CVE-2011-3402 Technical Analysis
CVE-2011-3402 is well known as the Windows Kernel TrueType [Font] 0-day used in the “Duqu” attack(s). Recently this exploit has begun to appear in several crimeware exploit kits… Actually, not […]
Safecast: DIY & Citizen-Sensing of Radiation

Empowering citizen in the wake of Fukushima triple-meltdown disaster The triple meltdown of the Fukushima Dai-Ichi nuclear power plant in March last year and the release of radioactive material that […]
Windows Memory Forensics
Aside from further development of traditional forensic techniques which involve post-mortem hard disk analysis, in the last couple of years the field of computer forensics has been marked by significant […]
SCADA Strangelove

How I Learned to Start Worrying and Love Nuclear Plants Modern civilization unconditionally depends on information systems. It is paradoxical but true that ICS/SCADA systems are the most insecure systems […]
Further Hacks on the Calypso Platform
OR How to Turn a Phone into a BTS The calypso baseband and its companion chips are used on the Motorola C123 among other and are now well known for […]
Securing the Campaign

Security and the 2012 US Presidential Election This talk will go into some of challenges, solutions, and stories from securing a campaign for the 2012 US presidential election. Persons: Ben […]