1.cisco 2016年度安全报告
http://www.cisco.com/c/dam/assets/offers/pdfs/cisco-asr-2016.pdf
2.android baidu浏览器远程代码执行漏洞(主要是T5Update更新的时候实现中间人替换APK内的lib)
http://www.lifeform-labs.com/blog/2016/2/27/remote-code-execution-in-the-baidu-browser-for-android
3.eko11安全会议上8个优秀的英文议题
http://www.giba.space/2016/02/8-great-talks-at-eko11-in-english_25.html
4.使用metaspliot pwn常见的后门和botnet
http://resources.infosecinstitute.com/pwning-common-backdoors-and-botnets/
5.Intel SGX 内存加密引擎
http://eprint.iacr.org/2016/204.pdf
6.openssh for windows
https://github.com/PowerShell/Win32-OpenSSH/releases
7.车辆连接通信:监视威胁和缓解
8.使用日用硬件进行高级wi-fi攻击
https://people.cs.kuleuven.be/~mathy.vanhoef/papers/acsac2014.pdf
9.50个必须参加的安全会议
https://digitalguardian.com/blog/top-50-must-attend-information-security-conferences
10.Intel CPU bugs
11.树莓派3将内嵌蓝牙和WIFI模块
http://www.i-programmer.info/news/91-hardware/9485-raspberry-pi-3-with-wifi-and-bluetooth.html
12.事件响应中使用被动DNS
https://www.vanimpe.eu/2016/02/27/passive-dns-for-incident-response/
13.基于AMD CPU系统的QEMU非权限帐号到host内核ring0利用
https://lkml.org/lkml/2016/2/26/876
14.android 应用安全设计/安全编码指南书
https://www.jssec.org/dl/android_securecoding_en.pdf
15.使用rootcheck快速审计*NIX系统
https://isc.sans.edu/forums/diary/Quick+Audit+of+NIX+Systems/20771
16.outlook 2016 pop3 bug 将删除你的邮件
http://wp.josh.com/2016/02/24/outlook-2016s-new-pop3-bug-deletes-your-emails/
17.OpenSSL CVE-2016-0799:通过Bio_printf的堆损坏
https://guidovranken.wordpress.com/2016/02/27/openssl-cve-2016-0799-heap-corruption-via-bio_printf/
18.加固安全现代软件交付生命周期
http://www.infoq.com/articles/secure-continuous-integration-delivery-lifecycl