- [Trend]The Siesta Campaign: A New Targeted Attack Awakens
- [Sophos]Monday review - the hot 20 stories of the week
- [SecListe]The Future of Bitcoin After the Mt. Gox Incident
- [SecListe]Mystery shopper: Beware of Frauds
- [Sophos]Man guilty of ?fixing? women?s computers to spy on them via webcam
- [SecListe]Tor hidden services - a safe haven for cybercriminals
- [ThreatPost]Goto Aside, GnuTLS and Apple Bugs Are Not The Same
- [ThreatPost]Microsoft EMET Bypasses Realm of White Hats?For Now
- [Eset]Two-thirds of couples ?share passwords to online accounts?, Pew research finds
- [Trend]Phone Phishing, Data Breaches, and Banking Scams
- [Sophos]Man guilty of "fixing" women's computers to spy on them via webcam
- [SecListe]A ?gift? for Apple?s valued customers
- [FireEye]Live from RSA USA 2014: Talking Security with Martin Brown, Chief Security Portfolio Architect at BT Security Enterprise
- [SecList]Analysis: Spam report: January 2014
- [Technet]Computing royalty pays tribute to Butler Lampson
- [ThreatPost]300,000 Compromised Routers Redirecting Traffic to Attacker Sites
- [ThreatPost]Schneider Electric Mitigates Vulnerabilities in OPC Factory Server and Floating License Manager Products
- [Eset]Worldwide cost of identity theft could be $5 billion per year, Microsoft survey finds
- [Sophos]Popular platforms, such as Facebook and Instagram, aiding illegal gun sales
- [SecListe]CODE BLUE in Tokyo
- [SecList]Blog: The ?Nigerian? vow: our promises - your money
- [MMPC]Malicious Proxy Auto-Config redirection
- [Technet]Weekend Reading: Feb. 14th Edition?Make Valentine?s Day memorable with Bing, Windows 8.1, the Windows Store and the Windows Phone Store
- [ThreatPost]Apple Updates iOS Security Paper with iCloud, Appsec Insights
- [ThreatPost]Four Vulnerabilities Found in Oracle Demantra
- [Eset]Microsoft boosts security for Office 365 users with two-factor logins
- [Trend]The Mobile Cybercriminal Underground Market in China
- [Sophos]SSCC 136.5 - RSA 2014 Conference Special: the good, the weird and the interesting! [PODCAST]
- [SecList]Blog: Are you sure you want to unsubscribe from our mailings?
- [Technet]Xbox One leads US software game sales in January, nearly 740 million hours of fun since launch
- [ThreatPost]Government Requesting Minimal Data From CloudFlare
- [ThreatPost]Fixing Trust Through Certificate Transparency
- [Eset]Phishy business: Surge in tax scams as emails rise by nearly 50% in one year
- [Sophos]SSCC 136 - Apple's "goto fail", Neiman Marcus's logfiles, and Adobe's double update [PODCAST]
- [SecList]Blog: The first Tor Trojan for Android
- [Technet]Microsoft aviation technology flies high at the Singapore Airshow
- [ThreatPost]Are Automated Update Services the Next Surveillance Frontier?
- [ThreatPost]Lavabit Case May Be One of Many in Coming Years
- [Eset]American law firm admits entire server of legal files fell victim to Cryptolocker
- [Trend]Sunsets and Cats Can Be Hazardous to Your Online Bank Account
- [Sophos]US woman wins $500K in revenge-porn suit against ex-boyfriend
- [stopmalvertising] Analysis of a Triple Click Fraud Threat
- [SecList]Analysis: Mobile Malware Evolution: 2013
- [Technet]Power BI for Office 365 empowers everyone to analyze, visualize and share data in the cloud
- [ThreatPost]Podcast: RSA Wrap-Up ? Day 2
- [ThreatPost]RSA Conference Mobile Application Marred by Security Vulnerabilities
- [Eset]Facebook?s ?A Look Back? video used as bait for malware, report claims
- [Trend]ZeuS Downloader Runs in January, Crashes Rest of the Year
- [Sophos]Notorious "Gameover" malware gets itself a kernel-mode rootkit...
- [SecListe]The Future of Bitcoin After the Mt. Gox Incident