Cybersecurity News

These are the news items I've curated in my monitoring of the API space that have some relevance to the terms of service conversation and I wanted to include in my research. I'm using all of these links to better understand how the space is testing their APIs, going beyond just monitoring and understand the details of each request and response.

Title Source Visit
Why Startups Need an API (2012-04-21) tune.com
OData and Impact on API Design (video slides) (2012-06-03) apigee.com
API Design from Apigee - 3rd Edition (2013-01-16) apigee.com
API Design Development Guidelines (2013-02-16) dzone.com
New API Blueprint Format Basics?The Apiary Blog (2013-02-21) blog.apiary.io
Designing A RESTful API That Doesnt Suck (2013-03-24) devo.ps
Creative Market Launches Photoshop Extension, Announces Upcoming Release of New API (2013-04-11) www.programmableweb.com
Connecting with APIs (2013-04-16) www.mashery.com
Machine Sensor Data, APIs and Productivity (2013-04-18) www.mashery.com
APIs are changing the game for data delivery (2013-04-23) www.mashery.com
Sports APIs ? A Perfect Fit (2013-04-25) www.mashery.com
Designing APIs for Humans (2013-04-25) john-sheehan.com
Want to Attract Developers to your API? Set Them Free (2013-04-26) www.mashery.com
API Design from Apigee (2013-04-26) apigee.com
API Design and Documentation (2013-04-26) www.digitalgov.gov
API Design and Architecture Boot Camp from Layer 7 (2013-04-26) www.ca.com
REST API Design Rulebook (2013-04-26) shop.oreilly.com
Three Ways to Think About API Design (2013-04-26) www.programmableweb.com
White House API Standards (2013-04-26) github.com
Stop Designing Fragile Web APIs by Mathieu Fenniak (2013-04-29) mathieu.fenniak.net
Platform Success Strategies: Communicate the Value of Your API (2013-04-30) www.mashery.com
Mashery + Intel = The Ultimate Mashup (2013-05-09) www.mashery.com
Omni-channel Explosion: Mashery Signs Strategic Agreement with NetSuite (2013-05-16) www.mashery.com
Consistency is Key When Designing APIs (2013-05-22) blog.strikeiron.com
Flying Higher with APIs (2013-05-23) www.mashery.com
Big Data, IoT, API...Newer technologies protected by older security (2013-05-30) www.mashery.com
API Hierarchy of Needs | API UX (2013-05-30) apiux.com
Swagger with WSO2 API Manager (2013-05-31) blog.cobia.net
Why you should treat your API like a product (2013-06-04) www.mashery.com
APIs vs. The Myth of the Omnichannel Retailer (2013-06-05) www.mashery.com
API Management ? The New Black? (2013-06-05) www.mashery.com
Web API Design Cookbook (2013-06-11) www.w3.org
API Design Wiki (2013-06-11) wiki.apidesign.org
Designing Hypermedia APIs (2013-06-11) www.designinghypermediaapis.com
RESTful APIs: White House Sets The Standard(s) (2013-06-17) www.programmableweb.com
API Design: Honing in on HATEOAS (2013-06-17) apigee.com
Data-Driven Aesthetics (2013-06-19) www.nytimes.com
When Good API Design is a Waste of Time (2013-06-19) www.apiacademy.co
API Design: Harnessing HATEOAS, Part 1 (2013-06-20) apigee.com
Get packing with Masherys API Packager (2013-06-21) www.mashery.com
Present your API as a Product ? API Portal Presentation Best Practices (2013-06-26) www.mashery.com
Better Rest API design 1 (2013-06-27) hao-deng.blogspot.com
Practical API Design: Confessions of a Java Framework Architect (2013-06-29) tinydl.com
Presenting your API as a Product ? Designing your API for Data Exchanges (2013-07-01) www.mashery.com
API Crafting Secrets: Into Flightstats APIs (2013-07-02) www.3scale.net
Signs youre veering from good API design (2013-07-03) blog.apiaxle.com
API Design: Harnessing HATEOAS, Part 2 (2013-07-03) blog.apigee.com
API Design: A New Model for Pragmatic REST (2013-07-04) blog.apigee.com
Treat Your API Users as Customers (2013-07-09) www.mashery.com
Micro Service Architecture (2013-07-09) yobriefca.se
Unlock your datas Potential - Treat your APIs as Products (2013-07-12) www.mashery.com
Joshua Bloch: Bumper-Sticker API Design (2013-07-27) www.infoq.com
4 Fresh Rotten Tomatoes API Integrations (2013-07-31) www.mashery.com
The Future of TV and APIs (2013-08-01) www.mashery.com
HOW USA TODAYS API POWERS PARTNERSHIPS (2013-08-06) www.mashery.com
The Importance of Impermanence in API Design (2013-08-06) www.programmableweb.com
The Future of Medical Technology is Already in Your Hands (2013-08-08) www.mashery.com
The Secrets of Awesome JavaScript API Design (2013-08-16) dzone.com
Api Design, Part 1: Rest Is The Leading But Not Only... (2013-08-20) www.forrester.com
Api Design, Part 3: Make Transactions And Error Handling... (2013-08-20) www.forrester.com
Api Design, Part 4: Future-proof And Secure Your Apis... (2013-08-20) www.forrester.com
Api Design, Part 2: Design Messaging Styles By Balancing... (2013-08-20) www.forrester.com
Designing APIs for Asynchrony (2013-08-24) blog.izs.me
MASHERY I/O DOCS - DOCS THAT ROCK (2013-08-27) www.mashery.com
JSON and XML (2013-09-03) developer.infoconnect.com
Learn how to find the Opportunity of Data at the 2013 Business of APIs Conference in San Francisco (2013-09-05) www.mashery.com
Apiary Is Growing (2013-09-17) blog.apiary.io
New API Blueprint available at Apiary (2013-10-02) blog.apiary.io
RAML - RESTful API modeling language (2013-10-02) raml.org
No more outdated API documentation! (2013-10-10) blog.apiary.io
How To Test REST API with API Blueprint and Dredd (2013-10-17) blog.apiary.io
APIs At The Heart of your Mobile App Strategy (2013-10-28) blog.akana.com
Designing APIs for the Internet of Things (IoT) (2013-10-30) www.apiacademy.co
More Thoughts on an API Commons (2013-11-10) www.3scale.net
The Human Aspects of API Design: An Interview with Apiarys Jakub Nesetril (2013-11-14) www.infoq.com
Jakub Nesetril, CEO of Apiary on Web APIs and Developer Experience (2014-01-28) www.infoq.com
Application Programming eXperience: It?s all about *X - Mobile Apps Stuff (2014-01-28) manfredbo.tumblr.com
A Practical? by D. Keith Casey Jr (2014-02-27) leanpub.com
FloridaSU Expands Innovation Lab with Cube 3D Printers (2014-02-28) www.3dsystems.com
API documentation made beautiful with Apiary.io (2014-02-28) www.itworld.com
APIs, Connectors and Integration Applications (2014-04-17) blogs.mulesoft.com
Toward a Lean API Strategy (2014-05-29) www.apiacademy.co
JSON vs simpleJSON vs ultraJSON (2014-06-02) blog.dataweave.in
API Manager ? Simple JAVA Client Access Example (2014-06-03) blogs.mulesoft.com
Wearables and Devices Will Drive a New Paradigm in Managing Clinical Data (2014-06-05) www.mashery.com
Happiness is a well-designed API | ZDNet (2014-06-06) www.zdnet.com
The Connected K-9 (2014-06-09) www.mashery.com
What is the ?Internet of Things? and how does it relate to APIs? (2014-06-13) www.mashery.com
New eBook: APIs and IT Rationalization (2014-06-16) apigee.com
Why You Should Care Netflix is Shuttering Its Public API (2014-06-18) blogs.mulesoft.com
Designing Irresistible APIs (2014-06-19) www.princesspolymath.com
What is a Developer Evangelist? (2014-06-23) www.mashery.com
API-Centric Data Architectures - Part II (2014-06-24) apigee.com
Hot off the press: 18Fs API Standards (2014-07-15) 18fblog.tumblr.com
Hot off the Press: 18F?s API Standards (2014-07-16) www.digitalgov.gov
The Real World Cup Winner: APIs (2014-07-16) blogs.mulesoft.com
Legos vs APIs ? Top Integration and API Articles of the Week (2014-07-18) blogs.mulesoft.com
HTTP Response Codes and You | OP3Nvoice (2014-07-23) clarify.io
Don?t just throw APIs at the problem! (2014-07-24) blogs.mulesoft.com
Upcoming Webinar ? Integrating Salesforce and SAP (2014-07-25) blogs.mulesoft.com
APIs: The Key to Surviving a Zombie Apocalypse? (2014-07-25) www.mashery.com
Best Practices REST API from Scratch - Introduction (2014-07-25) www.sitepoint.com
Introducing the Anypoint Platform for APIs (2014-07-30) blogs.mulesoft.com
Reaffirming Intel Services? Connection with Developers and Open Source at OSCON (2014-07-30) www.mashery.com
API Management 2.0: Empowering the Enterprise for the Third Industrial Revolution (2014-07-31) www.mashery.com
Four Big Mistakes In Your REST API Strategy (2014-08-04) blog.dreamfactory.com
Stop Talking About Hypermedia and REST - Start Building Adaptable APIs (2014-08-05) www.mashery.com
Building an easier on-ramp: Introducing the Anypoint Templates Library (2014-08-06) blogs.mulesoft.com
Healthcare APIs: Just What the Doctor Ordered (2014-08-07) www.mashery.com
Retail Industry APIs and API Management: Helping Us Shop Til? We Drop (2014-08-14) www.mashery.com
RAML: THE BIRTH OF AN API DESCRIPTION LANGUAGE FIT FOR THE ENTERPRISE (2014-08-15) blog.akana.com
Integrating Mule ESB with .NET Based Rules Engines (2014-08-19) blogs.mulesoft.com
MuleSoft Summit Heads to Chicago New York (2014-08-20) blogs.mulesoft.com
A drive by review of the Uber API (2014-08-20) www.bizcoder.com
Creating Bottom Line Growth by Aligning APIs and Market Trends (2014-08-21) www.mashery.com
Bizcoder - A drive by review of the Uber API (2014-08-21) bizcoder.com
Designing APIs for the Web (2014-09-25) tehparadox.com
API Readiness: do you have what you need? (2014-09-25) blog.smartbear.com
WillowTree Apps Applies Service Virtualization to API Development (2014-09-25) www.programmableweb.com
(2014-09-26) www.futureinsights.com
REST APIthy: #ReadFielding (2014-12-02) rest-apithy.blogspot.ca
Restlet Studio, the First Cross-Language IDE for APIs (2014-12-03) restlet.com
Constructing URLs the easy way (2014-12-03) www.bizcoder.com
The Core of Your API (2014-12-23) www.windley.com
Does One API Description Language Fit an Entire Enterprise (2015-01-06) blog.soa.com
Connecting Our History At The Digital Public Library of America Using APIs And JSONLD (2015-01-06) apievangelist.com
Server Skeletons In Restlet Studio And APISpark (2015-01-06) apievangelist.com
FBI: North Korea ?got sloppy? with IP addresses in Sony hack (2015-01-07) gigaom.com
Introducing the Organization Component in Codenvy (2015-01-22) blog.codenvy.com
Improving Cyber Security In 2015: Weil (2015-01-22) www.valuewalk.com
Why you must design your private API in english API Handyman (2015-02-08) apihandyman.io
A Guide to REST API Design (2015-02-16) www.apiacademy.co
A Whole New Era of Cyber-Terror Coming Your Way! (2015-02-16) dwellc.wordpress.com
Connect your TV, home, even your body, to the internet. But beware hackers (2015-02-16) www.theguardian.com
apiaryioapiblueprint Gitter (2015-02-17) gitter.im
Utilising API Blueprint in API Clients (2015-02-17) blog.apiary.io
How API Description Languages Enable API IDEs (2015-02-18) www.programmableweb.com
Community Debates API Specification Alternatives (2015-02-18) www.infoq.com
Collaborators New External API (2015-02-19) blog.smartbear.com
Using Templates for Documentation Driven API Design (2015-02-19) nordicapis.com
LucyBot Eliminates CrossLanguage Programming Necessity (2015-02-20) www.programmableweb.com
MuleSoft Releases RAML NET Parser Visual Studio Extension (2015-02-20) www.programmableweb.com
API Best Practices The Wrap Up (2015-02-20) blogs.mulesoft.com
LucyBot Get your APIs consumers moving faster (2015-02-20) lucybot.com
Using Templates For Documentation Driven API Design (2015-02-21) nordicapis.com
A Guide to REST API Design API Academy (2015-02-21) www.apiacademy.co
My Brain Dump On An API Definition Fueled Life Cycle (2015-02-22) apievangelist.com
What Makes an Agile API (2015-02-24) nordicapis.com
Metadesign The intersection of art design and computation (2015-02-24) radar.oreilly.com
The White House establishes a new agency to collect cyber security intelligence (2015-02-26) thenextweb.com
Bizcoder Dont Design A Query String You Will One Day Regret (2015-02-26) www.bizcoder.com
The beautiful API and the bestial backoffice API Handyman (2015-02-27) apihandyman.io
Hypermedia API maturity model Part I Hypermedianess (2015-02-28) apihandyman.io
The Democratization of Cyberattack (2015-03-02) www.schneier.com
Dropbox starts using POST and why this is poor API design (2015-03-02) evertpot.com
Common Cases When Using SOAP Makes Sense (2015-03-02) nordicapis.com
ApplicationLevel Profile Semantics ALPS (2015-03-02) tools.ietf.org
Metadesign The intersection of art design and computation OReilly Radar (2015-03-02) radar.oreilly.com
My API Design Research (2015-03-03) apievangelist.com
Dropbox Sparks Controversy With API Design Decision (2015-03-03) www.programmableweb.com
Apigee Product Highlight Video SmartDocs (2015-03-03) apigee.com
POST effyouthisistherighturl RESTful API Design (2015-03-04) blog.cloud-elements.com
(2015-03-04) apievangelist.com
We Need An Open Library Of The Most Common Utility API Implementations (2015-03-07) apievangelist.com
Ideal REST API design betim drenicas blog (2015-03-09) betimdrenica.wordpress.com
Targeting Some APIs In My Stack For House Cleaning And Maybe Some Design Iterations (2015-03-09) apievangelist.com
Facebook Applies Versioning Strategy to Marketing API (2015-03-10) www.programmableweb.com
Cyveillance Partners with Centripetal Networks Inc. to Deliver Actionable Threat Intelligence (2015-03-10) api.report
CyberPatriot: Training Future Cyber and STEM Leaders (2015-03-11) blogs.splunk.com
Augmenting A Read Only API With AN External POST PUT And DELETE (2015-03-12) apievangelist.com
Cyveillance Blog ? The Cyber Intelligence Blog Cyveillance Weekly Cyber Security Trends Report (2015-03-12) www.lookingglasscyber.com
Wyden: Cybersecurity Bill Lacks Privacy Protections, Doesn?t Secure Networks (2015-03-12) www.wyden.senate.gov
10 Usability Lessons for APIs (2015-03-14) www.linkedin.com
Why Your APIs Need Design Help (2015-03-16) www.digitalgov.gov
Designing a Web API (2015-03-16) restlet.com
20 API Design Tips to Stop Annoying Developers (2015-03-17) jergames.blogspot.com
The API Field of Dreams Build It Correctly and They Will Come (2015-03-18) www.developer.com
I have my opinions on API design (2015-03-20) bryson3gps.wordpress.com
HTML6 APIs as Natural Friends (2015-03-21) blog.smartbear.com
APIs arent apps Make them as thin and light as possible (2015-03-23) www.infoworld.com
?Threat-sharing? bill proposed to counter cybersecurity threats (2015-03-25) disruptiveviews.com
The ways of the API smartness (2015-03-28) apihandyman.io
eCommerce API Design The Good The Bad and The Etsy API (2015-03-30) cloud-elements.com
Bizcoder API Design Notes Smart Paging (2015-03-31) www.bizcoder.com
InfoQ eMag Web APIs From Start to Finish (2015-03-31) www.infoq.com
How to Decide How Many HTTP Status Codes Your API Needs (2015-04-02) www.programmableweb.com
JSON API Spec Goes Through The Hacker News Gauntlet (2015-04-06) www.programmableweb.com
In a REST world theres room for nonREST APIs (2015-04-07) www.programmableweb.com
Building Reusable REST API Services Part 3 of 4 (2015-04-08) blog.dreamfactory.com
418 Im a teapot and other bad API responses (2015-04-09) cloud-elements.com
Solving Dropboxs URL Problems (2015-04-10) www.bizcoder.com
Bizcoder Solving Dropboxs URL Problems (2015-04-10) www.bizcoder.com
The Great Cannon Is Chinas Powerful New Hacking Weapon (2015-04-13) motherboard.vice.com
China Reportedly Has A New Internet Censorship Weapon Called The Great Cannon (2015-04-13) www.buzzfeed.com
API Part of the Creative Palette (2015-04-14) nordicapis.com
REST API design tips (2015-04-19) kwtrnka.wordpress.com
A SIEM is not enough: moving to a complete cyber security solution (2015-04-20) www.ikanow.com
Introduction to Apiary Overview of Apiary and How to Create APIs (2015-04-20) www.developer.com
HTTP Verbs Demystified PATCH PUT and POST (2015-04-21) cloud-elements.com
Computer Attacks Spur Congress to Act on Cybersecurity Bill Years in Making (2015-04-22) www.nytimes.com
The data the hypermedia and the documentation (2015-04-23) apihandyman.io
House passes cybersecurity bill that threatens privacy without clear security benefits (2015-04-23) pando.com
Api Design AntiPatterns (2015-04-25) www.slideshare.net
White House Takes Cybersecurity Pitch to Silicon Valley (2015-04-26) www.nytimes.com
Understand about DELETE Verb in Web API RESTful Services using Data from Both Request Body As Well As URI (2015-04-28) www.codeproject.com
A Day in the Life of a Stolen Healthcare Record (2015-04-29) krebsonsecurity.com
The Role of the API Designer (2015-05-03) blog.apiary.io
Survey Results: Big Opportunity for Big Data in Cybersecurity (2015-05-04) blogs.splunk.com
