This summer, after some 18 months of waiting, the famous Leapmotion 3D controller has finally arrived. For those not aware of this device, this is a
Don’t run a Tor router and a hidden service from the same connection!
Today’s post covers Tor hidden services and their anonymity. In the first few paragraphs I will provide some basic, high level information on the Tor network
Can Amazon Web Services be used as a supercomputer for security attacks
The “Cloud” keyword has become prominent in the news, articles, almost in everything related to IT. Even in a police TV series the secrets of
Cyber security law, technology and insurance
A compliance breakfast has been organized on July 17th by Kudelski Security’s partner Hogan Lovells, at their Munich office. About 60 participants, primarily from the media, finance,
NSA, crypto, and bananas
After Snowden’s revelations many people are concerned by an omniscient and omnipotent NSA reading their email. NSA reportedly got access to content that was assumed to
FIRST 2013 – another point of view
Being another lucky attendee of the conference representing Kudelski Security team, I want to share a complementary viewpoint on this 25th Annual Conference, organized by FIRST (Forum of