Aggregator
The Update Framework (TUF) Security Assessment
7 months 4 weeks ago
The Sorry State of Aftermarket Head Unit Security
7 months 4 weeks ago
The Spelling Police: Searching for Malicious HTTP Servers by Identifying Typos in HTTP Responses
7 months 4 weeks ago
The role of security research in improving cyber security
7 months 4 weeks ago
The Shellcoder’s Handbook: Discovering and Exploiting Security Holes, 2nd Edition
7 months 4 weeks ago
The Pentesters Guide to Akamai
7 months 4 weeks ago
The Pharming Guide – Understanding and preventing DNS related attacks by phishers
7 months 4 weeks ago
The Phishing Guide: Understanding & Preventing Phishing Attacks
7 months 4 weeks ago
The Paillier Cryptosystem with Applications to Threshold ECDSA
7 months 4 weeks ago
The Password is Dead, Long Live the Password!
7 months 4 weeks ago
The Next C Language Standard (C23)
7 months 4 weeks ago
The Mobile Application Hacker’s Handbook
7 months 4 weeks ago
The Myth of Twelve More Bytes: Security on the Post-Scarcity Internet
7 months 4 weeks ago
The Importance of a Cryptographic Review
7 months 4 weeks ago
The L4m3ne55 of Passw0rds: Notes from the field
7 months 4 weeks ago
The facts about BadUSB
7 months 4 weeks ago
The Future of C Code Review
7 months 4 weeks ago
The Extended AWS Security Ramp-Up Guide
7 months 4 weeks ago
The factoring dead: Preparing for the cryptopocalypse
7 months 4 weeks ago