NCC Group Research Blog
The Shellcoder’s Handbook: Discovering and Exploiting Security Holes, 2nd Edition
11 months 1 week ago
The Pentesters Guide to Akamai
11 months 1 week ago
The Pharming Guide – Understanding and preventing DNS related attacks by phishers
11 months 1 week ago
The Phishing Guide: Understanding & Preventing Phishing Attacks
11 months 1 week ago
The Paillier Cryptosystem with Applications to Threshold ECDSA
11 months 1 week ago
The Password is Dead, Long Live the Password!
11 months 1 week ago
The Next C Language Standard (C23)
11 months 1 week ago
The Mobile Application Hacker’s Handbook
11 months 1 week ago
The Myth of Twelve More Bytes: Security on the Post-Scarcity Internet
11 months 1 week ago
The Importance of a Cryptographic Review
11 months 1 week ago
The L4m3ne55 of Passw0rds: Notes from the field
11 months 1 week ago
The facts about BadUSB
11 months 1 week ago
The Future of C Code Review
11 months 1 week ago
The Extended AWS Security Ramp-Up Guide
11 months 1 week ago
The factoring dead: Preparing for the cryptopocalypse
11 months 1 week ago
The disadvantages of a blacklist-based approach to input validation
11 months 1 week ago
The economics of defensive security
11 months 1 week ago
The death of USB autorun and the rise of the USB keyboard
11 months 1 week ago
The Demise of Signature Based Antivirus
11 months 1 week ago
Checked
1 hour 29 minutes ago