Software Vulnerabilities / Exploitation Vulnerabilities in software, browsers, applications, OS and hardware. Techniques for exploiting binary vulnerabilities, development of exploits, fuzzing tools.
Malware Analysis and creation of malicious code: viruses, Trojans, bots. Working with debuggers, sniffers and analyzers. Reviews, information, epidemics.