Home 2014

Yearly Archives: 2014

Best Security Software 2015

1
Looking back at 2014, the progress in technology used for antivirus protection, online security and user privacy defense is to the fore. In...

How to remove Vosteran Search from infected web browser

0
What makes it easy to tell a reputable web service enhancement from a potentially unwanted one is its mode of installation and...

The State of Incident Response by Bruce Schneier

0
This series of articles reflects a Black Hat talk by prominent computer security expert Bruce Schneier where he covers the current state of...

Exploiting network surveillance cameras like a Hollywood hacker

0
Craig Heffner, a Vulnerability Analyst with Tactical Network Solutions, presented at Black Hat to cover common security issues in network surveillance cameras. Hi, I’m Craig...

I am a legend: Hacking Hearthstone with machine learning

0
At Defcon 22, Elie Bursztein and his wife Celine present their research about finding undervalued cards in Hearthstone and predicting the opponent’s actions. Hi...

Weaponizing Your Pets: The War Kitteh and the Denial of Service Dog

0
In his first-time Defcon presentation, Tenacity Solutions’ Gene Bransfield shares his hilarious experience of making a 'volunteer' cat and dog go technical. Good morning Defcon!...

Unexpected Stories from a Hacker inside the Government

0
Peiter C. Zatko, aka Mudge, a well-known former member of the L0pht and ex-researcher at DARPA, tells a few stories from his past...

Remove Omiga Plus (isearch.omiga-plus.com) adware

0
Omiga Plus by Taiwan shui Mu Chih Ching Technology, Inc. is a desktop maintenance application that merges the useful with the intrusive....

Backdoors, Government Hacking and the Next Crypto Wars

0
Christopher Soghoian, ACLU’s Principal Technologist, presents his study at Defcon highlighting the past and the present of the privacy and cryptography realm. Good morning...

How to remove Speedial Search homepage hijacker

0
The last few years’ adware propagation boom is particularly troubling, because not only do these nasty little cyber threats take the essential...