- [Sophos]Google's Android security chief: Don't bother with anti-virus. Is he serious?
- [SecListe]Miniduke is back: Nemesis Gemina and the Botgen Studio
- [SecList]Spam in May 2014
- [Technet]Microsoft Office 365 coming to 14,000 Houston students, 1,200 teachers
- [ThreatPost]Buffer Overflow Vulnerabilities in Yokogawa ICS Gear Patched
- [ThreatPost]DHS Releases Hundreds of Documents on Wrong Aurora Project
- [Eset]AT&T reveals social security data leak, offers free credit monitoring
- [Trend]Isolated Heap for Internet Explorer Helps Mitigate UAF Exploits
- [Sophos]Police dog catches paedophiles by sniffing out their hidden hard drives
- [SecListe]Microsoft seizes 22 NO-IP domains, disrupts cybercriminal and nation state APT malware operations
- [FireEye]BrutPOS From a Security Practioner?s Perspective
- [FireEye]BrutPOS: RDP Bruteforcing Botnet Targeting POS Systems
- [SecList]RECON 2014
- [Technet]Microsoft helps FBI in GameOver Zeus botnet cleanup
- [ThreatPost]Facebook Carries Out Lecpetex Botnet Takedown
- [ThreatPost]DNI, Justice Department Deny Targeting Americans for Surveillance Based on Religion, Politics
- [Eset]Domino?s Pizza refuses to pay ransom after customer database hacked
- [Trend]Understanding the Internet of Everything
- [Sophos]Police dog catches paedophiles by sniffing out their hidden hard drives
- [SecListe]Use the force Luuuk
- [FireEye]Operation Tovar: The Latest Attempt to Eliminate Key Botnets
- [FireEye]Announcing the FLARE Team and The FLARE On Challenge
- [SecList]HackingTeam 2.0: The Story Goes Mobile
- [Technet]Microsoft hires Preston McAfee as chief economist
- [ThreatPost]New Verizon Transparency Report Shows Large Government Appetite for Location, Content Data
- [ThreatPost]Adobe Patches Flash Vulnerability Exploited by Rosetta Flash Tool
- [Eset]Cyber Boot Camp and tomorrow?s cyber security professionals
- [Trend]Endpoint Security: Evolving With The Threats They Mitigate
- [Sophos]Remember macro viruses? Infected Word and Excel files? They?re back?
- [SecListe]The Rise of Cybercrime in Dubai and UAE
- [FireEye]Economics of Security Part II: Qualifying the Economic Return From Cybersecurity Solutions
- [FireEye]Economics of Security Part I: Translating Information Security Risks to Business Risk
- [SecList]Adware or money loss instead of your favorite World Cup game
- [MMPC]Microsoft Digital Crimes Unit disrupts Jenxcus and Bladabindi malware families
- [Technet]The power of ?and?
- [ThreatPost]China Hackers Compromise Iraq Experts at National Security Think Tanks
- [ThreatPost]Phishers Use Luis Suarez Bite as Bait
- [Eset]Don?t let social media undermine the promise of graduation
- [Trend]New Banking Malware Uses Network Sniffing for Data Theft
- [Sophos]Monday review - the hot 22 stories of the week
- [SecListe]Attacks before system startup
- [FireEye]The Service You Can?t Refuse: A Secluded HijackRAT
- [FireEye]Key Themes From the 2014 Gartner Security Summit
- [SecList]Blog: Adware or money loss instead of your favorite World Cup game
- [Technet]Weekend Reading: May 30th Edition?Skype Translator introduced at inaugural Code Conference, Microsoft and salesforce.com announce strategic partnership
- [ThreatPost]Critical Vulnerability in WordPress Plugin Could Allow Site Takeover
- [ThreatPost]Microsoft Says ?Technical Error? Led to Legitimate No-IP Customers Losing Service
- [Eset]?Major? Smart TV vulnerability could allow mass wireless attacks
- [Trend]ZBOT-UPATRE Far From Game Over, Uses Random Headers
- [Sophos]EFF sues NSA over hoarding of zero days