вторник, 26 июня 2012 г.

The BlackBerry Security Summit: How collaborating with external security researchers keeps RIM on top in mobile security

Server-side polymorphism demo [Anatomy of an Attack online]

iOS Hash Cracking

Adobe reader vulnerability demo [Anatomy of an Attack online]

iFrame drive-by attack demo [Anatomy of Attack online]

BlackBerry Solutions for Law Enforcement

#HITB2012AMS D2T2 - Nicolas Gregoire - Attacking XML Preprocessing

Apple files for security, simulation, display luminance and flash memory patents

How NFC Could Pair With iOS 6 Passbook for E-Wallet Matrimony

Computer Scientists Break Security Token Key in Record Time

Trojan.Milicenso: A Paper Salesman’s Dream Come True

Facebook Changed Everyone’s Email to @Facebook.com

Winamp's woes: how the greatest MP3 player undid itself

Exploiting Software Bible

NICT Daedalus Cyber-attack alert system

четверг, 21 июня 2012 г.

Twitter account hack epidemic - Don't fall for "CNBC" spam!

Hack Windows 7 using Microsoft Office Click Once Unsafe Object Package Handling Vulnerability

PCI DSS Compliance in the Cloud: Challenges and Tactics - Wired News

April 2012 Cyber Attacks Statistics

The History of Encryption | Visual.ly

Anonymous creates Pastebin rival

Hacking Windows 7 Password Without Any Software

Apple launches 3D maps on iOS 6

суббота, 16 июня 2012 г.

Revealed! The top five Android malware detected in the wild

Facebook Account Verification scam tricks unsuspecting users with SOPA/PIPA warning

App Roundup: Top 10 BlackBerry Smartphone Apps to Use at Networking Events

Playing by the Rules: Performing Firewall Audits

Oracle BAM 11gR1 Handbook

четверг, 14 июня 2012 г.

Защита данных в сетях LTE

iBaby Video Monitor at Radio Shack (Review)

iOS 6. Preview

Customizing your Magento store | Magazine | Best solutions for e-commerce marketing

iCoder Magazine 05/12

Internet Filtering in Ethiopia

HACKPLANET TECHNOLOGIES

пятница, 8 июня 2012 г.

The Guide to Backtrack

Security through Obscurity (videos)

Metasploit With Microsoft Sql Server And Smb Exploits (Part 1/2)

Ipmi: Hacking Servers That Are Turned "Off"

Grendel Scan Web Vulnerability Scanner Backtrack 5R2

Reverse Engineering: Bypassing Acunetix Web Security Scanner 8 Activation.

Protect Your Java Code — Through Obfuscators And Beyond

Rules of the Internet

понедельник, 4 июня 2012 г.

POSITIVE HACK DAYS-2012. Day 1. Mix

Available in English as well in Russian
Доступно на русском и английском языках
Day #1. Mix

POSITIVE HACK DAYS-2012. Day 2. Conference

Available in English as well in Russian
Доступно на русском и английском языках
Day #2. Conference

POSITIVE HACK DAYS-2012. Day 2. Hall 1

Available in English as well in Russian
Доступно на русском и английском языках
Day #2. Hall 1

POSITIVE HACK DAYS-2012. Day 2. Hall 3

Available in English as well in Russian
Доступно на русском и английском языках
Day #2. Hall 3

POSITIVE HACK DAYS-2012. Day 2. Hall 4

Available in English as well in Russian
Доступно на русском и английском языках
Day #2. Hall 4

POSITIVE HACK DAYS-2012. Day 2. Hall 5

Available in English as well in Russian
Доступно на русском и английском языках
Day #2. Hall 5

POSITIVE HACK DAYS-2012. Day 2. Mix

Available in English as well in Russian
Доступно на русском и английском языках
Day #2. Mix

POSITIVE HACK DAYS-2012. Day 1. Conference

Available in English as well in Russian
Доступно на русском и английском языках
Day #1. Conference

POSITIVE HACK DAYS-2012. Day1. Hall 1

Available in English as well in Russian
Доступно на русском и английском языках
Day #1. Hall 1

POSITIVE HACK DAYS-2012. Day 1. Hall 3

Available in English as well in Russian
Доступно на русском и английском языках
Day #1. Hall 3

POSITIVE HACK DAYS-2012. Day 1. Hall 4

Available in English as well in Russian
Доступно на русском и английском языках
Day #1. Hall 4

POSITIVE HACK DAYS-2012. Day 1. Hall 5

Available in English as well in Russian
Доступно на русском и английском языках
Day #1. Hall 5