- [SecList]Descriptions: Exploit.Java.CVE-2010-0840.bd
- [Technet]Office 365: The Next Bold Step
- [ThreatPost]How the RSA Attackers Swung and Missed at Lockheed Martin
- [ThreatPost]Citadel Trojan: It?s Not Just for Banking Fraud Anymore
- [Eset]Combofix: a cocktail of infective factors
- [Trend]Managing Your Mobile Privacy
- [Sophos]Apple (again) washes its hands of the Java mess
- [SecListe]God horses are floating clouds: The story of a Chinese banker Trojan
- [Avira]The BKA/Ransom Trojan comes now with child pornography
- [SecList]Descriptions: Trojan.Win32.Swisyn.bgkm
- [Technet]Daily Update, Jan. 25th ? Bing Search Blog Kicks off ?Bing Your Brain? Series
- [Eset]Straight facts about Mac malware, threats and responses
- [Trend]CARBERP Banking Malware Makes a Comeback
- [Sophos]IE 10 is more secure, so here's a Microsoft tool to prevent you updating by mistake
- [Krebs] Inside the Gozi Bulletproof Hosting Facility
- [Krebs] Big Bank Mules Target Small Bank Businesses
- [Krebs] Pro-Grade Point-of-Sale Skimmer
- [Krebs] Source: Washington Post Also Broadly Infiltrated By Chinese Hackers in 2012
- [PCi] Twitter attaqué : fuite de données pour 250 000 comptes
- [SecList]Descriptions: Trojan-Downloader.BAT.wGet.m
- [MCAFEE]Major News Outlets Attacked in Apparent Coordinated Campaign
- [Technet]Weekend Reading: Jan. 25th Edition ? The Samsung ATIV Odyssey & Nokia Lumia 822 Arrive at Verizon
- [ThreatPost]Juniper?s Junos Could Open Routers to TCP Attacks
- [Eset]Walking through Win32/Jabberbot.A instant messaging C&C
- [Trend]Free Windows 8 Activator? Think Again
- [Sophos]Ticketmaster says goodbye to CAPTCHA
- [SecListe]Mobile attacks!
- [SecList]Blog: "Red October" - part two, the modules
- [MCAFEE]IPS Countermeasures Fight Obfuscation, Evasion
- [Technet]Daily Update, Jan. 23rd ? Bing Sports App for Windows 8 Adds College Football & Basketball, MotoGP & More Soccer
- [ThreatPost]Dotcom Offers ?10,000 Reward For Breaking Mega's Crypto
- [ThreatPost]Yahoo Mail Breach Linked to Old Wordpress Vulnerability
- [Eset]PokerAgent botnet stealing over 16,000 Facebook credentials
- [Trend]Pirated App Stores on iOS?
- [Sophos]A short history of hacking attacks against the media
- [SecListe]Malicious Chrome extensions: a cat and mouse game
- Des pirates détournent le protocole SPF pour commander un malware à distance
- [BitDefender] Facebook Graph Search : la porte ouverte à toutes les dérives
- [BitDefender] Les pirates à l’abordage des comptes Yahoo !
- [fsecure] Facebook's Graph Search: Clear Your Searches
- [fsecure] New York Times Hit with Targetted Attacks
- [SecList]Analysis: ?Red October?. Detailed Malware Description 1. First Stage of Attack
- [MCAFEE]Mali Jihadists Support Their Struggle Online
- [Technet]Microsoft and Data Privacy Day: Helping You Take Control
- [ThreatPost]Inside the Targeted Attack on The New York Times
- [ThreatPost]China, The New York Times and the Value of Self-Shaming
- [Eset]Your Apple Mac made even safer: Part 3 of securing new devices
- [Trend]Android Malware Found to Send Remote Commands
- [Sophos]Chinese hackers break into the New York Times, steal every employee's password
- [SecListe]God horses are floating clouds: The story of a Chinese banker Trojan