- [ThreatPost]Syria Drops Offline, Comes Back the Next Day
- [ThreatPost]Old IE Attack Finds its Way into Cool Exploit Kit
- [Eset]China is behind ?numerous? attacks on U.S. computer systems, says Pentagon
- [Trend]Homemade Browser Targeting ?Banco do Brasil? Users
- [Sophos]Pentagon OKs Androids, BlackBerrys for soldiers
- [Technet]Foursquare, YouTube apps get major updates for Windows Phone 8
- [ThreatPost]Pentagon Decision Moves Android Security Forward
- [ThreatPost]Hacked DNS Servers Used in Linux/Cdorked Malware Campaign
- [Eset]Support Scam Cold-Calling: the Next Generation
- [Trend]Long Live Endpoint Protection!
- [Sophos]Indian Navy gets ready to dismiss officers for posting ship movements on Facebook
- [ThreatPost]Researchers Hack Google Office?s Building Management System
- [ThreatPost]Finger-Pointing on Cyberespionage Does Little Good Without Plan
- [Eset]ESET Smart Security wins Product of the Year from Poland?s CHIP magazine
- [Trend]AutoIt Used To Spread Malware and Toolsets
- [Sophos]IBM takes a big new step in cryptography: practical homomorphic encryption
- [fsecure] Facebook is Testing Tags For "What"
- [fsecure] Online Activities Related to Elections in Malaysia
- [Krebs] DHS: ‘OpUSA’ May Be More Bark Than Bite
- [Malekal] SpamHaus ransomware
- [Malekal] Redkit ExploitKit par campagne de Spam sur la tragédie de Boston
- [Krebs] Alleged SpyEye Seller ‘Bx1′ Extradited to U.S.
- [Krebs] Zero-Day Exploit Published for IE8
- [BitDefender] Fausses sextapes et arnaques diverses : le top 10 des scams sur Facebook
- [BitDefender] Bitdefender annonce GravityZone, sa nouvelle solution de protection unifiée des appare
- [Malekal] [en] Malvertising on tube8.com leads to Trojan.Zbot
- [SecList]Blog: CeCOS VII
- [Technet]New blog ?The Fire Hose? gives inside look at latest Microsoft news
- [ThreatPost]D.C. Media Sites Hacked, Serving Fake AV
- [Eset]Fake Justin Bieber ?I?m gay? Tweet marks latest attack on media Twitter accounts
- [Trend]Compromised US Government Webpage Used Zero-Day Exploit
- [Sophos]Lifting the lid on the Redkit exploit kit (Part 1)
- [MCAFEE]Emerging ?Stack Pivoting? Exploits Bypass Common Security
- [MMPC]Meet the new paid-archive malware families
- [Technet]Tami Reller talks Windows 8 sales, apps and the future of the PC
- [ThreatPost]Finger-Pointing on Cyberespionage Does Little Good Without Plan
- [ThreatPost]AutoIt Increasingly Employed by Malware Developers
- [Eset]Linux Apache malware: Why it matters to you and your business
- [Trend]How Mobile Malware Uses The Web
- [Sophos]Apple ships jolly uninteresting iOS 6.1.4 update
- [Technet]Hulu Plus for Windows Phone 8 hits the Windows Phone Store
- [ThreatPost]Samsung?s Secure Version of Android Gets DoD Blessing
- [ThreatPost]Java Bugs, New and Old, Affecting IBM SDK
- [Eset]New ?Trusted Contacts? feature will let hacked Facebook users back in
- [Trend]Fake Iron Man 3 Streaming Sites Sprout on Social Media
- [Sophos]Revenge-porn website victim files suit against ex and four porn sites
- [MCAFEE]Tracking PDF Usage Poses a Security Problem
- [MMPC]Windows 8 and Keygens
- [Technet]Microsoft, brands envision the future of online advertising at Creative Week
- [ThreatPost]IE 8 Zero Day Found as DoL Watering Hole Attack Spreads to Nine Other Sites