Macs in the Age of the APT
Weapons of Targeted Attack: Modern Document Exploit Techniques
The Rustock Botnet Takedown
Tamper Evident Seals - Design and Security
Aerial Cyber Apocalypse: If we can do it... they can too.
Virtualization under attack: Breaking out of KVM
Corporate Espionage for Dummies: The Hidden Threat of Embedded Web Servers
Inside Apple's MDM Black Box
A Crushing Blow At The Heart of SAP J2EE Engine
Hacking and Forensicating an Oracle Database Server