Binary Planting Goes “Any File Type”
http://blog.acrossecurity.com/2011/07/binary-planting-goes-any-file-type.html

On-screen Keyboards Considered Harmful
http://blog.thinkst.com/2011/07/on-screen-keyboards-considered-harmful.html
http://thinkst.com/stuff/ocv/
http://thinkst.com/stuff/ocv/osk-thinkst.pdf

Mozilla’s BrowserID offered as an alternative to OpenID
http://www.h-online.com/security/news/item/Mozilla-s-BrowserID-offered-as-an-alternative-to-OpenID-1280136.html
http://identity.mozilla.com/post/7616727542/introducing-browserid-a-better-way-to-sign-in
http://identity.mozilla.com/post/7669886219/how-browserid-differs-from-openid
https://browserid.org/

Process Explorer v15.0
http://technet.microsoft.com/en-us/sysinternals/bb896653

Analysis of the jailbreakme v3 font exploit
http://esec-lab.sogeti.com/post/Analysis-of-the-jailbreakme-v3-font-exploit

Apple Laptops Vulnerable To Hack That Kills Or Corrupts Batteries
http://blogs.forbes.com/andygreenberg/2011/07/22/apple-laptops-vulnerable-to-hack-that-kills-or-corrupts-batteries/

Nominations for the 2011 Pwnie Awards announced
http://pwnies.com/nominations/

Researchers Expose Cunning Online Tracking Service That Can’t Be Dodged
http://www.wired.com/epicenter/2011/07/undeletable-cookie/
http://ssrn.com/abstract=1898390

A Security Analysis of Next Generation Web Standards
http://www.enisa.europa.eu/act/application-security/web-security/a-security-analysis-of-next-generation-web-standards/
http://www.enisa.europa.eu/act/application-security/web-security/a-security-analysis-of-next-generation-web-standards/at_download/fullReport

Revealed: Operation Shady RAT
http://blogs.mcafee.com/mcafee-labs/revealed-operation-shady-rat
http://www.mcafee.com/us/resources/white-papers/wp-operation-shady-rat.pdf

Metasploit Framework 4.0 Released
https://community.rapid7.com/community/metasploit/blog/2011/08/01/metasploit-40-released
https://dev.metasploit.com/redmine/projects/framework/wiki/Release_Notes_400
http://www.metasploit.com/download/

Volatility 2.0 Released
http://volatility.tumblr.com/
https://www.volatilesystems.com/default/volatility

The Winners
http://pwnies.com/winners/

Microsoft BlueHat Prize
http://www.microsoft.com/security/bluehatprize/
http://www.microsoft.com/security/bluehatprize/rules.aspx

When Advanced Persistent Threats Go Mainstream
http://www.rsa.com/innovation/docs/SBIC_RPT_0711.pdf

CSI:Internet - Living in SYN
http://www.h-online.com/security/features/CSI-Internet-Living-in-SYN-1288568.html

Firefox - Strengthening User Control of Add-ons
https://blog.mozilla.com/addons/2011/08/11/strengthening-user-control-of-add-ons/

Legal dispute over “eternal” cookies
http://www.h-online.com/security/news/item/Legal-dispute-over-eternal-cookies-1323818.html

IT Threat Evolution: Q2 2011
http://www.securelist.com/en/analysis/204792186/IT_Threat_Evolution_Q2_2011

Bitcoin mining with Trojan.Badminer
http://www.symantec.com/connect/blogs/bitcoin-mining-trojanbadminer