Friday, November 1, 2013
DEF CON 20 Presentations - Video + Slides
Link Video http://www.youtube.com/playlist?list=PL9fPq3eQfaaDcbIEMSzdL5yuzh_m6BB-E
Read More
Prolexic on the Distributed Reflection Denial of Service attacks
http://securityaffairs.co/wordpress/ Prolexic DDoS Attack Report reveals an increasing interest of cybercrime in Distributed Reflection D...
Read More
2013 – The Impact of Cybercrime
http://resources.infosecinstitute.com/ Introduction Recent studies published on the evolution of principal cyber threats in the s...
Read More
Twitter Unrestricted File Upload Vulnerability
http://securityaffairs.co/wordpress Security expert Ebrahim Hegazy has found another serious vulnerability in Twitter, he has discov...
Read More
Wi-Fi HTTP Request Hijacking attack against iOS users
http://securityaffairs.co/wordpress/ I’m not surprised for trust given by Internet users to public Wi-Fi networks that are notoriously inse...
Read More
Thursday, October 31, 2013
SANS Investigate Forensics Toolkit—Forensics Martial Arts Part 1
http://resources.infosecinstitute.com The SANS Investigate Forensic Toolkit (SIFT) is an interesting tool created by the SANS Forensic Tea...
Read More
Subscribe to:
Posts (Atom)
Popular Post
Archive Blog
Powered by Blogger.
Category
Adobe
(1)
android
(1)
Application Security
(3)
APT
(1)
Cheat Sheet
(3)
Facebook
(2)
Forensic
(16)
General Security
(7)
google
(1)
Hacking
(28)
Hijacking
(3)
iOS
(1)
Linux
(5)
Linux Command
(1)
Malware
(2)
Mobile Device
(2)
Nmap
(1)
OWASP
(1)
Password
(2)
Research
(2)
Reverse Engineering
(5)
SANS
(1)
Scripts
(1)
Security
(7)
Security Tools
(3)
Social media
(1)
SSL
(1)
SysAdmins
(1)
Twitter
(1)
Video
(8)
Vulnerability
(1)
Wi-Fi
(1)
XSS
(2)