simpletech
115 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Scooped by blahsphemer
Scoop.it!

Intel trng report_20120312

ANALYSIS OF INTEL’S IVY BRIDGE DIGITAL RANDOM NUMBER GENERATOR PREPARED FOR INTEL BY Mike Hamburg Paul Kocher Mark E. Marson Cryptography Research, Inc. 575 M
more...
No comment yet.
Scooped by blahsphemer
Scoop.it!

Understanding Rootkits: Using Memory Dump Analysis for Rootkit Detection

Understanding Rootkits: Using Memory Dump Analysis for Rootkit Detection | simpletech | Scoop.it
Dmitry Korolev, Yuri Gubanov, Oleg Afonin research@belkasoft.com © Belkasoft Research, 2013 Every rootkit employs a wide range of masquerading techniques to prevent its detection. Anti-virus and an...
more...
No comment yet.
Scooped by blahsphemer
Scoop.it!

Research at Google - Google+ - CHIMP : Exploring robotic Humanitarian Aid and Disaster…

Research at Google - Google+ - CHIMP : Exploring robotic Humanitarian Aid and Disaster… | simpletech | Scoop.it
more...
No comment yet.
Scooped by blahsphemer
Scoop.it!

PS4 Update File format

PS4 Update File format | simpletech | Scoop.it
UPDATE #1 Here is an image (from ps3news) that better shows the breakdown of the PS4UPDATE.PUP File: Also, a dude has written a quick script that can parse the update files and can extract the encr...
more...
No comment yet.
Scooped by blahsphemer
Scoop.it!

What is SCADA Anyway?

What is SCADA Anyway? | simpletech | Scoop.it
What is SCADA? Cimation explains the basics functions of a SCADA system and how it benefits oil and gas operations.
more...
No comment yet.
Scooped by blahsphemer
Scoop.it!

Introduction to the Python Interpreter, Part 3: Understanding Bytecode - Of Interest

This is Part 3 in a series on the Python interpreter. Part 1 here, Part 2 here. If you’re enjoying this series, consider applying to Hacker …
more...
No comment yet.
Scooped by blahsphemer
Scoop.it!

Carberp-based trojan attacking SAP - Microsoft Malware Protection Center - Site Home - TechNet Blogs

Carberp-based trojan attacking SAP - Microsoft Malware Protection Center - Site Home - TechNet Blogs | simpletech | Scoop.it
The Microsoft Malware Protection Center Blog provides information on viruses, worms and other malware and spyware and explains how Microsoft antivirus products help protect your computer
more...
No comment yet.
Scooped by blahsphemer
Scoop.it!

The inevitable move - 64-bit ZeuS has come enhanced with Tor

The inevitable move - 64-bit ZeuS has come enhanced with Tor | simpletech | Scoop.it
The more people switch to 64-bit platforms, the more 64-bit malware appears. We have been following this process for several years now. The more people work on 64-bit platforms, the more 64-bit applications that are developed as well.
more...
No comment yet.
Scooped by blahsphemer
Scoop.it!

cybertools / Disass

cybertools / Disass | simpletech | Scoop.it
Disass is a binary analysis framework written in Python to ease the automation of static malware reverse engineering.
more...
No comment yet.
Scooped by blahsphemer
Scoop.it!

Using DBI for solving Reverse Engineering 101 – Newbie Contest from eLearnSecurity | Corelan Team

Using DBI for solving Reverse Engineering 101 – Newbie Contest from eLearnSecurity | Corelan Team | simpletech | Scoop.it
Introduction Last weekend I had some time so I wanted to have a look at a reversing challenge which you can find here:
more...
No comment yet.
Scooped by blahsphemer
Scoop.it!

Write and Submit your first Linux kernel Patch

By Greg Kroah-Hartman As A core member of the Linux Kernel team, Greg will show us how to write a kernel patch. This talk will cover the steps necessary to p...
more...
No comment yet.
Scooped by blahsphemer
Scoop.it!

2010 2013 sandro suffert memory forensics introdutory work shop - p...

Course Objectives: • Help the student to achieve a broad understanding of the main types of memory forensic data gathering and analysis • Serve as an intro
more...
No comment yet.
Scooped by blahsphemer
Scoop.it!

Multimedia overwriter with Spy features

Multimedia overwriter with Spy features | simpletech | Scoop.it
Multimedia overwriter malware coming from Caribbean zone with Spying features included.
more...
No comment yet.
Scooped by blahsphemer
Scoop.it!

.NET reversing with Reflexil - InfoSec Institute

.NET reversing with Reflexil - InfoSec Institute | simpletech | Scoop.it
Technically speaking a .NET built software or component (DLL) resembles an executable assembly. That’s because it’s compiled in MSIL, and you can usually view the source in Reflector and many other tools such Ispy.
more...
No comment yet.
Scooped by blahsphemer
Scoop.it!

HolisticInfoSec: Volatility 2.3 and FireEye's diskless, memory-only Trojan.APT.9002

HolisticInfoSec: Volatility 2.3 and FireEye's diskless, memory-only Trojan.APT.9002 | simpletech | Scoop.it
more...
No comment yet.
Scooped by blahsphemer
Scoop.it!

Voynich manuscript - Wikipedia, the free encyclopedia

Voynich manuscript

The Voynich manuscript is an illustrated codex hand-written in an unknown writing system. The book has been carbon-dated to the early 15th century (1404-1438), and may have been composed in Northern Italy during the Italian Renaissance. The manuscript is named after Wilfrid Voynich, a book dealer who purchased it in 1912.

more...
No comment yet.
Scooped by blahsphemer
Scoop.it!

AppLovin Ad Library SDK: Remote Command Execution via Update Mechanism - mwrlabs

more...
No comment yet.