top of page
Search


Area41 Security Conference Report
This is to report and reflect the experiences and content of the recent Area41 security conference in Zürich on 2-3 June. The conference...

Div0 Blog Editor
Jun 4, 201410 min read
55 views
0 comments


End-User Awareness Approach to Network Security
Long gone were the days of networking when the end-users were aware of where she’s connected to and what are the live connections opened...

Div0 Blog Editor
May 31, 20143 min read
9 views
0 comments


Optimistic View of Surveillance in the Light of Changing Governance Structures
This writing is to criticise the somewhat pessimistic and at times also paranoid attitudes towards surveillance in the light of recent...

Div0 Blog Editor
May 30, 20143 min read
14 views
0 comments


Introduction & My Thoughts on BSides London 2014
While having just landed from the BSides London conference, I had the good occasion presented by Emil Tan to contribute guest articles....

Div0 Blog Editor
May 15, 20143 min read
5 views
0 comments


Glastopf – A Web-Application Honeypot
According to SANS Top Cyber Security Risks (Jul, 2010), attacks against Web applications make up more than 60% of the total number of...

Div0 Blog Editor
Apr 22, 20143 min read
532 views
0 comments


Facebook's Related Links: A Security Feature?
You won't expect someone who gives cybersecurity awareness talks regularly to fall into simple clickbait scams do you? Well … I did. I...

Div0 Blog Editor
Apr 21, 20141 min read
25 views
0 comments


Facebook Reputation Scam: BMW X6 Up for Grasp
Hello Facebook! My name is Kevin M. James. I am the manager of the BMW Marketing Group and I own 12 BMW’s. This is one of them, a brand...

Div0 Blog Editor
Feb 27, 20141 min read
15 views
0 comments


Bitcoin Malware: Malicious Program Disguising as Open Source Trading Program
I am a cryptocurrency enthusiast who has been into cryptocurrency for more than a year. I’m largely involved in Bitcoin and Litecoin...

Div0 Blog Editor
Feb 17, 20142 min read
22 views
0 comments


Dionaea – A Malware Capturing Honeypot
Introduction to Dionaea Dionaea “the Nepenthes successor” is a malware capturing honeypot initially developed under The Honeynet...

Div0 Blog Editor
Feb 13, 20145 min read
4,003 views
0 comments


Thug – A Client Honeypot
Introduction to Thug & Client Honeypot Client honeypots are amazing tools for security practitioners who wish to perform a quick analysis...

Div0 Blog Editor
Feb 7, 20145 min read
1,308 views
0 comments


PoC Malware Creates Covert Channel Over Inaudible Sound Signals
A covert channel is used to transfer information between processes that aren't allowed to communicate as defined by the computer security...

Div0 Blog Editor
Dec 3, 20132 min read
12 views
0 comments


Lost In Translation
A substantial security oversight is present in a variety of penetration testing tools, and it has to do with the different languages that...

Div0 Blog Editor
Oct 28, 20131 min read
11 views
0 comments


Buffer-Overflow Vulnerability Affect 41,545 Servers
Remote management tools have made many administrators’ job easier, allowing them to perform administrative tasks (e.g. reinstalling an...

Div0 Blog Editor
Aug 31, 20133 min read
12 views
0 comments


Today the Lights, Tomorrow, the World.
The Internet of Things (IoT) [1] is defined as everyday objects being interconnected and networked. This includes smart-devices such as...

Div0 Blog Editor
Aug 24, 20133 min read
23 views
0 comments


PenTesting through Proxy Chaining
Unlike tools such as Nmap, Nessus, and Metasploit which are the de-facto tools used in different phases of the penetration testing...

Div0 Blog Editor
Aug 12, 20132 min read
612 views
0 comments


Catch Me If You Can
One thing I really missed out this year is RSA Conference APAC 2013's closing by the all-famous Frank Abagnale. On the bright side, I...

Div0 Blog Editor
Aug 11, 20131 min read
13 views
0 comments


Save the World & Get the Girl
Javvad Malik – named the “Most Entertaining Blogger” & “Best Video Blogger” at the European Blogger Awards 2013 – presented “How...

Div0 Blog Editor
Aug 8, 20131 min read
16 views
0 comments


Who's Really Attacking Your ICS?
Attackers are actively targeting Internet-connected industrial control systems (ICS) according to data collected from a global network of...

Div0 Blog Editor
Aug 4, 20132 min read
10 views
0 comments


How To Stay Secure & Fail at Black Hat & DEFCON
With Black Hat and DEFCON just a few hours away, here are some tips for those who are heading to Las Vegas, to stay secure and not fail...

Div0 Blog Editor
Jul 26, 20132 min read
10 views
0 comments


What Facebook Knows About You?
These are the data/information you provide to Facebook: Name City of birth City of residence Phone Email Current employment Previous...

Div0 Blog Editor
Jul 13, 20132 min read
16 views
0 comments
BLOG: Blog2
bottom of page