API Evangelist Partners

These are my partners who invest in API Evangelist each month, helping underwrite my research, and making sure I'm able to keep monitoring the API space as I do.

3Scale

3scale makes it easy to open, secure, distribute, control and monetize APIs, that is built with performance, customer control and excellent time-to-value in mind.

Runscope

Runscope is a SaaS-based company that provides solutions for API performance testing, monitoring and debugging.

Tyk

Tyk is an open source API Gateway that is fast, scalable and modern, and offers an API management platform with an API Gateway, API analytics, developer portal and API Management Dashboard.

Restlet

Restlet is providing the fastest and easiest API-First Platform as a Service that developers and non-developers working on API projects can use.

Dreamfactory

DreamFactory Software develops and markets a technology that enables developers to connect modern mobile applications to enterprise back-end infrastructure in the cloud.

Cybersecurity News

These are the news items I've curated in my monitoring of the API space that have some relevance to the terms of service conversation and I wanted to include in my research. I'm using all of these links to better understand how the space is testing their APIs, going beyond just monitoring and understand the details of each request and response.

Title Source Visit
Virginia just decertified its most hackable voting machines (2017-09-08) techcrunch.com
How Facebook Changed the Spy Game (2017-09-08) www.politico.com
Why we can’t trust Facebook’s story about Russian ads (2017-09-08) www.theverge.com
Alleged Equifax hackers demand $2.6 million Bitcoin ransom — or else... (2017-09-08) mashable.com
Cloud Security Hype Fails to Match Deployments (2017-09-08) www.darkreading.com
38% of Attorneys Fail to Disclose Cybersecurity Issues to Board (2017-09-08) www.darkreading.com
Attacking Data Integrity & Hacking Radiation Monitoring Devices (2017-09-08) www.darkreading.com
EU Defense Ministers Conduct First Solo Cyber War Games (2017-09-08) www.infosecurity-magazine.com
Ultrasonic "DolphinAttack" Could Hack Voice Assistants (2017-09-08) www.infosecurity-magazine.com
Hackers Can Use Ultrasounds to Take Control of Alexa, Siri, Cortana, Others (2017-09-07) www.bleepingcomputer.com
Data Integrity: Recovering from Ransomware and Other Destructive Events (2017-09-07) nccoe.nist.gov
Is Public Sector Cybersecurity Adequate? (2017-09-07) www.darkreading.com
Microsoft Programming Error is Behind Dangerous Kernel Bug, Researchers Claim (2017-09-07) kasperskycontenthub.com
Kaspersky IoT Scanner: How to keep your home network and its smart devices safe (2017-09-07) usa.kaspersky.com
SANS: Ransomware is Biggest Threat to Data Security (2017-09-07) www.infosecurity-magazine.com
Apple says its developer service was affected by a bug not a security breach (2017-09-06) techcrunch.com
Hackers send silent commands to speech recognition systems with ultrasound (2017-09-06) techcrunch.com
Apple developer accounts briefly showed Russia addresses due to an Apple bug (2017-09-06) www.theverge.com
Russia bought political ads from Facebook during the election, company says (2017-09-06) www.theverge.com
Facebook says fake accounts linked to Russia bought thousands of ads during US election (FB) (2017-09-06) www.businessinsider.com
IDN Homograph Attack Spreading Betabot Backdoor (2017-09-06) kasperskycontenthub.com
Workplace IoT Puts Companies on Notice for Smarter Security (2017-09-06) www.darkreading.com
Hackers are actively targeting US and European power grids (2017-09-06) www.engadget.com
Universities Targeted by Increasing Phishing & Ransomware Attacks (2017-09-06) duo.com
Electricity Providers Targeted In Massive Hack (2017-09-06) apple.news
U.S. Army halts use of Chinese (2017-08-04) www.reuters.com
Army tells troops to stop using DJI drones immediately, because cyber (2017-08-04) arstechnica.com
News in Networking: DDoS Mitigations and VPNs in China and Russia (2017-08-04) www.kentik.com
Computer law expert says British hacker arrest problematic (2017-08-04) hosted.ap.org
The Hidden Treasure of the Cyber Executive Order (2017-08-04) blogs.cisco.com
Computer law expert says British hacker arrest problematic (2017-08-04) hosted.ap.org
US Army reportedly asks units to stop using DJI drones, citing cybersecurity concerns (2017-08-04) www.theverge.com
What Women in Cybersecurity Really Think About Their Careers (2017-08-04) www.darkreading.com
Russian Botnet Creator Receives 46 (2017-08-04) www.darkreading.com
Women in Cybersecurity: Less than Half Have IT Background (2017-08-04) www.infosecurity-magazine.com
Infosec Pros: AI Could Soon Be Used Against Us (2017-08-04) www.infosecurity-magazine.com
The perps behind the 'biggest ransomware attack ever' appear to be moving their loot (2017-08-03) mashable.com
Hacker who helped stop global cyberattack arrested in US (2017-08-03) hosted.ap.org
WannaCry 'Kill Switch' Creator Arrested in Vegas (2017-08-03) www.darkreading.com
FBI arrests UK security researcher who stopped WannaCry outbreak (2017-08-03) www.engadget.com
WannaCry Bitcoin Withdrawn; ‘Killswitch’ Researcher Detained in Nevada (2017-08-03) kasperskycontenthub.com
The security researcher who stopped the WannaCry attack has been arrested for allegedly creating a different malware (2017-08-03) www.businessinsider.com
Global Wannacry payout: $140,000 (2017-08-03) boingboing.net
Why Cybersecurity Needs a Human in the Loop (2017-08-03) www.darkreading.com
4chan hackers take over city billboard to broadcast hate memes (2017-08-03) mashable.com
Malicious SSL Traffic Doubles in Six Months (2017-08-03) www.infosecurity-magazine.com
New Web tool tracks Russian “influence ops” on Twitter (2017-08-02) arstechnica.com
Man used DDoS attacks on media to extort them to remove stories, FBI says (2017-08-02) arstechnica.com
Let’s free your analysts (2017-08-02) jask.ai
Staying in Front of Cybersecurity Innovation (2017-08-02) www.darkreading.com
Cloud Security Fears Center on Data Protection (2017-08-02) www.infosecurity-magazine.com
Hacking industrial robots (2017-08-02) usa.kaspersky.com
Baltimore police commissioner orders cops not to stage body cam footage (2017-08-01) arstechnica.com
Legislation Proposed to Secure Connected IoT Devices (2017-08-01) kasperskycontenthub.com
New Bill Seeks Basic IoT Security Standards (2017-08-01) krebsonsecurity.com
US Senators Propose IoT Security Legislation (2017-08-01) www.darkreading.com
Greg Martin: Security operations is broken, and AI can fix it (2017-08-01) jask.ai
Pharmaceutical Giant Still Feeling NotPetya’s Sting (2017-08-01) kasperskycontenthub.com
SMBs Are Ignoring the Ransomware Threat (2017-08-01) www.infosecurity-magazine.com
Hackers rickrolled a voting machine at DefCon 2017 (2017-07-31) thenextweb.com
FCC says sharing DDoS attack details undermines security (2017-07-31) www.engadget.com
Voting Machines Hacked with Ease at DEF CON (2017-07-31) kasperskycontenthub.com
International Threat Intelligence and Info (2017-07-31) www.infosecurity-magazine.com
FCC says its specific plan to stop DDoS attacks must remain secret (2017-07-31) arstechnica.com
Defcon vote (2017-07-30) boingboing.net
Congress looks into government agencies' deals with Kaspersky (2017-07-29) www.engadget.com
Alleged Russian hacker's arrest caps long cybercrime career (2017-07-29) hosted.ap.org
Suspended Sentence for Mirai Botmaster Daniel Kaye (2017-07-28) krebsonsecurity.com
Lethal Dosage of Cybercrime: Hacking the IV Pump (2017-07-28) www.darkreading.com
North Korea Turns Cyber (2017-07-28) www.infosecurity-magazine.com
Global Operation Ends in Arrest of US DDoS Suspect (2017-07-28) www.infosecurity-magazine.com
ShadowBrokers Remain an Enigma (2017-07-27) kasperskycontenthub.com
Gas Pump Skimmer Sends Card Data Via Text (2017-07-27) krebsonsecurity.com
Russian Indicted on $4bn Bitcoin Money Laundering Charges (2017-07-27) www.infosecurity-magazine.com
The Threat (2017-07-26) www.infosecurity-magazine.com
DDoS Attacks Could Disrupt Brexit Negotiations (2017-07-26) www.infosecurity-magazine.com
Facebook Offers $1 Million for New Security Defenses (2017-07-26) www.darkreading.com
Car Wash Hack Can Strike Vehicle, Trap Passengers, Douse Them With Water (2017-07-26) motherboard.vice.com
Officials arrest suspect in $4 billion Bitcoin money laundering scheme (2017-07-26) arstechnica.com
KL AV for Free. Secure the Whole World Will Be. (2017-07-26) usa.kaspersky.com
10 Critical Steps to Create a Culture of Cybersecurity (2017-07-26) www.darkreading.com
Explainer: Bitcoin mining (2017-07-26) usa.kaspersky.com
Iranian Cyber Espionage Group CopyKittens Successful, But Not Skilled (2017-07-25) www.darkreading.com
UPS store stops printing from URLs and USB sticks ahead of Def Con hacking convention (2017-07-25) www.theverge.com
Cybersecurity Pioneer Bricata Raises $8 Million in Series A Led by Edison Partners (2017-07-25) www.bricata.com
How dangerous are the threat of kill chain attacks on IoT? (2017-07-24) readwrite.com
From hacked casino fish tanks to malicious links, cybersecurity threats are everywhere — and startups are raking in the dough (2017-07-24) www.businessinsider.com
Hacker Admits to Mirai Attack Against Deutsche Telekom (2017-07-24) kasperskycontenthub.com
New Form of Cyber (2017-07-24) www.infosecurity-magazine.com
The ultimate plain English guide to cybersecurity buzzwords (2017-07-24) thenextweb.com
Russian Underground Launches Online Courses in Card Fraud (2017-07-24) www.infosecurity-magazine.com
U.S. government suggested this Russian software was unsafe to use. But local governments are still using it. (2017-07-23) www.washingtonpost.com
Microsoft uses domain names in legal battle against Russian hackers (2017-07-21) thenextweb.com
Senator blasts FCC for refusing to provide DDoS analysis (2017-07-21) arstechnica.com
Global network of ‘hunters’ aim to take down terrorists on the internet (2017-07-21) thegovlab.org
Microsoft Sues Putin's Hacking Cyberspies (2017-07-21) www.infosecurity-magazine.com
Threat Round (2017-07-21) blogs.cisco.com
API Hooking – Evading Detection with Stealthy Techniques (2017-07-21) www.infosecurity-magazine.com
Microsoft is waging a quiet war against elite Russian hackers (2017-07-21) www.engadget.com
Cisco Warns of Coming “Destruction of Service” Attacks (2017-07-21) www.infosecurity-magazine.com
Cops wage psychological warfare against online drug bazaars (2017-07-20) hosted.ap.org
Microsoft is quietly fighting a clever war against Russian hacking group Fancy Bear (2017-07-20) techcrunch.com
Russian man who helped create notorious malware sentenced to 5 years (2017-07-19) arstechnica.com
Russian man who helped develop Citadel malware gets 5 years (2017-07-19) hosted.ap.org
China and Russia could cripple the US with a space attack, but the US is pushing back (2017-07-18) www.businessinsider.com
CoinDash Hacked During its ICO (2017-07-18) kasperskycontenthub.com
Devil's Ivy Open (2017-07-18) www.infosecurity-magazine.com
Leaked memo says hackers may have compromised UK power plants (2017-07-18) www.engadget.com
The US is reportedly close to separating military (2017-07-18) www.theverge.com
Experts in Lather Over ‘gSOAP’ Security Flaw (2017-07-18) krebsonsecurity.com
IoT Security Incidents Rampant and Costly (2017-07-18) www.darkreading.com
Welp, even ships are hackable now (2017-07-18) thenextweb.com
FBI: IoT Toys Could Present a Privacy and Safety Risk (2017-07-18) www.infosecurity-magazine.com
It only took hackers 3 minutes to steal $7 million worth of Ether (2017-07-17) mashable.com
oasis (2017-07-17) github.com
FedEx still working on recovery from cyberattack at TNT unit (2017-07-17) hosted.ap.org
FedEx still working on recovery from cyberattack at TNT unit (2017-07-17) hosted.ap.org
For Women in Cybersecurity, Possibilities are Endless (2017-07-17) blogs.cisco.com
Report: Cyber (2017-07-17) thenextweb.com
#cloudchat Recap: The Future of Cybersecurity (2017-07-17) blog.rackspace.com
US to create independent military cyber command (2017-07-17) hosted.ap.org
Kaspersky in the crosshairs (2017-07-14) www.engadget.com
NemucodAES Ransomware, Kovter Click (2017-07-14) kasperskycontenthub.com
AsTech Offers a $5 Million Security Breach Warranty (2017-07-14) www.darkreading.com
Singapore wants ethical hackers to get a license, or else (2017-07-14) thenextweb.com
The Dark Side: How Hackers are Manipulating Our World (2017-07-14) developers.redhat.com
WikiLeaks Reveals CIA Tool Acting as SMS Proxy on Android (2017-07-14) www.infosecurity-magazine.com
Study: Backdoors Found on 73% of Compromised Websites (2017-07-13) www.darkreading.com
Hackers can take a hidden test to become mid (2017-07-13) www.businessinsider.com
Attackers Using Automated Scans to Takeover WordPress Installs (2017-07-13) kasperskycontenthub.com
US Voters Consider Russia the Largest Security Risk to Elections (2017-07-13) www.darkreading.com
Thieves Used Infrared to Pull Data from ATM ‘Insert Skimmers’ (2017-07-13) krebsonsecurity.com
Experts Warn Too Often AWS S3 Buckets Are Misconfigured, Leak Data (2017-07-13) kasperskycontenthub.com
Cyberwarfare has taken a new turn. Yes, it's time to worry. (2017-07-13) www.washingtonpost.com
UK Government to Invest £21m in NHS Cybersecurity (2017-07-13) www.infosecurity-magazine.com
Fears Over Election Hacking May Keep a Quarter of US Voters Home in Midterms (2017-07-12) www.infosecurity-magazine.com
‘GoldenEye’ Movie Quote Leads to Decryption Key for Petya Ransomware (2017-07-12) continuum.cisco.com
Miscreants have been pillaging credit cards from Trump Hotels’ booking system (2017-07-12) arstechnica.com
US Government Limits Purchase of Kaspersky Lab Software (2017-07-12) www.darkreading.com
US government removes Kaspersky from approved vendors list (2017-07-12) www.engadget.com
Apple builds data center to obey Chinese cybersecurity rules (2017-07-12) www.engadget.com
New SQL Injection Tool Makes Attacks Possible from a Smartphone (2017-07-12) www.darkreading.com
Election (In)Security: 1 in 4 Voters May Skip 2018 Midterm Elections Over Hacking Fears (2017-07-12) www.carbonblack.com
Web App Vulnerabilities Decline 25% in 12 Months (2017-07-11) www.darkreading.com
Telegram (2017-07-11) kasperskycontenthub.com
Energy, Nuclear Targeted with Template Injection Attacks (2017-07-10) kasperskycontenthub.com
Cybercriminal with Ties to Exclusive Russian Hacking Forums Sentenced to Prison (2017-07-10) www.darkreading.com
International Investigatory Group Also Target of Government Spyware (2017-07-10) kasperskycontenthub.com
Trump throws cold water on forming 'impenetrable Cyber Security unit' with Russia hours after tweeting about the possibility (2017-07-09) www.businessinsider.com
Lawmakers bewildered by Trump’s suggestion of forming a ‘Cyber Security unit’ with Russia (2017-07-09) www.washingtonpost.com
Trump vows to work ‘constructively with Russia’ after Putin denied election hacking (2017-07-09) www.washingtonpost.com
Nuclear facility hacks remain fairly superficial for now, say DHS and FBI (2017-07-07) techcrunch.com
Hackers targeted U.S. nuclear plants using ... fake Microsoft Word résumés (2017-07-07) mashable.com
IRS to Launch Educational Phishing Series (2017-07-07) www.darkreading.com
Decryption Key to Original Petya Ransomware Released (2017-07-07) kasperskycontenthub.com
Russian hackers target the US nuclear industry (2017-07-07) www.engadget.com
FBI (2017-07-06) arstechnica.com
Hackers are targeting nuclear power plant operators in the US (2017-07-06) www.theverge.com
Hacking the State of the ISIS Cyber Caliphate (2017-07-06) www.darkreading.com
CopyCat Malware Infected 14M Android Devices, Rooted 8M, in 2016 (2017-07-06) kasperskycontenthub.com
Black Hat Survey: Security Pros Expect Major Breaches in Next Two Years (2017-07-06) www.darkreading.com
The Growing Danger of IP Theft and Cyber Extortion (2017-07-06) www.darkreading.com
Quiz: How much do you know about DDoS? (2017-07-06) usblog.kaspersky.com
Researchers demonstrate attack for pwning entire wind (2017-07-05) boingboing.net
Two charged with running hacking service used in ‘major computer intrusions’ of U.S. businesses (2017-07-05) www.washingtonpost.com
Alleged hackers behind NotPetya cyberattack demand $260,000 bitcoin ransom (2017-07-05) mashable.com
'Crackas With Attitude' Hacker Sentenced for Targeting Government Officials (2017-07-05) www.darkreading.com
Petya ransomware authors demand $250,000 in first public statement since the attack (2017-07-05) www.theverge.com
