- [Eset]Stop, thief! Five new tricks used by cybercriminals ? and how to stay safe
- [Trend]Dutch TorRAT Threat Actors Arrested
- [Sophos]Memories of the Internet Worm - 25 years later
- [SecListe]Android 4.4 arrives with new security features - but do they really matter?
- [FireEye]Know Your Enemy: Tracking A Rapidly Evolving APT Actor
- [SecList]Analysis: Kaspersky Lab Report: Java under attack - the evolution of exploits in 2012-2013
- [Technet]They?re here! Surface 2, Surface Pro 2 and new accessories now on sale
- [ThreatPost]Gary McGraw on BSIMM-V and Software Security
- [ThreatPost]How Dark Mail Plans to Build an Open, Secure Email Platform
- [Eset]Win32/KanKan ? Chinese drama
- [Trend]Improving Hadoop Security with Host Intrusion Detection (Part 2)
- [Sophos]Facebook mulls silently tracking users' cursor movements to see which ads we like best
- [SecListe]?Nigerian? letters - now with a Syrian twist
- [MMPC]New infection rate data for unprotected computers
- [Technet]Bing Smart Search on Windows 8.1 finds your needle in a haystack
- [ThreatPost]EU Petition Seeks to Restrict Export of ?Digital Arms?
- [ThreatPost]Smaller, Popular Open Source Software Packages Exposed in Sourceforge Review
- [Eset]The wrong cable guys: Card skimmers install bogus wires into cash registers in Nordstrom store
- [Trend]Halloween Freebies Lead to Ghastly Survey Scams
- [Sophos]How to protect your critical infrastructure
- [Sofpedia] Security Brief: badBIOS Malware, Political Attacks, Social Media Hacks
- [maredugof] Brèves 2013 S44
- [FireEye]Why Our Risk Assessment Calculations Leave us Exposed to APTs
- [SecList]Analysis: Spam in September 2013
- [MMPC]Infection rates and end of support for Windows XP
- [Technet]Windows 8.1 and the Windows Store are now ready: Here?s what developers need to know
- [ThreatPost]British Citizen Indicted for Attacking Government, Military Networks
- [ThreatPost]Researcher Finds Method to Insert Malicious Firmware Into Currency Validator
- [Eset]Five bad PC habits many of us STILL have ? and how to stop today
- [Trend]Improving Hadoop Security with Host Intrusion Detection (Part 1)
- [Sophos]Firefox moves up to Version 25, fixes a bunch of memory mismanagement problems
- [Malekal] [hack] Generation-nt.com touché par Darkleech
- [Sofpedia] Westpac Customers Warned of Fake “Unauthorized Login Attempt” Emails
- [Sofpedia] Three Government Websites from Syria Hacked and Defaced
- [Sofpedia] BadBIOS Malware: Reality or Hoax?
- [FireEye]Evasive Tactics: Terminator RAT
- [SecList]Blog: ?Nigerian? letters - now with a Syrian twist
- [MMPC]New Security Intelligence Report, new data, new perspectives
- [Technet]Visual Studio 2013 now available for download
- [ThreatPost]USA FREEDOM Act Would Curtail NSA Dragnet
- [ThreatPost]Facebook Android Flaws Enable Any App to Get User?s Access Tokens
- [Eset]Grim warning for bounty hunters ? Yahoo pays out paltry $12.50 per vulnerability
- [Trend]Gatekeeper on Mac OS X 10.9 Mavericks
- [Sophos]Monday review - the hot 26 stories of the week
- [SecList]Blog: Information Security Workshop in Echigo-Yuzawa 2013 (Japan)
- [MMPC]Our protection metrics - September results
- [Technet]Join Microsoft in the 'Hour of Code' campaign
- [ThreatPost]LinkedIn Defends Intro Security as Researcher Goes Phishing
- [ThreatPost]Scan Shows 65% of ReadyNAS Boxes on Web Vulnerable to Critical Bug
- [Eset]Getting warmer? New Hotspot 2.0 ?could offer safer public Wi-Fi?