Cybersecurity News

These are the news items I've curated in my monitoring of the API space that have some relevance to the terms of service conversation and I wanted to include in my research. I'm using all of these links to better understand how the space is testing their APIs, going beyond just monitoring and understand the details of each request and response.

Title Source Visit
Why Startups Need an API (2012-04-21)
OData and Impact on API Design (video slides) (2012-06-03)
API Design from Apigee - 3rd Edition (2013-01-16)
API Design Development Guidelines (2013-02-16)
New API Blueprint Format Basics?The Apiary Blog (2013-02-21)
Designing A RESTful API That Doesnt Suck (2013-03-24)
Creative Market Launches Photoshop Extension, Announces Upcoming Release of New API (2013-04-11)
Connecting with APIs (2013-04-16)
Machine Sensor Data, APIs and Productivity (2013-04-18)
APIs are changing the game for data delivery (2013-04-23)
Sports APIs ? A Perfect Fit (2013-04-25)
Designing APIs for Humans (2013-04-25)
Want to Attract Developers to your API? Set Them Free (2013-04-26)
API Design from Apigee (2013-04-26)
API Design and Documentation (2013-04-26)
API Design and Architecture Boot Camp from Layer 7 (2013-04-26)
REST API Design Rulebook (2013-04-26)
Three Ways to Think About API Design (2013-04-26)
White House API Standards (2013-04-26)
Stop Designing Fragile Web APIs by Mathieu Fenniak (2013-04-29)
Platform Success Strategies: Communicate the Value of Your API (2013-04-30)
Mashery + Intel = The Ultimate Mashup (2013-05-09)
Omni-channel Explosion: Mashery Signs Strategic Agreement with NetSuite (2013-05-16)
Consistency is Key When Designing APIs (2013-05-22)
Flying Higher with APIs (2013-05-23)
Big Data, IoT, API...Newer technologies protected by older security (2013-05-30)
API Hierarchy of Needs | API UX (2013-05-30)
Swagger with WSO2 API Manager (2013-05-31)
Why you should treat your API like a product (2013-06-04)
APIs vs. The Myth of the Omnichannel Retailer (2013-06-05)
API Management ? The New Black? (2013-06-05)
Web API Design Cookbook (2013-06-11)
API Design Wiki (2013-06-11)
Designing Hypermedia APIs (2013-06-11)
RESTful APIs: White House Sets The Standard(s) (2013-06-17)
API Design: Honing in on HATEOAS (2013-06-17)
When Good API Design is a Waste of Time (2013-06-19)
Data-Driven Aesthetics (2013-06-19)
API Design: Harnessing HATEOAS, Part 1 (2013-06-20)
Get packing with Masherys API Packager (2013-06-21)
Present your API as a Product ? API Portal Presentation Best Practices (2013-06-26)
Better Rest API design 1 (2013-06-27)
Practical API Design: Confessions of a Java Framework Architect (2013-06-29)
Presenting your API as a Product ? Designing your API for Data Exchanges (2013-07-01)
API Crafting Secrets: Into Flightstats APIs (2013-07-02)
API Design: Harnessing HATEOAS, Part 2 (2013-07-03)
Signs youre veering from good API design (2013-07-03)
API Design: A New Model for Pragmatic REST (2013-07-04)
Treat Your API Users as Customers (2013-07-09)
Micro Service Architecture (2013-07-09)
Unlock your datas Potential - Treat your APIs as Products (2013-07-12)
Joshua Bloch: Bumper-Sticker API Design (2013-07-27)
4 Fresh Rotten Tomatoes API Integrations (2013-07-31)
The Future of TV and APIs (2013-08-01)
The Importance of Impermanence in API Design (2013-08-06)
The Future of Medical Technology is Already in Your Hands (2013-08-08)
The Secrets of Awesome JavaScript API Design (2013-08-16)
Api Design, Part 3: Make Transactions And Error Handling... (2013-08-20)
Api Design, Part 1: Rest Is The Leading But Not Only... (2013-08-20)
Api Design, Part 4: Future-proof And Secure Your Apis... (2013-08-20)
Api Design, Part 2: Design Messaging Styles By Balancing... (2013-08-20)
Designing APIs for Asynchrony (2013-08-24)
JSON and XML (2013-09-03)
Learn how to find the Opportunity of Data at the 2013 Business of APIs Conference in San Francisco (2013-09-05)
Apiary Is Growing (2013-09-17)
New API Blueprint available at Apiary (2013-10-02)
RAML - RESTful API modeling language (2013-10-02)
No more outdated API documentation! (2013-10-10)
How To Test REST API with API Blueprint and Dredd (2013-10-17)
APIs At The Heart of your Mobile App Strategy (2013-10-28)
Designing APIs for the Internet of Things (IoT) (2013-10-30)
More Thoughts on an API Commons (2013-11-10)
The Human Aspects of API Design: An Interview with Apiarys Jakub Nesetril (2013-11-14)
Jakub Nesetril, CEO of Apiary on Web APIs and Developer Experience (2014-01-28)
Application Programming eXperience: It?s all about *X - Mobile Apps Stuff (2014-01-28)
A Practical? by D. Keith Casey Jr (2014-02-27)
FloridaSU Expands Innovation Lab with Cube 3D Printers (2014-02-28)
API documentation made beautiful with (2014-02-28)
APIs, Connectors and Integration Applications (2014-04-17)
Toward a Lean API Strategy (2014-05-29)
JSON vs simpleJSON vs ultraJSON (2014-06-02)
API Manager ? Simple JAVA Client Access Example (2014-06-03)
Wearables and Devices Will Drive a New Paradigm in Managing Clinical Data (2014-06-05)
Happiness is a well-designed API | ZDNet (2014-06-06)
The Connected K-9 (2014-06-09)
What is the ?Internet of Things? and how does it relate to APIs? (2014-06-13)
New eBook: APIs and IT Rationalization (2014-06-16)
Why You Should Care Netflix is Shuttering Its Public API (2014-06-18)
Designing Irresistible APIs (2014-06-19)
What is a Developer Evangelist? (2014-06-23)
API-Centric Data Architectures - Part II (2014-06-24)
Hot off the press: 18Fs API Standards (2014-07-15)
Hot off the Press: 18F?s API Standards (2014-07-16)
The Real World Cup Winner: APIs (2014-07-16)
Legos vs APIs ? Top Integration and API Articles of the Week (2014-07-18)
HTTP Response Codes and You | OP3Nvoice (2014-07-23)
Don?t just throw APIs at the problem! (2014-07-24)
Upcoming Webinar ? Integrating Salesforce and SAP (2014-07-25)
APIs: The Key to Surviving a Zombie Apocalypse? (2014-07-25)
Best Practices REST API from Scratch - Introduction (2014-07-25)
Introducing the Anypoint Platform for APIs (2014-07-30)
Reaffirming Intel Services? Connection with Developers and Open Source at OSCON (2014-07-30)
API Management 2.0: Empowering the Enterprise for the Third Industrial Revolution (2014-07-31)
Four Big Mistakes In Your REST API Strategy (2014-08-04)
Stop Talking About Hypermedia and REST - Start Building Adaptable APIs (2014-08-05)
Building an easier on-ramp: Introducing the Anypoint Templates Library (2014-08-06)
Healthcare APIs: Just What the Doctor Ordered (2014-08-07)
Retail Industry APIs and API Management: Helping Us Shop Til? We Drop (2014-08-14)
Integrating Mule ESB with .NET Based Rules Engines (2014-08-19)
A drive by review of the Uber API (2014-08-20)
MuleSoft Summit Heads to Chicago New York (2014-08-20)
Creating Bottom Line Growth by Aligning APIs and Market Trends (2014-08-21)
Bizcoder - A drive by review of the Uber API (2014-08-21)
API Readiness: do you have what you need? (2014-09-25)
Designing APIs for the Web (2014-09-25)
WillowTree Apps Applies Service Virtualization to API Development (2014-09-25)
REST APIthy: #ReadFielding (2014-12-02)
Constructing URLs the easy way (2014-12-03)
Restlet Studio, the First Cross-Language IDE for APIs (2014-12-03)
The Core of Your API (2014-12-23)
Does One API Description Language Fit an Entire Enterprise (2015-01-06)
Connecting Our History At The Digital Public Library of America Using APIs And JSONLD (2015-01-06)
Server Skeletons In Restlet Studio And APISpark (2015-01-06)
FBI: North Korea ?got sloppy? with IP addresses in Sony hack (2015-01-07)
Introducing the Organization Component in Codenvy (2015-01-22)
Improving Cyber Security In 2015: Weil (2015-01-22)
Why you must design your private API in english API Handyman (2015-02-08)
A Guide to REST API Design (2015-02-16)
A Whole New Era of Cyber-Terror Coming Your Way! (2015-02-16)
Connect your TV, home, even your body, to the internet. But beware hackers (2015-02-16)
apiaryioapiblueprint Gitter (2015-02-17)
Utilising API Blueprint in API Clients (2015-02-17)
How API Description Languages Enable API IDEs (2015-02-18)
Community Debates API Specification Alternatives (2015-02-18)
Using Templates for Documentation Driven API Design (2015-02-19)
Collaborators New External API (2015-02-19)
LucyBot Eliminates CrossLanguage Programming Necessity (2015-02-20)
MuleSoft Releases RAML NET Parser Visual Studio Extension (2015-02-20)
API Best Practices The Wrap Up (2015-02-20)
LucyBot Get your APIs consumers moving faster (2015-02-20)
Using Templates For Documentation Driven API Design (2015-02-21)
A Guide to REST API Design API Academy (2015-02-21)
My Brain Dump On An API Definition Fueled Life Cycle (2015-02-22)
What Makes an Agile API (2015-02-24)
Metadesign The intersection of art design and computation (2015-02-24)
The White House establishes a new agency to collect cyber security intelligence (2015-02-26)
Bizcoder Dont Design A Query String You Will One Day Regret (2015-02-26)
The beautiful API and the bestial backoffice API Handyman (2015-02-27)
Hypermedia API maturity model Part I Hypermedianess (2015-02-28)
Common Cases When Using SOAP Makes Sense (2015-03-02)
The Democratization of Cyberattack (2015-03-02)
Dropbox starts using POST and why this is poor API design (2015-03-02)
ApplicationLevel Profile Semantics ALPS (2015-03-02)
Metadesign The intersection of art design and computation OReilly Radar (2015-03-02)
Dropbox Sparks Controversy With API Design Decision (2015-03-03)
My API Design Research (2015-03-03)
Apigee Product Highlight Video SmartDocs (2015-03-03)
POST effyouthisistherighturl RESTful API Design (2015-03-04)
We Need An Open Library Of The Most Common Utility API Implementations (2015-03-07)
Ideal REST API design betim drenicas blog (2015-03-09)
Targeting Some APIs In My Stack For House Cleaning And Maybe Some Design Iterations (2015-03-09)
Facebook Applies Versioning Strategy to Marketing API (2015-03-10)
Cyveillance Partners with Centripetal Networks Inc. to Deliver Actionable Threat Intelligence (2015-03-10)
CyberPatriot: Training Future Cyber and STEM Leaders (2015-03-11)
Augmenting A Read Only API With AN External POST PUT And DELETE (2015-03-12)
Cyveillance Blog ? The Cyber Intelligence Blog Cyveillance Weekly Cyber Security Trends Report (2015-03-12)
Wyden: Cybersecurity Bill Lacks Privacy Protections, Doesn?t Secure Networks (2015-03-12)
10 Usability Lessons for APIs (2015-03-14)
Designing a Web API (2015-03-16)
Why Your APIs Need Design Help (2015-03-16)
20 API Design Tips to Stop Annoying Developers (2015-03-17)
The API Field of Dreams Build It Correctly and They Will Come (2015-03-18)
I have my opinions on API design (2015-03-20)
HTML6 APIs as Natural Friends (2015-03-21)
APIs arent apps Make them as thin and light as possible (2015-03-23)
?Threat-sharing? bill proposed to counter cybersecurity threats (2015-03-25)
The ways of the API smartness (2015-03-28)
eCommerce API Design The Good The Bad and The Etsy API (2015-03-30)
Bizcoder API Design Notes Smart Paging (2015-03-31)
InfoQ eMag Web APIs From Start to Finish (2015-03-31)
How to Decide How Many HTTP Status Codes Your API Needs (2015-04-02)
JSON API Spec Goes Through The Hacker News Gauntlet (2015-04-06)
In a REST world theres room for nonREST APIs (2015-04-07)
Building Reusable REST API Services Part 3 of 4 (2015-04-08)
418 Im a teapot and other bad API responses (2015-04-09)
Solving Dropboxs URL Problems (2015-04-10)
Bizcoder Solving Dropboxs URL Problems (2015-04-10)
China Reportedly Has A New Internet Censorship Weapon Called The Great Cannon (2015-04-13)
The Great Cannon Is Chinas Powerful New Hacking Weapon (2015-04-13)
API Part of the Creative Palette (2015-04-14)
REST API design tips (2015-04-19)
Introduction to Apiary Overview of Apiary and How to Create APIs (2015-04-20)
A SIEM is not enough: moving to a complete cyber security solution (2015-04-20)
HTTP Verbs Demystified PATCH PUT and POST (2015-04-21)
Computer Attacks Spur Congress to Act on Cybersecurity Bill Years in Making (2015-04-22)
House passes cybersecurity bill that threatens privacy without clear security benefits (2015-04-23)
The data the hypermedia and the documentation (2015-04-23)
Api Design AntiPatterns (2015-04-25)
White House Takes Cybersecurity Pitch to Silicon Valley (2015-04-26)
Understand about DELETE Verb in Web API RESTful Services using Data from Both Request Body As Well As URI (2015-04-28)
A Day in the Life of a Stolen Healthcare Record (2015-04-29)
The Role of the API Designer (2015-05-03)
Survey Results: Big Opportunity for Big Data in Cybersecurity (2015-05-04)
Assuring Authority for Courts to Shut Down Botnets (2015-05-04)
Guest Post Why The API Pattern Is Broken And How We Can Fix It (2015-05-05)
A cybersecurity firm is being accused of faking hacks to squeeze money out of clients (2015-05-07)
Nearly all web APIs get paging wrong (2015-05-08)
State Department: U.S. Concerned About Possible Chinese Cyberattack On Internet Content (2015-05-08)
Do you really know why you prefer REST over RPC (2015-05-10)
