skip to main |
skip to sidebar
Blogroll
-
Mideast countries disappointed by U.S. veto on Palestinian bid for full UN
membership
-
Countries in the Middle East have expressed their disappointment over a
U.S. decision to use its veto to deny Palestine's full membership in the
United Nat...
4 uur geleden
-
Friday Squid Blogging: Squid Trackers
-
A new bioadhesive makes it easier to attach trackers to squid.
Note: the article does not discuss squid privacy rights.
As usual, you can also use this s...
15 uur geleden
-
Sacramento airport goes no-fly after AT&T internet cable snipped
-
Police say this appears to be a 'deliberate act.'
Sacramento International Airport (SMF) suffered hours of flight delays
yesterday after what appears to b...
16 uur geleden
-
Ransomware in Q1 2024: Frequency, size of payments trending downwards, SMBs
beware!
-
More organizations hit by ransomware gangs are starting to realize that it
doesn’t pay to pay up: “In Q1 2024, the proportion of victims that chose to
pa...
1 dag geleden
-
Force Roofing Systems Can Help You Choose the Right Roofing Material for
Your Home
-
[image: franklin roofing]
As a homeowner, you know that your Mighty Dog Franklin is a vital
investment. It serves as your primary defense against the ch...
3 dagen geleden
-
Overview of Content Published in March
-
Here is an overview of content I published in March: Blog posts: Update:
metatool.py Version 0.0.4 SANS ISC Diary entries: Obfuscated Hexadecimal
Payload 1...
6 dagen geleden
-
Dancho Danchev's Cybercrime Life Magazine - Issue 01 - April - 2024
-
Dear blog readers,
I just released my first issue of Dancho Danchev's Cybercrime Life monthly
magazine which is entirety based on my recent research and ...
2 weken geleden
-
Recommended: AI-Powered SOC: it's the end of the Alert Fatigue as we know
it?
-
I recommended AI-Powered SOC: it's the end of the Alert Fatigue as we know
it? on TysonRhame.
About me: http://www.chuvakin.org
2 weken geleden
-
Google Public DNS’s approach to fight against cache poisoning attacks
-
Tianhao Chi and Puneet Sood, Google Public DNS
The Domain Name System (DNS) is a fundamental protocol used on the Internet
to translate human-readable dom...
3 weken geleden
-
BEC Scammers Adventures on the Run
-
Last week the case of Valentine FOMBE was finally brought to a close. FOMBE
was sentenced to 144 months in Federal prison and ordered to pay $325,856
in...
3 weken geleden
-
The Show Must Go On
-
It has been a long time since I last posted on this site. Truth be told it
was broken for at least three years. Nothing quite like having some free
time ...
3 weken geleden
-
A Look At Threat Intel Through The Lens Of Kimsuky
-
Rapid7 recently shared a fascinating post regarding the Kimsuky threat
actor group making changes in their playbooks, specifically in their
apparent shif...
4 weken geleden
-
C can be memory safe, part 2
-
This post from last year was posted to a forum, so I thought I'd write up
some rebuttals to their comments.
The first comment is by David Chisnall, creat...
2 maanden geleden
-
All Good Things…
-
I’ve been doing the Forensic 4:cast Awards for 15 years. Just to give you
some context of how long I’ve been doing this… In 2009, when the awards
started: ...
2 maanden geleden
-
Best EDR Of The Market (BEOTM) – Endpoint Detection and Response Testing
Tool
-
BestEDROfTheMarket is a naive user-mode EDR (Endpoint Detection and
Response) tool designed to serve as a testing ground
3 maanden geleden
-
Acunetix now on Invicti.com
-
From Release 24.1 in mid-January 2024, access to the Acunetix platform and
any emails sent will be via our new domain app.invicti.com. Read on to
learn m...
4 maanden geleden
-
Deleting Duplicate Notes in Notes.app using AppleScript
-
I found myself digging through my Notes.app the other day and, lo and
behold, there was a whole bunch of duplicate notes hanging around. Pretty
sure I goof...
4 maanden geleden
-
November 2023 SecKC Presentation: Mobile SDR
-
Thanks to all who showed up and asked questions!
