Time flies like an arrow - Fruit flies like a banana


Hacker Lexicon: What Is …?

What Is HTTPS? For all the attention that the iPhone’s encrypted storage and Whatsapp’s new end-to-end messaging encryption have gotten over the last few months—particularly from the US Justice Department – you’d think that encryption is just now hitting the mainstream. But in fact, you and billions of other people been using a less-loudly appreciated […]

Exploit Kits: Hunting the Hunters

Exploit kits are one of the threats that is ever present on the Internet. Indiscriminately compromising users that are simply surfing websites. As ransomware has exploded so has the proliferation of these exploit kits. This combination of ransomware, tor, and bitcoin has created a financially lucrative monster. One of the challenges with investigating exploit kits […]

Have USB Will Travel

I regularly find myself writing about USB sticks. Why am I currently obsessing over these cheap dongles, which many have come to regard as fundamentally obsolete? Because they’re still useful. But how does this actually work in practice? You might have concerns that running a desktop operating system on a USB flash drive would be […]

Layered Security

While no single strategy can prevent malicious activity, the effectiveness of implementing the Top 4 strategies remains very high. At least 85% of the cyber intrusions that ASD responds to involve adversaries using unsophisticated techniques that would have been mitigated by implementing the Top 4 mitigation strategies as a package. Introduction Australian computer networks are being targeted […]

Software Reverse Engineering Process

Software reverse engineering is frequently mentioned in the context of illegal activity. At the same time, reversing has legal applications, the most known of which is malware research. It can be also used to provide improved compatibility with the closed platforms, enhanced applications, and advanced OS features. In particular, in the United States, there is a […]

Vanish © 2016       All information on this blog, unless otherwise noted, is hereby released into the public domain, with no rights reserved. Frontier Theme