- [ThreatPost]Researcher Finds Method to Insert Malicious Firmware Into Currency Validator
- [Eset]Five bad PC habits many of us STILL have ? and how to stop today
- [Trend]Improving Hadoop Security with Host Intrusion Detection (Part 1)
- [Sophos]Firefox moves up to Version 25, fixes a bunch of memory mismanagement problems
- [Malekal] [hack] Generation-nt.com touché par Darkleech
- [Sofpedia] Westpac Customers Warned of Fake “Unauthorized Login Attempt” Emails
- [Sofpedia] Three Government Websites from Syria Hacked and Defaced
- [Sofpedia] BadBIOS Malware: Reality or Hoax?
- [FireEye]Evasive Tactics: Terminator RAT
- [SecList]Blog: ?Nigerian? letters - now with a Syrian twist
- [MMPC]New Security Intelligence Report, new data, new perspectives
- [Technet]Visual Studio 2013 now available for download
- [ThreatPost]USA FREEDOM Act Would Curtail NSA Dragnet
- [ThreatPost]Facebook Android Flaws Enable Any App to Get User?s Access Tokens
- [Eset]Grim warning for bounty hunters ? Yahoo pays out paltry $12.50 per vulnerability
- [Trend]Gatekeeper on Mac OS X 10.9 Mavericks
- [Sophos]Monday review - the hot 26 stories of the week
- [SecList]Blog: Information Security Workshop in Echigo-Yuzawa 2013 (Japan)
- [MMPC]Our protection metrics - September results
- [Technet]Join Microsoft in the 'Hour of Code' campaign
- [ThreatPost]LinkedIn Defends Intro Security as Researcher Goes Phishing
- [ThreatPost]Scan Shows 65% of ReadyNAS Boxes on Web Vulnerable to Critical Bug
- [Eset]Getting warmer? New Hotspot 2.0 ?could offer safer public Wi-Fi?
- [Trend]AIS Security: Your Questions Answered
- [Sophos]WordPress 3.7 with automatic security updating is out now
- [SecListe]Information Security Workshop in Echigo-Yuzawa 2013 (Japan)
- Analysis of the PHP.net Compromise
- [SecList]Blog: Cryptolocker Wants Your Money!
- [Technet]Microsoft announces Windows Phone 8 Update 3 and new Windows Phone Developer Preview
- [ThreatPost]One TrueCrypt Audit Grows, Another Gives Encryption Tool an Initial OK
- [ThreatPost]Some Netgear Routers Open to Remote Authentication Bypass, Command Injection
- [Eset]?One click, then boom?: Spear-phishing could ?black out? energy companies, expert warns
- [Trend]Securing the Network Infrastructure: An Important Step in the Fight Against Targeted Attacks
- [Sophos]Is your smartphone broadcasting your movements when you shop?
- [SecListe]Cryptolocker Wants Your Money!
- [Technet]Weekend Reading: October 11th Edition?Exclusive interviews with the folks behind big Xbox titles
- [ThreatPost]Cisco Fixes DoS, Remote Code Execution Bugs in Six Products
- [ThreatPost]LinkedIn Intro App Equivalent to Man in the Middle Attack, Experts Say
- [Eset]Fake Grand Theft Auto V tempts thousands of PC users to download ?malware?
- [Trend]CryptoLocker: Its Spam and ZeuS/ZBOT Connection
- [Sophos]Wikipedia sockpuppet saga threatens users? trust of the service
- [Technet]Mirror, mirror on the wall (at the Seattle Art Museum)
- [ThreatPost]OS X Mavericks Includes Flash Player Sandbox for Safari
- [ThreatPost]EFF: Congress Has Opportunity to Stop Mass Surveillance
- [Eset]Is this how Indonesia topped the malicious traffic charts?
- [Trend]Blackhole Arrests ? How Has The Underground Reacted?
- [Sophos]Apple?s iCloud iConundrum ? does convenience mean insecurity?
- [maredugof] Brèves 2013 S43
- [SecList]Blog: Information Security Workshop in Echigo-Yuzawa 2013 (Japan)
- [MMPC]Redirect hides browser extension