| Datum | Bron | Nieuws |
|---|
| 14-02 | The Hacker News | |
| 14-02 | The Hacker News | |
| 14-02 | The Hacker News | |
| 14-02 | The Hacker News | |
| 14-02 | The Hacker News | |
| 14-02 | The Hacker News | |
| 14-02 | The Hacker News | |
| 14-02 | The Hacker News | |
| 13-02 | The Hacker News | |
| 13-02 | The Hacker News | |
| 13-02 | The Hacker News | |
| 13-02 | The Hacker News | |
| 13-02 | The Hacker News | |
| 13-02 | The Hacker News | |
| 13-02 | The Hacker News | |
| 12-02 | The Hacker News | |
| 12-02 | The Hacker News | |
| 12-02 | The Hacker News | |
| 12-02 | The Hacker News | |
| 12-02 | The Hacker News | |
| 12-02 | The Hacker News | |
| 12-02 | The Hacker News | |
| 12-02 | The Hacker News | |
| 12-02 | The Hacker News | |
| 11-02 | The Hacker News | |
| 11-02 | The Hacker News | |
| 11-02 | The Hacker News | |
| 11-02 | The Hacker News | |
| 11-02 | The Hacker News | |
| 11-02 | The Hacker News | |
| 10-02 | The Hacker News | |
| 10-02 | The Hacker News | |
| 10-02 | The Hacker News | |
| 10-02 | The Hacker News | |
| 10-02 | The Hacker News | |
| 10-02 | The Hacker News | |
| 10-02 | The Hacker News | |
| 10-02 | The Hacker News | |
| 10-02 | The Hacker News | |
| 10-02 | The Hacker News | |
| 10-02 | The Hacker News | |
| 10-02 | The Hacker News | |
| 09-02 | The Hacker News | |
| 09-02 | The Hacker News | |
| 09-02 | The Hacker News | |
| 09-02 | The Hacker News | |
| 09-02 | The Hacker News | |
| 09-02 | The Hacker News | |
| 08-02 | The Hacker News | |
| 08-02 | The Hacker News | |
| 08-02 | The Hacker News | |
| 08-02 | The Hacker News | |
| 07-02 | The Hacker News | |
| 07-02 | The Hacker News | |
| 07-02 | The Hacker News | |
| 06-02 | Security Magazine | |
| 06-02 | The Hacker News | |
| 06-02 | The Hacker News | |
| 06-02 | The Hacker News | |
| 06-02 | Help Net Security | |
| 06-02 | Help Net Security | |
| 06-02 | Help Net Security | |
| 06-02 | Help Net Security | |
| 06-02 | Help Net Security | |
| 06-02 | Help Net Security | |
| 06-02 | Help Net Security | |
| 06-02 | Techcrunch | |
| 06-02 | Techcrunch | |
| 06-02 | Techcrunch | |
| 06-02 | Techcrunch | |
| 06-02 | Bleepingcomputer | |
| 06-02 | Bleepingcomputer | |
| 06-02 | Bleepingcomputer | |
| 06-02 | Bleepingcomputer | |
| 06-02 | Bleepingcomputer | |
| 06-02 | Bleepingcomputer | |
| 06-02 | Bleepingcomputer | |
| 06-02 | Bleepingcomputer | |
| 06-02 | Bleepingcomputer | |
| 06-02 | Bleepingcomputer | |
| 06-02 | Bleepingcomputer | |
| 06-02 | Bleepingcomputer | |
| 06-02 | Infosecurity | |
| 06-02 | Infosecurity | |
| 06-02 | Infosecurity | |
| 06-02 | Infosecurity | |
| 06-02 | Infosecurity | |
| 06-02 | Infosecurity | |
| 06-02 | Security Magazine | |
| 06-02 | The Hacker News | |
| 06-02 | The Hacker News | |
| 06-02 | The Hacker News | |
| 06-02 | The Hacker News | |
| 06-02 | The Hacker News | |
| 06-02 | The Hacker News | |
| 06-02 | The Hacker News | |
| 06-02 | The Hacker News | |
| 05-02 | Help Net Security | |
| 05-02 | Help Net Security | |
| 05-02 | Help Net Security | |