Telecommunications Security: An intro to the 10 domains in the CISSP

EXAM 1 Fall 2014

Due in my email by midnight Mon (11/10)

ppt 0-6

Security Policy Paper

  1. Write a document creating an organization wide security policy (If you have no clue look at power points for the first chapters or pages 18-22 in the book).  The paper should give me a real world example of a security policy, security standards, and security guidelines for a real business.  I prefer one written for an orgainzation where you have worked. However, if that is not possible the pick one you are familiar with, for instance your parents' business or a University Business School.

  2. Use of the vulnerabilities, risks, threats, and and other pertinant information from our links would be a good place to start.

  3. Given that most of you have never worked on this type of thing in the “real world” this paper is briefer that the those which would be implemented. Work for applicable but brief (maybe 5 or so pages) paper.

  4. Due NO LATER THAN 12/6 but 12/3 would be MUCH better

Instapaper --> twitter
JohnRDurrett on Twitter
Linux: 20 Iptables Examples For New SysAdmins Cloud Computing on Resources Page Intel Cloud Computing Security planning guide Cloud Computing Explained:
Implementation Handbook

Introduction to Wireshark (Part 1 of 3) 9:06
Cookies and Grabbing Passwords with Wireshark (Part 2 of 3) 5:11
Data Mining using Wireshark (Part 3 of 3) 6:03
The Ultimate Wireshark Tutorial 49:27
wireshark tutorial,Top 5 features you must Know in 5 minutes 9:05

Bumpkey 4:58
AirCrack-NG for Windows for Breaking WEP/WPA 12:40
John The Ripper To Crack Passwords-BackTrack Tutorials For Beginners 2:50
Nessus Videos
Wireless WEP Key Hacking 5:44

Google Glass to get Intel processors
New malware targets password managers
Postal Service almost never denies mail-surveillance requests
Uber reportedly gave a job applicant full access to customer travel records
Wired: How to Anonymize Everything You Do Online

Supreme Court To Decide Whether Rap Lyric Threats Are Free Speech
Five Best Custom PC Builders
DVD rips of 'Fury,' 'Annie,' 'Mr. Turner,' and 'Still Alice' hit the web following Sony Pictures hack
Black Friday, Cyber Monday for Crooks, Too!
A World Without Net Neutrality Already Exists

Debian Forked Over Systemd
Sony Pictures' computers are still locked as hackers demand equality
Google Glass Is Dead; Long Live Smart Glasses
Fix Yosemite Wi-Fi Issues with a Terminal Command
JavaScript Regular Expression Visualizer

US courts hope an old law will help them bypass phone encryption register
How to configure an NFS server and mount NFS shares on Ubuntu 14.10
FBI Agents Pose as Repairmen to Bypass Warrant Process
Home Depot faces 44 lawsuits post-breach
15 Documentaries About The Internet, Hacking, Startups & Cyberculture [Stuff to Watch]

Sony Breach May Have Exposed Employee Healthcare, Salary Data
US parking operator: YEP, hackers got your names, credit card numbers, secret codes...
How do You Password Protect a Folder on Linux/Unix without Encryption?
Network Security Needs Big Data
FBI: Watch out for HDD-BUSTING Sony megahack malware
Yahoo Will Soon Become The Default Search Engine In Firefox
Motorola’s New $25 Dongle Helps You Find Your Lost Keys, Unlocks Your Phone
Coin Is Finally Shipping To Early Backers
10 top security threats of 2014 (so far)
iPhone 6S, Smartwatch: What You Can Expect from Apple in 2015

How Splitting A Computer Into Multiple Realities Can Protect You From Hackers
Wal-Mart Scammed into Selling PlayStation 4 for $90
Microsoft patches critical Windows Server vulnerability
WhatsApp taps Open Whisper for end-to-end encryption
Your paper brain and your Kindle brain aren't the same thing

How to Run Android Apps in the Google Chrome Browser
The Success Theater: Don't Confuse Enviability for Happiness
Keep This Java Cheat Sheet on Hand While You're Learning to Code
11 things we just learned about how the Apple Watch works
EFF, Others Launch New Free Security Certificate Authority To 'Dramatically Increase Encrypted Internet Traffic'

Google Glass Application List
Samsung realizes it’s making too many phones, will cut lineup by 30%
6 Customization Tricks Only Possible In Firefox
The Tech Skills and Courses Google Recommends for Software Engineers
Learn to Build Android Apps with This Curated Collection of Courses

Citadel Malware Steals Password Manager Master Passwords
Intel to work with Europol on fighting cybercrime
Hackers blamed for unusual tweets from Jeremy Clarkson, Columbian FARC rebels
Hackers turning smartphones into slave armies
Next Year's DDOS Attacks to Come From Vietnam, India and Indonesia
What File System Should I Use for My USB Drive?
Linux Vs Unix: The Crucial Differences That Matter To Linux Professionals
What Really Happens When You Delete Something from Your PC
Apple Patents A Mouse With A Built-In Scanner And Display
Coinbase Launches Bitcoin-Based Tips, Micropayments

