Security

Hacker Superstar Ang Cui’s Symbiotes will Defend Your Mind

Hacker Superstar Ang Cui’s Symbiotes will Defend Your Mind

Ang's research focuses on embedded devices such as routers, printers and VOIP phones. And he is the inventor of a novel, host-based defense mechanism known as Symbiotes. Symbiotes are software defenses "designed specifically to retrofit black-box, vulnerable, legacy embedded systems withsophisticated anti-exploitation mechanisms". Ang's work with symbiotes might very well be the first line of defe...

Read More »
Cyber-espionage: The greatest transfer of wealth in history

Cyber-espionage: The greatest transfer of wealth in history

Cybercrime groups, governments, and groups of hacktivists tend to lean toward the spread of malicious agents that have the capacity to silently infiltrate their targets, stealing confidential information from them. The Chinese government is considered the biggest aggressor in cyber espionage, while US networks are the privileged targets of cyber attacks that hit every sector, from media to militar...

Read More »
Stylometric analysis to track anonymous users in the underground

Stylometric analysis to track anonymous users in the underground

According an interesting study presented by researcher Sadia Afroz at last edition of Chaos Communication Congress in Germany, the 29C3, up to 80 percent of certain anonymous underground forum users can be identified using linguistics, a data that is stunning in my opinion. Sadia is member of the The Drexel and George Mason universities research team composed of Aylin Caliskan Islam, Ariel Stolerm...

Read More »

Critical infrastructures & Manipulation of the name Anonymous

Once nations used arms and military power, intimidating opponents in this way. Today the way of fighting is radically changed, the battleground is cyberspace, the armies are composed by groups of hackers and cyber weapons are sophisticated weapons designed to attack strategic targets … and mainly the wars today are silent.

Read More »