Ukraine: Russian security services were behind cyberattack (2017-07-01) hosted.ap.org
Ukraine: Russian security services were behind cyberattack (2017-07-01) hosted.ap.org
Ukraine: Russian security services were behind cyberattack (2017-07-01) hosted.ap.org
Ukraine alleges Russian security services behind cyberattack (2017-07-01) hosted.ap.org
Ukraine alleges Russian security services behind cyberattack (2017-07-01) hosted.ap.org
Ukraine alleges Russian security services behind cyberattack (2017-07-01) hosted.ap.org
The hot new cyberattack that's sweeping the nation (2017-06-30) www.engadget.com
Thousands of Security Experts Work Together to Collectively Combat Petya / NotPetya Ransomware Attack (2017-06-30) www.carbonblack.com
US Tech Companies Argued to Maintain Russia Spy Agency Ties (2017-06-30) www.darkreading.com
NotPetya developers may have obtained NSA exploits weeks before their public leak [Updated] (2017-06-30) arstechnica.com
Barclays UK CEO on cyber security: 'Our vigilance is as high as it can be' (2017-06-29) www.businessinsider.com
Global cyberattack seems intent on havoc, not extortion (2017-06-29) hosted.ap.org
Global cyberattack seems intent on havoc, not extortion (2017-06-29) hosted.ap.org
Decrypting the Motivations Behind NotPetya/ExPetr/GoldenEye (2017-06-29) www.darkreading.com
Russian hackers reportedly discussed how to steal Clinton's emails and transfer them to Michael Flynn (2017-06-29) www.businessinsider.com
Kaspersky Lab Faces More U.S. Scrutiny Over Potential Russian Govt. Influence (2017-06-29) www.darkreading.com
ExPetr Called a Wiper Attack, Not Ransomware (2017-06-29) kasperskycontenthub.com
Windows 10 will try to combat ransomware by locking up your data (2017-06-29) arstechnica.com
Experts: Mexico opposition party targeted by spyware (2017-06-29) hosted.ap.org
Cyberattack may not have been meant to get money (2017-06-29) hosted.ap.org
Cyberattack may not have been meant to get money (2017-06-29) hosted.ap.org
Experts: Mexico opposition party targeted by spyware (2017-06-29) hosted.ap.org
Cyberattack may not have been meant to get money (2017-06-29) hosted.ap.org
Experts: Mexico opposition party targeted by spyware (2017-06-29) hosted.ap.org
Hackers breached a US nuclear power plant's network, and it could be a 'big danger' (2017-06-29) www.businessinsider.com
In aftermath of Petya, congressman asks NSA to stop the attack if it knows how (2017-06-28) techcrunch.com
Analysts think Petya ‘ransomware’ was built for targeted destruction, not profit (2017-06-28) techcrunch.com
$71 Million Restitution Owed for Hacking, Fraud Scheme (2017-06-28) www.darkreading.com
The Petya ransomware is starting to look like a cyberattack in disguise (2017-06-28) www.theverge.com
Ransomware: First WannaCry, now Nyetya (2017-06-28) blogs.cisco.com
Experts encourage more public awareness of Russian meddling (2017-06-28) hosted.ap.org
‘Little Hope’ to Recover Data Lost to Petya Ransomware (2017-06-28) kasperskycontenthub.com
Carbon Black Threat Research Technical Analysis: Petya / NotPetya Ransomware (2017-06-28) www.carbonblack.com
How artificial intelligence is taking on ransomware (2017-06-28) hosted.ap.org
Petya ransomware: the latest news from the global cyberattack (2017-06-28) www.theverge.com
Researchers demonstrate attack for pwning entire wind (2017-06-28) boingboing.net
Half of Ransomware Victims Suffer Repeat Attacks (2017-06-28) www.darkreading.com
Telegram Agrees to Register Messaging App With Russia (2017-06-28) www.darkreading.com
After Cyber Attack, FedEx Halts Trading Of Its Shares Temporarily (2017-06-28) www.darkreading.com
Petya virus is something worse than ransomware, new analysis shows (2017-06-28) www.theverge.com
New Petya / NotPetya / ExPetr ransomware outbreak (2017-06-27) usa.kaspersky.com
Swagger, the API Economy, REST, Linked Data, and a Semantic Web (2017-06-24) medium.com
10 Things I Hate About Your API — Amanda Folson (2017-06-22) medium.com
The Microservice Design Canvas (2017-06-22) www.apiacademy.co
Developing RESTful APIs with Kotlin (2017-06-22) medium.com
Introducing the Chunked Upload API (2017-06-20) medium.com
4 Mantras for Designing Scalable APIs (2017-06-20) nordicapis.com
Twitter API: Cursoring (2017-06-19) medium.com
RESTful Services (2017-06-16) developers.redhat.com
Best Practices for API Error Handling (2017-06-15) nordicapis.com
API design fundamentals: usage driven design (2017-06-14) medium.com
Scenarios v3.3 Update (2017-06-12) medium.com
REST API for Dummies: The Store Metaphor (2017-06-12) medium.com
RESTful Services (2017-06-11) medium.com
The Definitive Guide for building REST APIs (2017-06-10) medium.com
Transclude Preference for the HTTP Prefer Header (2017-06-09) rawgit.com
Amazon API Gateway Enables Customization of Error Responses (2017-06-06) aws.amazon.com
Three Principles of API First Design (2017-06-02) medium.com
REST API Design Tips from Experience (2017-05-30) medium.com
Service (2017-05-30) www.bmc.com
Accordion APIs How (2017-05-30) medium.com
Which wordlist endpoints would be useful for you? — API Developer Community (2017-05-27) forum.oxforddictionaries.com
Recently posted on our blog at www.lunchbadger.com (2017-05-25) medium.com
RFC 3117 (2017-05-25) tools.ietf.org
Robustness principle (2017-05-25) www.wikiwand.com
Why you should follow the robustness principle in your APIs (2017-05-25) engineering.klarna.com
API Lifecycle: Design Stage (Part 2 of 4) (2017-05-24) medium.com
Pagination, Filtering, and Sorting — API Working Group 0.0.1.dev223 documentation (2017-05-23) specs.openstack.org
Sorting — Twitter Developers (2017-05-23) dev.twitter.com
REST API Sorting Paging and Filtering (2017-05-23) www.thrinacia.com
The Resource Groups Tagging API Makes It Easier to List Your Resources by Using a New Pagination Parameter (2017-05-22) aws.amazon.com
The Resource Groups Tagging API Makes It Easier to List Your Resources by Using a New Pagination Parameter (2017-05-22) aws.amazon.com
API Design: Think First, Code Later (2017-05-20) cheesecakelabs.com
The four levels of consistency in API design (2017-05-18) restlet.com
Cyber-attack threat escalating - Europol (2017-05-14) www.bbc.co.uk
Wcry ransomware is reborn without its killswitch, starts spreading anew (2017-05-14) boingboing.net
WanaCrypt0r Hits Worldwide (2017-05-13) www.darkreading.com
Hacking Attack has Security Experts Scrambling to Contain Fallout (2017-05-13) www.nytimes.com
Cyber-attack: Europol says it was unprecedented in scale (2017-05-13) www.bbc.co.uk
Round Two: WannaCry Ransomware That Struck the Globe Is Back (2017-05-13) motherboard.vice.com
Global cyber-attack: Security blogger halts ransomware by accident (2017-05-13) www.bbc.co.uk
Ransomware hackers have stolen hospitals and doctors offices across the UK, using a leaked NSA cyberweapon (2017-05-12) boingboing.net
Theres a global cyberattack happening thats taking down hospitals and telecoms companies (2017-05-12) www.businessinsider.com
The Real Lesson from the WannaCry Ransomware (2017-05-12) www.lawfareblog.com
Theresa May: The massive NHS cyberattack is part of a bigger international attack (2017-05-12) www.businessinsider.com
Own the Routers. Own the Internet. (2017-05-12) www.carbonblack.com
How Does Ransomware Work? (2017-05-12) www.carbonblack.com
Leaked NSA Hacking Tool On Global Ransomware Rampage (2017-05-12) www.techdirt.com
WRAPUP 7-Hackers exploit stolen U.S. spy agency tool to launch global cyberattack (2017-05-12) www.reuters.com
Major cyberattack plunges NHS into chaos, closing hospitals and cancelling operations (2017-05-12) www.businessinsider.com
NHS in England hit by cyber-attack (2017-05-12) www.bbc.co.uk
Even with executive order, U.S. President Trump continues to trip over cybersecurity (2017-05-11) www.accessnow.org
Trump signs long-delayed executive order on cybersecurity (2017-05-11) techcrunch.com
Cybersecurity community lauds executive order (2017-05-11) thehill.com
Trump Issues Previously Delayed Cybersecurity Executive Order (2017-05-11) www.darkreading.com
Intelligence Officials Warn of Continued Russia Cyberthreats (2017-05-11) www.nytimes.com
Yahoo blocking probe into record-setting user-data hacks: German authorities (2017-05-11) www.siliconbeat.com
Trump signs order aimed at upgrading government cyber defenses (2017-05-11) www.reuters.com
Artificial Intelligence: Cybersecurity Friend or Foe? (2017-05-11) www.darkreading.com
U.S. intelligence chiefs say reviewing use of Kaspersky software (2017-05-11) www.reuters.com
Tweet: REST Anti-Patterns https://t.co/EC42OtetFw via @InfoQ (2017-05-10) twitter.com
Oracle API Platform Cloud Enables Customers to Drive Business Transformation and DesignFirst (2017-05-10) www.prnewswire.com
The FCC Claims A DDoS Attack -- Not John Oliver -- Crashed Its Website. But Nobody Seems To Believe Them (2017-05-10) www.techdirt.com
Cisco Patches Leaked 0-day in 300+ Of Its Switches (2017-05-10) www.itsecurityguru.org
US Official Says France Warned About Russian Hacking Before Macron Leak (2017-05-10) www.itsecurityguru.org
Extreme Makeover: AI Network Cybersecurity (2017-05-10) www.darkreading.com
Ask the FCC for proof it was crashed by DDoS -- not outraged Net Neutrality commenters (2017-05-10) boingboing.net
How To Know if The Trump-Russia Story Has Momentum (2017-05-10) fivethirtyeight.com
FTC Launches Cybersecurity Resource Website for SMBs (2017-05-10) www.darkreading.com
State Dept pick: Russian election interference is a ‘profound threat’ (2017-05-09) thehill.com
Trump Goes Full Watergate—and Threatens Russia Investigation (2017-05-09) www.motherjones.com
FCC faced massive DDoS attacks after net neutrality proposal (2017-05-09) disruptiveviews.com
CIA Vault 7 Data Leak, what do we know since now? (2017-05-08) resources.infosecinstitute.com
Putting gRPC multilanguage support to the test (2017-05-08) cloudplatform.googleblog.com
8 Steps to Help Your API be Forward Compatible (2017-05-07) www.programmableweb.com
The two perspectives of API design (2017-05-06) restlet.com
French cybersecurity agency probing Macron hack (2017-05-06) thehill.com
Five key players for Trump on cybersecurity (2017-05-06) thehill.com
Tweet RT restlet The two perspectives of API design by apihandyman httpstcodM5qOjuSkp httpstcoEsquxdyEdn (2017-05-05) twitter.com
Yelp Adds GraphQL Support to Fusion API Introduces Developer Beta Program (2017-05-05) www.programmableweb.com
German Spy Chief Warns Russia Cyber Attacks Aiming To Influence Elections (2017-05-05) www.itsecurityguru.org
Cyberspies tap free tools to make powerful malware framework (2017-05-05) www.pcworld.com
Emmanuel Macrons party says its been hit by "massive" hack (2017-05-05) www.zdnet.com
Symantec says malware attackers are hiding in plain sight (2017-05-05) disruptiveviews.com
Denial Of life: Medical Devices Are At Risk Of Cyber-Attack (2017-05-05) www.cxotoday.com
Cybercrime Roundup: Using Twitter as a Weapon, Copyright Trolling Porn, and Script Kiddies on the Rise (2017-05-05) www.lawfareblog.com
Europe Pumps Out 50% More Cybercrime Attacks Than US (2017-05-04) www.darkreading.com
Forging Voice (2017-05-04) www.schneier.com
The start of 2017 witnessed a 5,000-fold decrease in the world’s largest spam botnet mailings (2017-05-04) www.itsecurityguru.org
Illinois voting records hack didn#039;t target specific records, says IT staff (2017-05-04) thehill.com
Building for Builders Stripe039s 8 Tips for Designing APIs and Supporting Developers (2017-05-04) www.programmableweb.com
REST API Industry Debate OData vs GraphQL vs ORDS (2017-05-03) www.progress.com
The two perspectives of API design (2017-05-03) restlet.com
Security of St. Jude Pacemakers (2017-05-03) www.schneier.com
Little rules for designing with data (2017-05-02) github.com
Personal Security Takes A Hit With Public Release Of NSAs Hacking Toolkit (2017-05-02) www.techdirt.com
Financial Services Sector the #1 Target of Cybercriminals (2017-05-01) www.darkreading.com
API Mediation Why You Need an API Experience Layer (2017-05-01) nordicapis.com
Spending deal boosts funds for DHS office securing cyber infrastructure (2017-05-01) thehill.com
Why We Should Let Our Walls Down When It Comes to Cybersecurity (2017-05-01) community.infoblox.com
Tweet: Dmitry Bogatov, Debian developer and Tor node admin, is still being held in a Moscow jail. https://t.co/s4hRwUvom9 (2017-04-29) twitter.com
Hacker Leaks Episodes From Netflix Show and Threatens Other Networks (2017-04-29) www.nytimes.com
ResourceCentric API Calls Switching Up the Cloud Elements Hubs (2017-04-28) dzone.com
How Is The Cybersecurity Threat Landscape Changing? (2017-04-28) dzone.com
gRPCWeb Moving past RESTJSON towards typesafe Web APIs (2017-04-27) spatialos.improbable.io
The future of DDoS attacks looks scary. Blockchain will protect us (2017-04-27) www.americanbanker.com
Dem senator fears Russian election interference could be ‘normalized’ (2017-04-27) thehill.com
Do New Cybersecurity Regulations Affect You? (2017-04-27) dzone.com
Threat Intelligence Is (Still) Broken: A Cautionary Tale from the Past (2017-04-26) www.darkreading.com
Analyzing Cyber Insurance Policies (2017-04-26) www.schneier.com
What Role Should ISPs Play in Cybersecurity? (2017-04-26) www.darkreading.com
Finance Is a ‘Top Category’ for Global CyberAttacks (2017-04-26) bankinnovation.net
Russia-Linked Hackers Target French Election (2017-04-26) www.pcmag.com
Cyber risks for Industrial environments continue to increase (2017-04-26) resources.infosecinstitute.com
Manage your gRPC APIs with Google Cloud Endpoints (2017-04-26) cloudplatform.googleblog.com
Summarizing requests (2017-04-26) www.apiful.io
Customer Data From Encrypted Phone Company Ciphr Has Been Dumped Online (2017-04-26) motherboard.vice.com
TalkTalk hack attack: Friends admit cyber crime charges (2017-04-26) www.bbc.co.uk
This Is the Evidence Linking Russian Hackers to the French Election (2017-04-26) motherboard.vice.com
In 2017 Cyber Criminals Become More Ambitious Than Ever (2017-04-26) www.cxotoday.com
Tweet 7 Tips for Designing a Better REST API httpstco7QQsjLd33P (2017-04-25) twitter.com
I Got Hacked So You Dont Have To (2017-04-25) www.gq.com
Social-Engineer Toolkit - TrustedSec - Information Security (2017-04-25) www.trustedsec.com
What is the difference between API Design and API Architecture APIUniversity (2017-04-25) api-university.com
Preventing Skynet: Securing robotic and IoT devices (2017-04-25) www.scmagazine.com
INTERPOL Operation Sweeps Up Thousands of Cybercrime Servers Used for Ransomware, DDoS, Spam (2017-04-25) www.darkreading.com
Hackers in the Skies: How Drones are the New Weapon for Espionage and Data Hacking (2017-04-25) www.dedrone.com
Web Attacks Decline, Ransomware Attacks Surge (2017-04-25) www.darkreading.com
BrickerBot is a vigilante worm that destroys insecure IoT devices (2017-04-25) techcrunch.com
Brickerbot is mysterious antimalware that nukes badly secured Internet of Shit gadgets (2017-04-25) boingboing.net
Introducing ProtocolOriented BDD in Swift for iOS Apps Part 1 (2017-04-25) dzone.com
xDedic Marketplace Data Spells Danger for Businesses (2017-04-25) www.darkreading.com
Deliveroo API Design Guidelines added to the API Stylebook (2017-04-25) apihandyman.io
Hyundai mobile app exposed cars to high-tech thieves: researchers (2017-04-25) www.reuters.com
GOP senator pushes for clean reauthorization of foreign intel law (2017-04-24) thehill.com
GOP senator hits back at criticism of Russia probe (2017-04-24) thehill.com
Why the Wikileaks CIA dump was the most damaging one yet (2017-04-23) techcrunch.com
Cyber threats are growing more serious, and artificial intelligence could be the key to security (2017-04-22) www.cnbc.com
Five questions for the House#039;s new Russia investigator (2017-04-22) thehill.com
Report: Young Adults Drawn to Life of Cyber Crime (2017-04-22) www.pcmag.com
NYT: Russian hack didn#039;t immediately raise alarms with FBI (2017-04-22) thehill.com
Free Hacking Tools ‘Help Young into Cyber-crime’ (2017-04-21) www.itsecurityguru.org
Script Kiddies Pwn 1000s of Windows Boxes Using Leaked NSA Hack Tools (2017-04-21) www.itsecurityguru.org
Study Reveals Our Vulnerabilities to Repeat Cyberattacks (2017-04-21) dzone.com
Donald Trump Misses his Own Cyber Security Plan Deadline After Promising to Deliver in 90 days (2017-04-21) www.itsecurityguru.org
Russian Hacker Sentenced to 27 Years in Credit Card Case (2017-04-21) www.nytimes.com
WikiLeaks docs detail UK role in developing CIA#039;s TV hacking malware (2017-04-21) thehill.com
