»Nuestro I+D y repercusión en medios

ENLACES
http://www.schneier.com/blog/archives/2005/12/how_hackers_thi.html
http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-653.pdf
http://www.pentest.es/checkpoint_hack.pdf
http://www.theregister.co.uk/2007/10/03/check_point_pentest/
http://www.cisco.com/en/US/products/products_security_advisory09186a008059e470.shtml
http://xforce.iss.net/xforce/xfdb/36906
http://escert.upc.edu/index.php/web/es/publicacion,378,3.html
http://www.lavanguardia.es/premium/publica/publica?COMPID=51279351679&ID_PAGINA=22088&ID_FORMATO=9&turbourl=false
http://www.elmundo.es/papel/2006/09/09/economia/2022340.html
http://www.firmainf.es/pdf/bcnewsletters/2006%20-%2001-12%20Sumarios%20Banca%20Electronica.pdf
http://punto-informatico.it/1242082/Telefonia/News/Un-DoS-stronca-Bluetooth/p.aspx
http://www.noticiasdot.com/publicaciones/2003/0503/1905/noticias190503/noticias190503-1.htm
http://winterstorm.ca/download/emerging_xss_vulnerabilities_in_html_log_views.doc http://www.theregister.co.uk/2003/01/30/1m_hacking_challenge_product/
http://www.tla.ch/TLA/NEWS/2000sec/20000712CiscoFw-1.htm
http://blogs.techrepublic.com.com/security/?p=298
http://www.qtrust.de/news.php?newsid=5
http://www.infoworld.com/article/03/10/09/HNinfohacking_1.html
http://www.tietoviikko.fi/taustat/kaikki_jutut/article135642.ece?page=14
https://www.slideshare.net/vaceitunofist/not-onlyaxss
http://www.hispasec.com/unaaldia/1719
http://www.vsantivirus.com/vul-iplanet-terra.htm
http://www.internautas.org/html/3355.html
http://www.owasp.org/images/7/71/Seguridad-Multinivel-OWASP-2008.pdf
http://www.linux-magazine.com/online/news/holes_in_firewall_1
http://www.heise-online.co.uk/security/Several-buffer-overflows-in-Checkpoint-s-Firewall-1-update--/news/96860
http://vlex.com/vid/362364
http://www.computerworld.com/securitytopics/security/hacking/story/0,10801,85882,00.html?SKC=hacking-85882
http://www.pcworld.com/article/id,112862/article.html
http://www.castlecops.com/a3599-Infohacking_com_welcomes_hackers.html
http://www.ubuntu.com/usn/USN-145-1
http://www.vnunet.com/vnunet/news/2138154/bluetooth-hack-denial-service
http://xforce.iss.net/xforce/xfdb/16167
http://www.mandriva.com/security/advisories?name=MDKSA-2005:204
http://xforce.iss.net/xforce/xfdb/10567
ftp://ciac.llnl.gov/pub/ciac/bulletin/q-fy06/q-066.cisco.ios.http.server.command.injection.vulnerability.txt
http://www.delitosinformaticos.com/seguridad/noticias/113136362388860.shtml