Google Brings Autoscaling To Compute Engine
As Developers Depart, Google Glass Is Ready To Become This Era’s Segway
NOAA Reveals Four Websites Compromised

Feds 'covered up' Chinese hack on US weather systems
Large Number of Tor Hidden Sites Seized by the FBI in Operation Onymous were Clone or Scam Sites
The Current State of Smart Locks

Snapchat Now Lets You Send Money To Friends Through Snapcash Deal With Square Cash
Online Drug Dealers Are Now Accepting Darkcoin, Bitcoin’s Stealthier Cousin
Two Dudes Prove How Easy It Is to Hack ATMs for Free Cash
AT&T Stops Using Invasive ‘Perma-Cookies,’ But It May Turn Them Back On
Assange Announces WikiLeaks is Preparing a New Series of Leaks

New York City is building 10,000 internet pylons for free public Wi-Fi
Is Your Police Force Wearing Body Cameras?
Our devices are listening to us all the time -- but do we care?
 Masque Attack — New iOS Vulnerability Allows Hackers to Replace Apps with Malware
Introducing Lantern: One Device = Free Data Forever

Can the new iBanking Android malware be stopped?
How to Position IT Security as an Enterprise Profit Center
How to Unlock Hidden Settings In Your Favorite Software
81% of Tor Users Can Be De-anonymized By Analysing Router Information
Your Mac Logs Everything You Download, Here's How to Clear It Out

8 Email Security Tips You Can Share With Friends & Colleagues
Stupid Geek Tricks: Hide Data in a Secret Text File Compartment
Open Source Self-Healing Software For Virtual Machines
Google Wallet vs. Apple Pay: What You Need to Know
Quantum Computers: The End of Cryptography?
This Is How ATMs Get Hacked in Russia: Using Explosives
FBI’s most wanted cybercriminal used his cat’s name as a password
U.S. weather system hacked, affecting satellites
Why passwords have never been weaker—and crackers have never been stronger
This is what the web looks like without ads

We’re long overdue for replacing Social Security Numbers as our main identifier
A German Cloud Company Is Offering Free Heat If You Have Room for Some of Its Servers
28 Days After Drupal Exploit
Typewriters are back, and we have Edward Snowden to thank
Samsung's Gear VR is virtual reality on the go

Samsung’s New Smart TV Development Platform Runs On Tizen
MLB Runs Its Massive Statcast Tool In The AWS Cloud
Microsoft Takes .NET Open Source And Cross-Platform
Microsoft Launches Free, Unrestricted Version Of Visual Studio For Small Teams
Amazon Is Expanding Its R&D In Cambridge, U.K., With A Focus On Prime Air Drones And Speech Tech

Amazon Cloud Drive Gets Its Own API
60 seconds with the world's first Bluetooth padlock
Amazon Launches Aurora, A High-Performance Relational Database Service
Two-thirds of global executives expect a data security breach but fail to recognise long-term damage, new report reveals
Website hacks into thousands of security cameras

Windows Has a Huge Vulnerabilty, Get the Patch Now
U.S. and China Agree to Tariff-Free Technology Trade
Exchange-traded fund seeks to tap into cyber security market
A New Android App that Turns Your Smartphone into a Hacking Tool
IBM launches new cloud security practice

Why Amazon Echo is the future of every home
Beginner’s Electronics: 10 Skills You Need to Know
Flux’s 3D Printer Is Also A Scanner, Laser Engraver And More Thanks to A Modular Design
Study: 9 in 10 Americans agree control over personal information is lost
Get Immersive Mode For All Android Apps – No Root Required
Watch That Wi-Fi: Hackers Use Hotel Internet to Steal Nuclear Secrets
Hacker Lexicon: What Is a Zero Day?
Android 5.0 Lollipop Looks Like Solid Upgrade for Latest Devices
OpenStack vs. Amazon: The Power of Distributed Computing
Detecting Fraud in an OpenStack Cloud

Big Data: Cyber Security's Silver Bullet? Intel Makes the Case
President Obama urges the FCC to treat the internet as a utility
Apple site lets you deactivate iMessage and solve your missing text problem
What is Amazon Echo?
Tails OS: Privacy for anyone anywhere

Are Hacked Email Account Checking Tools Genuine Or A Scam?
What Is Half-Duplex And Full-Duplex Operation, And How Does It Affect Your Router?
10 Useful OS X Yosemite Features You Might Have Missed
Popcorn Time Now “Impossible” to Shut Down
Wi-Fi traffic can be used as covert communication channel for malware

TBR perspective: Symantec’s move will disrupt security and storage landscapes
10 Reasons It's Time to Adopt Microsoft Office 365 Cloud App Suite
Why advanced threats are less dangerous than simple attacks
USPS investigates breach, more than 800K employees possibly affected
How to Find and Remove Duplicate Files on Mac OS X