Using field masks with update requests to Google APIs (2017-04-21) gsuite-developers.googleblog.com
Cybersecurity is an incurable disease, it’s time we thought of it that way (2017-04-21) gigaom.com
British army creates team of Facebook warriors (2017-04-20) www.theguardian.com
7 Tips for Designing a Better REST API (2017-04-20) www.kennethlange.com
SOAP vs REST A Look at Two Different API Styles (2017-04-20) www.business2community.com
Over One-Third of CyberAttacks Against FIs Are Successful (2017-04-20) bankinnovation.net
Half of UK businesses hit by Cyber Attack (2017-04-20) www.itsecurityguru.org
Share of Democrats calling Russia ‘greatest danger’ to U.S. is at its highest since end of Cold War (2017-04-20) www.pewresearch.org
Hackers use old Stuxnet-related bug to carry out attacks (2017-04-20) www.pcworld.com
The DEA Is Buying Cyberweapons from Hacking Team (2017-04-20) www.schneier.com
30,000 London Gun Owners Hit by Met Police ‘Data Breach’ (2017-04-20) www.itsecurityguru.org
Is Protobuf 5x Faster Than JSON Part 2 (2017-04-20) dzone.com
Skype is the number one communication choice among cybercriminals (2017-04-20) thenextweb.com
Air Mozilla: American Spies: Modern Surveillance and What We Can Do Speaker: Jennifer Granick (2017-04-20) cyberlaw.stanford.edu
The Justice Department is reconsidering charges against Julian Assange and Wikileaks (2017-04-20) www.theverge.com
Wyden pushing to mandate #039;basic cybersecurity#039; for Senate (2017-04-20) thehill.com
Trump may miss deadline on Russia report (2017-04-20) thehill.com
What is Threat Hunting? (2017-04-19) www.carbonblack.com
Building an API lessons learned the hard way part 2 (2017-04-19) medium.com
The Architecture of the Web Is Unsafe for Todays World (2017-04-19) www.darkreading.com
ISC2 Issues White House Cybersecurity Executive Order Recommendations (2017-04-19) www.darkreading.com
Schiff advocates for NSA, Cyber Command split (2017-04-19) thehill.com
Microservices APIs and Swagger How They Fit Together (2017-04-19) dzone.com
The Cyber Threat(s) Facing Cinemas (2017-04-19) celluloidjunkie.com
Cybercrime Tactics Techniques: Q1 2017 (2017-04-18) www.darkreading.com
Corsa Strives to Combat Growing Volumetric DDoS Attacks (2017-04-18) gigaom.com
The Password to the Latest NSA Leak Is a 4chan Meme (2017-04-18) motherboard.vice.com
CISOs, Board Members Have Widely Divergent Views on Cybersecurity (2017-04-18) www.darkreading.com
Five reasons to worry about the ShadowBrokers hack (2017-04-18) thehill.com
Intrusion Suppression: Transforming Castles into Prisons (2017-04-18) www.darkreading.com
At $175, this ransomware service is a boon to cybercriminals (2017-04-18) www.pcworld.com
Microsoft patched NSA hack Windows flaws before leak (2017-04-17) www.bbc.co.uk
Exorcists Tried to Purge the NSA of Its Demons in Manhattan This Weekend (2017-04-17) motherboard.vice.com
NSA hacks into SWIFT; Wells board faces the voters (2017-04-17) www.americanbanker.com
Surveillance and our Insecure Infrastructure (2017-04-17) www.schneier.com
The New Shadow Brokers Leak Connects the NSA to the Stuxnet Cyber Weapon Used on Iran (2017-04-17) motherboard.vice.com
Researchers Warn of Phishing Sites using Unicode and Homograph URLs (2017-04-17) continuum.cisco.com
Microsoft has already patched the NSAs leaked Windows hacks (2017-04-15) www.theverge.com
Hacker documents show NSA tools for breaching global money transfer system (2017-04-15) www.reuters.com
We Can Calm Down: Microsoft Already Patched Most of the Shadow Brokers Exploits (2017-04-15) motherboard.vice.com
Microsoft says exploits leaked by Shadow Brokers were addressed by prior patches (2017-04-15) techcrunch.com
Tweet: #CIA and #NSA first sought to exploit commercial databases in mid-80s https://t.co/TbeBZZfv7Y by @NatSecGeek https://t.co/dRb26l1Sbu (2017-04-14) twitter.com
The Shadow Brokers are back with exploits for Windows and global banking systems (2017-04-14) techcrunch.com
Hackers release files indicating NSA monitored global bank transfers (2017-04-14) www.reuters.com
NSA may have hacked banking transactions network (2017-04-14) thehill.com
Battle intensifies between Trump’s CIA, WikiLeaks (2017-04-14) thehill.com
DHS head: North Korea more of a cyber threat (2017-04-14) thehill.com
Shadow Brokers Redux: Dump of NSA Tools Gets Even Worse (2017-04-14) www.lawfareblog.com
Your Governments Hacking Tools Are Not Safe (2017-04-14) motherboard.vice.com
The Latest Dump of Alleged NSA Tools Is ‘The Worst Thing Since Snowden’ (2017-04-14) motherboard.vice.com
Alleged NSA Victim Denies Hackers Ever Broke In (2017-04-14) motherboard.vice.com
Engineer Arrested for Attempted Theft of Trade Secrets (2017-04-14) www.darkreading.com
Leak suggests NSA was interested in hacking Middle Eastern banks (2017-04-14) thehill.com
Former Trump Adviser Cant Recall If He Discussed Sanctions With Russians (2017-04-13) www.motherjones.com
Simplicity Utility x Data Success (2017-04-13) blog.mparticle.com
CIA head: WikiLeaks a #039;non-state hostile intelligence service#039; (2017-04-13) thehill.com
IoT Devices Are Powering Affordable DDoS-for-Hire Services (2017-04-13) www.itsecurityguru.org
Callisto Group hackers targeted Foreign Office data (2017-04-13) www.bbc.co.uk
How Trump Can Show Us Whether He Was Spied On (2017-04-13) www.aclu.org
The CIA is really, really mad at WikiLeaks (2017-04-13) techcrunch.com
SAP Cyber Threat Intelligence Report for April 2017 (2017-04-13) dzone.com
Report: #039;Callisto#039; cyberespionage targeting Eastern Europe (2017-04-13) thehill.com
UK lawmakers: Cyberattack may have brought down voter registration site (2017-04-13) thehill.com
Tweet Materia v07 is now available httpstcooPDC7PPxXt User Management Addon SendGrid ampamp mailjet Addons Permissions management (2017-04-12) twitter.com
Cyber breaches have cost shareholders billions since 2013: report (2017-04-12) www.reuters.com
BrickerBot Permanent Denial-of-Service Attack (2017-04-12) ics-cert.us-cert.gov
Brexit referendum website might have been hacked: UK lawmakers (2017-04-12) www.reuters.com
Cybersecurity in Trump’s Era (2017-04-12) resources.infosecinstitute.com
US, Europe Partner to Counter ‘Fake News’ and Cyberattacks (2017-04-12) www.itsecurityguru.org
Hacker sounds Dallas weather sirens for 95 minutes (2017-04-12) americancityandcounty.com
Restlet Studio Supports RAML 10 API Specification (2017-04-12) www.programmableweb.com
German, Israeli companies to cooperate on cybersecurity (2017-04-12) www.reuters.com
FBI got secret court order in mid-2016 to monitor Carter Page as part of Russia-Trump probe (2017-04-11) boingboing.net
Law Enforcement Ends Kelihos Botnet’s 7-Year Operation (2017-04-11) continuum.cisco.com
When Hacks Are about Image instead of Money (2017-04-11) www.darkreading.com
Kelihos Botnet Mastermind Arrested, DOJ Begins Takedown (2017-04-11) www.pcmag.com
Computer Engineer Charged with Theft of Proprietary Computer Code (2017-04-11) www.darkreading.com
Budget woes hinder US cybersecurity buildup (2017-04-11) thehill.com
Angry Shadow Brokers Release Password for Suspected NSA Hacking Tools (2017-04-10) www.itsecurityguru.org
US dismantles Kelihos botnet after Russian hackers arrest (2017-04-10) www.pcworld.com
U.S. targets spam botnet after Russian arrested in Spain (2017-04-10) www.reuters.com
Hoover Book Soiree: Privacy Power: A Transatlantic Dialogue in the Shadow of the NSA-Affair (2017-04-10) www.lawfareblog.com
NSA malware released by Shadow Brokers hacker group (2017-04-10) www.bbc.co.uk
Fourth WikiLeaks CIA Attack Tool Dump (2017-04-10) www.schneier.com
The 5 Basic API Design Paradigms (2017-04-10) blog.cloudobjects.io
Hackers Set Off Dallas 156 Warning Sirens Dozens Of Times (2017-04-10) www.techdirt.com
Extradition Hearing Expected Soon for Alleged LinkedIn, DropBox Hacker (2017-04-10) www.darkreading.com
RiskIQ: Tools to Improve Cyber- Situational Understanding in DoD (2017-04-09) ctovision.com
Alleged Spam King Pyotr Levashov Arrested (2017-04-09) krebsonsecurity.com
Hacking Attack Woke Up Dallas With Emergency Sirens, Officials Say (2017-04-08) www.nytimes.com
Theyre Back: The Shadow Brokers Release More Alleged Exploits (2017-04-08) motherboard.vice.com
Environments | Free Full-Text | From Open Data to Open Analyses—New... (2017-04-08) www.mdpi.com
WikiLeaks CIA trove more smoke than fire, experts say (2017-04-08) thehill.com
‘Evidence of Chinese Spying’ Uncovered on Eve of Trump-Xi Summit (2017-04-07) www.itsecurityguru.org
API Design Standards With Andy Beier (2017-04-07) businessintelligence.com
Of Course there’s Evidence Trump Colluded with Russian Intelligence (2017-04-07) www.lawfareblog.com
McConnell #039;open#039; to new Russia sanctions (2017-04-07) thehill.com
Commonwealth Cybersecurity Compliance to be Probed by Parliamentary Committee (2017-04-07) www.itsecurityguru.org
Senators offer bill to boost police training in cyber crime (2017-04-07) thehill.com
How to Crack Cybersecuritys Glass Ceiling (2017-04-06) www.darkreading.com
North Korean Hackers Accessed ‘War Plans’ Detailing US Military Response to Conflict (2017-04-06) www.itsecurityguru.org
ALM Rest API posting design steps (2017-04-06) community.hpe.com
Dems ask Treasury chief for cyber briefing (2017-04-06) thehill.com
Commodity Ransomware Is Here (2017-04-06) www.darkreading.com
Suspected Chinese Malware Found On U.S. Trade Group Website (2017-04-06) spectrum.ieee.org
You should not try to normalise the vocabulary across all Bounded Contexts pcalcado (2017-04-05) philcalcado.com
7 Tips for Developing Great APIs (2017-04-05) www.designnews.com
Kim Jong-un’s ‘Hackers Target Banks in up to 18 Countries for Cash to Spend on North Korea’s Terrifying Nuclear Programme’ (2017-04-05) www.itsecurityguru.org
Using field masks with Google APIs for partial response (2017-04-05) developers.googleblog.com
Smart TVs Could Succumb to Remote Hacks (2017-04-04) www.pcmag.com
Honeywell Launches Industrial Cyber Security Solution (2017-04-04) www.remotemagazine.com
New Regulations Appear To Authorize Chinese Law Enforcement To Hack Into Computers Anywhere In The World (2017-04-04) www.techdirt.com
API Design on the Scale of Decades (2017-04-04) nordicapis.com
This Highly Sophisticated Malware Is Once Again Targeting the Korean Government (2017-04-04) continuum.cisco.com
Sex toy with in-built camera can be easily hacked (2017-04-04) www.bbc.co.uk
AIG Rolls Out Policy for Cyberthreat Coverage (2017-04-04) www.darkreading.com
Cybercriminals Seized Control of Brazilian Bank for 5 Hours (2017-04-04) www.darkreading.com
Acoustic Attack Against Accelerometers (2017-04-04) www.schneier.com
CIA operations may be disrupted by new Wikileaks data release (2017-04-03) www.bbc.co.uk
Cyber-security Report Shows Increase in Threat to Servers (2017-03-29) www.itsecurityguru.org
Kaspersky warns lights could go out (2017-03-24) www.itsecurityguru.org
NSA Official Says It Might Have Been Nice If The Agency Had Handled The Public Disclosure Of The Section 215 Program (2017-03-24) www.techdirt.com
Apple: Latest alleged CIA hacks of iPhones and Macs are old, fixed (2017-03-24) www.siliconbeat.com
Apple: Mac, iPhone Bugs That CIA Allegedly Exploited Were Fixed Years Ago (2017-03-24) www.darkreading.com
The Long, Twisted, and Bizarre History of the Trump-Russia Scandal (2017-03-24) www.motherjones.com
WikiLeaks publishes CIA hacking tactics for Apple products (2017-03-23) thehill.com
Quality of Life Data, 2017 IT Spending, Cybersecurity, More (2017-03-23) socrata.com
WikiLeaks’ New Dump Shows How The CIA Allegedly Hacked Macs and iPhones Almost a Decade Ago (2017-03-23) motherboard.vice.com
Chamber of Commerce urges Trump to get business input for cyber strategy (2017-03-23) thehill.com
Russian Man Pleads Guilty for Role in Citadel Malware Attacks (2017-03-23) www.darkreading.com
Prosecutors could implicate North Korea in NY Fed cyber bank heist: report (2017-03-23) thehill.com
API design for machine learning software experiences from the scikitlearn project (2017-03-22) arxiv.org
North Korea Said to Be Target of Inquiry Over $81 Million Cyberheist (2017-03-22) www.nytimes.com
International Law and Deterring Cyber-Attacks (2017-03-22) www.lawfareblog.com
BigCommerce uses Postman before a single line of code is written (2017-03-21) blog.getpostman.com
A Court Will Decide if a GIF Can Be Considered a ‘Deadly Weapon (2017-03-21) motherboard.vice.com
UPDATE 1-Russian foreign ministry says neither confirms nor denies Tillerson visit (2017-03-21) www.reuters.com
Royal Navy to hold biggest cyber war games (2017-03-21) www.bbc.co.uk
Cybersecurity: Russia pushes back on Intel hearing (2017-03-21) thehill.com
The CIA’s New Guidelines Governing Publicly Available Information (2017-03-21) www.lawfareblog.com
RESTful SNMP Over HTTP Part II (2017-03-20) dzone.com
RESTful SNMP Over HTTP Part III (2017-03-20) dzone.com
The FBI Has Been Investigating Trump’s Russia Ties Since July (2017-03-20) www.wired.com
FBI confirms investigation into possible Russian ties to Trump campaign (2017-03-20) www.theverge.com
Introducing Muon (2017-03-18) daviddawson.me
US man held for sending flashing tweet to epileptic writer (2017-03-18) www.bbc.co.uk
Mike Flynn paid by Russia’s top cybersecurity firm while he still had top-secret-level security clearance (2017-03-17) www.itsecurityguru.org
Judge Grants Search Warrant Demanding Info On Everyone Who Searched For A Certain Persons Name (2017-03-17) www.techdirt.com
One Billion Yahoo Accounts Still for Sale, Despite Hacking Indictments (2017-03-17) www.nytimes.com
Trump Budget Adds $61 Million for FBI Cybercrime-Fighting Efforts (2017-03-17) www.darkreading.com
The rise of Cyber Insurance: The good and the bad (2017-03-17) www.itsecurityguru.org
WikiLeaks Won’t Tell Tech Companies How to Patch CIA Zero-Days Until Its Demands Are Met (2017-03-17) motherboard.vice.com
Lawmakers call on federal government to clearly define cyber war (2017-03-17) thehill.com
North Koreas Lazarus Likely Behind New Wave of Cyberattacks (2017-03-17) www.darkreading.com
Bits: Tech Roundup: Portrait of a Russian Hacker (2017-03-17) www.nytimes.com
A Tweet to Kurt Eichenwald, a Strobe and a Seizure. Now, an Arrest. (2017-03-17) www.nytimes.com
Trump’s budget proposal gives DHS $1.5 billion for cybersecurity (2017-03-16) thehill.com
Secure Cloudlink warns public sector must demonstrate extreme diligence when approaching the cyber threat landscape (2017-03-16) www.itsecurityguru.org
A Nice API Design Gem Strategy Pattern With Lambdas (2017-03-16) blog.jooq.org
Kaspersky Lab paid former national security adviser more than $10,000 (2017-03-16) techcrunch.com
Ethical Hacking: The Most Important Job No One Talks About (2017-03-16) www.darkreading.com
Sound Waves Used to Hack Common Data Sensors (2017-03-16) www.darkreading.com
Once Again, Senator Wyden Wants To Know How Many Americans Are Being Surveilled By The NSA (2017-03-16) www.techdirt.com
Russian security officers charged in Yahoo hack (2017-03-15) thehill.com
Justice Dept. to charge 2 Russian spies and 2 criminal hackers with 2014 Yahoo breach of 500 million accounts (2017-03-15) boingboing.net
FBI Director Comey to brief top senators on Russia Wednesday (2017-03-15) thehill.com
Russian Spies Helped Hack Yahoo, as if Tensions Weren’t High Enough (2017-03-15) www.wired.com
Google shuts down massive Android ad fraud botnet Chamois (2017-03-15) www.itsecurityguru.org
US charges Russian spies over Yahoo breach (2017-03-15) www.bbc.co.uk
Trump administration to score agencies on cybersecurity (2017-03-15) thehill.com
WikiLeaks help fixing CIA exploits illegal, but unlikely to be prosecuted (2017-03-15) thehill.com
Attackers Leverage Excel, PowerShell and DNS in Latest Non-Malware Attack (2017-03-15) www.carbonblack.com
White House to bring on NSA hacker to NSC (2017-03-15) thehill.com
U.S. indicts Russian spies, hackers over massive Yahoo hack: source (2017-03-15) www.reuters.com
Yahoo data breaches: Suspects linked to Russian government will be indicted, report says (2017-03-14) www.siliconbeat.com
Step 6: Integrate Your Cybersecurity Tools and Systems (2017-03-14) www.threatconnect.com
Researchers Find 36 Android Phones Shipping with Malware Embedded (2017-03-14) continuum.cisco.com
Report: Europol Investigating 5,000 Organized Crime Rings in 180 Countries (2017-03-14) continuum.cisco.com
Convicted CIA Leaker John Kiriakou’s Got Some Opinions About WikiLeaks and Trump (2017-03-14) www.wired.com
Cyber security: Experts warn on rise of hacker ransoms (2017-03-14) www.bbc.co.uk
