- [Technet]NPD numbers: Xbox One leads in December
- [ThreatPost]Moon Worm Spreading on Linksys Home and SMB Routers
- [ThreatPost]Certificates Spoofing Google, Facebook, GoDaddy Could Trick Mobile Users
- [Eset]Interview: ?Fully encrypted? Android Blackphone ? will it allow for spy-proof communication?
- [Trend]Breaking Up with Valentine?s Day Online Threats
- [Sophos]The ?Talking Angela? chain letter: Three tips to help you avoid Facebook hoaxes
- [FireEye]Operation SnowMan: DeputyDog Actor Compromises US Veterans of Foreign Wars Website
- [FireEye]New IE Zero-Day Found in Watering Hole Attack
- [SecList]Blog: World Cup: fake tickets, fake giveaways, real attacks
- [MMPC]A journey to CVE-2013-5330 exploit
- [Technet]Build 2014 registration is now open
- [ThreatPost]400 Gbps NTP Amplification Attack Alarmingly Simple
- [ThreatPost]BlackBerry Releases Guidelines to Deter Privacy-Infringing Apps
- [Eset]Cash crash ahead? ?Death? of Windows XP could leave 95% of world?s ATMs vulnerable
- [Trend]Malware Uses ZWS Compression for Evasion Tactic
- [Sophos]Please vote for Naked Security in the 2014 Security Blogger Awards!
- [FireEye]Introducing the New FireEye Security Platform ? One Solution to Detect, Contain, Resolve, and Prevent Threats
- [FireEye]Windows XP: If You Cannot Patch, Catch
- [SecList]Blog: Black Gold, or a Black Hole in Your Pocket
- [MMPC]Coordinated malware eradication
- [Technet]Weekend Reading: Jan. 10th Edition ? New Windows devices unveiled at CES 2014 and Xbox One sales hit 3M consoles sold
- [ThreatPost]US Government Delivers Cybersecurity Framework for Critical Infrastructure
- [ThreatPost]Dropbox Reports Fewer than 250 National Security Requests
- [Eset]Vietnamese malware : ?Single post? enough to trigger spyware attacks against U.S. bloggers, EFF claims
- [Trend]Defending Against Tor-Using Malware, Part 2
- [Sophos]SSCC 134 ? Patching, foisting, hacking and obfuscating [PODCAST]
- [SecListe]Abused update of GOM Player poses a threat
- [SecList]Analysis: Spam money lenders: data theft, Trojans and other special features of ?cheap? loans
- [Technet]Three things retailers need to do now to transform their businesses with technology
- [ThreatPost]Hacktivist Collective Takes Credit for Comcast Mail Server Hack
- [ThreatPost]Light Microsoft Patch Load Precedes MD5 Deprecation
- [Eset]Boaxxe adware: ?A good ad sells the product without drawing attention to itself? ? Pt 1
- [Trend]Scams Circulate After German Email Accounts Get Hacked
- [Sophos]SEA attempts to hack Facebook and other MarkMonitor domain customers
- [SecListe]A Glimpse Behind "The Mask"
- [SecList]Blog: Olympic Games: Made in China
- [Technet]Xbox One sales top 3 million
- [ThreatPost]Twitter Transparency Report Shows Increase in Government Requests
- [ThreatPost]Cost of Doing APT Business Dropping
- [Eset]Less than half of consumers take ANY steps to stay safe online, UK government survey finds
- [Trend]Does the Twitter Follower Scam Actually Work?
- [Sophos]Microsoft, Facebook, Google and Yahoo release NSA snooping stats
- [SecList]Blog: A cross-platform java-bot
- [Technet]Devices, services and moments
- [ThreatPost]Jeremiah Grossman on His New Role as CEO of WhiteHat Security
- [ThreatPost]Google Broadens Bounty Program to Include Chrome Extensions
- [Eset]Luxury store Neiman Marcus joins growing list of card theft targets
- [Trend]Eyeing SpyEye
- [Sophos]Misleading advertisements lead to hijacked browser settings
- [SecListe]World Cup: fake tickets, fake giveaways, real attacks