Google says the best phishing scams have a 45-percent success rate
Manual Phishing Gmail Attacks Found To Be Very Effective
Computer Scientists Ask Supreme Court To Rule APIs Can't Be Copyrighted
Dealer-Installed GPS Tracker Leads To Kidnapper's Arrest in Maryland
Verizon May Soon Get to Enjoy a Lawsuit Over Its Sneaky Use of Perma-Cookies
  Facebook Open Sources Its Proxygen HTTP Framework And Server
Election Day was just another chance to worry about security
Secure Messaging Scorecard
Verizon: ISPs will sue unless government adopts weaker net neutrality rules
Double trouble for Apple, as two software security flaws discovered

Malware Discovered In China Could Herald ‘New Era’ Of iOS And Mac Threats

Google Drive Now Works Better With Desktop Applications
New Technology And Big Data Help You Breathe Fresh Air
Cloud Encoding Startup Gets Strategic Investment From Harmonic
PHISHING email NOT from ITHelpCentral
How I
Reverse Engineered
Google Docs

Beep: More Wearable Tech
Startup BigPanda Emerges to Shed Light on IT Incidents
I'm Terrified of My New TV: Why I'm Scared to Turn This Thing on -- and You'd Be, Too
Skyera Crams 136TB Flash Capacity Into 1U Box
Amazon Prime Members’ Newest Benefit Is Free, Unlimited Photo Storage

The Best Hidden Features of VLC
How The 49ers Are Using Beacons To Help You Find Hot Dogs And Beer
12 surprising ways personal technology betrays your privacy
Ethernet is coming to cars
Logitech debuts Surface-like keyboard for the iPad

The scary side of Touch ID
Internet Archive Brings 900 Classic Arcade Games To Your Browser. Here Are 7 Of The Best
IT Losing the Battle for Security in the Cloud
Amex debuts token service
Study: 68 percent of healthcare breaches caused by loss or theft of devices, files
$300,000 for Cracking Telegram Encryption
Hackable drone controller runs Linux
Microsoft Now Lets Developers Run IE On Android, iOS And OS X
Apple Partners With Southwest To Offer Free In-Flight Streaming Via Beats Music
Cocoon Is A Smart Home Security Device That Uses Infrasonic Sound To Detect An Intruder

Microsoft Teams Up With Dropbox
Verizon, AT&T tracking their users with ‘supercookies’
Android Lollipop: Taking mobile security to a new level

Lollipop Review
Serious security flaw in OS X Yosemite 'Rootpipe'
Cell carrier was weakest link in hack of Google, Instagram accounts

Facebook sets up 'dark web' link to access network via Tor
5 Brilliant Reasons To Look Forward To Fedora 21
New version of Backoff detected, malware variant dubbed 'ROM'
Bypass Resume Filters by Using Keywords From Your Job Listing
Is Samsung Sliding Into Home Or Just Sliding?

How To Safely Store A Password

LastPass releases Open Source command line client
Google Updates Gmail for Android with Support for All Email Providers
November 2014 Issue of Linux Journal: System Administration
Magic Numbers: The Secret Codes that Programmers Hide in Your PC
Flaw in New Visa Cards Would Let Hackers Steal $1M Per Card

How To Read Non-Fiction Books In Record Time
Chinese Hackers Mess With Texas By Attacking Fracking Firms
Nearly half of California residents had online info exposed last year, attorney general says
Hacker proof your credit cards and bank account
In Cybersecurity, The Weakest Link Is You
TrueCrypt Is Back, But Should It Be?
Apple Pay: The Pros and Cons of Using This Mobile Payment System
How Inbox by Gmail Works, and How to Use It for More Productive Email
Shellshock over SMTP attacks mean you can now ignore your email
Find My Phone does just one thing but Samsung's messed it up

How to Use Handbrake to Convert Any Video File to Any Format
Dangerous Vulnerability Fixed In Wget
Planning Considerations for BYOD and Consumerization of IT (Part 6)
Arrests made after 'specialist malware' used in £1.6 million ATM heist
The Internet Archive

FTC sues AT&T over misleading and deceptive use of ‘Unlimited’ data plans
6 Superb Reasons Why You Should Use Linux For Programming
The Perfect Server – CentOS 7 (Apache2, Dovecot, ISPConfig 3)

How to use ISPConfig and Seafile without manual file modifications
White House hacked

Retailer-Backed Apple Pay Rival CurrentC Has Been Hacked, Testers’ Email Addresses Stolen
uBeam Nabs $10 Million In Funding From Upfront Ventures To Make Wireless Charging A Reality
Hackers Are Using Gmail Drafts to Update Their Malware and Steal Data
Facebook, Google, and the Rise of Open Source Security Software
Why Microsoft loves Linux

Why Taxing The Internet Is Stupid
The Secret Powers of Chrome's Address Bar
Verizon Launches Tech News Site That Bans Stories On US Spying
Windows 10 Gets a Package Manager For the Command Line
'Wasting Time on the Internet' Is Now an Actual College Class
Security Will Need Big Insight, Not Just Big Data
AT&T Breaks The Apple SIM’s Best Feature, Locks It Down If You Pick AT&T
CurrentC Is The Big Retailers’ Clunky Attempt To Kill Apple Pay And Credit Card Fees
Create a USB Password Stealer to See How Secure Your Info Really Is
If you’d miss it, Tile it.