We are proud members of the Security Bloggers Network.
This content originally posted on HiR Information ...
5 maanden geleden
-
Practical Digital Forensics (Book 2023)
-
Practical Digital Forensics. Forensic Lab Setup, Evidence Analysis, and
Structured Investigation Across Windows, Mobile, Browser, HDD, and Memory
ISBN: 978...
8 maanden geleden
-
Sheriff Mack Takes Peace Officers Back In Time for A Compassion Check
-
Sheriff Mack Takes Peace Officers Back In Time for A Compassion Check Login
and Watch This Week's Webinar Join the Posse and Help Save America
8 maanden geleden
-
My Last Email with W. Richard Stevens
-
In the fall of 1998 I joined the AFCERT. I became acquainted with the
amazing book *TCP/IP Illustrated, Volume 1: The Protocols* by W. Richard
Stevens...
9 maanden geleden
-
Demo AWS
-
I apologize for the difficulties you're experiencing. An exit code of 11
usually indicates a segmentation fault or invalid memory access error. This
er...
10 maanden geleden
-
-
My First Encounter
-
The Hospital My first encounter happened with an unusual twist. I was in
the waiting room of the hospital that my mom was in. She was there because
she had...
2 jaar geleden
-
Efren Reyes Net Worth 2022 | All about Income, Earning, Wealth and more
-
Net Worth: $1,386,000 Approx. Income: $384,653 Approx. Estimated current
Net Worth of Efren Reyes is $1,386,000, which mostly depends on the
estimated inco...
2 jaar geleden
-
Introducing OCI IAM Identity Domains
-
A little over a year ago, I switched roles at Oracle and joined the Oracle
Cloud Infrastructure (OCI) Product Management team working on Identity and
Acc...
2 jaar geleden
-
Why Are Humans The Weakest Link In Cybersecurity?
-
Technology exists to enable people. Whether they use it for personal or
professional reasons, people are the common link driving technology
adoption. On ...
2 jaar geleden
-
Prevention is Better Than Cure: The Ransomware Evolution
-
Ransomware tactics have continued to evolve over the years, and remain a
prominent threat to both SMBs and larger organisations. Particularly during
the p...
2 jaar geleden
-
China Is Building A Second Nuclear Missile Silo Field
-
The Chinese missile silo program constitutes the most extensive silo
construction since the US and Soviet missile silo construction during the
Cold War.
2 jaar geleden
-
Benefits of sex apps for women
-
In principle, it is easier for women to get casual sex than for men. So
until now, getting to know each other via sex apps was not absolutely
necessary in ...
2 jaar geleden
-
Pentagon Sees “Increased Potential” for Nuclear Conflict
-
The possibility that nuclear weapons could be used in regional or global
conflicts is growing, said a newly disclosed Pentagon doctrinal
publication on nuc...
2 jaar geleden
-
++ ????? ???? ?????? 14 ??????? ??? – ???? 14 ## ????.. ????? ???? ??????
14 ????? ?? ????? ???? ????? –
-
?????? ?????? ?????? 14 ??????? ??? ?? ??????? ?????? ????? ???? | ?????
???? ????? ????? ????? 2021 ???? ?????? 14 | ????? ???? ?????? 14
??????? ???1 ???...
2 jaar geleden
-
Jupyter Notebook for crt.sh Queries
-
I created a Jupyter Notebook to query the crt.sh website, dump the results
into a pandas data frame, and then printing out the unique list of results
to th...
3 jaar geleden
-
Shipments of nearly 20,000 fake driver's licenses seized at Chicago airport
-
USA is probably the world champion of fake IDs due to one oddity - young
people aren't allowed into bars. So they get fake IDs that put their age
over 21. ...
3 jaar geleden
-
Building Non-Functional Requirements Framework - Requirements Categories
-
*I'm planning on documenting a framework that we built for managing
non-functional requirements. This is post #2 of the series.*
In Post #1, Last In - F...
3 jaar geleden
-
1950 Mercury Christmas Present
-
As a gift, or sometimes more like a curse, my dad passed down his love of
classic cars to his children. Each of us has our favorites, and one of mine
is ...
