http://www.examiner.com/x-14651-Minneapolis-Information-Technology-Examiner~y2009m11d11-Cenzic-wants-to-make-sure-your-Web-site-is-healthy?cid=email-this-article
#Cenzic wants to make sure your #Web site is #healthy
http://www.darknet.org.uk/2009/11/ssl-renegotiation-bug-succesfully-used-to-attack-twitter/
#SSL #Renegotiation #Bug Succesfully Used To #Attack #Twitter
http://www.heise-online.pl/security/news/item/Krytyka-raportu-o-lukach-859104.html
#Krytyka #raportu o lukach
http://pentestit.com/2009/11/13/simple-small-114-tools-perl-penetration-testing
#Simple small 114 #tools in perl for #enumeration and #penetration #testing
http://chuvakin.blogspot.com/2009/11/more-pci-devil-defense.html
More #PCI #Devil #Defense
http://www.net-security.org/secworld.php?id=8490
#Facebook groups #hacked through design #flaw
http://www.foregroundsecurity.com/MyBlog/flash-origin-policy-issues.html
#Flash #Origin #Policy #Issues
http://www.foreignaffairs.com/articles/65499/wesley-k-clark-and-peter-l-levin/securing-the-information-highway
#Securing the #Information Highway
http://ha.ckers.org/blog/20091116/session-fixation-via-dns-rebinding/
#Session #Fixation Via #DNS #Rebinding
http://niebezpiecznik.pl/post/nowe-archiwum-exploitow-kontynuacja-milw0rma/
Nowe Archiwum #Exploitów — kontynuacja milw0rma?