ICS vulnerabilities are still being discovered, and I don't think that will stop any time soon. I started tracking known ICS vulnerabilites in 2014, and…
Notice: if you haven't read The Cuckoo's Egg by Cliff Stoll, STOP, go read the book (or at least watch the NOVA special) then come back. You can get a…
ecyenixsoyokdbnjwinbgy Once Upon A Time…. Once upon a time, not too long ago, at Defcon, a guy no one really heard of stepped up and…
On Sunday Defcon 20 had a talk that I had previously written about on the idea of using statistical analysis of word use to determine…
It is prophesied that when the end comes, it will come in darkness: a catastrophe all foresaw but few believed. Most of us will battle…
I noticed this article written by Kyle Rankin over on Linux Journal. It provides an intro to computer forensics. From Linux Journal: A break-in can…
Um, wow. While I can fully understand and appreciate their frustration, I see this as a legal minefield. They may want this power but, I…