Identify Backdoors in Firmware By Using Automatic String Analysis http://blog.ioactive.com/2013/05/identify-back-doors-in-firmware-by.html
Identify Backdoors in Firmware By Using Automatic String Analysis http://blog.ioactive.com/2013/05/identify-back-doors-in-firmware-by.html
Cracking 16 Character Strong passwords in less than an hour http://thehackernews.com/2013/05/cracking-16-character-strong-passwords.html
CrowdInspect Malware Forensic Program http://www.sectechno.com/2013/05/27/crowdinspect-malware-forensic-program/
PeStudio lets you analyse suspicious programs for malware http://betanews.com/2013/05/28/pestudio-lets-you-analyse-suspicious-programs-for-malware/
[cryptography] skype backdoor confirmation http://lists.randombit.net/pipermail/cryptography/2013-May/004224.html
Practical Review: Disaster Recovery (DR) in the AWS Cloud http://www.newvem.com/practical-review-disaster-recovery-dr-in-the-aws-cloud/
Ethical Hackers Talk Internet Terrorism, Anonymous, and DDoS Attacks http://www.vice.com/read/internet-terrorism-is-really-confusing
Android for Penetration Testers – PwnPad Goodness https://www.trustedsec.com/april-2013/android-for-penetration-testers-pwnpad-goodness/
Evilgrade v2.0.5 (06-05-2013) Released http://www.toolswatch.org/2013/05/evilgrade-v2-0-5-06-05-2013-released/
AV0id – Anti-Virus Bypass Metasploit Payload Generator Script http://www.commonexploits.com/?p=789