- [Eset]From BYOD to CYOD: Security issues with personal devices in the workplace
- [Trend]Business Models Behind Information Theft
- [Sophos]Botnet master abuses Facebook for pocket money, researchers reveal
- [ThreatPost]Apple Breached by Facebook Hackers Using Java Exploit
- [ThreatPost]Researchers Uncover Polymorphic AutoRun Worm
- [Eset]You can?t wire love (and other Valentine?s Day online romance scams)
- [Trend]Zombies are Funny? Until Someone Loses an Eye
- [Sophos]Burger King dethroned in Presidents Day Twitter hack
- [SecList]Analysis: Honey traps on the Internet
- [Technet]Daily Update, Feb. 18th ? Online Comic Book From ?Walking Dead? Creator Showcases Power of IE10
- [ThreatPost]Google Says Gmail Security Measures Have Reduced Account Hijacks By 99 Percent
- [ThreatPost]BlackBerry Vulnerability Could Allow Access to Enterprise Server
- [Eset]Malware evolving to defeat anti-DDoS services like CloudFlare?
- [Trend]Understanding Targeted Attacks: What Are We Really Up Against?
- [Sophos]BlackBerry warns of TIFF vulnerability that could allow malware to run on enterprise servers
- [SecList]Blog: Cyber Attacks Against Uyghur Mac OS X Users Intensify
- [MCAFEE]Polymorphic AutoRun Worm Evolves and Obfuscates
- [Technet]Weekend Reading: Feb. 15th Edition ? Windows 8 Ads In Apps, Big Data Week Wrap-Up & Cool Windows Phone 8 Tips
- [ThreatPost]
- [ThreatPost]Facebook Says Employee Laptops Compromised in 'Sophisticated' Attack
- [Eset]Free AV and relying on the luck of the Irish
- [Trend]Same Old Brand New Malware Tricks
- [Sophos]US soldiers and spies to get handheld biometric scanners
- [SecListe]Cyber Attacks Against Uyghur Mac OS X Users Intensify
- [SecList]Blog: February 2013 Microsoft Security Bulletins - Volume is High but a Handful are Critical
- [Technet]Everything?s Bigger in Texas: State Adopts Office 365 as Part of a State-Wide IT Modernization Strategy for More Than 100,000 Employees
- [ThreatPost]Research Outlines New Deep Freeze Data Recovery Technique on Android Phone
- [ThreatPost]New iOS 6.1 Flaw Allows Access to iPhone's Contacts, Photos
- [Eset]It?s a wonderful hoax
- [Trend]Zero-Day Vulnerability Hits Adobe Reader
- [Sophos]Was Alicia Keys hacked, or is she cheating on BlackBerry with iPhone this Valentine?s Day?
- [Viruslist] Mascarade brésilienne
- [SecList]Blog: Adobe Flash Player 0-day and HackingTeam's Remote Control System
- [Technet]Xbox 360 Keeps Top Console Spot for 25th Straight Month
- [ThreatPost]Researchers See Spike in Attacks Against Uyghur Users
- [ThreatPost]Europol Takes Down Ransomware Gang in Spain, UAE
- [Eset]Report: Growing use of BYOD in American healthcare a consumer worry
- [Trend]Same Old Brand New Malware Tricks
- [Sophos]Reveton ransomware gang arrested by Spanish police
- [SecList]Blog: Brazilian Masquerade
- [Technet]Daily Update, Feb. 14th ? Falling In Love With Big Data
- [ThreatPost]Cryptographers Aim to Find New Password Hashing Algorithm
- [ThreatPost]Could Smart-Watches Replace Passwords as Authenticators?
- [Eset]ComboFix fixed: popular utility safe to use
- [Trend]Love Bugs: How Are Valentine Threats Looking Up?
- [Sophos]Anatomy of a targeted attack - SophosLabs explores an Adobe zero-day "malware experiment"
- [SecList]Blog: New crimeware attacks LatAm bank users
- [MCAFEE]Analyzing the First ROP-Only, Sandbox-Escaping PDF Exploit
- [Technet]Microsoft Brings Big Data Experts Together in Silicon Valley
- [ThreatPost]New iOS 6.1 Flaw Allows Access to iPhone's Contacts, Photos