3 jaar geleden
-
20 years of CGISecurity: What appsec looked like in the year 2000
-
Just realized that 20 years have passed since I started this site to learn
more about web security threats. What 'appsec' looked like in 2000 OWASP
didn't ...
3 jaar geleden
-
So long, and thanks for all the fish
-
This will be the final post in this space. I've retired from the practice.
I'll leave this free resource up as an artifact and a reference. So long,
and t...
3 jaar geleden
-
The Massive Shift to Cyber Crime
-
There is a cartoon in The New Yorker of March 30, 2020 showing four
mobsters, one with a gun, sitting around a table. The caption reads: “For
health and sa...
3 jaar geleden
-
7 VPNs that leaked their logs – the logs that “didn’t exist”
-
Just how private is your Virtual Private Network?
3 jaar geleden
-
7 VPNs that leaked their logs – the logs that “didn’t exist”
-
Just how private is your Virtual Private Network?
3 jaar geleden
-
Top 5 Steps to Immerse yourself into the cybersecurity field
-
This blog provides details about how to start your career in Cybersecurity
3 jaar geleden
-
WeirdAAL update - get EC2 snapshots
-
I watched a good DEF CON video on abusing public AWS Snapshots
https://www.youtube.com/watch?v=-LGR63yCTts
I, of course, wanted to check this out. There a...
3 jaar geleden
-
Immigrants and Billionaires: Why are We Blaming Them?
-
The blame game is a tricky effort these days. Maybe its part of the
problem, not the solution. I cringed at many of the comments made across
this year’s po...
3 jaar geleden
-
Hello world!
-
Welcome to WordPress. This is your first post. Edit or delete it, then
start writing!
4 jaar geleden
-
ECB's Christine Lagarde on Cyber Risk in Financial Systems
-
But cyber risk is becoming important for financial stability, too.
As forthcoming analysis from the European Systemic Risk Board shows, there
are plausib...
4 jaar geleden
-
The Oldest Casinos in Las Vegas
-
Las Vegas is one name that strikes our minds each time we think about
having a bachelor party. The place has its own unique features that make it
an idea...
4 jaar geleden
-
RCE Using Caller ID - Multiple Vulnerabilities in FusionPBX
-
Aon’s Cyber Solutions has recently discovered several vulnerabilities in
FusionPBX, an open-source VoIP PBX application that runs on top of the
FreeSWITC...
4 jaar geleden
-
Aging Navy Destroyers Will Get Radar Upgrades to Counter Threats from
China, Russia
-
The Navy is taking a big step toward keeping some of its aging destroyers
in the fight.
5 jaar geleden
-
Huddle House Reports Point of Sale Hacked Since August 2017
-
If you had a meal at Huddle House and used a payment card -- you might want
to give the issuing financial institution a call (or review your account
onlin...
5 jaar geleden
-
The Long Night is Coming
-
Written by an anonymous friend who also ...
5 jaar geleden
-
KAI OS Forensics for Money and Profit
-
The last month I have been forensically analyzing the KAI OS 2.5, formally
FireFox OS. We are seeing a bunch of these feature phones in our lab.
Download ...
5 jaar geleden
-
Attack Overview - Video
-
There are generally two reasons an individual or an organization is
attacked. One, you are specifically targeted or two, you are a target of
opportunity.
...
5 jaar geleden
-
The murder evidence evaporated, but Jeffrey Havard still sits in a
Mississippi prison
-
The following opinion by Radley Balko was published by the Washington Post
on September 19, 2018.
In 2002, Jeffrey Havard was convicted in Mississippi of s...
5 jaar geleden
-
Lucky Break
-
One of the things I do from time to time is throw out an open ended
question on Twitter. Sometimes I’m making a point, sometimes I just want
to amuse myse...
5 jaar geleden
-
Prueba
-
Esto es una prueba
TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAA0AAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSB...
5 jaar geleden
-
Kjøp bitcoin
-
Kjøp Bitcoin med kredittkort Bitcoin er som sagt en av de ressursene som
folk gjerne vil ha en liten del av i tilfelle det blir en enda sterke
ressurs elle...
