Monday, March 25, 2013
Tales of SQLi
›
As attack vectors go, very few are as significant as obtaining the ability to insert bespoke code in to an application and have it automatic...
Thursday, March 14, 2013
Credit Bureau Data Breaches
›
This week saw some considerable surprise over how easy it is to acquire personal credit report information. On Tuesday Bloomberg News led w...
Monday, February 4, 2013
Vulnerability Disclosures in 2012
›
A new blog post by me is up on the IOActive site - 2012 Vulnerability Disclosure Retrospective . It follows from a review of the new analys...
Monday, January 7, 2013
The Demise of Desktop Antivirus
›
Are you old enough to remember the demise of the ubiquitous CompuServe and AOL CD’s that used to be attached to every computer magazine you...
Friday, December 21, 2012
How much is a zero-day exploit worth?
›
It's a pretty common question asked by both bug hunters and journalists alike - "How much is a zero-day vulnerability worth?" ...
Monday, December 17, 2012
Now at IOActive
›
For those that haven't seen the exchanges on Twitter or LinkedIn , I'm no longer with Damballa ... The last 3.5 years with Damball...
Sunday, November 25, 2012
Exploit Development for Fun & Profit
›
Last week I pulled together a posting for DarkReading covering the commercial aspects of exploit development - " The Business of Commer...
Persistent Threat Detection (on a Budget)
›
If there’s one simple – high impact – thing you could do to quickly check whether your network has been taken over by a criminal entity, or...
1 comment:
‹
›
Home
View web version