
Full Text of President Obama’s Speech on NSA Surveillance
/
0 Comments
Full Text of Obama's Speech on NSA Surveillance

Watch Live: President Obama Speech on NSA Surveillance Program [Livestream]
Watch Live: President Obama Speech on NSA Surveillance Program [Livestream]

A Book Review of Mobile Security: How to Secure, Privatize, and Recover Your Device
The “Mobile Security: How to Secure, Privatize, and Recover Your Devices” by Tim Speed, Joseph Anderson, Darla Nykamp, Jaya Nampalli and Mari Heiser, published by Packt Publishing contains an abundance of information pertaining to the threats mobile devices are susceptible to as well as providing guidelines on how protect them from the assorted threats.

Update on Target Breach: 70 Million Additional Records & Malware
Between Nov. 27 and Dec. 15 of 2013, Target reported it sustained a breech that consisted of 40,000,000 payment card records by cybercriminals. Not as big as the T. J. Max, Adobe and Sony breeches which surpassed 100,000,000 records, but notable enough to cause a buzz.

Symposium On Usable Privacy and Security (SOUP 2014): CALL FOR PAPERS, POSTERS, AND PROPOSALS
Symposium On Usable Privacy and Security (SOUP 2014): CALL FOR PAPERS, POSTERS, AND PROPOSALS

Snapchat Admits to Having Given Photos to Law Enforcement
Snapchat Admits to Having Given Photos to Law Enforcement
0
0
SecurityOrb_Staff
https://securityorb.com/wp-content/uploads/2020/06/SecurityOrb_Logo-1.png
SecurityOrb_Staff2014-01-10 12:44:222014-01-10 12:44:22Kali Linux to Add “Data Nuke” Option
Death of Hero Hacker Barnaby Jack Ruled a Drug Overdose
Death of Hero Hacker Barnaby Jack Ruled a Drug Overdose

Information Security Careers: Become the Next Cyber Superhero
Information Security Careers: Become the Next Cyber Superhero

(ISC)2 Security Congress 2014 Call for Speakers – Submit Proposal by Feb. 10th
(ISC)2 Security Congress 2014
Call for Speakers - Submit Proposal by Feb. 10th
