After figuring out how to design secure ciphers, cryptographers tried to find how to make secure ciphers as simple as possible. Permutation-based cryptography is the
“Hacking a plane’s engine control through the entertainment system is as easy as hacking a car’s steering through the CD Player?” Better hope not!
A May 18th Washing Post article by @drewharwell about Chris Roberts, the security researcher questioned by the FBI about monkeying with planes’ avionics via the
Industrial Systems: ‘to patch or not to patch’
There are many peculiarities that must be taken into account when considering the safety of industrial systems and SCADA systems. One especially relevant is patching
Was the LizardStresser stressful?
After taking down the Xbox Live and the Playstation Network gaming services, the Lizard Squad group came again in the spotlight after the leak of
Volatility plugin for Dyre
Dyre is a banking malware discovered in middle of 2014. It can intercept HTTPS traffic, using techniques documented in this Introduction to Dyreza. In the
Auditing the security of a linux system
The purpose of this post is to detail what type reviews will be performed on a linux computer to determine if it meets the security