T-Mobile quietly hardens part of its U.S. cellular network against snooping
Three must-have capabilities for today's data warehouse environment
Linux Forums Free ebooks (sometimes)
Verizon’s ‘Perma-Cookie’ Is a Privacy-Killing Machine
Building A Raspberry Pi VPN Part One: How And Why To Build A Server

US government probes medical devices for possible cyber flaws
Apple Pay: 6 things to know
Some Bank of America customers double-charged with Apple Pay
Apple CEO Discusses Security With Chinese Government: State Media
Twitter Says 'We're Getting Rid Of The Password'

Net Tax Charged By Gigabyte Proposed In Hungary
Tom's Hardware: Best Computer Monitors: October 2014
How to Tap Your Network and See Everything That Happens On It
How to Identify and Solve your Android Battery Problems
Ten years of Ubuntu: How Linux’s beloved newcomer became its criticized king

Facebook Launches Pseudonymous App “Rooms” That Lets You Create Forums About Any Topic
How to Hack Your Own Network and Beef Up Its Security with Kali Linux
Microsoft attempts to improve Android with new 'Garage' apps
Useful SystemD commands
Essential security apps for your smartphone and tablet
FBI Lied About How it Obtained Silk Road Server Location Says Security Expert
NSA Spying Seen Risking Billions in U.S. Technology Sales
Intel chips could let US spies inside: expert
Tech Companies and Government May Soon Go to War Over Surveillance
Abandoned subdomains pose security risk for businesses

The Always Up-to-Date Guide to Building a Hackintosh (OS X 10.10)
How To Check If Your Mac or Linux Machine Is Vulnerable to Shellshock
How To Check If Your Mac or Linux Machine Is Vulnerable to Shellshock
In wake of Anonabox, more crowdsourced Tor router projects make their pitch
Apple says hackers attacked iCloud

How to Make Sure You're Visiting the Real iCloud Page

htop: better top for linux & OSx
How To Really Speed Up Your Computer – Common Myths & What To Do Instead
This Seat-Back Screen Lets Airlines Swap in the Latest Tablet Tech
NOT OK GOOGLE: Android images can conceal code
Ad-borne Cryptowall ransomware is set to claim FRESH VICTIMS

Avast Antivirus Was Spying On You with Adware (Until This Week)
What You Should Know About the Amazon Kindle Voyage
Is your home or office internet gateway one of '1.2 MILLION' wide open to hijacking?
Google's new Security Key
naked securityYubiKey
eweek, LastPass
Windows 0-Day Exploited In Ongoing Attacks

Here’s Why Windows 8.1′s Encryption Doesn’t Seem to Scare the FBI
Hands On With Google Inbox: Useful Email Triage Tools For A Mobile Workflow
Five Best Linux Desktop Environments
Suspected Staples breach
‘Spam Nation’ Publisher Discloses Card Breach
Why Apple Pay could even be a big deal for Android users
   Shall we fork Debian™?
E.T. Phone Home?
A Physical Key to Your Google Account
CAINE Linux Distribution Helps Investigators With Forensic Analysis

How to Uncover Blurred Information in Photographs
How to Break Into a Computer (and Prevent It from Happening to You)
A Smartwatch That Projects Buttons Onto Your Skin
FBI Director Warns That Smartphone Encryption Will Come with Consequences
With Laplock, You Get A Text Message When Somebody Unplugs Your Laptop

10 Trends Transforming Enterprise IT's Puls smartband lets you leave your phone at home
First Apple-IBM enterprise products coming next month
Microsoft Reportedly Gearing Up for Smartwatch Launch
Taking a cue from science fiction, Microsoft demos 'universal translator'

Phone Hackers Dial and Redial to Steal Billions
Shred-it Helps Businesses Mitigate Information Security Threats
October 13, 2014
Office of Information Security Shares 5 Tips to Safely Using Social Media

The Top 5 Information Security Breaches No One Is Talking About
Stop worrying about mastermind hackers. Start worrying about the IT guy

Snapchat and other online services need to tighten security
‘Online security’ need not be an oxymoron
A Fire-Safety Nightlight That Offers a New Take on the Smart Home
Maybe Better If You Don’t Read This Story on Public WiFi
Swift. A new language that lets everyone build amazing apps
Webroot SecureAnywhere Internet Security Plus (2015)
Poodle: introducing another web bug that makes browsing less safe

Google: SSL bug  Naked Security
 Microsoft Patches 3 Zero-day Vulnerabilities actively being Exploited in the Wild
Don't forget to add Wireshark to your security toolkit
Architects Create a 3-D Printed Column That Survives Earthquakes

