- [MMPC]Coordinated malware eradication
- [Technet]Weekend Reading: Jan. 10th Edition ? New Windows devices unveiled at CES 2014 and Xbox One sales hit 3M consoles sold
- [ThreatPost]US Government Delivers Cybersecurity Framework for Critical Infrastructure
- [ThreatPost]Dropbox Reports Fewer than 250 National Security Requests
- [Eset]Vietnamese malware : ?Single post? enough to trigger spyware attacks against U.S. bloggers, EFF claims
- [Trend]Defending Against Tor-Using Malware, Part 2
- [Sophos]SSCC 134 ? Patching, foisting, hacking and obfuscating [PODCAST]
- [SecListe]Abused update of GOM Player poses a threat
- [SecList]Analysis: Spam money lenders: data theft, Trojans and other special features of ?cheap? loans
- [Technet]Three things retailers need to do now to transform their businesses with technology
- [ThreatPost]Hacktivist Collective Takes Credit for Comcast Mail Server Hack
- [ThreatPost]Light Microsoft Patch Load Precedes MD5 Deprecation
- [Eset]Boaxxe adware: ?A good ad sells the product without drawing attention to itself? ? Pt 1
- [Trend]Scams Circulate After German Email Accounts Get Hacked
- [Sophos]SEA attempts to hack Facebook and other MarkMonitor domain customers
- [SecListe]A Glimpse Behind "The Mask"
- [SecList]Blog: Olympic Games: Made in China
- [Technet]Xbox One sales top 3 million
- [ThreatPost]Twitter Transparency Report Shows Increase in Government Requests
- [ThreatPost]Cost of Doing APT Business Dropping
- [Eset]Less than half of consumers take ANY steps to stay safe online, UK government survey finds
- [Trend]Does the Twitter Follower Scam Actually Work?
- [Sophos]Microsoft, Facebook, Google and Yahoo release NSA snooping stats
- [SecList]Blog: A cross-platform java-bot
- [Technet]Devices, services and moments
- [ThreatPost]Jeremiah Grossman on His New Role as CEO of WhiteHat Security
- [ThreatPost]Google Broadens Bounty Program to Include Chrome Extensions
- [Eset]Luxury store Neiman Marcus joins growing list of card theft targets
- [Trend]Eyeing SpyEye
- [Sophos]Misleading advertisements lead to hijacked browser settings
- [SecListe]World Cup: fake tickets, fake giveaways, real attacks
- [ThreatPost]PNG Image Metadata Leading to iFrame Injections
- [ThreatPost]Emergency Adobe Update Patches Flash Zero-Day
- [Eset]Target breach expands: what does this mean?
- [Trend]Defending Against Tor-Using Malware, Part 1
- [Sophos]Facebook?s 10 years of security & privacy thrills ?n spills
- [SecListe]Black Gold, or a Black Hole in Your Pocket
- [FireEye]Where have all the credit cards gone? The cybercrime underground and its ties to Eastern Europe
- [SecList]Blog: Worm Attack! Your mailbox is under threat
- [MMPC]Microsoft antimalware support for Windows XP
- [Technet]The NFL on Xbox One and Surface: Your own personal gridiron
- [ThreatPost]Facebook Releases to Open Source its Conceal Android Crypto Library
- [ThreatPost]Chrome Web Store Beset by Spammy Extensions
- [Eset]Target announces scale of credit-card leak was even bigger: 70 million victims or more
- [Trend]File Infectors and ZBOT Team Up, Again
- [Sophos]Facebook's 10 years of security & privacy thrills 'n spills
- [SecListe]Olympic Games: Made in China
- [SecList]Blog: Mandela?s millions
- [MMPC]Microsoft antimalware support for Windows XP
- [Technet]Celebrating bravery in 2013