This website uses cookies for security purposes only. We do not track you or see your data.
It was some time since I was not able to blog, but now online again – welcoming myself back …duh
If you enjoy challenges, especially forensic ones – here is another one brought by Honeynet project. It is suitable even…
For those of you that never heard for Zeus trojan – this is special bread that targets online banking users,…
During the second day of the 27th Chaos Communication Congress Karsten Nohl and Sylvain Munaut demonstrated why gsm calls and…
Bug hunting programs seem to gain more and more popularity those days. The new kid on the block is the…
IBM statistical based CRUSH system is going to be tested in real life: http://www.techwatch.co.uk/2010/07/26/police-to-use-%E2%80%9Cminority-report%E2%80%9D-style-crime-prediction-software/
To miss the target and to hit someone else instead can happen easily in a mil operation, but to deface…
Adobe still fights the ripples from the vulnerability announced on 15.12.2009. All the versions prior 9.2 are vulnerable to malicious…
NOSEC anonced a new DB security testing tool, called Pangolin. The free version of the product is able to test…