This new battery charges to 70% in two minutes, and lasts for 20 years
Amazon's first brick-and-mortar store said to open in Manhattan
Drupal SQL injection nasty leaves sites 'wide open' to attack
WordPress vs Joomla vs Drupal + CMS “comparison chart”
Police Departments Skirting Public Accountability By Using Private Foundations To Obtain Controversial Surveillance Technology

The Samsung Galaxy Note 4 Is A Nearly Perfect Mini Tablet

How To Improve Your Programming Career Opportunities
Shellshock used to amass botnet and execute phishing campaign
First Demonstration of Artificial Intelligence On a Quantum Computer
No, Your iPhone Flashlight is NOT Spying On You

All the National Chains That Offer Free Wi-Fi
The best SSDs of 2014: A buyers guide
5 Killer Tricks to Get the Most Out of Wireshark
IT Salary Survey 2014: How does your information technology salary stack up?
OSX Yosemite

Nearly 7 Million Dropbox Account Passwords Allegedly Hacked
Dropbox Denies It Was Recently Hacked
Dropbox bug wipes some users' files from the cloud
Google testing service to connect patients with doctors over video chat
Here’s How Visa Plans to Keep Your Credit Cards Safe in Apple Pay

Edward Snowden’s Privacy Tips: “Get Rid Of Dropbox,” Avoid Facebook And Google
Malware 'Mayhem' Follows Emergence of Shellshock Vulnerability
Samsung Working On 60 GHz Wi-Fi Technology 'A motivated, funded, skilled hacker will always get in' – Schneier
With This Tiny Box, You Can Anonymize Everything You Do Online

Revealed: ISPs Already Violating Net Neutrality To Block Encryption And Make Everyone Less Safe Online
Hackers Reportedly Set to Leak 200,000 Stolen Snapchat Images Snapsaved Takes Responsibility For Latest Snapchat Leak I Want to Write Android Apps. Where Do I Start?
Kmart apologizes to customers after month-long security breach

FACEPALM! HP cert used to sign malware
Metageek Wi-Spy + Chanalyzer 5
The iPhone 6 Plus Wins The Longer Race
Where In The US Are All The Coders?
Apple Pay And Digital Currency Mean Time Is Running Out For Physical Cash

Snowden Attacks “Anything Goes” Privacy Intrusions Of British Spy Agencies
Crapware Finds a New Way to Trick Users to Install Browser Extensions
ChromeOS Will No Longer Support Ext2/3/4 On External Drives/SD Cards
How to improve Google+ immediately
Mailbox email app for Mac opens beta to all users
Outsourced Tech Jobs Are Increasingly Being Automated
Apple Pay vs. Google Wallet: A Brief Competitive Comparison
Two AT&T Data Breaches Draw Attention to Insider Access Issues
Compromised WordPress sites increasingly used for phishing
Most Popular Place to Buy Computer Parts: Newegg

Apple iPhone 6 Shows Why Even Small Gains in Screen Size Matter
5 Exciting New Features in Linux 3.17
JPMORGAN ATTACK: Developer’s password gave alleged Russian hackers broad access to data
Linux Command Line Cheat Sheet
Meet the virtual patients training real doctors

US Spy Programs May Break the Internet if Not Reformed, Google Leader Says
Adobe spies on readers: 'EVERY page you turn, EVERY book you own' leaked back to base
Apple’s iPhone Encryption Is a Godsend, Even if Cops Hate It
Information security experts: Act and protect charities online
Morrisey: Be wary after JPMorgan Chase security breach

‘Unlawful’ WiFi hotspot blocking ruling highlights academic IT headaches
'Electronic blood' could power computers
Supercomputer revolution: Meet HP’s The Machine – an all-in-one, mega-powerful photonic device
Chrome: ScriptSafe

Journey into cryptography
Aussie builds contactless card cloner app, shops at Woolies with fake card
Six steps for you to fight credit-card hackers
Huge Data Leak at Largest U.S. Bond Insurer
Save Money On Your Smartphone Bill: Cut The Mobile Internet
Migrating From Windows 7 To Ubuntu: The Ultimate Guide
Spotify is Powered by Linux and Open Source
Select seven to hold 'Internet reboot' keys
Report: Apple Will Announce Its New iPads at an Event on Oct. 16
Report: Advanced iOS Virus Targeting Hong Kong Protesters

The Unpatchable Malware That Infects USBs Is Now on the Loose
10 Big Problems That Brought HP to a Decision to Split Up
Google Is Working On A Gigantic, Shape-Shifting TV Screen
Hackers Have Found A Flaw In Macs And Are Using It To Control 17,000 Apple Computers ... Via Reddit
Plastc wants to replace your entire wallet with a single card

How to configure a host intrusion detection system on CentOS
Pinterest Curates Its Own Content With New Weekly Collections Called “Pin Picks”
Visual Basic Rises Again as a Document Malware Scripting Language
One In Three Jobs Will Be Taken By Software Or Robots By 2025, Says Gartner
Details of iOS and Android Device Encryption

