The flaw in the WPA2 wireless protocol revealed recently has a critical impact on Android phones running version 6.0 of the mobile operating system and Linux devices, a security researcher says.
Australian information security company Threat Intelligence has revealed details of a new attack technique whereby a Microsoft Windows Active Directory domain controller can be transformed into a command-and-control centre for an internal botnet.
- Pure Hacking, the Australian experts in helping organisations protect their information assets today confirmed that its Chief Technology Officer, Ty Miller, has been confirmed on the official Black Hat 2011 conference program as a Trainer. Miller will be running a multi-day, high intensity training course, 'The Shellcode Lab' to develop and understand shellcode in a hands-on environment. Course attendees will gain a thorough knowledge and practical skill set on how to create shellcode and tune their elite security skills. This is the second program appearance for Miller at the world's most high profile security event. He previously presented his development of 'Reverse DNS Tunneling Shellcode' at the Black Hat event in 2008.
Most cybersecurity is making up for weak platforms. We need to address the fundamentals, design platforms that prevent out-of-bounds access[…]
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]
There are two flaws that are widespread in the industry here. The first is that any platform or language should[…]
Ajai Chowdhry, one of the founders and CEO of HCL is married to a cousin of a cousin of mine.[…]