AutoIt Used to Spread Malware and Toolsets – http://blog.trendmicro.com/trendlabs-security-intelligence/autoit-used-to-spread-malware-and-toolsets/
China is using espionage to acquire technologies to fuel its fast-paced military modernization program – http://uk.reuters.com/article/2013/05/07/uk-usa-defense-china-idUKBRE9450TV20130507
Open-source ruby project to handle the storage and linking of open-source intelligence – https://github.com/mgeide/poortego
A simple method for improving the security of hashed passwords: the maintenance of additional \honeywords (false passwords) associated with each user’s account – http://people.csail.mit.edu/rivest/pubs/JR13.pdf
Researchers Hack Building Control System at Google Australia Office – http://www.wired.com/threatlevel/2013/05/googles-control-system-hacked/
Internet Explorer zero-day exploit targets nuclear weapons researchers – http://arstechnica.com/security/2013/05/internet-explorer-zero-day-exploit-targets-nuclear-weapons-researchers/
Identifying and Exploiting Windows Kernel Race Conditions via Memory Access Patterns – http://j00ru.vexillium.org/?p=1695
A primer on Bitcoin risks and threats – https://www.net-security.org/secworld.php?id=14857
Globally networked risks are difficult to identify, map and understand, since there are often no evident, unique cause-effect relationships – http://www.sciencedaily.com/releases/2013/05/130501131943.htm
DNS cache poisoning, also known as DNS spoofing, is a type of attack that exploits vulnerabilities in the domain name system (DNS) to divert Internet traffic away from legitimate servers and towards fake ones – http://www.howtogeek.com/161808/htg-explains-what-is-dns-cache-poisoning/