A Guide to REST and API Design (2015-05-11)
FBI seeks cyber threat info-sharing platform (2015-05-13)
Versioning APIs (2015-05-15)
Did this cybersecurity firm use a data breach for extortion? (2015-05-19)
Restlet and SmartBear Partner to Deliver Restlet Studio Plugin for Ready API (2015-05-20)
Apigee adds some Swagger to API design (2015-05-21)
7 Important API Design Lessons (2015-05-21)
Apigee API Studio Designing Testing and Sharing APIs (2015-05-21)
Cybercrime poses a potential existential threat to our society, and were completely unprepared (2015-05-22)
RESTful API Design Part III Error Handling (2015-05-26)
Article From Doodles to Delivery An API Design Process (2015-05-26)
Palo Alto Networks acquires cybersecurity company CirroSecure (2015-05-27)
MOOC on Cybersecurity (2015-05-28)
How to build APIs efficiently (2015-05-30)
US says it will help Japan defend against cyberattacks (2015-05-31)
The Business of Cybercrime (2015-06-01)
Article The Power of RAML (2015-06-02)
Integrations are Hard Part II API Resources Search and Pagination (2015-06-03)
Top 5 Development Tips for a Killer API (2015-06-04)
Why Not To Overlook API Planning And What To Do About It (2015-06-04)
Visions Of My Perfect API Design Editor Using Electron (2015-06-04)
Decoupling the Mind of the API Designer (2015-06-09)
New JSON API Specification Aims to Speed API Development (2015-06-10)
Using API Definitions To Help API Providers With Their API Design Roadmap (2015-06-10)
Splitting My Blog API Into Two Separate APIs For News And Analysis (2015-06-10)
Senate Rejects Measure to Strengthen Cybersecurity (2015-06-11)
A Tale of Four API Designs Dissecting Common API Architectures (2015-06-11)
I.R.S. Increases Efforts to Prevent Identity Theft and Fraud (2015-06-11)
White House Weighs Sanctions After Second Breach of a Computer System (2015-06-12)
Why this security breach is worse than all the others combined (2015-06-12)
Decoupling the Mind of the API Designer (2015-06-12)
Private security clearance info accessed in second OPM breach (2015-06-15)
Cybersecurity Teams for State and Local Government (2015-06-16)
OPM Background Check Hack ? A Different Angle (2015-06-17)
OPM?s Database for Sale? Nope, It Came from Another US .Gov (2015-06-18)
U.S. cyber hack unsettles, frustrates U.S. defense industry (2015-06-18)
Lessons learnt from shipping APIs for Microsofts cloud platform (2015-06-19)
U.S. employee data breach tied to Chinese intelligence (2015-06-19)
Breaking Down Publication References With The Global Change Information System API (2015-06-23)
What is the DoDs Position on Backdoors in Security Systems? (2015-06-24)
The API Design Tooling I Have Included In My Research (2015-06-29)
Crooks Use Hacked Routers to Aid Cyberheists (2015-06-29)
Finding the best cyber security insurance for your firm (2015-06-29)
Should the director of OPM be fired over its massive data breach? (2015-06-29)
API Design Considerations for The Internet of Things (2015-06-30)
Why Its OK To Design Imperfect APIs (2015-06-30)
Tightening Up The Organizations That Are Included In My API Design Research (2015-06-30)
The API Design Tooling I Have Included In My Research (2015-06-30)
My API Design Research Distilled Down As Single PDF Guide (2015-07-07)
Now in Production DELETE page (2015-07-08)
My API Design Research Distilled Down As Single PDF Guide (2015-07-08)
Chinese hackers stole the personal information of about 7% of America from the US government (2015-07-09)
OPM Announces More Than 21 Million Affected by Second Data Breach (2015-07-09)
Cybercrime Kingpin Pleads Guilty (2015-07-10)
How To Design Great APIs With APIFirst Design and RAML (2015-07-10)
HTTP Status Codes httpstatuses (2015-08-10)
A Common Open Source API Design Editor Is Needed For API Service Providers (2015-08-14)
API development startup Apiary raises 68M and launches a testing service VentureBeat Deals by Jordan Novet (2015-08-18)
Resources Not Data (2015-08-21)
DTO engages with developers for API design mandate (2015-08-25)
Live cyber attack map | FlowingData (2015-08-27)
MuckRock ? FBI struggles to recruit private sector partners on cybersecurity (2015-08-27)
Crafting and Publishing API Design Guide Shows That You Are Further Along In Your API Journey (2015-08-28)
The API Design Guide Is Just The Beginning Of The Journey Better Get Started (2015-08-28)
We Need an Open Abstraction Layer to Help Us Better Define and Design Our APIs (2015-08-28)
A Quick Example Of An API Provider Putting Content Type Negotiation To Work (2015-08-31)
Security and the Big Data Cyber Sleuth (2015-09-09)
China angry about US groundless hacking allegations (2015-09-11)
REST in AEM by Roy Fielding (2015-09-11)
There Is A Big Opportunity Right Now When It Comes To API Design Tooling (2015-09-13)
Architectural Styles for APIs SOAP REST and RPC (2015-09-13)
Cybersecurity Bill Could Put More Personal Data in Government Hands (2015-10-22)
Controversial cybersecurity bill gains majority support (2015-10-23)
The FBI says you may need to pay up if hackers infect your computer with ransomware (2015-10-26)
API Design Using Behavior Driven Development (2015-11-24)
Designing Evolvable APIs for the Web Identification (2015-11-25)
Daniel Jacobson on Ephemeral APIs and Continuous Innovation at Netflix (2015-11-28)
Cyber security in 2016 (2015-12-08)
Designing Evolvable APIs for the Web Formats (2015-12-08)
Understanding HTTP content negotiation (2015-12-10)
For cyber security, machine learning offers hope beyond the hype (2015-12-11)
A Fun Way To Explore HTTP Status Codes With A Subway Map From Restlet (2015-12-13)
Presentation Designfirst APIs in Practice (2015-12-16)
REST Fest 2015 Glenn Block FiveInFive in REST Fest 2015 on Vimeo (2015-12-17)
Enhancing Your Apiary Workflow MSON Dredd Style Guides and More on Vimeo (2015-12-17)
inadarei Howto HTTP Caching for RESTful and Hypermedia APIs (2015-12-18)
Cyber-attacks against businesses ?doubled in 2015? (2015-12-23)
Web API A Solid Approach (2016-01-05)
Passing Json data to a RESTful WCF 4 service using JsonNet (2016-01-07)
Mobile and IoT to Dominate Cybersecurity Threats for 2016 (2016-01-08)
Public GETs In Concert With Private POST PUT And DELETE For Your APIs (2016-01-08)
A Look Inside Cybercriminal Call Centers (2016-01-10)
API Design Inspiration on GitHub (2016-01-12)
RESTful ServiceDesign How to overcome the CRUDnature of the RESTstyle (2016-01-13)
Firm Sues Cyber Insurer Over $480K Loss (2016-01-18)
IKANOW Joins Top 20 on Cybersecurity 500 List (2016-01-18)
Apiaryio Now Features Swagger Support (2016-01-19)
Paging in ASPNET Web API (2016-01-21)
The Need for a Holistic Approach to Cybersecurity in mHealth (2016-01-22)
Reverse Engineering APIs From The Common APIs Models We Know (2016-01-25)
Things Have Changed in Cybersecurity ? the Political Front (2016-01-26)
Cybersecurity startup Fireglass raises $20 million (2016-01-26)
St. Lukes Hospital reports possible data breach involving patients info (2016-01-26)
How CloudRail Handles the Seven Deadly Annoyances of API Design (2016-01-29)
Ransomware is not going away: Prepare or pay up (2016-02-01)
Cybersecurity In Postmarket Medical Devices: New Guidance From The FDA (2016-02-01)
an online tutorial with friends (2016-02-02)
Lessons From Training 1400 People in Web API Design (2016-02-02)
Taking Stock of Cybersecurity Images (2016-02-04)
REST essentials for the QuickBooks API (2016-02-04)
The Impact of Cybersecurity?s Top Breaches of 2015 ? cyber incidents get bigger and go mainstream (2016-02-11)
Cybersecurity Funding Grew 234% since 2011 (2016-02-11)
Sharing and saving your Web API design project in the cloud (2016-02-15)
Introducing API Templates (2016-02-16)
U.S. Had Cyberattack Planned if Iran Nuclear Negotiations Failed (2016-02-16)
Using a Prototype as an API Product Specification (2016-02-16)
Dear API Designer Are You Sure You Want to Return a Primitive (2016-02-17)
Why Github039s Scientist 10 Could Be Great for API Versioning (2016-02-17)
The hacked Hollywood hospital is not alone ? schools and clinics across the country are increasingly being hacked for ransom (2016-02-17)
Resolving the FrontendBackend API Design Conflict (2016-02-17)
Resolving the FrontendBackend API Design Conflict (2016-02-17)
Presentation 5 AntiPatterns in Designing APIs (2016-02-23)
IRS: 390K More Victims of IRS.Gov Weakness (2016-02-26)
Interview John Sheehan on Web API Quality (2016-02-27)
Utilities Cautioned About Potential for a Cyberattack After Ukraine?s (2016-02-29)
StopLight Launches Visual API Design Tools (2016-03-01)
Cyberthreat Defense Report: Analytics Climbs to Must-have Application for 2016 (2016-03-02)
400Gbps: Winter of Whopping Weekend DDoS Attacks (2016-03-02)
Designing Web APIs with Restlet Studio (2016-03-04)
API Design Challenges Competing Demands (2016-03-05)
3 Approaches to Monadic API Design in Haskell (2016-03-08)
Designing a Web API with Restlet Studio Visual API editor (2016-03-09)
Article One API Many Facades (2016-03-13)
Designing APIs With Customers in Mind (2016-03-14)
Do My APIs Have The Skills They Need To Compete In A Voice And Bot Enabled World (2016-03-15)
One API many facades (2016-03-16)
Discover the attention surrounding URNs support for a new identifier (2016-03-18)
Well wishes and warnings in the Web API (2016-03-21)
Great APIs Have One Thing in Common (2016-03-22)
Hospital Declares ?Internal State of Emergency? After Ransomware Infection (2016-03-22)
How a DDoS campaign became an act of cyberwar (2016-03-24)
A Tale of Two Chatbots Internet Ethics Views From Silicon Valley (2016-03-29)
Quality API Design and Implementation through RepreZen and SmartBear (2016-03-30)
What Skills Do Your APIs Offer (2016-03-31)
Screencast Design a web API from scratch with Restlet Studio (2016-04-01)
RFC 7807 Problem Details for HTTP APIs (2016-04-04)
Battling the global cybersecurity challenge (2016-04-06)
Homeland Security Dept. Struggles to Hire Staff to Combat Cyberattacks (2016-04-06)
What is a welldesigned API (2016-04-06)
CloudPassage Study Finds U.S. Universities Failing in Cybersecurity Education (2016-04-08)
Strengthening Federal Cybersecurity (2016-04-11)
Consumeroriented API Design (2016-04-12)
How to Improve API Errors With Defensive Design (2016-04-16)
MIT scientists have built an AI that can detect 85% of cyber attacks ? but it still needs human help (2016-04-19)
Build Better Mobile Apps Data and API Best Practices (2016-04-21)
Worlds First API Design Hackathon (2016-04-21)
API Names and Begging the Negatives (2016-04-22)
Build a REST API with XML Payload (2016-04-22)
The Relationship Between BDD and API Design (2016-04-23)
REST API Design at Devoxx France (2016-04-25)
That USB drive you found has more than just spring break photos (2016-04-25)
Never Put Secrets in URLs and Query Parameters (2016-04-29)
HTTP Header Awareness Using The Link Header For Pagination (2016-05-02)
Thinking About An API Proxy To Add Link Header To Each API Response (2016-05-03)
IBM, 8 universities to train Watson for cybersecurity sleuthing (2016-05-10)
NIST Plans to Fend off Quantum Computers That Will Attack Encryption (2016-05-12)
Building a great API Lessons learned from working with dozens of REST APIs (2016-05-17)
Facebook, LinkedIn, Twitter: The New Cyberweapons Of Choice (2016-05-18)
RAMLing Again With API Workbench From Setup to Design (2016-05-19)
A Consumer of a Properly Designed RESTful API Is Writing to an Interface Not an Implementation (2016-05-20)
The Basics of REST and RESTful API Development (2016-06-06)
JSONLD Building Meaningful Data APIs (2016-06-09)
How API First Design Could Have Avoided These Failures (2016-06-14)
API Design in Nodejs with Express (2016-06-15)
Why Your API039s EndUsage Context Matters To Great Developer Experiences (2016-06-21)
Why Your API039s EndUsage Context Matters To Great API Design (2016-06-21)
Don?t get desensitized to cybersecurity threats (2016-06-21)
Three APIs Making the Case Against Building It Yourself (2016-06-29)
HTTPRPC 30 Released Announcement (2016-07-01)
European Commission approves new investment in cybersecurity (2016-07-05)
A Cambridge cybersecurity startup thats full of spies just raised $65 million (2016-07-06)
Obama stresses need to improve US government cybersecurity (2016-07-10)
Scaling Your API Design Workflow (2016-07-10)
Presentation REST Considered Harmful (2016-07-12)
Chinese government likely hacked FDIC: report (2016-07-13)
Overnight Cybersecurity: Guccifer 2.0 releases more DNC docs; China hacked banking regulator (2016-07-13)
Federal Regulators Focus on Minimum Cyber Standards For Banks (2016-07-13)
New Ransomware Takes Your Money, Deletes Files Anyway (2016-07-14)
FDIC was hacked by China, and CIO covered it up (2016-07-14)
API Errors Are First Class Citizens (2016-07-15)
Facebook, Twitter, and YouTube blocked in Turkey during reported coup attempt (2016-07-15)
Foreign Policy Cyber Security | The White House (2016-07-16)
New HIPAA Guidance on Ransomware in Healthcare (2016-07-18)
Report: More, stronger cyber attacks to flood networks (2016-07-19)
