Linux Rootkits Hard to Detect
First of all what is a rootkit? A collection of software that runs and tries to hide from the computer user and administrator while also allowing the attacker access to…
Defend Your Systems
First of all what is a rootkit? A collection of software that runs and tries to hide from the computer user and administrator while also allowing the attacker access to…
Another Thotcon presentation was very good, unique and moves the industry forward. Julian Cohen presented This idea: “Understanding Your Adversaries” In his talk: “Adversary-Based Threat Analysis” He explained that in…
Thotcon (Chicago’s Hacking Conference) thoughts… Saw several good Cybersecurity presentations while one of the keynotes “Josh Corman” discussed the burnout of the infosec opsec community. This is a problem for…
If there is no way to fix a vulnerability what do you do if you have a camera with a vulnerability? Here is the quote on Threatpost (from the engineer…
In the spirit of a lighter fare this Sunday. Watching Anon (again) it is an interesting futuristic movie where there is a video recording of everything. Apparently everyone has a…