Assuring Authority for Courts to Shut Down Botnets (2015-05-04) www.justice.gov
Guest Post Why The API Pattern Is Broken And How We Can Fix It (2015-05-05) apievangelist.com
A cybersecurity firm is being accused of faking hacks to squeeze money out of clients (2015-05-07) www.businessinsider.com
Nearly all web APIs get paging wrong (2015-05-08) vermorel.com
State Department: U.S. Concerned About Possible Chinese Cyberattack On Internet Content (2015-05-08) www.huffingtonpost.com
Do you really know why you prefer REST over RPC (2015-05-10) apihandyman.io
A Guide to REST and API Design (2015-05-11) transform.ca.com
FBI seeks cyber threat info-sharing platform (2015-05-13) gcn.com
Versioning APIs (2015-05-15) blog.clearbit.com
Did this cybersecurity firm use a data breach for extortion? (2015-05-19) www.theverge.com
Restlet and SmartBear Partner to Deliver Restlet Studio Plugin for Ready API (2015-05-20) restlet.com
7 Important API Design Lessons (2015-05-21) nordicapis.com
Apigee adds some Swagger to API design (2015-05-21) www.pcadvisor.co.uk
Apigee API Studio Designing Testing and Sharing APIs (2015-05-21) www.infoq.com
Cybercrime poses a potential existential threat to our society, and were completely unprepared (2015-05-22) www.businessinsider.com
RESTful API Design Part III Error Handling (2015-05-26) blog.cloud-elements.com
Article From Doodles to Delivery An API Design Process (2015-05-26) www.infoq.com
Palo Alto Networks acquires cybersecurity company CirroSecure (2015-05-27) www.zdnet.com
MOOC on Cybersecurity (2015-05-28) www.schneier.com
How to build APIs efficiently (2015-05-30) api-university.com
US says it will help Japan defend against cyberattacks (2015-05-31) www.theverge.com
The Business of Cybercrime (2015-06-01) www.huffingtonpost.com
Article The Power of RAML (2015-06-02) www.infoq.com
Integrations are Hard Part II API Resources Search and Pagination (2015-06-03) cloud-elements.com
Top 5 Development Tips for a Killer API (2015-06-04) nordicapis.com
Why Not To Overlook API Planning And What To Do About It (2015-06-04) www.programmableweb.com
Visions Of My Perfect API Design Editor Using Electron (2015-06-04) apievangelist.com
Decoupling the Mind of the API Designer (2015-06-09) blog.apiary.io
New JSON API Specification Aims to Speed API Development (2015-06-10) www.programmableweb.com
Using API Definitions To Help API Providers With Their API Design Roadmap (2015-06-10) apievangelist.com
Splitting My Blog API Into Two Separate APIs For News And Analysis (2015-06-10) apievangelist.com
A Tale of Four API Designs Dissecting Common API Architectures (2015-06-11) nordicapis.com
Senate Rejects Measure to Strengthen Cybersecurity (2015-06-11) www.nytimes.com
I.R.S. Increases Efforts to Prevent Identity Theft and Fraud (2015-06-11) www.nytimes.com
White House Weighs Sanctions After Second Breach of a Computer System (2015-06-12) rss.nytimes.com
Why this security breach is worse than all the others combined (2015-06-12) caseysoftware.com
Decoupling the Mind of the API Designer (2015-06-12) blog.apiary.io
Private security clearance info accessed in second OPM breach (2015-06-15) www.scmagazine.com
Cybersecurity Teams for State and Local Government (2015-06-16) blogs.splunk.com
OPM Background Check Hack ? A Different Angle (2015-06-17) caseysoftware.com
U.S. cyber hack unsettles, frustrates U.S. defense industry (2015-06-18) venturebeat.com
OPM?s Database for Sale? Nope, It Came from Another US .Gov (2015-06-18) krebsonsecurity.com
U.S. employee data breach tied to Chinese intelligence (2015-06-19) venturebeat.com
Lessons learnt from shipping APIs for Microsofts cloud platform (2015-06-19) sriramk.com
Breaking Down Publication References With The Global Change Information System API (2015-06-23) apievangelist.com
What is the DoDs Position on Backdoors in Security Systems? (2015-06-24) www.schneier.com
The API Design Tooling I Have Included In My Research (2015-06-29) apievangelist.com
Crooks Use Hacked Routers to Aid Cyberheists (2015-06-29) krebsonsecurity.com
Finding the best cyber security insurance for your firm (2015-06-29) disruptiveviews.com
Should the director of OPM be fired over its massive data breach? (2015-06-29) blogs.law.harvard.edu
API Design Considerations for The Internet of Things (2015-06-30) www.programmableweb.com
Why Its OK To Design Imperfect APIs (2015-06-30) www.programmableweb.com
Tightening Up The Organizations That Are Included In My API Design Research (2015-06-30) apievangelist.com
The API Design Tooling I Have Included In My Research (2015-06-30) apievangelist.com
My API Design Research Distilled Down As Single PDF Guide (2015-07-07) apievangelist.com
Now in Production DELETE page (2015-07-08) blogs.msdn.com
My API Design Research Distilled Down As Single PDF Guide (2015-07-08) apievangelist.com
Chinese hackers stole the personal information of about 7% of America from the US government (2015-07-09) www.businessinsider.com
OPM Announces More Than 21 Million Affected by Second Data Breach (2015-07-09) www.nationaljournal.com
How To Design Great APIs With APIFirst Design and RAML (2015-07-10) www.programmableweb.com
Cybercrime Kingpin Pleads Guilty (2015-07-10) krebsonsecurity.com
HTTP Status Codes httpstatuses (2015-08-10) httpstatus.es
A Common Open Source API Design Editor Is Needed For API Service Providers (2015-08-14) apievangelist.com
API development startup Apiary raises 68M and launches a testing service VentureBeat Deals by Jordan Novet (2015-08-18) venturebeat.com
Resources Not Data (2015-08-21) www.windley.com
DTO engages with developers for API design mandate (2015-08-25) www.technologydecisions.com.au
Live cyber attack map | FlowingData (2015-08-27) flowingdata.com
MuckRock ? FBI struggles to recruit private sector partners on cybersecurity (2015-08-27) www.muckrock.com
Crafting and Publishing API Design Guide Shows That You Are Further Along In Your API Journey (2015-08-28) apievangelist.com
The API Design Guide Is Just The Beginning Of The Journey Better Get Started (2015-08-28) apievangelist.com
We Need an Open Abstraction Layer to Help Us Better Define and Design Our APIs (2015-08-28) apievangelist.com
A Quick Example Of An API Provider Putting Content Type Negotiation To Work (2015-08-31) apievangelist.com
Security and the Big Data Cyber Sleuth (2015-09-09) www.tibco.com
China angry about US groundless hacking allegations (2015-09-11) disruptiveviews.com
REST in AEM by Roy Fielding (2015-09-11) www.slideshare.net
There Is A Big Opportunity Right Now When It Comes To API Design Tooling (2015-09-13) apievangelist.com
Architectural Styles for APIs SOAP REST and RPC (2015-09-13) api-university.com
Cybersecurity Bill Could Put More Personal Data in Government Hands (2015-10-22) www.motherjones.com
Controversial cybersecurity bill gains majority support (2015-10-23) disruptiveviews.com
(2015-10-24) krebsonsecurity.com
The FBI says you may need to pay up if hackers infect your computer with ransomware (2015-10-26) www.businessinsider.com
API Design Using Behavior Driven Development (2015-11-24) blog.smartbear.com
Designing Evolvable APIs for the Web Identification (2015-11-25) nordicapis.com
(2015-11-27) alpha.apievangelist.com
Daniel Jacobson on Ephemeral APIs and Continuous Innovation at Netflix (2015-11-28) www.infoq.com
Designing Evolvable APIs for the Web Formats (2015-12-08) nordicapis.com
Cyber security in 2016 (2015-12-08) www.professionalsecurity.co.uk
Understanding HTTP content negotiation (2015-12-10) restlet.com
For cyber security, machine learning offers hope beyond the hype (2015-12-11) gigaom.com
A Fun Way To Explore HTTP Status Codes With A Subway Map From Restlet (2015-12-13) dzone.com
Presentation Designfirst APIs in Practice (2015-12-16) www.infoq.com
REST Fest 2015 Glenn Block FiveInFive in REST Fest 2015 on Vimeo (2015-12-17) vimeo.com
Enhancing Your Apiary Workflow MSON Dredd Style Guides and More on Vimeo (2015-12-17) vimeo.com
inadarei Howto HTTP Caching for RESTful and Hypermedia APIs (2015-12-18) www.freshblurbs.com
Cyber-attacks against businesses ?doubled in 2015? (2015-12-23) venturebeat.com
Web API A Solid Approach (2016-01-05) www.codeproject.com
Passing Json data to a RESTful WCF 4 service using JsonNet (2016-01-07) www.codeproject.com
Mobile and IoT to Dominate Cybersecurity Threats for 2016 (2016-01-08) www.huffingtonpost.com
Public GETs In Concert With Private POST PUT And DELETE For Your APIs (2016-01-08) apievangelist.com
A Look Inside Cybercriminal Call Centers (2016-01-10) krebsonsecurity.com
API Design Inspiration on GitHub (2016-01-12) blog.apiary.io
RESTful ServiceDesign How to overcome the CRUDnature of the RESTstyle (2016-01-13) itblogs.stephanbauer.me
Firm Sues Cyber Insurer Over $480K Loss (2016-01-18) krebsonsecurity.com
IKANOW Joins Top 20 on Cybersecurity 500 List (2016-01-18) www.ikanow.com
Apiaryio Now Features Swagger Support (2016-01-19) www.programmableweb.com
Paging in ASPNET Web API (2016-01-21) www.codeproject.com
The Need for a Holistic Approach to Cybersecurity in mHealth (2016-01-22) dzone.com
Reverse Engineering APIs From The Common APIs Models We Know (2016-01-25) apievangelist.com
Cybersecurity startup Fireglass raises $20 million (2016-01-26) www.zdnet.com
Things Have Changed in Cybersecurity ? the Political Front (2016-01-26) www.ikanow.com
St. Lukes Hospital reports possible data breach involving patients info (2016-01-26) www.recordonline.com
How CloudRail Handles the Seven Deadly Annoyances of API Design (2016-01-29) cloudrail.com
Ransomware is not going away: Prepare or pay up (2016-02-01) www.redcanary.com
Cybersecurity In Postmarket Medical Devices: New Guidance From The FDA (2016-02-01) www.jdsupra.com
an online tutorial with friends (2016-02-02) www.amundsen.com
Lessons From Training 1400 People in Web API Design (2016-02-02) launchany.com
REST essentials for the QuickBooks API (2016-02-04) developer.intuit.com
Taking Stock of Cybersecurity Images (2016-02-04) blog.domaintools.com
The Impact of Cybersecurity?s Top Breaches of 2015 ? cyber incidents get bigger and go mainstream (2016-02-11) www.ikanow.com
Cybersecurity Funding Grew 234% since 2011 (2016-02-11) www.cbinsights.com
Sharing and saving your Web API design project in the cloud (2016-02-15) restlet.com
Introducing API Templates (2016-02-16) www.socketlabs.com
U.S. Had Cyberattack Planned if Iran Nuclear Negotiations Failed (2016-02-16) www.nytimes.com
Using a Prototype as an API Product Specification (2016-02-16) sendgrid.com
Why Github039s Scientist 10 Could Be Great for API Versioning (2016-02-17) www.programmableweb.com
Dear API Designer Are You Sure You Want to Return a Primitive (2016-02-17) dzone.com
Resolving the FrontendBackend API Design Conflict (2016-02-17) launchany.com
The hacked Hollywood hospital is not alone ? schools and clinics across the country are increasingly being hacked for ransom (2016-02-17) www.businessinsider.com
Resolving the FrontendBackend API Design Conflict (2016-02-17) launchany.com
Presentation 5 AntiPatterns in Designing APIs (2016-02-23) www.infoq.com
IRS: 390K More Victims of IRS.Gov Weakness (2016-02-26) krebsonsecurity.com
Interview John Sheehan on Web API Quality (2016-02-27) www.infoq.com
Utilities Cautioned About Potential for a Cyberattack After Ukraine?s (2016-02-29) www.nytimes.com
StopLight Launches Visual API Design Tools (2016-03-01) www.infoq.com
(2016-03-01) www.codeproject.com
400Gbps: Winter of Whopping Weekend DDoS Attacks (2016-03-02) blog.cloudflare.com
Cyberthreat Defense Report: Analytics Climbs to Must-have Application for 2016 (2016-03-02) www.ikanow.com
Designing Web APIs with Restlet Studio (2016-03-04) restlet.com
API Design Challenges Competing Demands (2016-03-05) www.biske.com
3 Approaches to Monadic API Design in Haskell (2016-03-08) blog.pusher.com
Designing a Web API with Restlet Studio Visual API editor (2016-03-09) restlet.com
Article One API Many Facades (2016-03-13) www.infoq.com
Designing APIs With Customers in Mind (2016-03-14) www.builtinaustin.com
Do My APIs Have The Skills They Need To Compete In A Voice And Bot Enabled World (2016-03-15) apievangelist.com
One API many facades (2016-03-16) restlet.com
Discover the attention surrounding URNs support for a new identifier (2016-03-18) www.altmetric.com
Well wishes and warnings in the Web API (2016-03-21) medium.com
Great APIs Have One Thing in Common (2016-03-22) everydeveloper.com
Hospital Declares ?Internal State of Emergency? After Ransomware Infection (2016-03-22) krebsonsecurity.com
How a DDoS campaign became an act of cyberwar (2016-03-24) www.theverge.com
A Tale of Two Chatbots Internet Ethics Views From Silicon Valley (2016-03-29) www.scu.edu
Quality API Design and Implementation through RepreZen and SmartBear (2016-03-30) www.reprezen.com
What Skills Do Your APIs Offer (2016-03-31) launchany.com
Screencast Design a web API from scratch with Restlet Studio (2016-04-01) restlet.com
RFC 7807 Problem Details for HTTP APIs (2016-04-04) tools.ietf.org
Homeland Security Dept. Struggles to Hire Staff to Combat Cyberattacks (2016-04-06) www.nytimes.com
What is a welldesigned API (2016-04-06) api-university.com
Battling the global cybersecurity challenge (2016-04-06) blogs.ca.com
CloudPassage Study Finds U.S. Universities Failing in Cybersecurity Education (2016-04-08) dzone.com
Strengthening Federal Cybersecurity (2016-04-11) gsablogs.gsa.gov
Consumeroriented API Design (2016-04-12) api-university.com
How to Improve API Errors With Defensive Design (2016-04-16) www.programmableweb.com
MIT scientists have built an AI that can detect 85% of cyber attacks ? but it still needs human help (2016-04-19) www.businessinsider.com
Build Better Mobile Apps Data and API Best Practices (2016-04-21) www.builtinchicago.org
Worlds First API Design Hackathon (2016-04-21) blog.apiary.io
Build a REST API with XML Payload (2016-04-22) dzone.com
API Names and Begging the Negatives (2016-04-22) dzone.com
The Relationship Between BDD and API Design (2016-04-23) dzone.com
REST API Design at Devoxx France (2016-04-25) restlet.com
That USB drive you found has more than just spring break photos (2016-04-25) www.chicagotribune.com
Never Put Secrets in URLs and Query Parameters (2016-04-29) www.fullcontact.com
HTTP Header Awareness Using The Link Header For Pagination (2016-05-02) apievangelist.com
Thinking About An API Proxy To Add Link Header To Each API Response (2016-05-03) apievangelist.com
IBM, 8 universities to train Watson for cybersecurity sleuthing (2016-05-10) www.zdnet.com
NIST Plans to Fend off Quantum Computers That Will Attack Encryption (2016-05-12) dzone.com
Building a great API Lessons learned from working with dozens of REST APIs (2016-05-17) blog.bugsnag.com
Facebook, LinkedIn, Twitter: The New Cyberweapons Of Choice (2016-05-18) blogs.forrester.com
RAMLing Again With API Workbench From Setup to Design (2016-05-19) dzone.com
A Consumer of a Properly Designed RESTful API Is Writing to an Interface Not an Implementation (2016-05-20) dzone.com
(2016-06-05) dzone.com
The Basics of REST and RESTful API Development (2016-06-06) www.hongkiat.com
JSONLD Building Meaningful Data APIs (2016-06-09) dzone.com
How API First Design Could Have Avoided These Failures (2016-06-14) www.programmableweb.com
API Design in Nodejs with Express (2016-06-15) shop.oreilly.com
Why Your API039s EndUsage Context Matters To Great Developer Experiences (2016-06-21) www.programmableweb.com
Why Your API039s EndUsage Context Matters To Great API Design (2016-06-21) www.programmableweb.com
Don?t get desensitized to cybersecurity threats (2016-06-21) blogs.ca.com
Three APIs Making the Case Against Building It Yourself (2016-06-29) everydeveloper.com
HTTPRPC 30 Released Announcement (2016-07-01) dzone.com
European Commission approves new investment in cybersecurity (2016-07-05) www.theverge.com
A Cambridge cybersecurity startup thats full of spies just raised $65 million (2016-07-06) www.businessinsider.com
Scaling Your API Design Workflow (2016-07-10) blog.apiary.io
Obama stresses need to improve US government cybersecurity (2016-07-10) disruptiveviews.com
Presentation REST Considered Harmful (2016-07-12) www.infoq.com
Chinese government likely hacked FDIC: report (2016-07-13) thehill.com
Overnight Cybersecurity: Guccifer 2.0 releases more DNC docs; China hacked banking regulator (2016-07-13) thehill.com