Bug-Hunting Computers to Compete in DARPA Cyber Grand Challenge (2016-07-19)
GitHub Microsoftapiguidelines Microsoft REST API Guidelines (2016-07-19)
SEC Steps Up Cybersecurity Enforcement with $1 Million Fine Against Morgan Stanley (2016-07-19)
Hacker behind 2015 military contractor breach: #039;Hopefully it can set them back a bit#039; (2016-07-20)
After 4-day cyberattack, Library of Congress returning to normal (2016-07-20)
The history of ransomware: How PC hostage-taking has evolved over the years (2016-07-20)
AIG launches first primary cyber insurance against liability and bodily injury (2016-07-20)
Orgs Struggle to Recruit Skilled DDoS Personnel (2016-07-21)
Microsoft Publishes REST API Guidelines 23 (2016-07-21)
Microsoft REST API Guidelines Are Not RESTful (2016-07-21)
Illinois online voter registry hacked; voter records taken (2016-07-21)
One-third of security professionals grounded for LIFE due to messy firewall rules (2016-07-21)
Cyberweapons vs. Nuclear Weapons (2016-07-22)
Bank Hacks Raise Fears for Financial Sector (2016-07-25)
Building Black Hat: Locking Down One Of The Worlds Biggest Security Conferences (2016-07-25)
Can machine learning get us ahead in cyber security? (2016-07-26)
Pornhub Hacked to Access Billions of Users? Information (2016-07-26)
How predictive analytics discovers a data breach before it happens (2016-07-26)
FBI probes DNC hack for Russian involvement (2016-07-26)
A hacker claims to have stolen credentials to a bunch of US government sites ? and hes selling them on the dark web (2016-07-26)
Panama Papers scandal to get Hollywood movie treatment (2016-07-26)
DNC Hack: What We Know, And What We Still Dont Known (2016-07-27)
Dozens of Lawyers Across the US Fight the FBIs Mass Hacking Campaign (2016-07-27)
Digital Citizen Volume 4.5: Spotlight on internet shutdowns (2016-07-27)
Code Red? White House Unveils Color-Coded Cyber-Attack Scale (2016-07-27)
Cybersecurity startup PhishMe raises $42.5 million Series C (2016-07-27)
Managing Information as a Strategic Resource (2016-07-28)
Tweet: North Korea makes Off with 10 Million e-Commerce Records (2016-07-28)
Report: Second Democratic Party Organization Hacked (2016-07-29)
Inside Dyn Research: North Korea (2016-07-29)
South Korea: Cyberattack By North Korea Exposed Data Of 10 Million Consumers (2016-07-29)
Russia has motive, capability and form for U.S. email hack (2016-07-29)
WikiLeaks methods questioned by whistleblower Edward Snowden (2016-07-29)
The Security of Our Election Systems (2016-07-29)
DNC Leak: US Intel Chief Says Its Too Soon To Attribute Blame (2016-07-29)
Exclusive: FBI probes hacking of Democratic congressional group (2016-07-29)
Chinese Hackers Attack Airports Across Vietnam (2016-07-29)
Russian Hackers May Have Hit the Dems Donor Site Too (2016-07-29)
What?s the Future of Chinese Hacking? (2016-07-30)
Rivals of Ransomware Program Steal Its Decryption Keys (2016-07-30)
Russia says spyware found in state computer networks (2016-07-30)
Russia: Spyware Attack Hits Multitude Of Networks (2016-07-30)
Cybercrime infrastructure being ramped up in Brazil ahead of Olympics (2016-08-01)
U.S. weighs dangers, benefits of naming Russia in cyber hack (2016-08-01)
DNC hack was not the only cybersecurity discussion at the convention (2016-08-01)
North Korea Hacked Into Emails of Seoul Officials: Report (2016-08-01)
Spies planted malware on critical infrastructure, Russian security service says (2016-08-01)
Russia Claims Uncovered Planned Cyber-Attack on Government, Military (2016-08-01)
DCCC hackers#039; email appears connected to Russian intel (2016-08-01)
Clinton Campaign: Voter Analytics Program Compromised, Not Internal Systems (2016-08-01)
Hackers allegedly take over airport screens to blast insults about the South China Sea (2016-08-01)
Kremlin: Claims Russia hacked DNC a cover-up (2016-08-01)
Machines versus hackers? (2016-08-01)
What to Do About Lawless Government Hacking and the Weakening of Digital Security (2016-08-01)
Russia claims it, too, is victim of state hacking. (2016-08-01)
South Korea alleges North hacked 56 government officials (2016-08-01)
Exclusive: Hackers accessed Telegram messaging accounts in Iran - researchers (2016-08-02)
FBI denies Senate panel#039;s request for Dem party hack briefings (2016-08-02)
Hack Brief: Hackers Breach the Ultra-Secure Messaging App Telegram in Iran (2016-08-02)
Extracting Social Network Graphs from DNC Emails (2016-08-02)
Big rigs can be hijacked and driven with software-based attacks (2016-08-02)
FBI took months to warn Democrats of suspected Russian role in hack: sources (2016-08-02)
Bangladesh seeks $63 million from Philippine bank used in cyber heist (2016-08-02)
Another Day, Another Cyber-Attack on Lawfare (2016-08-02)
Cybersecurity Tips for the Rio Olympics (2016-08-02)
Famed hacker creates new ratings system for software (2016-08-02)
Hackers compromise dozens of Telegram chat accounts in Iran (2016-08-02)
Three more top DNC officials are resigning after email hack (2016-08-02)
Victory! Oregon Supreme Court Agrees that Violating a Company Rule is Not a Computer Crime (2016-08-02)
Magnetic stripes vulnerable to hackers, shows researcher (2016-08-02)
Iranian hackers called ?Rocket Kitten? go spearphishing on Telegram (2016-08-02)
Trader pleads guilty in newswire hack scheme (2016-08-02)
Millions of Yahoo Accounts Pop Up for Sale on the Dark Web (2016-08-02)
Iranians connected to phishing attempt on tortured Syrian activist (2016-08-02)
What to Expect at Black Hat 2016 (2016-08-02)
Cybersecurity Architecture: The Modern Data Plane (2016-08-02)
Kazakh dissidents and lawyers hit by cyber attacks: researchers (2016-08-02)
Jeep Hackers Return With New Tricks (2016-08-03)
Part 1: Machine Learning?s Promise for Cybersecurity (2016-08-03)
Malware found in 75% of top 20 commercial banks in the US, says SecurityScorecard (2016-08-03)
This Chinese malware is making its creators $300,000 per month (2016-08-03)
Telegram denies Iranian mass breach (2016-08-03)
Researchers Show How To Steal Payment Card Data From PIN Pads (2016-08-03)
US Navy Organizes Cybersecurity Simulation (2016-08-03)
Israeli hacker breaches systems of Iranian ISP (2016-08-03)
Ransomware Hit 40 Percent of Businesses in the Last Year (2016-08-03)
Kaminsky Creates Prototype To Lock Out Attackers (2016-08-03)
?We Have to Do Something or We Will Lose the Internet? (2016-08-03)
Security firms combine to battle bitcoin-laundering (2016-08-03)
Report: FBI was silent on Russian threat in warnings to DNC (2016-08-03)
Telegram Pushes Back on Hack Reports (2016-08-03)
Cisco Releases Security Updates (2016-08-03)
Hackers Steal $65M in Bitcoin, Value Tanks (2016-08-03)
123-Reg drowns in ongoing DDoS tsunami (2016-08-03)
Almost half of US businesses hit by ransomware, says study (2016-08-03)
Restlet Studio 13 is out (2016-08-03)
Hackers stole $60 million from a bitcoin exchange in a massive heist (2016-08-03)
Getting Your REST is Important (2016-08-03)
Copyright Office Jumps Into Set-Top Box Debate, Says Hollywood Should Control Your TV (2016-08-03)
Iranian hacker group knows who is on Telegram (2016-08-03)
Bitcoin drops more than 10% after security breach (2016-08-03)
Do Security Companies Need to Issue Warranties? (2016-08-03)
Bitfinex disables trading on exchange after hack (2016-08-03)
Is YOUR email address and password for sale? Hacker claims 200m Yahoo accounts are listed on a dark web market (2016-08-03)
Bitcoin exchange Bitfinex says hackers stole $63 million (2016-08-03)
A New Cyber Security Curriculum (2016-08-03)
Chinese hackers are attacking organizations involved in the South China Sea dispute (2016-08-04)
Best practices for digital security while traveling to the 2016 Rio Olympics (2016-08-04)
Snitches get stitches: Little Snitch bugs were a blessing for malware (2016-08-04)
FBI Reportedly Took Months To Warn DNC That Russia May Be Behind Hackings (2016-08-04)
DDoS Attacks: Cybercriminals Are More Homegrown Than You Think (2016-08-04)
US health insurer warns 3.7m after cyber-attack (2016-08-04)
Traffic hackers (2016-08-04)
Researchers think we may have to protect our brains from hackers in a few years (2016-08-04)
Cybercriminals follow MS Exchange users in Office 365 migration (2016-08-04)
Watch this new training series on cyber policy for human rights defenders (2016-08-04)
Severe vulnerabilities discovered in HTTP/2 protocol (2016-08-04)
Tweet: DARPA#039;s Cyber Grand Challenge is teaching AIs to break into computers. Should they have a safety protocol for that? (2016-08-04)
Advanced malware linked to South China Sea cyber-attacks (2016-08-05)
Jeep hackers: How we swerved past Chrysler?s car security patches (2016-08-05)
F-Secure links advanced malware threat to South China Sea cyber attacks (2016-08-05)
Understanding Threat Intelligence ROI (2016-08-05)
Pokemon Go banned by Iranian authorities over security (2016-08-05)
Supercomputers give a glimpse of cybersecuritys automated future (2016-08-05)
Security of seismic sensor grid probed (2016-08-06)
Inside the Port of Los Angeless Cyber Command Center (2016-08-06)
Car Hackers Return to Black Hat with New Attacks to Drive You Off the Road (2016-08-06)
Metasploit for Machine Learning: Deep-Pwning (2016-08-06)
Using Cyber Threat Intelligence to Reduce Actors Opportunities (2016-08-06)
Hackers Make the First-Ever Ransomware for Smart Thermostats (2016-08-07)
Australia sets up specialist cyber unit to trace terrorism payments (2016-08-08)
DoJ to judges: use Tor to protect your internet connection (2016-08-08)
CYBERCOM Grows Up, Chinese IP Theft, and Apples Bug Bounty (2016-08-08)
New spyware detected targeting firms in Russia, China: Symantec (2016-08-08)
Obama prepares to boost U.S. military?s cyber role (2016-08-08)
Guarding The Grid (2016-08-08)
Are unsecure medical devices opening the backdoor for hackers? (2016-08-08)
Symantec Discovers Strider, A New CyberEspionage Group (2016-08-08)
Why Hackers Are Getting All Political This Election Year (2016-08-09)
The NSA zero-day stockpile may only contain ?dozens? of vulnerabilities, researcher claims (2016-08-09)
Shaming People for Not Being or Understanding REST Is Why We Have So Much Inconsistency in API Design (2016-08-09)
Australia?s controversial online census crashes after cyber attack (2016-08-09)
New spyware targeting firms in Russia, China, Iran: Symantec (2016-08-09)
The History of Stuxnet: The World?s First True Cyberweapon (2016-08-09)
Russian hackers appear to have infiltrated up to 330,000 computer cash registers sold by Oracle (ORCL) (2016-08-09)
How to win the ?cyber arms race? (2016-08-09)
Project Sauron malware hidden for five years (2016-08-09)
Australia sets up specialist cyber unit to trace terrorism payments (2016-08-09)
Australian census attacked by hackers (2016-08-09)
Pentagon Releases New Procedures for Intelligence Collection (2016-08-10)
New spyware detected targeting firms in Russia, China: Symantec (2016-08-10)
Hack of Democrats? Accounts Was Wider Than Believed, Officials Say (2016-08-10)
US Cyber Command Could Be Elevated To Major Cyber Weapon Unit (2016-08-10)
Advanced Threat Hunting: Are You The Hunter Or The Hunted? (2016-08-10)
How the Government Is Waging Crypto War 2.0 (2016-08-10)
Australia Stops Online Collection of Census Data After Cyberattacks (2016-08-10)
Australias controversial census in chaos after possible cyber attack (2016-08-10)
Will AI help win the cyber security war? (2016-08-10)
New malware campaign spreads backdoors instead of ransomware (2016-08-11)
The Future Of ATM Hacking (2016-08-11)
This Is What the Worlds Spies Used Instead of MSN Messenger (2016-08-11)
How Researchers Exposed Iranian Cyberattacks Against Hundreds of Activists (2016-08-11)
Technology explained: What is the dark web? (2016-08-11)
Use of API Design and Management Policies (2016-08-11)
Secure Boot snafu: Microsoft leaks backdoor key, firmware flung wide open (2016-08-11)
Seismic sensor security claims denied (2016-08-12)
Making Open Banking safe is simple, despite concerns over cybersecurity (2016-08-12)
Meet DDoSCoin, the cryptocurrency that pays when you p0wn (2016-08-12)
I hung around with hackers for a week, and now Im completely paranoid (2016-08-12)
We Shouldn?t Wait Another Fifteen Years for a Conversation About Government Hacking (2016-08-12)
Thieves can wirelessly unlock up to 100 million Volkswagens, each at the press of a button (2016-08-12)
The Tor Projects social contract: we will not backdoor Tor (2016-08-12)
Where Is The Ethical Line When Defining And Securing The API Landscape? (2016-08-12)
Russian Hackers of DNC Said to Nab Secrets From NATO, Soros (2016-08-12)
Business groups slam China?s draft cybersecurity rules (2016-08-12)
Israeli parliament recommends creation of national cyber-authority (2016-08-12)
Secure the Vote Today - Lawfare (2016-08-12)
Dem: White House should #039;levy consequences#039; against DNC hackers (2016-08-13)
CIA Official: Cloud Has Been a Godsend (2016-08-13)
Cybersecurity Concerns With 3D Printing (2016-08-14)
Its pretty easy to hack traffic lights (2016-08-15)