Infographic: Slow and steady will not win the cybersecurity race (2017-03-14) blog.cloudpassage.com
Wikileaks in contact with manufacturers on CIA security risks (2017-03-14) thehill.com
96 Percent of IT Security Professionals Expect an Increase in Cybersecurity Attacks on Industrial Internet of Things (2017-03-14) www.itsecurityguru.org
RiskIQ Data Sets: Powering Threat Investigations Around the World (2017-03-14) www.riskiq.com
The new cyber security ecosystem (2017-03-14) www.itsecurityguru.org
U.S. plans to indict Yahoo hack suspects, report says theyre tied to Russia (2017-03-14) boingboing.net
Justice Department to announce indictments in massive Yahoo hack: source (2017-03-14) www.reuters.com
Trump And Congress Complain About Surveillance, But Want to Enable Spying By Internet Companies (2017-03-14) www.aclu.org
Lawmakers eye cyber help for states (2017-03-14) thehill.com
Sir Tim Berners-Lee warns of the threats to today’s web (2017-03-13) techcrunch.com
The CIAs Development Tradecraft DOs and DONTs (2017-03-13) www.schneier.com
Some confusing language in the 0day debate (2017-03-11) blog.erratasec.com
Tweet: Thirty years ago, the #CIA and the #NSA had a meeting that changed national #cybersecurity https://t.co/uoshgjc9Ki https://t.co/X3ArM9tkoq (2017-03-10) twitter.com
Dems urge Trump to enact #039;tough and smart#039; cyber policy (2017-03-10) thehill.com
Stockpiling 0-Day Bugs Not So Dangerous After All, RAND Study Shows (2017-03-10) www.darkreading.com
Bits: Tech Roundup: Julian Assange as Tech Companies’ Defender (2017-03-10) www.nytimes.com
Wikileaks offers tech companies CIA tools, industry nervous (2017-03-10) disruptiveviews.com
WikiLeaks To Defend Tech Firms From CIA Hacking Tools (2017-03-10) www.cxotoday.com
FBI Chief Calls for United Fight Against Cybercrime (2017-03-10) www.darkreading.com
Ellison: #039;I don#039;t think the truth is going to be forthcoming#039; on Russia probe (2017-03-10) thehill.com
The Wikileaks Vault 7 Leak – What We Know So Far (2017-03-09) blogs.cisco.com
Dem lawmaker asks for classified hearing on WikiLeaks CIA disclosure (2017-03-09) thehill.com
Is GraphQL The End of REST Style APIs (2017-03-09) nordicapis.com
Wikileaks’ CIA hacking revelations: Cyber security experts respond with a collective ‘meh’ (2017-03-09) www.itsecurityguru.org
Wikileaks Cache of Alleged CIA Files Includes Unredacted Names (2017-03-09) motherboard.vice.com
Google says it’s already fixed many exploits from WikiLeaks’ CIA document dump (2017-03-09) www.theverge.com
Overnight Cybersecurity: Assange mocks CIA over hacked files | Comey briefs lawmakers | Senate panel approves Trump intel chief (2017-03-09) thehill.com
WikiLeaks will give info on CIA hacking to tech companies (2017-03-09) thehill.com
That CIA exploit list in full: The good, the bad, and the very ugly (2017-03-09) www.itsecurityguru.org
In Cybersecurity, Sales Engineers Rake in Higher Salaries Than Tech Workers (2017-03-09) www.darkreading.com
China to US: Stop hacking us (2017-03-09) thehill.com
Pence: US will #039;use the full force of the law#039; on WikiLeaks if CIA leak legit (2017-03-09) thehill.com
Report: Government-held security vulnerabilities last for years (2017-03-09) thehill.com
In video, Alexa goes strangely quiet when asked if its connected to the CIA (2017-03-09) boingboing.net
Wikileaks is offering tech firms CIA files first (2017-03-09) www.bbc.co.uk
Ultimate Guide to API Design (2017-03-08) blog.qmo.io
Two Forgotten Aspects to an API Design First Approach (2017-03-08) medium.com
FBI Director Tells Companies Not to Hack Back Against Hackers (2017-03-08) motherboard.vice.com
Cyber-Ops and North Korean Missile Systems: Three Questions (2017-03-08) www.lawfareblog.com
Russian dissident warns that the anti-Trump movements Russian conspiracy theories are a distraction (2017-03-08) boingboing.net
A note about "false flag" operations (2017-03-08) blog.erratasec.com
Two Forgotten Aspects to an API Design First Approach (2017-03-08) medium.com
WikiLeaks Unveils Treasure Trove of CIA Documents (2017-03-08) hackaday.com
Hacker who targeted Ohio football website sentenced to two years in prison (2017-03-08) thehill.com
Bits: Tech Roundup: WikiLeaks Documents Point to Scourge of Cyberweapons (2017-03-08) www.nytimes.com
The CIA Leak Exposes Tech’s Vulnerable Future (2017-03-08) www.wired.com
WikiLeaks Trove Appears to Show CIA Hacking Tools (2017-03-08) www.pcmag.com
Lawmaker Wants Hacked Toymaker To Come Clean About Data Breach (2017-03-08) motherboard.vice.com
The US Has Been Conducting Offensive Cyberattacks against North Korea (2017-03-08) www.schneier.com
Feds open criminal probe into WikiLeaks CIA document dump: report (2017-03-08) thehill.com
CIA Leaks Unsurprisingly Show The Internet Of Broken Things Is A Spys Best Friend (2017-03-08) www.techdirt.com
Errata Security: Some Comments on the WikiLeaks CIA Leak (2017-03-08) blog.erratasec.com
Apple, Samsung and Microsoft react to Wikileaks CIA dump (2017-03-08) www.bbc.co.uk
WikiLeaks’ Vault 7 CIA Report Reveals How Non-Malware Attacks Are Being Leveraged (2017-03-08) www.carbonblack.com
CIA mission on cars shows concern about next-generation vehicles (2017-03-08) www.reuters.com
In a Cybersecurity Vendor War, the End User Loses (2017-03-08) www.darkreading.com
WikiLeaks Dumps Docs on CIA’s Hacking Tools (2017-03-08) krebsonsecurity.com
Leaked docs suggest NSA and CIA behind Equation cyberespionage group (2017-03-08) www.pcworld.com
More on the CIA Document Leak (2017-03-08) www.schneier.com
CIA responds to WikiLeaks document dump (2017-03-08) thehill.com
Experts say WikiLeaks exaggerating contents of CIA documents (2017-03-08) thehill.com
Small businesses need tougher cyber regs, CU executive says (2017-03-08) www.americanbanker.com
4 Ways Your API Is Not Quite What I Want (2017-03-08) zapier.com
C.I.A. Scrambles to Contain Damage From WikiLeaks Documents (2017-03-08) www.nytimes.com
API Eventing Is The Next Big Opportunity For API Providers (2017-03-07) tyk.io
Nest Adds a Security Feature It Should Have Had All Along (2017-03-07) gizmodo.com
Autocomplete and tooltips for variables are now live (2017-03-07) blog.getpostman.com
Alleged CIA leak demonstrates again the dangers of smart TVs (2017-03-07) techcrunch.com
WikiLeaks releases massive CIA hacking document archive (2017-03-07) thehill.com
No, you shouldn’t delete Signal or other encrypted apps (2017-03-07) techcrunch.com
Hey CIA, You Held On To Security Flaw Information—But Now Its Out. Thats Not How It Should Work (2017-03-07) www.eff.org
Entire Hacking Capacity Of CIA Dumped On Wikileaks, Site Claims (2017-03-07) www.darkreading.com
The CIA Spied on People Through Their Smart TVs, Leaked Documents Reveal (2017-03-07) motherboard.vice.com
Consumer Reports to consider cyber security and privacy safeguards when scoring products (2017-03-07) disruptiveviews.com
Apple says it’s already patched ‘many’ iOS vulnerabilities identified in WikiLeaks’ CIA dump (2017-03-07) www.theverge.com
WikiLeaks Just Dumped a Mega-Trove of CIA Hacking Secrets (2017-03-07) www.wired.com
CIA Leak Shows Mobile Phones Vulnerable, Not Encryption (2017-03-07) www.techdirt.com
Russia says ‘Nyet’, continues LinkedIn block after it refuses to store data in Russia (2017-03-07) techcrunch.com
How the CIA Can Hack Your Phone, PC, and TV (Says WikiLeaks) (2017-03-07) www.wired.com
Overnight Cybersecurity: WikiLeaks dumps CIA hacking docs | White House stands by Trump wiretapping claims (2017-03-07) thehill.com
Partners Say Alleged CIA Hacking Papers Prompt Constant Vigilance In Mobile Security (2017-03-07) www.crn.com
Worried the CIA Hacked Your Samsung TV? Here’s How to Tell (2017-03-07) www.wired.com
Obama’s cyber commissioners nudge Trump on cybersecurity policy (2017-03-06) thehill.com
British defense officials call for more cooperation between NATO, EU on cyber (2017-03-06) thehill.com
Cyber threat that attacked military now using new #039;wiper#039; malware (2017-03-06) thehill.com
Schumer asks for review of #039;political interference#039; in Russia investigations (2017-03-06) thehill.com
Update on Apache Spot: Tremendous advancement in cybersecurity data analytics and event management capabilities (2017-03-06) ctovision.com
Trump Administration Wants A Clean Reauthorization For NSA Surveillance (2017-03-06) www.techdirt.com
Trump and Russia: Its the Cover-Up That Suggests a Crime (2017-03-06) www.motherjones.com
Schumer: DOJ nominee must commit to special prosecutor for Trump-Russia probe (2017-03-06) thehill.com
Google API Design Guide added to the API Stylebook (2017-03-05) apihandyman.io
Tweet On my todo list for this week end adding the googlecloud API design guidelines to the httpstco7SladfsXcYhellip httpstcodBxrxEd7iN (2017-03-04) twitter.com
Ga. university hack may have compromised voter records (2017-03-03) thehill.com
Yahoo CEO Punished for Data Breaches (2017-03-03) www.darkreading.com
Pix-G Gif Cam with IR Flash Attachment @Raspberry_Pi #PiDay #Raspberrypi (2017-03-03) blog.adafruit.com
Uber has been secretively deceiving authorities for years with a tool called Greyball (2017-03-03) www.businessinsider.com
Businesses Blame Rivals for Staging DDoS Attacks (2017-03-03) www.itsecurityguru.org
Healthcare facilities widely compromised by Medjack, malware that infects medical devices to steal your information (2017-03-03) boingboing.net
Mike Pence’s (Imaginary) Leaked AOL Emails Prove He’s Basically Your Dad (2017-03-03) www.wired.com
London cops use an insecure mail-server that lets third parties intercept mail in transit (2017-03-03) boingboing.net
Arent 301s 302s and Canonicals All Basically the Same (2017-03-03) moz.com
Jumping Air Gaps with Blinking Lights and Drones (2017-03-03) www.schneier.com
NSA lawyer advocates for one agency to handle cyber (2017-03-03) thehill.com
Cyberattack hits Democrats in Pennsylvania state Senate (2017-03-03) thehill.com
Cloudflare Breach Had Potential To Be Much Worse (2017-03-02) www.darkreading.com
Is The Board Ready For A Cyber Attack? (2017-03-02) www.cxotoday.com
Dem senator: Russian hacking may have been #039;act of war#039; (2017-03-02) thehill.com
Another 32 Million Yahoo Accounts Breached (2017-03-02) www.pcmag.com
Yahoo! dysfunction! meant! security! warnings! were! ignored! (2017-03-02) www.itsecurityguru.org
Overnight Cybersecurity: Sessions recuses himself from Russia probe | Bill would help states with cybersecurity | Typo took down Amazon cloud (2017-03-02) thehill.com
Big banks to regulators: Dont tread on our cybersecurity efforts (2017-03-01) www.americanbanker.com
Designing APIs With RAML (2017-03-01) dzone.com
House panel approves cybersecurity framework bill (2017-03-01) thehill.com
Feds have an abysmal track record when it comes to cybersecurity (2017-03-01) www.itsecurityguru.org
Cyber Strategy Policy: International Law Dimensions (2017-03-01) www.lawfareblog.com
House Intel Committee lays out goals for Russia investigation (2017-03-01) thehill.com
How This Internet of Things Stuffed Animal Can Be Remotely Turned Into a Spy Device (2017-02-28) motherboard.vice.com
Honoring Black History Month in Cybersecurity (2017-02-28) duo.com
Smart teddy bears involved in a contentious data breach (2017-02-28) www.itsecurityguru.org
NHS data loss: 500 patients may have suffered serious harm (2017-02-28) www.itsecurityguru.org
Smart teddy bear maker faces scrutiny over data breach response (2017-02-28) www.pcworld.com
Adm. Rogers Talks about Buying Cyberweapons (2017-02-27) www.schneier.com
Russian cyber experts’ treason charges related to 7-year-old allegations of data sharing with US (2017-02-27) www.itsecurityguru.org
New cybersecurity certification first to address behavioural analytics (2017-02-27) www.itsecurityguru.org
REST over WebSockets instead of HTTP (2017-02-25) medium.com
Suspect Arrested In Connection With Mirai Botnet (2017-02-24) www.darkreading.com
How to become a highly-paid cyber security expert (2017-02-24) boingboing.net
20 Cybersecurity Startups To Watch In 2017 (2017-02-24) www.darkreading.com
Cyber Security Skills Businesses Will Look For in 2017 (2017-02-24) ctovision.com
Senators ask feds for ‘full account’ of work to secure election from cyber threats (2017-02-24) thehill.com
Digital Commercials: The Many Channels You Can Advertise On (2017-02-24) authoritylabs.com
Russian military admits significant cyber-war effort (2017-02-24) www.itsecurityguru.org
Florida Man Pleads Guilty To Clinton Foundation Hack Attempts (2017-02-24) www.darkreading.com
Tales from the ransomware "support line" (2017-02-24) boingboing.net
Verizon Renegotiates Yahoo Deal, Gets A $350 Million Discount (2017-02-23) www.crn.com
This top military officer perfectly captured the strange nature of cyber warfare in one sentence (2017-02-23) www.businessinsider.com
Russian military admits significant cyber-war effort (2017-02-23) www.bbc.co.uk
Operation BugDrop: CyberX Discovers Large-Scale Cyber-Reconnaissance Operation Targeting Ukrainian Organizations (2017-02-23) ics-cert.us-cert.gov
Russia Top Source Of Nefarious Internet Traffic (2017-02-23) www.darkreading.com
Router hacker suspect arrested at Luton Airport (2017-02-23) www.bbc.co.uk
Police arrest man suspected of building million-router German botnet (2017-02-23) www.pcworld.com
Road Map To A $200,000 Cybersecurity Job (2017-02-23) www.darkreading.com
CNN: ‘FBI Refused White House Request to Knock Down Recent Trump-Russia Stories’ (2017-02-23) www.cnn.com
Amid cyberattacks, ISPs try to clean up the internet (2017-02-23) www.pcworld.com
API Design Guide Cloud APIs Google Cloud Platform (2017-02-22) cloud.google.com
Russia adds #039;information warfare#039; troops (2017-02-22) thehill.com
API update Scroll API Segments and rate limits (2017-02-22) medium.com
Russia compiling list of #039;fake news#039; by Western outlets (2017-02-22) thehill.com
Cybercrime Roundup: Searching and Seizing (2017-02-22) www.lawfareblog.com
NSA Using Cyberattack for Defense (2017-02-22) www.schneier.com
Speak Up: Ransomware Attack Uses Voice Recognition (2017-02-22) www.darkreading.com
Fewer Than One-Fourth Of Cybersecurity Job Candidates Are Qualified (2017-02-22) www.darkreading.com
Malware Used to Attack Polish Banks Contained False Flags Blaming Russian Hackers (2017-02-21) www.itsecurityguru.org
After data breaches, Verizon knocks $350M off Yahoo sale, now valued at $4.48B (2017-02-21) techcrunch.com
Decoding The Maharashtra Cyber Project (2017-02-21) www.cxotoday.com
Designing robust and predictable APIs with idempotency (2017-02-21) stripe.com
Cyberattacks a top concern of businesses worldwide, survey finds (2017-02-21) thehill.com
Thought Leaders In Direct Contact With Adversaries Provide Insights Into New Cyber Attack Techniques (2017-02-20) ctovision.com
FBI pursuing three separate probes in election hacking scandal (2017-02-20) disruptiveviews.com
Trump Pals Have a Plan For Lifting Sanctions on Russia (2017-02-20) www.motherjones.com
Writing OpenAPI Swagger Specification Tutorial Part 9 Extending the OpenAPI specification (2017-02-19) apihandyman.io
U.S. inquiries into Russian election hacking include three FBI probes (2017-02-18) www.reuters.com
Why a cybersecurity solution for driverless cars may be found under the hood (2017-02-18) techcrunch.com
Article Untangling an APIfirst Transformation at Scale Lessons Learnt at PayPal Part 1 (2017-02-17) www.infoq.com
At Least 70 Organizations Targeted In Sophisticated Cyber Surveillance Operation (2017-02-17) www.darkreading.com
Italy Proposes Astonishingly Sensible Rules To Regulate Government Hacking Using Trojans (2017-02-17) www.techdirt.com
Experts at RSA give their best cybersecurity advice (2017-02-16) www.pcworld.com
Europe’s banking system needs active management of cyber-security borders (2017-02-16) www.itsecurityguru.org
Banks fail to enforce cybersecurity standards on third-party providers: FDIC watchdog (2017-02-16) www.americanbanker.com
Four ways banks are turning the tables on cybercriminals (2017-02-16) www.americanbanker.com
A Glimpse Into How Much Google Knows About Russian Government Hackers (2017-02-15) motherboard.vice.com
UK Banks on Its Youth to Help with Cybersecurity Talent Shortage (2017-02-15) continuum.cisco.com
Russian-Speaking Rasputin Breaches Dozens Of Organizations (2017-02-15) www.darkreading.com
Yahoo warns customers of further breach (2017-02-15) thehill.com
Governments should protect civilians against state sponsored hacking (2017-02-15) disruptiveviews.com