5 jaar geleden
-
Leaky Amazon S3 Buckets: Challenges, Solutions and Best Practices
-
Amazon Web Service (AWS) S3 buckets have become a common source of data
loss for public and private organizations alike. Here are five solutions
you can ...
5 jaar geleden
-
Moving blog to HolisticInfoSec.io
-
toolsmith and HolisticInfoSec have moved.
I've decided to consolidate all content on one platform, namely an R
markdown blogdown site running with Hugo for ...
5 jaar geleden
-
How to Speed Up Macbook
-
Is Mac running too slow? Here are some performance hints and software
suggestions to speed up Mac or MacBook and make it run faster. If…
5 jaar geleden
-
Content Security Policy in Practice
-
The implementation of Content Security Policy to leverage web browser
capability in protecting a web application from cross-site scripting attack
has been ...
5 jaar geleden
-
Google's AI Policy: We're Ditching Project Maven, But Not the Feds
-
Google unveiled a new artificial intelligence ethics policy after
abandoning its involvement in a Pentagon project to use AI for analyzing
drone footage. B...
5 jaar geleden
-
Splunk acquires Phantom Cyber
-
I hope it doesn't come across as too cynical, the observation that most
acquisitions in the tech domain fail to produce anything useful and often
as not w...
6 jaar geleden
-
Overview of Petya, a rapid cyberattack
-
In the first blog post of this 3-part series, we introduced what rapid
cyberattacks are and illustrated how they are different in terms of
execution and ou...
6 jaar geleden
-
Information Security Events For February
-
Here are information security events in North America this month: BSides
Huntsville : February 2 to 3 in Huntsville, AL, USA BSides Seattle 2018 :
Fe...
6 jaar geleden
-
Phishing: customers Tele2 target by phishers
-
MX Lab, http://www.mxlab.eu, started to intercept a phishing campaign that
targets Dutch speaking clients of Tele2, a telecom company offering
internet c...
6 jaar geleden
-
AU-6, AU-7 and AU-9 On the Cheap
-
SIEM or SEIM or Log Correlation tools are generally considered expensive. I
won’t get into the particulars of what is or is not expensive for you or
your...
6 jaar geleden
-
The Ethical Hacker Network Rises from the Ashes
-
[image: A phoenix depicted in a book of legendary creatures by FJ Bertuch
(1747–1822)]This past summer while attending Black Hat and DEF CON, I was
appro...
6 jaar geleden
-
If You Only Have Half a Day in Ubud
-
When you are in Bali, don’t forget to pick up Ubud as one of your
destination. This town has its old world charm, with its many to offer to
stay around the...
6 jaar geleden
-
Episode #181: Making Contact
-
Hal wanders back on stage
Whew! Sure is dusty in here!
Man, those were the days! It started with Ed jamming on Twitter and me
heckling from the audience. T...
6 jaar geleden
-
The University Computer Lab, the Pro Se Complaint and False Arrest
-
This post examines a recent decision from a federal District Court Judge
who sits in the U.S. District Court for the Middle District of Tennessee: *Molthan...
6 jaar geleden
-
Wfuzz 2.2.0 released
-
I'm pleased to announce a new version of WFuzz!
Wfuzz has been created to facilitate the task in web applications
assessments and it is based on a simple c...
6 jaar geleden
-
EnCase v8 EnScript - Check hash values for tagged files to VirusTotal
-
This is an update to the original (v6 & v7) EnScript to check the hash
value(s) of tagged files to VirusTotal.
Tag any file(s) you want to check with "Chec...
6 jaar geleden
-
Fuzzing PJSIP and chan_skinny, vulnerability information and advisories
-
In the recent past, Alfred Farrugia and myself started looking at *fuzzing*
OpenSource VoIP projects such as Asterisk, FreeSWITCH and Kamailio and
their de...
6 jaar geleden
-
MD5
-
329c255929ee2fbb1aec9f7556d53f47
6 jaar geleden
-
V2V Communications security considerations
-
The future of vehicles, road infrastructure and driving are changing. We
are progressing with vehicle-to-vehicle (V2V) and vehicle-to-infrastructure
(V2I) ...
