Aggregator
VulnImage - Automated Method
12 years 11 months ago
g0tmi1k
Vulnerable by Design (Part 3)
13 years ago
g0tmi1k
Issues + Updates With 'Boots 2 Roots'
13 years ago
g0tmi1k
人を見たら泥棒と思え? メールが来たら迷惑メールと思え???
13 years 1 month ago
少し前の話ですが、某ソーシャル ネットワーク サービスのアカウント宛に、いわゆる「ともだちリクエスト」な
人を見たら泥棒と思え? メールが来たら迷惑メールと思え???
13 years 1 month ago
少し前の話ですが、某ソーシャル ネットワーク サービスのアカウント宛に、いわゆる「ともだちリクエスト」な
質問: ソーシャル エンジニアリング攻撃型マルウェアに強い Web ブラウザーは?答え: Internet Explorer 9
13 years 3 months ago
日本で Internet Explorer 9 の自動配信が開始されてから 1 か月が経過しました。Internet Explorer 9 はパフォーマンスの改
質問: ソーシャル エンジニアリング攻撃型マルウェアに強い Web ブラウザーは?答え: Internet Explorer 9
13 years 3 months ago
日本で Internet Explorer 9 の自動配信が開始されてから 1 か月が経過しました。Internet Explorer 9 はパフォーマンスの改
Rustock の脅威との闘い ~官・民・学の連携で実現~
13 years 4 months ago
「Rustock の脅威との闘い - セキュリティ インテリジェンス レポート: スペシャル エディション」を公開
Rustock の脅威との闘い ~官・民・学の連携で実現~
13 years 4 months ago
「Rustock の脅威との闘い - セキュリティ インテリジェンス レポート: スペシャル エディション」を公開
Behind the Curtain of Second Tuesdays
13 years 11 months ago
Handle: Mando Picker
IRL: Dustin Childs
Rank: Security Program Manager
Likes: Protecting customers, working with security researchers, second Tuesdays, bourbon, mandolins
Dislikes: Using “It’s hard” as an excuse, quitting when it gets tough, banjos
Hello All,
I enjoy telling stories. Perhaps, in a former life, I spent time as a bard telling stories of Robin Hood and Maid Marian as I travelled from town to town.
Hack.lu: Why it’s all about building bridges
14 years ago
Handle: Cluster
IRL: Maarten Van Horenbeeck
Rank: Senior Program Manager
Likes: Slicing covert channels, foraging in remote memory pools, and setting off page faults
Dislikes: The crackling sound of crypto breaking, warm vodka martni
“We want to remain what we are” (“Mir wëlle bleiwe wat mir sinn”) is the national motto of the Grand Duchy of Luxembourg.
Something Old, Something New, True Blue
14 years 1 month ago
This year marks the tenth BlueHat at Microsoft, and my sixth round in participating in the event that has been so instrumental in keeping Microsoft developers and executives in touch with the pulse of security research outside Microsoft, and serves as one of the key crossroads for the exchange of ideas from our internal security experts to the outside world.
BlueHat v10 Shipping!
14 years 1 month ago
Handle: Silver Surfer
IRL: Mike Reavey
Rank: Director, MSRC
Likes: Warm weather, Battlestar Galactica, and responsibly reported vulnerabilities
Dislikes: Rain, Rain without end, Clouds with potential for rain, reality TV, and unpatched vulns
I’m here playing MC at the tenth edition (!!!) of the BlueHat Security Briefings on the Microsoft Campus in Redmond.
Internet troubles in Korea? E-call center 118 is there to help.
14 years 2 months ago
Handle: Cluster IRL: Maarten Van Horenbeeck Rank: Senior Program Manager Likes: Slicing covert channels, foraging in remote memory pools, and setting off page faults Dislikes: The crackling sound of crypto breaking, warm vodka martni Microsoft often has the pleasure of welcoming foreign government officials to our headquarters. MSR
Announcing BlueHat v10: A Security Odyssey
14 years 2 months ago
BlueHat v10 is on the horizon and I’m happy to be able to announce the lineup. This year we’ll be hosting our annual conference on October 13-15 at the Microsoft campus here in Redmond and, with the success of last year’s con, we’re working overtime to make it the most robust, top-notch BlueHat yet.
Coordinated Vulnerability Disclosure: Bringing Balance to the Force
14 years 4 months ago
Today on the [MSRC blog,](«http://blogs.technet.com/b/msrc/archive/2010/07/22/announcing-coordinated-vulnerability-disclosure.aspx> >) Matt Thomlinson, General Manager of Trustworthy Computing Security, announced our new philosophy on Coordinated Vulnerability Disclosure. I wanted to provide some context and history on how this came about. This post is about changing the way we at Microsoft talk about some familiar disclosure concepts, and is meant as an introduction to how Microsoft would like to engage with researchers.
Strengthening the Security Cooperation Program
14 years 6 months ago
Handle: Cap’n Steve
IRL: Steve Adegbite
Rank: Senior Security Program Manager Lead
Likes: Reverse Engineering an obscene amount of code and ripping it up on a snowboard
Dislikes: Not much but if you hear me growl…run
G’day Mate!
I have always wanted to say that. I am here at the AusCERT 2010 conference in the beautiful Gold coast, Australia.
Security Wars: エピソード 2. 第 2: 匿名軍団 1-1 - オーダー 66 対 ボット指令 -
14 years 6 months ago
Security Wars を更新しました。 Security Wars Epsode 2: 第 2 匿名軍団 1-1. オーダー 66 対 ボット指令 http://technet.microsoft.com/ja-jp/security/ff595129.aspx クローン軍団にはジェダイの抹殺指令
Security Wars: エピソード 2. 第 2: 匿名軍団 1-1 - オーダー 66 対 ボット指令 -
14 years 6 months ago
Security Wars を更新しました。 Security Wars Epsode 2: 第 2 匿名軍団 1-1. オーダー 66 対 ボット指令 http://technet.microsoft.com/ja-jp/security/ff595129.aspx クローン軍団にはジェダイの抹殺指令