- [ThreatPost]IRC Botnet Leveraging Unpatched Plesk Vulnerability
- [Eset]Silicon Valley ?needs to lead? battle against cyber attacks, says ex-Homeland Security chief
- [Trend]GAMARUE Uses Sourceforge to Host Files
- [Sophos]Botnet smackdown, Oracle on Java, Passwords you can eat - 60 Sec Security [VIDEO]
- [MCAFEE]Malicious Dating, Ad Services Plague Japanese Users
- [Technet]Windows 8.1 updates unveiled at COMPUTEX 2013
- [ThreatPost]Share and Share Alike? Not Quite
- [ThreatPost]DNI Clapper Says NSA Programs Fully Authorized and Necessary
- [Eset]Fake iPhone charger can hack iOS in under 60 seconds
- [Trend]Going Solo: Self-Propagating ZBOT Malware Spotted
- [Sophos]FBI and Microsoft in massive takedown of "Citadel" crimeware
- [MCAFEE]Fraudulent Adult Dating Services Turn 10 Years Old, Still Evolving
- [Technet]Devices lead the way as OEMs focus on opportunity with Windows
- [ThreatPost]Google Jacks Up Bug Bounties For Serious Vulnerabilities
- [ThreatPost]Five Bulletins, One Critical in Microsoft?s June Patch
- [Eset]Cybercriminals use photo-sharing to snare victims in auction scams, FBI warns
- [Trend]Plesk Zero-Day Exploit Results in Compromised Webserver
- [Sophos]Biostamps - freedom from password tyranny, or Hollywood science?
- [SecList]Blog: "NetTraveler is Running!" - Red Star APT Attacks Compromise High-Profile Victims
- [MCAFEE]Phishing Attack Replaces Android Banking Apps With Malware
- [Technet]Increased battery life, incredible integrated graphics: Intel launches 4th-generation Core processors
- [ThreatPost]Oracle Addresses Java?s Symptoms, But Doesn?t Cure Sickness
- [ThreatPost]China Calls Out U.S. for Hacking
- [Eset]Evernote and LinkedIn boost security with two-factor authentication
- [Trend]Backdoor Wipes MBR, Locks Screen
- [Sophos]Politicians in Iowa City reluctantly pass ban on drones, automatic traffic surveillance
- [SecListe]"NetTraveler is Running!" - Red Star APT Attacks Compromise High-Profile Victims
- [SecList]Blog: Security policies: portable applications
- [Technet]ASUS unveils new PCs at COMPUTEX 2013
- [ThreatPost]Schneider Patches 18-Month Old SCADA Bugs
- [ThreatPost]Apple Patches Mass of Security Bugs in OS X and Safari
- [Eset]Motorola predicts passwords could be replaced by arm tattoos and ?authentication pills?
- [Trend]Compromised Japanese Sites Lead to Malware
- [Sophos]Fake payment phishers busted in South Africa
- [SecListe]Security policies: portable applications
- [SecList]Blog: What are children doing online?
- [Technet]How to watch the June 10 Xbox media briefing and more from E3
- [ThreatPost]FIS Breach a Broader Network Hack
- [ThreatPost]Number of Peer-to-Peer Botnets Grows 5X
- [Eset]Drupal.org resets passwords after hack exposes usernames, email addresses
- [Trend]Cybercriminals Take Loss Of Liberty Reserve Poorly
- [Sophos]Fake payment phishers busted in South Africa
- [SecListe]What are children doing online?
- [SecList]Blog: Jumcar. Peruvian navy? Who could be behind it? [Third part]
- [MCAFEE]Delving Deeply Into a Bitcoin Botnet
- [Technet]Acer adds new Windows 8 PCs, including Iconia W3 8-inch tablet and expanded Aspire series
- [ThreatPost]Web Services Finding Religion with Two-Factor Authentication
- [ThreatPost]Defeating Internet Blocking With Lahana VPN-Tor Bridge
- [Eset]Intellectual Property Protection and Good Badware
- [Trend]Cybercriminals Catch up With the Digital Landscape