Connected devices have huge security holes

Source: ZDNet

10 Reasons to Use Barcodes for Your Retail Store

By Promoted

Source: Hackers News Bulletin

Looking at insider threats from the outside

Source: Help Net Security

Bug in Android could allow access to personal data

Thumbnail for 349330

Source: ITP.net

Company Offering Open-Source Biological Reagents Hopes To Recapitulate Free Software's Success

By Glyn Moody

Source: Techdirt

375 million customer records compromised in 2014

Source: Help Net Security

Oh blimey, I have to get back in the #ITBW saddle this morning. My sincere thanks to +Stephen…

By Richi Jennings

Source: Security Bloggers Network

Firm issues soft denial against Iron Dome hack

By Darren Pauli

Source: The Register

6 best practices to assure PCI compliance

Source: Help Net Security

Education Initiative Spotlight: Build it Break It

Thumbnail for 349177

By Dan Guido

Source: Security Bloggers Network

97% of Global 2000 remain vulnerable to due to Heartbleed

Source: Help Net Security

Incite 7/30/2014 — Free Fall

Thumbnail for 349087

By mrothman@securosis.com

Source: Securosis

DDOS takes down Cirrus Communications

By Simon Sharwood

Source: The Register

You’ve been reported … by an ad

By netsecpodcast@mckeay.net (Martin McKeay)

Source: Security Bloggers Network

'Things' on the Internet-of-things have 25 vulnerabilities apiece

By Darren Pauli

Source: The Register