Inspired by Insecure

vulnerability

30/11/16 |Blog # , , ,

0day vulnerability in Tor Browser

0 likes no responses
11/08/16 Blog # , , ,

IT threat evolution in Q2 2016

0 likes no responses
Stay up to date

Twitter
Smoking kills. And vaporizing kills too: how your e-cigarette can hack your computer. https://t.co/f57jyKRdnS
Honeypots and the Internet of Things: analysis of data harvested #IoT honeytraps https://t.co/OpLh1PUnO0
Announcing Google Capture the Flag 2017 #CTF https://t.co/UymdZDlsDg
@cucrisis "determination" = "motivation", "isolation" = "predefined_subnetwork"?
"Proposed US Bill would legalize aggressive #hackback attacks." Where I missed a strong "Attack Attribution" patent? https://t.co/vFhrb0gAQ9
Recent Comments
- Sergey to Погружение в даркнет: Снифаем выходную ноду Tor и анализируем получившийся контент
лучше заходиииииииить через тор онлайн http://torproject.online/,...
- Denis Makrushin to The problems of heterogeneous means of protection
Of course!...
- K. Olbert to The problems of heterogeneous means of protection
Insightful diagram, Denis. Would you mind if I use it in a presentation, with credit, of course?...