PP250 Power Point Presentations

Thunderstrike MacBook malware attacks computers via Thunderbolt port | IT PRO

Fwd: [cap-talk] some capability queries

The FBI Used the Web's Favorite Hacking Tool to Unmask Tor Users | WIRED


Stealthy, sophisticated 'Regin' malware has been infecting computers since 2008 | PCWorld

Ghosts in the machine language – Elevate

Fwd: [cap-talk] A new type of phishing attack

Fwd: [Caja] Rich-text editors compatible with Caja

Do airplanes evolve like birds? -

How a bug in Windows might be costing humanity over 600 years of wasted time per day - garry's posthaven


Cyber attack on oil firms ‘could cost billions’ - Top stories - The Scotsman

About seL4 | seL4

Fwd: [cap-talk] Fwd: seL4 is going open source

What To Do If Your iPhone Is Hacked And Remotely Locked : All Tech Considered : NPR

Iranian Hackers Stalked U.S. Officials, Report Says - Bloomberg

Scientists achieve reliable quantum teleportation for first time

Edward Snowden responds to release of e-mail by U.S. officials - The Washington Post

Estonia exercise shows NATO's growing worry about cyber attacks | Science & Technology | Worldbulletin News