Cyber Briefs
contact us at info@cyberbriefs.org
World's Only Cyber Security News Aggregate
Index of Cyber Security Perceived Risk
Cyber Security Investment Index
 

United States News

FBI Director Claims That The World’s Most Knowledgeable Cybersecurity Experts Are Not ‘Fair Minded’ About Encryption Backdoors via /r/technology

Tech giants to Obama: Reject 'backdoors' to data encryption

ASCF Improves Citizen Awareness & Response to National & Homeland Security Threats with Downloadable Toolkit Read more: http://www.benzinga.com/press

Senate Blocks Patriot Act Extension And Surveillance Reform


Logjam isn’t the only reason your computer might be more vulnerable to internet threats

SEC’s Division of Investment Management issues new Cybersecurity Guidance

Defense Department's tech investing signals Silicon Valley's importance in cyberwarfare


Cyber-spying fight spills into trade debate


FBI director fears ISIS could launch cyber attack against U.S.


Bluetooth reveals security loopholes in smart tech

Will our future Internet be paradise or dystopia?

Employees Engaging in Risky Cyber Security Activities

Cybersecurity and How Things Have Changed: A Conversation with James Leary, Co-Chair of the Thomson Reuters 5th Annual Law Firm CFO/CIO/COO Forum on D

FBI Director Claims That The World's Most Knowledgeable Cybersecurity Experts Are Not 'Fair Minded' About Encryption Backdoors


Hackers Say They Can Control Planes; This Va. Company Is Working to Stop Them from Hacking Buses

Time to move beyond ‘medieval’ cyber security approach, expert says

Clarke meets with cyber security experts

Oil & Gas Infrastructure Security Market Forecast 2015-2025 Prospects for Leading Personnel, Perimeter, Maritime & Cyber Security Companies in a Lower

Merchant Financial Services Cybersecurity Summit


DB Networks Behavioral Analysis and Intelligent Continuous Monitoring Immediately Identifies Zero-day Attacks Originating from Vulnerable Database Con


Websites

U.S. Department of Homeland Security

The White House

Department of Defense

United States Computer Emergency Readiness Team

Center for Internet Security


National Cyber Security Alliance

Cybersecurity - Delaware.gov

Cybersecurity - Colorado.gov

Cybersecurity - Michigan.gov

The MITRE Corporation - Cybersecurity

Cybersecurity - California.gov

Cyber Security Awareness - NASCIO

Inside Cybersecurity

Information Systems Security Association

Cybersecurity for Small Business

FBI - Cyber Crime

Cybersecurity Framework

Cybersecurity - Oklahoma.gov


TechNewsWorld

Cyber Security Resources - NCUA

Cybersecurity - Vermont.gov

Cyber Security Summit

CyberWatch

The Wire - Cybersecurity

Cybersecurity - Alabama.gov

Cybersecurity - Missouri.gov

Cybersecurity Law Institute

Cybersecurity - Pennsylvania.gov

Federal Cybersecurity R&D

Cybersecurity - Maryland.gov


Books

Cybersecurity and Cyberwar: What Everyone Needs to Know

Cybersecurity Leadership: Powering the Modern Organization

Hacking: The Art of Exploitation, 2nd Edition

The Basics of Hacking and Penetration Testing, Second Edition: Ethical Hacking and Penetration Testing Made Easy


Rtfm: Red Team Field Manual

The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

Cyber War: The Next Threat to National Security and What to Do About It

Protecting Our Future: Educating a Cybersecurity Workforce

Cyberpower and National Security

Basic Security Testing with Kali Linux

Glass Houses: Privacy, Secrecy, and Cyber Insecurity in a Transparent World

Inside Cyber Warfare: Mapping the Cyber Underworld

The Devil Inside the Beltway: The Shocking Expose of the US Government's Surveillance and Overreach Into Cybersecurity, Medicine and Small Business


Network Security Bible

Behold a Pale Farce: Cyberwar, Threat Inflation, & the Malware Industrial Complex

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners

Computer Security Fundamentals

Information Insecurity: A Survival Guide to the Uncharted Territories of Cyber-threats And Cyber-security

Permissionless Innovation: The Continuing Case for Comprehensive Technological Freedom

Using Social Media for Global Security



World News

Cyber security, extremism - of concern to Singapore and France: President Tony Tan

Singapore envoy calls on AP CM

Senator introduces bill calling for fresh sanctions, terror sponsor designation of N. Korea

Australia-Based Telstra Faces Cyberattack on Newly Acquired Pacnet, May Take Legal Action

Cyber Security Market in Europe to Grow at a CAGR of 12.64% over the Period 2014-2019; Finds New Report


