Monday, January 7, 2013
The Demise of Desktop Antivirus
›
Are you old enough to remember the demise of the ubiquitous CompuServe and AOL CD’s that used to be attached to every computer magazine you...
Friday, December 21, 2012
How much is a zero-day exploit worth?
›
It's a pretty common question asked by both bug hunters and journalists alike - "How much is a zero-day vulnerability worth?" ...
Monday, December 17, 2012
Now at IOActive
›
For those that haven't seen the exchanges on Twitter or LinkedIn , I'm no longer with Damballa ... The last 3.5 years with Damball...
Sunday, November 25, 2012
Exploit Development for Fun & Profit
›
Last week I pulled together a posting for DarkReading covering the commercial aspects of exploit development - " The Business of Commer...
Persistent Threat Detection (on a Budget)
›
If there’s one simple – high impact – thing you could do to quickly check whether your network has been taken over by a criminal entity, or...
1 comment:
Point of Sale (POS) and Card Reader Tampering
›
In the field of consumer retail the most important piece of equipment is the cash register; better known by those in the trade as the Point ...
1 comment:
Thursday, September 13, 2012
Nitol and 3322.org Action by Microsoft
›
Reading this morning's blog from Microsoft about " Operation b70 " left me wondering a lot of things. Most analysts within th...
Monday, August 20, 2012
Trend Micro - You're doing it wrong!
›
In my Monday morning blog catch-up I stumbled upon Trend Micro's blog " Big Data Analytics and the Smart Protection Network "....
‹
›
Home
View web version