From simple charts to complex maps and infographics, Brian Suda’s round-up of the best – and mostly free – tools has everything you need to bring your data to life – http://www.netmagazine.com/features/top-20-data-visualisation-tools
Kenya election: Computer bug blamed for vote error – http://www.bbc.co.uk/news/world-africa-21707152
The Czech Republic has been hit by an unprecedented wave of cyber-attacks – http://www.globalpost.com/dispatch/news/afp/130307/czech-republic-baffled-unprecedented-cyber-assault
Telekom has launched an online digital world map which displays the place of origin of cyber-attacks – www.sicherheitstacho.eu
The OAuth keys and secrets that official Twitter applications use to access users’ Twitter accounts have been leaked in a post to Github – https://threatpost.com/en_us/blogs/twitter-oauth-api-keys-leaked-030713
Finnish law enforcement authorities, working closely with the European Cybercrime Centre (EC3) at Europol, have dismantled an Asian criminal network responsible for illegal internet transactions and purchasing of airline tickets – https://www.europol.europa.eu/content/international-network-line-card-fraudsters-dismantled-newsletter
Ransomware uses Windows PowerShell program to perform file encryption using “Rijndael symmetric key encryption”. This variant also targets Russian users with a ransom message displayed in the Russian language – http://nakedsecurity.sophos.com/2013/03/05/russian-ransomware-windows-powershell/
European computer emergency response teams, which are being beefed up as part of the EU’s cyber security strategy, need to set more ‘honeypot’ traps to snare cyber attackers, according to reports – http://www.euractiv.com/specialreport-cybersecurity/europe-needs-honeypots-trap-cybe-news-518279
Google offers data on FBI’s national-security-related requests for user identities – http://news.cnet.com/8301-1009_3-57572634-83/google-offers-data-on-fbis-national-security-related-requests-for-user-identities/
Malware developers will pay large sums for the bugs needed to loosen Apple’s software restrictions – http://www.technologyreview.com/view/512031/military-malware-may-have-killed-the-iphone-jailbreak/