Stolen Laptop Recovery via OSX Trap Partition
My Macbook Air has 2 partitions, one that is my normal everyday partition that is encrypted with ...
Read MoreMy Macbook Air has 2 partitions, one that is my normal everyday partition that is encrypted with ...
Read MoreOver the past few weeks we have seen a resurgence of malicious spam with links leading off to the ...
Read MoreEmbedded computing is very much about making a computer as small as possible, yet still being able ...
Read MoreDown that dusty trail… As the big blue letters above state, this is part 3B of the Analyzing PDF ...
Read MoreUnless you've been hauled up in a bunker, eating MREs and watching Doomsday Preppers marathons, ...
Read MoreI'm now going into my second year in application security, and as I learn more and more, my ...
Read MoreMany people look at capture the flag competitions with varying reactions. Some look at them as ways ...
Read MoreIn part 1 of this series I gave an introduction into how most merchants accept payments and how ...
Read MoreCompromises of e-commerce websites are increasingly common. In our 2012 Global Security Report we ...
Read MoreTrustwave has been adding support for the Common Vulnerability Scoring System (CVSS) in PenTest ...
Read MoreMetasploit is one of the many tools that can be used during a penetration test, and it actually ...
Read MoreIt's a busy time for Internet Explorer: Patch Tuesday addressed quite a few issues in IE, and an ...
Read MoreThanks to my SpiderLabs Research colleague @claudijd for collaborating with this analysis.
Read MoreSecurity Fix Release: ModSecurity v2.6.6 The ModSecurity Development Team has released version ...
Read MoreAs part of Trustwave SpiderLabs network penetration testing team, I perform many internal ...
Read MoreAnother month, another Patch Tuesday. This one has seven bulletins three of which are rated ...
Read MoreCryptOMG is CTF-style testbed for exploiting various flaws in cryptographic implementations. ...
Read MoreA few weeks ago I caught a tweet from Chris Wysopal (@WeldPond) noticing how the new version of ...
Read MoreAn external penetration test isn't just about the network addresses to pwn, but sometimes about the ...
Read MoreEven though targeted attacks performed by groups such as LulzSec and Anonymous has gotten less ...
Read MoreAt the recent OWASP AppSecDC conference, I presented on this topic. I received a lot of feedback ...
Read MoreIt was only a matter of time before we felt Flame's aftershock. Yesterday morning it finally ...
Read MoreAt the recent OWASP AppSecDC conference, I presented on this topic. I received a lot of feedback ...
Read MoreProbably in the same period I started at Trustwave SpiderLabs I decided to start my training for an ...
Read MoreLike many other security research firms, SpiderLabs Research has been actively investigating the ...
Read MoreThe View From The Top Isn't Much Better
Read More