- [SecList]Blog: The most sophisticated Android Trojan
- [Technet]Xbox Wire offers details on connectivity, licensing and privacy features for Xbox One
- [ThreatPost]BlackBerry Issues Z10, PlayBook Security Advisories
- [ThreatPost]CSP 1.0 Added to Firefox to Block XSS Attacks
- [Eset]Lock folders with fingerprint security in Windows 8.1 as biometrics becomes ?integral?
- [Trend]GAMARUE Uses SourceForge to Host Files
- [Sophos]PRISM - not as bad as you thought? (And don't call it PRISM!)
- [SecListe]The most sophisticated Android Trojan
- [MCAFEE]Koobface Count Correction
- [MMPC]Microsoft?s proactive fight against cybercrime
- [Technet]Microsoft works with financial services industry leaders, law enforcement and others to disrupt massive financial cybercrime ring
- [ThreatPost]NSA Whistleblower Article Redirects to Malware
- [ThreatPost]IRC Botnet Leveraging Unpatched Plesk Vulnerability
- [Eset]Silicon Valley ?needs to lead? battle against cyber attacks, says ex-Homeland Security chief
- [Trend]GAMARUE Uses Sourceforge to Host Files
- [Sophos]Botnet smackdown, Oracle on Java, Passwords you can eat - 60 Sec Security [VIDEO]
- [MCAFEE]Malicious Dating, Ad Services Plague Japanese Users
- [Technet]Windows 8.1 updates unveiled at COMPUTEX 2013
- [ThreatPost]Share and Share Alike? Not Quite
- [ThreatPost]DNI Clapper Says NSA Programs Fully Authorized and Necessary
- [Eset]Fake iPhone charger can hack iOS in under 60 seconds
- [Trend]Going Solo: Self-Propagating ZBOT Malware Spotted
- [Sophos]FBI and Microsoft in massive takedown of "Citadel" crimeware
- [MCAFEE]Fraudulent Adult Dating Services Turn 10 Years Old, Still Evolving
- [Technet]Devices lead the way as OEMs focus on opportunity with Windows
- [ThreatPost]Google Jacks Up Bug Bounties For Serious Vulnerabilities
- [ThreatPost]Five Bulletins, One Critical in Microsoft?s June Patch
- [Eset]Cybercriminals use photo-sharing to snare victims in auction scams, FBI warns
- [Trend]Plesk Zero-Day Exploit Results in Compromised Webserver
- [Sophos]Biostamps - freedom from password tyranny, or Hollywood science?
- [SecList]Blog: "NetTraveler is Running!" - Red Star APT Attacks Compromise High-Profile Victims
- [MCAFEE]Phishing Attack Replaces Android Banking Apps With Malware
- [Technet]Increased battery life, incredible integrated graphics: Intel launches 4th-generation Core processors
- [ThreatPost]Oracle Addresses Java?s Symptoms, But Doesn?t Cure Sickness
- [ThreatPost]China Calls Out U.S. for Hacking
- [Eset]Evernote and LinkedIn boost security with two-factor authentication
- [Trend]Backdoor Wipes MBR, Locks Screen
- [Sophos]Politicians in Iowa City reluctantly pass ban on drones, automatic traffic surveillance
- [SecListe]"NetTraveler is Running!" - Red Star APT Attacks Compromise High-Profile Victims
- [SecList]Blog: Security policies: portable applications
- [Technet]ASUS unveils new PCs at COMPUTEX 2013
- [ThreatPost]Schneider Patches 18-Month Old SCADA Bugs
- [ThreatPost]Apple Patches Mass of Security Bugs in OS X and Safari
- [Eset]Motorola predicts passwords could be replaced by arm tattoos and ?authentication pills?
- [Trend]Compromised Japanese Sites Lead to Malware
- [Sophos]Fake payment phishers busted in South Africa
- [SecListe]Security policies: portable applications
- [SecList]Blog: What are children doing online?
- [Technet]How to watch the June 10 Xbox media briefing and more from E3
- [ThreatPost]FIS Breach a Broader Network Hack