Sign in or Join FriendFeed
FriendFeed is the easiest way to share online. Learn more »
Security News

Security News

Protect your Computers, Business Networks and Websites from Intrusion and Malicious Scripts
Security News
Silk Road Wound Through Dark Side of the Internet (SecurityWeek) - http://www.securityweek.com/silk-ro...
Security News
SB13-280: Vulnerability Summary for the Week of September 30, 2013 (US-Cert Bulletins) - http://www.us-cert.gov/ncas...
Security News
CVE-2013-3689 (Natl. Vulnerability Database) - http://web.nvd.nist.gov/view...
Security News
Report: NSA has little success cracking Tor (NetworkWorld Security) - http://www.networkworld.com/news...
Security News
hpHosts: Updated 04-10-2013 - http://hphosts.blogspot.com/2013...
The hpHOSTS Hosts file has been updated. There is now a total of 246,284 listed hostsnames.If you are NOT using the installer, please read the included Readme.txt file for installation instructions. Enjoy! :)Latest Updated: 04/10/2013 18:10Last Verified: 01/10/2013 13:00Download hpHosts now!http://hosts-file.net/...
Security News
Q: My Gmail Account Has Been Compromised. What Should I Do? - http://blog.fortinet.com/Q--My-G...
A: Reset your password and security questions, run a virus scan, and hope for the best. Beyond the basics, there are a few more considerations when your Gmail (or any other account for that matter) has been breached. Google offers two-factor authentication, enabling this should be one of your first steps. Two-factor authentication requires anyone logging into your account to not only know your username and password, but also retrieve a time sensitive token. This security token is usu...
Security News
In wake of Adobe breach, attackers may use insight to dig up zero-days (SC Magazine) - http://www.scmagazine.com/in-wake...
Security News
Analysis: IT experts question architecture of Obamacare website (Yahoo Security) - http://news.yahoo.com/analysi...
Security News
Clean Data For ERP (IT Toolbox Blogs) - http://it.toolbox.com/blogs...
Security News
Prosecutors Want Silk Road Mastermind to Remain Jailed (SecurityWeek) - http://www.securityweek.com/prosecu...
Security News
Friday Squid Blogging: Squid Exhibit at the Monterey Bay Aquarium (Schneier blog) - https://www.schneier.com/blog...
Security News
Can Your Network Beat Malware? (InformationWeek) - http://www.informationweek.com/securit...
Security News
Vuln: IcedTea-Web CVE-2013-4349 Heap Based Buffer Overflow Vulnerability (SecurityFocus Vulnerabilities) - http://www.securityfocus.com/bid...
Security News
CVE-2013-5091 (Natl. Vulnerability Database) - http://web.nvd.nist.gov/view...
Security News
Easy access to Airplane mode an iOS 7 security flaw -- researchers (CNET) - http://news.cnet.com/8301-13...
Security News
Thug: a new low-interaction honeyclient (Reddit) - http://www.reddit.com/r...
Security News
Director of National Intelligence: Leaked documents painted an inaccurate picture (ZDNet) - http://www.zdnet.com/directo...
Security News
Stress Free Audits, Reduced Risk, Higher Confidence - How IAM Contributes to the Bottom Line (InfoRiskToday) - http://www.inforisktoday.com/webinar...
Security News
"Service Function Chaining Problem Statement" - Paul Quinn, Jim Guichard, Surendra, Puneet Agarwal, Rajeev Manur, Abhishek Chauhan, Nicolai Leymann, Mohamed Boucadair, Christian Jacquenet, Michael Smith, Navindra Yadav, Thomas Nadeau, Ken Gray, (Internet Drafts) - http://tools.ietf.org/html...
Security News
Firms, Researchers Seek Better Ways To Detect Evasive Threats (Dark Reading) - http://www.darkreading.com/monitor...
Security News
NSA using Firefox flaw to snoop on Tor users (The Register) - http://go.theregister.com/feed...
Security News
CSAM: WebHosting BruteForce logs, (Fri, Oct 4th) (InternetStormCenter) - http://isc.sans.edu/diary...
Security News
Norwest Venture Partners Quietly Notches Big Exits (Forbes) - http://www.forbes.com/sites...
Security News
Security 101: The Firewall, A Fundamental Defense - http://blog.fortinet.com/Securit...
In light of new and sophisticated network security technology that stretches from Next Generation Firewalls to Unified Threat Management devices, the blogosphere has turned its attention to the importance and relevancy of an age old technology: the firewall. Opinions undoubtedly run the gamut, with not just a few concluding that firewalls in general are within throwing range of obsolescence. In actuality, nothing could be further from the truth. Firewalls, like anti-virus and spam filters, a...
Security News
CVE-2013-2922 (Natl. Vulnerability Database) - http://web.nvd.nist.gov/view...
Security News
Bugtraq: RootedCON 2014 - Call For Papers (SecurityFocus Vulnerabilities) - http://www.securityfocus.com/archive...
Security News
Twitter IPO stokes hot market for Internet stocks (Yahoo Security) - http://news.yahoo.com/twitter...
Security News
L.A. Dodgers Put IP - PBX On the Mound (IT Toolbox Blogs) - http://it.toolbox.com/blogs...
Security News
CVE-2013-2916 (Natl. Vulnerability Database) - http://web.nvd.nist.gov/view...
Security News
Online vicemart Silk Road shut by Feds (The Register) - http://go.theregister.com/feed...
Other ways to read this feed:Feed readerFacebook