- [ThreatPost]Security Firms Warn Users of Fake Java Updates
- [ThreatPost]It's Time to Abandon Java
- [Trend]Malware Poses as an Update for Java 0-Day Fix
- [Sophos]Polish CERT acts against Virut malware with domain takedowns
- [SecList]Descriptions: Trojan-Downloader.Java.OpenConnection.er
- [ThreatPost]Google Looking Into Hardware to Help Kill the Password
- [Trend]What Would Scammers Want With My Information?
- [Sophos]Firefox update 18 gets an update, but no security problems this time
- [SecList]Descriptions: Trojan-Downloader.Java.Agent.mq
- [MMPC]Key lessons learned from the latest test results
- [ThreatPost]Researchers Deconstruct Pobelka Botnet
- [ThreatPost]Pwn2Own Rules Change Again, Flash, Java Now Fair Game for Contestants
- [Trend]Java Fix for Zero-Day Stirs Questions
- [Sophos]Java hacker boasts of finding two more unpatched holes
- [SecListe]"Red October" - part two, the modules
- [SecList]Blog: The "Red October" Campaign - An Advanced Cyber Espionage Network Targeting Diplomatic and Government Agencies
- [ThreatPost]Foxit Patches Vulnerability, Updates Reader Product
- [ThreatPost]Red October Attackers Shutting Down C&C Infrastructure
- [Trend]Microsoft, Oracle Release Security Fixes for Zero-Day Exploits
- [Sophos]Malware attack! "You have received a secure message"
- [SecList]Analysis: "Red October" Diplomatic Cyber Attacks Investigation
- [Technet]Daily Update, Jan. 17th ? Bing Expands Social Search & Lady Gaga Chats With Fans on Skype
- [ThreatPost]Researchers Deconstruct Pobelka Botnet
- [ThreatPost]Latest Java Update Broken; Two New Sandbox Bypass Flaws Found
- [Trend]Botnets Are Everywhere ? See How They Spread in the Trend Micro Global Botnet Map
- [Sophos]How Twitter users can fake a verified account - and how you can tell the difference
- [SecList]Descriptions: Trojan.Win32.Agent.fkeh
- [Technet]Daily Update, Jan. 16th ? New Mobile App Helps You Stay Connected During a Natural Disaster
- [ThreatPost]FAKEM RAT Mimics Normal Network Traffic
- [ThreatPost]Pwn2Own Rules Change Again, Flash, Java Now Fair Game for Contestants
- [Trend]How to Use Java ? If You Must
- [Sophos]Security team fails to check logs, lets man goof off by outsourcing own job for years
- [fsecure] Protecting Against Attacks Similar to "Red October"
- [fsecure] Year 2038 problem
- [Krebs] Spam Volumes: Past & Present, Global & Local
- [Krebs] New Java Exploit Fetches $5,000 Per Buyer
- [Krebs] Polish Takedown Targets ‘Virut’ Botnet
- [Malekal] [en] Malvertising on linkbucksmedia.com
- [Malekal] [en] Milton FTP BruteForce Panel
- [Malekal] Tom’s Guide refile des programmes parasites (PUPs)
- [BitDefender] Le clickjacking sur Facebook expliqué en images
- [SecList]Descriptions: Trojan.Win32.Agent2.ddnd
- [Technet]The Midweek Download: Jan. 16th Edition ? Delivering on the Cloud OS & the ?Next App Star? Contest Kicks Off
- [ThreatPost]'Terrific Employee' Fired After Losing USB Drive Containing Medical Records
- [ThreatPost]Researchers Highlight Medical Device Security at Annual ICS Conference
- [Trend]Java Zero-Day Exploit and Ruby on Rails Vulnerabilities
- [Sophos]Google has been accused of many things, but KILLING A DONKEY?
- [SecList]Descriptions: Trojan.Win32.Agent2.dmuw
- [Technet]Daily Update, Jan. 15th ? Office 365 Helps Retailers Take Care of Business
- [ThreatPost]Army Looking for Ways to Infiltrate Air-Gapped Systems