Tails from the Cri2p
In continuation of the previous blog Fairy Tails and Silver Bullets we present the technical details of the flaws found in I2P (Invisible Internet Project)
In continuation of the previous blog Fairy Tails and Silver Bullets we present the technical details of the flaws found in I2P (Invisible Internet Project)
Introduction This week we made mention on Twitter of a zero-day vulnerability we’ve unearthed that affects the popular Tails operating system. As the Tails website
As promised, the follow up from our previous post. Before Thanksgiving, we left off with IE9 coughing up bytes. We’ll poke it some more today
Back in September, FireEye posted a blog entry discussing CVE-2013-3147, a vulnerability in Microsoft Internet Explorer. They pointed out that Microsoft patched the issue on
Introduction This post presents exploitation notes on a vulnerability we discovered in Asterisk, an open source telephony solution produced by Digium. We reported this bug
Update: After we reported our bypasses to Microsoft, they released the MS13-008 bulletin to patch CVE-2012-4792 officially. After posting our analysis of the current 0day
A new year has arrived and, although a little late, the time has come for me to unpack the present that Santa gave to the
They’re both easy targets. If you’ve been paying attention to the security industry for any length of time then you’re probably familiar with the non-disclosure
From Wikipedia: In computing, type introspection is the ability for a program to examine the type or properties of an object at runtime. These days