- [Trend]The Current State of the Blackhole Exploit Kit
- [Sophos]Secure webmail service Lavabit suspends operation, citing legal issues
- [SecListe]Securing your Email space
- [SecList]Analysis: The curious case of a CVE-2012-0158 exploit
- [Technet]Weekend Reading: Aug. 1st Edition?New enterprise preview allows businesses to take Windows 8.1 out for a test drive
- [ThreatPost]Remotely Exploitable Bug Affects Wide Range of Cisco TelePresence Systems
- [ThreatPost]Convenient Google WebLogin Tokens Can Expose User Accounts, Data
- [Eset]Stop using Windows, Tor Project advises users after malware outbreak
- [Trend]Andromeda Botnet Gets an Update
- [Sophos]Chrome, Firefox display plain-text passwords with a few clicks
- [SecListe]Campus Party, the biggest Technology Camp in the world!
- [MCAFEE]Android App Contains Windows Worm
- [Technet]Microsoft?s new programs attract ?bounty hunters? who help make safer products
- [ThreatPost]New Twitter Login Verification System Avoids SMS Codes
- [ThreatPost]Fort Disco Brute-Force Attack Campaign Targets CMS Websites
- [Eset]Bulletproof Inbox: Tips for staying safe (and sane) on email
- [Trend]Trend Micro Solutions for PE_EXPIRO
- [Sophos]Ok, who uses their pet's name as their password?
- [SecList]Blog: Campus Party, the biggest Technology Camp in the world!
- [Technet]New enterprise preview lets companies kick the tires on Windows 8.1
- [ThreatPost]Black Hat Aftermath: A Broken, Battered Internet
- [ThreatPost]Jeff Forristal on the Android Master-Key Vulnerability
- [Eset]Revealed: How a ?malicious charger? infects iPhone with spyware in under a minute
- [Trend]Header Spoofing Hides Malware Communication
- [Sophos]Freedom Hosting arrest and takedown linked to Tor privacy compromise
- [SecList]Analysis: Spam in Q2 2013
- [Technet]?On the Whiteboard? shows how making 3D objects is as easy as printing a Word doc
- [ThreatPost]Jason Geffner on Tortilla
- [ThreatPost]JavaScript and Timing Attacks Used to Steal Browser Data
- [Eset]New ransomware uses webcam and Homeland Security threat to scare victims
- [Trend]The Birth of the Royal Baby Blackhole Exploit Kit Run
- [Sophos]Humans still the weakest link as phishing gets smarter and more focused
- [SecListe]DefCon21 2013
- [SecList]Blog: DefCon21 2013
- [MCAFEE]Java Back Door Acts as Bot
- [Technet]The Nokia Lumia 1020 with its groundbreaking 41-megapixel camera is now available on AT&T
- [ThreatPost]Crypto Gains Ramp Up Calls to Get Ahead of Inevitable RSA Algorithm Downfall
- [ThreatPost]Weak Encryption Enables SIM Card Root Attack
- [Eset]Researchers ?remote control? an $80 million yacht ? and even aircraft could be vulnerable
- [Trend]From Fame to Shame: Busting the ?Free Followers? Myth in Social Media
- [Sophos]Malware alert while seeking child abuse images at work earns US man 5 years in jail
- [SecList]Blog: Blackhat USA 2013 Day 2 - Double Fetch 0day, ICS/SCADA, and Remembering Barnaby Jack
- [MCAFEE]Bitcoin Miners Use AutoIt-Complied Programs With Antianalysis Code
- [Technet]Weekend Reading: July 26th Edition?Introducing the Nokia Lumia 625 and its big-screen appeal
- [ThreatPost]Surveillance, Legal Access Could Weaken Internet Infrastructure
- [ThreatPost]Buy An Ad, Own a Browser Botnet
- [Eset]Lost in space? NASA ?fell short? on cloud security, report finds
- [Trend]The Current State of the Blackhole Exploit Kit
- [Sophos]Newly exposed NSA tool, XKeyscore, sees 'nearly everything we do online'
- [SecListe]Blackhat USA 2013 Day 2 - Double Fetch 0day, ICS/SCADA, and Remembering Barnaby Jack