Reading time:
~11 min
Posted
by Rogan Dawes
on
02 December 2019
In this post, I will recap some of the security research conducted on wireless keyboards and mice, and eventually show...
Reading time:
~6 min
Posted
by Rogan Dawes
on
10 March 2017
Categories:
Abuse,
Backdoor,
Build-it,
Conferences,
Empire,
Exploit,
Hardware,
Internals,
Linux,
Metasploit,
Programming,
Real-world,
Research,
Shells,
Tunnelling
(If you’re new to this project, read the intro first) For the past few months, I’ve been working on porting...
Reading time:
~9 min
Posted
by etienne
on
28 January 2014
Recently a security researcher reported a bug in Facebook that could potentially allow Remote Code Execution (RCE). His writeup of...
Reading time:
~2 min
Posted
by behrang
on
13 December 2012
ASP.NET HttpHandlers are interesting components of a .NET web application when performing security assessments, mainly due to the fact they...
Reading time:
~4 min
Posted
by daniel
on
07 July 2011
In light of recent mass hacks (HBGary, Sony, Nintendo, etc) one would have thought that collectively, companies would take notice...
Reading time:
~4 min
Posted
by behrang
on
25 October 2010
Introduction From time to time I like to delve into malware analysis as a pastime and post interesting examples, and...
Reading time:
~5 min
Posted
by gert
on
31 March 2010
The intertubes have been humming lately around a certain NTP feature to gather lists of NTP servers’ clients and it...
Reading time:
Less than a minute
Posted
by Haroon Meer
on
25 April 2009
Part of the problem Microsoft bumped into with Vista, was hordes of people who had grown too attached to XP.....
Reading time:
~1 min
Posted
by nick
on
08 February 2009
aka.. Someone put the hurtski on Kaspersky.. The Twitters (via XSSniper and others) and the Interwebs were ablaze with news on...
Reading time:
~3 min
Posted
by nick
on
01 February 2009
The recent widespread carnage caused by the Conficker worm is astounding, but is also comforting, in a strange way. It...
Reading time:
Less than a minute
Posted
by behrang
on
06 January 2009
Interesting post on cost/benefit analysis of hacker and hooker attacks….
behrang
Reading time:
Less than a minute
Posted
by Haroon Meer
on
18 September 2008
By now everyone knows that John McCain’s running mate Sarah Palin had her yahoo email account hacked. I guess a...
Reading time:
~1 min
Posted
by Haroon Meer
on
02 September 2008
Google have thrown their hat in the browser-ring, which many have predicted. [Chrome] should be coming soon to downloads near...
Reading time:
~1 min
Posted
by marco
on
13 June 2008
since forever, i’ve been told (and told others) that the greatest threat is from the inside. turns out, not so...
Reading time:
~4 min
Posted
by Haroon Meer
on
29 October 2007
Aka… A good weekend.. The weekend got off to a slow start, when Amazon claimed it would take a little...
Reading time:
~1 min
Posted
by Haroon Meer
on
12 September 2007
In early 2002 i suggested that we could solve some computer problems and south africas street-kid problem by setting up...
Reading time:
~4 min
Posted
by Charl van der Walt
on
01 July 2007
Many years ago, when we first released ‘Setiri’ one of the controls that we preached was website white-listing. As talk-back...
Reading time:
Less than a minute
Posted
by Haroon Meer
on
10 June 2007
R J Hillhouse (who has a fascinating background) found that when she double clicked a graph on a slide deck...
Reading time:
Less than a minute
Posted
by Charl van der Walt
on
05 June 2007
Check out http://hongkong.langhamplacehotels.com/accom/technology.htm in Hong Kong. They provide Cisco IP phones in the rooms, but with a difference. According to...
Reading time:
~1 min
Posted
by Haroon Meer
on
04 June 2007
Ars Technica is reporting on the law suit filed in 2006 by Martin Bragg who accused Linden labs of wrongfully...