This website uses cookies for security purposes only. We do not track you or see your data.
If you enjoy challenges, especially forensic ones – here is another one brought by Honeynet project. It is suitable even…
For a long time I’ve refrained from commenting on the HBGary case. And that’s because everyone already spoke out louder…
For those of you that never heard for Zeus trojan – this is special bread that targets online banking users,…
During the second day of the 27th Chaos Communication Congress Karsten Nohl and Sylvain Munaut demonstrated why gsm calls and…
Bug hunting programs seem to gain more and more popularity those days. The new kid on the block is the…
IBM statistical based CRUSH system is going to be tested in real life: http://www.techwatch.co.uk/2010/07/26/police-to-use-%E2%80%9Cminority-report%E2%80%9D-style-crime-prediction-software/
Purely technical The attacker count on weaknesses in protocol implementation, application, OS, firmware etc.. Those attacks can be easily automated…
To miss the target and to hit someone else instead can happen easily in a mil operation, but to deface…
Adobe still fights the ripples from the vulnerability announced on 15.12.2009. All the versions prior 9.2 are vulnerable to malicious…
NOSEC anonced a new DB security testing tool, called Pangolin. The free version of the product is able to test…