Internet Explorer

/Tag:Internet Explorer

Week 34 In Review – 2015

Events Related DEFCON This year marked the 23rd DefCon, the hacker conference that began as an informal gathering for hackers to meet in person and party in the desert. Imploding Barrels and Other Highlights From Hackfest DefCon - www.wired.com I spent the week with over 20,000 hackers in Las Vegas — here's what I saw [...]

Week 49 In Review – 2014

Resources Using PowerShell for Client Side Attacks – abofapenetrationtester.com This blog post details everything that Nikhil Mittal spoke about at DeepSec plus much more. With this blog post, a newer version of Nishang with "Client" category of attacks is also being released. Lets have a look at the scripts one-by-one. Operation Cleaver – cylance.com The Operation Cleaver [...]

Week 17 In Review – 2014

Resources Verizon Data Breach Investigations Report – verizonenterprise.com The 2014 Data Breach Investigations Report (DBIR) casts new light on threats — taking 10 years of forensic data and finding that 92% of these can be categorized into nine basic attack patterns. This approach also helps identify primary threats to your industry, which you can analyze to [...]

Week 50 in Review – 2012

Event Related Legal Merits of 'Hack Back' Strategy - bankinfosecurity.com From point-of-sale hacks to malware and DDoS attacks, the top cyberthreats of 2012 have been aggressive and strong. Is it time for organizations to adopt a "hack back" strategy against perceived attackers? Resources Mitigating Targeted Attacks on Your Organization - blogs.technet.com The Trustworthy Computing blog [...]

Week 38 in Review – 2012

Event Related Columbus OWASP Meeting Presentation - stateofsecurity.com Last week, I presented at the Columbus OWASP meeting on defensive fuzzing, tampering with production web applications as a defensive tactic and some of the other odd stuff we have done in that arena. Charlie Miller & Dino Dai Zovi at CodenomiCON 2012: iOS Hacker's Update - [...]