Information Security Events For August

By sheila

Source: Security Bloggers Network

Some are twisting the facts in requests to be forgotten, Google says

By IDGNS staff

Source: ITworld

DailyDirt: Making Good Toys

By Michael Ho

Source: Techdirt

Book review: Metasploit – The Penetration Tester’s Guide by Kennedy, O’Gorman, Kearns and Aharoni

By itsecuriteer

Source: Security Bloggers Network

Court Orders Microsoft to Turn Over Data in Ireland Email Case

Source: eWeek

The ultimate geek privacy. You must be wearing these glasses, to read *anything* on the screen

Thumbnail for 353407

By Graham Cluley

Source: Security Bloggers Network

Black Hat hackers finally drive a truck through gaping hole in USB firmware security

By Iain Thomson

Source: The Register

7 out of top 10 “Internet of Things” devices riddled with vulnerabilities

Thumbnail for 353409

By Graham Cluley

Source: Security Bloggers Network

Court Says Who Cares If Ireland Is Another Country, Of Course DOJ Can Use A Warrant To Demand Microsoft Cough Up Your Emails

By Mike Masnick

Source: Techdirt

FTC Republican: Let Apple design its own products

By Kate Tummarello

Source: TheHill

OVERNIGHT TECH: Financial groups renew cybersecurity push

By Julian Hattem and Kate Tummarello

Source: TheHill

Stealthy new malware snatching credit cards from retailer’s POS systems

By Sean Gallagher

Source: Ars Technica

'Energetic' Bear Under The Microscope

By Kelly Jackson Higgins

Source: Dark Reading

IBM Expands Security Portfolio with CrossIdeas Acquisition

Source: eSecurityPlanet

No, the CIA didn’t spy on other computers

By Robert Graham

Source: Security Bloggers Network