- [Sophos]Rock-and-roll Google celebrates analog computing - and Bob Moog
- [Malekal]Malvertising : les bons et mauvais points
- [ThreatPost]Cryptographers Unveil New Way to Trust Certificates
- [Sophos]Gorbachev is NOT dead - false news spreads on Twitter again
- [ThreatPost]Months After A Patch, Targeted Attacks Still Using Adobe Flash Bug
- [ThreatPost]Common Firewall Feature Enables TCP Hijacking Attacks
- [Sophos]Multiply multilingual - Email scams aren't just from Nigeria
- [ThreatPost]How to Break Google Chrome in Six Easy Steps
- [ThreatPost]Armenian Bredolab Creator Jailed For Computer Sabotage
- [ThreatPost]DHS Warns of Potential Scams and Attack in Run-up to London Olympics
- [ThreatPost]The Curious Case of Carl A. ?Someone
- [ThreatPost]Common Firewall Feature Enables TCP Hijacking Attacks
- [ThreatPost]The Curious Case of Carl A. ?Someone
- [ThreatPost]How to Break Google Chrome in Six Easy Steps
- [ThreatPost]DHS Warns of Potential Scams and Attack in Run-up to London Olympics
- [ThreatPost]DHS Warns of Potential Scams and Attack in Run-up to London Olympics
- [ThreatPost]Common Firewall Feature Enables TCP Hijacking Attacks
- [Eset]Infosecurity Magazine on AMTSO?s credibility gap
- [Sophos]Wales announces World's First Wikipedia Town
- [ThreatPost]Anatomy of a LulzSec Attack 'Singles Out' Web 2.0 Weakness
- [ThreatPost]Facebook Cancellation Malware Disguised As Adobe Update Making Rounds
- [ThreatPost]Iranian Students Claim to have Stolen Thousands of Researcher's Records
- [Sophos]Is it a Norton or an AOL phishing scam?
- [Sophos]SSCC 91 - Utah explains data breach, Facebook hacker jailed, FlashBack removal for Leopard, Pentagon expands data sharing
- [ThreatPost]Report: Diablo III Users Find Accounts Hacked, Gold Stolen And New 'Mystery' Friends
- [ThreatPost]Google to Notify Users of DNSChanger Infections Ahead of July 9 Deadline
- [Eset]Press One if by LAN, Two if by Sea?
- [Sophos]Facebook account cancellation malware poses as Adobe Flash update
- [Krebs]Adware Stages Comeback Via Browser Extensions
- [ThreatPost]The Curious Case of Carl A. ?Someone
- [ThreatPost]Tatanga Trojan Mixes MitB with Social Engineering
- [ThreatPost]Howard Schmidt Answered the Bell
- [ThreatPost]Defense Contractor Northrop Grumman Hiring For Offensive Cyber Ops
- [ThreatPost]Iranian Students Claim to have Stolen Thousands of Researcher's Records
- [Trend]Bogus Pinterest Pins Lead to Survey Scams
- [Sophos]Sophos anti-virus for Android updated - beta now works on tablets too!
- [Eset]AMTSO?s New Direction (and some resources updates)
- [Sophos]What can secure software development learn from Shakespeare, Roosevelt and Nehru?
- [ThreatPost]Report: Diablo III Users Find Accounts Hacked, Gold Stolen And New 'Mystery' Friends
- [Eset]How to stop Twitter tracking you and keep private the websites you visit
- [Sophos]Doctors shouldn't buddy up with patients on Facebook or Twitter, hospitals warn
- [Krebs]Global Payments Breach Now Dates Back to Jan. 2011
- [ThreatPost]Why Google Won't Protect You From Big Brother
- [ThreatPost]Dear Jailbreaker, Apple Wants to Have a Word with You
- [Sophos]Anatomy of a security hole - the break that broke sudo
- [ThreatPost]Forget 'Brogrammers,' Women Have The Edge In DEFCON Social Engineering Contest
- [Malekal]malvertising lovecamplanet.com sur porn.com via trafficforce.com
- [ThreatPost]Dear Jailbreaker, Apple Wants to Have a Word with You
- [SecListe]Report from the International Student Conference (2012, Netherlands)
- [SecListe]Worm 2.0, or LilyJade in action