Listen

Description

Analyzing Malicious RTF Files

https://isc.sans.edu/forums/diary/rtfdump/21347/

Monitors Vulnerable To Remote Code Execution

http://motherboard.vice.com/read/hackers-could-break-into-your-monitor-to-spy-on-you-and-manipulate-your-pixels

Brute Forcing Encrypted Hard drive Protections

https://www.blackhat.com/docs/us-16/materials/us-16-OFlynn-Brute-Forcing-Lockdown-Harddrive-PIN-Codes.pdf

What is Using Your Webcam

http://www.welivesecurity.com/2016/08/04/afraid-someone-misusing-webcam/