- A dive into the world of MS-DOS Viruses
- 12 best practices for User Account Management
- Awesome hacking
- Crypto4devs
- Supply Chain Security
- Privacy not included
- Counterfeit Electronics
- Deepfake videos
- How a Hacker Convinced Motorola to Send Him Source Code
- Why the NSA called me after midnight and requested my source code
- UEFI Explotation for the masses
- Do you really knows CORS?
- Be safe online
- Apt RCE
- Mystery still surrounds hack of php pear website
- The practical Linux Hardening Guide
- Linux Hardening Checklist
- FaceTime bug lets you hear the audio of the person you are calling
- Zerodium raises 0-day payout ceiling to $2M
- Awesome Python security
- 10 ways to secure your apps
- Merkle's puzzles
- S/KEY Algorithm
- How does Tor work?
- You probably don't need recaptcha
- Return-oriented programming
- ROP Emporium
- Hack the Company