tl;dr; Most studies about SSL tend to use SSL information retrieved by DNS domain names. This article provides an overview of the SSLiverse when SSL
The NORX Bug Bounty Program
This post is on behalf of the team that designed the cipher NORX, namely Philipp Jovanovic (EPFL), Samuel Neves (Uni Coimbra), and JP Aumasson (Kudelski
Honey! Where is my POS??
Introduction Not a month goes by without news about another new POS (point-of-sale) malware or credit card data breach. Obviously, details of this kind of breach
SGX dev environment setup
Intel’s Software Guard Extensions (SGX) is their latest attempt to enable secure remote computation, or the execution of trusted code on a remote computer owned and
Getting started with Erlang
tl;dr; Here’s a quick introduction to Erlang programming language as well as some basic examples to show you what it looks like and why you should try
Sphinx Moth: Expanding our knowledge of the “Wild Neutron” / “Morpho” APT
The Kudelski Security Cyber Fusion Center together with the KS-CERT has been monitoring and investigating the “Sphinx Moth” threat activity since mid-2014. When Kaspersky and