Back to The Future of Stuxnet

  • Post author:
  • Post last modified:October 19, 2011
  • Post category:CyberwarSecurity
  • Post comments:4 Comments
  • Reading time:2 mins read

While the U.S. and U.K. are debating whether to use Cyberwarfare, someone, somewhere, has decided not to waste further time…

Continue Reading Back to The Future of Stuxnet

Oops, My Drone Was Infected!

  • Post author:
  • Post last modified:October 8, 2011
  • Post category:Security
  • Post comments:3 Comments
  • Reading time:4 mins read

Do you remember the intrepid Jeff Goldbum injecting malicious code on the Alien mothership during one of the most famous…

Continue Reading Oops, My Drone Was Infected!

The Beauty (RC4) and The BEAST (TLS)

  • Post author:
  • Post last modified:September 25, 2011
  • Post category:Security
  • Post comments:5 Comments
  • Reading time:6 mins read

Hard times for Information Security and for the authentication models it had been built upon. The inglorious falls of  SecureID…

Continue Reading The Beauty (RC4) and The BEAST (TLS)

Anatomy Of A Twitter Scam

  • Post author:
  • Post last modified:September 15, 2011
  • Post category:Security
  • Post comments:4 Comments
  • Reading time:3 mins read

Do you remember Mobile Phishing and the related risks? Well This morning I had a bad surprise and could see…

Continue Reading Anatomy Of A Twitter Scam