Yeah, baby! The Association Francophone des Spécialistes de l’Investigation Numérique (AFSIN) held its annual conference on September 10-12 in Neuchâtel, Switzerland. The JFIN (“Journées Francophones de l’Investigation
Softraid and crypto for OpenBSD 5.3/5.4
DISCLAIMER: This how-to must be taken as is, it should not replace the official documentation and is not meant to do so. It may be
New remote sensors, personal gadgets for fun… or future biometrics tracking?
This summer, after some 18 months of waiting, the famous Leapmotion 3D controller has finally arrived. For those not aware of this device, this is a
Don’t run a Tor router and a hidden service from the same connection!
Today’s post covers Tor hidden services and their anonymity. In the first few paragraphs I will provide some basic, high level information on the Tor network
Can Amazon Web Services be used as a supercomputer for security attacks
The “Cloud” keyword has become prominent in the news, articles, almost in everything related to IT. Even in a police TV series the secrets of
Cyber security law, technology and insurance
A compliance breakfast has been organized on July 17th by Kudelski Security’s partner Hogan Lovells, at their Munich office. About 60 participants, primarily from the media, finance,