Thursday, May 23, 2013
Identify Backdoors in Firmware By Using Automatic String Analysis
By Ruben Santamarta @reversemode The Industrial Control Systems Cyber Emergency Response Team ...
Tuesday, May 7, 2013
Bypassing Geo-locked BYOD Applications
By Gunter Ollmann, @gollmann In the wake of increasingly lenient BYOD policies within large co...
Tuesday, April 30, 2013
Fact or Fiction: Is Huawei a Risk to Critical Infrastructure?
By Gunter Ollmann - @gollmann How much of a risk does a company like Huawei or ZTE pose to U.S...
Thursday, April 18, 2013
InfoSec Europe 2013 - Security on Tap
By Gunter Ollmann, @gollmann It's that time of the year again as Europe's largest and most...
Tuesday, April 16, 2013
Can GDB's List Source Code Be Used for Evil Purposes?
By Alejandro Hernández @nitr0usmx One day while debugging an ELF executable with the GNU D...
Wednesday, April 10, 2013
What Would MacGyver Do?
By Sofiane Talmat @_Sud0 "The great thing about a map: it gets you in and out of places in ...
Tuesday, April 2, 2013
Spotting Fake Chips in the Supply Chain
By Christopher Tarnovsky @semiconduktor & Gunter Ollmann @gollmann In the information sec...
View web version