Federal Regulators Focus on Minimum Cyber Standards For Banks (2016-07-13) www.jdsupra.com
New Ransomware Takes Your Money, Deletes Files Anyway (2016-07-14) www.zdnet.com
FDIC was hacked by China, and CIO covered it up (2016-07-14) arstechnica.com
Facebook, Twitter, and YouTube blocked in Turkey during reported coup attempt (2016-07-15) techcrunch.com
API Errors Are First Class Citizens (2016-07-15) dzone.com
Foreign Policy Cyber Security | The White House (2016-07-16) www.whitehouse.gov
New HIPAA Guidance on Ransomware in Healthcare (2016-07-18) duo.com
Report: More, stronger cyber attacks to flood networks (2016-07-19) thehill.com
Bug-Hunting Computers to Compete in DARPA Cyber Grand Challenge (2016-07-19) www.defense.gov
GitHub Microsoftapiguidelines Microsoft REST API Guidelines (2016-07-19) github.com
SEC Steps Up Cybersecurity Enforcement with $1 Million Fine Against Morgan Stanley (2016-07-19) www.corporatesecuritieslawblog.com
The history of ransomware: How PC hostage-taking has evolved over the years (2016-07-20) www.pcworld.com
After 4-day cyberattack, Library of Congress returning to normal (2016-07-20) thehill.com
Hacker behind 2015 military contractor breach: #039;Hopefully it can set them back a bit#039; (2016-07-20) thehill.com
AIG launches first primary cyber insurance against liability and bodily injury (2016-07-20) news.fastcompany.com
One-third of security professionals grounded for LIFE due to messy firewall rules (2016-07-21) www.itsecurityguru.org
Microsoft REST API Guidelines Are Not RESTful (2016-07-21) www.infoq.com
Microsoft Publishes REST API Guidelines 23 (2016-07-21) www.programmableweb.com
Illinois online voter registry hacked; voter records taken (2016-07-21) thehill.com
Orgs Struggle to Recruit Skilled DDoS Personnel (2016-07-21) www.itsecurityguru.org
Cyberweapons vs. Nuclear Weapons (2016-07-22) www.schneier.com
Building Black Hat: Locking Down One Of The Worlds Biggest Security Conferences (2016-07-25) www.darkreading.com
Bank Hacks Raise Fears for Financial Sector (2016-07-25) www.itsecurityguru.org
Pornhub Hacked to Access Billions of Users? Information (2016-07-26) www.itsecurityguru.org
How predictive analytics discovers a data breach before it happens (2016-07-26) www.itsecurityguru.org
Panama Papers scandal to get Hollywood movie treatment (2016-07-26) www.reuters.com
FBI probes DNC hack for Russian involvement (2016-07-26) www.itsecurityguru.org
Can machine learning get us ahead in cyber security? (2016-07-26) disruptiveviews.com
A hacker claims to have stolen credentials to a bunch of US government sites ? and hes selling them on the dark web (2016-07-26) www.businessinsider.com
Digital Citizen Volume 4.5: Spotlight on internet shutdowns (2016-07-27) www.accessnow.org
Dozens of Lawyers Across the US Fight the FBIs Mass Hacking Campaign (2016-07-27) motherboard.vice.com
Cybersecurity startup PhishMe raises $42.5 million Series C (2016-07-27) www.zdnet.com
DNC Hack: What We Know, And What We Still Dont Known (2016-07-27) motherboard.vice.com
Code Red? White House Unveils Color-Coded Cyber-Attack Scale (2016-07-27) www.pcmag.com
Managing Information as a Strategic Resource (2016-07-28) www.whitehouse.gov
Tweet: North Korea makes Off with 10 Million e-Commerce Records https://t.co/XcMRThFSbd (2016-07-28) twitter.com
WikiLeaks methods questioned by whistleblower Edward Snowden (2016-07-29) www.pcworld.com
Russia has motive, capability and form for U.S. email hack (2016-07-29) www.reuters.com
The Security of Our Election Systems (2016-07-29) www.schneier.com
Exclusive: FBI probes hacking of Democratic congressional group (2016-07-29) www.reuters.com
Inside Dyn Research: North Korea (2016-07-29) dyn.com
South Korea: Cyberattack By North Korea Exposed Data Of 10 Million Consumers (2016-07-29) www.darkreading.com
Report: Second Democratic Party Organization Hacked (2016-07-29) www.pcmag.com
DNC Leak: US Intel Chief Says Its Too Soon To Attribute Blame (2016-07-29) www.darkreading.com
Chinese Hackers Attack Airports Across Vietnam (2016-07-29) www.infosecurity-magazine.com
Russian Hackers May Have Hit the Dems Donor Site Too (2016-07-29) www.infosecurity-magazine.com
Russia says spyware found in state computer networks (2016-07-30) www.reuters.com
Russia: Spyware Attack Hits Multitude Of Networks (2016-07-30) www.huffingtonpost.com
What?s the Future of Chinese Hacking? (2016-07-30) motherboard.vice.com
Rivals of Ransomware Program Steal Its Decryption Keys (2016-07-30) www.pcmag.com
DNC hack was not the only cybersecurity discussion at the convention (2016-08-01) blogs.ca.com
Russia Claims Uncovered Planned Cyber-Attack on Government, Military (2016-08-01) www.itsecurityguru.org
Spies planted malware on critical infrastructure, Russian security service says (2016-08-01) www.pcworld.com
Cybercrime infrastructure being ramped up in Brazil ahead of Olympics (2016-08-01) www.pcworld.com
DCCC hackers#039; email appears connected to Russian intel (2016-08-01) thehill.com
U.S. weighs dangers, benefits of naming Russia in cyber hack (2016-08-01) www.reuters.com
North Korea Hacked Into Emails of Seoul Officials: Report (2016-08-01) www.itsecurityguru.org
Clinton Campaign: Voter Analytics Program Compromised, Not Internal Systems (2016-08-01) www.darkreading.com
Hackers allegedly take over airport screens to blast insults about the South China Sea (2016-08-01) www.itsecurityguru.org
Russia claims it, too, is victim of state hacking. (2016-08-01) thehill.com
Machines versus hackers? (2016-08-01) www.bbc.co.uk
What to Do About Lawless Government Hacking and the Weakening of Digital Security (2016-08-01) www.eff.org
Kremlin: Claims Russia hacked DNC a cover-up (2016-08-01) thehill.com
South Korea alleges North hacked 56 government officials (2016-08-01) thehill.com
Extracting Social Network Graphs from DNC Emails (2016-08-02) dzone.com
Cybersecurity Tips for the Rio Olympics (2016-08-02) www.us-cert.gov
Big rigs can be hijacked and driven with software-based attacks (2016-08-02) boingboing.net
Another Day, Another Cyber-Attack on Lawfare (2016-08-02) www.lawfareblog.com
FBI took months to warn Democrats of suspected Russian role in hack: sources (2016-08-02) www.reuters.com
Hack Brief: Hackers Breach the Ultra-Secure Messaging App Telegram in Iran (2016-08-02) www.wired.com
Exclusive: Hackers accessed Telegram messaging accounts in Iran - researchers (2016-08-02) www.reuters.com
Famed hacker creates new ratings system for software (2016-08-02) www.reuters.com
FBI denies Senate panel#039;s request for Dem party hack briefings (2016-08-02) thehill.com
Bangladesh seeks $63 million from Philippine bank used in cyber heist (2016-08-02) thehill.com
Iranian hackers called ?Rocket Kitten? go spearphishing on Telegram (2016-08-02) disruptiveviews.com
What to Expect at Black Hat 2016 (2016-08-02) www.pcmag.com
Iranians connected to phishing attempt on tortured Syrian activist (2016-08-02) boingboing.net
Millions of Yahoo Accounts Pop Up for Sale on the Dark Web (2016-08-02) www.pcmag.com
Cybersecurity Architecture: The Modern Data Plane (2016-08-02) dzone.com
Magnetic stripes vulnerable to hackers, shows researcher (2016-08-02) thehill.com
Hackers compromise dozens of Telegram chat accounts in Iran (2016-08-02) www.theverge.com
Trader pleads guilty in newswire hack scheme (2016-08-02) thehill.com
Victory! Oregon Supreme Court Agrees that Violating a Company Rule is Not a Computer Crime (2016-08-02) www.eff.org
Three more top DNC officials are resigning after email hack (2016-08-02) www.theverge.com
Kazakh dissidents and lawyers hit by cyber attacks: researchers (2016-08-02) mobile.reuters.com
Jeep Hackers Return With New Tricks (2016-08-03) www.pcmag.com
Researchers Show How To Steal Payment Card Data From PIN Pads (2016-08-03) www.darkreading.com
Restlet Studio 13 is out (2016-08-03) restlet.com
Malware found in 75% of top 20 commercial banks in the US, says SecurityScorecard (2016-08-03) www.itsecurityguru.org
Copyright Office Jumps Into Set-Top Box Debate, Says Hollywood Should Control Your TV (2016-08-03) www.eff.org
Part 1: Machine Learning?s Promise for Cybersecurity (2016-08-03) continuum.cisco.com
Do Security Companies Need to Issue Warranties? (2016-08-03) www.darkreading.com
Bitcoin drops more than 10% after security breach (2016-08-03) www.bbc.co.uk
Report: FBI was silent on Russian threat in warnings to DNC (2016-08-03) thehill.com
US Navy Organizes Cybersecurity Simulation (2016-08-03) www.darkreading.com
This Chinese malware is making its creators $300,000 per month (2016-08-03) www.itsecurityguru.org
Security firms combine to battle bitcoin-laundering (2016-08-03) disruptiveviews.com
Ransomware Hit 40 Percent of Businesses in the Last Year (2016-08-03) www.pcmag.com
Kaminsky Creates Prototype To Lock Out Attackers (2016-08-03) www.darkreading.com
Almost half of US businesses hit by ransomware, says study (2016-08-03) www.pcworld.com
123-Reg drowns in ongoing DDoS tsunami (2016-08-03) www.itsecurityguru.org
Telegram denies Iranian mass breach (2016-08-03) www.bbc.co.uk
Bitcoin exchange Bitfinex says hackers stole $63 million (2016-08-03) www.pcworld.com
Iranian hacker group knows who is on Telegram (2016-08-03) www.pcworld.com
?We Have to Do Something or We Will Lose the Internet? (2016-08-03) continuum.cisco.com
Hackers stole $60 million from a bitcoin exchange in a massive heist (2016-08-03) www.businessinsider.com
Israeli hacker breaches systems of Iranian ISP (2016-08-03) www.itsecurityguru.org
Getting Your REST is Important (2016-08-03) www.tibco.com
Telegram Pushes Back on Hack Reports (2016-08-03) www.pcmag.com
Hackers Steal $65M in Bitcoin, Value Tanks (2016-08-03) continuum.cisco.com
Bitfinex disables trading on exchange after hack (2016-08-03) www.reuters.com
Cisco Releases Security Updates (2016-08-03) www.us-cert.gov
Is YOUR email address and password for sale? Hacker claims 200m Yahoo accounts are listed on a dark web market (2016-08-03) www.itsecurityguru.org
A New Cyber Security Curriculum (2016-08-03) perconcordiam.com
Chinese hackers are attacking organizations involved in the South China Sea dispute (2016-08-04) www.businessinsider.com
FBI Reportedly Took Months To Warn DNC That Russia May Be Behind Hackings (2016-08-04) www.darkreading.com
DDoS Attacks: Cybercriminals Are More Homegrown Than You Think (2016-08-04) www.darkreading.com
Best practices for digital security while traveling to the 2016 Rio Olympics (2016-08-04) www.accessnow.org
Snitches get stitches: Little Snitch bugs were a blessing for malware (2016-08-04) www.itsecurityguru.org
Researchers think we may have to protect our brains from hackers in a few years (2016-08-04) thenextweb.com
Cybercriminals follow MS Exchange users in Office 365 migration (2016-08-04) www.itsecurityguru.org
US health insurer warns 3.7m after cyber-attack (2016-08-04) www.bbc.co.uk
Traffic hackers (2016-08-04) www.bbc.co.uk
Watch this new training series on cyber policy for human rights defenders (2016-08-04) www.accessnow.org
Severe vulnerabilities discovered in HTTP/2 protocol (2016-08-04) www.zdnet.com
Tweet: DARPA#039;s Cyber Grand Challenge is teaching AIs to break into computers. Should they have a safety protocol for that? https://t.co/YJBqtfZHiC (2016-08-04) twitter.com
Jeep hackers: How we swerved past Chrysler?s car security patches (2016-08-05) www.itsecurityguru.org
Advanced malware linked to South China Sea cyber-attacks (2016-08-05) www.itsecurityguru.org
F-Secure links advanced malware threat to South China Sea cyber attacks (2016-08-05) www.itsecurityguru.org
Understanding Threat Intelligence ROI (2016-08-05) www.itsecurityguru.org
Pokemon Go banned by Iranian authorities over security (2016-08-05) www.bbc.co.uk
Supercomputers give a glimpse of cybersecuritys automated future (2016-08-05) www.pcworld.com
Security of seismic sensor grid probed (2016-08-06) www.bbc.co.uk
Inside the Port of Los Angeless Cyber Command Center (2016-08-06) www.pcmag.com
Car Hackers Return to Black Hat with New Attacks to Drive You Off the Road (2016-08-06) www.pcmag.com
Metasploit for Machine Learning: Deep-Pwning (2016-08-06) n0where.net
Using Cyber Threat Intelligence to Reduce Actors Opportunities (2016-08-06) www.securityweek.com
Hackers Make the First-Ever Ransomware for Smart Thermostats (2016-08-07) motherboard.vice.com
Guarding The Grid (2016-08-08) www.darkreading.com
CYBERCOM Grows Up, Chinese IP Theft, and Apples Bug Bounty (2016-08-08) www.lawfareblog.com
Symantec Discovers Strider, A New CyberEspionage Group (2016-08-08) www.darkreading.com
New spyware detected targeting firms in Russia, China: Symantec (2016-08-08) www.reuters.com
DoJ to judges: use Tor to protect your internet connection (2016-08-08) boingboing.net
Are unsecure medical devices opening the backdoor for hackers? (2016-08-08) www.itsecurityguru.org
Obama prepares to boost U.S. military?s cyber role (2016-08-08) www.itsecurityguru.org
Australia sets up specialist cyber unit to trace terrorism payments (2016-08-08) www.reuters.com
The History of Stuxnet: The World?s First True Cyberweapon (2016-08-09) motherboard.vice.com
Shaming People for Not Being or Understanding REST Is Why We Have So Much Inconsistency in API Design (2016-08-09) dzone.com
The NSA zero-day stockpile may only contain ?dozens? of vulnerabilities, researcher claims (2016-08-09) www.itsecurityguru.org
Australian census attacked by hackers (2016-08-09) www.bbc.co.uk
Russian hackers appear to have infiltrated up to 330,000 computer cash registers sold by Oracle (ORCL) (2016-08-09) www.businessinsider.com
How to win the ?cyber arms race? (2016-08-09) www.itsecurityguru.org
Why Hackers Are Getting All Political This Election Year (2016-08-09) www.darkreading.com
New spyware targeting firms in Russia, China, Iran: Symantec (2016-08-09) disruptiveviews.com
Australia?s controversial online census crashes after cyber attack (2016-08-09) disruptiveviews.com
Project Sauron malware hidden for five years (2016-08-09) www.bbc.co.uk
Australia sets up specialist cyber unit to trace terrorism payments (2016-08-09) www.itsecurityguru.org
New spyware detected targeting firms in Russia, China: Symantec (2016-08-10) www.itsecurityguru.org
Hack of Democrats? Accounts Was Wider Than Believed, Officials Say (2016-08-10) www.nytimes.com
Advanced Threat Hunting: Are You The Hunter Or The Hunted? (2016-08-10) www.darkreading.com
US Cyber Command Could Be Elevated To Major Cyber Weapon Unit (2016-08-10) www.darkreading.com
Australias controversial census in chaos after possible cyber attack (2016-08-10) www.reuters.com
Australia Stops Online Collection of Census Data After Cyberattacks (2016-08-10) www.nytimes.com
Pentagon Releases New Procedures for Intelligence Collection (2016-08-10) www.lawfareblog.com
Will AI help win the cyber security war? (2016-08-10) disruptiveviews.com
How the Government Is Waging Crypto War 2.0 (2016-08-10) motherboard.vice.com
(2016-08-11) motherboard.vice.com
This Is What the Worlds Spies Used Instead of MSN Messenger (2016-08-11) motherboard.vice.com
The Future Of ATM Hacking (2016-08-11) www.darkreading.com
How Researchers Exposed Iranian Cyberattacks Against Hundreds of Activists (2016-08-11) motherboard.vice.com
Technology explained: What is the dark web? (2016-08-11) www.bbc.co.uk
New malware campaign spreads backdoors instead of ransomware (2016-08-11) www.itsecurityguru.org
Use of API Design and Management Policies (2016-08-11) dzone.com
Secure Boot snafu: Microsoft leaks backdoor key, firmware flung wide open (2016-08-11) arstechnica.com
I hung around with hackers for a week, and now Im completely paranoid (2016-08-12) www.businessinsider.com
The Tor Projects social contract: we will not backdoor Tor (2016-08-12) boingboing.net
Thieves can wirelessly unlock up to 100 million Volkswagens, each at the press of a button (2016-08-12) www.itsecurityguru.org
We Shouldn?t Wait Another Fifteen Years for a Conversation About Government Hacking (2016-08-12) www.eff.org
Seismic sensor security claims denied (2016-08-12) www.bbc.co.uk
Russian Hackers of DNC Said to Nab Secrets From NATO, Soros (2016-08-12) www.itsecurityguru.org
Making Open Banking safe is simple, despite concerns over cybersecurity (2016-08-12) www.itsecurityguru.org