6 jaar geleden
-
Why LiveJournal
-
Somebody recently asked me why I stick with LiveJournal after all of these
years. It's because of Frank, http://www.livejournal.com/site/goat.bml
7 jaar geleden
-
HackerNinjaScissors - Lauren Pearce - Journey of a Malware Analyst
-
HackerNinjaScissors -- With Bret Padres. www.crypsisgroup.com
Today we talk with Lauren Pearce - a member of the IR team and a malware
analyst for Los A...
7 jaar geleden
-
Patient Safely, Validated State, and Cyber Security! OH MY!
-
There are some interesting influences on medical devices related to cyber
security (yeah, I know, cyber. Common parlance is common parlance.) that
you may ...
7 jaar geleden
-
Quick note on troubleshooting password based Kerberos authentication on a
Palo Alto Networks firewall
-
While endeavoring to test a Kerberos based authentication profile on a
clients Palo Alto Networks I ran into a couple of error messages that need
a little ...
7 jaar geleden
-
Big Data Needs Big Security. Here’s Why.
-
In case you thought that big data was no longer a big deal, think again.
IDC predicts continued double-digit growth for big data and business
analytics thr...
7 jaar geleden
-
Emergency Currency
-
Originally posted on Nature's Access:
I know the following info is common sense to experienced Preppers. But,
maybe not so much for many of my readers who ...
7 jaar geleden
-
Adaptive Security
-
Originally posted on The not-so-unbearable lightness of technology:
Security is a huge topic that always appears as a top priority in the
agendas of govern...
7 jaar geleden
-
Status Update
-
All:
Every once in a while, I get an e-mail about the status of the blog.
Here's an (overdue...) update! Unfortunately, large-scale IMINT blogging
is on...
7 jaar geleden
-
Links to recent TDoS articles
-
11/03/2016 - The day the 911 network stood still
http://www.networkworld.com/article/3137526/security/the-day-the-911-network-stood-still.html
10/24/2016 -...
7 jaar geleden
-
Be more productive with Skype Preview 11.9 for Windows 10
-
Today we’re rolling out Skype Preview 11.9 for Windows 10 PCs and phones as
we continue to bring new features following the Anniversary Update. This
upda...
7 jaar geleden
-
-
Core Security Combines Identity, Vulnerability, and Now Network Detection
and Response
-
SYS-CON
The post Core Security Combines Identity, Vulnerability, and Now Network
Detection and Response appeared first on Damballa.
7 jaar geleden
-
July 2016 security update release
-
Today we released security updates to provide additional protections
against malicious attackers. As a best practice, we encourage customers to
apply secur...
7 jaar geleden
-
Miley Cyrus adopts dog
-
Miley Cyrus has adopted another dog. The ‘Wrecking Ball’ hitmaker – who has
taken in a number of furry friends over the past four years including a pet
p...
7 jaar geleden
-
Free tools to design your website
-
Do you need to build a site without needing to know any HTML or other geeky
stuff? I picked the finest web site builders to bring your vision of your
dream...
7 jaar geleden
-
Secure Development Blog
-
We’re proud to announce Secure Development at Microsoft, our developer
focused security blog at Microsoft. The blog was created to inform
developers of new...
8 jaar geleden
-
Enhanced Mitigation Experience Toolkit (EMET) version 5.5 is now available
-
The Enhanced Mitigation Experience Toolkit (EMET) benefits enterprises and
all computer users by helping to protect against security threats and
breaches t...
8 jaar geleden
-
Soon�
-
Posted by Sean @ 12:52 GMT
------------------------------
Our "construction project" is progressing nicely.
[image: A work in progress]
And it should res...
8 jaar geleden
-
Dump Tools: Cut Cut Cut … [Didier Stevens]
-
I added a new option to my different dump tools (oledump, emldump,
base64dump, zipdump and the new rtfdump): the cut option. And I will also
release a stan...
8 jaar geleden
-
Security Strategy?
