This is a list of interesting security-related links:
- Triton malware (registration required)
- Planet Money podcast on a phishing attack
- Podcast on history of cyber attacks
- Blog posts on x86 assembly:
- The Intel 80386, part 1: Introduction
- The Intel 80386, part 2: Memory addressing modes
- The Intel 80386, part 3: Flags and condition codes
- The Intel 80386, part 4: Arithmetic
- The Intel 80386, part 5: Logical operations
- The Intel 80386, part 6: Data transfer instructions
- The Intel 80386, part 7: Conditional instructions and control transfer
- The Intel 80386, part 8: Block operations
- The Intel 80386, part 9: Stack frame instructions
- The Intel 80386, part 14: Rescuing a stack trace after the debugger gave up when it reached an FPO function
- The Intel 80386, part 16: Code walkthrough
- X86 calling conventions
- Non-security vulnerabilities:
- Detailed description of ACLs in Windows
- Resources for the GDB debugger: