sec
Dark Reading:
- Researchers Demo Method For Turning A PC Into An Eavesdropping Device
- 8 Books Security Pros Should Read
- European Regulator Probes Yahoo's 2015 Secret Email Scan
- Atlanta Attorney's Office Gets Cybercrime Unit
- Security Automation: Striking The Right Balance
Office of Inadequate Security
- Trial begins of intelligence services data theft
- Welsh Payday Loans Boss Hired Hackers to DDoS Competitors, Critics
Penetration Testing
SANS Internet Storm Center, InfoCON: green
Full Disclosure
- Stored Cross-Site Scripting in Gallery - Image Gallery WordPress Plugin
- [RT-SA-2016-003] Less.js: Compilation of Untrusted LESS Files May Lead to Code Execution through the JavaScript Less Compiler
Naked Security
- Cyber Monday: What to watch out for when you hit the web
- Every move you make, every click you take, we’ll be watching you
- Fake news still rattling cages, from Facebook to Google to China
- It’s the final countdown for SHA-1 SSL certificates
- Stop wasting time making the wrong passwords stronger
- Facebook ‘quietly developing censorship tool’ for China
- Google secures five-year access to health data of 1.6m people
- How your speakers could be turned into eavesdropping microphones