Good day friends and colleagues, A lot of people who have been working in our industry for the past few years, or decades for some
ATMs are not meant to fall apart
You might have heard about it. You might even have experienced it. Skimming fraud is a very simple yet very clever way to abuse credit
Secure password hashing: requirements and design choices
This is the promised follow-up to my first post on secure password hashing. We now focus on the security requirements and design choices, which will
O, BIND, BIND, wherefore art thou BIND?
This blog post is about service fingerprinting DNS servers on Internet. The most straight forward way to identify the version of a DNS server is
Back and forth till bitcoins
Recently we (Joël Conus, Martin Dion, and Patrick Hauert) took an active part in the event organized by CLUSIS (association suisse de la sécurité de l’information) hosted at Kudelski Security
LaCie RuggedSafe under GNU/Linux
The RuggedSafe from LaCie is basically an encrypted external hard drive that uses 128 bit AES hardware encryption to protect your data. Your fingerprint is the