Security News

http://www.bankinfosecurity.com/atm-attacks-exploit-lax-security-a-4689 By Tracy Kitten Bank Info Security April 19, 2012

http://blogs.computerworld.com/20010/interview_with_place_hacker_hacking_skyscrapers_to_exploit_physical_security_holes By Darlene Storm Security Is Sexy Computerworld April 10, 2012

http://www.wired.com/threatlevel/2012/04/exploit-for-quantum-plc/ By Kim Zetter Threat Level Wired.com April 5, 2012

http://arstechnica.com/business/news/2012/03/suspicions-arroused-as-exploit-for-critical-windows-bug-is-leaked.ars By Dan Goodin Ars Technica March 16, 2012

http://www.wired.com/threatlevel/2012/03/zero-days-for-chrome/ By Kim Zetter Threat Level Wired.com March 9, 2012

http://www.computerworld.com/s/article/9223675/Linux_vendors_rush_to_patch_privilege_escalation_flaw_after_root_exploits_emerge By Lucian Constantin IDG News Service January 24, 2012

http://www.wired.com/threatlevel/2012/01/scada-exploits/ By Kim Zetter Threat Level Wired.com January 19, 2012

http://www.computerworld.com/s/article/9222454/Hackers_exploit_Adobe_Reader_zero_day_may_be_targeting_defense_contractors By Gregg Keizer Computerworld December 6, 2011

http://www.eweek.com/c/a/Security/CyberCriminals-Targeting-Retailers-With-Nice-Pack-Exploit-Kit-SQL-Injection-108481/ By Fahmida Y. Rashid eWEEK.com 2011-10-13

http://www.computerworld.com/s/article/9218057/Researcher_Threats_from_zero_day_exploits_overhyped By Jeremy Kirk IDG News Service June 30, 2011