-
I've worked a lot in security environments where strategy is unclear. I've
worked a little in places where strategy is very clear. I've NEVER worked
in a p...
8 jaar geleden
-
OWASP DC: July 1
-
The DC chapter of OWASP is meeting on 7/1. Topic: SQLViking: Pillaging Your
Data
Read more →
8 jaar geleden
-
Hackable Houses and Compromised Cars
-
*The following is a guest post written by Lucy C., a co-op student from
Lisgar Collegiate Institute in Ottawa.*
The idea of having a smart home or a smart ...
9 jaar geleden
-
Developing an IR Process and Team
-
In our world today, we have an abundance of many things, among which are
–unexpected events. Falling meteorites, terrorist attacks, hacktivist
demonstratio...
9 jaar geleden
-
Imaging drives protected with Apple FileVault2 encryption
-
Recognising FileVault2 encryption
Apple FileVault 2 facilitates full disk encryption and requires OS X Lion
or later and OS X Recovery installed on the st...
9 jaar geleden
-
One Step Ahead Part 3
-
One Step Ahead Part 3 is out on the Nuix blog, Unstructured!
9 jaar geleden
-
I am not suffering from blogger’s block.
-
I post rarely on this blog, but not because I am suffering from blogger’s
block; on the contrary, I have too many ideas and exciting things to share.
Unlik...
9 jaar geleden
-
Cyberspace 2025 Student Essay Contest
-
Posted by: Kevin Sullivan, Principal Security Strategist, Trustworthy
Computing When Sam Coxwell submitted his entry to last year’s Microsoft
cybersecurity...
9 jaar geleden
-
IGF Boycott Statement
-
IGF Boycott Statement 18 August, 2014 You can download a formatted and
footnoted PDF version from here The objective of each annual IGF programme
is to max...
9 jaar geleden
-
July Security Alert
-
Hi Oracle Security Folks, The July Oracle Security Alert is out. My part is
smaller than last quarter as just an In-Depth Credit, but Mr David
Litchfield m...
9 jaar geleden
-
pStorage, A PersistJS Wrapper for AJAX
-
I Recently came across PersistJS when I wanted to build a caching layer […]
9 jaar geleden
-
RSA Announces End of RSA Security Conference
-
Aims to bring clarity to cloudy marketing messages through exhibit hall
chotskies Bedford, MA., – April 1, 2014 – RSA, the security division of
EMC, today ...
10 jaar geleden
-
Citi Faces SEC and Mexican Probes Over $235m Banamex Fraud
-
http://www.ibtimes.co.uk/citi-faces-sec-mexican-probes-over-235m-banamex-fraud-1438605
10 jaar geleden
-
Building Rich Internet Applications Models: Example of a Better Strategy
-
Crawling “classical” web applications is a problem that has been addressed
more than a decode ago. Efficient crawling of web applications that use
advanced...
10 jaar geleden
-
AoIS Resurrection… to blogs.Gartner.com
-
As you may have noticed there has been no activity on Art of Information
Security for a long time. Things got really busy in my work and personal
lives, an...
10 jaar geleden
-
Some Mindmaps Online
-
Over the years I have developed many mind maps when writing articles, and
I have also used them as a way of collecting information and organising it.
I wa...
10 jaar geleden
-
Ubuntu 13.04 Released Today and So Is Ubuntu Kylin 13.04
-
Official download site:
http://www.ubuntu.com/download
Ubuntu Chinese Desktop distros, including the new Kylin:
http://www.ubuntu.com/download/desktop/zh-CN
10 jaar geleden
-
It was bound to happen sooner or later...
-
Well - it happened. Brian Katz (@bmkatz) gave me a soapbox to stand on
last week - and this is the
result. http://www.thecloudcast.net/2013/04/the-mobilec...
11 jaar geleden
-
HITB Malaysia - Day 1
-
I am currently attending Hack In The Box (HITB), a major security
conference in Kuala Lumpur, Malaysia. This is the first security
conference I have att...
11 jaar geleden
-
-
New PGP key
-
Just a short notice that I updated my PGP key. Barely anyone ever used my
key and sent me encrypted email. But as I'm lately getting more involved in
CER...
