Recommended blog posts
You might be interested in the following related posts.
Beware of insecure-by-default libraries!
Outstanding incidents of this type of crime since 2011
Introduction to a trend of just over a decade ago
An interview with members of our hacking team
What is invisible to some hackers is visible to others
Watch out for keylogging/keyloggers
Benefits and risks of these increasingly used programs
Description and critique of CEH certifications