- Hacking a Keyboard for Fun and Profit - Can It Run Doom?
- MeshHacks: Exploiting Linksys Intelligent Mesh from the Internet
- Why Regular Employees Should Not Boot Their Computers From External Media
- OAuth 2.0 Browser Swapping Attacks
- Windows Local Privilege Escalation through the bitpixie Vulnerability