Recommended blog posts
You might be interested in the following related posts.
Beware of insecure-by-default libraries!
What is invisible to some hackers is visible to others
Benefits and risks of these increasingly used programs
Description and critique of CEH certifications
Injecting JS into one site is harmful, into all, lethal
So it's the app itself that delivers the cookie to me?
A Black Hat talk follow up
Chances are you're vulnerable with Microsoft Office