Introduction Not a month goes by without news about another new POS (point-of-sale) malware or credit card data breach. Obviously, details of this kind of breach
Category: Uncategorized
Crisis vs. Risk Management – know the difference and account for the unforeseeable
Account for non-obvious and unidentified risks Risk identification is mostly a mental process, which from data analysis (i.e., processes, past events, financials figures, logs,
Knock knock. Who’s there? Not me.
tl;dr; Port scanning the entire IPv4 address space daily for months at a time generates a lot of very juicy data — and more than a
Auditing the security of a linux system
The purpose of this post is to detail what type reviews will be performed on a linux computer to determine if it meets the security
RIPE what they sow
tl;dr looking for internet resources information ? Go for RIPEStat, an interface to RIS (Routing Information Service), which allows you to retrieve very interesting and accurate information regarding
SHA-1 backdooring and exploitation
This content was originally published on the website of the Malicious SHA-1 project. Summary This is about the Malicious SHA-1 project, a research project that