MEGATech Videos: Testing the Gapgate on Galaxy Note 4
Germs at the Office Are Often Found on Keyboards and at Coffee Stations
The Washington Post Is Now Free On Amazon Kindles
How to Clear Your Google Search History on Android
Law Enforcement Still Defending ComputerCOP: Says They'll Keep Distributing It Until After Someone's Been Hurt

What Is The Best News Reader App For Android?
Politicians Cynically Using JP Morgan Hack To Try To Pass Laws To Diminish Your Privacy
Washington Post's Clueless Editorial On Phone Encryption: No Backdoors, But How About A Magical 'Golden Key'?
Should I Use Linux Or Windows? 3 Deal-Breaker Questions You MUST Answer
Computer security sleuths hack the hackers
Give up firstborn for free Wi-Fi? Some click "I agree"
Hackers charged with Xbox One, Valve, Call of Duty data theft
EFF: Security software distributed by cops is actually spyware in disguise
An FBI informant led hacks against 30 countries—now we know which ones
Your Inner Drone: The Politics of the Automated Future

New OS X backdoor malware roping Macs into botnet
Self-Destructing SSDs Will Nuke Themselves If You Text Them a Code Word
The End Of Passwords? This Bracelet Unlocks Computers And Doors With Your Heartbeat
Wireless Sensor

pogoplug pogoplug: safeplug
pogoplug: Private Cloud
Liquipel: Waterproffing

Youtube: multi-factor authentication
Shared Inbox Front Pulls $3.1 Million To Optimize Your Email Workflow
Pebble Gets A Permanent Price Cut, Plus Background Sleep And Activity Tracking

Path’s Talk App Gets Updated So You Can Send Messages To Places
Reddit Plans Its Own Cryptocurrency To Give Back To Its Users After $50 Million Raise
IFTTT: Recipe Collections
Secure Your Linux Desktop and SSH Login Using Two Factor Google Authenticator
How to Avoid an iOS 8 Bug That’s Deleting iCloud Documents
Google gives students unlimited cloud storage
Hong Kong's pro-democracy protests spur growth for secure messaging apps
Nixie is a wearable drone that captures your activities on the fly
Jetpack Propels Running Soldiers Faster, Farther
‘Cloaking’ device uses ordinary lenses to hide objects across range of angles

Google: Cloud Storage Comparision
Updated Bash packages now available via Fedora updates
Learning Security by playing Games
‘Stalker app’ company CEO arrested, faces federal charges of conspiracy and spyware marketing
iOS 8’s predictive QuickType keyboard found to suggest parts of your passwords

Shellshock Bug May Be Even Bigger Than Heartbleed: What You Need to Know
How To Check If Your Mac or Linux Machine Is Vulnerable to Shellshock
AES-256 Is Not Enough: Breaking a Bootloader
IG exposes information security gaps at federal, state health insurance exchanges
Region to spend $1b on information security this year

Awareness of information security threats growing; but organizations struggle to manage the risks
SANS updates information security policy templates library
Why Your Company Needs Both a CIO and a CISO
Meet Wedg, Another Post-Snowden Personal Cloud Device
Super Early Data Suggests iPhone 6 Is Outselling 6 Plus By A Lot

New security flaw in iOS 8 and iOS 8.0.2 allows someone to break into your iPhone unchallenged
eBay And PayPal To Split Into Two Separate Companies
How Apple Pay Could Change the Buying Experience
How to Organize Your Linux File System for Clutter-Free Folders
IT skills that are in demand, and those that will be
The Guy Who Just Hacked Touch ID In The iPhone 6 Says It's Safe ... For Now
Serious Bash Flaw Lets Attackers Hijack Linux and Mac Computers
'Bash' Security Flaw in OS X Allows for Malicious Attacks on Devices and Services
In Heartbleed's wake, Bash shell flaw puts Linux, Mac OS users at risk
15 Insanely Great Tricks to Master Apple’s iOS 8

The limits of Apple's iOS 8 privacy features
Is Your E-ZPass Spying on You?
Biometric Security And Bowie Knives
Five Things To Do With Your Old iPhone
Data Breach Bulletin: Home Depot, eBay, C&K Systems, Call of Duty & Destiny

How Apple Made Your iPhone 6 Much Less Likely To Be Stolen
Hacker Hysteria: 5 Ways to Protect Yourself from Cyber Attacks
How to create nested folders in iOS 8 (Video)
Seven Websites That Support Two-Factor Authentication
IT security shifts from prevention to resiliency

Five Ways To Protect Yourself from Data Breaches
Apple’s iPhone 6 is more durable, less breakable than iPhone 5S, Galaxy S5, One M8
Oklahoma Sheriff Accused Of Keeping Extensive Database On Citizens
Lesson in Successful Disaster Planning
MAMP: My Apache – MySQL – PHP

