1Malvertising Or Just Advertising? The Curious Case Of Counterclank (opens in new tab)(threatpost.com)2TheloniusPhunk14y ago0
3Bill Gates's Trustworthy Computing Memo: Ten Years Later (opens in new tab)(threatpost.com)2TheloniusPhunk14y ago0
4Losing The Cops In A Foot Chase? There's An App For That (opens in new tab)(threatpost.com)2TheloniusPhunk14y ago0
5Survey Suggest Most Americans are Media Pirates (opens in new tab)(threatpost.com)1TheloniusPhunk14y ago0
6Lilupophilupop SQL Injection Attack Tops 1 Million Infected URLs (opens in new tab)(threatpost.com)1TheloniusPhunk14y ago0
7Thinking About Software Security Holistically (opens in new tab)(threatpost.com)2TheloniusPhunk14y ago0
8Quality Coding Takes A Break For The Holidays. But Why? (opens in new tab)(ww.threatpost.com)3TheloniusPhunk14y ago0
10Combination of Eyes and Algorithms Wins $50K Prize In DARPA's Shredder Challenge (opens in new tab)(threatpost.com)1TheloniusPhunk14y ago0
11Insecure Applications: We Are The 84 Percent (opens in new tab)(threatpost.com)1TheloniusPhunk14y ago0
12Twitter Acquires Mobile Security Firm WhisperSystems (opens in new tab)(threatpost.com)1TheloniusPhunk14y ago0
13Was The 3 Character Password at Hacked Water Treatment Plant A Siemens Default? (opens in new tab)(threatpost.com)18TheloniusPhunk14y ago8
14Facebook & Twitter Erode Your Co.'s Security From Within. Here's How To Stop It. (opens in new tab)(threatpost.com)1TheloniusPhunk14y ago0