- [ThreatPost]PrivatBank Mobile App Vulnerable to Account Theft
- [ThreatPost]NSA Crypto Questions Resemble a ?Hall of Mirrors?
- [Eset]Help for the little guys: Small businesses offered ?cyber insurance? ? starting at $800
- [Trend]BLYPT: A New Backdoor Family Installed via Java Exploit
- [Sophos]Advertising in mobile apps ? how much is too much?
- [FireEye]New FireEye Report: World War C
- [FireEye]Now You See Me ? H-worm by Houdini
- [SecList]Blog: Icefog OpenIOC Release
- [Technet]Microsoft continues going green with investments in 15 carbon offset projects across the globe
- [ThreatPost]Linux Kernel Update Fixes DoS, Leakage Bugs
- [ThreatPost]Microsoft Reports Zero Law Enforcement Requests for Skype Content
- [Eset]Millions of ID records on sale as five big data firms hacked ?for months?
- [Trend]Can Companies Fight Against Targeted Attacks?
- [Sophos]Advertising in mobile apps - how much is too much?
- [SecListe]Icefog OpenIOC Release
- [SecList]Analysis: The Icefog APT: Frequently Asked Questions
- [Technet]Office 365 for Nonprofits is here to help organizations do more good with technology
- [ThreatPost]Time For a Change in Security Thinking, Experts Say
- [ThreatPost]Stealthy New Click-Fraud Malware Related to Tor Botnet
- [Eset]BYO-Doh! How not to be the ?bring your own disaster? guy
- [Trend]TDSS And ZeroAccess: Friends or Enemies?
- [Sophos]Data-stealing botnets found in major data brokers' servers
- [SecList]Blog: The Icefog APT: A Tale of Cloak and Three Daggers
- [Technet]10 inspiring things you never knew about Partners in Learning
- [ThreatPost]Identity Seller Uses Botnet to Steal from Data Brokers
- [ThreatPost]Icefog Espionage Campaign is ?Hit and Run? Targeted Operation
- [Eset]Keep your Droid on a leash: Google lets users change passwords remotely
- [Trend]New IE Zero Day is Actively Exploited In Targeted Attacks
- [Sophos]Using heartbeats as passwords to secure medical devices
- [SecList]Blog: Exposing the security weaknesses we tend to overlook
- [Technet]Microsoft amends petition to US Foreign Intelligence Service Court
- [ThreatPost]Security Issue in Ruby on Rails Could Expose Cookies
- [ThreatPost]?FISA is the Key to Connecting the Dots?
- [Eset]Filecoder: Holding your data to ransom
- [Trend]Connecting the Dots: Fake Apps, Russia, and the Mobile Web
- [Sophos]Using heartbeats as passwords to secure medical devices
- [SecListe]The Icefog APT: A Tale of Cloak and Three Daggers
- [SecList]Analysis: Spam in August 2013
- [MMPC]End of support for Java SE 6
- [Technet]Find out what the Xbox SmartGlass companion app will bring to Xbox One
- [ThreatPost]Steer Clear of Android iMessage App, Experts Say
- [ThreatPost]Google to Block Many Plug-Ins Starting in 2014
- [Eset]?Do not keep sensitive data on iPhone,? group warns after latex-fingerprint hack
- [Trend]Fingerprint Scans, Passwords, and Managing Online Accounts
- [Sophos]SSCC 117 - Apple all over the news, lots of patches, browser trust and Facebook privacy [PODCAST]
- [SecListe]Exposing the security weaknesses we tend to overlook
- [Silicon] PRISM : les États-Unis à l’écoute des transactions bancaires
- [Silicon] Google veut mettre fin aux mots de passe
- [Silicon] Symantec dévoile les activités des hackers chinois de Hidden Lynx
- [Silicon] Vente de failles et d’exploits : le Français Vupen a bien fourni la NSA