Inspired by Insecure

information security

08/03/16 |Blog # , , ,

Point of view: Nullcon 2015

It’s been one full year since the end of the practical information security forum held in India. I realize that the country and the event will forever stay in my memory and some of the other participants will remember them, too. We’ve had it all: pursuits, quardocopters, motorbiking accidents, an Indian hospital, meditation and information security. Continue reading

0 likes no responses
Stay up to date

When Smart Medicine breaches its "First Do No Harm" principle. #IoT #TheSAS2017
#Petya is a Wiper, not ransomware: threat actor cannot decrypt victims’ disk, even if a payment was made.
Stack Buffer Overflow #Vulnerability in Microsoft Skype v7.3.6
Smoking kills. And vaporizing kills too: how your e-cigarette can hack your computer.
Honeypots and the Internet of Things: analysis of data harvested #IoT honeytraps
Recent Comments
- Sergey to Погружение в даркнет: Снифаем выходную ноду Tor и анализируем получившийся контент
лучше заходиииииииить через тор онлайн,...
- Denis Makrushin to The problems of heterogeneous means of protection
Of course!...
- K. Olbert to The problems of heterogeneous means of protection
Insightful diagram, Denis. Would you mind if I use it in a presentation, with credit, of course?...