Breaches, Security News & more…

Follow my Twitter feeds for daily breach and security news.


Wils Bell – President
Direct: 407-365-2404
Email: Bell@SecurityHeadhunter.com

HELPFUL LINKS

  • Twitter (Follow me for latest Jobs, Breaches, and News)
  • LinkedIn (I accept all security professional’s Invites)

Breaches, Security News & more…

Follow my Twitter feeds for daily breach and security news.

Can Health Care Orgs Maintain Trust With Electronic Records?

iOS JavaScript Bug Can Lead to Spoofed Sites

Facebook Warns Users About Timeline Adware

Incident Response and PCI Compliance

Public Key Infrastructure 1998 – 2012

Is a W-2 Considered PHI Under HIPAA?

Department of Defense Developing Cyberspace ‘Rules of Engagement’ Framework

8 Arrested in $4.5 Million Scheme

Key Components of a Social Media Policy

In Australia, secure your Wi-Fi — or face a visit from the police

NSA Chief: Cyber Becoming More Perilous

NSA Chief Denies Wired’s Domestic Spying Story (Fourteen Times) In Congressional Hearing

ISPs Signal Support For Anti-Bot Code Of Conduct

Some Thoughts on Sandboxes

Vulnerability Remediation: No More Traffic Signals

Wireless Security: Wi-Fi Hacking Burglars Get Busted

Hackers Target Social Media for Social Engineering Attacks

Experts Tell Senate: Government Networks Owned, Resistance Is Futile

Verizon: Hacktivists Steal Most Data In 2011

Six High-Risk Flaws Fixed in Google Chrome

Follow-up: Two men who stole bank info from Michaels customers headed to federal prison

Breach Leaves Thousands Of Kaiser Permanente Employees Checking Their Credit Report

Verizon: Hacktivists #1 Breach Threat

Wils Bell – President
Direct: 407-365-2404
Email: Bell@SecurityHeadhunter.com

HELPFUL LINKS

  • Twitter (Follow me for latest Jobs, Breaches, and News)
  • LinkedIn (I accept all security professional’s Invites)

Breaches, Security News & more…

Follow my TWITTER feeds for daily breach and security news.

Wils Bell – President
Direct: 407-365-2404
Email: Bell@SecurityHeadhunter.com

HELPFUL LINKS

  • Twitter (Follow me for latest Jobs, Breaches, and News)
  • LinkedIn (I accept all security professional’s Invites)

Breaches, Security News & more…

Follow my Twitter feeds for daily breach and security news.

 

Wils Bell – President
Direct: 407-365-2404
Email: Bell@SecurityHeadhunter.com

HELPFUL LINKS

  • Twitter (Follow me for latest Jobs, Breaches, and News)
  • LinkedIn (I accept all security professional’s Invites)

Security Breaches, Security News & More (week ending 2-17-12)

Follow my Twitter feeds for daily breach and security news.

Wils Bell – President
Direct: 407-365-2404
Email: Bell@SecurityHeadhunter.com

HELPFUL LINKS

  • Twitter (Follow me for latest Jobs, Breaches, and News)
  • LinkedIn (I accept all security professional’s Invites)

Breaches, Cyber Crime & Security News Highlights

** Remember to follow me on Twitter  for daily breach and security news.**

Cybersecurity Act of 2012 Introduced Without Emergency Presidential Powers Provisions

Anonymous-Linked Attacks Hit US Stock Exchanges

Security practitioners weigh in on the 15 worst data security breaches in recent memory.

Republican senators want to put the brakes on cybersecurity bill

Audit reveals Maryland inmates had access to social security numbers

Local government discloses employee social security numbers

Offer to ‘test’ iPhone 5 is a scam

The escalating cost of US cybersecurity plans

The rise of information stealers and pay-per-install malware

Malware Network Threats Rising, How to Defend Yourself

Senators Unveil Cybersecurity Bill to Empower Homeland Security

Mozilla wants CAs to stop issuing and revoke MITM certificates

Horde FTP server hacked, files modified to include backdoor

Gap in patch priorities vs cybercriminal targets

Cyber-Spies Intercepted Sensitive Files, Emails From Nortel: Report

Annual Breach Reporting Deadline Looms

Security Falling Short When It Comes To Dealing With Growing Cyber Attacks

U.S. Commerce Department Infected with Malware

Alabama and Texas law enforcement sites fall to hackers

7 Steps to Building a Security Program

78% of organizations that Trustwave investigated had no firewalls at all Adobe’s Security Chief Talks About Driving Up The Cost of Exploits

Symantec Verifies Stolen Source Code Posted By Anonymous is “Legitimate”

 

Wils Bell – President
Direct: 407-365-2404
Email: Bell@SecurityHeadhunter.com

HELPFUL LINKS

  • Twitter (Follow me for latest Jobs, Breaches, and News)
  • LinkedIn (I accept all security professional’s Invites)

Breaches & Information Security News

Follow my Twitter feeds for daily breach and security news.

 

Ernst & Young loses 401k information of bank employees

Food and beverage industry has unsavory history of data breaches

Disaster Recovery is health industry’s biggest headache

2011 review: CNI targetted, spam down, botnets up

Attackers Using Fake Google Analytics Code to Redirect Users to Black Hole Exploit Kit

Role of Ethics in IT Security

Data Loss Doesn’t Always Mean Getting Hacked

Hackers Infect WordPress Web Sites

VeriSign Hacked – But Why?

Number of patient record data breaches nearly doubled last year

Why Infosec Forced Me to Get an MBA

The Most Technologically Secure Super Bowl Ever

Acts of Terrorism vs. Cyber Threats: New Offense Scenarios

How to Win Friends and Steal Their Facebook Accounts

How To Spot A Fake Facebook Friend Profile

New Guidance on Payments Processing

Healthcare Breaches: Behind the Numbers

Verisign Breached Several Times in 2010

Wils Bell – President
Direct: 407-365-2404
Email: Bell@SecurityHeadhunter.com

HELPFUL LINKS

  • Twitter (Follow me for latest Jobs, Breaches, and News)
  • LinkedIn (I accept all security professional’s Invites)