- [SecList]Blog: DefCon21 2013
- [MCAFEE]Java Back Door Acts as Bot
- [Technet]The Nokia Lumia 1020 with its groundbreaking 41-megapixel camera is now available on AT&T
- [ThreatPost]Crypto Gains Ramp Up Calls to Get Ahead of Inevitable RSA Algorithm Downfall
- [ThreatPost]Weak Encryption Enables SIM Card Root Attack
- [Eset]Researchers ?remote control? an $80 million yacht ? and even aircraft could be vulnerable
- [Trend]From Fame to Shame: Busting the ?Free Followers? Myth in Social Media
- [Sophos]Malware alert while seeking child abuse images at work earns US man 5 years in jail
- [SecList]Blog: Blackhat USA 2013 Day 2 - Double Fetch 0day, ICS/SCADA, and Remembering Barnaby Jack
- [MCAFEE]Bitcoin Miners Use AutoIt-Complied Programs With Antianalysis Code
- [Technet]Weekend Reading: July 26th Edition?Introducing the Nokia Lumia 625 and its big-screen appeal
- [ThreatPost]Surveillance, Legal Access Could Weaken Internet Infrastructure
- [ThreatPost]Buy An Ad, Own a Browser Botnet
- [Eset]Lost in space? NASA ?fell short? on cloud security, report finds
- [Trend]The Current State of the Blackhole Exploit Kit
- [Sophos]Newly exposed NSA tool, XKeyscore, sees 'nearly everything we do online'
- [SecListe]Blackhat USA 2013 Day 2 - Double Fetch 0day, ICS/SCADA, and Remembering Barnaby Jack
- [SecList]Blog: Blackhat 2013 - Keynote NSA's Alexander Provides Details, and Talks on Embedded and Low Level Attacks
- [MCAFEE]Japanese One-Click Scammers Abuse Mobile Traffic Exchange Service
- [Technet]Meet the Nokia Lumia 625 ? a low-cost phone with a BIG screen
- [ThreatPost]Inside the Security Model of BlackBerry 10
- [ThreatPost]Google Bolsters Security, Updates Encryption on Certificates
- [Eset]Thomson Reuters is latest victim of high-profile Twitter hacks
- [Trend]Andromeda Botnet Gets an Update
- [Sophos]ZeroAccess malware revisited - new version yet more devious
- [SecListe]Blackhat 2013 - Keynote NSA's Alexander Provides Details, and Talks on Embedded and Low Level Attacks
- [SecList]Blog: Security policies: non-productive use of resources
- [Technet]Weekend Reading: July 19th Edition?Touch-enabled ?Halo: Spartan Assault? game app arrives on Windows 8 and Windows Phone 8
- [ThreatPost]NSA Director Defends Surveillance Activities During Tense Black Hat Keynote
- [ThreatPost]Mozilla, Blackberry Join Forces To Advance Peach Fuzzer
- [Eset]Real damage of cybercrime may be counted in job losses, not dollars, says CSIS report
- [Trend]Trend Micro Solutions for PE_EXPIRO
- [Sophos]Personal data on 72,000 staff taken in University of Delaware hack
- [SecListe]Security policies: non-productive use of resources
- [Eugene Kaspersky] The phantom of the boot sector
- [SecList]Blog: Passwords13 (Hot Topic in Hot City)
- [MCAFEE]Introducing App Reputation for Android Apps
- [Technet]Xbox 360 hits 30 consecutive months atop the U.S. console market
- [ThreatPost]CrowdSource Tool Aims to Improve Automated Malware Analysis
- [ThreatPost]Microsoft Expands MAPP Program to Incident Response Teams
- [Eset]?Car hackers? to show off how they can ?control? vehicles with a laptop
- [Trend]Malware Hijacks Social Media Accounts Via Browser Add-ons
- [Sophos]UK report: Banks let e-criminals pinch gobs of money underneath the law's nose
- [SecListe]Passwords13 (Hot Topic in Hot City)
- [Sophos] ZeroAccess malware revisited - new version yet more devious
- [Malekal] [en] PlugRush Reveton Malvertising
- [Malekal] [en] Juicyads Reveton Malvertising
- [SecList]Blog: Malicious news - birth, death, spy scandal
- [MCAFEE]Android Master-Key Malware Already Blocked by McAfee Mobile Security
- [Technet]?On the Whiteboard? goes deep inside Microsoft?s Reliability Lab