Breaking Payment Points of Interaction (POI)
Memory Forensics Using Virtual Machine Introspection for Cloud Computing
Towards a Holistic Approach in Building Intelligence to Fight Crimeware
Pwning Your Java Messaging with Deserialization Vulnerabilities
Crippling HTTPS with Unholy PAC
Building a Product Security Incident Response Team: Learnings from the Hivemind
A Lightbulb Worm?
Ouroboros: Tearing Xen Hypervisor with the Snake
Next-Generation of Exploit Kit Detection by Building Simulated Obfuscators
badWPAD
The Year in Flash
The Beast Within - Evading Dynamic Malware Analysis Using Microsoft COM
An Inconvenient Trust: User Attitudes Toward Security and Usability Tradeoffs for Key-Directory Encryption Systems