877.791.9571 |

About the Author:

malwareanalysis-book

Book Excerpt: Practical Malware Analysis – The Hands-on Guide to Dissecting Malicious Software

Another excellent publisher has offered up a generous sample of a book we’ve been talking about. This is Chapter 12 from Practical Malware Analysis – The Hands-on Guide to Dissecting […]

securitymetricsbook

InfoSec Book Excerpt: Security Metrics – Chapter 17

We like to read the latest and greatest security books, andsometimes the author and/or publisher is generous enough to share an extended with us – and you. We’ve selected […]

Val Smith Reveals His Process for Security Research

In our ongoing series of interviews, this week Val Smith answered a few questions and pulled back the curtain a bit on the methods, tools and motivation for the […]

Stefan Esser Reveals His Process for Security Research

In our ongoing series of interviews, this week Stefan Esser answered a few questions and pulled back the curtain a bit on the methods, tools and motivation for the […]

TeamShatter Reveals their Process for Security Research

In our ongoing series of interviews, we are doing things a little differently this week and interviewing four members of TeamSHATTER. They answered a few questions and pulled back […]

Exploiting gresecurity/PaX with Dan Rosenberg and Jon Oberheide

Following their presentation at Infiltrate 2011, Jon Oberheide and Dan Rosenberg answered a few questions about the talk they gave.

Jon Oberheide is the CTO of Duo Security, an Ann […]

Kevin Finisterre Reveals His Process for Security Research

In our ongoing series of interviews, this week Kevin Finisterre answered a few questions and pulled back the curtain a bit on the methods, tools and motivation for the […]

Are YOU Wearing A Hoodie?

Fox recently canceled their show about hackers “Breaking In.”

Whatever you might have thought about the show, it got people talking and thinking about hackers. Just like the Sony Playstation […]

Haroon Meer Reveals His Process for Security Research

In our ongoing series of interviews, this week Haroon Meer answered a few questions and pulled back the curtain a bit on the methods, tools and motivation for the […]

Matthieu Suiche Reveals His Process for Security Research

In our ongoing series of interviews, this week Matthieu Suiche answered a few questions and pulled back the curtain a bit on the methods, tools and motivation for the […]

WhisperMonitor Tutorial with Stuart Anderson

WhisperMonitor is a new software firewall and dynamic egress filtering tool from WhisperSystems. It comes pre-installed with the latest beta release of WhisperCore. The software lets you decide which […]

Jeremiah Grossman Reveals His Process for Security Research

In our ongoing series of interviews, this week Jeremiah Grossman answered a few questions and pulled back the curtain a bit on the methods, tools and motivation for the […]

Recognizing Social Engineering Attacks

,

While the RSA data breach made news, it was just a high profile example of an attack that has been found in dozens of investigations by SpiderLabs at Trustwave […]

David Litchfield Reveals His Process for Security Research

In our ongoing series of interviews, this week David Litchfield answered a few questions and pulled back the curtain a bit on the methods, tools and motivation for the […]

Info on the disclosure of the wicd 0day

Rel1k (Dave Kennedy) asked for a more detailed explanation as to the wicd disclosure / backtrack “0day” fiasco and we’re happy to explain.

We slipped up in wanting to show […]

Neil Daswani Reveals His Process for Security Research

In our ongoing series of interviews, this week Neil Daswani answered a few questions and pulled back the curtain a bit on the methods, tools and motivation for the […]

Joanna Rutkowska Reveals Her Process for Security Research

In our ongoing series of interviews, Joanna Rutkowska answered a few questions and pulled back the curtain a bit on the methods, tools and motivation for the work she […]