QR codes for the homeless? Why hackers' naivety is still a force for good | Leigh Harris

Thumbnail for 346799

By Leigh Harris

Source: The Guardian

The Snowden Wasteland

Thumbnail for 346779

By David Bisson

Source: Information Security Buzz

Keeping the Infosec Spirit Alive

By David Bisson

Source: Information Security Buzz

The Security Community Needs Effective, Targeted Cybercrime Laws

Thumbnail for 346783

By David Bisson

Source: Information Security Buzz

Bromium Research Highlights Increased Internet Browser Vulnerabilities

Thumbnail for 346785

By David Bisson

Source: Information Security Buzz

Israel's Iron Dome missile tech plundered by Chinese hackers

By Darren Pauli

Source: The Register

DHS-Funded 'SWAMP' Helps Scour Code For Bugs

By Kelly Jackson Higgins

Source: Dark Reading

Responsible Disclosure – Sucuri Open Letter to MailPoet and Future Disclosures

By Tony Perez

Source: Security Bloggers Network

Stolen Self Regional Healthcare Laptop Exposes Patients Details

Thumbnail for 346695

By Softpedia News (Ionut Ilascu)

Source: Softpedia

About those alleged backdoors in Microsoft products...

Thumbnail for 346697

By l33tdawg

Source: Hack In The Box

Israel's Iron Dome Blueprints Were 'Stolen by Chinese Hackers'

Thumbnail for 346699

By l33tdawg

Source: Hack In The Box

Nvidia hacks together two displays to build better VR goggles

Thumbnail for 346701

By l33tdawg

Source: Hack In The Box

Microsoft targeted in Chinese government inquiry

Thumbnail for 346706

By l33tdawg

Source: Hack In The Box

SEC to Facebook: yeah, we're good, Homeland Security does software, and go ahead and unlock your cellphone [Government IT Week]

Source: ZDNet

Unix: Controlling privileged access

By Sandra Henry-Stocker

Source: ITworld