartphones to boost margins