Hash-Flooding DOS Reloaded

At 28C3, Klink and Waelde showed that a number of technologies (PHP, ASP.NET, Ruby, Java, Python, etc.) were vulnerable to the decade-old hash-flooding DoS attacks. The vulnerability was then often […]
Ethics of Activist DDOS Actions

A Historical Analysis In the world of digital activism, distributed denial of service attacks present relatively low barriers to popular participation, have a high potential for attracting large numbers of […]
How I Met Your Pointer
Hijacking Client Software for Fuzz and Profit An approach to the problem of fuzzing proprietary protocols will be shown, focusing on network protocols and native software. In the course of […]
We Are All Lawmakers

How to further transparency by law – the Hamburg example and beyond In the Free City of Hamburg, which is one of 16 German states, a coalition of hackers, activists […]
Lessons Learned on Electronic Napkins

On the Way to Free(ing) Education Massive open online courses are the vogue of the season when it comes to discussing the future of university-level education. But we’re only starting […]
Let Me Answer That For You

Adventures in Mobile Paging In the last years, mobile security and specifically GSM has been attacked in many different ways. It was demonstrated how to sniff and crack traffic, how […]