2011
2010
The Real Lessons Of Gawker’s Security Mess
by marcoMaking unnecessary statements of bravado, statements potentially divorced from reality, changes the equation for an attacker, it suddenly makes compromising your environment worth more of his or her time.
Google Online Security Blog: Do Know Evil: web application vulnerabilities
by marcoWeb Application Exploits and Defenses
Can Apple Safari avoid another Pwn2Own embarrassment?
by marcoList of remote code execution flaws fixed with the new Safari 4.0.5
Operation Aurora
by marcoOperation Aurora was a cyber attack conducted in mid-December 2009 and continuing into early January 2010.
Tous coupables ? Hadopi menace les réseaux Wi-Fi
by marcoWiFi présumé coupable. Hadopi est une loi inapplicable, coûteuse, et qui crée des injustices.
2009
One bug to rule them all
by marcoCalling the select() method with a large integer, results in continuous allocation of x n bytes of memory exhausting memory after a while
Les Fast-Flux Networks : comment remonter à la source des attaques ?
by marcoCa flux pour toi mec ?
The Problem With HTTPS SSL Runs Deeper Than MD5
by marcoTo move forward, we first need to acknowledge that the current HTTPS SSL mechanism is completely broken.
RapidSSL CA - MD5 and detailed info about the problem
by marcoNot all CAs using MD5 are automaticaly broken [...] Only with these 4 things in place it was possible to pull this off.
2008
Compromising Electromagnetic Emanations of Wired Keyboard
by marcoWired keyboards emit electromagnetic waves, because they contain eletronic components. These eletromagnetic radiation could reveal sensitive information such as keystrokes
Adobe Flash ads launching clipboard hijack attack
by marcoIn the Web attacks, which target Mac, Windows and Linux users running Firefox, IE and Safari, hackers are seizing control of the machine’s clipboard and using a hard-to-delete URL that points to a fake anti-virus program