Quantcast

How to Disclose or Sell an Exploit without Getting in Trouble 2: CFAA and TRO Risk Mitigations

Elaborating on the Computer Fraud and Abuse Act as well as temporary restraining orders, James Denaro now advises on ways of mitigating the respective risks. We’ve got some examples here (see right-hand image) where...

How to Disclose or Sell an Exploit without Getting in Trouble

James Denaro, patent attorney at CipherLaw, delivers a presentation at Defcon highlighting the legal risks InfoSec researchers might run into in their activity. The topic for today is how to disclose or sell an exploit...

Prowling Peer-to-Peer Botnets after Dark 4: Methodology for Analysis Accuracy

Dwelling on the ways to ensure accurate botnet evaluation, Tillmann Werner focuses on distinguishing peers and introduces the especially tailored Prowler tool. What you see here is analysis of the convergence for the...

Prowling Peer-to-Peer Botnets after Dark 3: Crawling Strategies

Entirely focusing on the subject of crawling P2P botnets here, Tillmann Werner explicates the motivations for this process as well as applicable strategies. Let’s talk about crawling. Crawling is nothing else but...

Prowling Peer-to-Peer Botnets after Dark 2: Architecture and Protocols

Tillmann Werner delves into the details of peer-to-peer botnet architecture and describes protocols used in the Miner and different versions of ZeroAccess. Interestingly, for all botnets that you’ve seen on the...

Prowling Peer-to-Peer Botnets after Dark: Ins and Outs of the P2P Underworld

CrowdStrike’s researcher Tillmann Werner provides an extensive overview of peer-to-peer botnets, covering the essentials and architecture details thereof. Welcome to my presentation! I’m Tillmann Werner; I work for...

A Password Is Not Enough 6: Disk Encryption with the Phalanx Toolset

Description of the Phalanx, a disk encryption tool released by Daniel Selifonov, some security assumptions and general conclusions are what this part is about. And so, the tool I’m releasing – it’s, really, a...

A Password Is Not Enough 5: Secure Architecture Design

Daniel Selifonov dissects a blueprint reflecting virtually attack-proof system architecture that prevents disk encryption from being seriously compromised. So, let’s look at a blueprint (see right-hand image), what I...
Recent from News
Recent from How to ...