Ransomware doesn’t sell itself: Marketing malware on the darknet
https://blog.avast.com/ransomware-doesnt-sell-itself-marketing-malware-on-the-darknet

Exclusive: Probe of leaked U.S. NSA hacking tools examines operative’s ‘mistake’
http://www.reuters.com/article/us-cyber-nsa-tools-idUSKCN11S2MF

iOS 10: Security Weakness Discovered, Backup Passwords Much Easier to Break
http://blog.elcomsoft.com/2016/09/ios-10-security-weakness-discovered-backup-passwords-much-easier-to-break/

The banker that can steal anything
https://securelist.com/blog/mobile/76101/the-banker-that-can-steal-anything/

InfoArmor: Yahoo Data Breach Investigation
https://www.infoarmor.com/infoarmor-yahoo-data-breach-investigation/

The coming storm that is IoT:
Source Code for IoT Botnet ‘Mirai’ Released
https://krebsonsecurity.com/2016/10/source-code-for-iot-botnet-mirai-released/

Apple Logs Your iMessage Contacts — and May Share Them With Police
https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/

Exclusive: Yahoo secretly scanned customer emails for U.S. intelligence - sources
http://www.reuters.com/article/us-yahoo-nsa-exclusive-idUSKCN1241YT

I’m glad that someone looked at all the Spam I received at my yahoo junk-mail account. :slight_smile:
If you don’t use your account, delete it: https://login.yahoo.com/?.done=https%3A%2F%2Fedit.yahoo.com%2Fconfig%2Fdelete_user%3F.scrumb%3D0
If you actually use your Yahoo account, transfer to one of the others and then delete your account.

DressCode and its Potential Impact for Enterprises
http://blog.trendmicro.com/trendlabs-security-intelligence/dresscode-potential-impact-enterprises/

Cerber Ransomware switches to a Random Extension and Ends Database Processes
http://www.bleepingcomputer.com/news/security/cerber-ransomware-switches-to-a-random-extension-and-ends-database-processes/

Hacked Steam accounts spreading Remote Access Trojan
http://www.bleepingcomputer.com/news/security/hacked-steam-accounts-spreading-remote-access-trojan/

Free OS X Security Tools
https://objective-see.com/products.html

Future-proofing the Connected World: 13 Steps to Developing Secure IoT Products
https://downloads.cloudsecurityalliance.org/assets/research/internet-of-things/future-proofing-the-connected-world.pdf

Vladimir Putin embedded in uTorrent binary
https://blog.avast.com/vladimir-putin-embedded-in-utorrent-binary

The DXXD Ransomware displays Legal Notice before Users Login
http://www.bleepingcomputer.com/news/security/the-dxxd-ransomware-displays-legal-notice-before-users-login/

Zero-Day Alert: Email Security Platform (Dell SonicWALL)
https://www.digitaldefense.com/blog-zero-day-vulnerabilities-email-platform/

FTC Charges Tech Support Companies With Using Deceptive Pop-Up Ads to Scare Consumers Into Purchasing Unneeded Services
https://www.ftc.gov/news-events/press-releases/2016/10/ftc-charges-tech-support-companies-using-deceptive-pop-ads-scare

A kilobit hidden SNFS discrete logarithm computation
http://eprint.iacr.org/2016/961
http://eprint.iacr.org/2016/961.pdf

Modern Business Solutions Stumbles Over A Modern Business Problem – 58M Records Dumped From An Unsecured Database
https://www.riskbasedsecurity.com/2016/10/modern-business-solutions-stumbles-over-a-modern-business-problem-58m-records-dumped-from-an-unsecured-database/