- [SecList]Analysis: BitGuard: a system of forced searches
- [MMPC]MSRT March 2014 ? Wysotot
- [Technet]SQL Server 2014 released to manufacturers, will be generally available April 1
- [ThreatPost]WiFi Bug Plagues Philips Internet-Enabled TVs
- [ThreatPost]FTC Settles With Fandango, Credit Karma Over SSL Issues in Mobile Apps
- [Eset]Bitcoin bank Flexcoin shuts down after attackers loot $570,000 from ?hot wallet?
- [Trend]Ransomware and Bitcoin Theft Combine in BitCrypt
- [Sophos]World Backup Day - are your important files backed up?
- [SecListe]Analysis of, Malware from the MtGox leak archive
- [Technet]Microsoft?s Leslie Lamport wins the Turing Award, the ?Nobel Prize in Computing?
- [ThreatPost]NTP Amplification, SYN Floods Drive Up DDoS Attack Volumes
- [ThreatPost]Government Requests for Google User Data Continue to Climb
- [Eset]How can we as patients secure our medical data?
- [Trend]New Android Bug Causes ?Bricked? Devices
- [Sophos]Spammers take advantage of Naked Security writing about spammers
- [Technet]Weekend Reading: March 14th Edition ? ?Titanfall? makes landfall
- [ThreatPost]NSA Reforms Demonstrate Value of Public Debate
- [ThreatPost]GUI Vulnerabilities Expose Information Disclosure, Privilege Escalation
- [Eset]More than 300,000 wireless routers hijacked by criminals in global attack
- [Trend]Anatomy of a Control Panel Malware Attack, Part 2
- [Sophos]Obama to unveil plan to end NSA bulk data collection
- [FireEye]Five Reasons You?re a Prime Target of Cybercriminals
- [FireEye]Spear Phishing the News Cycle: APT Actors Leverage Interest in the Disappearance of Malaysian Flight MH 370
- [SecList]Blog: The Future of Bitcoin After the Mt. Gox Incident
- [Technet]'Titanfall' now available on Xbox One
- [ThreatPost]Security the Facebook Way
- [ThreatPost]Full Disclosure List Rises From the Ashes For Fresh Start
- [Eset]STEM education, the Target data breach, and the Apple SSL vulnerability
- [Trend]Mass-Produced ATM Skimmers, Rogue PoS Terminals via 3D Printing?
- [Sophos]Spyware app turns the privacy tables on Google Glass wearers
- [SecListe]The Future of Bitcoin After the Mt. Gox Incident
- [FireEye]From Windows to Droids: An Insight in to Multi-vector Attack Mechanisms in RATs
- [FireEye]RSA USA 2014: Continuous Monitoring, Protection, and Vigilance
- [Technet]Weekend Reading: March 7th Edition?Customers shine at Microsoft Dynamics Convergence 2014 and SharePoint conference
- [ThreatPost]Time Warner Reports Fewer Than 250 National Security Orders
- [ThreatPost]WhiteHat Releases Aviator Browser for Windows
- [Eset]CIA chief says internet-connected appliances are ?worrisome? new threat
- [Trend]Android Custom Permissions Leak User Data
- [Sophos]Microsoft admits reading blogger's Hotmail as part of leak investigation
- [Technet]Meet five Microsoft women inspiring change in technology
- [ThreatPost]Comcast Issues First Transparency Report
- [ThreatPost]EA Games Site Hacked to Steal Apple IDs
- [Eset]Wi-Fi virus Chameleon infects whole cities ?like airborne disease?
- [Trend]New BlackOS Software Package Sold In Underground Forums
- [Sophos]US DHS digs out 27,000-member child abuse ring buried on Tor
- [SecList]Analysis: Spam report: February 2014
- [Technet]Life in the digital crosshairs: Experience the untold story
- [ThreatPost]Bitcoin Transaction Malleability Flaw Resolved
- [ThreatPost]Google Encrypts All Gmail Connections
- [Eset]Corkow: Analysis of a business-oriented banking Trojan