Aggregator
Business Insights: Cyber Security in the Financial Sector
1 year 2 months ago
Building Security In: Software Penetration Testing
1 year 2 months ago
Building Systems from Commercial Components
1 year 2 months ago
Building WiMap the Wi-Fi Mapping Drone
1 year 2 months ago
Building Intuition for Lattice-Based Signatures – Part 1: Trapdoor Signatures
1 year 2 months ago
Building Intuition for Lattice-Based Signatures – Part 2: Fiat-Shamir with Aborts
1 year 2 months ago
Build Your Own Wi-Fi Mapping Drone Capability
1 year 2 months ago
Building an RDP Credential Catcher for Threat Intelligence
1 year 2 months ago
Browser Extension Password Managers
1 year 2 months ago
Buffer Underruns, DEP, ASLR and improving the Exploitation Prevention Mechanisms (XPMs) on the Windows platform
1 year 2 months ago
Broadcasting your attack – DAB security
1 year 2 months ago
BrokenPrint: A Netgear stack overflow
1 year 2 months ago
Blue Coat BCAAA Remote Code Execution Vulnerability
1 year 2 months ago
Breaking into Security Research at NCC Group
1 year 2 months ago
Breaking Pedersen Hashes in Practice
1 year 2 months ago
Blind Security Testing – An Evolutionary Approach
1 year 2 months ago
Blind Return Oriented Programming
1 year 2 months ago
BLEBoy
1 year 2 months ago
Blind Exploitation of Stack Overflow Vulnerabilities
1 year 2 months ago