Yahoo warns users of account breaches related to recent attacks (2017-02-15) www.macworld.com
ConsumerOriented API Design (2017-02-15) api-university.com
Russian-speaking hacker breached HUD, security firm says (2017-02-15) thehill.com
Implementing DomainDriven Design in PHP (2017-02-15) dzone.com
The 10 Most Cyber-Exposed Cities In The US (2017-02-15) www.darkreading.com
Yahoos Security Incompetence Just Took $250 Million Off Verizons Asking Price (2017-02-15) www.techdirt.com
Modeldriven RESTful API for CRUD and more (2017-02-14) www.codeproject.com
Anomali Talks Threat Intelligence Info Sharing (2017-02-14) www.darkreading.com
A New Type of Malware Can Lock Power Plant Computers For Ransom (2017-02-14) motherboard.vice.com
Cardin wants independent commission to probe Flynn, Russia contacts (2017-02-14) thehill.com
Obama cyber coordinator to head cybersecurity not-for-profit (2017-02-14) thehill.com
Cybersecurity alliance promoting intel-sharing seeks to expand (2017-02-14) www.pcworld.com
GOP chairman: Russia should face #039;meaningful consequences#039; for election hacks (2017-02-14) thehill.com
A Police Department in Dallas Lost Years of Evidence After a Cyberattack (2017-02-14) www.motherjones.com
Artificial Intelligence, Cybersecurity and EU Policy-When They Meet (2017-02-13) cyware.com
IBM Watson Now Set To Fill Cyber Security Gaps (2017-02-13) www.cxotoday.com
Threat Intelligence Doesn’t Have to Be Inconceivable (2017-02-13) www.threatconnect.com
Senators want answers after Yahoo cancels meeting about data breaches (2017-02-13) www.siliconbeat.com
Security Analytics and Visualizations that Could Prevent a Ukraine-like Power Outage (2017-02-13) www.remotemagazine.com
Researcher develops ransomware attack that targets water supply (2017-02-13) www.pcworld.com
Intel’s new ‘Threat Landscape Dashboard’ keeps you up to date on hip malware (2017-02-12) thenextweb.com
Restricted Spyware Used to Hack Advocates of Mexico’s Soda Tax (2017-02-11) www.nytimes.com
Cyber security lessons offered to schools in England (2017-02-11) www.bbc.co.uk
Alleged Russian Hacker With Ties To Notorious Cybercriminals Arrested In LA (2017-02-10) www.darkreading.com
CSISs Cybersecurity Agenda (2017-02-10) www.schneier.com
House Homeland Security Committee plans cyber hearing next month (2017-02-10) thehill.com
Cyber issues of the future banks should think about now (2017-02-10) www.americanbanker.com
US Teen Admits To Brussels Airport Cyberattack (2017-02-10) www.darkreading.com
Cyber Visualization Developer - Lexington, MA, 00745, USA #jobs... (2017-02-10) jobs.climber.com
An Overview of ExperienceBased API Integration Patterns (2017-02-10) dzone.com
The next generation of cyber attacks -- PDoS, TDoS, and others (2017-02-09) betanews.com
Firms split on who handles aftermath of cyber-attacks (2017-02-09) www.bbc.co.uk
Overnight Cybersecurity: Senate takes a hard line on Russia | Dems want hearings on Trump#039;s cyber issues (2017-02-09) thehill.com
Revised Draft Trump EO on Cybersecurity (2017-02-09) www.lawfareblog.com
Lloyds joins new British banking cyber defense alliance: sources (2017-02-09) www.reuters.com
A former NSA contractor allegedly stole documents seemingly far more sensitive than anything Snowden made public (2017-02-09) www.businessinsider.com
Democrats ask for hearings on Trump White House cyber issues (2017-02-09) thehill.com
Homeland Security bringing market-ready cybersecurity projects to vaunted RSA conference (2017-02-08) thehill.com
New IoT Cybersecurity Alliance formed by ATT, IBM, others (2017-02-08) www.zdnet.com
Senators move to limit Trump on Russia sanctions (2017-02-08) thehill.com
Venture firm Trident Capital raises $300 million for cyber security startups (2017-02-08) www.reuters.com
NATO releases new guide for international cyber laws (2017-02-08) thehill.com
Son of Stuxnet: "invisible," memory-resident malware stalks the worlds banks (2017-02-08) boingboing.net
Cyber experts arrest silences Russian contacts of some Western crime fighters (2017-02-08) www.reuters.com
NSA contractor indicted over mammoth theft of classified data (2017-02-08) www.reuters.com
The Simple Guide to HTTP Verbs PATCH PUT and POST (2017-02-08) dzone.com
Overnight Cybersecurity: Ex-NSA contractor indicted over alleged theft | NATO#039;s new cyber guide | Senators move to limit Trump on Russia (2017-02-08) thehill.com
The Alleged NSA Thief Stole Information Impacting At Least Five US Agencies (2017-02-08) motherboard.vice.com
College student sentenced to probation for Android malware (2017-02-07) thehill.com
Use a Local API to Protect Global Methods in a Distributed Environment (2017-02-07) www.codeproject.com
HTML APIs What They Are And How To Design A Good One (2017-02-07) newze.net
BedrockT Open Secure Automation Platform Upgrade Extends Intrinsic Cyber Security (2017-02-07) www.remotemagazine.com
Overnight Cybersecurity: Election systems to remain #039;critical infrastructure#039; (2017-02-07) thehill.com
AI, NSA and Facebook (2017-02-07) www.lawfareblog.com
Turning Point: DDoS Attacks in Q4 2016 (2017-02-07) www.itsecurityguru.org
Mitigating Cybercrime Risks With Big Data Technology (2017-02-06) linkis.com
Bots, billions and breaches: Cybersecurity by the numbers (2017-02-06) www.ciodive.com
IoT boom and GDPR raise the stakes of a cyber-security breach (2017-02-06) www.itsecurityguru.org
Darknet Forum Launches Its Own Bug Bounty Program (2017-02-06) continuum.cisco.com
Head of NSA to brief senators on cyber threats (2017-02-06) thehill.com
Anonymous hackers shut down Freedom Hosting II, the largest host of dark web sites (2017-02-06) www.itsecurityguru.org
Anonymous Attacks the Dark Web (2017-02-06) www.pcmag.com
US court orders Google to hand over data on foreign servers (2017-02-06) thehill.com
Customer Loss After a Breach Is Real, But Don’t Lose Focus (2017-02-06) continuum.cisco.com
Ransomware Attack Left DC Police Surveillance Blind Shortly Before The Innauguration (2017-02-06) www.techdirt.com
What Does Putin Want from a Bargain with Trump? (2017-02-05) www.lawfareblog.com
Visualising complex APIs using API Map (2017-02-04) hackernoon.com
When youre under cyberattack, silence isnt golden (2017-02-04) www.americanbanker.com
A Belgian hacker redirected the links in Trump’s old tweets (2017-02-03) www.theverge.com
How Google Took on Mirai, KrebsOnSecurity (2017-02-03) krebsonsecurity.com
UK arrests 2 suspected in DC police camera hacking (2017-02-03) thehill.com
Lockheed Martin backs UK cyber-training initiative (2017-02-03) www.reuters.com
A US National Cybersecurity Strategy? (2017-02-03) dzone.com
This Senator Is Hell-Bent on Getting Out the Truth About Trump and Russia (2017-02-03) www.motherjones.com
US Army Funds Cyber-center for Ukraine Military (2017-02-02) www.infosecurity-magazine.com
Federal agencies warned of cyber-espionage coming from their landlords (2017-02-02) www.fedscoop.com
Senate subcommittee to launch Russian interference probe (2017-02-02) thehill.com
Netherlands Opts For Manual Vote-Count Amid Cyberattack Fears (2017-02-02) www.darkreading.com
API Design Collaboration tool (2017-02-02) devkraken.wordpress.com
Overnight Cybersecurity: Treasury tweaks Russia sanctions (2017-02-02) thehill.com
What Does Russian Hacking of the U.S. Election Mean for the Rest of the World? (2017-02-01) www.lawfareblog.com
In treason case, Russia alleges security experts aided U.S. (2017-02-01) www.pcworld.com
Egyptian Human Rights Activists Are Being Targeted in Dangerous Hacking Campaign (2017-02-01) motherboard.vice.com
Machine Learning in Cybersecurity Will Boost Big Data and Analytics Spending (2017-01-31) cyware.com
5 Colleges Having NSA-Recognized Cyber Security Programs (2017-01-31) cyware.com
Russian banker sentenced to prison in US for conspiracy in spy ring (2017-01-31) www.theguardian.com
Trump Orders The Cyber To Be Fixed In The Next Sixty Days (2017-01-31) www.techdirt.com
How Cybercriminals Turn Employees Into Rogue Insiders (2017-01-31) www.darkreading.com
Trump scraps signing of cybersecurity executive action (2017-01-31) thehill.com
Trump to sign cybersecurity order calling for government-wide review (2017-01-31) www.pcworld.com
Nation-state suspected in hacking of Czech foreign minister (2017-01-31) thehill.com
Trump to sign executive action on cybersecurity (2017-01-31) thehill.com
Irregular application testing leaves NHS trusts vulnerable to cyberattackers (2017-01-31) www.itsecurityguru.org
Spanish police capture hacktivist Phineas Fisher (2017-01-31) thehill.com
Europol and Global Cyber Alliance team up to fight cyber-crime (2017-01-31) www.itsecurityguru.org
Ransomware Attack On CCTV Cameras In Washington DC Ahead Of Trump Inauguration (2017-01-31) www.darkreading.com
Overnight Cybersecurity: Trump postpones cyber order | Czech officials hacked | Hacker denies being captured (2017-01-31) thehill.com
Californians are calling for a split from the US — but one secessionist group has odd ties to Russia (2017-01-31) www.businessinsider.com
Designing a True REST State Machine (2017-01-31) nordicapis.com
Cisco 2017 Annual Cybersecurity Report: Chief Security Officers Reveal True Cost of Breaches and the Actions Organizations are Taking (2017-01-31) newsroom.cisco.com
Texas Police Unit Loses Years Of Evidence To Ransomware (2017-01-30) www.darkreading.com
Hong Kong Securities Firms Warned Of Cyberattacks (2017-01-30) www.darkreading.com
US has no strategy for dealing with Russian cyber-attacks, says McCain (2017-01-30) www.itsecurityguru.org
Alleged Hacker Behind LinkedIn Breach at Center of US-Russia Tussle (2017-01-30) www.itsecurityguru.org
Yahoo under SEC investigation for keeping the lid on data breaches for years (2017-01-23) thenextweb.com
Lloyds said to suffer cyberattack on U.K. systems (2017-01-23) www.americanbanker.com
Hacked New York Times Twitter account warns of imminent Russian missile attack (2017-01-22) thehill.com
Security News This Week: Unmasking the Master of That Web-Crippling Botnet (2017-01-21) www.wired.com
Hackers briefly took down the Sundance Film Festival’s box office today (2017-01-21) www.theverge.com
Minecraft link to nets biggest botnet (2017-01-20) www.bbc.co.uk
Number Of Data Breach Disclosures Jumped 40% in 2016 (2017-01-19) www.darkreading.com
Cyber Lessons From The NSAs Admiral Michael Rogers (2017-01-19) www.darkreading.com
Jobs Website: Cybersecurity Skills Gap A Big Problem In U.S. (2017-01-19) www.itbestofbreed.com
Who Created the Mirai Botnet? (2017-01-19) www.lawfareblog.com
UFOs, Psychics, and Spies: The CIA Just Put 12M Pages of Files Online. Start Here (2017-01-19) www.wired.com
Protesters Called To Join Inauguration Day DDoS Attack (2017-01-19) www.darkreading.com
Anonymous Threatens Trump Ahead Of Inauguration (2017-01-19) www.darkreading.com
Hackers Hack Hacking Forum As Soon As Its Launched (2017-01-19) motherboard.vice.com
Russia waging information war against Sweden, study finds (2017-01-18) www.theguardian.com
New CIA Procedures for Handling U.S. Person Information Collected Under E.O. 12333 (2017-01-18) www.lawfareblog.com
Six Agencies Are Investigating Trump-Russia Ties (2017-01-18) www.motherjones.com
Why It Matters that We Believe the Intelligence Community (2017-01-18) www.lawfareblog.com
Mirai botnet creator unmasked as DDOS protection developer tempted by the dark side (2017-01-18) techcrunch.com
The Current State of Cyber Security in Canada (2017-01-18) duo.com
Can a DDoS attack on Whitehouse.gov be a valid protest? (2017-01-17) www.pcworld.com
Silence speaks louder than words when finding malware (2017-01-17) developers.googleblog.com
WhatsApp: Encrypted Message Backdoor Reports Are Baseless (2017-01-17) www.pcmag.com
UK Hospital Systems Running Windows XP Are Taken Offline (2017-01-17) duo.com
Looking for commonality among HTTP request APIs (2017-01-16) snarky.ca
Signatures with PUT vs POST (2017-01-14) forums.asp.net
Student Hacker Faces 10 Years in Prison For Spyware That Hit 16,000 Computers (2017-01-13) motherboard.vice.com
Hacker snatches 900GB of data from pay-for-hire phone-hacking agency (2017-01-13) thenextweb.com
Cell Phone Hacking Company Hacked; 900 GB Of Logins, Log Files, And Forensic Evidence Taken (2017-01-13) cyberlaw.stanford.edu
WhatsApp neglected known bug putting your privacy at risk for months (2017-01-13) thenextweb.com
WhatsApp security flaw? Researcher claims bug allows snooping on encrypted messages, but tech firm denies it’s a ‘backdoor’ (2017-01-13) www.siliconbeat.com
The Spy Who Wrote the Trump-Russia Memos: It Was "Hair-Raising" Stuff (2017-01-13) www.motherjones.com
Analysis: Hamas honeypot operation shows a sophisticated cyber-espionage unit (2017-01-12) www.jpost.com
New Cybersecurity Regulation for NY Financial Services (2017-01-12) duo.com
UK intelligence agency picks start-ups for cyber security accelerator (2017-01-12) www.tradebuddy.online
Guccifer 2.0, alleged Russian cyberspy, returns to deride US (2017-01-12) www.pcworld.com
Matthew Yglesias: ‘Beyond Wild Allegations, What’s Clearly True About Trump and Russia Is Disturbing’ (2017-01-12) www.vox.com
Ex-US National Security Official Clarke: Regulation Key To Protecting ICS/SCADA From Cyberattacks (2017-01-12) www.darkreading.com
Siblings arrested in Italys worst cyberespionage operation ever (2017-01-12) www.pcworld.com
Alleged Russian Hacker ‘Guccifer 2.0’ Is Back After Months Of Silence (2017-01-12) motherboard.vice.com
DNC hacker Guccifer 2.0 returns to the web (2017-01-12) thehill.com
FBI Chief: Russian Hackers Exploited Outdated RNC Server, But Not Trump Campaign (2017-01-12) www.itsecurityguru.org
Suspected NSA tool hackers dump more cyberweapons in farewell (2017-01-12) www.pcworld.com
‘Routing issue’ causes Russian propaganda network to air on C-SPAN (2017-01-12) thenextweb.com
Schumer: If Trump agrees Russia behind hacking, let#039;s boost sanctions (2017-01-11) thehill.com
Perez wants in-house cybersecurity expert at DNC (2017-01-11) thehill.com
This Is How Russian Spies Could Crack Telegram (2017-01-11) motherboard.vice.com
If Trump Wants a ‘Hacking Defense’ Strategy, He Should Just Use Obama’s (2017-01-11) www.wired.com
Predictions for Cybersecurity in 2017 (2017-01-11) www.itsecurityguru.org
Ukraine power cut was cyber-attack (2017-01-11) www.bbc.co.uk
Senate Intelligence Committee Member Suggests FBI Is Sitting on Information on Trump-Russia Ties (2017-01-10) www.motherjones.com
Global cyber security leader Fortinet announces new products (2017-01-10) www.pulseheadlines.com
JPMorgan Hack: Bitcoin Operator Pleads Guilty (2017-01-10) www.darkreading.com
Sessions: #039;I have done no research into#039; Russian hacking (2017-01-10) thehill.com
Comey: DNC denied FBI#039;s requests for access to hacked servers (2017-01-10) thehill.com
Two held for hacking into Italy ex-PM Renzi emails (2017-01-10) www.bbc.co.uk
Russia Hacked ‘Older’ Republican Emails, FBI Director Says (2017-01-10) www.wired.com
Microsoft, Qualcomm and Citigroup Partner to Invest in Israeli Cyber Syndicate - Technowize (2017-01-09) www.technowize.com
2017 will bring a year of creative cyber criminality and determined government responses (2017-01-09) www.itsecurityguru.org
Government Hacking: Assessing and Mitigating the Security Risk (2017-01-09) cyberlaw.stanford.edu
Donald Trump and the Future of Intelligence (2017-01-08) www.lawfareblog.com
Wikileaks whips up furor after proposing a database of verified Twitter users’ info (2017-01-06) sports.yahoo.com
Web databases hit in ransom attacks (2017-01-06) www.bbc.co.uk
Cyber Deterrence Should Be Key Focus For Trump Administration, Task Force Says (2017-01-06) www.darkreading.com
Cybersecurity predictions for 2017 (2017-01-06) www.itsecurityguru.org
Building Your API for Longevity Part 1 SpecDriven Development (2017-01-06) www.nginx.com
Spy Agencies Say: Yeah, Russia Did It (2017-01-06) www.motherjones.com
Cybersecurity Expert Links Taiwan And Europe ATM Hacks (2017-01-06) www.darkreading.com
Playing with FireCrypt: Ransomware encrypts files and conducts minor DDoS attack (2017-01-06) www.itsecurityguru.org
An Introduction to Apaches Newest Project: Metron (2017-01-06) dzone.com
3 Ways to Make Your API Responses Flexible (2017-01-05) zapier.com
zalandorestfulapiguidelines A model set of guidelines for RESTful APIs (2017-01-05) github.com
Trump Tweets Doubts On Intel Report Of Russian Involvement (2017-01-05) www.darkreading.com
Thai army to recruit civilian ‘cyber warriors’ following Anonymous’ onslaught on government sites (2017-01-05) www.itsecurityguru.org
