- [ThreatPost]Peer-to-Peer Botnets Resilient to Takedown Attempts
- [ThreatPost]Evernote Introduces Two-Factor Authentication for Paid Users
- [Eset]Charges against cybercrime?s ?bank of choice? for laundering $6 billion
- [Trend]The Android Fragmentation Problem
- [Sophos]PayPal refuses to pay bug-finding teen
- [Technet]Weekend Reading: May 31st Edition?A first glimpse of Windows 8.1 and the design behind Xbox One
- [ThreatPost]Former DARPA Head Proposes Pills and Tattoos to Replace Passwords
- [ThreatPost]The Case for a Government Bug Bounty Program
- [Eset]Mass malware attacks ?could be triggered by music?, researchers claim
- [Trend]Trend Micro Deep Security Guards Users from Ruby on Rails Exploit
- [Sophos]Australian government announces its National Cloud Computing Strategy
- [BitDefender] Bitdefender Clueful : pour savoir ce que font (réellement) vos applications Android
- [BitDefender] Un code malveillant découvert dans une application iOS
- [fsecure] The Future: No Hiding Place
- Delving Deeply Into a Bitcoin Botnet
- Windows XP : pourquoi les entreprises veulent-elles le conserver ?
- Une serrure connectée qui s’ouvre par smartphone
- API Hooking and DLL Injection on Windows
- [SecList]Blog: Jumcar. Timeline, crypto, and specific functions. [Second part]
- [Technet]Get your first look at Windows 8.1
- [ThreatPost]And On The Seventh Day, They Disclose
- [ThreatPost]New Beta Bot Trojan Skilled at Attacking Banks, ECommerce Platforms
- [Eset]Advanced U.S. weapons system designs are ?compromised by hackers?
- [Trend]Mobile Device ?Security?: The Problems of Remotely Disabling Stolen Phones
- [Sophos]Face recognition API for Google Glass to be released this week
- [SecList]Analysis: Spam in April 2013
- [Technet]The future is killer devices connected to amazing cloud services
- [ThreatPost]Amazon Joins Authentication Game
- [ThreatPost]Google Advocates 7-Day Deadline to Publicize Critical Vulnerabilities
- [Eset]Sky TV app users worry after broadcaster Google Play ?hack?
- [Trend]Windows 8 and Windows RT: An Overview
- [Sophos]Certificate pinning - first for websites, now for software?
- [SecList]Analysis: IT Threat Evolution: Q1 2013
- [MCAFEE]House Keys Under the Doormat? Nope, in Your Phone
- [Technet]Is your team properly ?socialized?? New research shows the potential and power of social technologies in the workplace
- [ThreatPost]Drupal.org Resets Passwords After Data Breach
- [ThreatPost]Carna Botnet Analysis Renders Scary Numbers on Vulnerable Devices
- [Eset]Tax Returns: Slovakian spyware campaign
- [Trend]How Targeted Attacks And Cybercrime Go Together
- [Sophos]Phishers try flattery with Facebook Page owners
- [SecListe]Jumcar. Timeline, crypto, and specific functions. [Second part]
- [Krebs] U.S. Government Seizes LibertyReserve.com
- [maredugof] Actes du colloque cyberdéfense au Sénat
- [maredugof] Cartes biométriques, retour par le sud et les urnes
- [MMPC]How easily USteal my passwords
- [Technet]Weekend Reading: May 24th Edition ? The world meets Xbox One, and Windows Azure heads to Asia
- [Eset]?Stronger action? urged in face of IP theft from American companies
- [Sophos]Patching your business, Yahoo breach, Google Glass, DDoS-for-hire - 60 Sec Security [VIDEO]
- [ThreatPost]Flame One Year Later
- [Eset]Electrical grids ?woefully prepared? for cyber attacks, warns analyst