- [Technet]Collaboration and Social Alchemy on the High Seas
- [ThreatPost]'Six Strikes' System Flags P2P Piracy and Throttles Broadband Connections
- [ThreatPost]Researchers Bypass Google Two-Factor Authentication
- [Eset]Caphaw attacking major European banks using webinject plugin
- [Trend]Your Data and the Business of Online Scams
- [Sophos]Talking Angela iPhone app scare spreads on Facebook
- [Silicon] Microsoft se fait pirater… ses Mac !
- [Silicon] Box accélère sur la sécurité
- [Malekal] Urausy Like : System Failure Variante
- [Malekal] Tuto4PC bundle un widget Easyvoyage
- [Malekal] Poney Panel
- [Malekal] Malvertising/Hack (?) redirige vers du Redkit (TitanPoker ads)
- [Malekal] redir.ballysbs.com malvertising (fake 888poker.fr)
- [Malekal] Gimeno (Virus Sacem / Police Nationale) nouveau skin
- [BitDefender] Big Brother 2.0 – Quand la réalité dépasse la fiction
- [BitDefender] Un faux plugin Google Chrome permet aux escrocs d’obtenir plus de « J’aime » sur Faceb
- [BitDefender] Les applications de “lampes-torches” sur Android ne sont pas claires
- [BitDefender] Anonymous : Le pirate piraté
- [Eset]Code certificate laissez-faire leads to banking Trojans
- [Trend]Understanding Targeted Attacks: How Do We Defend Ourselves?
- [Sophos]Researchers claim to have found more zero-day vulnerabilities in Java
- [SecListe]Trust but verify: when CAs fall short
- [Technet]Your Future Is Calling: A Conversation With AT&T Exec Jeff Bradley
- [ThreatPost]Anup Ghosh on Cyberespionage, Attribution and APTs
- [ThreatPost]Another iPhone Passcode Bypass Vulnerability Discovered
- [Trend]The Security Risks of Compromised Digital Certificates
- [Sophos]Mandiant report, iOS coders owned, Twitter accounts hacked, and more... [PODCAST]
- [MCAFEE]Digging Into the Sandbox-Escape Technique of the Recent PDF Exploit
- [Technet]How Bridging A ?Digital Divide? Can Help Save Lives
- [ThreatPost]Two More Java Zero Days Found by Polish Research Team
- [ThreatPost]Anup Ghosh on Cyberespionage, Attribution and APTs
- [Trend]From Alarming to Familiar: Different Social Engineering Techniques
- [Sophos]Microsoft admits it was also hit by hackers, malware infects their Mac business unit
- [Technet]Bamital Botnet Takedown Is Successful; Cleanup Underway
- [ThreatPost]Another iPhone Passcode Bypass Vulnerability Discovered
- [ThreatPost]HTC Settlement Could Alter Mobile Security and Privacy Landscape
- [Sophos]Tumblr, Twitter and Pinterest users warned after Zendesk support site hack
- [Technet]Microsoft Research Predicts This Year?s Oscar Winners
- [ThreatPost]HTC Settlement Could Alter Mobile Security and Privacy Landscape
- [ThreatPost]Microsoft Azure Cloud Storage Suffers Major Outage Over Expired SSL Certificate
- [Eset]NBC.com infected with malware for more than 24 hours?
- [Trend]Mitigating Targeted Attacks Requires an Integrated Solution
- [Sophos]Donald Trump has his Twitter hacked by "lowlives"
- [Technet]Weekend Reading: Excel Goes Hollywood With the Oscars Predictor App & Windows Phone Indie Games Roundup
- [ThreatPost]Chrome 25 Fixes Nine High-Risk Vulnerabilities
- [ThreatPost]Zendesk Compromised, Twitter, Tumblr and Pinterest Users Affected
- [Sophos]Oxford University blocks Google Docs because of phishing attacks.. for 2.5 hours
- [thehackernews]critical vulnerability in Facebook's OAuth system
- [Technet]Microsoft Research Predicts This Year?s Oscar Winners
- [ThreatPost]NBC Website Hacked, Leading Visitors to Citadel Banking Malware