Security News > 2013 > September
![Small businesses' BYOD practices leave them one cyber attack away from bankruptcy](/static/build/img/news/alt/DDoS-small.jpg)
http://www.v3.co.uk/v3-uk/news/2293021/small-businesses-byod-practices-leave-them-one-cyber-attack-away-from-bankruptcy By Alastair Stevenson V3.co.uk 06 Sep 2013
![NSA Revelations Cast Doubt on the Entire Tech Industry](/static/build/img/news/alt/hackers-statistics-small.jpg)
http://www.wired.com/threatlevel/2013/09/tech-industry-tainted/ By David Kravets and Robert McMillan Threat Level Wired.com 09.07.13
![American Fantasy Football app lets hackers change team rosters](/static/build/img/news/alt/hackers-statistics-small.jpg)
http://www.theregister.co.uk/2013/09/06/yahoo_gridiron_game_uncryption/ By John Leyden The Register 6th September 2013
![Advocate Medical Group didn't adequately secure data, class-action suit says](/static/build/img/news/alt/cybersecurity-attacker-small.jpg)
http://www.chicagotribune.com/news/local/breaking/chi-advocate-medical-group-didnt-adequately-secure-data-classaction-suit-says-20130905,0,7744379.story By Mitch Smith Tribune reporter September 5, 2013
![NSAâs Decade-Long Plan to Undermine Encryp tion Includes Backdoors, Stolen Keys, Manipulat ing Standards](/static/build/img/news/alt/DDoS-small.jpg)
http://www.wired.com/threatlevel/2013/09/nsa-backdoored-and-stole-keys/ By Kim Zetter Threat Level Wired.com 09.05.13
![Darknets, wargames and Raspberry Pi at first-ever Balkan hacker conference](/static/build/img/news/alt/Phishing-small.jpg)
http://www.zdnet.com/darknets-wargames-and-raspberry-pi-at-first-ever-balkan-hacker-conference-7000020315/ By Violet Blue Zero Day ZDNet News September 6, 2013
![FBI adds Syrian Electronic Army to wanted list](/static/build/img/news/alt/DDoS-small.jpg)
http://rt.com/usa/fbi-adds-sea-wanted-list-484/ RT.com September 06, 2013
![EHR and mobile device auditing, security requires vigilance](/static/build/img/news/alt/cybersecurity-breach-statistics-small.jpg)
http://healthitsecurity.com/2013/09/04/ehr-and-mobile-device-auditing-security-requires-vigilance/ By Dom Nicastro Health IT Security September 4, 2013
![Those G20 Briefings in Your Inbox May Be Laced With Spyware](/static/build/img/news/alt/web-statistics-3-small.jpg)
http://www.nextgov.com/cybersecurity/2013/09/are-your-g20-briefings-laced-spyware/69888/ By Aliya Sternstein Nextgov.com September 4, 2013
![Aggressive social engineering campaign uncovered in Europe](/static/build/img/news/alt/mac-stats-small.jpg)
http://www.csoonline.com/article/739117/aggressive-social-engineering-campaign-uncovered-in-europe By Steve Ragan Staff Writer CSO Online September 04, 2013