- [Malekal] Malvertising adultmediatoys.com : Double Exploit Kit
- [Malekal] Malvertising adultmediatoys.com : Double Exploit Kit
- [Malekal] [BETA] malekal Blocage DNS
- [SecList]Blog: 29c3 Hamburg / DE
- [MCAFEE]Worm Lures Victims with Indian Celebrity Video Links
- [Technet]Daily Update, Jan. 7th ? Xbox NUads Makes Traditional TV Advertising More Engaging
- [ThreatPost]TURKTRUST Officials Say No Evidence of Malice in Certificate Incident
- [ThreatPost]Researchers Bypass Microsoft Fix It for IE Zero Day
- [Sophos]Man pretends to be woman on internet, recovers lost phone in double-quick time
- [SecListe]29c3 Hamburg / DE
- [SecList]Blog: TURKTRUST CA Problems
- [MCAFEE]Hacked Sites ? An Open Door To Malwares
- [Technet]Daily Update, Jan. 4th ? Microsoft and the U.S. Department of Defense Ink Comprehensive Technology Agreement
- [ThreatPost]Samsung Pushes Exynos Flaw Fix on Galaxy Phones
- [ThreatPost]TURKTRUST Incident Raises Renewed Questions About CA System
- [Sophos]Monday review - the hot 17 stories of the week
- [SecListe]TURKTRUST CA Problems
- [MCAFEE]Is it Wiper again? Not exactly !
- [MMPC]Fake apps: Behind the effective social strategy of fraudulent paid-archives
- [ThreatPost]TURKTRUST Officials Say No Evidence of Malice in Certificate Incident
- [ThreatPost]Researchers Bypass Microsoft Fix It for IE Zero Day
- [Eset]Imperva, VirusTotal, and whether AV is useful
- [Trend]Why is the Watering Hole Technique Effective?
- [Sophos]How a regular IT guy helped catch a botnet cybercriminal
- [Technet-Mark Russinovich's Blog] Hunting Down and Killing Ransomware
- [websense] Happy New Year and Unhappy New IE Zero-Day! (CVE-2012-4792)
- [websense] Our Take on Blitzkrieg
- [websense] Sharing the Experience of Deobfuscating a Trojan
- [fsecure] Fix it: Internet Explorer 8 Vulnerability
- [Malekal] Ransomware Surveys
- [MCAFEE]Trojan Locks Computers, Demands Ransom for Bogus ?Offense?
- [ThreatPost]Samsung Pushes Exynos Flaw Fix on Galaxy Phones
- [Sophos]Turkish Certificate Authority screwup leads to attempted Google impersonation
- [MCAFEE]Developer?s Root Exploit Opens Door to Some Samsung Phones
- [ThreatPost]TURKTRUST Incident Raises Renewed Questions About CA System
- [ThreatPost]Adobe to Patch Reader, Acrobat; Warns of ColdFusion Exploit
- [Sophos]Practical IT: are your firewalls in the wrong place?
- [MCAFEE]New Labs Report: ?Analyzing Project Blitzkrieg?
- [Technet]Weekend Reading: Jan. 4th Edition ? MSN?s Top Stories of 2012 & the Windy City Adopts Office 365
- [ThreatPost]IE Zero-Day Watering Hole Attack Expands to Handful of Political Sites
- [ThreatPost]Patch for IE Zero Day Won't Be Among Microsoft Security Updates Next Week
- [Sophos]Facebook won't donate money for boy's life-saving surgery after he saved his sister from rapist. Because it's a hoax
- [MCAFEE]Narilam Trojan Targets Iranian Financial Software
- [Technet]Daily Update, Jan. 3rd ? Building a State-of-the-Art Speller for Bing
- [ThreatPost]Study: 94 Percent of Healthcare Organizations Breached
- [ThreatPost]Fraudulent Certificate for Google Domains Found After Mistake by Turkish CA
- [Trend]Holiday Season Unwraps Phishing, Blackhole Exploit Attacks
- [Sophos]Report: 94% of US hospitals suffered data breaches, and 45% had quintuplets
- [MCAFEE]Operation High Roller Campaign Attempts to Steal ?61,000 From German Banks
- [Technet]The Windy City Teams with Microsoft on Cloud Strategy