- [SecList]Descriptions: Trojan.Win32.Agent.fkeh
- [Technet]Daily Update, Jan. 16th ? New Mobile App Helps You Stay Connected During a Natural Disaster
- [ThreatPost]FAKEM RAT Mimics Normal Network Traffic
- [ThreatPost]Pwn2Own Rules Change Again, Flash, Java Now Fair Game for Contestants
- [Trend]How to Use Java ? If You Must
- [Sophos]Security team fails to check logs, lets man goof off by outsourcing own job for years
- [fsecure] Protecting Against Attacks Similar to "Red October"
- [fsecure] Year 2038 problem
- [Krebs] Spam Volumes: Past & Present, Global & Local
- [Krebs] New Java Exploit Fetches $5,000 Per Buyer
- [Krebs] Polish Takedown Targets ‘Virut’ Botnet
- [Malekal] [en] Malvertising on linkbucksmedia.com
- [Malekal] [en] Milton FTP BruteForce Panel
- [Malekal] Tom’s Guide refile des programmes parasites (PUPs)
- [BitDefender] Le clickjacking sur Facebook expliqué en images
- [SecList]Descriptions: Trojan.Win32.Agent2.ddnd
- [Technet]The Midweek Download: Jan. 16th Edition ? Delivering on the Cloud OS & the ?Next App Star? Contest Kicks Off
- [ThreatPost]'Terrific Employee' Fired After Losing USB Drive Containing Medical Records
- [ThreatPost]Researchers Highlight Medical Device Security at Annual ICS Conference
- [Trend]Java Zero-Day Exploit and Ruby on Rails Vulnerabilities
- [Sophos]Google has been accused of many things, but KILLING A DONKEY?
- [SecList]Descriptions: Trojan.Win32.Agent2.dmuw
- [Technet]Daily Update, Jan. 15th ? Office 365 Helps Retailers Take Care of Business
- [ThreatPost]Army Looking for Ways to Infiltrate Air-Gapped Systems
- [ThreatPost]Researchers Highlight Medical Device Security at Annual ICS Conference
- [Trend][INFOGRAPHIC] The Automated Home of Tomorrow: How Vulnerable is it to Cybercrime?
- [Sophos]Yet ANOTHER Java zero-day claimed - but this time you're laughing, right?
- [SecList]Blog: Java 0day Mass Exploit Distribution
- [MCAFEE]Java Zero-Day Vulnerability Pushes Out Crimeware
- [Technet]What is the Cloud OS?
- [ThreatPost]Costin Raiu on the Red October Cyberespionage Campaign
- [ThreatPost]Java 7u11 Update Addresses Only One of Two Zero-Day Vulnerabilities
- [Eset]Mystery Shopper Scam: Misery Shopping
- [Trend]Blackhole Spam Runs Return From Holiday Break
- [Sophos]"Aaron's Law" would partly de-fang Computer Fraud and Abuse Act
- [SecList]Descriptions: Trojan.Win32.MicroFake.p
- [MMPC]Making the most of fear and deception ? rogue v ransomware (part 2)
- [Technet]Daily Update, Jan. 14th ? Microsoft Showcases ?The Future of Retail Today? at National Retail Federation Annual Convention & EXPO
- [ThreatPost]Zaxby's Chicken Chain Warns of Possible Credit Card Thefts
- [ThreatPost]Adobe Patches Four ColdFusion Flaws Exploited in Wild
- [Eset]Are fears of digital device theft justified? Survey says yes
- [Trend]The Issues Surrounding Android Debugging
- [Sophos]Beware! Malicious Europcar invoice emails spread Trojan horse attack
- [SecListe]Red October - Java Exploit Delivery Vector Analysis
- [ZDNet] Malware Rocra : les chercheurs à la poursuite de Red October
- [krebsonsecurity] New Java Exploit Fetches $5,000 Per Buyer
- [SecList]Descriptions: Trojan.Win32.Agent2.lmu
- [MMPC]Making the most of fear and deception ? rogue v ransomware (part 1)
- [Technet]Weekend Reading: Jan. 11th Edition ? Huawei Introduces Windows Phone 8 Device at CES & ?Indie? Game App Developers Light Up Windows Phone
- [ThreatPost]Android Botnet Infects 1M+ Phones in China