Meet DDoSCoin, the cryptocurrency that pays when you p0wn (2016-08-12) www.itsecurityguru.org
Business groups slam China?s draft cybersecurity rules (2016-08-12) www.itsecurityguru.org
Where Is The Ethical Line When Defining And Securing The API Landscape? (2016-08-12) dzone.com
Israeli parliament recommends creation of national cyber-authority (2016-08-12) www.scmagazine.com
Secure the Vote Today - Lawfare (2016-08-12) www.lawfareblog.com
Dem: White House should #039;levy consequences#039; against DNC hackers (2016-08-13) thehill.com
CIA Official: Cloud Has Been a Godsend (2016-08-13) www.nextgov.com
Cybersecurity Concerns With 3D Printing (2016-08-14) dzone.com
DDoS Attack On Aussie Swimming Site Linked To Horton-Sun Yang Feud (2016-08-15) www.darkreading.com
What Sauron Tells Us About What NSAs Up To, and What It Should Do Next (2016-08-15) www.lawfareblog.com
Hackers Say They Hacked NSA-Linked Group, Want 1 Million Bitcoins to Share More (2016-08-15) motherboard.vice.com
Yet Another Government-Sponsored Malware (2016-08-15) www.schneier.com
Guccifer 2.0 Returns to Twitter After Dem Data Leak (2016-08-15) www.pcmag.com
?Australian Authorities Hacked Computers in the US (2016-08-15) motherboard.vice.com
This is the future of war (2016-08-15) www.businessinsider.com
After NZ spooks misidentified pro-democracy activist, NSA spied on him for them (2016-08-15) boingboing.net
Iran Probes Cyber Role In Fires Across Gas Facilities (2016-08-15) www.darkreading.com
Why Did Guccifer 2.0 Evolve from Sloppy Hacktivist to Professional Leaker? (2016-08-15) motherboard.vice.com
Hackers claim to auction NSA source code (2016-08-15) thehill.com
Hacking group claims to offer cyber-weapons in online auction (2016-08-15) www.reuters.com
Australia hacked Americans in child pornography probe (2016-08-15) thehill.com
Thousands of Soros docs released by alleged Russian-backed hackers (2016-08-15) thehill.com
Its pretty easy to hack traffic lights (2016-08-15) boingboing.net
Hackers Claim to Auction Data They Stole From NSA-Linked Spies (2016-08-15) www.wired.com
Green Lights Forever: Analyzing the Security of Traffic Infrastructure (2016-08-15) www.usenix.org
Addressing the Shortfall of Secure Software Developers through Community College Education (2016-08-15) insights.sei.cmu.edu
Ex-NSA insiders: Theres a lot of panic over whats been exposed by this massive hack (2016-08-16) www.businessinsider.com
Was NSA Hacked? Leak from Shadow Brokers suggests so, Russian intelligence suspected (2016-08-16) boingboing.net
Suspected spycraft, not hacktivism, swirls around alleged NSA hack (2016-08-16) www.pcworld.com
Researchers Uncover Ransomware Campaign Netting $2.5 Million a Year (2016-08-16) continuum.cisco.com
Strong Connection Between Files Leaked By ShadowBrokers The Equation Group (2016-08-16) www.darkreading.com
?Why Github Removed Links to Alleged NSA Data (2016-08-16) motherboard.vice.com
It Looks Like the NSA Just Got Hacked (2016-08-16) www.motherjones.com
Shadow Brokers Claim to Breach NSA-Linked Hackers (2016-08-16) www.pcmag.com
China says cyber rules no cause for foreign business concern (2016-08-16) www.reuters.com
Hackers auction files stolen from NSA (2016-08-16) www.bbc.co.uk
15 US Cities Where Cybersecurity Professionals Earn Big Bucks (2016-08-16) www.darkreading.com
Hackers claim to have breached NSA?s elite cyber-spy team, auction stolen cyberweapons (2016-08-16) www.itsecurityguru.org
How Cyberattacks on Critical Infrastructure Could Cause Real-Life Disasters (2016-08-16) motherboard.vice.com
O Slack API How Do I Love Thee (2016-08-16) medium.com
Dark Reading Radio: What Keeps IT Security Pros Awake at Night (2016-08-16) www.darkreading.com
NSA and the No Good, Very Bad Monday (2016-08-16) www.lawfareblog.com
Poorly Configured DNSSEC = Potential DDoS Weapon (2016-08-16) www.darkreading.com
?Email Provider Linked to Alleged NSA Dumps: We Cant Help (2016-08-16) motherboard.vice.com
New Crypto-Currency Rewards Users For Participating In DDoS Attacks (2016-08-16) www.itsecurityguru.org
API Design Building and Enforcing an Internal Style Guide (2016-08-16) nordicapis.com
Snowden explains the Shadow Brokers/Equation Group/NSA hack (2016-08-16) boingboing.net
Students warned over rise in dangerous phishing e-mails as fraudsters target their first loan instalment worth thousands (2016-08-17) www.itsecurityguru.org
Lack of process and security culture are chief factors leaving firms open to cyber attack (2016-08-17) www.itsecurityguru.org
Best Security Practices to Prevent Costly Social Engineering Attacks (2016-08-17) www.itsecurityguru.org
The Current Highest Bid for Alleged NSA Data is 999,998.371 Bitcoin Short (2016-08-17) motherboard.vice.com
Getting Your Arms Around Cybersecurity (2016-08-17) community.infoblox.com
CORRECTED-Amid Trump criticism, U.S. to help states fight hacking (2016-08-17) www.reuters.com
?Shadow Brokers? Leak Raises Alarming Question: Was the N.S.A. Hacked? (2016-08-17) www.itsecurityguru.org
What We Know About the Exploits Dumped in NSA-Linked Hack (2016-08-17) motherboard.vice.com
The NSA cyber-weapon auction is a total smokescreen ? heres whats really going on (2016-08-17) www.businessinsider.com
Sage employee arrested in fraud probe (2016-08-17) www.bbc.co.uk
OptoNews Tip Whats a RESTful API and why does it matter (2016-08-17) blog.opto22.com
Tampa Hotel Targeted in Credit, Debit Card Data Breach (2016-08-17) www.itsecurityguru.org
Former NSA Staffers: Rogue Insider Could Be Behind NSA Data Dump (2016-08-17) motherboard.vice.com
Brazil Hit With a Second Major Banking Trojan Attack (2016-08-17) www.infosecurity-magazine.com
Operation Ghoul Targeting Middle Eastern Industrial, Engineering Organizations (2016-08-17) threatpost.com
The Global Ambitions of Pakistans New Cyber-Crime Act (2016-08-18) www.eff.org
Someone Rickrolled the Bitcoin Auction for NSA Exploits (2016-08-18) motherboard.vice.com
A Mysterious Message Is Warning Bitcoiners About a ?State Sponsored? Attack (2016-08-18) motherboard.vice.com
Spyware maker faces legal battle over alleged affair (2016-08-18) www.bbc.co.uk
Bitcoin users have been warned about a potential attack by government hackers (2016-08-18) www.businessinsider.com
The NSA Data Leakers Might Be Faking Their Awful English To Deceive Us (2016-08-18) motherboard.vice.com
Turning Away From The InfoSec Drama Machine (2016-08-18) www.liquidmatrix.org
Five Steps Before Developing a Smart Home Skill (2016-08-18) developer.amazon.com
The NSAs program of tech sabotage created the Shadow Brokers (2016-08-18) boingboing.net
Heres why the NSA wont release a smoking gun implicating Russia in these major hacks (2016-08-18) www.businessinsider.com
Is Russia hacking the US election? (2016-08-18) www.bbc.co.uk
Iran Investigates If Series of Oil Industry Accidents Were Caused by Cyber Attack (2016-08-18) time.com
Evidence Links Leaked Hacking Tools to the NSA (2016-08-19) www.pcmag.com
Article Creating RESTful Services with T4 Based on Model and Interfaces (2016-08-19) www.infoq.com
FireEye Probes Suspected Breach Of Clinton Charity Site: Sources (2016-08-19) www.darkreading.com
WikiLeaks uploads 300+ pieces of malware among email dumps (2016-08-19) www.itsecurityguru.org
M-Files and AIIM Survey Reveals Frequency of Information Security Breaches (2016-08-19) www.itsecurityguru.org
After DNC breach, hackers reportedly go after Donald Trump and his presidential campaign (2016-08-19) www.itsecurityguru.org
More on Election Security (2016-08-19) www.schneier.com
Fringe defence: identifying devices and protecting your business from cyber attacks (2016-08-19) www.itsecurityguru.org
Operation Ghoul attacks terrorize industrial and engineering orgs (2016-08-19) www.itsecurityguru.org
Internet spying powers backed by review (2016-08-19) www.bbc.co.uk
Darknet: Where Your Stolen Identity Goes to Live (2016-08-19) www.darkreading.com
New Snowden documents prove the hacked NSA files are real (2016-08-19) www.businessinsider.com
The NSA Leak Is Real, Snowden Documents Confirm (2016-08-19) theintercept.com
Be Explicit with Your APIs Data (2016-08-20) spin.atomicobject.com
I Thought I Was a Security Rockstar. I Was Just Stupid (2016-08-22) www.liquidmatrix.org
Alleged NSA hackers probably gave away a small fortune by leaking exploits (2016-08-22) www.pcworld.com
New threat for the IoT, DDoS attacks launching now (2016-08-22) disruptiveviews.com
Mission Critical: An Update on Federal Cybersecurity (2016-08-22) blogs.adobe.com
How the NSA snooped on encrypted Internet traffic for a decade (2016-08-22) www.itsecurityguru.org
Gold Coast Commonwealth Games could swap sponsorship for cyber protection (2016-08-22) www.itsecurityguru.org
Unsuccessful hack targeted New York Times in Moscow, FBI blames Russia (2016-08-23) boingboing.net
Reporters At New York Times Targeted By Russian Hackers (2016-08-23) www.darkreading.com
Reporters At New York Times And Other Media Hit By Russian Hackers (2016-08-23) www.darkreading.com
Mind the air-gap: Singapores web cut-off balances security, inconvenience (2016-08-23) www.reuters.com
New report shows that Peer-to-Peer sharing sites are major target for cybercriminals during summer months (2016-08-23) www.itsecurityguru.org
New York Times?s Moscow Bureau Was Targeted by Hackers (2016-08-23) www.nytimes.com
Meet Monero, the Currency Dark Net Dealers Hope Is More Anonymous Than Bitcoin (2016-08-23) motherboard.vice.com
Ashley Madison misled users with a fake security award (2016-08-23) www.pcworld.com
Dating Sites Hit by Luring Attacks via TOR Network (2016-08-23) www.itsecurityguru.org
Wikileaks criticised on sensitive data (2016-08-23) www.bbc.co.uk
Hit-And-Run Tactics Fuel Growth In DDoS Attacks (2016-08-23) www.darkreading.com
Cybercrime damages expected to cost the world $6 trillion by 2021 (2016-08-23) www.itsecurityguru.org
Why Twitter Was the Platform of Choice for Ripping Apart the NSA Dump (2016-08-23) motherboard.vice.com
User Interface An Essential part of a Effective API design (2016-08-23) www.cioreview.com
Russia now suspected of hacking US media firms (2016-08-24) disruptiveviews.com
There?s Now a Mr. Robot-Inspired ?fsociety? Ransomware in The Wild (2016-08-24) motherboard.vice.com
Thieves Now Targeting German Banks with GozNym Malware (2016-08-24) continuum.cisco.com
India investigating French submarine company data leak (2016-08-24) www.bbc.co.uk
NSA Targeted Chinese Firewall Maker Huawei, Leaked Documents Suggest (2016-08-24) motherboard.vice.com
Nick Ask the NSA: Shadow Brokers and the Leaking Ship (2016-08-24) www.lawfareblog.com
Word Games: What the NSA Means by ?Targeted? Surveillance Under Section 702 (2016-08-24) www.eff.org
UK becomes the world?s second most targeted nation for DDoS attacks as assaults rise over 220% (2016-08-24) www.itsecurityguru.org
University hit 21 times in one year by ransomware (2016-08-24) www.bbc.co.uk
This Android botnet relies on Twitter for its commands (2016-08-24) www.pcworld.com
U.S. banking regulators focused on cyber security after SWIFT attacks (2016-08-24) www.reuters.com
CrowdStrike, other cybersecurity firms integrating industry cooperative (2016-08-24) www.reuters.com
Newly Released Exploits Affect Cisco, Juniper Other Vendors (2016-08-24) duo.com
Rational Security: The Youre Nobody til Somebody Hacks You Edition (2016-08-25) www.lawfareblog.com
India says newspaper leak of submarine papers doesnt compromise security (2016-08-25) www.reuters.com
The Secret Behind the NSA Breach: Network Infrastructure Is the Next Target (2016-08-25) www.darkreading.com
Asian companies have world?s worst cybersecurity says study (2016-08-25) www.itsecurityguru.org
Singapore?s ?air-gapping? policy cutting off internet access being questioned (2016-08-25) disruptiveviews.com
How the Consumer Product Safety Commission is (Inadvertently) Behind the Internet?s Largest DDoS Attacks (2016-08-25) blog.cloudflare.com
Government Hackers Caught Using Unprecedented iPhone Spy Tool (2016-08-25) motherboard.vice.com
US, Korean Armies Create Spectrum Management Interoperability, Increase Situational Understanding (2016-08-26) www.dvidshub.net
Australia warns shipbuilder DCNS after massive security leak (2016-08-26) www.reuters.com
Apple Patents Method to Catch Phone Thiefs Fingerprints (2016-08-26) www.pcmag.com
iOS Update Prevents Snooping Via Remote Jailbreaks (2016-08-26) www.pcmag.com
Collision Attacks Against 64-Bit Block Ciphers (2016-08-26) www.schneier.com
RESTful APIs and MediaTypes (2016-08-26) akrabat.com
The NSA Is Hoarding Vulnerabilities (2016-08-26) www.schneier.com
Details of Indias Stealth Submarines Leaked Online (2016-08-26) www.pcmag.com
NYU scientists develop tool to check for chip sabotage (2016-08-26) www.scmagazine.com
St. Jude Denies Report Its Heart Devices Are Vulnerable to Cyberattacks (2016-08-26) www.wsj.com
After DNC Hack, Staffers Told to Use Snowden-Approved App, Signal (2016-08-27) motherboard.vice.com
Iran detects malware in petrochemical plants, says not linked to recent fires (2016-08-27) www.reuters.com
Hackers Stole Voter Registration Data in at Least Two States (2016-08-29) www.motherjones.com
Harry Reid Cites Evidence of Russian Tampering in U.S. Vote, and Seeks F.B.I. Inquiry (2016-08-29) www.nytimes.com
FBI: State Election Systems Were Hacked (2016-08-29) www.pcmag.com
How The Cybersecurity Landscape Has Changed (2016-08-29) dzone.com
FBI warns that hackers are targeting state election systems (2016-08-29) www.pcworld.com
iPhone Zero-Day Used by UAE Government (2016-08-29) www.schneier.com
ICS-CERT Cyber Security Evaluation Tool Version 8.0 New User Webinar (2016-08-29) ics-cert.us-cert.gov
Sophisticated malware possibly tied to recent ATM heists in Thailand (2016-08-29) www.pcworld.com
Report: Hackers Breach Two State Election Databases, FBI Warns (2016-08-29) www.darkreading.com
Russian Hacker Convicted of 38 Counts Related To PoS Hack Scheme (2016-08-29) www.darkreading.com
Russian Hacker Convicted of Massive Cyber Fraud Scheme (2016-08-29) www.pcmag.com
Internal API Design for Distributed Teams (2016-08-29) www.lullabot.com
FBI says hackers penetrated state election systems (2016-08-29) www.nydailynews.com
Meet Some Of The Emerging Israeli Cybersecurity Firms (2016-08-30) www.darkreading.com
Cyber security firm LogRhythm raises $50 mln after changing IPO plans (2016-08-30) www.reuters.com
Better API Design With Java 8 Optional (2016-08-30) dzone.com
White House orders Russia hack investigation, Congress wants to know if Trump is involved (2016-08-30) boingboing.net
6 Ways To Hack An Election (2016-08-30) www.darkreading.com
Study finds flaws in criticism of St. Jude cyber security (2016-08-30) www.reuters.com
FBI says foreign hackers penetrated state election systems (2016-08-30) www.itsecurityguru.org
Ripper! Boffins find malware thought behind $347k Thai ATM raids (2016-08-30) www.itsecurityguru.org
Will cyber crime be top of the agenda at G20? (2016-08-30) disruptiveviews.com
Malware Markets: Exposing The Hype Filtering The Noise (2016-08-30) www.darkreading.com
Ransomware Attacks in the U.K., Netherlands and Belgium (2016-08-30) duo.com
US Think Tanks Involved in Russia Research Allegedly Hacked (2016-08-30) www.darkreading.com
Why Consistency Matters Across the Media Types Offered by an API (2016-08-30) www.programmableweb.com
More Than 1 Million IoT Devices Compromised by Single Malware Family (2016-08-30) continuum.cisco.com
What?s next for threat intelligence? (2016-08-30) www.itsecurityguru.org
Exclusive: Six U.S. senators urge Obama to prioritize cyber crime at G20 summit (2016-08-30) www.reuters.com
Ransomware Targets UK Hospitals, But NHS Wont Pay Up (2016-08-30) motherboard.vice.com
2016 DDoS Attack Trends By The Numbers (2016-08-31) www.darkreading.com
Cybersecurity Self-Esteem: 4 Things Confident Teams Are Doing (2016-08-31) www.darkreading.com
Cyber Computer Scientist II in US-OH-Columbus (2016-08-31) jobs.militarytimes.com
Exclusive: SWIFT discloses more cyber thefts, pressures banks on security (2016-08-31) www.itsecurityguru.org
Some of the people investing the CIAs money in startups are under scrutiny (2016-08-31) www.businessinsider.com
Trying to Smoke Out the Players in the Hacking of the D.N.C. (2016-08-31) www.nytimes.com
Senators Urge President Obama to Make Cybercrime a Top Priority at G20 Summit (2016-08-31) continuum.cisco.com
