Tag: Technology/Internet
-
A trip down cyber memory lane, or from C64 to #FF0000 teaming
Reposting this from the original post I put on the IOActive website for the national cyber security awareness month… So, it’s National Cyber Security Awareness Month, and here at IOActive we have been lining up some great content for you. Before we get to that, I was asked to put in a short post with…
-
This one time, at Defcon… (a blast from the past)
Wow, there’s a blog here… Lucky for me there are other people who write new content that somehow relates to this blog so I have a chance to point to them and say “cool stuff, look there!”. My good friend Itzik Kotler has just written a blog post about bypassing DLP systems using some of…
-
So you thought you were protected: How hackers can break into your business
This is a translation of the original article published in Calcalist on May 20th 2012. A group of professional hackers, employed by the most sensitive organizations to detect security breaches, are showing how to gain access to critical information, or take down the power for a whole city – and what is needed in…
-
Cyber, Cyber, Cyber. What are we talking about anyway?
A long draught (almost a month) in this blog is finally coming to an end after I had some great conversations with good friends at the cyber un-conference here in Israel. One of the obvious discussions is around the use of the term cyber (surprise). The general agreement is that the term has been violated…
-
Advanced Data Exfiltration – full paper
This paper has been published in several security conferences during 2011, and is now being made fully available (as well as a PDF version for downloading) Abstract Penetration testing and red-team exercises have been running for years using the same methodology and techniques. Nevertheless, modern attacks do not conform to what the industry has…