This is the future of war (2016-08-15)
After NZ spooks misidentified pro-democracy activist, NSA spied on him for them (2016-08-15)
What Sauron Tells Us About What NSAs Up To, and What It Should Do Next (2016-08-15)
Yet Another Government-Sponsored Malware (2016-08-15)
Guccifer 2.0 Returns to Twitter After Dem Data Leak (2016-08-15)
Hackers claim to auction NSA source code (2016-08-15)
Australia hacked Americans in child pornography probe (2016-08-15)
Iran Probes Cyber Role In Fires Across Gas Facilities (2016-08-15)
Why Did Guccifer 2.0 Evolve from Sloppy Hacktivist to Professional Leaker? (2016-08-15)
Hacking group claims to offer cyber-weapons in online auction (2016-08-15)
?Australian Authorities Hacked Computers in the US (2016-08-15)
DDoS Attack On Aussie Swimming Site Linked To Horton-Sun Yang Feud (2016-08-15)
Hackers Say They Hacked NSA-Linked Group, Want 1 Million Bitcoins to Share More (2016-08-15)
Thousands of Soros docs released by alleged Russian-backed hackers (2016-08-15)
Hackers Claim to Auction Data They Stole From NSA-Linked Spies (2016-08-15)
Green Lights Forever: Analyzing the Security of Traffic Infrastructure (2016-08-15)
Addressing the Shortfall of Secure Software Developers through Community College Education (2016-08-15)
Ex-NSA insiders: Theres a lot of panic over whats been exposed by this massive hack (2016-08-16)
Researchers Uncover Ransomware Campaign Netting $2.5 Million a Year (2016-08-16)
Hackers claim to have breached NSA?s elite cyber-spy team, auction stolen cyberweapons (2016-08-16)
It Looks Like the NSA Just Got Hacked (2016-08-16)
China says cyber rules no cause for foreign business concern (2016-08-16)
NSA and the No Good, Very Bad Monday (2016-08-16)
15 US Cities Where Cybersecurity Professionals Earn Big Bucks (2016-08-16)
Hackers auction files stolen from NSA (2016-08-16)
O Slack API How Do I Love Thee (2016-08-16)
Shadow Brokers Claim to Breach NSA-Linked Hackers (2016-08-16)
?Email Provider Linked to Alleged NSA Dumps: We Cant Help (2016-08-16)
Suspected spycraft, not hacktivism, swirls around alleged NSA hack (2016-08-16)
Dark Reading Radio: What Keeps IT Security Pros Awake at Night (2016-08-16)
?Why Github Removed Links to Alleged NSA Data (2016-08-16)
Poorly Configured DNSSEC = Potential DDoS Weapon (2016-08-16)
How Cyberattacks on Critical Infrastructure Could Cause Real-Life Disasters (2016-08-16)
New Crypto-Currency Rewards Users For Participating In DDoS Attacks (2016-08-16)
Strong Connection Between Files Leaked By ShadowBrokers The Equation Group (2016-08-16)
Was NSA Hacked? Leak from Shadow Brokers suggests so, Russian intelligence suspected (2016-08-16)
API Design Building and Enforcing an Internal Style Guide (2016-08-16)
Snowden explains the Shadow Brokers/Equation Group/NSA hack (2016-08-16)
Best Security Practices to Prevent Costly Social Engineering Attacks (2016-08-17)
CORRECTED-Amid Trump criticism, U.S. to help states fight hacking (2016-08-17)
Sage employee arrested in fraud probe (2016-08-17)
The Current Highest Bid for Alleged NSA Data is 999,998.371 Bitcoin Short (2016-08-17)
OptoNews Tip Whats a RESTful API and why does it matter (2016-08-17)
The NSA cyber-weapon auction is a total smokescreen ? heres whats really going on (2016-08-17)
?Shadow Brokers? Leak Raises Alarming Question: Was the N.S.A. Hacked? (2016-08-17)
Former NSA Staffers: Rogue Insider Could Be Behind NSA Data Dump (2016-08-17)
Lack of process and security culture are chief factors leaving firms open to cyber attack (2016-08-17)
Getting Your Arms Around Cybersecurity (2016-08-17)
Students warned over rise in dangerous phishing e-mails as fraudsters target their first loan instalment worth thousands (2016-08-17)
Tampa Hotel Targeted in Credit, Debit Card Data Breach (2016-08-17)
What We Know About the Exploits Dumped in NSA-Linked Hack (2016-08-17)
Brazil Hit With a Second Major Banking Trojan Attack (2016-08-17)
Operation Ghoul Targeting Middle Eastern Industrial, Engineering Organizations (2016-08-17)
The Global Ambitions of Pakistans New Cyber-Crime Act (2016-08-18)
Bitcoin users have been warned about a potential attack by government hackers (2016-08-18)
Someone Rickrolled the Bitcoin Auction for NSA Exploits (2016-08-18)
Turning Away From The InfoSec Drama Machine (2016-08-18)
A Mysterious Message Is Warning Bitcoiners About a ?State Sponsored? Attack (2016-08-18)
The NSA Data Leakers Might Be Faking Their Awful English To Deceive Us (2016-08-18)
Five Steps Before Developing a Smart Home Skill (2016-08-18)
Is Russia hacking the US election? (2016-08-18)
The NSAs program of tech sabotage created the Shadow Brokers (2016-08-18)
Heres why the NSA wont release a smoking gun implicating Russia in these major hacks (2016-08-18)
Spyware maker faces legal battle over alleged affair (2016-08-18)
Iran Investigates If Series of Oil Industry Accidents Were Caused by Cyber Attack (2016-08-18)
FireEye Probes Suspected Breach Of Clinton Charity Site: Sources (2016-08-19)
Evidence Links Leaked Hacking Tools to the NSA (2016-08-19)
M-Files and AIIM Survey Reveals Frequency of Information Security Breaches (2016-08-19)
WikiLeaks uploads 300+ pieces of malware among email dumps (2016-08-19)
After DNC breach, hackers reportedly go after Donald Trump and his presidential campaign (2016-08-19)
Article Creating RESTful Services with T4 Based on Model and Interfaces (2016-08-19)
Operation Ghoul attacks terrorize industrial and engineering orgs (2016-08-19)
More on Election Security (2016-08-19)
Darknet: Where Your Stolen Identity Goes to Live (2016-08-19)
New Snowden documents prove the hacked NSA files are real (2016-08-19)
Internet spying powers backed by review (2016-08-19)
Fringe defence: identifying devices and protecting your business from cyber attacks (2016-08-19)
The NSA Leak Is Real, Snowden Documents Confirm (2016-08-19)
Be Explicit with Your APIs Data (2016-08-20)
New threat for the IoT, DDoS attacks launching now (2016-08-22)
I Thought I Was a Security Rockstar. I Was Just Stupid (2016-08-22)
Alleged NSA hackers probably gave away a small fortune by leaking exploits (2016-08-22)
How the NSA snooped on encrypted Internet traffic for a decade (2016-08-22)
Gold Coast Commonwealth Games could swap sponsorship for cyber protection (2016-08-22)
Mission Critical: An Update on Federal Cybersecurity (2016-08-22)
Mind the air-gap: Singapores web cut-off balances security, inconvenience (2016-08-23)
Reporters At New York Times And Other Media Hit By Russian Hackers (2016-08-23)
New York Times?s Moscow Bureau Was Targeted by Hackers (2016-08-23)
New report shows that Peer-to-Peer sharing sites are major target for cybercriminals during summer months (2016-08-23)
Unsuccessful hack targeted New York Times in Moscow, FBI blames Russia (2016-08-23)
Meet Monero, the Currency Dark Net Dealers Hope Is More Anonymous Than Bitcoin (2016-08-23)
Reporters At New York Times Targeted By Russian Hackers (2016-08-23)
Ashley Madison misled users with a fake security award (2016-08-23)
Why Twitter Was the Platform of Choice for Ripping Apart the NSA Dump (2016-08-23)
Hit-And-Run Tactics Fuel Growth In DDoS Attacks (2016-08-23)
Dating Sites Hit by Luring Attacks via TOR Network (2016-08-23)
Wikileaks criticised on sensitive data (2016-08-23)
Cybercrime damages expected to cost the world $6 trillion by 2021 (2016-08-23)
User Interface An Essential part of a Effective API design (2016-08-23)
Nick Ask the NSA: Shadow Brokers and the Leaking Ship (2016-08-24)
Thieves Now Targeting German Banks with GozNym Malware (2016-08-24)
There?s Now a Mr. Robot-Inspired ?fsociety? Ransomware in The Wild (2016-08-24)
Russia now suspected of hacking US media firms (2016-08-24)
NSA Targeted Chinese Firewall Maker Huawei, Leaked Documents Suggest (2016-08-24)
India investigating French submarine company data leak (2016-08-24)
This Android botnet relies on Twitter for its commands (2016-08-24)
CrowdStrike, other cybersecurity firms integrating industry cooperative (2016-08-24)
UK becomes the world?s second most targeted nation for DDoS attacks as assaults rise over 220% (2016-08-24)
University hit 21 times in one year by ransomware (2016-08-24)
U.S. banking regulators focused on cyber security after SWIFT attacks (2016-08-24)
Word Games: What the NSA Means by ?Targeted? Surveillance Under Section 702 (2016-08-24)
Newly Released Exploits Affect Cisco, Juniper Other Vendors (2016-08-24)
Rational Security: The Youre Nobody til Somebody Hacks You Edition (2016-08-25)
The Secret Behind the NSA Breach: Network Infrastructure Is the Next Target (2016-08-25)
India says newspaper leak of submarine papers doesnt compromise security (2016-08-25)
How the Consumer Product Safety Commission is (Inadvertently) Behind the Internet?s Largest DDoS Attacks (2016-08-25)
Asian companies have world?s worst cybersecurity says study (2016-08-25)
Singapore?s ?air-gapping? policy cutting off internet access being questioned (2016-08-25)
Government Hackers Caught Using Unprecedented iPhone Spy Tool (2016-08-25)
Australia warns shipbuilder DCNS after massive security leak (2016-08-26)
Apple Patents Method to Catch Phone Thiefs Fingerprints (2016-08-26)
US, Korean Armies Create Spectrum Management Interoperability, Increase Situational Understanding (2016-08-26)
iOS Update Prevents Snooping Via Remote Jailbreaks (2016-08-26)
Collision Attacks Against 64-Bit Block Ciphers (2016-08-26)
Details of Indias Stealth Submarines Leaked Online (2016-08-26)
RESTful APIs and MediaTypes (2016-08-26)
The NSA Is Hoarding Vulnerabilities (2016-08-26)
NYU scientists develop tool to check for chip sabotage (2016-08-26)
St. Jude Denies Report Its Heart Devices Are Vulnerable to Cyberattacks (2016-08-26)
After DNC Hack, Staffers Told to Use Snowden-Approved App, Signal (2016-08-27)
Iran detects malware in petrochemical plants, says not linked to recent fires (2016-08-27)
Hackers Stole Voter Registration Data in at Least Two States (2016-08-29)
Harry Reid Cites Evidence of Russian Tampering in U.S. Vote, and Seeks F.B.I. Inquiry (2016-08-29)
FBI: State Election Systems Were Hacked (2016-08-29)
iPhone Zero-Day Used by UAE Government (2016-08-29)
FBI warns that hackers are targeting state election systems (2016-08-29)
How The Cybersecurity Landscape Has Changed (2016-08-29)
Russian Hacker Convicted of Massive Cyber Fraud Scheme (2016-08-29)
Russian Hacker Convicted of 38 Counts Related To PoS Hack Scheme (2016-08-29)
Sophisticated malware possibly tied to recent ATM heists in Thailand (2016-08-29)
Internal API Design for Distributed Teams (2016-08-29)
Report: Hackers Breach Two State Election Databases, FBI Warns (2016-08-29)
ICS-CERT Cyber Security Evaluation Tool Version 8.0 New User Webinar (2016-08-29)
FBI says hackers penetrated state election systems (2016-08-29)
What?s next for threat intelligence? (2016-08-30)
US Think Tanks Involved in Russia Research Allegedly Hacked (2016-08-30)
6 Ways To Hack An Election (2016-08-30)
Study finds flaws in criticism of St. Jude cyber security (2016-08-30)
Cyber security firm LogRhythm raises $50 mln after changing IPO plans (2016-08-30)
Ransomware Targets UK Hospitals, But NHS Wont Pay Up (2016-08-30)
Ransomware Attacks in the U.K., Netherlands and Belgium (2016-08-30)
Ripper! Boffins find malware thought behind $347k Thai ATM raids (2016-08-30)
Exclusive: Six U.S. senators urge Obama to prioritize cyber crime at G20 summit (2016-08-30)
White House orders Russia hack investigation, Congress wants to know if Trump is involved (2016-08-30)
More Than 1 Million IoT Devices Compromised by Single Malware Family (2016-08-30)
Meet Some Of The Emerging Israeli Cybersecurity Firms (2016-08-30)
Why Consistency Matters Across the Media Types Offered by an API (2016-08-30)
FBI says foreign hackers penetrated state election systems (2016-08-30)
Will cyber crime be top of the agenda at G20? (2016-08-30)
Better API Design With Java 8 Optional (2016-08-30)
Malware Markets: Exposing The Hype Filtering The Noise (2016-08-30)
Exclusive: SWIFT discloses more cyber thefts, pressures banks on security (2016-08-31)
Senators Urge President Obama to Make Cybercrime a Top Priority at G20 Summit (2016-08-31)
Some of the people investing the CIAs money in startups are under scrutiny (2016-08-31)
2016 DDoS Attack Trends By The Numbers (2016-08-31)
Trying to Smoke Out the Players in the Hacking of the D.N.C. (2016-08-31)
Cybersecurity Self-Esteem: 4 Things Confident Teams Are Doing (2016-08-31)
Cyber Computer Scientist II in US-OH-Columbus (2016-08-31)
How to change your Dropbox password after a Dropbox hack caused 68 million accounts to leaked online | WIRED UK (2016-08-31)
Cybercrime as a Tax on the Internet Economy (2016-09-01)
California May Soon Treat Ransomware As Extortion (2016-09-01)
Kimpton Hotels Hit By Point-Of-Sale Breach (2016-09-01)
Improvements In Cybersecurity Require More Than Sharing Threat-Intelligence Information (2016-09-01) breach from 2012 affected 43 million users (2016-09-01)