12 jaar geleden
-
Moving House
-
Yes, we are :)
*Click the image to visit the new GFI Labs Blog*
An inevitable move, this. After all, Sunbelt Software has been part of GFI
Software for m...
12 jaar geleden
-
mimikatz: Tool To Recover Cleartext Passwords From Lsass
-
I meant to blog about this a while ago, but never got round to it. Here’s a
brief post about very cool feature of a tool called mimikatz. I’m very
grateful...
12 jaar geleden
-
Evtx Parser Version 1.1.1
-
I'm releasing version 1.1.1 of the Windows Eventlog Parser library and
tools collection for Perl. This version fixes a memory leak. I thank Heinz
Mueller f...
12 jaar geleden
-
Congressman lambastes Chinese cyber-espionage
-
From the Washington Post,
The chairman of the House intelligence committee on Tuesday launched a
broadside against the Chinese government and its efforts t...
12 jaar geleden
-
Unnatural Selection by Mara Hvistendahl
-
Mara Hvistendahl has been a very good friend here at TDV and in addition to
Mara’s extensive knowledge of Chinese hackers, she is pretty much an expert
on ...
12 jaar geleden
-
On the sophistication of attacks
-
If they appear unsophisticated, you will believe that they are not capable
of more.
If you believe that is all they are capable of, you will assume they ar...
13 jaar geleden
-
Help Fix Google Privacy Campaign: Submit Your Comments
-
The FTC is seeking public comment on its proposed Agreement with Google
regarding Google Buzz, and EPIC wants your voice to be heard! Use the form
below ...
13 jaar geleden
-
Spoiled Rotten Spa Owner Arrested, Charged With Fraud
-
Woman Made Fraudulent Credit Card Charges, Police Say
APTOS, Calif. -- The former owner of Spoiled Rotten Day Spa in Aptos was
arrested Friday after sever...
13 jaar geleden
-
Health Net slow to tell members of security breach
-
Health Net slow to tell members of security breach: “” (Via .)
13 jaar geleden
-
New NIE on Iran nuke program appears to differ little from 2007 findings
-
The U.S. intelligence community has completed a new National Intelligence
Estimate for President Barack Obama and Congress on Iran's nuclear program.
The k...
13 jaar geleden
-
ISACA Review: Hacking Exposed Wireless 2nd Edition
-
A special thanks to Horst Karin for posting a great review of my new book,
Hacking Exposed Wireless 2nd Edition on the ISACA website. If you haven’t
alread...
13 jaar geleden
-
John D. Solomon, 1963-2010
-
John Solomon, the life-affirming voice of this blog, died Monday, November
1, from complications following a bone marrow transplant for leukemia. He
was 47...
13 jaar geleden
-
Domain Name Generator for Murofet
-
This post describes a technique that allows building a domain name
generator for Murofet.
The pseudo-random domain generators are not new – these were prev...
13 jaar geleden
-
On the way back home
-
The trip is over and was definitely a success, sitting in BWI airport about
to catch the first thing smoking back to Seattle via Air Tran. Time to fly
home...
13 jaar geleden
-
Declarative Security and Reflection
-
If you’re using the CustomAttributeData APIs to examine declarative
security permission, you might notice that the returned information looks a
little stra...
13 jaar geleden
-
Not Another Penetration testing course
-
Have you ever attended a Penetration testing course?Have you found it
vague/boring? Far from what your clients are asking you?If your answer is
no, you can...
14 jaar geleden
-
Not Another Penetration testing course
-
Have you ever attended a Penetration testing course?Have you found it
vague/boring? Far from what your clients are asking you?If your answer is
no, you can...
14 jaar geleden
-
End of Innocence
-
Staff Sergeant George Nickel is in court again today. Hopefully, this will
be the last time. Hopefully, we’ll see him go somewhere where he can get
the hel...
14 jaar geleden
-
Black Hat USA 2010 Training: Pentesting with Backtrack by Offensive Security
-
This intense four day hands on course is taught by the creators of
Backtrack. The course has sold out by June with double digit waitlist every
year that we...
