- [Sophos]iOS 6.1.3 security flaw allows passcode lock bypass... again [VIDEO]
- [Technet]Straight from the Batcave: ?The Dark Knight Rises? Comes to Windows Phone
- [ThreatPost]DHS, ICS-CERT Warn of Siemens HMI Vulnerabilities
- [ThreatPost]Theories Abound on Wiper Malware Attack Against South Korea
- [Eset]UK consumers remain concerned about bank security
- [Sophos]Facebook plugs Timeline privacy hole
- [SecList]Blog: The TeamSpy Crew Attacks - Abusing TeamViewer for Cyberespionage
- [Technet]Redbox Instant by Verizon App Now Available on Xbox LIVE
- [ThreatPost]Microsoft Transparency Report Shows Company Supplied User Content in 2.2% of Cases
- [ThreatPost]Wade Williamson on Malware Trends
- [Eset]Criminal hackers increasingly attracted to smaller businesses
- [Trend]How Deep Discovery Protected Against The Korean Cyber Attack
- [Sophos]Researcher uses botnet to map internet - vital public service, or cybercriminal dodginess? [POLL]
- [SecList]Blog: South Korean 'Whois Team' attacks
- [MCAFEE]South Korean Banks, Media Companies Targeted by Destructive Malware
- [Technet]?Gears of War: Judgment? Unleashed on Xbox 360
- [ThreatPost]Wade Williamson on Malware Trends
- [ThreatPost]Chameleon Botnet Stealing $6M a Month in Fraudulent Ad Clicks
- [Eset]The real risk in Google removing ad-blocking apps from Play store
- [Trend]Deep Discovery Protects Users From Cyber Attacks In South Korea
- [Sophos]DarkSeoul: SophosLabs identifies malware used in South Korean internet attack
- [SecListe]South Korean 'Whois Team' attacks
- [SecList]Blog: The end of MSN Messenger, the beginning of attacks
- [MCAFEE]Android Banking Trojans Target Italy and Thailand
- [Technet]Got March Madness? Check Out These Apps for the 2013 NCAA Basketball Tournament
- [ThreatPost]Researchers Uncover 'TeamSpy' Attack Campaign Against Government, Research Targets
- [ThreatPost]Exposed Devices Used as Botnet to Scan Internet
- [Eset]Adobe and Microsoft release critical patches for March
- [Trend]Spammers Bless New Pope with Spam
- [Sophos]Is it ever acceptable for a journalist to hack into somebody else's email?
- [SecListe]The end of MSN Messenger, the beginning of attacks
- [Dr.Web] Trojan.Yontoo.1, champion des Trojans publicitaires pour les "Macs "
- [Dr.Web] Encryption Trojan attacks Spain and France
- [MCAFEE]Travnet Trojan Could Be Part of APT Campaign
- [Technet]The Future of Search Goes Beyond the Search Box
- [ThreatPost]GAO: Flaws in IRS Network Could Put Taxpayer Information in Jeopardy
- [ThreatPost]How To: Chrome Browser Privacy Settings
- [Eset]Multi-cursor password system unveiled by Japanese researchers
- [Trend]Advertisers 1, Consumers 0
- [Sophos]Monday review - the hot 32 stories of the week
- [SecList]Blog: Hello from Malaysia
- [Technet]Hitting the Slopes? Winter Ski & Ride App for Windows Phone Takes You to a Higher Altitude
- [ThreatPost]Flaw Leaves EA Origin Platform Users Open to Attack
- [ThreatPost]Java Code, Details Released for Potential Sandbox Bypass Issue
- [Eset]Obama uses TV interview to raise cyber awareness
- [Trend]RSA Conference 2013: A Newcomer?s Perspective
- [Sophos]Hackers launch DDoS attack on security blogger's site, send SWAT team to his home
- [SecListe]Hello from Malaysia
- [Technet]Crush Your Enemies and Become Supreme Ruler of the Galaxy with ?Galactic Reign?
- [ThreatPost]Third-Party Applications to Blame for 87 Percent of Vulnerabilities Last Year