HackingTeam 2.0: The Story Goes Mobile – Securelis…

HackingTeam 2.0: The Story Goes Mobile – Securelist securelist.com/en/blog/8231/H…

Social Engineering – A Successful Method of Attack…

Social Engineering – A Successful Method of Attack solutionary.com/resource-cente… @Solutionary

U.S. Indicts Five Chinese Army Officers for Allege…

U.S. Indicts Five Chinese Army Officers for Alleged Cyberespionage Operations: threatpost.com/u-s-indicts-fi…

Serious security flaw in OAuth, OpenID discovered…

Serious security flaw in OAuth, OpenID discovered cnet.co/1kqxuyK via @CNET

Outlook Thread-Index Value Analysis http://t.co/y9…

Outlook Thread-Index Value Analysis solutionary.com/resource-cente… @Solutionary

New Internet Explorer CVE-2014-1776 Zero Day Used…

New Internet Explorer CVE-2014-1776 Zero Day Used in Targeted Attacks: threatpost.com/new-internet-e…

Apple security updates for Mac, iOS, and AirPort v…

Apple security updates for Mac, iOS, and AirPort via @ZDNet, @lseltzer zd.net/1iIuq3F

Microsoft issues alert for Word zero-day – booby-t…

Microsoft issues alert for Word zero-day – booby-trapped RTF files already used in attacks nakedsecurity.sophos.com/2014/03/25/mic…

Hackers text ATMs for cash via Windows XP flaws vi…

Hackers text ATMs for cash via Windows XP flaws via @ZDNet, @ZDNetCharlie zd.net/1fedLQH

Most businesses unprepared for cyberattack, study…

Most businesses unprepared for cyberattack, study finds via @ZDNet, @ZDNetCharlie zd.net/1gBTh8q