Russia threatens to ban Google, Twitter, Facebook

Elbit Systems buys Nice's cyber intelligence unit for up to $158 mln

Hacking Asean: China's unpeaceful rise

UK Government Facing Flak for “Legalizing Official Hacking


Elbit Systems buys Nice's cyber unit for up to $158 million

Say hello to the latest cyber superbug

How A Hacker Could Hijack An Aeroplane From Their Seat


Australian Crime Commission flags encryption, mobile risk as “adept” cyber-crims reshape organised crime0

PRSI Kolkata launches guide book on cyber security

Adult content and dodgy apps: How UK employees are putting their firms at risk


Phantom Menace Strikes British Oil Companies Without Malware

Research Shows Workers Ignoring Known Cyber Risks, Surfing Adult Content and Downloading Unapproved Apps

GCs struggling to mitigate cyber risks


US investigating man's claim that he hacked a plane's controls

Modi sidelining security to woo China


Journals and Magazines

International Journal of Cyber-Security and Digital Forensics (IJCSDF)

National Cybersecurity Institute Journal,

Journal of Information Assurance & Cybersecurity


Journal of National Security Law & Policy

Cyber Security and Information Systems Information Analysis Center

Journal of Conflict & Security Law

Journal of Sensitive Cyber Research and Engineering (JSCoRE)

Harvard Law School National Security Journal

Journal of Cyber Security and Mobility


IT Security Journal

Computers & Security

Security Magazine

Cyber Defense Magazine

US Cyber Security Magazine

SC Magazine

Government Security News

Fed Tech Magazine

Digital Forensics Magazine


CSO

Government Security Magazine

Security News Portal

PC Magazine

PC World

Infowar

Computer Security Basics

Security Managment

The Hacker News Magazine


Blogs

CIO

TechRepublic – Security

Wired Threat Level

Zero Day from ZDNet


CERIAS Security Blog

Dark Reading

Google Online Security Blog

Red Tape Chronicles

InformationWeek Security

Internet Storm Center

Schneier On Security

Securelist Cyber Security Blog


Symantec Weblog

The Guardian’s Information Security Hub

Zone Alarm Cyber Security Blog

BH Consulting’s Security Watch Blog

Contagio Malware Dump

Cyber Crime & Doing Time

David Lacey’s IT Security Blog

Dell Secure Works

F-Secure Safe & Savvy Blog

Fox IT Security Blog

Fortinet Blog

Help Net Security

Infosecurity Magazine

Krebs On Security

Malwarebytes

McAfee Security Blog

Microsoft Malware Protection Center

Naked Security

Network Computing

SANA Institute AppSec Blog

Search Security

Securing The Human

Security Watch

Stop Badware Blog

Sucuri Blog

Tao Security

Techworld Security

The Honeynet Project

Threatpost

Threat Track Security

Veracode Blog

Unmasked Parasites blog

We Live Security

Xylibox Security Blog

BankInfoSecurity

Cyveillance Blog

Forbe's Firewall

Graham Cluley's Security Blog

HotforSecurity

Imperva Blog

IT Knowledge Exchange - Security Bytes

ItProPortal.com

Lenny Zeltser On Information Security

Network Security Blog with Martin McKeay

PandaLabs Cyber Security Blog

PaulDotCom

Privacy & Information Security Law Blog

Rational Survivability

Risky Business

Root Labs RDIST

Seculert Blog

Security Street by Rapid7

Securosis Blog

SilverSky Altitude Blog

SpiberLabs Security Blog

Social-Engineering.org

The Security Skeptic

Thought Crime Cyber Security Blog

Troy Hunt's Blog

1 Raindrop

Andrew Hay's Cyber Security Blog

Carnal Ownage

Command Line Kung Fu

Dancho Danchev's Blog

Darknet

Errata Security

Exotic Liability

Hack Surfer

InfoSec Institute Resources

J4vv4D Security Blog

Liquid Matrix

Malcovery Security Blog

Malware Don't Need Coffee

McGrew Security Blog

Network Security Podcast

New School Security


NoVA Infosec

Packet Pushers Podcast

Security Affairs

Security Bisto

Security Geeks

Security Musings



Click here to take a Cyber Security Online course for FREE



               



Stock Ticker
 


Subscribe to our Daily Briefs Email



Subscribe to our DAILY BRIEFS to receive
the latest cyberbriefs news by email


Cyberbriefs Archive


Top Users Clicked


Visits to Cyberbriefs
Low                   High

Sunday May 24, 2015

Total number of visitors : 15975
Past 24 hours: 42
Past 31 days: 1300
Past year: 15548



Send Cyber Briefs Suggestions and Tips: