Listen

Description

Cryptoanalysis of a Fully Homomorphic Encryption Scheme

http://eprint.iacr.org/2016/775.pdf

Recreating Android App Displays from Memory

https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_saltaformaggio.pdf

Various Router Exploits Released

https://medium.com/@msuiche/shadow-brokers-nsa-exploits-of-the-week-3f7e17bdc216#.mnoyydmeu