




Segmented Russian “spam leads” offered for sale
Reading Time: ~ 3 min.
Cybercriminals release new Java exploits centered exploit kit
Reading Time: ~ 2 min.
New DIY IRC-based DDoS bot spotted in the wild
Reading Time: ~ 2 min.
Recap from RSA2013: Android Malware Exposed
Reading Time: ~ 3 min.
How much does it cost to buy 10,000 U.S.-based malware-infected hosts?
Reading Time: ~ 2 min.
How mobile spammers verify the validity of harvested phone numbers
Reading Time: ~ 3 min.

How do we use, secure, and share the information that surrounds us?
Reading Time: ~ 3 min.
DIY malware cryptor as a Web service spotted in the wild
Reading Time: ~ 2 min.