The prices of two crypto tokens — BeautyChain and SmartMesh — dramatically crashed this week. One or more attackers exploited bugs in the their smart contracts and generated huge amounts of tokens out of thin air, massively diluting token supplies. T...
On 11 August 2017, I participated in an online lucky draw. Instead of winning some prizes, I stumbled upon two vulnerabilities. It turned out that their CAPTCHA was as poorly implemented; similar to what was reported on the M1 Wireless@SG site and t...
"Who did it?" is a fairly common question to hear as soon as things calm down and there is time to think again. Hasty conclusions would only lead to massive collateral damage, yet sometimes the urgency to punish and restore order is so pressing, that...
The early days in the cyberspace used to be rather safe when compared to the increasingly hostile worldwide wild west, where various hostile governments, criminals, advertisers, and intelligence (or not so intelligence agencies) can inject stuff onto...
Tim (not his real name) routinely spends some of his free time prowling the web for exotic security tools and exploits. Shortly, he stumbled upon a new exploit that was circulating within an underground forum. It pertains to a standard security produ...
Really simple things can be hugely influential and famous. Like SQL injection, buffer overflow and other classic types of software vulnerabilities — The grand old man of cyberspace remains useful year after year. State sponsored actors, even governme...
Although my diploma education in Infocomm Security Management laid a good foundation to get me started in infosec, I really only hit the ground running after I participated in Capture the Flag (CTF) competitions – specifically, SyScan Singapore 2007...
While the search engine giants did join forces under national interests, it did face more and more difficult and largely unsolved questions regarding relationships between legacy national governments, as diverse as they are, and supranational organis...