How to change your Dropbox password after a Dropbox hack caused 68 million accounts to leaked online | WIRED UK (2016-08-31) www.wired.co.uk
Reported UK Data Breaches Soar 88% in a Year (2016-09-01) www.itsecurityguru.org
Improvements In Cybersecurity Require More Than Sharing Threat-Intelligence Information (2016-09-01) www.darkreading.com
California May Soon Treat Ransomware As Extortion (2016-09-01) www.darkreading.com
Cybercrime as a Tax on the Internet Economy (2016-09-01) www.schneier.com
Last.fm breach from 2012 affected 43 million users (2016-09-01) www.pcworld.com
Kimpton Hotels Hit By Point-Of-Sale Breach (2016-09-01) www.darkreading.com
Suspect arrested in 5-year-old kernel.org breach (2016-09-02) www.pcworld.com
Hackers found a way to resurrect suspended and inactive Twitter accounts (TWTR) (2016-09-02) www.businessinsider.com
How Spy Tech Firms Let Governments See Everything on a Smartphone (2016-09-02) www.nytimes.com
$40 Homemade ?Arduino radio device? can Intercept Vehicle Key Fobs ? More Than 100 Million Cars are Vulnerable (2016-09-02) blog.adafruit.com
43M Last.fm Passwords Hacked in 2012 Breach (2016-09-03) www.pcmag.com
Specref (2016-09-03) www.specref.org
JSON Version of Web Concepts (2016-09-03) webconcepts.info
Pro-Ukraine Hackers Leak Personal Details of Ukrainian and Foreign Journalists (2016-09-05) www.itsecurityguru.org
Obama aims to avoid a ?cycle of escalation? in cyberattacks by countries (2016-09-05) www.pcworld.com
Huawei accredited to the Open Trusted Technology Provider Standard (2016-09-05) www.itsecurityguru.org
Iran Cyber Dialogue and RightsCon Brussels 2017 ? timely and impactful (2016-09-06) www.accessnow.org
Introducing Deep Learning: Boosting Cybersecurity With An Artificial Brain (2016-09-06) www.darkreading.com
Obama and Clinton weigh in on cyber warfare tactics (2016-09-06) techcrunch.com
More Signs Point To Russian Cyberspy Connection In State Election Board Hacks (2016-09-06) www.darkreading.com
Watch How Government Spyware Infects a Computer in This Leaked Demo Video (2016-09-06) motherboard.vice.com
How to sort API expand fields (2016-09-06) www.yiiframework.com
Activists to FBI: Show Us Your Warrant for Mass Hack of TorMail Users (2016-09-06) motherboard.vice.com
Russian site hit by huge data breach (2016-09-06) www.bbc.co.uk
Understanding The New Swift 3 API Design Guidelines (2016-09-07) blog.teamtreehouse.com
Defining The Common Core of Cybersecurity: Certifications + Practical Experience (2016-09-07) www.darkreading.com
Data Breaches At U.S. Office Of Personnel Management Was Preventable, Investigation Finds (2016-09-07) www.huffingtonpost.com
API Design Book Available Today (2016-09-07) api-university.com
Government Hacking v. Human Rights (2016-09-07) www.newamerica.org
OPM Breach: Two Waves Of Attacks Likely Connected, Congressional Probe Concludes (2016-09-07) www.darkreading.com
Tipping the scales: the attribution problem and the feasibility of deterrence against cyberattack (2016-09-07) cybersecurity.oxfordjournals.org
OPM Hackers Used Marvel Superhero Nicknames to Hide Their Tracks (2016-09-07) motherboard.vice.com
The Secret Sauce Behind Building an Elastic API (2016-09-07) www.streamingmedia.com
Obama Calls For Norms To Prevent Cyber Wild Wild West (2016-09-08) www.darkreading.com
House GOP Panel Blasts OPM Over Breach (2016-09-08) www.pcmag.com
Securing the Skies: Cybersecurity in Aviation (2016-09-08) www.csoonline.com
Data hoarders are shining a spotlight on past breaches (2016-09-08) www.pcworld.com
Restful API Design An Opinionated Guide (2016-09-08) dzone.com
Why College Freshmen Are Chum For The Cyber Sharks (2016-09-08) www.huffingtonpost.com
Crimeware-as-a-Service Hack Turns Potential Hackers Into Victims (2016-09-08) www.darkreading.com
Vienna Airport Targeted by Turkish Hackers (2016-09-08) www.itsecurityguru.org
Cybercrime Roundup: The CFAA, Dog Sniffs, and Broken Hearts (2016-09-08) www.lawfareblog.com
Hedge Fund and Cybersecurity Firm Team Up to Short-Sell Device Maker (2016-09-08) www.nytimes.com
Avoiding The Blame Game For A Cyberattack (2016-09-08) www.darkreading.com
Must Watch: Senator Ron Wyden Heads to the Senate Floor Today to Oppose Mass Hacking (2016-09-08) www.eff.org
White House appoints first Federal Chief Information Security Officer (2016-09-08) www.zdnet.com
FBI arrests hackers who allegedly leaked info on government agents (2016-09-08) www.pcworld.com
RESTful Web API Design with Nodejs (2016-09-08) adobeland.wordpress.com
FBI Arrests Two Men for Allegedly Hacking Computers of Senior Government Officials (2016-09-08) abcnews.go.com
DHS Touhill tapped as top federal cybersecurity officer (2016-09-08) fcw.com
United States names its first Chief Information Security Officer (2016-09-09) www.itsecurityguru.org
Cyber Security Controls That Actually Make You More Efficient (2016-09-09) www.huffingtonpost.com
New Linux Trojan Discovered Coded in Mozilla?s Rust Language (2016-09-09) www.itsecurityguru.org
Arrests over hacks of CIA and FBI staff (2016-09-09) www.bbc.co.uk
Whoops! Man Accused of Being Part of CIA Hacking Group Had Already Been Doxed (2016-09-09) motherboard.vice.com
Introducing API Templates With Reusable System and Process APIs (2016-09-09) blogs.mulesoft.com
Justice Dept. group studying national security threats of internet-linked devices (2016-09-10) www.reuters.stfi.re
Maintaining API Working As A Software Engineer (2016-09-11) cvesters.wordpress.com
Volkswagen engineer behind defeat device pleads guilty in US court (2016-09-12) www.zdnet.com
Government Accelerates Cyber Hiring (2016-09-12) www.darkreading.com
Nuclear Watchdog Suffers DDoS Attack Ahead of North Korea?s Nuclear Test (2016-09-12) www.itsecurityguru.org
911 is Vulnerable to DDoS Attacks: Hackers Prove How Easy it is! (2016-09-12) www.itsecurityguru.org
Accountability for Algorithmic Autonomy in War (2016-09-12) www.lawfareblog.com
Leaked catalogue reveals disinformation campaign for sale (2016-09-12) www.scmagazine.com
Thousands of Seagate NAS boxes host cryptocurrency mining malware (2016-09-12) www.csoonline.com
Accenture Hires Former CIA Tech Exec To Head Its Federal Services Cybersecurity Practice (2016-09-13) www.crn.com
Cyber security in mining: managing risk amongst disruption (2016-09-13) exchange.telstra.com.au
Someone Is Learning How to Take Down the Internet (2016-09-13) www.lawfareblog.com
The Four Cybersecurity Terms Businesses Need to Know (2016-09-13) www.itsecurityguru.org
New York issues nation?s first cyber regulations for banks, insurers (2016-09-13) disruptiveviews.com
Hackers smear Olympic athletes with data dump of medical files (2016-09-13) www.pcworld.com
Did North Korea launch a DDoS attack against a website monitoring its nuclear tests? (2016-09-13) www.itsecurityguru.org
Hackers found 47 new vulnerabilities in 23 smart devices at DEF CON (2016-09-13) www.pcworld.com
F-Secure, University of Helsinki For New Cyber Security Course (2016-09-13) www.cxotoday.com
What Really Happened in the OPM Breach (2016-09-13) duo.com
DoJ Announces Team To Oversee Security Of Internet of Things (2016-09-13) www.darkreading.com
ICS-CERT releases Recommended Practice: Improving Industrial Control System Cybersecurity with Defense-in-Depth Strategies (2016-09-13) ics-cert.us-cert.gov
Cybersecurity In The Obama Era (2016-09-13) www.darkreading.com
e92plus target DDoS and Threat Intelligence opportunities through partnership with NSFOCUS (2016-09-13) www.itsecurityguru.org
Government data security slammed in new report (2016-09-13) www.bbc.co.uk
Yes, Your Database Can Be Breached Through A Coffee Pot (2016-09-13) www.darkreading.com
The Cyber Threat To Credit Unions: Lessons to inform a solid defense (2016-09-13) ctovision.com
Russians hacked voter registration databases in 2 USA states (2016-09-13) www.itsecurityguru.org
Hackers smear Olympic athletes with data dump of medical files (2016-09-13) www.pcworld.com
UK moves to ?active cyber-defence? (2016-09-13) www.bbc.co.uk
Tweet: The intelligence community needs stronger congressional oversight: https://t.co/d1oHrnWoWb #opengov https://t.co/nIZReqYZri (2016-09-13) twitter.com
Policy, Law, and Technology in the Current Crypto Wars (2016-09-14) cyberlaw.stanford.edu
A surprising number of computer hackers earn over $100,000 a year (2016-09-14) www.businessinsider.com
Volkswagen is founding a new cybersecurity firm to prevent car hacking (2016-09-14) www.pcworld.com
Turkish hacker group targets Austrian National Bank (2016-09-14) www.itsecurityguru.org
Logins for US Navy, NASA?s JPL among of US gov logins sold on deepweb (2016-09-14) www.itsecurityguru.org
The GitHub GraphQL API GitHub Engineering (2016-09-14) githubengineering.com
FBI Agent Posing as Journalist to Deliver Malware to Suspect Was Fine, Says DOJ (2016-09-15) motherboard.vice.com
Your brand, in-store, is under cyber attack (2016-09-15) disruptiveviews.com
The Library of Congress Was Hacked Because It Hasn?t Joined the Digital Age (2016-09-15) motherboard.vice.com
Playpen: The Story of the FBI?s Unprecedented and Illegal Hacking Operation (2016-09-15) www.eff.org
Sports Threat Intelligence-Sharing Group Formed (2016-09-15) www.darkreading.com
How to Take Your API From RPC to Hypermedia in 7 Steps (2016-09-15) www.programmableweb.com
FEC stalemates on how to deal with foreign-owned companies spending in elections (2016-09-15) www.opensecrets.org
Learn API DevOps from the Experts Design Testing Deployment (2016-09-15) restlet.com
NY to Pilot Cybersecurity Regulations for Financial Organizations (2016-09-15) continuum.cisco.com
In a leaked weaponized information catalog, Indian cyberarms dealer offers blackest-ever SEO (2016-09-15) boingboing.net
Cybersecurity for Building Control Systems Workshop Series (2016-09-15) ics-cert.us-cert.gov
Research reveals the opportunities EU employees are presenting to cyber-attackers on social media and messaging applications (2016-09-15) www.itsecurityguru.org
Sixth Linux DDoS Trojan Discovered in the Last 30 Days (2016-09-15) www.itsecurityguru.org
Data Loss Risks Rise In The Age Of Collaboration (2016-09-15) www.darkreading.com
Hackers probe cyber defences to bring down the internet (2016-09-15) www.itsecurityguru.org
French spy boss admits France cyberattacked Iran, Canada, Spain, Greece, Norway, Ivory Coast, Algeria, and others (2016-09-15) boingboing.net
Central Banks Set Up Team To Oversee Cybersecurity (2016-09-16) www.darkreading.com
Here comes GraphQL The Real Adam (2016-09-16) therealadam.com
Chinese Companies Open Checkbooks to Acquire European Tech (2016-09-16) www.nytimes.com
Volkswagen launches new cybersecurity firm to tackle car security (2016-09-16) www.itsecurityguru.org
Hackers Hit ?Some? Cisco Customers With Leaked NSA Hacking Tools (2016-09-19) motherboard.vice.com
?Fear? hacker hits hundreds of government servers (2016-09-19) thehill.com
Overnight Cybersecurity: House panel looks into Reddit post about Clinton emails | Hacker claims he hit hundreds of government servers (2016-09-19) thehill.com
The Evolving Law of Global Killing (2016-09-19) www.lawfareblog.com
RESTful Web Service With Example (2016-09-19) dzone.com
Mobile Exploitation Analyst (2016-09-19) nationalcybersecurity.com
San Bernardino iPhone Hack: Media Agencies Sue FBI For Vendor Details (2016-09-19) www.darkreading.com
The Time Is Now To Address The Cybersecurity Talent Shortage In Unique Ways (2016-09-19) www.darkreading.com
Whats The Risk? 3 Things To Know About Chatbots Cybersecurity (2016-09-19) www.darkreading.com
Top Colleges For Cybersecurity (2016-09-19) www.darkreading.com
Understanding REST And RPC For HTTP APIs (2016-09-20) www.smashingmagazine.com
RPC vs REST is not in the URL (2016-09-20) www.bizcoder.com
There is No REST API (2016-09-20) blog.howarddierking.com
Hackers hit reporter with record-breaking attack (2016-09-21) thehill.com
Overnight Cybersecurity: Trump opposes internet handover | A record breaking cyber attack | Intel chief says Russian election hacks are a #039;tradition#039; (2016-09-21) thehill.com
A Twist On The Cyber Kill Chain: Defending Against A JavaScript Malware Attack (2016-09-21) www.darkreading.com
DDOS Trends Report 2016 (2016-09-21) ctovision.com
Security researchers from China remotely hacked a Tesla Model S (2016-09-21) www.itsecurityguru.org
Cybersecurity and the Ballot Box (2016-09-21) cyberlaw.stanford.edu
KrebsOnSecurity Hit With Record DDoS (2016-09-21) krebsonsecurity.com
Influencers: Calling it critical infrastructure wont protect the vote (2016-09-21) cyberlaw.stanford.edu
Top spy suggests Russia trying to sow doubt in US elections (2016-09-21) thehill.com
Tesla Model S Hack (2016-09-21) www.schneier.com
Are You Covered? Ransomware, CEO Fraud and Cyber Insurance (2016-09-21) www.infosecurity-magazine.com
Someone Is Learning How to Take Down the Internet (2016-09-21) www.schneier.com
Evolution to RESTful with NoSQL Documents (2016-09-21) medium.com
No Global Warrants: Stop the U.S. Governments Hacking Loophole (2016-09-21) noglobalwarrants.org
Intel Dems: Russia making #039;serious effort#039; to influence US election (2016-09-22) thehill.com
Yahoo Says a Nation State Hacked 500 Million Customer Accounts (2016-09-22) motherboard.vice.com
Yahoo Says Hackers Stole Data on 500 Million Users in 2014 (2016-09-22) www.nytimes.com
Small business cybersecurity bill clears House (2016-09-22) thehill.com
Overnight Cybersecurity: Fallout from Yahoos massive breach (2016-09-22) thehill.com
Massive web attack hits security blogger (2016-09-22) www.bbc.co.uk
Poisonous Mamba Ransomware Overwrites Your Master Boot Record, Encrypts Your Entire Hard Drive (2016-09-22) www.itsecurityguru.org
Yahoo Confirms Massive Data Breach Affecting At Least 500 Million Accounts (2016-09-22) time.com
New legislation seeks to prevent US voting systems from being hacked (2016-09-22) www.itsecurityguru.org
Hack Brief: Yahoo Looks Set to Confirm a Big, Old Data Breach (2016-09-22) www.wired.com
Report: Yahoo May Confirm Serious Data Breach, Implications For Verizon Unknown (2016-09-22) www.crn.com
Yahoo set to announce huge breach: report (2016-09-22) thehill.com
Yahoo is expected to confirm massive data breach affecting hundreds of millions of users (2016-09-22) www.pcworld.com
Yahoo Reveals Nation State-Borne Data Breach Affecting A Half-Billion Users (2016-09-22) www.darkreading.com
Yahoo confirms state-sponsored attacker stole personal data of ?at least? 500 million users (2016-09-22) techcrunch.com
Dem criticizes Yahoo for not disclosing hack sooner (2016-09-22) thehill.com
Chinese hackers steal millions in Wall Street tech firm breach (2016-09-22) www.itsecurityguru.org
Exclusive: Probe of leaked U.S. NSA hacking tools examines operatives mistake (2016-09-22) www.reuters.com
Biometric Skimmers Pose Emerging Threat To ATMs (2016-09-22) www.darkreading.com
Ethereum Is Under Attack (2016-09-22) motherboard.vice.com
Bedrock Control System Provides Cyber Secure SCADA RTU Platform for Clarksville Light Water (2016-09-22) www.remotemagazine.com
Yahoo announces major data breach (2016-09-22) thehill.com
sp800_150_second_draft (2016-09-22) csrc.nist.gov
Journalist Hit By Record DDoS Attack: I?m Kind of Like Plutonium Right Now (2016-09-23) motherboard.vice.com
UPDATE 1-Yahoo is sued for gross negligence over huge hacking (2016-09-23) www.reuters.com
Unprecedented and Unlawful: The NSA?s ?Upstream? Surveillance (2016-09-23) www.aclu.org
Trump hotels agree to pay $50K in data breach settlement (2016-09-23) thehill.com
Cybersecurity is a team sport (2016-09-23) blogs.ca.com
Yahoo! hack ? Industry reactions (2016-09-23) www.itsecurityguru.org
Report: NSA operator left source code exposed before breach (2016-09-23) thehill.com
Advisory Body Calls For Stronger Cybersecurity Measures Across Airline Industry (2016-09-23) www.darkreading.com
On-Premises In The Cloud: Making Sense Of Your Cybersecurity Ecosystem (2016-09-23) www.darkreading.com
500m Yahoo accounts were hacked in 2014, company confirms (2016-09-23) www.itsecurityguru.org
Hackers Trawl User Data in Hopes a Small Target Will Lead to a Big One (2016-09-23) www.nytimes.com
What the Yahoo! account data breach means for the future of identity (2016-09-23) www.janrain.com
324,000 payment cards breached, CVVs included (2016-09-23) www.itsecurityguru.org