Why are some hard drives more reliable than others?
Evolution Of The Desk (1980-2014)
Netflix deadlocked with broadcast regulator over "confidential" subscriber data
Latest Firefox and Thunderbird updates plug CRITICAL SSL vulnerability
Native support for Netflix is coming to Linux
TrueCrypt may have found new life under a new name
How will iPhone 6's Wi-Fi calling, VoLTE affect enterprise networks?
Larry Ellison steps aside as Oracle CEO, former HP exec Mark Hurd promoted
Apple Pay security: Hope abounds, but questions linger

How to install Joomla on Ubuntu 14.04
Apple Watch Privacy Questioned by Connecticut AG
How To Learn Programming Without All The Stress
Is Smarter Technology Dumbing Down the Human Race?
How to Set Up Family Sharing in iOS 8

What’s The Real Difference Between A Gaming Laptop And Desktop?
eBay takes flak for leaving rigged iPhone listing up for 12 hours
Schneier: iOS 8 Security
Home Depot breach totals: 56 million credit cards exposed, $62 million in losses
TOR users become FBI's No.1 hacking target after legal power grab

Square's new cash register will take Bitcoin, Apple Pay and much more
Display technology so advanced
it feels like magic

3D printing expands to nearly 100 UPS Stores across the U.S.
Coin adds new features, addresses security concerns for its credit-card replacement
iOS 8 Is Here: 10 Reasons To Install It Right Away

Why I don’t like Square
Android L will have device encryption on by default
Three Things Apple Can Do to Fix iCloud’s Awful Security
Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv1331”
In Defense Of Passwords
Laid off from job, man builds tweeting toilet
A Google Site Meant to Protect You Is Helping Hackers Attack You
For Sale Soon: The World’s First Google Glass Detector
WikiLeaks posts the software governments use to spy on dissidents
Secrecy Locks Your Files in Encrypted, Password-Protected Vaults

Blinkist Breaks Down Nonfiction Books into Easy 15 Minute Bites
Toward a Childproof Internet
Digital Literacy Is the Key to the Future, But We Still Don’t Know What It Means
What the Apple Watch Says About Apple
Usenet and government

Malware Distributed Through Twitch Chat Is Hijacking Steam Accounts
How To Stay Anonymous Online In 2014
Audible Security Flaw Lets Thieves Download Unlimited Free Audiobooks
How Cybercriminals Attack Small Businesses — and 10 Ways to Stop Them
With Tech Taking Over in Schools, Worries Rise

NSA Hacks Corporate Servers To Map Internet
Comcast Denies It Will Cut Off Customers Who Use Tor, The Web Browser For Criminals
Top 10 Emerging Technologies That Are Changing The World
Apple Sells 4M iPhone 6 And 6 Plus Pre-Orders In Opening 24 Hours
The FBI just finished building its facial recognition system

SELinux Coloring Book (Redhat)
Islamic Hackers Attack Kirk Cameron Site
Five million hacked passwords dumped on Russian cybercrime forums
lifehacker: This Week's Top Downloads
Putting Smartphone Zombies In Their Place
Hacked Celeb Pics Made Reddit Enough Cash to Run Its Servers for a Month
Here’s a $500 Dry-Cleaning Machine That Fits in Your Closet
The iPhone 6's New Camera Could Forever Change Filmmaking
Battle for the net: why is my internet slow today?
The most important feature Apple didn't talk about today
Which VPN Services take your Anonymity Seriously?
NSA asked Linus Torvalds to install Backdoors in Linux
Why Apple Devices Will Soon Rule Every Aspect of Your Life

Word-of-the-Day: Google dork
Tabnabbing: A New Type of Phishing Attack
The Start-to-Finish Guide to Securing Your Cloud Storage
Why Meditation Should Be Your Brain's "Scheduled Maintenance"

Microsoft Paid NFL $400 Million To Use Surface, But Announcers Call Them iPads Launches Code Studio, A Toolset And Curriculum For Teaching Kids Programming
     How to Protect Yourself From Big Bank-Card Hacks
YouTube, Amazon and Yahoo! caught in malvertising mess
Planning Considerations for BYOD and Consumerization of IT (Part 3)

Facebook's Messenger App Logs Way More Data Than You Realize
Facebook Will Now Ask People Why They Hid An Ad, Banish Offensive Ones
Cyber breaches rare among U.S. state-registered investment advisers -study
5 Ways to Protect your Business from a Cyber Attack
The Fundamental Advantages Of Using A Chromebook
Most Email Is Now Invisible To Hackers And Government Surveillance
This Android Shield Could Encrypt Apps So Invisibly You Forget It’s There
Encrypting Your Dropbox, SkyDrive, Box, or Google Drive On The Fly
World First As Message Sent From Brain To Brain
Legal Sifter

How Secure is my Password
10,000 Top Passwords
Word Lens
N.S.A. Breached Chinese Servers Seen as Security Threat

18 things I did after installing Fedora 20, the Xfce spin
How to: Change / Setup bash custom prompt (PS1)
How to Turn Your PlayStation 3 Into a Linux PC
Why Everyone Should Read Harry Potter
CloudAlloy Makes Docs In The Cloud More Secure By Breaking Them Into Pieces

