1.PwnPhone :默认密码允许秘密监控你的voip通话
https://paul.reviews/pwnphone-default-passwords-allow-covert-surveillance/
2.如何安全的存储密码
https://paragonie.com/blog/2016/02/how-safely-store-password-in-2016
3.Ubitiquiti’s AirVision摄像头可通过rstp访问绕过登陆认证,直接看视频
4.来自Cisco Live Europe 2016 Wifi 架构的观察
https://www.insinuator.net/2016/02/observations-from-the-cisco-live-europe-2016-wifi-infrastructure/
5.盲注利用
https://isc.sans.edu/diary/Exploiting+%28pretty%29+blind+SQL+injections/20733
6.使用 DarunGrim 执行 bindiff
https://mattoh.wordpress.com/2014/04/21/
7.iOS (up to) 9.3b3 IOHIDFamily Use-After-Free (incorrect patch for CVE-2015-6974) POC
https://ghostbin.com/paste/s3tz7
8.Usenix安全会议:利用噪音干扰无人机陀螺仪
http://www.securitytube.net/video/15164?utm_source=HT&utm_medium=twitter&utm_campaign=SM
9.智能建筑面临多个IOT安全风险
10.反向工程xbee pro物理层第一部分
http://xn--thibaud-dya.fr/phy_xbee_p1.html
11.mitmproxy发行:支持http/2
12.Windows Kerberos 安全功能绕过POC (MS16-014)
https://www.exploit-db.com/exploits/39442/
13.研究人员演示在另一个房间从断网的笔记本中偷取私钥
14.andorid 应用的网络安全策略配置
https://koz.io/network-security-policy-configuration-for-android-apps/
15.跟踪Andromeda/Gamrue僵尸网络
http://eternal-todo.com/blog/travelling-far-side-andromeda-botconf
16.三星警告用户在使用声控控制smartTV的时候,数据有可能会传给第三方厂商
http://theantimedia.org/samsung-warns-customers-to-think-twice-about-what-they-say-near-smart-tvs/
17.使用bettercap绕过hsts
https://www.bettercap.org/blog/sslstripping-and-hsts-bypass/#.VsHQflQ9TwA.twitter
18.针对一款能清除你android数据的mazar bot分析
https://heimdalsecurity.com/blog/security-alert-mazar-bot-active-attacks-android-malware/
19.揭秘Facebook的群体正在使用的恋童癖者交换色情图片
20.CVE-2016-1903利用
http://www.libnex.org/blog/exploitingcve-2016-1903memoryreadviagdimagerotateinterpolated
21.硬件设计:FPGA的安全风险