Stuxnet 0.5: The sabotage worm is older than previously thought
http://www.h-online.com/security/news/item/Stuxnet-0-5-The-sabotage-worm-is-older-than-previously-thought-1812496.html
http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/stuxnet_0_5_the_missing_link.pdf

Mobile Drive-By Malware example
http://blog.avast.com/2013/03/11/mobile-drive-by-malware-example/

Mobile Threat Report Q4 2012
http://www.f-secure.com/static/doc/labs_global/Research/Mobile%20Threat%20Report%20Q4%202012.pdf

Attack of the week: RC4 is kind of broken in TLS
http://blog.cryptographyengineering.com/2013/03/attack-of-week-rc4-is-kind-of-broken-in.html

Analysis of Chinese attack against Korean banks
http://blog.avast.com/2013/03/19/analysis-of-chinese-attack-against-korean-banks/

Banker Omnia Vincit – A tale of signed Brazilian bankers
http://blog.avast.com/2013/03/20/banker-omnia-vincit-a-tale-of-signed-brazilian-bankers/
http://files.avast.com/files/viruslab/banker-omnia-vincit.pdf

Owning Samsung phones for fun (…but with no profit :-))
http://randomthoughts.greyhats.it/2013/03/owning-samsung-phones-for-fun-but-with.html

Hacking the tag in 100 characters
http://bilaw.al/2013/03/17/hacking-the-a-tag-in-100-characters.html

The NoScript puts a crimp in this little hack, so whilst it shouldn’t have to if the browser prevents it, if you aren’t already running NoScript then now is the time to start.

2012 Law Enforcement Requests Report
http://www.microsoft.com/about/corporatecitizenship/en-us/reporting/transparency/
http://download.microsoft.com/download/F/3/8/F38AF681-EB3A-4645-A9C4-D4F31B8BA8F2/MSFT_Reporting_Data.pdf

Fake Facebook login pages spreading by Facebook applications
http://blog.avast.com/2013/03/25/fake-facebook-login-pages-spreading-by-facebook-applications/
http://www.techgainer.com/what-is-fake-facebook-login-page-and-how-it-is-used-to-hack-facebook-account/

https://blog.avast.com/wp-content/uploads/2013/03/UI-big-smiley.png

The avast! 8 User Interface: A study of change

Backdoor Uses Evernote as Command-and-Control Server
http://blog.trendmicro.com/trendlabs-security-intelligence/backdoor-uses-evernote-as-command-and-control-server/

Security Done Wrong: Leaky FTP Server
http://adamcaudill.com/2013/04/04/security-done-wrong-leaky-ftp-server/

Hackersh 0.1 Release Announcement
http://blog.ikotler.org/2013/04/hackersh-01-release-announcement.html

Stels Android Trojan Malware Analysis
http://www.secureworks.com/cyber-threat-intelligence/threats/stels-android-trojan-malware-analysis/

PS: We’re protected: https://www.virustotal.com/en/file/03c1b44c94c86c3137862c20f9f745e0f89ce2cdb778dc6466a06a65b7a591ae/analysis/

Why we love specifications (not)! Part II
http://blog.avast.com/2013/04/12/why-we-love-specifications-not-part2/

Persona Beta 2 launch
https://hacks.mozilla.org/2013/04/persona-beta-2-launch/
http://identity.mozilla.com/post/47541633049/persona-beta-2/
http://blog.mozilla.org/beyond-the-code/2013/04/09/persona-beta2/

WordPress Plugin Social Media Widget Hiding Spam – Remove it now
http://blog.sucuri.net/2013/04/wordpress-plugin-social-media-widget.html

Hijacking airplanes with an Android phone

https://www.net-security.org/secworld.php?id=14733