1.Avast的虚拟化驱动内核分页池缓冲区溢出漏洞分析
2.Comodo Internet Security 默认安装和开始vnc服务
https://code.google.com/p/google-security-research/issues/detail?id=703
3.滥用exchange web服务第一部分
http://www.shellntel.com/blog/2016/2/13/abusing-exchange-web-service
4.远程ios debugging的lldb脚本扩展
http://www.lifeform-labs.com/blog/2016/2/18/lldb-scripting-for-remote-ios-debugging
5.Nivdort:通过垃圾邮件发布的窃取数据的木马
https://blogs.mcafee.com/mcafee-labs/nivdort-data-stealing-trojan-arrives-via-spam/
6.ios和android上的文件系统监控工具
https://www.nowsecure.com/blog/2016/02/18/filesystem-monitor-tool-for-ios-and-android/
7.PowerForensics 的安装指南
http://www.invoke-ir.com/2016/02/installing-powerforensics.html
8.pin_unpacking_antievasion:用来unpack恶意软件和避免逃逸的技术
https://github.com/Seba0691/pin_unpacking_antievasion
9.morph:开源的浏览器fuzzing框架
https://github.com/walkerfuz/morph
10.跟踪权限内存访问发现软件bug
https://os.itec.kit.edu/downloads/ma_2015_wilhelm_felix__discover_software_vulnerabilities.pdf
11.mac恶意软件演变的10年图谱
https://www.intego.com/mac-security-blog/10-years-of-mac-malware-how-os-x-threats-have-evolved/
12.android木马Xbot钓鱼信用卡/银行账号,锁屏/加密数据
13.黑客控制空调导致整个街区的停电
https://blog.kaspersky.com/air-conditioner-hack/11348/
14.通过中间人让iphone safari远程crash
https://medium.com/@s3yfullah/iphone-safari-remote-crash-f811ed51fc92#.arz28971n
15.跟踪跟踪者:针对SS7网络最先进的恶意系统
http://www.adaptivemobile.com/blog/tracking-the-trackers
16.分析web浏览器的活动
http://www.netresec.com/?page=Blog&month=2016-02&post=Analyzing-Web-Browsing-Activit