“It has often been said of the smartest criminals that if they were to put their talents into positive endeavors, they would become great successes. The statement may be true for North Korean hackers as well. Computer hacking has often been described as a person or group that breaks into computers, which is done by gaining access to administrative controls….”Read More...
- Hack Miami 2014 CFP: May 9 – 11 including Dave Monnier of Team Cymru on the #SOHOPharming #malware #infosec attacks April 17, 2014
- whitepaper: PE Injection Explained using documented features and C++, no assembly knowledge required April 17, 2014
- New Zealand High Court rules that Kim Dotcom can have his assets back incl $6 cars and $10 assets (appeal pending?) April 17, 2014
- #infosec tool: Hash Kracker, free for XP to Windows 8 recover the hashed password for MD5, SHA1, SHA256 + more April 17, 2014
Tagsapi apple archives article browser bruce schneier business china copyright development director downloads education enterprise events facebook feeds gfi government hackers hacking industry infrastructure internet linkedin linux management microsoft network networks news opinion phishing podcasts science security social-media symantec team cyrmu technology united-kingdom united-states videos vulnerability windows