Security Scanners Tied to China Gov't, Military | Manufacturing Business Technology
antimalware - What could be the source of various AVG "Exploits" (Rogue Scanner, Fake Video Player, Social Engineering, etc)? - Information Security Stack Exchange
Armitage Scanning - Metasploit Unleashed
The Myth of the Hacker-Proof Voting Machine - The New York Times
Siberia Exploits Kit Features AV Scanner Module
Exploit-DB | Alexander V. Leonov
Discovering Rogue Access Points With Nmap - Security Weekly
KB3035] How do I use the ESET Rogue Application Remover (ERAR)?
Mobile device soft downgrading to GSM by rogue LTE base station | Download Scientific Diagram
The Dangers Rogue Antivirus Threats Pose - Threat Encyclopedia
AnchorWatch - A Rogue Device Detection Script for Windows with Email Alerts. I wrote a PowerShell script that scans subnet(s) every X minutes and sends email alerts on each discovery. : r/netsec
Router Exploit Kits: An overview of RouterCSRF attacks and DNS hijacking in Brazil - Avast Threat Labs
Hackers could use 'rogue barcodes' to take over your phone | Daily Mail Online
Installing Rogue-jndi on Kali Linux - Hacking Tutorials
Rogue security software (fake or rogue Anti-Virus) - AV-Comparatives
Remove Vista Antispyware 2012 (Uninstall Guide)
Vulnerability scanners: why you should start using them?
The top-10 web security threats you should avoid | BetaNews