Spy chief: US should use all tools to counter Russian hacking (2017-01-05) www.pcworld.com
Kaine: Separate threat of Russian hacking from election results (2017-01-05) thehill.com
Obama receives classified report on Russian hacking (2017-01-05) thehill.com
US Intel Chiefs Push Back on Trump and Russia Hack (2017-01-05) www.pcmag.com
Lawmakers play nice at Russia hacking hearing (2017-01-05) thehill.com
KillDisk cyber sabotage tool evolves into ransomware (2017-01-05) www.pcworld.com
At Russian Hacking Hearing, Most Republican Senators Express No Outrage (2017-01-05) www.motherjones.com
Are you ready for a state-sponsored cyber attack? (2017-01-04) ctovision.com
Ransomware Has Evolved, And Its Name Is Doxware (2017-01-04) www.darkreading.com
Ukraine Suffered 6,500 Cyberattacks In Two Months, President Says (2017-01-04) www.darkreading.com
On the Origins of APIFirst Companies (2017-01-04) blog.readme.io
Managing Medical Device Cybersecurity in the Postmarket: At the Crossroads of Cyber-safety and Advancing Technology (2017-01-04) ics-cert.us-cert.gov
Ransomware on smart TVs is here and removing it can be a pain (2017-01-04) www.itsecurityguru.org
The Real Cybersecurity Issues Behind the Overhyped ‘Russia Hacks the Grid’ Story (2017-01-04) www.greentechmedia.com
Heroes vs Villains: Humans will play both roles when it comes to cybersecurity in 2017 (2017-01-04) www.itsecurityguru.org
Kaspersky warning on Switcher Trojan that uses Android devices to compromise routers (2017-01-03) www.theinquirer.net
Cybersecurity Approaches Are Maturing but Spending Is Misdirected and People Are Still the Problem (2017-01-03) www.itsecurityguru.org
Anonymous hackers deface Victoria’s Human Rights Commission website, claim AnonPlus is ‘non-criminal’ (2017-01-03) www.itsecurityguru.org
Plenty of users sticking with Yahoo despite data breaches (2017-01-03) www.itsecurityguru.org
CIA chief: #039;Wait and see#039; report before doubting Russian hacking (2017-01-03) thehill.com
Russia did not hack Vermont electric utility: report (2017-01-03) thehill.com
Protobuf Alternative to REST for Microservices (2017-01-03) www.ensor.cc
Obamas Disclosure About Russian Hacking Is A Cybersecurity Gold Mine (2017-01-03) www.huffingtonpost.com
Dear Obama, From Infosec (2017-01-03) blog.erratasec.com
Symantec Research Provides Key Evidence for International Cybercriminal Takedown (2017-01-03) www.itsecurityguru.org
Class Breaks (2017-01-03) www.schneier.com
The Download on the DNC Hack (2017-01-03) krebsonsecurity.com
WikiLeaks hints at potential releases in 2017 warning ‘prepare for showdown’ (2017-01-03) www.itsecurityguru.org
The Chrysler Portal is the all-electric self-driving minivan for your futuristic family (2017-01-03) www.theverge.com
The Biggest Cyber-Security Incidents of 2016 (2017-01-03) resources.infosecinstitute.com
Cyberrisk Through A Business Lens (2017-01-03) www.darkreading.com
Russian ‘grid attack’ turns out to be a damp squib (2017-01-03) www.itsecurityguru.org
DIY Feminist Cybersecurity (2017-01-02) hackblossom.org
DDD REST Domain Driven APIs for the Web (2017-01-02) www.infoq.com
GOP rep suggests CIA, NSA leaked info on Russian hacking (2017-01-02) thehill.com
Be Prepared for Many More Data Breaches This Year (2017-01-02) www.cxotoday.com
Feminist cybersecurity 101 (2017-01-02) boingboing.net
10 Cybersecurity Lessons Learned In 2016 (2017-01-02) www.crn.com
Trumps cybersecurity book, from (Bill) OReilly (2017-01-02) boingboing.net
Beautiful Node APIs (2017-01-01) webapplog.com
Luggage Tag Code Unlocks Your Flights, Identity to Hackers (2016-12-31) www.pcmag.com
Grizzly Steppe Russian Malware Found on Vermont Utility System (2016-12-31) www.pcmag.com
Leahy calls utility breach #039;direct threat to Vermont#039; (2016-12-31) thehill.com
Cyber Intelligence and Defense for the Public Sector, Part 3: The Rise of Active Defense (2016-12-30) ctovision.com
Policy, statistics and questions: Reflections on UK cyber security disclosures{dagger} (2016-12-30) cybersecurity.oxfordjournals.org
Russian minister proposes expelling 35 Americans in tit-for-tat response (2016-12-30) thehill.com
Evidence of Russian malware found on US electrical company laptop (2016-12-30) www.theverge.com
U.S. accuses Chinese citizens of hacking law firms, insider trading (2016-12-29) www.itsecurityguru.org
Threat Actors Bring Ransomware To Industrial Sector With New Version of KillDisk (2016-12-29) www.darkreading.com
New Report Says Russian Hacking Came From Russia (2016-12-29) www.motherjones.com
Creating a Simple Android REST Client Using HTTPRPC (2016-12-29) dzone.com
NH Department of Health and Human Services Announces Data Breach (2016-12-29) www.itsecurityguru.org
FBI analysis fingers Russian spy agencies for U.S. election hacks (2016-12-29) www.reuters.com
GRIZZLY STEPPE - Russian Malicious Cyber Activity (2016-12-29) www.us-cert.gov
Cyberattack On Ukraine Conflict Watchdog (2016-12-29) www.darkreading.com
Modernizing Legacy PHP apps with APIs (2016-12-28) leanpub.com
Kerry: Russian interference had #039;profound impact#039; on election (2016-12-28) thehill.com
Another Massive DDoS Closes Out 2016, But Mirai Not To Blame (2016-12-28) www.darkreading.com
Report: Distributed Denial of Service Attacks Increased In 2016, Spurred By IoT Vulnerabilities (2016-12-28) www.crn.com
Whistleblowers Don’t Need Elite Credentials To Help Protect Us from Government Overreach (2016-12-26) www.eff.org
Future of APIs (2016-12-19) medium.com
The U.S. Response to Russian Pre-Election Meddling: An Overview (2016-12-19) www.lawfareblog.com
2017 Cyber Security Predictions (2016-12-19) resources.infosecinstitute.com
Russian Official Blames Western Media for Turkish Ambassadors Assassination (2016-12-19) www.motherjones.com
US Charges 3 Romanians With Cyber Fraud Involving $4 Million (2016-12-19) www.darkreading.com
Malware Exchange Busted by the Feds Relaunches, At Least in Name (2016-12-19) motherboard.vice.com
Kremlin says it is not in contact with Trump team (2016-12-19) thehill.com
The Power of OpenClosed Principle (2016-12-19) dzone.com
Russian Hackers Seized Control of Pentagon Email System (2016-12-19) www.itsecurityguru.org
API Design for C epub (2016-12-18) thywifyjudit.full-design.com
Schumer joins McCain in call for independent probe of Russian hacking (2016-12-18) thehill.com
Yahoo security problems a story of too little, too late (2016-12-18) www.reuters.com
Podesta: FBI didn#039;t tell me about hacks until after WikiLeaks began publishing emails (2016-12-18) thehill.com
Senators call for probe of cyber attacks by Russia (2016-12-18) www.reuters.com
Time to stop handwringing about Russia and do something serious (2016-12-17) thehill.com
As US Government Traces Hacks to Putin, Russia Cracks Down on Hackers at Home (2016-12-16) www.motherjones.com
BRIEF-NATO and FireEye announce cyber information sharing agreement (2016-12-16) www.reuters.com
FBI backs up CIA: Russia intervened to help Trump win 2016 election (2016-12-16) thenextweb.com
Stolen Yahoo User Data Sold for $300K (2016-12-16) www.pcmag.com
Romanian Gets 57-Months Jail For ATM Skimming Scheme (2016-12-16) www.darkreading.com
White House suggests Putin authorized DNC hack and helped to elect Trump (2016-12-15) www.theverge.com
Real-World Fallout From The Cybersecurity Skills Gap (2016-12-15) www.darkreading.com
US Election Assistance Commission confirms ‘possible’ hack (2016-12-15) thenextweb.com
Reid: Putin #039;clearly#039; involved in election hack (2016-12-15) thehill.com
American Hacker Arrested For 2014 JP Morgan Chase Breach (2016-12-15) www.darkreading.com
1 Billion Users Exposed In Another Record Breach From Yahoo (2016-12-15) www.darkreading.com
Salesforce Security CTO: How A DDoS Attack Can Impact A Smart Grid (2016-12-15) www.crn.com
Dem asks Chaffetz to investigate Russian hacking (2016-12-15) thehill.com
Assange: Some leaks may have been Russian (2016-12-15) thehill.com
Yahoo Reveals Biggest Hack; Over 1Bn Accounts Compromised (2016-12-15) www.cxotoday.com
Donald Trump - Pants on Fire! Trump tweet about White House, Russian hacking probe (2016-12-15) www.politifact.com
How to replace 5 major Yahoo services and delete your Yahoo account (2016-12-15) www.pcworld.com
Russia: Claim that Putin is behind hacking is #039;nonsense#039; (2016-12-15) thehill.com
U.S. intelligence officials say Putin was personally involved in U.S. election hack (2016-12-15) boingboing.net
Putin reportedly oversaw Clinton email dump and election hacks personally (2016-12-15) thenextweb.com
White House spokesman suggests Trump knew of Russias alleged hacking before the election (2016-12-14) www.businessinsider.com
Yahoo says one billion accounts exposed in newly discovered security breach (2016-12-14) www.reuters.com
Wannabe Hackers Are Willing to Pay To Learn How To Use the Mirai Botnet (2016-12-14) www.itsecurityguru.org
API Modeling A ZeroCode Way To a Designer API (2016-12-14) www.tibco.com
Corker: US officials shouldn#039;t get their #039;hair on fire#039; over Russian hacking (2016-12-14) thehill.com
REPORT: Intelligence officials believe Putin was directly involved in the Democratic Party hacks (2016-12-14) www.businessinsider.com
Vladimir Putin was directly involved in US election hack, report says (2016-12-14) www.theverge.com
Yahoo discloses hack of 1 billion accounts (2016-12-14) thehill.com
House Intel chair calls for briefing Thursday on Russian hacking (2016-12-14) thehill.com
7 Secrets to Designing Alexa Skills (2016-12-14) dzone.com
New Cybersecurity Book Highlights Growing Threat of Social Engineering (2016-12-14) www.itsecurityguru.org
Foundations of RESTful Architecture (2016-12-14) dzone.com
Yahoo Says 1 Billion User Accounts Were Hacked (2016-12-14) www.nytimes.com
Security Expert On Presidential Election Hack: We Should Have Expected This For a Long Time (2016-12-13) www.crn.com
Impressive demonstration of social engineering (2016-12-13) boingboing.net
Senate Foreign Relations panel to probe Russian hacking (2016-12-13) thehill.com
The Perfect Weapon: How Russian Cyberpower Invaded the U.S. (2016-12-13) www.nytimes.com
NY TIMES: DNC hacks turned US media into de facto instrument of Russian intelligence (2016-12-13) www.businessinsider.com
TalkTalk hacker, 19, pleads guilty at the Old Bailey (2016-12-13) www.bbc.co.uk
DDoS: Thirty-four arrested after international probe (2016-12-13) www.bbc.co.uk
Seventeen-year-old sentenced for 2015 TalkTalk hack (2016-12-13) www.reuters.com
How Russia pulled off a cyberwar invasion of America, according to the New York Times (2016-12-13) boingboing.net
The Query Volumes of Mirai DGAs (2016-12-13) blog.opendns.com
Devious Ransomware Frees You if You Infect Two Other People (2016-12-13) www.wired.com
Global Cybercrime Sweep Targeted Young DDoS Attackers (2016-12-13) www.darkreading.com
Swagger toolbox (2016-11-12) swagger-toolbox.firebaseapp.com
OpenAPI GUI (2016-11-12) mermade.github.io
Left-wing cyber-hangout blames security breach on pro-Trump trolls (2016-11-11) www.itsecurityguru.org
Sharing Threat Intel: Easier Said Than Done (2016-11-11) www.darkreading.com
To Keep Users Secure, Facebook Shops the Darkweb for Stolen Passwords (2016-11-11) continuum.cisco.com
Facebook Buys Leaked Passwords From Black Market, But Do You Know Why? (2016-11-11) www.itsecurityguru.org
Global industry groups voice opposition to China cyber security law (2016-11-11) www.reuters.com
Britain flexes its cyber-muscles (2016-11-10) www.economist.com
U.S. charges Florida man in case linked to JPMorgan hacking probe (2016-11-10) www.reuters.com
Self-Propagating Smart Light Bulb Worm (2016-11-10) www.schneier.com
Yahoo knew of state-backed hack in 2014 (2016-11-10) www.bbc.co.uk
US Customs Police Paid Contractors to Monitor the Dark Web (2016-11-10) motherboard.vice.com
Bangladesh Bank to retrieve $15 million of $81 million cyber heist (2016-11-10) thehill.com
Free Cloud Storage Putting Small Business Data At Risk (2016-11-10) www.darkreading.com
Yahoo is worried that hackers might have access to your accounts (2016-11-09) thenextweb.com
Trump?s Win Signals Open Season for Russia?s Political Hackers (2016-11-09) www.wired.com
The Big Lesson We Must Learn From The Dyn DDoS Attack (2016-11-09) www.darkreading.com
What are the Biggest Issues in Cyber Security in 2016? (2016-11-09) www.huffingtonpost.com
A lightbulb worm could take over every smart light in a city in minutes (2016-11-09) boingboing.net
(2016-11-09) continuum.cisco.com
Winter Denial of Service attack knocks out heating in Finnish homes (2016-11-08) boingboing.net
After cyber attacks, Internet of Things wrestles with making smart devices safer (2016-11-08) www.reuters.com
DDoS Attack and Resiliency Measures (2016-11-08) dzone.com
Public Consultation on the Proposed Approach to EU Cyber Security Directive (2016-11-08) bhconsulting.ie
Merkel fears Russian meddling in German election (2016-11-08) thehill.com
Asia financial body says China cyber security law could make risk management harder (2016-11-08) www.reuters.com
China?s New Cybersecurity Rules May Block Western Innovation (2016-11-07) www.technologyreview.com
Unsealed Court Docs Show FBI Used Malware Like ?A Grenade? (2016-11-07) motherboard.vice.com
Announcing the New Apigee Edge Experience Apigee (2016-11-07) apigee.com
FireEye CEO And CFO On Election Cybersecurity, A Renewed Channel Push And Company Restructuring (2016-11-07) www.crn.com
CA welcomes release of UK National Cyber Security Strategy (2016-11-07) blogs.ca.com
REFILE-UPDATE 2-Raid on 20,000 Tesco Bank accounts fuels UK cybercrime fears (2016-11-07) www.reuters.com
4G Cellular Networks At Risk Of DoS Attacks (2016-11-07) www.darkreading.com
China adopts controversial cybersecurity law: Xinhua (2016-11-06) www.reuters.com
U.S. boosting cyber defenses, but not police presence, for election (2016-11-04) www.reuters.com
Ne?er-Do-Well News and Cyber Justice (2016-11-04) krebsonsecurity.com
Why Cybersecurity Is So Hard -- Absurd Division (2016-11-03) www.lawfareblog.com
Ukraine hackers claim huge Kremlin email breach (2016-11-03) www.bbc.co.uk
Liberia hit with attack that downed Twitter earlier this month (2016-11-03) thehill.com
Nation-Blanking DDoS Attacks Launched By Individuals Now Proven Able To Take Entire Nation?s Off The Net (2016-11-03) ctovision.com
Police in Quebec are spying on journalists and Snowden calls that "a threat to democracy" (2016-11-03) boingboing.net
Key Points in the New UK National Cyber Security Strategy (2016-11-03) duo.com
It#039;s time to make Russia pay for its cyberattacks (2016-11-03) thehill.com
Cybersecurity Recommendations for the Next Administration: Keep Cybersecurity Front and Center (2016-11-03) www.lawfareblog.com
Photobucket Hacker Sent To Prison (2016-11-03) www.darkreading.com
American Industry Benefiting From Government Cybersecurity Executive Transitions (2016-11-03) ctovision.com
Building The LinkedIn Knowledge Graph (2016-11-02) engineering.linkedin.com
We Need A National Cybersecurity Strategy That Everyone Can Implement (2016-11-02) www.fedcyber.com
Tim Berners-Lee Warns Hackers Could Exploit Open Data To Wreak Real-World Chaos (2016-11-02) www.techweekeurope.co.uk
Free Cybersecurity MOOC from F-Secure and the University of Finland (2016-11-02) www.schneier.com
How Unchecked Spying Corrodes Democracy Around the World (2016-11-02) www.aclu.org
We Need A National Cybersecurity Strategy That Everyone Can Implement (2016-11-02) ctovision.com
Why the Government Must Disclose Its Exploit to the Defense in the Playpen Cases (2016-11-02) www.eff.org
Bedrock Automation Extends Cyber Security to Industrial Serial Communications with the Bedrock SIOS.5 Serial I/O Module (2016-11-02) www.remotemagazine.com
Ohio using National Guard cybersecurity team to protect elections (2016-11-02) thehill.com
COLUMN-Does the FBI think Russia hacked Weiners computer? (2016-11-02) www.reuters.com
Why I Dont Like UPDATE Methods In API Design (2016-11-02) www.bennadel.com
Microsoft handed the NSA access to encrypted messages (2016-11-01) www.theguardian.com
Details emerging on Dyn DNS DDoS attack, Mirai IoT botnet (2016-11-01) searchsecurity.techtarget.com
Another Shadow Brokers Leak (2016-11-01) www.schneier.com
National Cyber Security Strategy launched by UK chancellor (2016-11-01) www.infosecurity-magazine.com
ThreatConnect Shares Incident Information on Typosquatting Domains (2016-11-01) www.threatconnect.com
UK government to spend $2.3 billion to bolster cybersecurity (2016-11-01) www.pcworld.com