Reported UK Data Breaches Soar 88% in a Year (2016-09-01)
Hackers found a way to resurrect suspended and inactive Twitter accounts (TWTR) (2016-09-02)
Suspect arrested in 5-year-old breach (2016-09-02)
$40 Homemade ?Arduino radio device? can Intercept Vehicle Key Fobs ? More Than 100 Million Cars are Vulnerable (2016-09-02)
How Spy Tech Firms Let Governments See Everything on a Smartphone (2016-09-02)
43M Passwords Hacked in 2012 Breach (2016-09-03)
Specref (2016-09-03)
JSON Version of Web Concepts (2016-09-03)
Huawei accredited to the Open Trusted Technology Provider Standard (2016-09-05)
Pro-Ukraine Hackers Leak Personal Details of Ukrainian and Foreign Journalists (2016-09-05)
Obama aims to avoid a ?cycle of escalation? in cyberattacks by countries (2016-09-05)
Introducing Deep Learning: Boosting Cybersecurity With An Artificial Brain (2016-09-06)
Iran Cyber Dialogue and RightsCon Brussels 2017 ? timely and impactful (2016-09-06)
Obama and Clinton weigh in on cyber warfare tactics (2016-09-06)
More Signs Point To Russian Cyberspy Connection In State Election Board Hacks (2016-09-06)
How to sort API expand fields (2016-09-06)
Watch How Government Spyware Infects a Computer in This Leaked Demo Video (2016-09-06)
Activists to FBI: Show Us Your Warrant for Mass Hack of TorMail Users (2016-09-06)
Russian site hit by huge data breach (2016-09-06)
API Design Book Available Today (2016-09-07)
Understanding The New Swift 3 API Design Guidelines (2016-09-07)
Defining The Common Core of Cybersecurity: Certifications + Practical Experience (2016-09-07)
Data Breaches At U.S. Office Of Personnel Management Was Preventable, Investigation Finds (2016-09-07)
Tipping the scales: the attribution problem and the feasibility of deterrence against cyberattack (2016-09-07)
OPM Hackers Used Marvel Superhero Nicknames to Hide Their Tracks (2016-09-07)
Government Hacking v. Human Rights (2016-09-07)
OPM Breach: Two Waves Of Attacks Likely Connected, Congressional Probe Concludes (2016-09-07)
The Secret Sauce Behind Building an Elastic API (2016-09-07)
FBI arrests hackers who allegedly leaked info on government agents (2016-09-08)
Securing the Skies: Cybersecurity in Aviation (2016-09-08)
White House appoints first Federal Chief Information Security Officer (2016-09-08)
Data hoarders are shining a spotlight on past breaches (2016-09-08)
Cybercrime Roundup: The CFAA, Dog Sniffs, and Broken Hearts (2016-09-08)
RESTful Web API Design with Nodejs (2016-09-08)
Obama Calls For Norms To Prevent Cyber Wild Wild West (2016-09-08)
Crimeware-as-a-Service Hack Turns Potential Hackers Into Victims (2016-09-08)
Restful API Design An Opinionated Guide (2016-09-08)
House GOP Panel Blasts OPM Over Breach (2016-09-08)
Avoiding The Blame Game For A Cyberattack (2016-09-08)
Why College Freshmen Are Chum For The Cyber Sharks (2016-09-08)
Must Watch: Senator Ron Wyden Heads to the Senate Floor Today to Oppose Mass Hacking (2016-09-08)
Vienna Airport Targeted by Turkish Hackers (2016-09-08)
Hedge Fund and Cybersecurity Firm Team Up to Short-Sell Device Maker (2016-09-08)
FBI Arrests Two Men for Allegedly Hacking Computers of Senior Government Officials (2016-09-08)
DHS Touhill tapped as top federal cybersecurity officer (2016-09-08)
New Linux Trojan Discovered Coded in Mozilla?s Rust Language (2016-09-09)
Cyber Security Controls That Actually Make You More Efficient (2016-09-09)
United States names its first Chief Information Security Officer (2016-09-09)
Introducing API Templates With Reusable System and Process APIs (2016-09-09)
Whoops! Man Accused of Being Part of CIA Hacking Group Had Already Been Doxed (2016-09-09)
Arrests over hacks of CIA and FBI staff (2016-09-09)
Justice Dept. group studying national security threats of internet-linked devices (2016-09-10)
Maintaining API Working As A Software Engineer (2016-09-11)
911 is Vulnerable to DDoS Attacks: Hackers Prove How Easy it is! (2016-09-12)
Nuclear Watchdog Suffers DDoS Attack Ahead of North Korea?s Nuclear Test (2016-09-12)
Government Accelerates Cyber Hiring (2016-09-12)
Volkswagen engineer behind defeat device pleads guilty in US court (2016-09-12)
Accountability for Algorithmic Autonomy in War (2016-09-12)
Leaked catalogue reveals disinformation campaign for sale (2016-09-12)
Thousands of Seagate NAS boxes host cryptocurrency mining malware (2016-09-12)
e92plus target DDoS and Threat Intelligence opportunities through partnership with NSFOCUS (2016-09-13)
Hackers smear Olympic athletes with data dump of medical files (2016-09-13)
The Four Cybersecurity Terms Businesses Need to Know (2016-09-13)
What Really Happened in the OPM Breach (2016-09-13)
Cyber security in mining: managing risk amongst disruption (2016-09-13)
F-Secure, University of Helsinki For New Cyber Security Course (2016-09-13)
The Cyber Threat To Credit Unions: Lessons to inform a solid defense (2016-09-13)
Yes, Your Database Can Be Breached Through A Coffee Pot (2016-09-13)
Did North Korea launch a DDoS attack against a website monitoring its nuclear tests? (2016-09-13)
Russians hacked voter registration databases in 2 USA states (2016-09-13)
UK moves to ?active cyber-defence? (2016-09-13)
New York issues nation?s first cyber regulations for banks, insurers (2016-09-13)
DoJ Announces Team To Oversee Security Of Internet of Things (2016-09-13)
Hackers found 47 new vulnerabilities in 23 smart devices at DEF CON (2016-09-13)
Someone Is Learning How to Take Down the Internet (2016-09-13)
Cybersecurity In The Obama Era (2016-09-13)
Government data security slammed in new report (2016-09-13)
ICS-CERT releases Recommended Practice: Improving Industrial Control System Cybersecurity with Defense-in-Depth Strategies (2016-09-13)
Hackers smear Olympic athletes with data dump of medical files (2016-09-13)
Accenture Hires Former CIA Tech Exec To Head Its Federal Services Cybersecurity Practice (2016-09-13)
Tweet: The intelligence community needs stronger congressional oversight: #opengov (2016-09-13)
Policy, Law, and Technology in the Current Crypto Wars (2016-09-14)
Turkish hacker group targets Austrian National Bank (2016-09-14)
A surprising number of computer hackers earn over $100,000 a year (2016-09-14)
Volkswagen is founding a new cybersecurity firm to prevent car hacking (2016-09-14)
Logins for US Navy, NASA?s JPL among of US gov logins sold on deepweb (2016-09-14)
The GitHub GraphQL API GitHub Engineering (2016-09-14)
Sports Threat Intelligence-Sharing Group Formed (2016-09-15)
Learn API DevOps from the Experts Design Testing Deployment (2016-09-15)
The Library of Congress Was Hacked Because It Hasn?t Joined the Digital Age (2016-09-15)
How to Take Your API From RPC to Hypermedia in 7 Steps (2016-09-15)
Your brand, in-store, is under cyber attack (2016-09-15)
Research reveals the opportunities EU employees are presenting to cyber-attackers on social media and messaging applications (2016-09-15)
Cybersecurity for Building Control Systems Workshop Series (2016-09-15)
FBI Agent Posing as Journalist to Deliver Malware to Suspect Was Fine, Says DOJ (2016-09-15)
Sixth Linux DDoS Trojan Discovered in the Last 30 Days (2016-09-15)
FEC stalemates on how to deal with foreign-owned companies spending in elections (2016-09-15)
Hackers probe cyber defences to bring down the internet (2016-09-15)
Data Loss Risks Rise In The Age Of Collaboration (2016-09-15)
In a leaked weaponized information catalog, Indian cyberarms dealer offers blackest-ever SEO (2016-09-15)
Playpen: The Story of the FBI?s Unprecedented and Illegal Hacking Operation (2016-09-15)
NY to Pilot Cybersecurity Regulations for Financial Organizations (2016-09-15)
French spy boss admits France cyberattacked Iran, Canada, Spain, Greece, Norway, Ivory Coast, Algeria, and others (2016-09-15)
Central Banks Set Up Team To Oversee Cybersecurity (2016-09-16)
Here comes GraphQL The Real Adam (2016-09-16)
Chinese Companies Open Checkbooks to Acquire European Tech (2016-09-16)
Volkswagen launches new cybersecurity firm to tackle car security (2016-09-16)
Overnight Cybersecurity: House panel looks into Reddit post about Clinton emails | Hacker claims he hit hundreds of government servers (2016-09-19)
The Evolving Law of Global Killing (2016-09-19)
?Fear? hacker hits hundreds of government servers (2016-09-19)
Hackers Hit ?Some? Cisco Customers With Leaked NSA Hacking Tools (2016-09-19)
RESTful Web Service With Example (2016-09-19)
San Bernardino iPhone Hack: Media Agencies Sue FBI For Vendor Details (2016-09-19)
Mobile Exploitation Analyst (2016-09-19)
Whats The Risk? 3 Things To Know About Chatbots Cybersecurity (2016-09-19)
The Time Is Now To Address The Cybersecurity Talent Shortage In Unique Ways (2016-09-19)
Top Colleges For Cybersecurity (2016-09-19)
Understanding REST And RPC For HTTP APIs (2016-09-20)
RPC vs REST is not in the URL (2016-09-20)
There is No REST API (2016-09-20)
Top spy suggests Russia trying to sow doubt in US elections (2016-09-21)
DDOS Trends Report 2016 (2016-09-21)
A Twist On The Cyber Kill Chain: Defending Against A JavaScript Malware Attack (2016-09-21)
Overnight Cybersecurity: Trump opposes internet handover | A record breaking cyber attack | Intel chief says Russian election hacks are a #039;tradition#039; (2016-09-21)
Security researchers from China remotely hacked a Tesla Model S (2016-09-21)
Cybersecurity and the Ballot Box (2016-09-21)
Hackers hit reporter with record-breaking attack (2016-09-21)
Tesla Model S Hack (2016-09-21)
KrebsOnSecurity Hit With Record DDoS (2016-09-21)
Influencers: Calling it critical infrastructure wont protect the vote (2016-09-21)
Are You Covered? Ransomware, CEO Fraud and Cyber Insurance (2016-09-21)
Someone Is Learning How to Take Down the Internet (2016-09-21)
Evolution to RESTful with NoSQL Documents (2016-09-21)
No Global Warrants: Stop the U.S. Governments Hacking Loophole (2016-09-21)
Intel Dems: Russia making #039;serious effort#039; to influence US election (2016-09-22)
Massive web attack hits security blogger (2016-09-22)
Small business cybersecurity bill clears House (2016-09-22)
Yahoo Says a Nation State Hacked 500 Million Customer Accounts (2016-09-22)
New legislation seeks to prevent US voting systems from being hacked (2016-09-22)
Poisonous Mamba Ransomware Overwrites Your Master Boot Record, Encrypts Your Entire Hard Drive (2016-09-22)
Hack Brief: Yahoo Looks Set to Confirm a Big, Old Data Breach (2016-09-22)
Yahoo Confirms Massive Data Breach Affecting At Least 500 Million Accounts (2016-09-22)
Yahoo Says Hackers Stole Data on 500 Million Users in 2014 (2016-09-22)
Report: Yahoo May Confirm Serious Data Breach, Implications For Verizon Unknown (2016-09-22)
Overnight Cybersecurity: Fallout from Yahoos massive breach (2016-09-22)
Yahoo set to announce huge breach: report (2016-09-22)
Yahoo confirms state-sponsored attacker stole personal data of ?at least? 500 million users (2016-09-22)
Exclusive: Probe of leaked U.S. NSA hacking tools examines operatives mistake (2016-09-22)
Bedrock Control System Provides Cyber Secure SCADA RTU Platform for Clarksville Light Water (2016-09-22)
Yahoo announces major data breach (2016-09-22)
Dem criticizes Yahoo for not disclosing hack sooner (2016-09-22)
Yahoo Reveals Nation State-Borne Data Breach Affecting A Half-Billion Users (2016-09-22)
Yahoo is expected to confirm massive data breach affecting hundreds of millions of users (2016-09-22)
Chinese hackers steal millions in Wall Street tech firm breach (2016-09-22)
Biometric Skimmers Pose Emerging Threat To ATMs (2016-09-22)
Ethereum Is Under Attack (2016-09-22)
sp800_150_second_draft (2016-09-22)
Journalist Hit By Record DDoS Attack: I?m Kind of Like Plutonium Right Now (2016-09-23)
Trump hotels agree to pay $50K in data breach settlement (2016-09-23)
The Biggest Internet Attack in History (2016-09-23)
500m Yahoo accounts were hacked in 2014, company confirms (2016-09-23)
Hackers Trawl User Data in Hopes a Small Target Will Lead to a Big One (2016-09-23)
Unprecedented and Unlawful: The NSA?s ?Upstream? Surveillance (2016-09-23)
UPDATE 2-Yahoo faces growing scrutiny over when it learned of data breach (2016-09-23)
Advisory Body Calls For Stronger Cybersecurity Measures Across Airline Industry (2016-09-23)
Report: NSA operator left source code exposed before breach (2016-09-23)
Yahoo! hack ? Industry reactions (2016-09-23)
Cybersecurity is a team sport (2016-09-23)
324,000 payment cards breached, CVVs included (2016-09-23)
On-Premises In The Cloud: Making Sense Of Your Cybersecurity Ecosystem (2016-09-23)
UPDATE 1-Yahoo is sued for gross negligence over huge hacking (2016-09-23)
What the Yahoo! account data breach means for the future of identity (2016-09-23)
Apimint Rapidly Prototype APIs (2016-09-25)
Back Online, Krebs Laments Use of DDoS Attacks to Censor Speech (2016-09-26)
Sunlight at the 21st Century Neighborhoods Symposium How humanizing data will improve our communities (2016-09-26)
Cyber Crooks Use IoT Devices To Launch DDoS Attacks: Report (2016-09-26)
Cyber Risk Among Top Concerns For Business Leaders: Study (2016-09-26)