UPDATE 2-Yahoo faces growing scrutiny over when it learned of data breach (2016-09-23) www.reuters.com
The Biggest Internet Attack in History (2016-09-23) www.lawfareblog.com
Apimint Rapidly Prototype APIs (2016-09-25) www.apimint.com
What The WADA Hack Proves About Todays Threat Landscape (2016-09-26) www.darkreading.com
Hackers Are Trying to Hold a Los Angeles Investment Bank to Ransom (2016-09-26) motherboard.vice.com
Back Online, Krebs Laments Use of DDoS Attacks to Censor Speech (2016-09-26) www.pcmag.com
Cyber Security Still A Major Concern In Asia: Study (2016-09-26) www.cxotoday.com
Cyber Crooks Use IoT Devices To Launch DDoS Attacks: Report (2016-09-26) www.cxotoday.com
New Mac Trojan uses the Russian space program as a front (2016-09-26) www.macworld.com
Cyber Risk Among Top Concerns For Business Leaders: Study (2016-09-26) www.darkreading.com
Sunlight at the 21st Century Neighborhoods Symposium How humanizing data will improve our communities (2016-09-26) sunlightfoundation.com
FBI Probes Dumping Of NSA Hack Tools On Public Site (2016-09-26) www.darkreading.com
Cyber criminals now offering ?crime-as-a-service? (2016-09-27) disruptiveviews.com
Building the Cybersecurity Workforce (2016-09-27) www.dhs.gov
Senator to SEC: You Need to Investigate Yahoo Breach (2016-09-27) www.pcmag.com
UK plc wants tougher cyber regulation and more punishment for failings (2016-09-27) www.itsecurityguru.org
Yahoo?s Password Breach Could Have Wide-reaching Consequences (2016-09-27) time.com
FAA Advisory Body Recommends Cybersecurity Measures (2016-09-27) www.wsj.com
Yahoos massive password breach is the security equivalent of ecological disasters (2016-09-27) www.businessinsider.com
Yahoos claim of state-sponsored hackers meets with skepticism (2016-09-27) www.pcworld.com
Facebook tells U.S. judge it takes terroristic threats seriously (2016-09-27) www.reuters.com
Security man Krebs? website DDoS was powered by hacked Internet of Things botnet (2016-09-27) www.itsecurityguru.org
A Voice Cuts Through, and Adds to, the Intrigue of Russia?s Cyberattacks (2016-09-27) www.nytimes.com
How to Build a Social Media Army (2016-09-27) blog.hubspot.com
Sharing Cybersecurity Threat Intelligence Is The Only Way We Win (2016-09-27) www.darkreading.com
How the FBI defends against insider threats (2016-09-27) www.zdnet.com
Hate spam emails? This man built a bot to annoy spammers until they give up (2016-09-27) www.itsecurityguru.org
Russian Cyberspies Use ?Komplex? Trojan to Target OS X Systems (2016-09-27) www.itsecurityguru.org
Why the silencing of KrebsOnSecurity opens a troubling chapter for the ?Net (2016-09-27) arstechnica.com
Here?s how security cameras drove the world?s biggest DDoS attack ever (2016-09-28) www.itsecurityguru.org
EU seeks to tighten cyber-security dual-use exports (2016-09-28) www.reuters.com
Europol identifies eight main cybercrime trends (2016-09-28) www.itsecurityguru.org
Common Cyber Security Mistakes and How to Avoid Them (2016-09-28) www.itsecurityguru.org
Announcing the OpenSource beaR Library (2016-09-28) www.esa.doc.gov
Russian Hackers Target Citizen Journalists Reporting On Malaysian Airlines Crash (2016-09-28) www.darkreading.com
Cyber firm challenges Yahoo claim hack was state-sponsored (2016-09-28) www.reuters.com
FBI Now Pretty Sure Russia Is Behind Anti-Clinton Hacking (2016-09-28) www.motherjones.com
Brad Pitt death hoax is actually malware that can destroy phones and computers and expose sensitive information to hackers (2016-09-28) www.itsecurityguru.org
EU mulls amending controversial cyber export rules (2016-09-28) thehill.com
Syrian Electronic Army hacker pleads guilty in Virginia (2016-09-28) thehill.com
Meet Apache Spot, a new open source project for cybersecurity (2016-09-28) www.pcworld.com
What is API Design (2016-09-28) api-university.com
Virlock Could Be the Ransomware Super Flu (2016-09-28) continuum.cisco.com
Cybereason Employs Israeli Defense Force Cyber Security Expertise to Combat Data Breach Frustration (2016-09-28) www.crn.com
Google Steps Up to Protect Security Analyst from Humongous DDoS (2016-09-28) medium.com
Project Shield Has Krebs on Securitys Back (2016-09-28) www.technewsworld.com
Google Steps Up to Protect Security Analyst from Humongous DDoS (2016-09-28) medium.com
Yahoo Hackers Were Criminals Rather Than State-Sponsored, Security Firm Says (2016-09-28) www.wsj.com
Decrypting The Dark Web: Patterns Inside Hacker Forum Activity (2016-09-29) www.darkreading.com
Social media in defence intelligence gathering (2016-09-29) www.defenceweb.co.za
How A Pair Of Cybercriminals Scales Its Carder Business (2016-09-29) www.darkreading.com
How 1.5 Million Connected Cameras Were Hijacked to Make an Unprecedented Botnet (2016-09-29) motherboard.vice.com
FBI reports more attempts to hack voter registration system (2016-09-29) www.pcworld.com
Broadband access creeps along but DDoS attacks explode (2016-09-29) techcrunch.com
Distributed Censorship or Extortion? The IoT vs Brian Krebs (2016-09-29) hackaday.com
?Money Mule? Gangs Turn to Bitcoin ATMs (2016-09-29) krebsonsecurity.com
Cooperative, Dynamic Twitter Parsing and Visualization for Dark Network Analysis (2016-09-29) my.nps.edu
How to fix CORS problems Restlet We Know About APIs (2016-09-29) restlet.com
What drones mean for surveillance (2016-09-29) gcn.com
National Cyber Incident Response Plan Now Available For Public Comment (2016-09-30) www.dhs.gov
Cybercriminals Superior Business Savvy Keeps Them Ahead (2016-09-30) www.darkreading.com
Guilty plea for Syrian Electronic Army accomplice (2016-09-30) www.bbc.co.uk
Importance of Cyber Security driven home with 145,000 DVRs compromised (2016-09-30) www.eagleeyenetworks.com
The Hacking of Yahoo (2016-09-30) www.schneier.com
Newsweek hit with cyberattack after posting Trump Cuba story (2016-09-30) thehill.com
Tweet: #FBI: ldquo; #Snowden has redefined how the private sector shares information with the United States government.rdquo; https://t.co/tEhtlwokF3 (2016-09-30) twitter.com
HTTP Status Trek REST Fest 2016 (2016-10-01) apihandyman.io
?Shadow Brokers? Whine That Nobody Is Buying Their Hacked NSA Files (2016-10-01) motherboard.vice.com
U.S. says hackers probed voting systems, no sign of damage (2016-10-01) www.reuters.com
Metaphors of Big Data (2016-10-01) dismagazine.com
Hacker Releases Code That Powered Record-Breaking Botnet Attack (2016-10-02) motherboard.vice.com
The Russians are not coming; they#039;re already here (2016-10-02) thehill.com
No sign that US voting systems have been hacked ? yet (2016-10-02) disruptiveviews.com
Software backward compatibility undocumented APIs and importance of history etc (2016-10-03) www.codeproject.com
Week ahead in cyber: Lawmakers wary of DHS role in election security (2016-10-03) thehill.com
Private pictures of Kate Moss LEAKED after sister Lottie?s Facebook is hacked (2016-10-03) www.itsecurityguru.org
National Cyber Security Centre HQ operational (2016-10-03) www.itsecurityguru.org
Who Makes the IoT Things Under Attack? (2016-10-03) krebsonsecurity.com
Israeli Firm Claims It Can Break WhatsApp?s Encryption from Backpack (2016-10-03) www.itsecurityguru.org
16 Innovative Cybersecurity Technologies Of 2016 (2016-10-03) www.darkreading.com
Brief of Amici Curiae IPhone Security and Applied Cryptography Experts in support of Apple, Inc.s Motion to Vacate Order Compelling Apple, Inc. to Assist Agents in Search, and Opposition to Governments Motion to Compel Assistance (2016-10-03) cyberlaw.stanford.edu
Trump calls for U.S. to use offensive cyberweapons (2016-10-03) www.pcworld.com
Code behind record-breaking cyberattack made public (2016-10-03) thehill.com
IoT DDoS Attack Code Released (2016-10-03) www.darkreading.com
Source Code For World?s Largest DDoS Attack Out In Public: Mirai Botnet Will Allow More Hackers To Unleash Mayhem (2016-10-03) www.itsecurityguru.org
Trump vows #039;cyber review team#039; in new policy proposal (2016-10-03) thehill.com
Overnight Cybersecurity: Trump unveils cyber plans (2016-10-03) thehill.com
Beneath the Smart City (2016-10-03) datasmart.ash.harvard.edu
Trump Calls For ?Crippling? Cyberwar Attack Capabilities (2016-10-03) www.wired.com
Hackers Attacked Voter Registration Systems Of 20 US States, Says Official (2016-10-03) www.darkreading.com
Smart device malware behind record DDoS attack is now available to all hackers (2016-10-03) www.pcworld.com
Apple v. FBI (2016-10-03) cyberlaw.stanford.edu
Threat Group 4127 Targets Hillary Clinton Presidential Campaign (2016-10-03) www.secureworks.com
Have hackers turned my printer into an offensive weapon? (2016-10-04) www.bbc.co.uk
Yahoo scanned customer emails for US intelligence agencies: report (2016-10-04) thehill.com
Cyber-Anything-As-A-Service: Should The Government Just Outsource Everything? (2016-10-04) www.darkreading.com
Snowden?s favorite messaging app receives first federal subpoena (2016-10-04) thehill.com
Yahoo Open Sources Porn-Hunting Neural Network (2016-10-04) www.pcmag.com
Newsweek Site Suffered DDoS Attack After Trump Report (2016-10-04) www.darkreading.com
Yahoo helped US spies scan all its emails in real time for a single phrase (2016-10-04) www.theverge.com
Yahoo Reportedly Scanned Millions of Email Accounts for Intelligence Agencies (2016-10-04) time.com
Johnson Johnson says people with diabetes dont need to worry about potentially lethal wireless attacks on insulin pumps (2016-10-04) boingboing.net
Yahoo Email Surveillance: the Next Front in the Fight Against Mass Surveillance (2016-10-04) www.eff.org
Yahoo secretly built a tool to scan all email in realtime for US spies (2016-10-04) boingboing.net
FBI Tells Users To Protect Their Data (2016-10-04) www.darkreading.com
Watch Out Gamers: Hacked Steam Accounts Distributing Malware (2016-10-04) www.itsecurityguru.org
US tech giants say they didnt do Yahoo-style email spying (2016-10-04) www.pcworld.com
US and China in Cyberspace (2016-10-04) www.schneier.com
Wikileaks Is Making a Twitter Army to Fight Against Misinformation (2016-10-04) motherboard.vice.com
Alleged Guccifer 2.0 hack of Clinton Foundation raises suspicions (2016-10-04) thehill.com
Why to Prioritize Your API Strategy Before Your API Design (2016-10-04) www.programmableweb.com
Relentless DDoS Attack Incidents Raise Alarm For Businesses (2016-10-04) www.darkreading.com
A former insider says Marissa Mayer kept secrets from Yahoo?s security team more than once (YHOO) (2016-10-04) www.businessinsider.com
?Guccifer 2.0? Is Bullshitting Us About His Alleged Clinton Foundation Hack (2016-10-04) motherboard.vice.com
Overnight Cybersecurity: Yahoo surveillance sparks outrage from privacy advocates (2016-10-04) thehill.com
How Did the Feds Get Past Yahoo?s Encryption? Yahoo! (2016-10-04) www.wired.com
South Korean military cyber command hacked by injecting malicious codes into routing server (2016-10-04) www.itsecurityguru.org
A Web API ecosystem through featurebased reuse (2016-10-04) arxiv.org
Exclusive: Yahoo secretly scanned customer emails for U.S. intelligence (2016-10-04) www.reuters.com
The Yahoo Scans Closely Followed Obamas Cybersecurity Emergency Declaration (2016-10-04) www.emptywheel.net
FBI Arrests NSA Contractor on Suspicion of Leaking Hacking Tools (2016-10-05) motherboard.vice.com
Was Yahoos mass wiretap legal? (2016-10-05) www.theverge.com
BuzzFeed hacked by group after outing an alleged member (2016-10-05) thehill.com
The FBI Has Arrested an NSA Contractor for Allegedly Stealing Classified Material (2016-10-05) www.motherjones.com
BRIEF-Accenture to acquire Defense Point Security to bolster cybersecurity services (2016-10-05) www.reuters.com
Security Experts Say New NSA Leak Should Remind Businesses To Protect Against Insiders (2016-10-05) www.crn.com
Maryland man charged with theft of classified government material (2016-10-05) www.reuters.com
Symantec, VMware Strike Cyber-Security Deal (2016-10-05) www.cxotoday.com
Feds Accuse Two 19-Year-Olds Of Hacking For Lizard Squad and PoodleCorp (2016-10-05) motherboard.vice.com
Clinton Foundation: Guccifer 2.0 Didnt Hack Us (2016-10-05) www.pcmag.com
Animas OneTouch Ping Insulin Pump Vulnerabilities (2016-10-05) ics-cert.us-cert.gov
Feds Charge NSA Contractor with Taking Top Secret Documents (2016-10-05) www.wired.com
If the election is hacked, we may never know (2016-10-05) www.pcworld.com
Detecting Ransomware Attacks with Splunk (2016-10-05) blogs.splunk.com
Half Of Cybersecurity Pros Solicited Weekly About A New Job (2016-10-05) www.darkreading.com
Cyber-Security Is Difficult To Quantify (2016-10-05) www.cxotoday.com
Guccifer 2.0 claims to have hacked the Clinton Foundation (2016-10-05) www.pcworld.com
Yahoo email scanning prompts European ire (2016-10-05) www.reuters.com
Feds Charge Two In Lizard Squad Investigation (2016-10-06) krebsonsecurity.com
EU GDPR: Yahoo! Sued Over Data Breach of 500 Million Users (2016-10-06) www.itsecurityguru.org
NSA Director Not Opposed To Splitting Cyber Command From Agency (2016-10-06) www.darkreading.com
Hack warnings prompt cyber security fatigue (2016-10-06) www.bbc.co.uk
NSA contractor charged with stealing secret data (2016-10-06) www.itsecurityguru.org
Execs from Facebook, Google, and Microsoft explain why they use Israel for their RD (GOOG, MSFT, FB) (2016-10-06) www.businessinsider.com
Arizona Official Says Hack Of Voter Data Came Via Employee Email (2016-10-06) www.darkreading.com
Four reasons why election hacking is a big threat (2016-10-06) thehill.com
Masks Lifted on UK?s Cyber Security Unsung Heroes (2016-10-06) www.itsecurityguru.org
Why Its Always Cyber Hunting Season ( What To Do About It) (2016-10-06) www.darkreading.com
Feds Charge Two In Lizard Squad Investigation (2016-10-06) gixtools.net
Yahoo scanned emails to help FBI hunt terrorists (2016-10-06) www.bbc.co.uk
What the Yahoo NSA mightve looked for (2016-10-06) blog.erratasec.com
Partners In The Battle Against Cyberthreats (2016-10-06) www.darkreading.com
Two Teenagers Arrested For Alleged Cyberattack-For-Hire Services (2016-10-06) www.darkreading.com
Yahoo scan by U.S. fell under foreign spy law expiring next year -sources (2016-10-06) www.reuters.com
Yahoo scandals: Verizon wants $1 billion off sale price, report says (2016-10-06) www.siliconbeat.com
World Anti-Doping Agency: Not all leaked docs authentic (2016-10-06) thehill.com
Functional Augmented State Transfer FAST Architecture for Computationally Intensive Network Applications (2016-10-06) arxiv.org
Day 31 (2016-10-06) medium.com
Designing and documenting your API (2016-10-06) medium.com
Tweet Learn The importance of loose coupling in REST API design httpstcor7kuJ1KzIc httpstcowHUqOfBYPu (2016-10-06) twitter.com
Lawmakers on attributing hacks to Russia: Strike back (2016-10-07) thehill.com
Dyn Cited in Brookings Institute?s New Report On The Cost of Internet Shutdowns (2016-10-07) dyn.com
US officially blames Russian government for election-related hacking (2016-10-07) www.pcworld.com
NSA Contractor Arrested for Stealing Classified Information (2016-10-07) www.schneier.com
U.S. officially attributes DNC hack to Russia (2016-10-07) techcrunch.com
Digital Vigilantes Want to Shame DDoS Attackers And Their Corporate Enablers (2016-10-07) motherboard.vice.com
Feds Pin Political Hacks on Russia. But How to Respond? (2016-10-07) www.wired.com
US intel officially blames the Russian government for hacking DNC (2016-10-07) www.theverge.com
USA FREEDOM Act Requires Government to Declassify Any Order to Yahoo (2016-10-07) www.eff.org
Understanding Footnote 14: NSA Lawyering, Oversight, and Compliance (2016-10-07) www.lawfareblog.com
Thanks To Encryption, Governments Need Companies Like Yahoo To Spy on Users (2016-10-07) motherboard.vice.com
The Six Key Questions for the Obama Administration and Companies About Yahoo?s Cooperation With the NSA (2016-10-07) www.aclu.org
Yahoo didnt install an NSA email scanner, it was a "buggy" NSA "rootkit" (2016-10-07) boingboing.net
U.S. accuses Russia of trying to ?interfere with the U.S. election? through internet attacks (2016-10-07) boingboing.net
Arrested NSA contractor is no Snowden, officials say (2016-10-08) thehill.com
Yahoo disables automatic email forwarding feature - AP (2016-10-10) www.reuters.com
WikiLeaks drops new batch of emails allegedly stolen from Podesta (2016-10-10) thehill.com
