
Network security
IPv6 security overview: a small view of the future [updated 2019]
The current version of Internet Protocol is IPv4. This is used to send data over the Internet and makes interaction between different services poss

Threat Intelligence
The Likelihood of Cyber-Terrorism Today
Introduction The virtual space has over time become something of real importance for business, politics, work, communities and communications.[pkadzone zone=

Malware analysis
Pattern-Based Approach for In-Memory ShellCodes Detection
Introduction During an analysis, it can be really useful to know some common instructions with which malware, and more specifically shellcodes, achieve their

Cryptography
Steganography and Steganalysis: Common Image Formats and LSB Part 2
JPEG One of the most common image formats is JPEG. It surely deserves a particular discussion, and, in addition, it's very frequently used as Cover Media, in

Cryptography
Steganography and Steganalysis: Common Image Formats and LSB
Part 1: Introduction The information revolution, which resulted in the Internet and in modern communication technologies, has pushed our society more and mor

Hacking
Hunting for “Red October”: Cyber-Espionage Toolkit Exploded
Introduction[pkadzone zone="main_top"] "Red October" appears to be a cyber-espionage toolkit discovered quite recently by Kaspkersky's laboratories. The vir