What The WADA Hack Proves About Todays Threat Landscape (2016-09-26)
Cyber Security Still A Major Concern In Asia: Study (2016-09-26)
New Mac Trojan uses the Russian space program as a front (2016-09-26)
Hackers Are Trying to Hold a Los Angeles Investment Bank to Ransom (2016-09-26)
FBI Probes Dumping Of NSA Hack Tools On Public Site (2016-09-26)
Yahoo?s Password Breach Could Have Wide-reaching Consequences (2016-09-27)
Cyber criminals now offering ?crime-as-a-service? (2016-09-27)
FAA Advisory Body Recommends Cybersecurity Measures (2016-09-27)
UK plc wants tougher cyber regulation and more punishment for failings (2016-09-27)
Yahoos massive password breach is the security equivalent of ecological disasters (2016-09-27)
Building the Cybersecurity Workforce (2016-09-27)
Senator to SEC: You Need to Investigate Yahoo Breach (2016-09-27)
Yahoos claim of state-sponsored hackers meets with skepticism (2016-09-27)
How the FBI defends against insider threats (2016-09-27)
A Voice Cuts Through, and Adds to, the Intrigue of Russia?s Cyberattacks (2016-09-27)
Facebook tells U.S. judge it takes terroristic threats seriously (2016-09-27)
How to Build a Social Media Army (2016-09-27)
Russian Cyberspies Use ?Komplex? Trojan to Target OS X Systems (2016-09-27)
Hate spam emails? This man built a bot to annoy spammers until they give up (2016-09-27)
Security man Krebs? website DDoS was powered by hacked Internet of Things botnet (2016-09-27)
Sharing Cybersecurity Threat Intelligence Is The Only Way We Win (2016-09-27)
Why the silencing of KrebsOnSecurity opens a troubling chapter for the ?Net (2016-09-27)
Brad Pitt death hoax is actually malware that can destroy phones and computers and expose sensitive information to hackers (2016-09-28)
Europol identifies eight main cybercrime trends (2016-09-28)
Cyber firm challenges Yahoo claim hack was state-sponsored (2016-09-28)
Russian Hackers Target Citizen Journalists Reporting On Malaysian Airlines Crash (2016-09-28)
Virlock Could Be the Ransomware Super Flu (2016-09-28)
Meet Apache Spot, a new open source project for cybersecurity (2016-09-28)
What is API Design (2016-09-28)
Syrian Electronic Army hacker pleads guilty in Virginia (2016-09-28)
Announcing the OpenSource beaR Library (2016-09-28)
Cybereason Employs Israeli Defense Force Cyber Security Expertise to Combat Data Breach Frustration (2016-09-28)
EU mulls amending controversial cyber export rules (2016-09-28)
EU seeks to tighten cyber-security dual-use exports (2016-09-28)
Here?s how security cameras drove the world?s biggest DDoS attack ever (2016-09-28)
FBI Now Pretty Sure Russia Is Behind Anti-Clinton Hacking (2016-09-28)
Common Cyber Security Mistakes and How to Avoid Them (2016-09-28)
Google Steps Up to Protect Security Analyst from Humongous DDoS (2016-09-28)
Project Shield Has Krebs on Securitys Back (2016-09-28)
Google Steps Up to Protect Security Analyst from Humongous DDoS (2016-09-28)
Yahoo Hackers Were Criminals Rather Than State-Sponsored, Security Firm Says (2016-09-28)
How 1.5 Million Connected Cameras Were Hijacked to Make an Unprecedented Botnet (2016-09-29)
Social media in defence intelligence gathering (2016-09-29)
Broadband access creeps along but DDoS attacks explode (2016-09-29)
How A Pair Of Cybercriminals Scales Its Carder Business (2016-09-29)
Decrypting The Dark Web: Patterns Inside Hacker Forum Activity (2016-09-29)
?Money Mule? Gangs Turn to Bitcoin ATMs (2016-09-29)
FBI reports more attempts to hack voter registration system (2016-09-29)
Distributed Censorship or Extortion? The IoT vs Brian Krebs (2016-09-29)
Cooperative, Dynamic Twitter Parsing and Visualization for Dark Network Analysis (2016-09-29)
How to fix CORS problems Restlet We Know About APIs (2016-09-29)
What drones mean for surveillance (2016-09-29)
Cybercriminals Superior Business Savvy Keeps Them Ahead (2016-09-30)
Importance of Cyber Security driven home with 145,000 DVRs compromised (2016-09-30)
Guilty plea for Syrian Electronic Army accomplice (2016-09-30)
Newsweek hit with cyberattack after posting Trump Cuba story (2016-09-30)
National Cyber Incident Response Plan Now Available For Public Comment (2016-09-30)
The Hacking of Yahoo (2016-09-30)
Tweet: #FBI: ldquo; #Snowden has redefined how the private sector shares information with the United States government.rdquo; (2016-09-30)
U.S. says hackers probed voting systems, no sign of damage (2016-10-01)
?Shadow Brokers? Whine That Nobody Is Buying Their Hacked NSA Files (2016-10-01)
HTTP Status Trek REST Fest 2016 (2016-10-01)
Metaphors of Big Data (2016-10-01)
The Russians are not coming; they#039;re already here (2016-10-02)
Hacker Releases Code That Powered Record-Breaking Botnet Attack (2016-10-02)
No sign that US voting systems have been hacked ? yet (2016-10-02)
Private pictures of Kate Moss LEAKED after sister Lottie?s Facebook is hacked (2016-10-03)
Overnight Cybersecurity: Trump unveils cyber plans (2016-10-03)
Hackers Attacked Voter Registration Systems Of 20 US States, Says Official (2016-10-03)
Apple v. FBI (2016-10-03)
Who Makes the IoT Things Under Attack? (2016-10-03)
National Cyber Security Centre HQ operational (2016-10-03)
Week ahead in cyber: Lawmakers wary of DHS role in election security (2016-10-03)
Software backward compatibility undocumented APIs and importance of history etc (2016-10-03)
Brief of Amici Curiae IPhone Security and Applied Cryptography Experts in support of Apple, Inc.s Motion to Vacate Order Compelling Apple, Inc. to Assist Agents in Search, and Opposition to Governments Motion to Compel Assistance (2016-10-03)
Trump calls for U.S. to use offensive cyberweapons (2016-10-03)
Code behind record-breaking cyberattack made public (2016-10-03)
Israeli Firm Claims It Can Break WhatsApp?s Encryption from Backpack (2016-10-03)
Source Code For World?s Largest DDoS Attack Out In Public: Mirai Botnet Will Allow More Hackers To Unleash Mayhem (2016-10-03)
16 Innovative Cybersecurity Technologies Of 2016 (2016-10-03)
Trump vows #039;cyber review team#039; in new policy proposal (2016-10-03)
IoT DDoS Attack Code Released (2016-10-03)
Smart device malware behind record DDoS attack is now available to all hackers (2016-10-03)
Beneath the Smart City (2016-10-03)
Trump Calls For ?Crippling? Cyberwar Attack Capabilities (2016-10-03)
Threat Group 4127 Targets Hillary Clinton Presidential Campaign (2016-10-03)
Yahoo Open Sources Porn-Hunting Neural Network (2016-10-04)
Yahoo Reportedly Scanned Millions of Email Accounts for Intelligence Agencies (2016-10-04)
Yahoo helped US spies scan all its emails in real time for a single phrase (2016-10-04)
Yahoo secretly built a tool to scan all email in realtime for US spies (2016-10-04)
Cyber-Anything-As-A-Service: Should The Government Just Outsource Everything? (2016-10-04)
Yahoo Email Surveillance: the Next Front in the Fight Against Mass Surveillance (2016-10-04)
Johnson Johnson says people with diabetes dont need to worry about potentially lethal wireless attacks on insulin pumps (2016-10-04)
Have hackers turned my printer into an offensive weapon? (2016-10-04)
Yahoo scanned customer emails for US intelligence agencies: report (2016-10-04)
Newsweek Site Suffered DDoS Attack After Trump Report (2016-10-04)
FBI Tells Users To Protect Their Data (2016-10-04)
Snowden?s favorite messaging app receives first federal subpoena (2016-10-04)
?Guccifer 2.0? Is Bullshitting Us About His Alleged Clinton Foundation Hack (2016-10-04)
US tech giants say they didnt do Yahoo-style email spying (2016-10-04)
Relentless DDoS Attack Incidents Raise Alarm For Businesses (2016-10-04)
Wikileaks Is Making a Twitter Army to Fight Against Misinformation (2016-10-04)
How Did the Feds Get Past Yahoo?s Encryption? Yahoo! (2016-10-04)
US and China in Cyberspace (2016-10-04)
A former insider says Marissa Mayer kept secrets from Yahoo?s security team more than once (YHOO) (2016-10-04)
Watch Out Gamers: Hacked Steam Accounts Distributing Malware (2016-10-04)
Alleged Guccifer 2.0 hack of Clinton Foundation raises suspicions (2016-10-04)
South Korean military cyber command hacked by injecting malicious codes into routing server (2016-10-04)
Why to Prioritize Your API Strategy Before Your API Design (2016-10-04)
Overnight Cybersecurity: Yahoo surveillance sparks outrage from privacy advocates (2016-10-04)
A Web API ecosystem through featurebased reuse (2016-10-04)
Exclusive: Yahoo secretly scanned customer emails for U.S. intelligence (2016-10-04)
The Yahoo Scans Closely Followed Obamas Cybersecurity Emergency Declaration (2016-10-04)
Maryland man charged with theft of classified government material (2016-10-05)
Security Experts Say New NSA Leak Should Remind Businesses To Protect Against Insiders (2016-10-05)
BRIEF-Accenture to acquire Defense Point Security to bolster cybersecurity services (2016-10-05)
The FBI Has Arrested an NSA Contractor for Allegedly Stealing Classified Material (2016-10-05)
Was Yahoos mass wiretap legal? (2016-10-05)
FBI Arrests NSA Contractor on Suspicion of Leaking Hacking Tools (2016-10-05)
Feds Accuse Two 19-Year-Olds Of Hacking For Lizard Squad and PoodleCorp (2016-10-05)
BuzzFeed hacked by group after outing an alleged member (2016-10-05)
Symantec, VMware Strike Cyber-Security Deal (2016-10-05)
If the election is hacked, we may never know (2016-10-05)
Half Of Cybersecurity Pros Solicited Weekly About A New Job (2016-10-05)
Detecting Ransomware Attacks with Splunk (2016-10-05)
Yahoo email scanning prompts European ire (2016-10-05)
Feds Charge NSA Contractor with Taking Top Secret Documents (2016-10-05)
Animas OneTouch Ping Insulin Pump Vulnerabilities (2016-10-05)
Clinton Foundation: Guccifer 2.0 Didnt Hack Us (2016-10-05)
Guccifer 2.0 claims to have hacked the Clinton Foundation (2016-10-05)
Cyber-Security Is Difficult To Quantify (2016-10-05)
Masks Lifted on UK?s Cyber Security Unsung Heroes (2016-10-06)
Execs from Facebook, Google, and Microsoft explain why they use Israel for their RD (GOOG, MSFT, FB) (2016-10-06)
Four reasons why election hacking is a big threat (2016-10-06)
EU GDPR: Yahoo! Sued Over Data Breach of 500 Million Users (2016-10-06)
Hack warnings prompt cyber security fatigue (2016-10-06)
NSA Director Not Opposed To Splitting Cyber Command From Agency (2016-10-06)
Arizona Official Says Hack Of Voter Data Came Via Employee Email (2016-10-06)
Feds Charge Two In Lizard Squad Investigation (2016-10-06)
NSA contractor charged with stealing secret data (2016-10-06)
Yahoo scanned emails to help FBI hunt terrorists (2016-10-06)
Two Teenagers Arrested For Alleged Cyberattack-For-Hire Services (2016-10-06)
Yahoo scan by U.S. fell under foreign spy law expiring next year -sources (2016-10-06)
Yahoo scandals: Verizon wants $1 billion off sale price, report says (2016-10-06)
World Anti-Doping Agency: Not all leaked docs authentic (2016-10-06)
Why Its Always Cyber Hunting Season ( What To Do About It) (2016-10-06)
Feds Charge Two In Lizard Squad Investigation (2016-10-06)
Partners In The Battle Against Cyberthreats (2016-10-06)
What the Yahoo NSA mightve looked for (2016-10-06)
Functional Augmented State Transfer FAST Architecture for Computationally Intensive Network Applications (2016-10-06)
Day 31 (2016-10-06)
Designing and documenting your API (2016-10-06)
Tweet Learn The importance of loose coupling in REST API design httpstcor7kuJ1KzIc httpstcowHUqOfBYPu (2016-10-06)
U.S. officially attributes DNC hack to Russia (2016-10-07)
US officially blames Russian government for election-related hacking (2016-10-07)
Lawmakers on attributing hacks to Russia: Strike back (2016-10-07)
Dyn Cited in Brookings Institute?s New Report On The Cost of Internet Shutdowns (2016-10-07)
NSA Contractor Arrested for Stealing Classified Information (2016-10-07)
Digital Vigilantes Want to Shame DDoS Attackers And Their Corporate Enablers (2016-10-07)
Feds Pin Political Hacks on Russia. But How to Respond? (2016-10-07)
The Six Key Questions for the Obama Administration and Companies About Yahoo?s Cooperation With the NSA (2016-10-07)
Yahoo didnt install an NSA email scanner, it was a "buggy" NSA "rootkit" (2016-10-07)
US intel officially blames the Russian government for hacking DNC (2016-10-07)
USA FREEDOM Act Requires Government to Declassify Any Order to Yahoo (2016-10-07)
Thanks To Encryption, Governments Need Companies Like Yahoo To Spy on Users (2016-10-07)
Understanding Footnote 14: NSA Lawyering, Oversight, and Compliance (2016-10-07)
U.S. accuses Russia of trying to ?interfere with the U.S. election? through internet attacks (2016-10-07)
Arrested NSA contractor is no Snowden, officials say (2016-10-08)
Disruptive cyber attack on nuclear power plant reported (2016-10-10)
InfoSec facts from InfoSec fiction: how popular entertainment can help security awareness (2016-10-10)
FBI Hacked Computers in Australia as Part of Global Child Porn Sting (2016-10-10)
Yahoo disables automatic email forwarding feature - AP (2016-10-10)
In High-Profile Breaches, Attackers Leveraged Poor Security Hygiene (2016-10-10)
