BlackBerry to slurp encrypted mobile comms firm Secusmart

By Brid-Aine Parnell

Source: The Register

Ad Hoc Security's Surprisingly Negative Residual Effect

Source: Infosec Island

Implementing an Intelligence-Driven Security Strategy: 10 Data Points

Source: eWeek

Recording Industry Willfully Misreads The Law In Order To Sue Ford & GM For Having Built-in CD Rippers

By Mike Masnick

Source: Techdirt

Canada’s National Research Council Shuts Down Systems to Stop Cyber Attack

Thumbnail for 347888

By Softpedia News (Ionut Ilascu)

Source: Softpedia

The Perfect InfoSec Mindset: Paranoia + Skepticism

By Corey Nachreiner

Source: Dark Reading

The Future Is Now: Threats That Were Never Supposed to Happen Are Here

By RSA Conference Blog

Source: Security Bloggers Network

Spotlight: Hackers exploit elasticsearch hole to launch cloud-based DDoS attacks

By Fred Donovan

Source: FierceITSecurity

Chinese hackers steal data on Israel’s Iron Dome missile defense system

Thumbnail for 347921

By Waqas

Source: HackRead

Virtual servers still face real security threats

By IDGNS staff

Source: ITworld

Chinese military “hacked” Israel’s Iron Dome

Thumbnail for 347861


Source: Ars Technica

Open Redirect Vulnerability on MasterCard’s Australia Web Site

Thumbnail for 347817

By Lucian Ciolacu

Source: HOTforSecurity

Instasheep: Coder builds tool to hijack Instagram accounts over Wi-Fi

Thumbnail for 347863

By Sean Gallagher

Source: Ars Technica

Fake ID Flaw Puts Android Users at Risk

Source: eWeek

US-Based Tech Support Firm Sells Unlicensed Malwarebytes Software

Thumbnail for 347790

By Softpedia News (Ionut Ilascu)

Source: Softpedia