Div0 Blog EditorJul 23, 201411 minHOPE New York 2014: Observations & RemarksSnowden, North Korea and iOS, these could be seen as the finalising or resulting “menage a trois” from the HOPE conference in New York 20...
Div0 Blog EditorJul 18, 20149 minICANN50 Reflections & ThoughtsThis is to report and reflect on the experiences and various interactions in the ICANN50 meeting in London. In essence a week of intensiv...
Div0 Blog EditorJul 13, 20143 minHOPE X: Pre-Conference ThoughtsPrevious conference reports here have been posted mainly after the event has occurred, hence the name report. However, as anyone taking p...
Div0 Blog EditorJul 7, 20146 minNISEC: Zero Day Defence 2014 — What Went OnZero Day Defence 2014 is one of the few components in Singapore's National Infocomm Security Competition (NISEC). The task is to create a...
Div0 Blog EditorJun 3, 201410 minArea41 Security Conference ReportThis is to report and reflect the experiences and content of the recent Area41 security conference in Zürich on 2-3 June. The conference w...
Div0 Blog EditorMay 30, 20143 minEnd-User Awareness Approach to Network SecurityLong gone were the days of networking when the end-users were aware of where she’s connected to and what are the live connections opened ...
Div0 Blog EditorMay 29, 20143 minOptimistic View of Surveillance in the Light of Changing Governance StructuresThis writing is to criticise the somewhat pessimistic and at times also paranoid attitudes towards surveillance in the light of recent sp...
Div0 Blog EditorMay 14, 20143 minIntroduction & My Thoughts on BSides London 2014While having just landed from the BSides London conference, I had the good occasion presented by Emil Tan to contribute guest articles. T...
Div0 Blog EditorApr 22, 20143 minGlastopf – A Web-Application HoneypotAccording to SANS Top Cyber Security Risks (Jul, 2010), attacks against Web applications make up more than 60% of the total number of att...
Div0 Blog EditorApr 20, 20141 minFacebook's Related Links: A Security Feature?You won't expect someone who gives cybersecurity awareness talks regularly to fall into simple clickbait scams do you? Well … I did. I cl...
Div0 Blog EditorFeb 26, 20141 minFacebook Reputation Scam: BMW X6 Up for GraspHello Facebook! My name is Kevin M. James. I am the manager of the BMW Marketing Group and I own 12 BMW’s. This is one of them, a brand ...
Div0 Blog EditorFeb 16, 20142 minBitcoin Malware: Malicious Program Disguising as Open Source Trading ProgramI am a cryptocurrency enthusiast who has been into cryptocurrency for more than a year. I’m largely involved in Bitcoin and Litecoin comm...
Div0 Blog EditorFeb 12, 20145 minDionaea – A Malware Capturing HoneypotIntroduction to Dionaea Dionaea “the Nepenthes successor” is a malware capturing honeypot initially developed under The Honeynet Project'...
Div0 Blog EditorFeb 6, 20145 minThug – A Client HoneypotIntroduction to Thug & Client Honeypot Client honeypots are amazing tools for security practitioners who wish to perform a quick analysis...
Div0 Blog EditorDec 2, 20132 minPoC Malware Creates Covert Channel Over Inaudible Sound SignalsA covert channel is used to transfer information between processes that aren't allowed to communicate as defined by the computer security...
Div0 Blog EditorOct 27, 20131 minLost In TranslationA substantial security oversight is present in a variety of penetration testing tools, and it has to do with the different languages that...
Div0 Blog EditorAug 30, 20133 minBuffer-Overflow Vulnerability Affect 41,545 ServersRemote management tools have made many administrators’ job easier, allowing them to perform administrative tasks (e.g. reinstalling an op...
Div0 Blog EditorAug 23, 20133 minToday the Lights, Tomorrow, the World. The Internet of Things (IoT) [1] is defined as everyday objects being interconnected and networked. This includes smart-devices such as p...
Div0 Blog EditorAug 11, 20132 minPenTesting through Proxy ChainingUnlike tools such as Nmap, Nessus, and Metasploit which are the de-facto tools used in different phases of the penetration testing framew...
Div0 Blog EditorAug 10, 20131 minCatch Me If You CanOne thing I really missed out this year is RSA Conference APAC 2013's closing by the all-famous Frank Abagnale. On the bright side, I man...