NSA Compliance and Congress?s Plan: How to Account for Flaws in the Metadata Program? (2016-10-10)
WikiLeaks drops new batch of emails allegedly stolen from Podesta (2016-10-10)
swaggergistio Saving and Versioning Swagger definitions (2016-10-10)
Online Gaming Currency Funds Cybercrime In Real Life (2016-10-11)
Administration vows #039;proportional#039; response to Russian hack (2016-10-11)
UN Watchdog: Nuclear Plants Disrupted by Cyber Attack (2016-10-11)
DDOS Protection for Public Cloud Customers (2016-10-11)
Cyber Hunters, Incident Response The Changing Nature Of Network Defense (2016-10-11)
The clumsy, amateurish IoT botnet has now infected devices in virtually all of the worlds countries (2016-10-11)
G7 nations develop financial industry cyber guidelines (2016-10-11)
Is the cyber security industry looking in the wrong place? (2016-10-11)
Internet of Things Malware Has Apparently Reached Almost All Countries on Earth (2016-10-11)
Feds help 33 states with election cybersecurity (2016-10-11)
G7 sets common cyber-security guidelines for financial sector (2016-10-11)
Say Cheese: a snapshot of the massive DDoS attacks coming from IoT cameras (2016-10-11)
Nuclear Power Plant Disrupted by Cyber Attack (2016-10-11)
Take1 Insurance Offers Live-Event Policy Covering Malicious Acts, Including Terrorism (2016-10-12)
Two State Elections Databases Have Been Hacked. The Russians Arent the Only Suspects. (2016-10-12)
Effective Cyber Security Requires Team Collaboration (2016-10-12)
Feds George warns on cybersecurity; no comment on economy (2016-10-12)
Security spending to top $100 billion by 2020: Are we any cyber safer? (2016-10-12)
RiskIQ Web Crawl Discovers PCI Policy Portal Leads to Malware (2016-10-12)
How Hackers Plant False Flags to Hide Their Real Identities (2016-10-12)
Russia shrugs off promise of retaliation from US (2016-10-12)
Russia, Russia, Russia: What Clinton Or Trump Can Do About Nation-State Hacking Gone Wild (2016-10-12)
Web App Next Stop In Our Software Journey REST Services Part III (2016-10-12)
Thoughts on White House Pledge to Respond to DNC Hack (2016-10-12)
Australia Says Foreign Spies Hacked Into Its Weather Bureau Last Year (2016-10-12)
Political Positions On Cybersecurity Matter To Millennials (2016-10-12)
Feds: Yep, Russia Hacked the DNC (2016-10-12)
Executable Files, Old Exploit Kits Top Most Effective Attack Methods (2016-10-12)
Yahoo Temporarily Disables Auto Email Forwarding (2016-10-12)
The Psychological Impact of Doing Classified Intelligence Work (2016-10-12)
Sierra Wireless Mitigations Against Mirai Malware (2016-10-12)
Research shows Russian hackers could be behind the Mirai botnet (2016-10-12)
API Best Practices API Design (2016-10-12)
Attack Uses Image Steganography For Stealthy Malware Ops On Instagram (2016-10-13)
Senator Proposes Voting By Mail to Guard Against Cyberattacks (2016-10-13)
SSHowDowN Proxy attacks using IoT devices (2016-10-13)
Talos Releases Analysis Tool for Locky Ransomware (2016-10-13)
Private Information Stored in Document Files Provides Most Popular Breach Target for Cyber Attackers (2016-10-13)
Lawful Hacking and the Case for a Strategic Approach to ?Going Dark? (2016-10-13)
Managed Security Services Provider Netsurion Acquires SIEM Vendor EventTracker (2016-10-13)
Tor Project and Mozilla Making It Harder for Malware to Unmask Users (2016-10-13)
Verizon signals Yahoo data breach may affect acqusition (2016-10-13)
Majority of businesses have not inspected cloud services for malware (2016-10-13)
Information Security Spending Will Top $101 Billion By 2020 (2016-10-13)
Struggling with code to optimize how you chain APIs for advanced data analytics (2016-10-13)
12-year-old SSH vulnerability in IoT devices being abused (2016-10-13)
Security News This Week: Hackers Hit a Nuclear Plant (2016-10-14)
Lawmakers want answers about Yahoo scanning emails for U.S. government (2016-10-14)
Trump underestimates the Russian cyber threat (2016-10-14)
Yahoo Breach May Trigger Material Adverse Change Clause (2016-10-14)
Dozens of U.S. lawmakers request briefing on Yahoo email scanning (2016-10-14)
Biden vows US will retaliate against Russia for hacks (2016-10-14)
Cyber-attacks against nuclear plants, a disconcerting threat (2016-10-14)
Lawmakers press Lynch for briefing on Yahoo secret email scanning reports (2016-10-14)
British banks keep cyber attacks under wraps to protect image (2016-10-14)
Top Dems call on FBI to investigate Trump ally over leaked emails (2016-10-14)
Free Online Cybersecurity Economics Course (2016-10-14)
API Best Practices API Design (2016-10-14)
The Evidence Guccifer 2.0 is Russian Intel ? Medium (2016-10-14)
Instegogram: Leveraging Instagram for C2 via Image Steganography (2016-10-14)
The API problem (2016-10-15)
Guccifer Sent Back To Romanian Prison (2016-10-17)
UK spy agencies broke privacy rules says tribunal (2016-10-17)
UKs Investigatory Powers Tribunal says GHCQ illegally spied for 17 years (2016-10-17)
Knowledge for Cybersecurity (2016-10-17)
UK spy agencies? bulk data practices ruled unlawful before 2015 (2016-10-17)
What Does a Cybersecurity Researcher Do, Really? (2016-10-17)
How To Become A Cybersecurity Entrepreneur In A Crowded Market (2016-10-17)
How hackers handle stolen login data (2016-10-17)
Cloud Security Replacing Cybersecurity Industry, Says Analyst (2016-10-17)
UK Banks ?Under-reporting? Cyber Incidents (2016-10-17)
Cybersecurity from the Break Room to the Board Room (2016-10-17)
NSA hackers abandon auction, seek $6M in crowd funding (2016-10-17)
Veracode Report Finds Open Source Components Proliferating Digital Risk at an Alarming Rate (2016-10-18)
Yahoo Says Traffic Rose Despite Hacking That Could Alter Verizon Deal (2016-10-18)
Public Wi-Fi Use Grows, Despite Security Risks (2016-10-18)
Ecuador confirms it cut off Assange?s internet access to prevent him from derailing US elections (2016-10-18)
The New Face of Law and Cyber Warfare (2016-10-18)
WikiLeaks blames U.S. for cutting Assanges internet connection (2016-10-18)
Shadow Brokers Cancel Auction of Supposed NSA Hacking Tools (2016-10-18)
NyaDrop exploiting Internet of Things insecurity to infect Linux devices with malware (2016-10-18)
?Dyre? malware re-surfaces as ?TrickBot?, targets Australian banks (2016-10-18)
Ecuador says it disconnected Julian Assange?s internet because of Clinton email leaks (2016-10-18)
Ecuador affirms Assange#039;s asylum status amid internet access questions (2016-10-18)
Cognitive Security (2016-10-18)
API Usability Matters UX and CX is like DX and (2016-10-18)
Yahoo left out something important when it said users havent fled since its big hack (YHOO) (2016-10-18)
The Internet of Things is being used to launch massive cyberattacks (2016-10-18)
Hackers create more IoT botnets with Mirai source code (2016-10-18)
St. Jude Medical Plans Cybersecurity Advisory Panel (2016-10-19)
Yahoo, ACLU press U.S. to disclose secret surveillance orders (2016-10-19)
Regulators to set new cybersecurity standards for banks (2016-10-19)
FBI and Czech police arrest Russian hacker for US attacks (2016-10-19)
Man arrested in Czech Republic suspected of hacking LinkedIn (2016-10-19)
BRIEF-U.S. govt officials considering release of additional info on court order served on Yahoo (2016-10-19)
Is your security camera hacking someone else? (2016-10-19)
Why cybersecurity certifications suck (2016-10-19)
BRIEF-Office of Director of National Intelligence confirms receipt of Yahoos letter (2016-10-19)
Six Ways Cities Can Make Cybersecurity a Top Priority (2016-10-19)
Is IoT Posing a Threat To Cyber Security? (2016-10-19)
From Good to Great API (2016-10-19)
Hacker Allegedly Responsible for Massive 2012 LinkedIn Breach Arrested (2016-10-19)
Aviation Officials Step Up Cybersecurity Checks of Older Messaging System (2016-10-19)
U.S. calls on banks to set higher cyber security standards (2016-10-19)
ThreatConnect Shares Incident Information on Major Financial Institution Domain Squat (2016-10-19)
LinkedIn blames Russian hacking suspect for 2012 breach (2016-10-19)
Designing better Web APIs Part I arefscom (2016-10-19)
There Are Almost Half of Million IoT Devices Infected with the Mirai IoT Malware (2016-10-19)
Security Lessons from a Power Saw (2016-10-19)
Smart Cities Have No Cybersecurity, Say 98% Of Government IT Pros (2016-10-19)
Inside the DDoS attacks powered by large IoT botnetsSecurity Affairs (2016-10-19)
Man suspected of stealing 100 million LinkedIn users information is arrested in Prague (2016-10-19)
Yahoo Seeks U.S. Declassification of Data-Gathering Efforts (2016-10-19)
US charging arrested NSA contractor with espionage (2016-10-20)
New Free Tool Stops Petya Ransomware Rootkits (2016-10-20)
Recent IoT-based Attacks: What Is the Impact On Managed DNS Operators? (2016-10-20)
Researchers link Podesta hack to Russia (2016-10-20)
Hajime, Yet Another IoT Botnet (2016-10-20)
Russian arrested over LinkedIn hack (2016-10-20)
Why Arent We Talking More Proactively About Securing Smart Infrastructure? (2016-10-20)
Why Poor Cyber Hygiene Invites Risk (2016-10-20)
WikiLeaks releases messages from Obama (2016-10-20)
NSA contractor to face espionage charges for alleged data theft (2016-10-20)
Yahoo Demands Government Be More Transparent About Data Requests (2016-10-20)
How To Crash A Drone By Hacking Its 3D Propeller Design (2016-10-20)
Czech police nab Russian suspected of hacking U.S. targets (2016-10-20)
Russia Hackers to Blame for Wikileaks Emails - Proof Vladmir Putin Was Behind the Clinton Email Hack (2016-10-20)
DNS provider Dyn facing another massive DDoS attack ? Twitter, Reddit, and more impacted [Updated] (2016-10-21)
Researchers sabotage 3D printer files to destroy a drone (2016-10-21)
?The need to stay alert as data breach costs rise? (2016-10-21)
What We Know About Friday?s Massive East Coast Internet Outage (2016-10-21)
Russian indicted in U.S. on charges of hacking LinkedIn (2016-10-21)
NSA Contractor Over 20 Years Stole More Than 50 Terabytes Of Govt Data (2016-10-21)
7 Imminent IoT Threats (2016-10-21)
Dyn issues affecting joint customers (2016-10-21)
Cyber Training For First Responders To Crime Scene (2016-10-21)
Some notes on todays DNS DDoS (2016-10-21)
Major DDoS attack on Dyn DNS knocks Spotify, Twitter, Github, Etsy, and more offline (2016-10-21)
ThreatConnect Shares Incident Information on a Phishing Page Serving Fake Login for University (2016-10-21)
UPDATE 8-Cyber attacks disrupt PayPal, Twitter, other sites (2016-10-21)
Indian Banks Hit By Debit Card Security Breach (2016-10-21)
DDoS Attack On DNS Provider Disrupts Okta, Twitter, Pinterest, Reddit, CNN, Others (2016-10-21)
A denial-of-service attack shut down major websites across the internet (2016-10-21)
SPECIAL ALERT: DDoS Attack Shuts Down Key Fintech Sites (2016-10-21)
UK?s new cyber security centre to debunk scare tactics and lead by example (2016-10-21)
Dyn, a managed DNS service, hit with attack, popular sites see performance issues (2016-10-21)
Reports: Cyberattack Spurs Widespread Internet Outage On East Coast (2016-10-21)
The Feds are investigating todays massive DDoS attacks (2016-10-21)
U.S. indicts Russian for hacking LinkedIn, Dropbox, Formspring (2016-10-21)
RPT-UPDATE 1-Russian indicted in U.S. on charges of hacking LinkedIn (2016-10-21)
Homeland Security Is ?Investigating All Potential Causes? of Internet Disruptions (2016-10-21)
Google?s $100K cybersecurity award given to University of California Santa Barbara (2016-10-21)
Anonymous Hacker Officially Charged for Boston Hospital DDoS Attacks (2016-10-21)
What is a Distributed Denial-of-Service Attack and How Did it Break Twitter? (2016-10-21)
Too small for cyber security? Think again. (2016-10-21)
Report: Suspected spy being investigated for mysterious NSA auction (2016-10-21)
Internet Attack Spreads, Disrupting Major Websites (2016-10-21)
Cybersecurity, Unscrupulous Diners, and Internet Stewardship (2016-10-22)
Smart home devices used as weapons in website attack (2016-10-22)
Anonymous Hacker Officially Charged for Boston Hospital DDoS Attacks (2016-10-22)
What We?re Scared About This Halloween: Prosecutorial Discretion Under Notoriously Vague Computer Crime Statute (2016-10-31)
Introducing Seamless Source Control Integration With Bitbucket and SwaggerHub (2016-10-31)
Cloud originated DDoS attacks (2016-10-31)
Hackforums Shutters Booter Service Bazaar (2016-10-31)
Shadow Brokers post list of compromised IP addresses (2016-10-31)
Recent Botnet Attacks Highlight Importance of Automated Testing to Harden Defenses (2016-10-31)
Internet of Things Attacks are More than a Nuisance (2016-10-31)
Controversial Chinese cybersecurity law enters home stretch for approval (2016-10-31)
US Should Help Private Sector Active Defense, But Outlaw Hacking Back, Says Task Force (2016-10-31)
Hackers reveal apparent targets of NSA cyber espionage (2016-10-31)
Feds Preach Cybersecurity to Carmakers (2016-10-31)
Introduction to APIFirst Design (2016-10-31)
Sundown Exploit Kit Operating 80,000 Malicious Subdomains (2016-10-31)
Fraud report names most sophisticated cyber-attacks globally in 2016 (2016-10-31)