The System Administrator's Organized Backpack
Barbarians At The Password Gate
Hackers launch Apple ID phishing campaign playing on iCloud security worries breached, injected with malware
 Kindle vs. iBooks: Which Is The Best eReader For Your iPad or iPhone?
Home Depot Finally Confirms Its Payment System Was Hacked For Months
Comcast Using JavaScript Injection To Serve Ads On Public Wi-Fi Hotspots
PCMag: Tips for Sharing Passwords
Use home networking kit? DDoS bot is BACK... and it has EVOLVED
Logitech K480 Multi-Devices Bluetooth Keyboard
How to Save the Net
Mysterious Phony Cell Towers Could Be Intercepting Your Calls
How Apple and Amazon Security Flaws Led to My Epic Hacking
DIY NAS: EconoNAS 2014

How to make your email address as hard to guess as your password
The Apps You Need to Deauthenticate Before Selling Your Devices
iCloud's Two-Factor Authentication Doesn't Secure Your Photos, Backups
Linux Systems Infiltrated and Controlled In a DDoS Botnet
Plan Your Free Online Education at Lifehacker U: Fall Semester 2014

Why We Should Encrypt Everyone’s Email
Following iCloud hack, experts say enterprise data likely at risk
Linux Journal How-To
You Got Your Windows In My Linux
SysVinit to Systemd Cheatsheet

Latest Firefox adds protection against rogue SSL certificates
VoIP Security. A Quick Guide for Small Business
Using WPS on your Wi-Fi router may be even more dangerous than you think
Scared of brute force password attacks? Just 'GIVE UP' says Microsoft
Mac security packages range from peachy to rancid – antivirus tests

Data: Nearly All U.S. Home Depot Stores Hit
Real-time emotion detection with Google Glass: An awesome, creepy taste of the future of wearable computers
HTG Explains: What is a File System, and Why Are There So Many of Them?
5 Smart Home Appliances You Should Be Buying
Why Social Engineering Should Be Your Biggest Security Concern
The New Era Of Smart Dining
Windows XP’s Market Share Fell By Less Than 1% In August
CNN: Who hacked and posted celebs nude pics?
This could be the iCloud flaw that led to celebrity photos being leaked (Update: Apple is investigating)
3 Reasons Why Chromebook Does Not Solve Digital Security Issues

Stop Thieves From Recovering Your Data After A Factory Reset
Google’s Location History is Still Recording Your Every Move Five Facebook Threats That Can Infect Your PC, And How They Work
NIST to sysadmins: clean up your SSH mess
Cybersecurity's hiring crisis: A troubling trajectory

Flaw lets hackers break your WiFi router's security with one guess
Why Usernames & Passwords Are A Thing Of The Past, And How To Cope With This
Amazon Vs. Hachette: Fewer Middlemen Equals A Better World
Hacker Attack on Banks Shows Need to Lock Down Employee PCs
What Are Hackers Thinking?
8/28 3-Year VPN Unlimited Premium Plan For $19 Cloud Storage Showdown: Google Drive, Dropbox, iCloud and More Compared Heartbleed Attacks Still Actively Targeting Vulnerable Servers, Says IBM Linux hits 23 - the Time Machine that changed the world! The New KDE Plasma 5 Desktop Is Gorgeous — Here’s How To Try It

Go On A Reading Buffet: 4 Top eBook Subscription Services Compared Dropbox Upgrades Pro Users to 1TB, Adds Remote Wipe, Security Features 5 Amazing 3D Printing Applications You Have to See to Believe The top 10 personal cloud-storage services Free 1 Year of LastPass Premium

If You're A Copyright Maximalist 'Piracy' Must Be The Answer To All Problems
The Lifehacker Pack for Students
Researchers camouflage haxxor traps with fake application traffic
Dairy Queen joins list of retailers hit by hacker attack
Firefox OS app permissions will give users more privacy than Android

How To Install Tomcat On CentOS 7

How to install Tomcat in Ubuntu 14.04
FBI Investigates 'Sophisticated' Cyber Attack On JP Morgan, 4 More US Banks
Nearly 70 percent of IT pros target of weekly phishing attacks, HP finds
Comparison of Linux distributions
Samsung’s New Gear S Smartwatch Features A Curved Screen And 3G Connectivity

"There is no inside" - How to get the most from your firewall
Surface Pro 3 vs. iPad Air: Best Option For You?
10 Free Online Courses That Every Professional Should Check Out
What's the matter with PGP?
New cybersecurity tool lets us predict website hacks before they happen

How to Easily Encrypt Files on Windows, Linux, and Mac OS X
We need to talk about email
White House's Cybersecurity Guy Proud Of His Lack Of Cybersecurity Knowledge Or Skills
default router passwords
2014 IT's Hottest Certifications

2011 Spring  2012 Spring 2012 Fall 2013 Spring 2013 Fall
2010 Fall 2011 Fall 2008 Fall 2010 Spring