HTML5 TOP 10 THREATS – STEALTH ATTACKS AND SILENT EXPLOITS
AMF TESTING MADE EASY!
HACKING WITH WEBSOCKETS
BLENDED THREATS AND JAVASCRIPT: A PLAN FOR PERMANENT NETWORK COMPROMISE
STATE OF WEB EXPLOIT TOOLKITS