UPDATE 2-Microsoft says Russia-linked hackers exploiting Windows flaw (2016-11-01)
Microsoft preparing to patch security flaw used in cyberattacks (2016-11-01)
Shadow Brokers Releases Second Trove of Spying Tools (2016-11-01)
We Need A National Cyber Defense Agency (2016-11-01)
Cybersecurity action must catch up to interest: A lesson from ?Snowden? (2016-11-01)
ThreatConnect Shares Incident Information on Typosquatting Domains (2016-11-01)
UK to increase national cyber-defence grid (2016-11-01)
7 Misconceptions of AI, Machine Learning and Cybersecurity (2016-11-01)
ThreatConnect Shares Incident Information on Turla APT satellite-based infrastructure (2016-11-01)
UK government to spend $2.3 billion to bolster cybersecurity (2016-11-01)
National Cyber Security Strategy launched by UK chancellor (2016-11-01)
Another Shadow Brokers Leak (2016-11-01)
Details emerging on Dyn DNS DDoS attack, Mirai IoT botnet (2016-11-01)
Microsoft handed the NSA access to encrypted messages (2016-11-01)
Why I Dont Like UPDATE Methods In API Design (2016-11-02)
COLUMN-Does the FBI think Russia hacked Weiners computer? (2016-11-02)
Bedrock Automation Extends Cyber Security to Industrial Serial Communications with the Bedrock SIOS.5 Serial I/O Module (2016-11-02)
Ohio using National Guard cybersecurity team to protect elections (2016-11-02)
We Need A National Cybersecurity Strategy That Everyone Can Implement (2016-11-02)
Why the Government Must Disclose Its Exploit to the Defense in the Playpen Cases (2016-11-02)
How Unchecked Spying Corrodes Democracy Around the World (2016-11-02)
Free Cybersecurity MOOC from F-Secure and the University of Finland (2016-11-02)
Tim Berners-Lee Warns Hackers Could Exploit Open Data To Wreak Real-World Chaos (2016-11-02)
We Need A National Cybersecurity Strategy That Everyone Can Implement (2016-11-02)
Building The LinkedIn Knowledge Graph (2016-11-02)
Key Points in the New UK National Cyber Security Strategy (2016-11-03)
Photobucket Hacker Sent To Prison (2016-11-03)
It#039;s time to make Russia pay for its cyberattacks (2016-11-03)
American Industry Benefiting From Government Cybersecurity Executive Transitions (2016-11-03)
Cybersecurity Recommendations for the Next Administration: Keep Cybersecurity Front and Center (2016-11-03)
Ukraine hackers claim huge Kremlin email breach (2016-11-03)
Why Cybersecurity Is So Hard -- Absurd Division (2016-11-03)
Police in Quebec are spying on journalists and Snowden calls that "a threat to democracy" (2016-11-03)
Nation-Blanking DDoS Attacks Launched By Individuals Now Proven Able To Take Entire Nation?s Off The Net (2016-11-03)
Liberia hit with attack that downed Twitter earlier this month (2016-11-03)
Ne?er-Do-Well News and Cyber Justice (2016-11-04)
U.S. boosting cyber defenses, but not police presence, for election (2016-11-04)
China adopts controversial cybersecurity law: Xinhua (2016-11-06)
FireEye CEO And CFO On Election Cybersecurity, A Renewed Channel Push And Company Restructuring (2016-11-07)
4G Cellular Networks At Risk Of DoS Attacks (2016-11-07)
REFILE-UPDATE 2-Raid on 20,000 Tesco Bank accounts fuels UK cybercrime fears (2016-11-07)
CA welcomes release of UK National Cyber Security Strategy (2016-11-07)
Announcing the New Apigee Edge Experience Apigee (2016-11-07)
Unsealed Court Docs Show FBI Used Malware Like ?A Grenade? (2016-11-07)
China?s New Cybersecurity Rules May Block Western Innovation (2016-11-07)
DDoS Attack and Resiliency Measures (2016-11-08)
Asia financial body says China cyber security law could make risk management harder (2016-11-08)
Merkel fears Russian meddling in German election (2016-11-08)
Public Consultation on the Proposed Approach to EU Cyber Security Directive (2016-11-08)
After cyber attacks, Internet of Things wrestles with making smart devices safer (2016-11-08)
Winter Denial of Service attack knocks out heating in Finnish homes (2016-11-08)
What are the Biggest Issues in Cyber Security in 2016? (2016-11-09)
A lightbulb worm could take over every smart light in a city in minutes (2016-11-09)
Yahoo is worried that hackers might have access to your accounts (2016-11-09)
Trump?s Win Signals Open Season for Russia?s Political Hackers (2016-11-09)
The Big Lesson We Must Learn From The Dyn DDoS Attack (2016-11-09)
Free Cloud Storage Putting Small Business Data At Risk (2016-11-10)
US Customs Police Paid Contractors to Monitor the Dark Web (2016-11-10)
Bangladesh Bank to retrieve $15 million of $81 million cyber heist (2016-11-10)
Yahoo knew of state-backed hack in 2014 (2016-11-10)
Self-Propagating Smart Light Bulb Worm (2016-11-10)
U.S. charges Florida man in case linked to JPMorgan hacking probe (2016-11-10)
Britain flexes its cyber-muscles (2016-11-10)
Global industry groups voice opposition to China cyber security law (2016-11-11)
To Keep Users Secure, Facebook Shops the Darkweb for Stolen Passwords (2016-11-11)
Left-wing cyber-hangout blames security breach on pro-Trump trolls (2016-11-11)
Sharing Threat Intel: Easier Said Than Done (2016-11-11)
Facebook Buys Leaked Passwords From Black Market, But Do You Know Why? (2016-11-11)
OpenAPI GUI (2016-11-12)
Swagger toolbox (2016-11-12)
Global Cybercrime Sweep Targeted Young DDoS Attackers (2016-12-13)
DDoS: Thirty-four arrested after international probe (2016-12-13)
How Russia pulled off a cyberwar invasion of America, according to the New York Times (2016-12-13)
Devious Ransomware Frees You if You Infect Two Other People (2016-12-13)
The Query Volumes of Mirai DGAs (2016-12-13)
Seventeen-year-old sentenced for 2015 TalkTalk hack (2016-12-13)
Security Expert On Presidential Election Hack: We Should Have Expected This For a Long Time (2016-12-13)
NY TIMES: DNC hacks turned US media into de facto instrument of Russian intelligence (2016-12-13)
Impressive demonstration of social engineering (2016-12-13)
Senate Foreign Relations panel to probe Russian hacking (2016-12-13)
TalkTalk hacker, 19, pleads guilty at the Old Bailey (2016-12-13)
The Perfect Weapon: How Russian Cyberpower Invaded the U.S. (2016-12-13)
Vladimir Putin was directly involved in US election hack, report says (2016-12-14)
Yahoo Says 1 Billion User Accounts Were Hacked (2016-12-14)
Foundations of RESTful Architecture (2016-12-14)
New Cybersecurity Book Highlights Growing Threat of Social Engineering (2016-12-14)
7 Secrets to Designing Alexa Skills (2016-12-14)
Yahoo discloses hack of 1 billion accounts (2016-12-14)
White House spokesman suggests Trump knew of Russias alleged hacking before the election (2016-12-14)
REPORT: Intelligence officials believe Putin was directly involved in the Democratic Party hacks (2016-12-14)
Yahoo says one billion accounts exposed in newly discovered security breach (2016-12-14)
Corker: US officials shouldn#039;t get their #039;hair on fire#039; over Russian hacking (2016-12-14)
House Intel chair calls for briefing Thursday on Russian hacking (2016-12-14)
Wannabe Hackers Are Willing to Pay To Learn How To Use the Mirai Botnet (2016-12-14)
API Modeling A ZeroCode Way To a Designer API (2016-12-14)
US Election Assistance Commission confirms ‘possible’ hack (2016-12-15)
Dem asks Chaffetz to investigate Russian hacking (2016-12-15)
White House suggests Putin authorized DNC hack and helped to elect Trump (2016-12-15)
U.S. intelligence officials say Putin was personally involved in U.S. election hack (2016-12-15)
Donald Trump - Pants on Fire! Trump tweet about White House, Russian hacking probe (2016-12-15)
How to replace 5 major Yahoo services and delete your Yahoo account (2016-12-15)
Putin reportedly oversaw Clinton email dump and election hacks personally (2016-12-15)
Yahoo Reveals Biggest Hack; Over 1Bn Accounts Compromised (2016-12-15)
Real-World Fallout From The Cybersecurity Skills Gap (2016-12-15)
Assange: Some leaks may have been Russian (2016-12-15)
Reid: Putin #039;clearly#039; involved in election hack (2016-12-15)
American Hacker Arrested For 2014 JP Morgan Chase Breach (2016-12-15)
1 Billion Users Exposed In Another Record Breach From Yahoo (2016-12-15)
Russia: Claim that Putin is behind hacking is #039;nonsense#039; (2016-12-15)
Salesforce Security CTO: How A DDoS Attack Can Impact A Smart Grid (2016-12-15)
As US Government Traces Hacks to Putin, Russia Cracks Down on Hackers at Home (2016-12-16)
Romanian Gets 57-Months Jail For ATM Skimming Scheme (2016-12-16)
FBI backs up CIA: Russia intervened to help Trump win 2016 election (2016-12-16)
Stolen Yahoo User Data Sold for $300K (2016-12-16)
BRIEF-NATO and FireEye announce cyber information sharing agreement (2016-12-16)
Time to stop handwringing about Russia and do something serious (2016-12-17)
API Design for C epub (2016-12-18)
Podesta: FBI didn#039;t tell me about hacks until after WikiLeaks began publishing emails (2016-12-18)
Senators call for probe of cyber attacks by Russia (2016-12-18)
Schumer joins McCain in call for independent probe of Russian hacking (2016-12-18)
Yahoo security problems a story of too little, too late (2016-12-18)
Kremlin says it is not in contact with Trump team (2016-12-19)
The Power of OpenClosed Principle (2016-12-19)
Malware Exchange Busted by the Feds Relaunches, At Least in Name (2016-12-19)
Russian Hackers Seized Control of Pentagon Email System (2016-12-19)
2017 Cyber Security Predictions (2016-12-19)
US Charges 3 Romanians With Cyber Fraud Involving $4 Million (2016-12-19)
Russian Official Blames Western Media for Turkish Ambassadors Assassination (2016-12-19)
The U.S. Response to Russian Pre-Election Meddling: An Overview (2016-12-19)
Future of APIs (2016-12-19)
Whistleblowers Don’t Need Elite Credentials To Help Protect Us from Government Overreach (2016-12-26)
Kerry: Russian interference had #039;profound impact#039; on election (2016-12-28)
Report: Distributed Denial of Service Attacks Increased In 2016, Spurred By IoT Vulnerabilities (2016-12-28)
Another Massive DDoS Closes Out 2016, But Mirai Not To Blame (2016-12-28)
Modernizing Legacy PHP apps with APIs (2016-12-28)
GRIZZLY STEPPE - Russian Malicious Cyber Activity (2016-12-29)
Threat Actors Bring Ransomware To Industrial Sector With New Version of KillDisk (2016-12-29)
FBI analysis fingers Russian spy agencies for U.S. election hacks (2016-12-29)
NH Department of Health and Human Services Announces Data Breach (2016-12-29)
Creating a Simple Android REST Client Using HTTPRPC (2016-12-29)
Cyberattack On Ukraine Conflict Watchdog (2016-12-29)
New Report Says Russian Hacking Came From Russia (2016-12-29)
U.S. accuses Chinese citizens of hacking law firms, insider trading (2016-12-29)
Evidence of Russian malware found on US electrical company laptop (2016-12-30)
Russian minister proposes expelling 35 Americans in tit-for-tat response (2016-12-30)
Policy, statistics and questions: Reflections on UK cyber security disclosures{dagger} (2016-12-30)
Cyber Intelligence and Defense for the Public Sector, Part 3: The Rise of Active Defense (2016-12-30)
Leahy calls utility breach #039;direct threat to Vermont#039; (2016-12-31)
Grizzly Steppe Russian Malware Found on Vermont Utility System (2016-12-31)
Luggage Tag Code Unlocks Your Flights, Identity to Hackers (2016-12-31)
Beautiful Node APIs (2017-01-01)
10 Cybersecurity Lessons Learned In 2016 (2017-01-02)
Be Prepared for Many More Data Breaches This Year (2017-01-02)
GOP rep suggests CIA, NSA leaked info on Russian hacking (2017-01-02)
Trumps cybersecurity book, from (Bill) OReilly (2017-01-02)
Feminist cybersecurity 101 (2017-01-02)
DDD REST Domain Driven APIs for the Web (2017-01-02)
DIY Feminist Cybersecurity (2017-01-02)
Cyberrisk Through A Business Lens (2017-01-03)
The Chrysler Portal is the all-electric self-driving minivan for your futuristic family (2017-01-03)
The Biggest Cyber-Security Incidents of 2016 (2017-01-03)
Russian ‘grid attack’ turns out to be a damp squib (2017-01-03)
Class Breaks (2017-01-03)
Symantec Research Provides Key Evidence for International Cybercriminal Takedown (2017-01-03)
WikiLeaks hints at potential releases in 2017 warning ‘prepare for showdown’ (2017-01-03)
The Download on the DNC Hack (2017-01-03)
Plenty of users sticking with Yahoo despite data breaches (2017-01-03)
Cybersecurity Approaches Are Maturing but Spending Is Misdirected and People Are Still the Problem (2017-01-03)
Anonymous hackers deface Victoria’s Human Rights Commission website, claim AnonPlus is ‘non-criminal’ (2017-01-03)
CIA chief: #039;Wait and see#039; report before doubting Russian hacking (2017-01-03)
Protobuf Alternative to REST for Microservices (2017-01-03)
Obamas Disclosure About Russian Hacking Is A Cybersecurity Gold Mine (2017-01-03)
Dear Obama, From Infosec (2017-01-03)
Russia did not hack Vermont electric utility: report (2017-01-03)
Kaspersky warning on Switcher Trojan that uses Android devices to compromise routers (2017-01-03)
The Real Cybersecurity Issues Behind the Overhyped ‘Russia Hacks the Grid’ Story (2017-01-04)
Heroes vs Villains: Humans will play both roles when it comes to cybersecurity in 2017 (2017-01-04)