Macs in the Age of the APT
Weapons of Targeted Attack: Modern Document Exploit Techniques
The Rustock Botnet Takedown
Tamper Evident Seals - Design and Security
Aerial Cyber Apocalypse: If we can do it... they can too.