InfoSec facts from InfoSec fiction: how popular entertainment can help security awareness (2016-10-10) resources.infosecinstitute.com
Disruptive cyber attack on nuclear power plant reported (2016-10-10) disruptiveviews.com
In High-Profile Breaches, Attackers Leveraged Poor Security Hygiene (2016-10-10) duo.com
NSA Compliance and Congress?s Plan: How to Account for Flaws in the Metadata Program? (2016-10-10) www.lawfareblog.com
FBI Hacked Computers in Australia as Part of Global Child Porn Sting (2016-10-10) motherboard.vice.com
swaggergistio Saving and Versioning Swagger definitions (2016-10-10) jordwalsh.com
UN Watchdog: Nuclear Plants Disrupted by Cyber Attack (2016-10-11) www.darkreading.com
Online Gaming Currency Funds Cybercrime In Real Life (2016-10-11) www.darkreading.com
The clumsy, amateurish IoT botnet has now infected devices in virtually all of the worlds countries (2016-10-11) boingboing.net
Cyber Hunters, Incident Response The Changing Nature Of Network Defense (2016-10-11) www.darkreading.com
DDOS Protection for Public Cloud Customers (2016-10-11) resources.infosecinstitute.com
Administration vows #039;proportional#039; response to Russian hack (2016-10-11) thehill.com
G7 sets common cyber-security guidelines for financial sector (2016-10-11) www.reuters.com
Internet of Things Malware Has Apparently Reached Almost All Countries on Earth (2016-10-11) motherboard.vice.com
Is the cyber security industry looking in the wrong place? (2016-10-11) www.itsecurityguru.org
Feds help 33 states with election cybersecurity (2016-10-11) thehill.com
G7 nations develop financial industry cyber guidelines (2016-10-11) thehill.com
Say Cheese: a snapshot of the massive DDoS attacks coming from IoT cameras (2016-10-11) blog.cloudflare.com
Nuclear Power Plant Disrupted by Cyber Attack (2016-10-11) threatpost.com
Research shows Russian hackers could be behind the Mirai botnet (2016-10-12) www.itsecurityguru.org
Take1 Insurance Offers Live-Event Policy Covering Malicious Acts, Including Terrorism (2016-10-12) www.avnetwork.com
Russia shrugs off promise of retaliation from US (2016-10-12) thehill.com
Thoughts on White House Pledge to Respond to DNC Hack (2016-10-12) www.lawfareblog.com
How Hackers Plant False Flags to Hide Their Real Identities (2016-10-12) motherboard.vice.com
Executable Files, Old Exploit Kits Top Most Effective Attack Methods (2016-10-12) www.darkreading.com
Yahoo Temporarily Disables Auto Email Forwarding (2016-10-12) www.pcmag.com
Sierra Wireless Mitigations Against Mirai Malware (2016-10-12) ics-cert.us-cert.gov
The Psychological Impact of Doing Classified Intelligence Work (2016-10-12) www.schneier.com
RiskIQ Web Crawl Discovers PCI Policy Portal Leads to Malware (2016-10-12) www.riskiq.com
Two State Elections Databases Have Been Hacked. The Russians Arent the Only Suspects. (2016-10-12) www.motherjones.com
Feds George warns on cybersecurity; no comment on economy (2016-10-12) www.reuters.com
Russia, Russia, Russia: What Clinton Or Trump Can Do About Nation-State Hacking Gone Wild (2016-10-12) www.darkreading.com
Political Positions On Cybersecurity Matter To Millennials (2016-10-12) www.darkreading.com
Security spending to top $100 billion by 2020: Are we any cyber safer? (2016-10-12) www.zdnet.com
Feds: Yep, Russia Hacked the DNC (2016-10-12) www.pcmag.com
Effective Cyber Security Requires Team Collaboration (2016-10-12) nulab-inc.com
Web App Next Stop In Our Software Journey REST Services Part III (2016-10-12) dzone.com
Australia Says Foreign Spies Hacked Into Its Weather Bureau Last Year (2016-10-12) www.nytimes.com
API Best Practices API Design (2016-10-12) medium.com
Private Information Stored in Document Files Provides Most Popular Breach Target for Cyber Attackers (2016-10-13) www.itsecurityguru.org
(2016-10-13) techcrunch.com
Information Security Spending Will Top $101 Billion By 2020 (2016-10-13) www.darkreading.com
Verizon signals Yahoo data breach may affect acqusition (2016-10-13) www.pcworld.com
Lawful Hacking and the Case for a Strategic Approach to ?Going Dark? (2016-10-13) www.lawfareblog.com
Tor Project and Mozilla Making It Harder for Malware to Unmask Users (2016-10-13) motherboard.vice.com
SSHowDowN Proxy attacks using IoT devices (2016-10-13) www.itsecurityguru.org
Majority of businesses have not inspected cloud services for malware (2016-10-13) www.itsecurityguru.org
Attack Uses Image Steganography For Stealthy Malware Ops On Instagram (2016-10-13) www.itsecurityguru.org
Senator Proposes Voting By Mail to Guard Against Cyberattacks (2016-10-13) www.pcmag.com
Talos Releases Analysis Tool for Locky Ransomware (2016-10-13) continuum.cisco.com
Managed Security Services Provider Netsurion Acquires SIEM Vendor EventTracker (2016-10-13) www.crn.com
Struggling with code to optimize how you chain APIs for advanced data analytics (2016-10-13) community.havenondemand.com
12-year-old SSH vulnerability in IoT devices being abused (2016-10-13) www.itproportal.com
Biden vows US will retaliate against Russia for hacks (2016-10-14) thehill.com
Dozens of U.S. lawmakers request briefing on Yahoo email scanning (2016-10-14) www.reuters.com
Cyber-attacks against nuclear plants, a disconcerting threat (2016-10-14) resources.infosecinstitute.com
Trump underestimates the Russian cyber threat (2016-10-14) thehill.com
Yahoo Breach May Trigger Material Adverse Change Clause (2016-10-14) www.darkreading.com
Lawmakers press Lynch for briefing on Yahoo secret email scanning reports (2016-10-14) thehill.com
Top Dems call on FBI to investigate Trump ally over leaked emails (2016-10-14) thehill.com
Lawmakers want answers about Yahoo scanning emails for U.S. government (2016-10-14) www.siliconbeat.com
Security News This Week: Hackers Hit a Nuclear Plant (2016-10-14) www.wired.com
British banks keep cyber attacks under wraps to protect image (2016-10-14) www.reuters.com
Free Online Cybersecurity Economics Course (2016-10-14) www.schneier.com
API Best Practices API Design (2016-10-14) medium.com
The Evidence Guccifer 2.0 is Russian Intel ? Medium (2016-10-14) medium.com
Instegogram: Leveraging Instagram for C2 via Image Steganography (2016-10-14) www.endgame.com
The API problem (2016-10-15) medium.com
How To Become A Cybersecurity Entrepreneur In A Crowded Market (2016-10-17) www.darkreading.com
Guccifer Sent Back To Romanian Prison (2016-10-17) www.darkreading.com
NSA hackers abandon auction, seek $6M in crowd funding (2016-10-17) thehill.com
What Does a Cybersecurity Researcher Do, Really? (2016-10-17) dzone.com
Cybersecurity from the Break Room to the Board Room (2016-10-17) www.dhs.gov
Knowledge for Cybersecurity (2016-10-17) ebiquity.umbc.edu
How hackers handle stolen login data (2016-10-17) www.itsecurityguru.org
UK spy agencies? bulk data practices ruled unlawful before 2015 (2016-10-17) techcrunch.com
UKs Investigatory Powers Tribunal says GHCQ illegally spied for 17 years (2016-10-17) boingboing.net
Cloud Security Replacing Cybersecurity Industry, Says Analyst (2016-10-17) www.darkreading.com
UK Banks ?Under-reporting? Cyber Incidents (2016-10-17) www.itsecurityguru.org
UK spy agencies broke privacy rules says tribunal (2016-10-17) www.bbc.co.uk
The Internet of Things is being used to launch massive cyberattacks (2016-10-18) www.businessinsider.com
API Usability Matters UX and CX is like DX and (2016-10-18) dret.typepad.com
Shadow Brokers Cancel Auction of Supposed NSA Hacking Tools (2016-10-18) www.itsecurityguru.org
Veracode Report Finds Open Source Components Proliferating Digital Risk at an Alarming Rate (2016-10-18) www.itsecurityguru.org
NyaDrop exploiting Internet of Things insecurity to infect Linux devices with malware (2016-10-18) www.itsecurityguru.org
Ecuador says it disconnected Julian Assange?s internet because of Clinton email leaks (2016-10-18) www.theverge.com
Yahoo Says Traffic Rose Despite Hacking That Could Alter Verizon Deal (2016-10-18) www.nytimes.com
Cognitive Security (2016-10-18) www.itsecurityguru.org
Public Wi-Fi Use Grows, Despite Security Risks (2016-10-18) www.darkreading.com
Ecuador affirms Assange#039;s asylum status amid internet access questions (2016-10-18) thehill.com
WikiLeaks blames U.S. for cutting Assanges internet connection (2016-10-18) www.pcworld.com
Hackers create more IoT botnets with Mirai source code (2016-10-18) www.pcworld.com
?Dyre? malware re-surfaces as ?TrickBot?, targets Australian banks (2016-10-18) www.itsecurityguru.org
Yahoo left out something important when it said users havent fled since its big hack (YHOO) (2016-10-18) www.businessinsider.com
The New Face of Law and Cyber Warfare (2016-10-18) www.lawfareblog.com
(2016-10-18) www.itsecurityguru.org
Ecuador confirms it cut off Assange?s internet access to prevent him from derailing US elections (2016-10-18) thenextweb.com
Regulators to set new cybersecurity standards for banks (2016-10-19) thehill.com
Yahoo, ACLU press U.S. to disclose secret surveillance orders (2016-10-19) www.reuters.com
BRIEF-Office of Director of National Intelligence confirms receipt of Yahoos letter (2016-10-19) www.reuters.com
Security Lessons from a Power Saw (2016-10-19) www.schneier.com
LinkedIn blames Russian hacking suspect for 2012 breach (2016-10-19) www.pcworld.com
ThreatConnect Shares Incident Information on Major Financial Institution Domain Squat (2016-10-19) www.threatconnect.com
Six Ways Cities Can Make Cybersecurity a Top Priority (2016-10-19) datasmart.ash.harvard.edu
FBI and Czech police arrest Russian hacker for US attacks (2016-10-19) thenextweb.com
From Good to Great API (2016-10-19) api-university.com
Hacker Allegedly Responsible for Massive 2012 LinkedIn Breach Arrested (2016-10-19) motherboard.vice.com
Man arrested in Czech Republic suspected of hacking LinkedIn (2016-10-19) thehill.com
Is IoT Posing a Threat To Cyber Security? (2016-10-19) dzone.com
Why cybersecurity certifications suck (2016-10-19) blog.erratasec.com
Smart Cities Have No Cybersecurity, Say 98% Of Government IT Pros (2016-10-19) www.darkreading.com
St. Jude Medical Plans Cybersecurity Advisory Panel (2016-10-19) www.darkreading.com
Aviation Officials Step Up Cybersecurity Checks of Older Messaging System (2016-10-19) www.wsj.com
Designing better Web APIs Part I arefscom (2016-10-19) arefs.com
U.S. calls on banks to set higher cyber security standards (2016-10-19) www.reuters.com
BRIEF-U.S. govt officials considering release of additional info on court order served on Yahoo (2016-10-19) www.reuters.com
Is your security camera hacking someone else? (2016-10-19) sensr.net
There Are Almost Half of Million IoT Devices Infected with the Mirai IoT Malware (2016-10-19) www.itsecurityguru.org
Inside the DDoS attacks powered by large IoT botnetsSecurity Affairs (2016-10-19) securityaffairs.co
Man suspected of stealing 100 million LinkedIn users information is arrested in Prague (2016-10-19) www.latimes.com
Yahoo Seeks U.S. Declassification of Data-Gathering Efforts (2016-10-19) www.wsj.com
Russian arrested over LinkedIn hack (2016-10-20) www.bbc.co.uk
New Free Tool Stops Petya Ransomware Rootkits (2016-10-20) www.darkreading.com
US charging arrested NSA contractor with espionage (2016-10-20) thehill.com
Why Poor Cyber Hygiene Invites Risk (2016-10-20) www.darkreading.com
Recent IoT-based Attacks: What Is the Impact On Managed DNS Operators? (2016-10-20) dyn.com
How To Crash A Drone By Hacking Its 3D Propeller Design (2016-10-20) www.darkreading.com
Hajime, Yet Another IoT Botnet (2016-10-20) hackaday.com
NSA contractor to face espionage charges for alleged data theft (2016-10-20) www.reuters.com
Why Arent We Talking More Proactively About Securing Smart Infrastructure? (2016-10-20) www.darkreading.com
WikiLeaks releases messages from Obama (2016-10-20) thehill.com
Researchers link Podesta hack to Russia (2016-10-20) thehill.com
Yahoo Demands Government Be More Transparent About Data Requests (2016-10-20) www.darkreading.com
Czech police nab Russian suspected of hacking U.S. targets (2016-10-20) www.scmagazine.com
Russia Hackers to Blame for Wikileaks Emails - Proof Vladmir Putin Was Behind the Clinton Email Hack (2016-10-20) www.esquire.com
7 Imminent IoT Threats (2016-10-21) www.darkreading.com
ThreatConnect Shares Incident Information on a Phishing Page Serving Fake Login for University (2016-10-21) www.threatconnect.com
Researchers sabotage 3D printer files to destroy a drone (2016-10-21) techcrunch.com
Anonymous Hacker Officially Charged for Boston Hospital DDoS Attacks (2016-10-21) www.itsecurityguru.org
SPECIAL ALERT: DDoS Attack Shuts Down Key Fintech Sites (2016-10-21) bankinnovation.net
NSA Contractor Over 20 Years Stole More Than 50 Terabytes Of Govt Data (2016-10-21) www.darkreading.com
U.S. indicts Russian for hacking LinkedIn, Dropbox, Formspring (2016-10-21) www.pcworld.com
Homeland Security Is ?Investigating All Potential Causes? of Internet Disruptions (2016-10-21) time.com
DNS provider Dyn facing another massive DDoS attack ? Twitter, Reddit, and more impacted [Updated] (2016-10-21) thenextweb.com
Too small for cyber security? Think again. (2016-10-21) www.itsecurityguru.org
Dyn issues affecting joint customers (2016-10-21) blog.cloudflare.com
Cyber Training For First Responders To Crime Scene (2016-10-21) www.darkreading.com
What We Know About Friday?s Massive East Coast Internet Outage (2016-10-21) www.wired.com
Reports: Cyberattack Spurs Widespread Internet Outage On East Coast (2016-10-21) www.crn.com
UPDATE 8-Cyber attacks disrupt PayPal, Twitter, other sites (2016-10-21) www.reuters.com
Google?s $100K cybersecurity award given to University of California Santa Barbara (2016-10-21) www.itsecurityguru.org
?The need to stay alert as data breach costs rise? (2016-10-21) www.itsecurityguru.org
DDoS Attack On DNS Provider Disrupts Okta, Twitter, Pinterest, Reddit, CNN, Others (2016-10-21) www.darkreading.com
The Feds are investigating todays massive DDoS attacks (2016-10-21) www.theverge.com
Major DDoS attack on Dyn DNS knocks Spotify, Twitter, Github, Etsy, and more offline (2016-10-21) www.pcworld.com
What is a Distributed Denial-of-Service Attack and How Did it Break Twitter? (2016-10-21) spectrum.ieee.org
UK?s new cyber security centre to debunk scare tactics and lead by example (2016-10-21) techcrunch.com
RPT-UPDATE 1-Russian indicted in U.S. on charges of hacking LinkedIn (2016-10-21) www.reuters.com
A denial-of-service attack shut down major websites across the internet (2016-10-21) www.theverge.com
Dyn, a managed DNS service, hit with attack, popular sites see performance issues (2016-10-21) www.zdnet.com
Report: Suspected spy being investigated for mysterious NSA auction (2016-10-21) thehill.com
Russian indicted in U.S. on charges of hacking LinkedIn (2016-10-21) www.reuters.com
Indian Banks Hit By Debit Card Security Breach (2016-10-21) www.darkreading.com
Some notes on todays DNS DDoS (2016-10-21) blog.erratasec.com
Internet Attack Spreads, Disrupting Major Websites (2016-10-21) www.nytimes.com
Cybersecurity, Unscrupulous Diners, and Internet Stewardship (2016-10-22) cyberlaw.stanford.edu
Smart home devices used as weapons in website attack (2016-10-22) www.bbc.co.uk
Anonymous Hacker Officially Charged for Boston Hospital DDoS Attacks (2016-10-22) news.softpedia.com
US Should Help Private Sector Active Defense, But Outlaw Hacking Back, Says Task Force (2016-10-31) www.darkreading.com
Cloud originated DDoS attacks (2016-10-31) resources.infosecinstitute.com
Feds Preach Cybersecurity to Carmakers (2016-10-31) spectrum.ieee.org
Recent Botnet Attacks Highlight Importance of Automated Testing to Harden Defenses (2016-10-31) dzone.com
Hackers reveal apparent targets of NSA cyber espionage (2016-10-31) thehill.com
Introduction to APIFirst Design (2016-10-31) www.programmableweb.com
Sundown Exploit Kit Operating 80,000 Malicious Subdomains (2016-10-31) continuum.cisco.com
Shadow Brokers post list of compromised IP addresses (2016-10-31) techcrunch.com
What We?re Scared About This Halloween: Prosecutorial Discretion Under Notoriously Vague Computer Crime Statute (2016-10-31) www.eff.org
Hackforums Shutters Booter Service Bazaar (2016-10-31) krebsonsecurity.com
Introducing Seamless Source Control Integration With Bitbucket and SwaggerHub (2016-10-31) dzone.com
Controversial Chinese cybersecurity law enters home stretch for approval (2016-10-31) www.reuters.com
