- [ThreatPost]SCADA Vulnerabilities Identified in Power, Petrochemical Plants
- [Eset]Most small-office routers have ?critical? vulnerabilities as mysterious ?Moon? worm spreads
- [Sophos]PWN2OWN Day One ? Reader, IE, Flash and Firefox felled, Java left standing
- [SecList]Blog: Trust. Trust. Trust
- [Technet]Windows Azure services now generally available in new Japan cloud region
- [ThreatPost]Mike Mimoso on CanSecWest and Pwn2Own
- [ThreatPost]The NSA and Mark Zuckerberg?s Righteous Anger
- [Eset]Neiman Marcus attackers set off 60,000 alerts ? but went unnoticed
- [Sophos]Even big-name brands score badly in website password practices
- [SecList]Blog: RootedCON V
- [Technet]Wonder what the innovators do in their off time? They tinker. In The Garage.
- [ThreatPost]Keen Team of China Takes Down Safari and Flash at Pwn2Own
- [ThreatPost]IE 11 Stands Up to Pwn2Own Exploit Attempt
- [Eset]Urgent iPhone and iPad security update, Mac OS X as well
- [Sophos]Even big-name brands score badly in website password practices
- [SecList]Blog: Fraudsters are playing a different kind of card game
- [Technet]Microsoft and its partners showcase mobility solutions at HIMSS14 Annual Conference & Exhibition
- [ThreatPost]NSA Denies Impersonating Facebook to Exploit Targets
- [ThreatPost]Backdoor in Samsung Galaxy Devices Could Give Attackers Remote Control
- [Eset]An In-depth Analysis of Linux/Ebury
- [Trend]Kunming Attack Leads to Gh0st RAT Variant
- [Sophos]SSCC 138 ? Patching, zero-days, XP, APTs and CryptoLocker [PODCAST]
- [SecList]Blog: Mystery shopper: Beware of Frauds
- [Technet]Mobile World Congress, Microsoft and Nokia
- [ThreatPost]Energy Watering Hole Attack Used LightsOut Exploit Kit
- [ThreatPost]Study Shows Phone ?Metadata is Highly Sensitive?
- [Eset]Android under assault as spyware and Trojans ?grow by 400%?, company claims
- [Trend]Anatomy of a Control Panel Malware Attack, Part 1
- [Sophos]Another two universities suffer data breaches, but notification still too slow
- [SecListe]Agent.btz: a source of inspiration?
- [FireEye]A Detailed Examination of the Siesta Campaign
- [SecList]Blog: Tor hidden services - a safe haven for cybercriminals
- [Technet]Weekend Reading: Feb. 21st Edition ? Your personal cloud is now OneDrive, and Microsoft Dynamics CRM to add marketing capabilities
- [ThreatPost]Charitable Prelude to Pwn2Own Not Without Its Critics
- [ThreatPost]Weak Random Number Generator Threatens iOS 7 Kernel Exploit Mitigations
- [Eset]Scams: Tech Support, Accident Insurance, PPI, Oh My My
- [Trend]Five Bulletins for March 2014 Patch Tuesday, Including One for Mac Users
- [Sophos]Sir Tim Berners-Lee calls for 'Magna Carta' bill of rights for world wide web
- [SecListe]Trust. Trust. Trust
- [FireEye]Intelligence Analysts Dissect the Headlines: Russia, Hackers, Cyberwar! Not So Fast.
- [SecList]Blog: A ?gift? for Apple?s valued customers
- [MMPC]Sefnit?s Tor botnet C&C details
- [Technet]Free OneDrive cloud storage now available worldwide for Microsoft, iOS and Android devices
- [Eset]How can doctors practice better health information security?
- [Trend]Careto and OS X Obfuscation
- [SecListe]RootedCON V
- [FireEye]Cybercriminals Continue to Target Retail Sector
- [FireEye]RSA USA 2014: Continuous Monitoring, Protection, and Vigilance
- [SecList]Blog: CODE BLUE in Tokyo
- [MMPC]New infection rate data for unprotected computers