Get flash to fully experience Pearltrees
StumbleUpon Diigo Delicious
According to release announcement on Pastebin by unknown developers in a Russian-language BlackHole Exploit Kit 2.0 released with more latest Exploits.
The Blackhole exploit kit is currently [ when?
This is a new format of blog post I’m trying out.
News release: 9 August 2011 Cosmetics retailer Lush breached the Data Protection Act after the security of its website was compromised for a four month period, the Information Commissioner’s Office (ICO) said today.
I came across this gem on the Visa website :
Public wifi hotspots and restricted internet access
Yes, You can build a GSM basestation using an USRP and the OpenBTS .
Learn from my mistakes as I figure out how to gather forensics data on an ext4 filesystem.
Social Engineering In Penetration Testing Registration « Social-Engineer.Com – Professional Social Engineering Training and ServicesThank you for your interest in registering for one of the upcoming Social Engineering In Penetration Testing 5-day courses.
Bitcoin mining is so last year.
Security-Assessment.com is a purist security company, with a strong focus on research and development.
Update (19 March 2013): This blog post advises to use RC4 to migitate the BEAST attack, but RC4 has recently been discovered to be weaker than previously known. At this point the attacks against RC4 are still not practical. The only fully safe choice at the moment is the AES-GCM suites supported only in TLS 1.2.