- [ThreatPost]AutoIt Increasingly Employed by Malware Developers
- [Eset]Linux Apache malware: Why it matters to you and your business
- [Trend]How Mobile Malware Uses The Web
- [Sophos]Apple ships jolly uninteresting iOS 6.1.4 update
- [Technet]Hulu Plus for Windows Phone 8 hits the Windows Phone Store
- [ThreatPost]Samsung?s Secure Version of Android Gets DoD Blessing
- [ThreatPost]Java Bugs, New and Old, Affecting IBM SDK
- [Eset]New ?Trusted Contacts? feature will let hacked Facebook users back in
- [Trend]Fake Iron Man 3 Streaming Sites Sprout on Social Media
- [Sophos]Revenge-porn website victim files suit against ex and four porn sites
- [MCAFEE]Tracking PDF Usage Poses a Security Problem
- [MMPC]Windows 8 and Keygens
- [Technet]Microsoft, brands envision the future of online advertising at Creative Week
- [ThreatPost]IE 8 Zero Day Found as DoL Watering Hole Attack Spreads to Nine Other Sites
- [ThreatPost]Alleged SpyEye Developer Extradited to U.S.
- [Eset]Parents need to teach pre-school children to use the internet safely
- [Trend]Backdoor Leads to Facebook and Multi-Protocol Instant Messaging Worm
- [Sophos]Network gaming company uses its "cheat-prevention" client to build a Bitcoin botnet
- [Technet]Weekend Reading: May 3rd Edition?Outlook.com hits 400M active accounts, adds new features
- [ThreatPost]ICS-CERT Revises Recommendations to Avoid Shamoon Infections
- [ThreatPost]Two-Factor Authentication No Cure-All for Twitter Security Woes
- [Eset]The stealthiness of Linux/Cdorked: a clarification
- [Trend]The State of Cybersecurity in Latin America
- [Sophos]US Department of Labor website hacked, serves malware, now fixed
- [ThreatPost]Adobe to Patch Reader Information Leak Bug
- [ThreatPost]Reputation.com Notifies Customers of Network Attack
- [Eset]More than 90% of passwords are vulnerable to hacks, warns Deloitte ? even ?strong? ones
- [Trend]Fake Iron Man 3 Streaming Sites Sprout on Social Media
- [Sophos]Reputation.com resets all user passwords following breach
- [MMPC]New whitepaper: Evaluating Microsoft's protection performance and capabilities
- [Technet]Weekend Reading: April 26th Edition?The #XboxReveal countdown begins!
- [ThreatPost]Nearly Nine in Ten Websites Contain One Serious Vulnerability
- [ThreatPost]Watering Hole Attack Claims US Department of Labor Website
- [Eset]PC game service admits to serving up Bitcoin-mining malware
- [Trend]Gaming Network Plants Bitcoin Miner On User Systems
- [Sophos]German ministry replaced brand new PCs infected with Conficker worm, rather than disinfect them
- [MMPC]The rise in the exploitation of old PDF vulnerabilities
- [ThreatPost]Internet Companies Get Passing Grades on Privacy Advocacy and Transparency
- [ThreatPost]Mozilla Fights Back After FinSpy Found Masquerading as Firefox
- [Eset]Mysterious Avatar rootkit with API, SDK, and Yahoo Groups for C&C communication
- [Trend]Backdoor Leads to Facebook and Multi-Protocol Instant Messaging Worm
- [Sophos]CERN Geneva celebrates 20 years of the World Wide Web
- [ThreatPost]More Malware Showing Up on Fake SourceForge Web Sites
- [ThreatPost]Ramnit Variant Targets UK Banks with OTP Attack
- [Eset]Wireless carriers put customers at risk by failing to patch Android, says civil liberties group
- [Trend]Hackers To Manage Your Apple ID, If Caught From Phishing Bait
- [Sophos]"Wire transfer canceled"? Watch out for spammed-out malware attack
- [ThreatPost]Google Glass Cracked
- [ThreatPost]20 Years On, the Open Web Faces Challenges
- [Eset]Twitter blames spear-phishing for recent hacks ? and warns news companies to expect more