Blog

– The Art of Human Hacking

Review – The Art of Human Hacking http://www.toolswatch.org/2012/07/review-the-art-of-human-hacking/

América Latina bajo ciberataques durante la primera mitad del 2012

América Latina bajo ciberataques durante la primera mitad del 2012 http://www.cwv.com.ve/?p=10716

Improved artifact scanner from Malware Analysis Cookbook

Improved artifact scanner from Malware Analysis Cookbook http://www.attackdefendsecure.com/2012/07/improved-artifact-scanner-malware-analysis-cookbook/

An Overview Of Protocol Reverse-Engineering

An Overview Of Protocol Reverse-Engineering http://computer-forensics.sans.org/blog/2012/07/03/an-overview-of-protocol-reverse-engineering

Enterprise Campus Design Zone for Security

Enterprise Campus [Design Zone for Security] http://www.cisco.com/en/US/docs/solutions/Enterprise/Security/SAFE_RG/chap5.html

Article: New MacOS X backdoor variant used in APT attacks

New MacOS X backdoor variant used in APT attacks https://www.securelist.com/en/blog/208193616/New_MacOS_X_backdoor_variant_used_in_APT_attacks

Article: Worm Mitigation Technical Details

Worm Mitigation Technical Details http://www.cisco.com/web/about/security/intelligence/worm-mitigation-whitepaper.html Sent via Flipboard, your social magazine for iPad and iPhone.

Article: Security Defenses: 10 Ways To Circumvent Threats With a Sound BYOD Policy

Security Defenses: 10 Ways To Circumvent Threats With a Sound BYOD Policy http://www.eweek.com/c/a/Security/Security-Defenses-10-Ways-To-Circumvent-Threats-With-a-Sound-BYOD-Policy-571397/ Sent via Flipboard, your social magazine for iPad and iPhone.

Article: Technology News: IT Management: 5 Tips for Braving the BYOD Boom

Technology News: IT Management: 5 Tips for Braving the BYOD Boom http://www.technewsworld.com/story/75326.html?wlc=1339555708

Full MSSQL Injection PWNage

Full MSSQL Injection PWNage http://www.stumbleupon.com/to/s/1TTMau