7 Misconceptions of AI, Machine Learning and Cybersecurity (2016-11-01) www.itsecurityguru.org
ThreatConnect Shares Incident Information on Turla APT satellite-based infrastructure (2016-11-01) www.threatconnect.com
UK to increase national cyber-defence grid (2016-11-01) www.itsecurityguru.org
We Need A National Cyber Defense Agency (2016-11-01) www.huffingtonpost.com
UPDATE 2-Microsoft says Russia-linked hackers exploiting Windows flaw (2016-11-01) www.reuters.com
Shadow Brokers Releases Second Trove of Spying Tools (2016-11-01) www.pcmag.com
Microsoft preparing to patch security flaw used in cyberattacks (2016-11-01) thehill.com
Cybersecurity action must catch up to interest: A lesson from ?Snowden? (2016-11-01) blog.datagravity.com
Fraud report names most sophisticated cyber-attacks globally in 2016 (2016-10-31) www.scmagazine.com
Internet of Things Attacks are More than a Nuisance (2016-10-31) community.infoblox.com
Sundown Exploit Kit Operating 80,000 Malicious Subdomains (2016-10-31) continuum.cisco.com
Shadow Brokers post list of compromised IP addresses (2016-10-31) techcrunch.com
Hackforums Shutters Booter Service Bazaar (2016-10-31) krebsonsecurity.com
Introduction to APIFirst Design (2016-10-31) www.programmableweb.com
Feds Preach Cybersecurity to Carmakers (2016-10-31) spectrum.ieee.org
Cloud originated DDoS attacks (2016-10-31) resources.infosecinstitute.com
US Should Help Private Sector Active Defense, But Outlaw Hacking Back, Says Task Force (2016-10-31) www.darkreading.com
Introducing Seamless Source Control Integration With Bitbucket and SwaggerHub (2016-10-31) dzone.com
Controversial Chinese cybersecurity law enters home stretch for approval (2016-10-31) www.reuters.com
What We?re Scared About This Halloween: Prosecutorial Discretion Under Notoriously Vague Computer Crime Statute (2016-10-31) www.eff.org
Recent Botnet Attacks Highlight Importance of Automated Testing to Harden Defenses (2016-10-31) dzone.com
Hackers reveal apparent targets of NSA cyber espionage (2016-10-31) thehill.com
Anonymous Hacker Officially Charged for Boston Hospital DDoS Attacks (2016-10-22) news.softpedia.com
Smart home devices used as weapons in website attack (2016-10-22) www.bbc.co.uk
Cybersecurity, Unscrupulous Diners, and Internet Stewardship (2016-10-22) cyberlaw.stanford.edu
Internet Attack Spreads, Disrupting Major Websites (2016-10-21) www.nytimes.com
Report: Suspected spy being investigated for mysterious NSA auction (2016-10-21) thehill.com
DDoS Attack On DNS Provider Disrupts Okta, Twitter, Pinterest, Reddit, CNN, Others (2016-10-21) www.darkreading.com
ThreatConnect Shares Incident Information on a Phishing Page Serving Fake Login for University (2016-10-21) www.threatconnect.com
A denial-of-service attack shut down major websites across the internet (2016-10-21) www.theverge.com
Reports: Cyberattack Spurs Widespread Internet Outage On East Coast (2016-10-21) www.crn.com
Anonymous Hacker Officially Charged for Boston Hospital DDoS Attacks (2016-10-21) www.itsecurityguru.org
Major DDoS attack on Dyn DNS knocks Spotify, Twitter, Github, Etsy, and more offline (2016-10-21) www.pcworld.com
What We Know About Friday?s Massive East Coast Internet Outage (2016-10-21) www.wired.com
Russian indicted in U.S. on charges of hacking LinkedIn (2016-10-21) www.reuters.com
RPT-UPDATE 1-Russian indicted in U.S. on charges of hacking LinkedIn (2016-10-21) www.reuters.com
Dyn issues affecting joint customers (2016-10-21) blog.cloudflare.com
The Feds are investigating todays massive DDoS attacks (2016-10-21) www.theverge.com
UPDATE 8-Cyber attacks disrupt PayPal, Twitter, other sites (2016-10-21) www.reuters.com
?The need to stay alert as data breach costs rise? (2016-10-21) www.itsecurityguru.org
Dyn, a managed DNS service, hit with attack, popular sites see performance issues (2016-10-21) www.zdnet.com
Cyber Training For First Responders To Crime Scene (2016-10-21) www.darkreading.com
DNS provider Dyn facing another massive DDoS attack ? Twitter, Reddit, and more impacted [Updated] (2016-10-21) thenextweb.com
Some notes on todays DNS DDoS (2016-10-21) blog.erratasec.com
Researchers sabotage 3D printer files to destroy a drone (2016-10-21) techcrunch.com
Google?s $100K cybersecurity award given to University of California Santa Barbara (2016-10-21) www.itsecurityguru.org
Indian Banks Hit By Debit Card Security Breach (2016-10-21) www.darkreading.com
UK?s new cyber security centre to debunk scare tactics and lead by example (2016-10-21) techcrunch.com
Too small for cyber security? Think again. (2016-10-21) www.itsecurityguru.org
NSA Contractor Over 20 Years Stole More Than 50 Terabytes Of Govt Data (2016-10-21) www.darkreading.com
Homeland Security Is ?Investigating All Potential Causes? of Internet Disruptions (2016-10-21) time.com
SPECIAL ALERT: DDoS Attack Shuts Down Key Fintech Sites (2016-10-21) bankinnovation.net
U.S. indicts Russian for hacking LinkedIn, Dropbox, Formspring (2016-10-21) www.pcworld.com
What is a Distributed Denial-of-Service Attack and How Did it Break Twitter? (2016-10-21) spectrum.ieee.org
7 Imminent IoT Threats (2016-10-21) www.darkreading.com
Russia Hackers to Blame for Wikileaks Emails - Proof Vladmir Putin Was Behind the Clinton Email Hack (2016-10-20) www.esquire.com
Czech police nab Russian suspected of hacking U.S. targets (2016-10-20) www.scmagazine.com
Why Arent We Talking More Proactively About Securing Smart Infrastructure? (2016-10-20) www.darkreading.com
Yahoo Demands Government Be More Transparent About Data Requests (2016-10-20) www.darkreading.com
NSA contractor to face espionage charges for alleged data theft (2016-10-20) www.reuters.com
How To Crash A Drone By Hacking Its 3D Propeller Design (2016-10-20) www.darkreading.com
Why Poor Cyber Hygiene Invites Risk (2016-10-20) www.darkreading.com
WikiLeaks releases messages from Obama (2016-10-20) thehill.com
US charging arrested NSA contractor with espionage (2016-10-20) thehill.com
Russian arrested over LinkedIn hack (2016-10-20) www.bbc.co.uk
Researchers link Podesta hack to Russia (2016-10-20) thehill.com
Hajime, Yet Another IoT Botnet (2016-10-20) hackaday.com
Recent IoT-based Attacks: What Is the Impact On Managed DNS Operators? (2016-10-20) dyn.com
New Free Tool Stops Petya Ransomware Rootkits (2016-10-20) www.darkreading.com
Yahoo Seeks U.S. Declassification of Data-Gathering Efforts (2016-10-19) www.wsj.com
Man suspected of stealing 100 million LinkedIn users information is arrested in Prague (2016-10-19) www.latimes.com
Inside the DDoS attacks powered by large IoT botnetsSecurity Affairs (2016-10-19) securityaffairs.co
Regulators to set new cybersecurity standards for banks (2016-10-19) thehill.com
There Are Almost Half of Million IoT Devices Infected with the Mirai IoT Malware (2016-10-19) www.itsecurityguru.org
St. Jude Medical Plans Cybersecurity Advisory Panel (2016-10-19) www.darkreading.com
Why cybersecurity certifications suck (2016-10-19) blog.erratasec.com
Aviation Officials Step Up Cybersecurity Checks of Older Messaging System (2016-10-19) www.wsj.com
LinkedIn blames Russian hacking suspect for 2012 breach (2016-10-19) www.pcworld.com
Six Ways Cities Can Make Cybersecurity a Top Priority (2016-10-19) datasmart.ash.harvard.edu
Man arrested in Czech Republic suspected of hacking LinkedIn (2016-10-19) thehill.com
ThreatConnect Shares Incident Information on Major Financial Institution Domain Squat (2016-10-19) www.threatconnect.com
From Good to Great API (2016-10-19) api-university.com
U.S. calls on banks to set higher cyber security standards (2016-10-19) www.reuters.com
Designing better Web APIs Part I arefscom (2016-10-19) arefs.com
Is your security camera hacking someone else? (2016-10-19) sensr.net
Hacker Allegedly Responsible for Massive 2012 LinkedIn Breach Arrested (2016-10-19) motherboard.vice.com
BRIEF-U.S. govt officials considering release of additional info on court order served on Yahoo (2016-10-19) www.reuters.com
Security Lessons from a Power Saw (2016-10-19) www.schneier.com
Yahoo, ACLU press U.S. to disclose secret surveillance orders (2016-10-19) www.reuters.com
Is IoT Posing a Threat To Cyber Security? (2016-10-19) dzone.com
FBI and Czech police arrest Russian hacker for US attacks (2016-10-19) thenextweb.com
BRIEF-Office of Director of National Intelligence confirms receipt of Yahoos letter (2016-10-19) www.reuters.com
Smart Cities Have No Cybersecurity, Say 98% Of Government IT Pros (2016-10-19) www.darkreading.com
Yahoo left out something important when it said users havent fled since its big hack (YHOO) (2016-10-18) www.businessinsider.com
Cognitive Security (2016-10-18) www.itsecurityguru.org
Hackers create more IoT botnets with Mirai source code (2016-10-18) www.pcworld.com
The Internet of Things is being used to launch massive cyberattacks (2016-10-18) www.businessinsider.com
Ecuador says it disconnected Julian Assange?s internet because of Clinton email leaks (2016-10-18) www.theverge.com
Yahoo Says Traffic Rose Despite Hacking That Could Alter Verizon Deal (2016-10-18) www.nytimes.com
Ecuador confirms it cut off Assange?s internet access to prevent him from derailing US elections (2016-10-18) thenextweb.com
(2016-10-18) www.itsecurityguru.org
API Usability Matters UX and CX is like DX and (2016-10-18) dret.typepad.com
Shadow Brokers Cancel Auction of Supposed NSA Hacking Tools (2016-10-18) www.itsecurityguru.org
?Dyre? malware re-surfaces as ?TrickBot?, targets Australian banks (2016-10-18) www.itsecurityguru.org
NyaDrop exploiting Internet of Things insecurity to infect Linux devices with malware (2016-10-18) www.itsecurityguru.org
Veracode Report Finds Open Source Components Proliferating Digital Risk at an Alarming Rate (2016-10-18) www.itsecurityguru.org
The New Face of Law and Cyber Warfare (2016-10-18) www.lawfareblog.com
WikiLeaks blames U.S. for cutting Assanges internet connection (2016-10-18) www.pcworld.com
Public Wi-Fi Use Grows, Despite Security Risks (2016-10-18) www.darkreading.com
Ecuador affirms Assange#039;s asylum status amid internet access questions (2016-10-18) thehill.com
Knowledge for Cybersecurity (2016-10-17) ebiquity.umbc.edu
Cybersecurity from the Break Room to the Board Room (2016-10-17) www.dhs.gov
NSA hackers abandon auction, seek $6M in crowd funding (2016-10-17) thehill.com
Guccifer Sent Back To Romanian Prison (2016-10-17) www.darkreading.com
How hackers handle stolen login data (2016-10-17) www.itsecurityguru.org
How To Become A Cybersecurity Entrepreneur In A Crowded Market (2016-10-17) www.darkreading.com
Cloud Security Replacing Cybersecurity Industry, Says Analyst (2016-10-17) www.darkreading.com
What Does a Cybersecurity Researcher Do, Really? (2016-10-17) dzone.com
UKs Investigatory Powers Tribunal says GHCQ illegally spied for 17 years (2016-10-17) boingboing.net
UK spy agencies? bulk data practices ruled unlawful before 2015 (2016-10-17) techcrunch.com
UK spy agencies broke privacy rules says tribunal (2016-10-17) www.bbc.co.uk
UK Banks ?Under-reporting? Cyber Incidents (2016-10-17) www.itsecurityguru.org
The API problem (2016-10-15) medium.com
Instegogram: Leveraging Instagram for C2 via Image Steganography (2016-10-14) www.endgame.com
The Evidence Guccifer 2.0 is Russian Intel ? Medium (2016-10-14) medium.com
API Best Practices API Design (2016-10-14) medium.com
Top Dems call on FBI to investigate Trump ally over leaked emails (2016-10-14) thehill.com
British banks keep cyber attacks under wraps to protect image (2016-10-14) www.reuters.com
Lawmakers press Lynch for briefing on Yahoo secret email scanning reports (2016-10-14) thehill.com
Cyber-attacks against nuclear plants, a disconcerting threat (2016-10-14) resources.infosecinstitute.com
Lawmakers want answers about Yahoo scanning emails for U.S. government (2016-10-14) www.siliconbeat.com
Yahoo Breach May Trigger Material Adverse Change Clause (2016-10-14) www.darkreading.com
Dozens of U.S. lawmakers request briefing on Yahoo email scanning (2016-10-14) www.reuters.com
Trump underestimates the Russian cyber threat (2016-10-14) thehill.com
Security News This Week: Hackers Hit a Nuclear Plant (2016-10-14) www.wired.com
Free Online Cybersecurity Economics Course (2016-10-14) www.schneier.com
Biden vows US will retaliate against Russia for hacks (2016-10-14) thehill.com
12-year-old SSH vulnerability in IoT devices being abused (2016-10-13) www.itproportal.com
Struggling with code to optimize how you chain APIs for advanced data analytics (2016-10-13) community.havenondemand.com
Information Security Spending Will Top $101 Billion By 2020 (2016-10-13) www.darkreading.com
Lawful Hacking and the Case for a Strategic Approach to ?Going Dark? (2016-10-13) www.lawfareblog.com
Tor Project and Mozilla Making It Harder for Malware to Unmask Users (2016-10-13) motherboard.vice.com
Majority of businesses have not inspected cloud services for malware (2016-10-13) www.itsecurityguru.org
Managed Security Services Provider Netsurion Acquires SIEM Vendor EventTracker (2016-10-13) www.crn.com
Verizon signals Yahoo data breach may affect acqusition (2016-10-13) www.pcworld.com
Attack Uses Image Steganography For Stealthy Malware Ops On Instagram (2016-10-13) www.itsecurityguru.org
Private Information Stored in Document Files Provides Most Popular Breach Target for Cyber Attackers (2016-10-13) www.itsecurityguru.org
(2016-10-13) techcrunch.com
Senator Proposes Voting By Mail to Guard Against Cyberattacks (2016-10-13) www.pcmag.com
Talos Releases Analysis Tool for Locky Ransomware (2016-10-13) continuum.cisco.com
SSHowDowN Proxy attacks using IoT devices (2016-10-13) www.itsecurityguru.org
API Best Practices API Design (2016-10-12) medium.com
The Psychological Impact of Doing Classified Intelligence Work (2016-10-12) www.schneier.com
Research shows Russian hackers could be behind the Mirai botnet (2016-10-12) www.itsecurityguru.org
Yahoo Temporarily Disables Auto Email Forwarding (2016-10-12) www.pcmag.com
Political Positions On Cybersecurity Matter To Millennials (2016-10-12) www.darkreading.com
Thoughts on White House Pledge to Respond to DNC Hack (2016-10-12) www.lawfareblog.com
RiskIQ Web Crawl Discovers PCI Policy Portal Leads to Malware (2016-10-12) www.riskiq.com
Feds George warns on cybersecurity; no comment on economy (2016-10-12) www.reuters.com
Effective Cyber Security Requires Team Collaboration (2016-10-12) nulab-inc.com
Australia Says Foreign Spies Hacked Into Its Weather Bureau Last Year (2016-10-12) www.nytimes.com
Web App Next Stop In Our Software Journey REST Services Part III (2016-10-12) dzone.com
Sierra Wireless Mitigations Against Mirai Malware (2016-10-12) ics-cert.us-cert.gov
How Hackers Plant False Flags to Hide Their Real Identities (2016-10-12) motherboard.vice.com
Security spending to top $100 billion by 2020: Are we any cyber safer? (2016-10-12) www.zdnet.com
Take1 Insurance Offers Live-Event Policy Covering Malicious Acts, Including Terrorism (2016-10-12) www.avnetwork.com
Russia shrugs off promise of retaliation from US (2016-10-12) thehill.com
Two State Elections Databases Have Been Hacked. The Russians Arent the Only Suspects. (2016-10-12) www.motherjones.com
Executable Files, Old Exploit Kits Top Most Effective Attack Methods (2016-10-12) www.darkreading.com
Feds: Yep, Russia Hacked the DNC (2016-10-12) www.pcmag.com
Russia, Russia, Russia: What Clinton Or Trump Can Do About Nation-State Hacking Gone Wild (2016-10-12) www.darkreading.com
Nuclear Power Plant Disrupted by Cyber Attack (2016-10-11) threatpost.com
G7 sets common cyber-security guidelines for financial sector (2016-10-11) www.reuters.com
Internet of Things Malware Has Apparently Reached Almost All Countries on Earth (2016-10-11) motherboard.vice.com
Is the cyber security industry looking in the wrong place? (2016-10-11) www.itsecurityguru.org
Say Cheese: a snapshot of the massive DDoS attacks coming from IoT cameras (2016-10-11) blog.cloudflare.com
G7 nations develop financial industry cyber guidelines (2016-10-11) thehill.com
Feds help 33 states with election cybersecurity (2016-10-11) thehill.com
DDOS Protection for Public Cloud Customers (2016-10-11) resources.infosecinstitute.com
The clumsy, amateurish IoT botnet has now infected devices in virtually all of the worlds countries (2016-10-11) boingboing.net
Online Gaming Currency Funds Cybercrime In Real Life (2016-10-11) www.darkreading.com
UN Watchdog: Nuclear Plants Disrupted by Cyber Attack (2016-10-11) www.darkreading.com
Administration vows #039;proportional#039; response to Russian hack (2016-10-11) thehill.com
