- [ThreatPost]Russian APT28 Group Linked to NATO, Political Attacks
- [ThreatPost]Government, Industry Focusing on Issue of Resiliency
- [Eset]Week in security: Dubai Police use Google Glass facial recognition, Bugzilla gets bugged and ?Unpatchable? USB exploit lands on GitHub
- [Trend]New CVE-2014-4114 Attacks Seen One Week After Fix
- [Sophos]Adobe updates its e-reader - DRM data no longer transmitted insecurely
- [MMPC]Staying in control of your browser: New detection changes
- [Technet]Delivering a complete cloud for every business, industry and geography
- [ThreatPost]Shellshock Exploits Targeting SMTP Servers at Webhosts
- [ThreatPost]New Koler Variant Spreading Through SMS
- [Eset]European ATMs under malware attack
- [Trend]Operation Pawn Storm: The Red in SEDNIT
- [Sophos]POODLEs, Sandworms and getting safe online - 60 Sec Security [VIDEO]
- [Technet]Azure boasts new machine learning capabilities and Microsoft reveals details of Ignite conference ? Weekend Reading: Oct. 17th Edition
- [ThreatPost]Samsung Rebuffs Criticism of Knox Crypto, Password Management
- [ThreatPost]NSA-Approved Samsung Knox Stores PIN in Cleartext
- [Eset]Ello privacy ? what you need to know
- [Trend]Microsoft Windows Hit By New Zero-Day Attack
- [Sophos]Do we really need strong passwords?
- [Technet]Introducing Microsoft Ignite and our lineup of top conferences in 2015
- [ThreatPost]Researcher Finds Tor Exit Node Adding Malware to Binaries
- [Eset]Previously undiscovered Bugzilla exploit patched
- [Trend]TorrentLocker Run Hits Italian Targets
- [Sophos]Google goes beyond two-step verification with new USB Security Key
- [Technet]Azure adds real-time analytics for Hadoop and new machine learning capabilities
- [ThreatPost]Facebook, Yahoo Curb Identity Theft with New Email Ownership Header
- [ThreatPost]NAT-PMP Protocol Vulnerability Puts 1.2 Million SOHO Routers At Risk
- [Eset]Manual fixes to USB malware revealed? with a catch
- [Trend]Targeted Attacks: Stealing Information Through Google Drive
- [Sophos]SSCC 170 - Is the best time to shop at a store right after it has a breach? [PODCAST]
- [FireEye]Cashing in on Cybersecurity
- [Technet]Project Spark ignites gamers? minds, and Surface Pro 3 is a good fit for enterprise ? Weekend Reading: Oct. 10th Edition
- [ThreatPost]Malvertising Campaign on Yahoo, AOL, Triggers CryptoWall Infections
- [ThreatPost]Cybersecurity Legislation Forecast is Grim
- [Eset]Sednit espionage group now using custom exploit kit
- [Trend]Data Privacy for Businesses: A Part of Doing Business
- [Sophos]OS X Yosemite Wi-Fi problems - can you help us solve them?
- [SecList]Spam in September 2014
- [Technet]Read a pick-your-path quest inspired by ?Project Spark?
- [ThreatPost]Cisco Patches Three-Year-Old Telnet Remote Code Execution Bug in Security Appliances
- [ThreatPost]April 911 Outage Affected 3.5 Percent of U.S. Population
- [Eset]Yahoo told to ?pull your pants up? after Shellshock hack claims
- [Trend]Smart Lock Devices: Security Risks and Opportunities
- [Sophos]Woman charged with planting spyware on cop's phone
- [FireEye]Follow the Information
- [FireEye]MIRcon: What the Cosmos can Teach us about Security
- [SecList]Leave your passwords at the Checkout Desk
- [MMPC]Close means close: New adware detection criteria
- [Technet]A first look at Windows 10 ? Weekend Reading: Oct. 3rd Edition
- [ThreatPost]Exploit For Patched Flash Vulnerability Already In Two Exploit Kits
- [ThreatPost]NIST Publishes Draft Hypervisor Security Guide