More info : http://www.carrotmob.org/
My colleague Alexios gave a talk about evading XSS filters at the recent OWASP conference, what strikes me is the multitude of ways you can do it. I am sure you find something you didn't know when watching it :
NIST recently published the Special Publication 800-121 "Guide to Bluetooth Security". I skim read it and while it certainly is a good overview it seriously lacks in some areas. Unfortunately I concentrated on other areas than bluetooth the last year and after doing the 23C3 speech and publishing BTCrack I have not really dug further. Maybe it's time to digg into it again a bit more.
Need an argument to sell a secure development lifecycle to upper management ?
Present them this (probably) hand drawn scientific chart:
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\myapp.exeDebugger = REG_STRING c:\debuggers\windbg -g