Archive for the 'infosec' Category

Stop Fixing All The Things – Our BSidesLV Talk | The Risk I/O Blog

Saturday, August 10th, 2013

Recent parer shows that it make sense to focus only on vulns that have ready exploits in metasploit and exploitdb

Stop Fixing All The Things – Our BSidesLV Talk | The Risk I/O Blog

Saturday, August 10th, 2013

Recent parer shows that it make sense to focus only on vulns that have ready exploits in metasploit and exploitdb

Stop Fixing All The Things – Our BSidesLV Talk | The Risk I/O Blog

Saturday, August 10th, 2013

Recent parer shows that it make sense to focus only on vulns that have ready exploits in metasploit and exploitdb

The Legitimate Vulnerability Market – Inside the Secretive World of 0-day Exploit Sales [.pdf]

Sunday, July 14th, 2013

Old (2007 ) paper by Charlie Miller about trading of 0-day exploits

The Legitimate Vulnerability Market – Inside the Secretive World of 0-day Exploit Sales [.pdf]

Sunday, July 14th, 2013

Old (2007 ) paper by Charlie Miller about trading of 0-day exploits

The Legitimate Vulnerability Market – Inside the Secretive World of 0-day Exploit Sales [.pdf]

Sunday, July 14th, 2013

Old (2007 ) paper by Charlie Miller about trading of 0-day exploits

[wikileaks ]PRISM – DHS PRISM 2004 – Requirements for Installation (original doc)

Saturday, June 8th, 2013

original PRISM docs from wikileaks

[wikileaks ]PRISM – DHS PRISM 2004 – Requirements for Installation (original doc)

Saturday, June 8th, 2013

original PRISM docs from wikileaks

[wikileaks ]PRISM – DHS PRISM 2004 – Requirements for Installation (original doc)

Saturday, June 8th, 2013

original PRISM docs from wikileaks

Language-theoretic Security

Sunday, April 14th, 2013

The Language-theoretic approach (LANGSEC) regards the Internet insecurity epidemic as a consequence of ad hoc programming of input handling at all layers of network stacks, and in other kinds of software stacks. LANGSEC posits that the only path to tru…