Google+ Badge

sabato 5 ottobre 2013

Weekend Top Security News 05.10.2013

Weekend Top Security News 05.10.2013

Advanced threats,intelligence technology | Scoop.it

Advanced threats,intelligence technology | Scoop.it

How to Develop a Marketing Plan for LinkedIn - markITwrite

How to Develop a Marketing Plan for LinkedIn - markITwrite

ARM Programmers Get a New Extermination Tool

Bug-B-Gone!/ARM Programmers Get a New Extermination Tool

boost: input validation bypass [LWN.net]

boost: input validation bypass [LWN.net]

Automating Off-Premise Disaster Recovery - Techworld

Automating Off-Premise Disaster Recovery - Techworld

Security Specialists Evaluate Vulnerabilities of iPhone 5

Security Specialists Evaluate Vulnerabilities of iPhone 5

Cloud Security Alliance Big Data Working Group Releases Report On Big Data Analytics For Security Intelligence | Big Data Press

Cloud Security Alliance Big Data Working Group Releases Report On Big Data Analytics For Security Intelligence | Big Data Press

Big Data Analytics for Security: Having a Goal + Exploring

Big Data Analytics for Security: Having a Goal + Exploring

Logstash 1.2 and Kibana2 auto-install for Ubuntu 12.04

 Logstash 1.2 and Kibana2 auto-install for Ubuntu 12.04

Why the big data systems of tomorrow will mirror the human brain of today | VentureBeat

Why the big data systems of tomorrow will mirror the human brain of today | VentureBeat

Microsoft Message Analyzer / capture, display, and analyze

 Microsoft Message Analyzer /

Next Generation of Carrier Systems Going Virtual - CIO.com

Next Generation of Carrier Systems Going Virtual - CIO.com

Transform Social Data into Action with Command Center - HootSuite Social Media Management

Transform Social Data into Action with Command Center - HootSuite Social Media Management

How Teen Social Media Trends Can Influence Future eDiscovery « D4 eDiscovery

How Teen Social Media Trends Can Influence Future eDiscovery « D4 eDiscovery

Web-based eDiscovery workflow automation with Nuix Director

Web-based eDiscovery workflow automation with Nuix Director

Privacy & EDiscovery

Privacy & EDiscovery

I tentativi dell’NSA di violare l’anonimato online » Chiusi nella rete - Blog - Repubblica.it

I tentativi dell’NSA di violare l’anonimato online » Chiusi nella rete - Blog - Repubblica.it

NSA report on the Tor encrypted network - The Washington Post

NSA report on the Tor encrypted network - The Washington Post

Keep Yourself Protected: Don't Become a Victim of Identity Theft

Keep Yourself Protected: Don't Become a Victim of Identity Theft

Docker- The Linux Container Engine.

 Docker- The Linux Container Engine.

Packet Staining=Proactive,threat intelligence embedded in the IP..

Packet Staining=Proactive,threat intelligence embedded in the IP..

Why Digital Certificates are Important for Health Care Sites and How to Use Them - Trend Micro Simply Security

Why Digital Certificates are Important for Health Care Sites and How to Use Them - Trend Micro Simply Security

The importance of having a Mobile Security Strategy in your Business

The importance of having a Mobile Security Strategy in your Business

The Ultimate Guide to Home Security Systems | CCTVHotDeals blog

The Ultimate Guide to Home Security Systems | CCTVHotDeals blog

Effective and cheap home-security solutions | Homes & Real Estate | The Seattle Times

Effective and cheap home-security solutions | Homes & Real Estate | The Seattle Times

venerdì 4 ottobre 2013

NERC CIP ESP Gaps – Non-Routable Holes in the Security Perimeter | EnergySec, a 501(c)(3) non-profit corporation

NERC CIP ESP Gaps – Non-Routable Holes in the Security Perimeter | EnergySec, a 501(c)(3) non-profit corporation

Tor as a VPN for ChromeOS - An open-source project to help move the web forward. - Google Project Hosting

 Tor as a VPN for ChromeOS - An open-source project to help move the web forward. - Google Project Hosting

The Mathematical Shape of Big Science Data | Simons Foundation

The Mathematical Shape of Big Science Data | Simons Foundation

How the Adobe hack could fuel next wave of cyberattacks

How the Adobe hack could fuel next wave of cyberattacks

Communicating Risk More Effectively | The State of Security

Communicating Risk More Effectively | The State of Security

Functional Reactive Programming in JavaScript

Functional Reactive Programming in JavaScript

The Danger Of Assumptions - J-Net Community

The Danger Of Assumptions - J-Net Community

giovedì 3 ottobre 2013

Check Out This Cool Speed Test Of All iPhones Ever Made - Business Insider

Check Out This Cool Speed Test Of All iPhones Ever Made - Business Insider

Is Cybersecurity a Profession?

