- [ThreatPost]How I Got Here: Katie Moussouris
- [Eset]Is cybersecurity by fiat dead on arrival?
- [Trend]A Tour Through The Chinese Underground
- [Sophos]Fake femme fatale dupes IT guys at US government agency
- [SecListe]Brazilian bankers gone wild: now using malicious Office files
- [SecList]Blog: Android 4.4 arrives with new security features - but do they really matter?
- [Technet]Announced at Nokia World: 2 new super-sized Windows Phones, the first Nokia tablet & Instagram is on the way!
- [ThreatPost]Microsoft: XP End of Life an Important Security Milestone
- [ThreatPost]Upatre Trojan Downloads Malware that Downloads Malware
- [Eset]Stop, thief! Five new tricks used by cybercriminals ? and how to stay safe
- [Trend]Dutch TorRAT Threat Actors Arrested
- [Sophos]Memories of the Internet Worm - 25 years later
- [SecListe]Android 4.4 arrives with new security features - but do they really matter?
- [FireEye]Know Your Enemy: Tracking A Rapidly Evolving APT Actor
- [SecList]Analysis: Kaspersky Lab Report: Java under attack - the evolution of exploits in 2012-2013
- [Technet]They?re here! Surface 2, Surface Pro 2 and new accessories now on sale
- [ThreatPost]Gary McGraw on BSIMM-V and Software Security
- [ThreatPost]How Dark Mail Plans to Build an Open, Secure Email Platform
- [Eset]Win32/KanKan ? Chinese drama
- [Trend]Improving Hadoop Security with Host Intrusion Detection (Part 2)
- [Sophos]Facebook mulls silently tracking users' cursor movements to see which ads we like best
- [SecListe]?Nigerian? letters - now with a Syrian twist
- [MMPC]New infection rate data for unprotected computers
- [Technet]Bing Smart Search on Windows 8.1 finds your needle in a haystack
- [ThreatPost]EU Petition Seeks to Restrict Export of ?Digital Arms?
- [ThreatPost]Smaller, Popular Open Source Software Packages Exposed in Sourceforge Review
- [Eset]The wrong cable guys: Card skimmers install bogus wires into cash registers in Nordstrom store
- [Trend]Halloween Freebies Lead to Ghastly Survey Scams
- [Sophos]How to protect your critical infrastructure
- [Sofpedia] Security Brief: badBIOS Malware, Political Attacks, Social Media Hacks
- [maredugof] Brèves 2013 S44
- [FireEye]Why Our Risk Assessment Calculations Leave us Exposed to APTs
- [SecList]Analysis: Spam in September 2013
- [MMPC]Infection rates and end of support for Windows XP
- [Technet]Windows 8.1 and the Windows Store are now ready: Here?s what developers need to know
- [ThreatPost]British Citizen Indicted for Attacking Government, Military Networks
- [ThreatPost]Researcher Finds Method to Insert Malicious Firmware Into Currency Validator
- [Eset]Five bad PC habits many of us STILL have ? and how to stop today
- [Trend]Improving Hadoop Security with Host Intrusion Detection (Part 1)
- [Sophos]Firefox moves up to Version 25, fixes a bunch of memory mismanagement problems
- [Malekal] [hack] Generation-nt.com touché par Darkleech
- [Sofpedia] Westpac Customers Warned of Fake “Unauthorized Login Attempt” Emails
- [Sofpedia] Three Government Websites from Syria Hacked and Defaced
- [Sofpedia] BadBIOS Malware: Reality or Hoax?
- [FireEye]Evasive Tactics: Terminator RAT
- [SecList]Blog: ?Nigerian? letters - now with a Syrian twist
- [MMPC]New Security Intelligence Report, new data, new perspectives
- [Technet]Visual Studio 2013 now available for download
- [ThreatPost]USA FREEDOM Act Would Curtail NSA Dragnet
- [ThreatPost]Facebook Android Flaws Enable Any App to Get User?s Access Tokens