- [ThreatPost]Anup Ghosh on Cyberespionage, Attribution and APTs
- [Trend]From Alarming to Familiar: Different Social Engineering Techniques
- [Sophos]Microsoft admits it was also hit by hackers, malware infects their Mac business unit
- [Technet]Bamital Botnet Takedown Is Successful; Cleanup Underway
- [ThreatPost]Another iPhone Passcode Bypass Vulnerability Discovered
- [ThreatPost]HTC Settlement Could Alter Mobile Security and Privacy Landscape
- [Sophos]Tumblr, Twitter and Pinterest users warned after Zendesk support site hack
- [Technet]Microsoft Research Predicts This Year?s Oscar Winners
- [ThreatPost]HTC Settlement Could Alter Mobile Security and Privacy Landscape
- [ThreatPost]Microsoft Azure Cloud Storage Suffers Major Outage Over Expired SSL Certificate
- [Eset]NBC.com infected with malware for more than 24 hours?
- [Trend]Mitigating Targeted Attacks Requires an Integrated Solution
- [Sophos]Donald Trump has his Twitter hacked by "lowlives"
- [Technet]Weekend Reading: Excel Goes Hollywood With the Oscars Predictor App & Windows Phone Indie Games Roundup
- [ThreatPost]Chrome 25 Fixes Nine High-Risk Vulnerabilities
- [ThreatPost]Zendesk Compromised, Twitter, Tumblr and Pinterest Users Affected
- [Sophos]Oxford University blocks Google Docs because of phishing attacks.. for 2.5 hours
- [thehackernews]critical vulnerability in Facebook's OAuth system
- [Technet]Microsoft Research Predicts This Year?s Oscar Winners
- [ThreatPost]NBC Website Hacked, Leading Visitors to Citadel Banking Malware
- [ThreatPost]Spear Phishing Campaigns Use Fake Mandiant APT1 Report as Lure
- [Sophos]Google says it is winning the war against Gmail account hijackers
- [Technet]Female Computer Scientist Students Hack to Combat Human Trafficking
- [ThreatPost]Markey: GRID Act Passage Long Overdue
- [ThreatPost]Avoid The Attack Attribution Distraction
- [Trend]When Phishing Goes Mobile
- [Sophos]That was quick! Adobe's emergency patch for Reader and Acrobat is here...
- [SecList]Analysis: Application Control: the key to a secure network. Part 1
- [Technet]The Midweek Download: Feb. 20th Edition ? What?s New for ASP.NET, Web Tools 2012.2, Lync & More
- [ThreatPost]Study Shows One in Four Who Receive Data Breach Letter Become Fraud Victims
- [ThreatPost]PayPal Credentials For Sale, Access Offered Via Proxy Server
- [Eset]Code certificate laissez-faire leads to banking Trojans
- [Trend]Mitigating DNS Reflection Denial-of-Service Attacks
- [Sophos]How to filch explicit photos to fuel your revenge porn site
- [SecList]Analysis: Application Control: the key to a secure network - Part 2
- [Technet]Future of Communications: Rehumanizing the Experience from the Living Room to the Boardroom
- [ThreatPost]Adobe Patches Sandbox Escape Vulnerability in Reader and Acrobat
- [ThreatPost]iOS Developer Site at Core of Facebook, Apple Watering Hole Attack
- [Eset]Who goes there? Identity and multiple authentication factors
- [Trend]Why You Should Read the ISACA APT Study Before the Mandiant Report?
- [Sophos]Software update goes bad - International Space Station lost and then found
- [Dr.Web] Trojan.Winlock a fait rire les spécialistes
- [fsecure] Chinese Hackers
- [fsecure] Apple One of the "Other Companies" Hacked
- [fsecure] Timeline: Hacks Related to Apple
- [MalwareBytes] Malwarebytes and BSides San Francisco
- [MalwareBytes] Law Against Cookies
- [BitDefender] Big Brother 2.0 – Quand la réalité dépasse la fiction
- [BitDefender] Un faux plugin Google Chrome permet aux escrocs d’obtenir plus de « J’aime » sur Faceb
- [Silicon] Lookout renforce la confidentialité des smartphones Android