- [ThreatPost]Remote Unauthenticated Bug Haunts Cisco ACS Server
- [Eset]Nymaim ? obfuscation chronicles
- [Trend]Java Native Layer Exploits Going Up
- [Sophos]Schools hire snoopers to monitor kids on social networks. Is it OK? [POLL]
- [Technet]New details of indie game developer program for Xbox One revealed at gamescom
- [ThreatPost]Opera 16 Fixes Bugs, Improves HTML5 Performance
- [ThreatPost]Kelihos Relying on CBL Blacklists to Evaluate New Bots
- [Eset]Millions of Android users open to attacks due to old versions of OS, FBI warns
- [Trend]Java 6 Zero-Day Exploit Pushes Users to Shift to Latest Java Version
- [Sophos]Facebook pays out $20 million in personal ads settlement; each user gets $15
- [SecList]Analysis: Spam in July 2013
- [Technet]Xbox pulls out all the stops at gamescom with exclusive title announcements and more
- [ThreatPost]Firefox Extension HTTP Nowhere Allows Users to Browse in Encrypted-Only Mode
- [ThreatPost]Facebook Produces First Report on Government Requests for Data
- [Trend]Convincing UPS Email Scam Delivers Backdoor
- [Sophos]SSCC 115 - XP "as a giant 0-day", choosing and remembering passwords, and next-gen HTTP [PODCAST]
- [SecListe]Android 4.3 and SELinux
- [Technet]Outlook.com with Skype offers a delicious pairing
- [ThreatPost]Updated Drive/DirtJumper DDoS Toolkit Includes Mitigation Bypasses
- [ThreatPost]How I Got Here: Jeremiah Grossman
- [Trend]The SCADA That Cried Wolf: Who Is Really Attacking Your ICS Devices Part 2
- [Sophos]Lady Gaga rallies Little Monsters against Applause 'hackers'
- [FireEye]Security Consolidation: Leveraging Business Intelligence
- [Technet]Touchdown for NFL Mobile, newly redesigned and rebuilt for Windows Phone 8
- [ThreatPost]APT Groups Using G20 Summit as Lure in Targeted Attacks
- [ThreatPost]Phony Adobe Plug-in Malware Bypassess Craigslist Spam Controls
- [Trend]Brazil Fights Old Malware, Spam, and Underground Market Growth
- [Sophos]Monday review - the hot 20 stories of the week
- [Technet]Weekend Reading: August 16th Edition?Windows 8.1 rolls out Oct. 18
- [ThreatPost]Norwich University Receives $9.9M for Cybersecurity Research
- [ThreatPost]Mozilla Plug-N-Hack Integrates Browsers and Security Tools
- [Trend]How Can Social Engineering Training Work Effectively?
- [Sophos]NSA 'technology glitch' violated US Constitution, nabbed 56,000 emails per year from non-terrorists
- [FireEye]Operation Molerats: Middle East Cyber Attacks Using Poison Ivy
- [Technet]Xbox 360 hits 31 consecutive months as the no. 1 console in the U.S.
- [ThreatPost]With No Facebook Bounty Coming, Researcher Gets $12k Reward From Security Community
- [ThreatPost]VMware Patches Root Privilege-Escalation Flaw
- [Sophos]Bradley Manning sentenced - has already served three years, to serve 32 more
- [Technet]The limits of Google?s openness
- [ThreatPost]Google, Mozilla Considering Limiting Certificate Validity to 60 Months
- [ThreatPost]Cisco Patches DoS, Buffer Overflow Vulnerabilities in UCM
- [Sophos]Cyber Security Challenge sees youngsters hack into and control a drone
- [Technet]Preparing students for the 21st century workforce: A new model of collaboration in New York City
- [ThreatPost]Declassified 2011 FISC Opinion Shows Court Found Some NSA Surveillance Unconstitutional
- [ThreatPost]FDA Issues Recommendations on the Security of Wireless Medical Devices
- [Sophos]League of Legends hacked, salted passwords and credit card numbers stolen
- [Technet]Microsoft Surface commercial availability expands to 17 more markets
- [ThreatPost]Jumping Out of IE?s Sandbox With One Click
- [ThreatPost]Petition Seeks Removal of NSA Director Alexander
- [Trend]How Exploit Kits Dodge Security Vendors and Researchers