Dan on Security
Register | Login
1. The Empire Strikes Back Apple - how your Mac firmware security is completely broken | Reverse Engineering Mac OS X (reverse.put.as)
submitted by daniel over 6 years ago; voted 44 times | Up | 0 comments
2. Logjam: How Diffie-Hellman Fails in Practice (weakdh.org)
submitted by daniel over 6 years ago; voted 42 times | Up | 0 comments
3. The power of DNS rebinding: stealing WiFi passwords with a website (miki.it)
submitted by daniel over 6 years ago; voted 50 times | Up | 0 comments
4. The sad state of SMTP encryption (blog.filippo.io)
submitted by daniel over 6 years ago; voted 49 times | Up | 0 comments
5. China's Man-on-the-Side Attack on GitHub - NETRESEC Blog (netresec.com)
submitted by daniel over 6 years ago; voted 52 times | Up | 0 comments
6. Google warns of unauthorized TLS certificates trusted by almost all OSes | Ars Technica (arstechnica.com)
submitted by daniel over 6 years ago; voted 53 times | Up | 0 comments
7. peCloak.py | An Experiment in AV Evasion | 0xicf (0xicf.wordpress.com)
submitted by daniel over 6 years ago; voted 69 times | Up | 0 comments
8. FREAK Out on Mobile Threat Research | FireEye Inc (fireeye.com)
submitted by daniel over 6 years ago; voted 67 times | Up | 0 comments
9. MDSec Blog: Apple iOS Hardware Assisted Screenlock Bruteforce (blog.mdsec.co.uk)
submitted by daniel over 6 years ago; voted 65 times | Up | 0 comments
10. Ancient Rome's Port City (earthobservatory.nasa.gov)
submitted by daniel over 6 years ago; voted 44 times | Up | 0 comments
11. The Elon Musk interview on Mars colonisation (aeon.co)
submitted by daniel over 6 years ago; voted 50 times | Up | 0 comments
12. Michael Lewis Reflects on Flash Boys | Vanity Fair (vanityfair.com)
submitted by daniel over 6 years ago; voted 56 times | Up | 0 comments
13. The Doll That Helped the Soviets Beat the U.S. to Space (theatlantic.com)
submitted by daniel over 6 years ago; voted 63 times | Up | 0 comments
14. What happens when you type google.com into your browser's address box and press enter (github.com)
submitted by daniel over 6 years ago; voted 55 times | Up | 0 comments
15. Project Zero: Exploiting the DRAM rowhammer bug to gain kernel privileges (googleprojectzero.blogspot.ch)
submitted by daniel over 6 years ago; voted 65 times | Up | 0 comments
16. UEFI boot: how does that actually work, then? (happyassassin.net)
submitted by daniel over 6 years ago; voted 57 times | Up | 0 comments
17. The Colossal Strangeness of China's Most Excellent Tourist City (tmagazine.blogs.nytimes.com)
submitted by daniel over 6 years ago; voted 52 times | Up | 0 comments
18. Hack a Car | Part One | 0xicf (0xicf.wordpress.com)
submitted by daniel over 6 years ago; voted 54 times | Up | 0 comments
19. A Few Thoughts on Cryptographic Engineering: Attack of the week: FREAK (or 'factoring the NSA for fun and profit') (blog.cryptographyengineering.com)
submitted by daniel over 6 years ago; voted 53 times | Up | 0 comments
20. Big Bang, Deflated? Universe May Have Had No Beginning (livescience.com)
submitted by daniel over 6 years ago; voted 50 times | Up | 0 comments
 

sort by: new | voted | magic | mine || render: new