Is Cybersecurity a Profession?

Website Speed Optimization

 Website Speed Optimization

Hacktivism: Means and Motivations … What Else?

Hacktivism: Means and Motivations … What Else?

Protecting Your Business From Cyber Attacks - Topix

Protecting Your Business From Cyber Attacks - Topix

The IT Brand Is Broken - - - Informationweek

The IT Brand Is Broken - - - Informationweek

Derbycon 2013 - Cognitive Injection: Reprogramming The Situation-Oriented Human Os - Andy Ellis

Derbycon 2013 - Cognitive Injection: Reprogramming The Situation-Oriented Human Os - Andy Ellis

Threat Intelligence: Sources and Methods Matter | SecurityWeek.Com

Threat Intelligence: Sources and Methods Matter | SecurityWeek.Com

COMPREHENSIVE STUDY ON CYBERCRIME - Draft February 2013 - CYBERCRIME_STUDY_210213.pdf

COMPREHENSIVE STUDY ON CYBERCRIME - Draft February 2013 - CYBERCRIME_STUDY_210213.pdf

How SSL works tutorial - with HTTPS example - YouTube

How SSL works tutorial - with HTTPS example - YouTube

The safest cloud apps for the enterprise

The safest cloud apps for the enterprise

Ten Simple Ways to Enhance Cyber Security for You and Others

Ten Simple Ways to Enhance Cyber Security for You and Others

Top 4 Cybersecurity Threats for SMBs | Fox Small Business Center

Top 4 Cybersecurity Threats for SMBs | Fox Small Business Center

Managed C++/CLI Programming: Part-1

Managed C++/CLI Programming: Part-1

Mitigating Third-Party Risks

Mitigating Third-Party Risks

Mitigating Third-Party Risks

Mitigating Third-Party Risks

Before Launching a Marketing Campaign | Social Media Today

Before Launching a Marketing Campaign | Social Media Today

Advanced Threats,Intelligence Technology-Milos Constantin| Scoop.it

Advanced Threats,Intelligence Technology-Milos Constantin| Scoop.it

martedì 1 ottobre 2013

Il business delle petizioni online | Il Post

Il business delle petizioni online | Il Post

Global Grid Optimization Solutions Market 2012-2016 | Virtual-Strategy Magazine

Global Grid Optimization Solutions Market 2012-2016 | Virtual-Strategy Magazine

Is This Our Human Nature? - YouTube

Is This Our Human Nature? - YouTube

Businesses opt for CYOD twice as often as BYOD | The latest news from the Computer and IT Industry | PC Retail

Businesses opt for CYOD twice as often as BYOD | The latest news from the Computer and IT Industry | PC Retail

NQSFW Free CISSP Study Guide (Hacking Illustrated Series InfoSec Tutorial Videos)

NQSFW Free CISSP Study Guide (Hacking Illustrated Series InfoSec Tutorial Videos)

Exploiting Password Policy Weaknesses -InfoSec Tutorial Videos)

Exploiting Password Policy Weaknesses - Minga / Rick Redman Derbycon 2013 (Hacking Illustrated Series InfoSec Tutorial Videos)

Come abilitare Flash Player su Ubuntu

Google Chrome: come abilitare Flash Player su Ubuntu | Geekissimo

Installing VMware Tools on Kali Linux and Some Debugging Basics - SpiderLabs Anterior

Installing VMware Tools on Kali Linux and Some Debugging Basics - SpiderLabs Anterior

Installing VMware Tools on Kali Linux and Some Debugging Basics - SpiderLabs Anterior

Installing VMware Tools on Kali Linux and Some Debugging Basics - SpiderLabs Anterior