Cyber Hunters, Incident Response The Changing Nature Of Network Defense (2016-10-11) www.darkreading.com
swaggergistio Saving and Versioning Swagger definitions (2016-10-10) jordwalsh.com
InfoSec facts from InfoSec fiction: how popular entertainment can help security awareness (2016-10-10) resources.infosecinstitute.com
In High-Profile Breaches, Attackers Leveraged Poor Security Hygiene (2016-10-10) duo.com
NSA Compliance and Congress?s Plan: How to Account for Flaws in the Metadata Program? (2016-10-10) www.lawfareblog.com
FBI Hacked Computers in Australia as Part of Global Child Porn Sting (2016-10-10) motherboard.vice.com
Yahoo disables automatic email forwarding feature - AP (2016-10-10) www.reuters.com
WikiLeaks drops new batch of emails allegedly stolen from Podesta (2016-10-10) thehill.com
Disruptive cyber attack on nuclear power plant reported (2016-10-10) disruptiveviews.com
Arrested NSA contractor is no Snowden, officials say (2016-10-08) thehill.com
Thanks To Encryption, Governments Need Companies Like Yahoo To Spy on Users (2016-10-07) motherboard.vice.com
U.S. accuses Russia of trying to ?interfere with the U.S. election? through internet attacks (2016-10-07) boingboing.net
US intel officially blames the Russian government for hacking DNC (2016-10-07) www.theverge.com
USA FREEDOM Act Requires Government to Declassify Any Order to Yahoo (2016-10-07) www.eff.org
Understanding Footnote 14: NSA Lawyering, Oversight, and Compliance (2016-10-07) www.lawfareblog.com
The Six Key Questions for the Obama Administration and Companies About Yahoo?s Cooperation With the NSA (2016-10-07) www.aclu.org
Yahoo didnt install an NSA email scanner, it was a "buggy" NSA "rootkit" (2016-10-07) boingboing.net
Digital Vigilantes Want to Shame DDoS Attackers And Their Corporate Enablers (2016-10-07) motherboard.vice.com
U.S. officially attributes DNC hack to Russia (2016-10-07) techcrunch.com
Feds Pin Political Hacks on Russia. But How to Respond? (2016-10-07) www.wired.com
NSA Contractor Arrested for Stealing Classified Information (2016-10-07) www.schneier.com
Dyn Cited in Brookings Institute?s New Report On The Cost of Internet Shutdowns (2016-10-07) dyn.com
US officially blames Russian government for election-related hacking (2016-10-07) www.pcworld.com
Lawmakers on attributing hacks to Russia: Strike back (2016-10-07) thehill.com
Tweet Learn The importance of loose coupling in REST API design httpstcor7kuJ1KzIc httpstcowHUqOfBYPu (2016-10-06) twitter.com
Designing and documenting your API (2016-10-06) medium.com
Day 31 (2016-10-06) medium.com
Functional Augmented State Transfer FAST Architecture for Computationally Intensive Network Applications (2016-10-06) arxiv.org
Why Its Always Cyber Hunting Season ( What To Do About It) (2016-10-06) www.darkreading.com
Yahoo scanned emails to help FBI hunt terrorists (2016-10-06) www.bbc.co.uk
Two Teenagers Arrested For Alleged Cyberattack-For-Hire Services (2016-10-06) www.darkreading.com
Yahoo scandals: Verizon wants $1 billion off sale price, report says (2016-10-06) www.siliconbeat.com
Feds Charge Two In Lizard Squad Investigation (2016-10-06) gixtools.net
What the Yahoo NSA mightve looked for (2016-10-06) blog.erratasec.com
World Anti-Doping Agency: Not all leaked docs authentic (2016-10-06) thehill.com
Yahoo scan by U.S. fell under foreign spy law expiring next year -sources (2016-10-06) www.reuters.com
Partners In The Battle Against Cyberthreats (2016-10-06) www.darkreading.com
Four reasons why election hacking is a big threat (2016-10-06) thehill.com
EU GDPR: Yahoo! Sued Over Data Breach of 500 Million Users (2016-10-06) www.itsecurityguru.org
Feds Charge Two In Lizard Squad Investigation (2016-10-06) krebsonsecurity.com
Masks Lifted on UK?s Cyber Security Unsung Heroes (2016-10-06) www.itsecurityguru.org
Arizona Official Says Hack Of Voter Data Came Via Employee Email (2016-10-06) www.darkreading.com
Execs from Facebook, Google, and Microsoft explain why they use Israel for their RD (GOOG, MSFT, FB) (2016-10-06) www.businessinsider.com
NSA Director Not Opposed To Splitting Cyber Command From Agency (2016-10-06) www.darkreading.com
Hack warnings prompt cyber security fatigue (2016-10-06) www.bbc.co.uk
NSA contractor charged with stealing secret data (2016-10-06) www.itsecurityguru.org
Animas OneTouch Ping Insulin Pump Vulnerabilities (2016-10-05) ics-cert.us-cert.gov
Yahoo email scanning prompts European ire (2016-10-05) www.reuters.com
If the election is hacked, we may never know (2016-10-05) www.pcworld.com
Clinton Foundation: Guccifer 2.0 Didnt Hack Us (2016-10-05) www.pcmag.com
Feds Charge NSA Contractor with Taking Top Secret Documents (2016-10-05) www.wired.com
Guccifer 2.0 claims to have hacked the Clinton Foundation (2016-10-05) www.pcworld.com
Half Of Cybersecurity Pros Solicited Weekly About A New Job (2016-10-05) www.darkreading.com
Detecting Ransomware Attacks with Splunk (2016-10-05) blogs.splunk.com
Cyber-Security Is Difficult To Quantify (2016-10-05) www.cxotoday.com
Feds Accuse Two 19-Year-Olds Of Hacking For Lizard Squad and PoodleCorp (2016-10-05) motherboard.vice.com
Maryland man charged with theft of classified government material (2016-10-05) www.reuters.com
BRIEF-Accenture to acquire Defense Point Security to bolster cybersecurity services (2016-10-05) www.reuters.com
FBI Arrests NSA Contractor on Suspicion of Leaking Hacking Tools (2016-10-05) motherboard.vice.com
BuzzFeed hacked by group after outing an alleged member (2016-10-05) thehill.com
The FBI Has Arrested an NSA Contractor for Allegedly Stealing Classified Material (2016-10-05) www.motherjones.com
Security Experts Say New NSA Leak Should Remind Businesses To Protect Against Insiders (2016-10-05) www.crn.com
Symantec, VMware Strike Cyber-Security Deal (2016-10-05) www.cxotoday.com
Was Yahoos mass wiretap legal? (2016-10-05) www.theverge.com
The Yahoo Scans Closely Followed Obamas Cybersecurity Emergency Declaration (2016-10-04) www.emptywheel.net
Exclusive: Yahoo secretly scanned customer emails for U.S. intelligence (2016-10-04) www.reuters.com
A Web API ecosystem through featurebased reuse (2016-10-04) arxiv.org
Overnight Cybersecurity: Yahoo surveillance sparks outrage from privacy advocates (2016-10-04) thehill.com
Watch Out Gamers: Hacked Steam Accounts Distributing Malware (2016-10-04) www.itsecurityguru.org
A former insider says Marissa Mayer kept secrets from Yahoo?s security team more than once (YHOO) (2016-10-04) www.businessinsider.com
US and China in Cyberspace (2016-10-04) www.schneier.com
Wikileaks Is Making a Twitter Army to Fight Against Misinformation (2016-10-04) motherboard.vice.com
Relentless DDoS Attack Incidents Raise Alarm For Businesses (2016-10-04) www.darkreading.com
Alleged Guccifer 2.0 hack of Clinton Foundation raises suspicions (2016-10-04) thehill.com
?Guccifer 2.0? Is Bullshitting Us About His Alleged Clinton Foundation Hack (2016-10-04) motherboard.vice.com
US tech giants say they didnt do Yahoo-style email spying (2016-10-04) www.pcworld.com
Why to Prioritize Your API Strategy Before Your API Design (2016-10-04) www.programmableweb.com
South Korean military cyber command hacked by injecting malicious codes into routing server (2016-10-04) www.itsecurityguru.org
How Did the Feds Get Past Yahoo?s Encryption? Yahoo! (2016-10-04) www.wired.com
Yahoo secretly built a tool to scan all email in realtime for US spies (2016-10-04) boingboing.net
Yahoo helped US spies scan all its emails in real time for a single phrase (2016-10-04) www.theverge.com
Yahoo Reportedly Scanned Millions of Email Accounts for Intelligence Agencies (2016-10-04) time.com
Yahoo scanned customer emails for US intelligence agencies: report (2016-10-04) thehill.com
Snowden?s favorite messaging app receives first federal subpoena (2016-10-04) thehill.com
Yahoo Email Surveillance: the Next Front in the Fight Against Mass Surveillance (2016-10-04) www.eff.org
Have hackers turned my printer into an offensive weapon? (2016-10-04) www.bbc.co.uk
Johnson Johnson says people with diabetes dont need to worry about potentially lethal wireless attacks on insulin pumps (2016-10-04) boingboing.net
Newsweek Site Suffered DDoS Attack After Trump Report (2016-10-04) www.darkreading.com
Yahoo Open Sources Porn-Hunting Neural Network (2016-10-04) www.pcmag.com
FBI Tells Users To Protect Their Data (2016-10-04) www.darkreading.com
Cyber-Anything-As-A-Service: Should The Government Just Outsource Everything? (2016-10-04) www.darkreading.com
Threat Group 4127 Targets Hillary Clinton Presidential Campaign (2016-10-03) www.secureworks.com
Software backward compatibility undocumented APIs and importance of history etc (2016-10-03) www.codeproject.com
Overnight Cybersecurity: Trump unveils cyber plans (2016-10-03) thehill.com
Smart device malware behind record DDoS attack is now available to all hackers (2016-10-03) www.pcworld.com
Beneath the Smart City (2016-10-03) datasmart.ash.harvard.edu
16 Innovative Cybersecurity Technologies Of 2016 (2016-10-03) www.darkreading.com
IoT DDoS Attack Code Released (2016-10-03) www.darkreading.com
Who Makes the IoT Things Under Attack? (2016-10-03) krebsonsecurity.com
Apple v. FBI (2016-10-03) cyberlaw.stanford.edu
Israeli Firm Claims It Can Break WhatsApp?s Encryption from Backpack (2016-10-03) www.itsecurityguru.org
Private pictures of Kate Moss LEAKED after sister Lottie?s Facebook is hacked (2016-10-03) www.itsecurityguru.org
Week ahead in cyber: Lawmakers wary of DHS role in election security (2016-10-03) thehill.com
Trump calls for U.S. to use offensive cyberweapons (2016-10-03) www.pcworld.com
National Cyber Security Centre HQ operational (2016-10-03) www.itsecurityguru.org
Source Code For World?s Largest DDoS Attack Out In Public: Mirai Botnet Will Allow More Hackers To Unleash Mayhem (2016-10-03) www.itsecurityguru.org
Trump Calls For ?Crippling? Cyberwar Attack Capabilities (2016-10-03) www.wired.com
Brief of Amici Curiae IPhone Security and Applied Cryptography Experts in support of Apple, Inc.s Motion to Vacate Order Compelling Apple, Inc. to Assist Agents in Search, and Opposition to Governments Motion to Compel Assistance (2016-10-03) cyberlaw.stanford.edu
Hackers Attacked Voter Registration Systems Of 20 US States, Says Official (2016-10-03) www.darkreading.com
Code behind record-breaking cyberattack made public (2016-10-03) thehill.com
Trump vows #039;cyber review team#039; in new policy proposal (2016-10-03) thehill.com
The Russians are not coming; they#039;re already here (2016-10-02) thehill.com
Hacker Releases Code That Powered Record-Breaking Botnet Attack (2016-10-02) motherboard.vice.com
No sign that US voting systems have been hacked ? yet (2016-10-02) disruptiveviews.com
Metaphors of Big Data (2016-10-01) dismagazine.com
U.S. says hackers probed voting systems, no sign of damage (2016-10-01) www.reuters.com
HTTP Status Trek REST Fest 2016 (2016-10-01) apihandyman.io
?Shadow Brokers? Whine That Nobody Is Buying Their Hacked NSA Files (2016-10-01) motherboard.vice.com
Tweet: #FBI: ldquo; #Snowden has redefined how the private sector shares information with the United States government.rdquo; https://t.co/tEhtlwokF3 (2016-09-30) twitter.com
Newsweek hit with cyberattack after posting Trump Cuba story (2016-09-30) thehill.com
National Cyber Incident Response Plan Now Available For Public Comment (2016-09-30) www.dhs.gov
The Hacking of Yahoo (2016-09-30) www.schneier.com
Importance of Cyber Security driven home with 145,000 DVRs compromised (2016-09-30) www.eagleeyenetworks.com
Cybercriminals Superior Business Savvy Keeps Them Ahead (2016-09-30) www.darkreading.com
Guilty plea for Syrian Electronic Army accomplice (2016-09-30) www.bbc.co.uk
What drones mean for surveillance (2016-09-29) gcn.com
How to fix CORS problems Restlet We Know About APIs (2016-09-29) restlet.com
Cooperative, Dynamic Twitter Parsing and Visualization for Dark Network Analysis (2016-09-29) my.nps.edu
?Money Mule? Gangs Turn to Bitcoin ATMs (2016-09-29) krebsonsecurity.com
Decrypting The Dark Web: Patterns Inside Hacker Forum Activity (2016-09-29) www.darkreading.com
FBI reports more attempts to hack voter registration system (2016-09-29) www.pcworld.com
Distributed Censorship or Extortion? The IoT vs Brian Krebs (2016-09-29) hackaday.com
Social media in defence intelligence gathering (2016-09-29) www.defenceweb.co.za
Broadband access creeps along but DDoS attacks explode (2016-09-29) techcrunch.com
How 1.5 Million Connected Cameras Were Hijacked to Make an Unprecedented Botnet (2016-09-29) motherboard.vice.com
How A Pair Of Cybercriminals Scales Its Carder Business (2016-09-29) www.darkreading.com
Yahoo Hackers Were Criminals Rather Than State-Sponsored, Security Firm Says (2016-09-28) www.wsj.com
Google Steps Up to Protect Security Analyst from Humongous DDoS (2016-09-28) medium.com
Project Shield Has Krebs on Securitys Back (2016-09-28) www.technewsworld.com
Google Steps Up to Protect Security Analyst from Humongous DDoS (2016-09-28) medium.com
Announcing the OpenSource beaR Library (2016-09-28) www.esa.doc.gov
What is API Design (2016-09-28) api-university.com
EU mulls amending controversial cyber export rules (2016-09-28) thehill.com
Russian Hackers Target Citizen Journalists Reporting On Malaysian Airlines Crash (2016-09-28) www.darkreading.com
FBI Now Pretty Sure Russia Is Behind Anti-Clinton Hacking (2016-09-28) www.motherjones.com
Brad Pitt death hoax is actually malware that can destroy phones and computers and expose sensitive information to hackers (2016-09-28) www.itsecurityguru.org
Cyber firm challenges Yahoo claim hack was state-sponsored (2016-09-28) www.reuters.com
Syrian Electronic Army hacker pleads guilty in Virginia (2016-09-28) thehill.com
Virlock Could Be the Ransomware Super Flu (2016-09-28) continuum.cisco.com
Here?s how security cameras drove the world?s biggest DDoS attack ever (2016-09-28) www.itsecurityguru.org
Europol identifies eight main cybercrime trends (2016-09-28) www.itsecurityguru.org
Cybereason Employs Israeli Defense Force Cyber Security Expertise to Combat Data Breach Frustration (2016-09-28) www.crn.com
Common Cyber Security Mistakes and How to Avoid Them (2016-09-28) www.itsecurityguru.org
Meet Apache Spot, a new open source project for cybersecurity (2016-09-28) www.pcworld.com
EU seeks to tighten cyber-security dual-use exports (2016-09-28) www.reuters.com
Why the silencing of KrebsOnSecurity opens a troubling chapter for the ?Net (2016-09-27) arstechnica.com
How to Build a Social Media Army (2016-09-27) blog.hubspot.com
Facebook tells U.S. judge it takes terroristic threats seriously (2016-09-27) www.reuters.com
Russian Cyberspies Use ?Komplex? Trojan to Target OS X Systems (2016-09-27) www.itsecurityguru.org
Sharing Cybersecurity Threat Intelligence Is The Only Way We Win (2016-09-27) www.darkreading.com
Hate spam emails? This man built a bot to annoy spammers until they give up (2016-09-27) www.itsecurityguru.org
A Voice Cuts Through, and Adds to, the Intrigue of Russia?s Cyberattacks (2016-09-27) www.nytimes.com
Security man Krebs? website DDoS was powered by hacked Internet of Things botnet (2016-09-27) www.itsecurityguru.org
How the FBI defends against insider threats (2016-09-27) www.zdnet.com
Cyber criminals now offering ?crime-as-a-service? (2016-09-27) disruptiveviews.com
Building the Cybersecurity Workforce (2016-09-27) www.dhs.gov
Yahoos massive password breach is the security equivalent of ecological disasters (2016-09-27) www.businessinsider.com
FAA Advisory Body Recommends Cybersecurity Measures (2016-09-27) www.wsj.com
UK plc wants tougher cyber regulation and more punishment for failings (2016-09-27) www.itsecurityguru.org
Senator to SEC: You Need to Investigate Yahoo Breach (2016-09-27) www.pcmag.com
Yahoo?s Password Breach Could Have Wide-reaching Consequences (2016-09-27) time.com
Yahoos claim of state-sponsored hackers meets with skepticism (2016-09-27) www.pcworld.com
Cyber Risk Among Top Concerns For Business Leaders: Study (2016-09-26) www.darkreading.com
Hackers Are Trying to Hold a Los Angeles Investment Bank to Ransom (2016-09-26) motherboard.vice.com
Cyber Crooks Use IoT Devices To Launch DDoS Attacks: Report (2016-09-26) www.cxotoday.com
What The WADA Hack Proves About Todays Threat Landscape (2016-09-26) www.darkreading.com
Cyber Security Still A Major Concern In Asia: Study (2016-09-26) www.cxotoday.com
Back Online, Krebs Laments Use of DDoS Attacks to Censor Speech (2016-09-26) www.pcmag.com