Expert analysis
The Exploit Development Process
Alexander Sotirov is a Vulnerability Researcher at Determina Inc. In this video, made at Black Hat Europe, he discusses on a general note how exploit writers develop exploits.
Lock Down Your Mac with DoorStop X
When it comes to security, Mac OS X has proved on numerous occasions that it is quite safe, right out of the box. However, that doesn’t mean it cannot use additional …
Interview with Joanna Rutkowska, security researcher
Joanna Rutkowska is primarily known for her contributions to Windows Vista backdoor installation and hiding techniques. She is very interested in stealth technology as used by …
Counting the Cost of Cyber Crime
It has been a busy month in cyberspace. TJX, the massive worldwide fashion retailer, is finally releasing some of the gory details of the recent hack which saw over 45 million …
Secure File Upload in PHP Web Applications
Various web applications allow users to upload files. Web forums let users upload avatars. Photo galleries let users upload pictures. Social networking web sites may allow …
Data Seepage: How to Give Attackers a Roadmap to Your Network
At Black Hat Europe we met with Robert Graham and David Maynor, the CEO and CTO of Errata Security. In this video they talk about how the days of widespread internet attacks …
Symbian-Based Smartphone Security Software
With over 110 million Symbian smartphones shipped worldwide, this OS is becoming very popular and the need for security tools is growing. Presented here are applications you …
Anomaly-Based Unsupervised Intrusion Detection
At Black Hat Europe we met Stefano Zanero who talked about anomaly-based unsupervised intrusion detection. In this video he provides an overview of his research into the …
Details on Microsoft Identity Lifecycle Manager 2007
Peter Houston, the Senior Director for Identity and Access Management at Microsoft speaks about Microsoft Identity Lifecycle Manager 2007 and provides details about how this …
Wardriving in London 2007
Conducting regular research into WiFi networks and wireless protocols can help us gain a better understanding of the true state of affairs in this area. When possible, we try …
Survey Reveals Scandal of Snooping IT Staff
Whilst you sit at your desk working innocently away, little do you realize that one in three of your IT work colleagues are snooping through company systems, peeking at …
Lessons From a Honeynet That Attracted 700,000 Attacks
Over the 5 year lifetime of the IrishHoneynet, we have witnessed hundreds of thousands of scans, probes and attacks against the servers that comprise the network. Our …