New realities in aviation security remotely gaining control of aircraft systems
Man in the Browser attacks on online banking transactions
A Journey to Protect Points of Sale (POS)
Using 80 20 rule in application security management
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Why current security solutions fail
Insecurity in security products v1.5