- [ThreatPost]New Attack Leverages Mobile Ad Network to Deliver Android Malware
- [ThreatPost]Inside the Decision to Shut Down Silent Mail
- [Eset]?Black hat? hacker claims to earn $20,000 per hour ? but Reddit doubts it
- [Trend]Master Key Android Vulnerability Used to Trojanize Banking App
- [Sophos]Will insurance firms be the big winners in the struggle for cyber security?
- [SecList]Blog: Visit from an old friend: Counter.php
- [MMPC]The evolution of Rovnix: Private TCP/IP stacks
- [Technet]Bing on Windows Phone 8 gets new look, features
- [ThreatPost]BYOD Gives Vulnerable Devices Corporate Network Access
- [ThreatPost]Threatpost News Wrap, August 9, 2013
- [Eset]Google Chrome in privacy row over plain-text passwords
- [Trend]From Fame to Shame: Busting the ?Free Followers? Myth in Social Media
- [Sophos]Will insurance firms be the big winners in the struggle for cyber security?
- [SecListe]Visit from an old friend: Counter.php
- [SecList]Blog: Securing your Email space
- [Technet]Security enhancements in Windows 8.1 help keep your data secure
- [ThreatPost]Critical IE, Exchange Updates on Tap in August Patch Tuesday Release
- [ThreatPost]Inexpensive Cellular IDS Allows for Inspection of Cell Traffic
- [Eset]Crytek is latest gaming company to face security breach
- [Trend]The Current State of the Blackhole Exploit Kit
- [Sophos]Secure webmail service Lavabit suspends operation, citing legal issues
- [SecListe]Securing your Email space
- [SecList]Analysis: The curious case of a CVE-2012-0158 exploit
- [Technet]Weekend Reading: Aug. 1st Edition?New enterprise preview allows businesses to take Windows 8.1 out for a test drive
- [ThreatPost]Remotely Exploitable Bug Affects Wide Range of Cisco TelePresence Systems
- [ThreatPost]Convenient Google WebLogin Tokens Can Expose User Accounts, Data
- [Eset]Stop using Windows, Tor Project advises users after malware outbreak
- [Trend]Andromeda Botnet Gets an Update
- [Sophos]Chrome, Firefox display plain-text passwords with a few clicks
- [SecListe]Campus Party, the biggest Technology Camp in the world!
- [MCAFEE]Android App Contains Windows Worm
- [Technet]Microsoft?s new programs attract ?bounty hunters? who help make safer products
- [ThreatPost]New Twitter Login Verification System Avoids SMS Codes
- [ThreatPost]Fort Disco Brute-Force Attack Campaign Targets CMS Websites
- [Eset]Bulletproof Inbox: Tips for staying safe (and sane) on email
- [Trend]Trend Micro Solutions for PE_EXPIRO
- [Sophos]Ok, who uses their pet's name as their password?
- [SecList]Blog: Campus Party, the biggest Technology Camp in the world!
- [Technet]New enterprise preview lets companies kick the tires on Windows 8.1
- [ThreatPost]Black Hat Aftermath: A Broken, Battered Internet
- [ThreatPost]Jeff Forristal on the Android Master-Key Vulnerability
- [Eset]Revealed: How a ?malicious charger? infects iPhone with spyware in under a minute
- [Trend]Header Spoofing Hides Malware Communication
- [Sophos]Freedom Hosting arrest and takedown linked to Tor privacy compromise
- [SecList]Analysis: Spam in Q2 2013
- [Technet]?On the Whiteboard? shows how making 3D objects is as easy as printing a Word doc
- [ThreatPost]Jason Geffner on Tortilla
- [ThreatPost]JavaScript and Timing Attacks Used to Steal Browser Data
- [Eset]New ransomware uses webcam and Homeland Security threat to scare victims
- [Trend]The Birth of the Royal Baby Blackhole Exploit Kit Run