- [Sophos]Ticketmaster says goodbye to CAPTCHA
- [SecListe]Mobile attacks!
- [SecList]Blog: "Red October" - part two, the modules
- [MCAFEE]IPS Countermeasures Fight Obfuscation, Evasion
- [Technet]Daily Update, Jan. 23rd ? Bing Sports App for Windows 8 Adds College Football & Basketball, MotoGP & More Soccer
- [ThreatPost]Dotcom Offers ?10,000 Reward For Breaking Mega's Crypto
- [ThreatPost]Yahoo Mail Breach Linked to Old Wordpress Vulnerability
- [Eset]PokerAgent botnet stealing over 16,000 Facebook credentials
- [Trend]Pirated App Stores on iOS?
- [Sophos]A short history of hacking attacks against the media
- [SecListe]Malicious Chrome extensions: a cat and mouse game
- Des pirates détournent le protocole SPF pour commander un malware à distance
- [BitDefender] Facebook Graph Search : la porte ouverte à toutes les dérives
- [BitDefender] Les pirates à l’abordage des comptes Yahoo !
- [fsecure] Facebook's Graph Search: Clear Your Searches
- [fsecure] New York Times Hit with Targetted Attacks
- [SecList]Analysis: ?Red October?. Detailed Malware Description 1. First Stage of Attack
- [MCAFEE]Mali Jihadists Support Their Struggle Online
- [Technet]Microsoft and Data Privacy Day: Helping You Take Control
- [ThreatPost]Inside the Targeted Attack on The New York Times
- [ThreatPost]China, The New York Times and the Value of Self-Shaming
- [Eset]Your Apple Mac made even safer: Part 3 of securing new devices
- [Trend]Android Malware Found to Send Remote Commands
- [Sophos]Chinese hackers break into the New York Times, steal every employee's password
- [SecListe]God horses are floating clouds: The story of a Chinese banker Trojan
- [MalwareBytes] CTA: Malwarebiter.com
- [MalwareBytes] Malwarebiter – Biting down on you
- [Malekal] chartsinfrance.net hacké ?
- [Malekal] Backdoor IRC (snk) se propage par Skype (Win32.Phorpiex)
- [SecList]Analysis: ?Red October?. Detailed Malware Description 2. Second Stage of Attack
- [MCAFEE]Anonymous Releases ?Warhead? via #OpLastResort
- [Technet]The Midweek Download: Jan. 23rd Edition ? Eight Tips for Designing Windows Phone Apps
- [ThreatPost]Report: Mainstream Websites Host Majority of Malware
- [ThreatPost]Buffer Overflow Vulnerability Found in VLC Media Player
- [Eset]Linux/SSHDoor.A Backdoored SSH daemon that steals passwords
- [Trend]2012 Annual Security Roundup: Post-PC Threats
- [Sophos]First pirate prosecution in New Zealand under "three strikes" law
- [SecListe]PimpMyWindow - Brazilian adware
- [SecList]Analysis: ?Red October?. Detailed Malware Description 3. Second Stage of Attack
- [MCAFEE]Botnet Control Servers Span the Globe
- [Technet]What is the Cloud OS?
- [ThreatPost]Experts Say CEOs Need to Get Handle on Cyberespionage Problem
- [ThreatPost]Mobile Malware Dubbed 'Bill Shocker' Targets Chinese Android Users
- [Eset]5 physical security tips for protecting your digital devices
- [Trend]Fake Versions of Temple Run 2 Sprint Their Way to Users
- [Sophos]Jailbreak iOS 6.1 today, or wait until Sunday?
- [SecListe]Red October - Indicators of compromise
- [soirée pizza télé]Aux prises avec la mafia de l'Internet
- [Kimberly]Say NO to 0-day's - Securing Firefox
- [zerosecurity] Microsoft Office Command Execution 0day Being sold for $20,000