Internet of Things Attacks are More than a Nuisance (2016-10-31) community.infoblox.com
Fraud report names most sophisticated cyber-attacks globally in 2016 (2016-10-31) www.scmagazine.com
Cybersecurity action must catch up to interest: A lesson from ?Snowden? (2016-11-01) blog.datagravity.com
Shadow Brokers Releases Second Trove of Spying Tools (2016-11-01) www.pcmag.com
We Need A National Cyber Defense Agency (2016-11-01) www.huffingtonpost.com
Microsoft preparing to patch security flaw used in cyberattacks (2016-11-01) thehill.com
UPDATE 2-Microsoft says Russia-linked hackers exploiting Windows flaw (2016-11-01) www.reuters.com
ThreatConnect Shares Incident Information on Turla APT satellite-based infrastructure (2016-11-01) www.threatconnect.com
7 Misconceptions of AI, Machine Learning and Cybersecurity (2016-11-01) www.itsecurityguru.org
UK to increase national cyber-defence grid (2016-11-01) www.itsecurityguru.org
ThreatConnect Shares Incident Information on Typosquatting Domains (2016-11-01) www.threatconnect.com
UK government to spend $2.3 billion to bolster cybersecurity (2016-11-01) www.pcworld.com
National Cyber Security Strategy launched by UK chancellor (2016-11-01) www.infosecurity-magazine.com
Another Shadow Brokers Leak (2016-11-01) www.schneier.com
Details emerging on Dyn DNS DDoS attack, Mirai IoT botnet (2016-11-01) searchsecurity.techtarget.com
Microsoft handed the NSA access to encrypted messages (2016-11-01) www.theguardian.com
Bedrock Automation Extends Cyber Security to Industrial Serial Communications with the Bedrock SIOS.5 Serial I/O Module (2016-11-02) www.remotemagazine.com
Ohio using National Guard cybersecurity team to protect elections (2016-11-02) thehill.com
Why I Dont Like UPDATE Methods In API Design (2016-11-02) www.bennadel.com
COLUMN-Does the FBI think Russia hacked Weiners computer? (2016-11-02) www.reuters.com
How Unchecked Spying Corrodes Democracy Around the World (2016-11-02) www.aclu.org
We Need A National Cybersecurity Strategy That Everyone Can Implement (2016-11-02) ctovision.com
Why the Government Must Disclose Its Exploit to the Defense in the Playpen Cases (2016-11-02) www.eff.org
Free Cybersecurity MOOC from F-Secure and the University of Finland (2016-11-02) www.schneier.com
Tim Berners-Lee Warns Hackers Could Exploit Open Data To Wreak Real-World Chaos (2016-11-02) www.techweekeurope.co.uk
We Need A National Cybersecurity Strategy That Everyone Can Implement (2016-11-02) www.fedcyber.com
Building The LinkedIn Knowledge Graph (2016-11-02) engineering.linkedin.com
It#039;s time to make Russia pay for its cyberattacks (2016-11-03) thehill.com
American Industry Benefiting From Government Cybersecurity Executive Transitions (2016-11-03) ctovision.com
Photobucket Hacker Sent To Prison (2016-11-03) www.darkreading.com
Liberia hit with attack that downed Twitter earlier this month (2016-11-03) thehill.com
Key Points in the New UK National Cyber Security Strategy (2016-11-03) duo.com
Why Cybersecurity Is So Hard -- Absurd Division (2016-11-03) www.lawfareblog.com
Cybersecurity Recommendations for the Next Administration: Keep Cybersecurity Front and Center (2016-11-03) www.lawfareblog.com
Police in Quebec are spying on journalists and Snowden calls that "a threat to democracy" (2016-11-03) boingboing.net
Nation-Blanking DDoS Attacks Launched By Individuals Now Proven Able To Take Entire Nation?s Off The Net (2016-11-03) ctovision.com
Ukraine hackers claim huge Kremlin email breach (2016-11-03) www.bbc.co.uk
Ne?er-Do-Well News and Cyber Justice (2016-11-04) krebsonsecurity.com
U.S. boosting cyber defenses, but not police presence, for election (2016-11-04) www.reuters.com
China adopts controversial cybersecurity law: Xinhua (2016-11-06) www.reuters.com
REFILE-UPDATE 2-Raid on 20,000 Tesco Bank accounts fuels UK cybercrime fears (2016-11-07) www.reuters.com
4G Cellular Networks At Risk Of DoS Attacks (2016-11-07) www.darkreading.com
CA welcomes release of UK National Cyber Security Strategy (2016-11-07) blogs.ca.com
FireEye CEO And CFO On Election Cybersecurity, A Renewed Channel Push And Company Restructuring (2016-11-07) www.crn.com
Announcing the New Apigee Edge Experience Apigee (2016-11-07) apigee.com
Unsealed Court Docs Show FBI Used Malware Like ?A Grenade? (2016-11-07) motherboard.vice.com
China?s New Cybersecurity Rules May Block Western Innovation (2016-11-07) www.technologyreview.com
After cyber attacks, Internet of Things wrestles with making smart devices safer (2016-11-08) www.reuters.com
Public Consultation on the Proposed Approach to EU Cyber Security Directive (2016-11-08) bhconsulting.ie
Asia financial body says China cyber security law could make risk management harder (2016-11-08) www.reuters.com
Merkel fears Russian meddling in German election (2016-11-08) thehill.com
DDoS Attack and Resiliency Measures (2016-11-08) dzone.com
Winter Denial of Service attack knocks out heating in Finnish homes (2016-11-08) boingboing.net
Trump?s Win Signals Open Season for Russia?s Political Hackers (2016-11-09) www.wired.com
(2016-11-09) continuum.cisco.com
A lightbulb worm could take over every smart light in a city in minutes (2016-11-09) boingboing.net
Yahoo is worried that hackers might have access to your accounts (2016-11-09) thenextweb.com
What are the Biggest Issues in Cyber Security in 2016? (2016-11-09) www.huffingtonpost.com
The Big Lesson We Must Learn From The Dyn DDoS Attack (2016-11-09) www.darkreading.com
US Customs Police Paid Contractors to Monitor the Dark Web (2016-11-10) motherboard.vice.com
Free Cloud Storage Putting Small Business Data At Risk (2016-11-10) www.darkreading.com
Bangladesh Bank to retrieve $15 million of $81 million cyber heist (2016-11-10) thehill.com
Yahoo knew of state-backed hack in 2014 (2016-11-10) www.bbc.co.uk
U.S. charges Florida man in case linked to JPMorgan hacking probe (2016-11-10) www.reuters.com
Self-Propagating Smart Light Bulb Worm (2016-11-10) www.schneier.com
Britain flexes its cyber-muscles (2016-11-10) www.economist.com
Left-wing cyber-hangout blames security breach on pro-Trump trolls (2016-11-11) www.itsecurityguru.org
Global industry groups voice opposition to China cyber security law (2016-11-11) www.reuters.com
To Keep Users Secure, Facebook Shops the Darkweb for Stolen Passwords (2016-11-11) continuum.cisco.com
Sharing Threat Intel: Easier Said Than Done (2016-11-11) www.darkreading.com
Facebook Buys Leaked Passwords From Black Market, But Do You Know Why? (2016-11-11) www.itsecurityguru.org
OpenAPI GUI (2016-11-12) mermade.github.io
Swagger toolbox (2016-11-12) swagger-toolbox.firebaseapp.com
Devious Ransomware Frees You if You Infect Two Other People (2016-12-13) www.wired.com
How Russia pulled off a cyberwar invasion of America, according to the New York Times (2016-12-13) boingboing.net
The Query Volumes of Mirai DGAs (2016-12-13) blog.opendns.com
DDoS: Thirty-four arrested after international probe (2016-12-13) www.bbc.co.uk
Global Cybercrime Sweep Targeted Young DDoS Attackers (2016-12-13) www.darkreading.com
Seventeen-year-old sentenced for 2015 TalkTalk hack (2016-12-13) www.reuters.com
NY TIMES: DNC hacks turned US media into de facto instrument of Russian intelligence (2016-12-13) www.businessinsider.com
The Perfect Weapon: How Russian Cyberpower Invaded the U.S. (2016-12-13) www.nytimes.com
Senate Foreign Relations panel to probe Russian hacking (2016-12-13) thehill.com
TalkTalk hacker, 19, pleads guilty at the Old Bailey (2016-12-13) www.bbc.co.uk
Impressive demonstration of social engineering (2016-12-13) boingboing.net
Security Expert On Presidential Election Hack: We Should Have Expected This For a Long Time (2016-12-13) www.crn.com
White House spokesman suggests Trump knew of Russias alleged hacking before the election (2016-12-14) www.businessinsider.com
Yahoo Says 1 Billion User Accounts Were Hacked (2016-12-14) www.nytimes.com
Foundations of RESTful Architecture (2016-12-14) dzone.com
API Modeling A ZeroCode Way To a Designer API (2016-12-14) www.tibco.com
Wannabe Hackers Are Willing to Pay To Learn How To Use the Mirai Botnet (2016-12-14) www.itsecurityguru.org
Yahoo says one billion accounts exposed in newly discovered security breach (2016-12-14) www.reuters.com
REPORT: Intelligence officials believe Putin was directly involved in the Democratic Party hacks (2016-12-14) www.businessinsider.com
Yahoo discloses hack of 1 billion accounts (2016-12-14) thehill.com
House Intel chair calls for briefing Thursday on Russian hacking (2016-12-14) thehill.com
Corker: US officials shouldn#039;t get their #039;hair on fire#039; over Russian hacking (2016-12-14) thehill.com
7 Secrets to Designing Alexa Skills (2016-12-14) dzone.com
New Cybersecurity Book Highlights Growing Threat of Social Engineering (2016-12-14) www.itsecurityguru.org
Vladimir Putin was directly involved in US election hack, report says (2016-12-14) www.theverge.com
1 Billion Users Exposed In Another Record Breach From Yahoo (2016-12-15) www.darkreading.com
Dem asks Chaffetz to investigate Russian hacking (2016-12-15) thehill.com
U.S. intelligence officials say Putin was personally involved in U.S. election hack (2016-12-15) boingboing.net
US Election Assistance Commission confirms ‘possible’ hack (2016-12-15) thenextweb.com
Salesforce Security CTO: How A DDoS Attack Can Impact A Smart Grid (2016-12-15) www.crn.com
American Hacker Arrested For 2014 JP Morgan Chase Breach (2016-12-15) www.darkreading.com
Putin reportedly oversaw Clinton email dump and election hacks personally (2016-12-15) thenextweb.com
White House suggests Putin authorized DNC hack and helped to elect Trump (2016-12-15) www.theverge.com
Yahoo Reveals Biggest Hack; Over 1Bn Accounts Compromised (2016-12-15) www.cxotoday.com
How to replace 5 major Yahoo services and delete your Yahoo account (2016-12-15) www.pcworld.com
Real-World Fallout From The Cybersecurity Skills Gap (2016-12-15) www.darkreading.com
Reid: Putin #039;clearly#039; involved in election hack (2016-12-15) thehill.com
Donald Trump - Pants on Fire! Trump tweet about White House, Russian hacking probe (2016-12-15) www.politifact.com
Assange: Some leaks may have been Russian (2016-12-15) thehill.com
Russia: Claim that Putin is behind hacking is #039;nonsense#039; (2016-12-15) thehill.com
BRIEF-NATO and FireEye announce cyber information sharing agreement (2016-12-16) www.reuters.com
As US Government Traces Hacks to Putin, Russia Cracks Down on Hackers at Home (2016-12-16) www.motherjones.com
Stolen Yahoo User Data Sold for $300K (2016-12-16) www.pcmag.com
Romanian Gets 57-Months Jail For ATM Skimming Scheme (2016-12-16) www.darkreading.com
FBI backs up CIA: Russia intervened to help Trump win 2016 election (2016-12-16) thenextweb.com
Time to stop handwringing about Russia and do something serious (2016-12-17) thehill.com
Schumer joins McCain in call for independent probe of Russian hacking (2016-12-18) thehill.com
API Design for C epub (2016-12-18) thywifyjudit.full-design.com
Podesta: FBI didn#039;t tell me about hacks until after WikiLeaks began publishing emails (2016-12-18) thehill.com
Senators call for probe of cyber attacks by Russia (2016-12-18) www.reuters.com
Yahoo security problems a story of too little, too late (2016-12-18) www.reuters.com
Kremlin says it is not in contact with Trump team (2016-12-19) thehill.com
The Power of OpenClosed Principle (2016-12-19) dzone.com
Russian Hackers Seized Control of Pentagon Email System (2016-12-19) www.itsecurityguru.org
Malware Exchange Busted by the Feds Relaunches, At Least in Name (2016-12-19) motherboard.vice.com
The U.S. Response to Russian Pre-Election Meddling: An Overview (2016-12-19) www.lawfareblog.com
US Charges 3 Romanians With Cyber Fraud Involving $4 Million (2016-12-19) www.darkreading.com
2017 Cyber Security Predictions (2016-12-19) resources.infosecinstitute.com
Russian Official Blames Western Media for Turkish Ambassadors Assassination (2016-12-19) www.motherjones.com
Future of APIs (2016-12-19) medium.com
Whistleblowers Don’t Need Elite Credentials To Help Protect Us from Government Overreach (2016-12-26) www.eff.org
Report: Distributed Denial of Service Attacks Increased In 2016, Spurred By IoT Vulnerabilities (2016-12-28) www.crn.com
Kerry: Russian interference had #039;profound impact#039; on election (2016-12-28) thehill.com
Another Massive DDoS Closes Out 2016, But Mirai Not To Blame (2016-12-28) www.darkreading.com
Modernizing Legacy PHP apps with APIs (2016-12-28) leanpub.com
Cyberattack On Ukraine Conflict Watchdog (2016-12-29) www.darkreading.com
NH Department of Health and Human Services Announces Data Breach (2016-12-29) www.itsecurityguru.org
Creating a Simple Android REST Client Using HTTPRPC (2016-12-29) dzone.com
New Report Says Russian Hacking Came From Russia (2016-12-29) www.motherjones.com
Threat Actors Bring Ransomware To Industrial Sector With New Version of KillDisk (2016-12-29) www.darkreading.com
U.S. accuses Chinese citizens of hacking law firms, insider trading (2016-12-29) www.itsecurityguru.org
GRIZZLY STEPPE - Russian Malicious Cyber Activity (2016-12-29) www.us-cert.gov
FBI analysis fingers Russian spy agencies for U.S. election hacks (2016-12-29) www.reuters.com
Russian minister proposes expelling 35 Americans in tit-for-tat response (2016-12-30) thehill.com
Evidence of Russian malware found on US electrical company laptop (2016-12-30) www.theverge.com
Policy, statistics and questions: Reflections on UK cyber security disclosures{dagger} (2016-12-30) cybersecurity.oxfordjournals.org
Cyber Intelligence and Defense for the Public Sector, Part 3: The Rise of Active Defense (2016-12-30) ctovision.com
Luggage Tag Code Unlocks Your Flights, Identity to Hackers (2016-12-31) www.pcmag.com
Leahy calls utility breach #039;direct threat to Vermont#039; (2016-12-31) thehill.com
Grizzly Steppe Russian Malware Found on Vermont Utility System (2016-12-31) www.pcmag.com
Beautiful Node APIs (2017-01-01) webapplog.com
Be Prepared for Many More Data Breaches This Year (2017-01-02) www.cxotoday.com
Feminist cybersecurity 101 (2017-01-02) boingboing.net
GOP rep suggests CIA, NSA leaked info on Russian hacking (2017-01-02) thehill.com
Trumps cybersecurity book, from (Bill) OReilly (2017-01-02) boingboing.net
10 Cybersecurity Lessons Learned In 2016 (2017-01-02) www.crn.com
DDD REST Domain Driven APIs for the Web (2017-01-02) www.infoq.com
DIY Feminist Cybersecurity (2017-01-02) hackblossom.org
The Chrysler Portal is the all-electric self-driving minivan for your futuristic family (2017-01-03) www.theverge.com
The Download on the DNC Hack (2017-01-03) krebsonsecurity.com
Symantec Research Provides Key Evidence for International Cybercriminal Takedown (2017-01-03) www.itsecurityguru.org
Russian ‘grid attack’ turns out to be a damp squib (2017-01-03) www.itsecurityguru.org
Class Breaks (2017-01-03) www.schneier.com
WikiLeaks hints at potential releases in 2017 warning ‘prepare for showdown’ (2017-01-03) www.itsecurityguru.org
The Biggest Cyber-Security Incidents of 2016 (2017-01-03) resources.infosecinstitute.com
Cyberrisk Through A Business Lens (2017-01-03) www.darkreading.com
Protobuf Alternative to REST for Microservices (2017-01-03) www.ensor.cc
Dear Obama, From Infosec (2017-01-03) blog.erratasec.com
Russia did not hack Vermont electric utility: report (2017-01-03) thehill.com
Anonymous hackers deface Victoria’s Human Rights Commission website, claim AnonPlus is ‘non-criminal’ (2017-01-03) www.itsecurityguru.org
CIA chief: #039;Wait and see#039; report before doubting Russian hacking (2017-01-03) thehill.com
Plenty of users sticking with Yahoo despite data breaches (2017-01-03) www.itsecurityguru.org
Obamas Disclosure About Russian Hacking Is A Cybersecurity Gold Mine (2017-01-03) www.huffingtonpost.com
Cybersecurity Approaches Are Maturing but Spending Is Misdirected and People Are Still the Problem (2017-01-03) www.itsecurityguru.org
Kaspersky warning on Switcher Trojan that uses Android devices to compromise routers (2017-01-03) www.theinquirer.net
Ransomware on smart TVs is here and removing it can be a pain (2017-01-04) www.itsecurityguru.org
Managing Medical Device Cybersecurity in the Postmarket: At the Crossroads of Cyber-safety and Advancing Technology (2017-01-04) ics-cert.us-cert.gov