14 jaar geleden
-
News: Change in Focus
-
Change in Focus
14 jaar geleden
-
Review of "Inside Cyber Warfare" posted
-
Yes, I've been on a reading kick lately, and my most recent selection was
Jeffrey Carr's *Inside Cyber Warfare: Mapping the Cyber Underworld*. I'm
not rea...
14 jaar geleden
-
Dual Sims Coming In 2010!
-
Want to have both your Business AND Personal calls coming in on the same
phone?
*http://tinyurl.com/ybexv2n*
14 jaar geleden
-
CN Less Clearly
-
On December 11, the China Internet Network Information Center (CNNIC)
announced that individuals hoping to register .CN domain names are now
required to pr...
14 jaar geleden
-
Top Ten Web Security Risks
-
Some commentary on my new blog at www.spiresecurity.com.
14 jaar geleden
-
Certifications are Evil.....By John McCash
-
Note: The following does not represent the opinion of Mark McKinnon. He
merely had the good grace to allow me a forum in which to post it after it
was re...
14 jaar geleden
-
Released : Windows SDK for Windows 7
-
Hi The RTM release of SDK samples for Windows 7 is now available for
download. The samples can be downloaded in ISO format or Web Setup
format. This rele...
14 jaar geleden
-
IMPORTANT REMINDER: My Blog and RSS Feed Have Moved To
http://www.rationalsurvivability.com/blog
-
This will be my last post here, so please adjust your landing accordingly
to now point to: www.rationalsurvivability.com/blog If you're using an RSS
reader...
14 jaar geleden
-
Actions against registry services abuse – Report April 2009
-
The above in figures review the recent actions of Directi, in conjunction
with HostExploit independent advice, taken to track down and stop abusive
dom...
15 jaar geleden
-
We are moving
-
as of now, please refer to http://blog.remes-it.be aka 'The Security
Kitchen'.
This blog is officially closed.
15 jaar geleden
-
Email RFC 2142
-
I am always amazed at the wealth of talent on the SANS alumni email list.
Yesterday, someone asked "what email address do you use for security? If
someone ...
15 jaar geleden
-
We Have Moved
-
Good day, Paul Cooke here. The Windows Vista Security blog has been a
great avenue for us to talk with you about what has made Windows Vista the
most sec...
15 jaar geleden
-
ICS and "Where Do I Start"
-
It is a surprisingly simple question, but one that I am not accustomed to
answering, and I think that I did a poor job in addressing. I basically
pointed t...
15 jaar geleden
-
RegRipper, regview, and Bluetooth Registry Settings
-
During DFRWS '08, I thought it might be worthwhile to have an easy way to
make RegRipper plugins. In fact, I asked Harlan if he had a plugin
generator; bac...
15 jaar geleden
-
Identity theft 'main purpose of phishing'
-
Identity theft and fraud are among the main driving forces behind phishing
attacks, it has been suggested.
The Daily Vidette, news publication of Illinois ...
15 jaar geleden
-
post removed
-
15 jaar geleden
-
Facebook Worm?
-
Details are sketchy at this point, but is Facebook undergoing an XSS worm
attack? I checked with my Aunt, and she thinks someone may have stolen her
passwo...
16 jaar geleden
-
Considering Taking the CISSP? – Consider This!
-
I am a big fan of computer based training – I think the potential for this
is enormous especially for organizations that are looking to train large
numbe...
16 jaar geleden
-
RBN – PC Hijacking via Banner-Ads on Major Web Portals
-
The Russian Business Network (RBN) in one of its boldest PC hijacking
exploits used conventional banner-ads to redirect web visitors to “fake”
anti-spyware...
16 jaar geleden
-
Migrating from NTLM to Negotiate in a nutshell
-
Migrating to Negotiate from NTLM is quite simple in most cases. It breaks
down into these four simple steps: First, build an SPN for your Service
When I t...
17 jaar geleden
-
Experts divided on Microsoft worm threat
-
Security experts are divided over the effects of the latest rash of worms
that exploit a vulnerability in Microsoft's Plug-and-Play software.
There have be...
18 jaar geleden
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-