Targeting the iOS kernel
History of Lookout
CTO-Cybersecurity Forum-Angela McKay
Hunting The Shadows: In Depth Analysis of Escalated APT Attacks
Rios (2013) medical device vulns
Predictive Client-Side Profiles for Personalized Advertising Misha Bilenko and Matt Richardson.
10 g An Investigation Into The Security Of Oracle 10g Enterprise Edition Release 2 Researcher: Okelitse Nyathi Supervisor: Mr J Ebden.
THE 20 CRITICAL CONTROLS: A SECURITY STRATEGY RANDY MARCHANY VA TECH IT SECURITY OFFICE 1 (C) MARCHANY 2011.
Front Line Report Fighting Against Malware in China ZhaoWei KnownSec.
Weekthatwas
Tilon/SpyEye2 intelligence report
MSRC - Funcionamiento