All Posts (2717)

Sort by

The Mouse is mightier than the sword

In today's digital world the mouse, not the pen is arguably mightier than the sword. Via a single click, countless security mechanisms may be completely bypassed. Run untrusted app? click ...allowed. Authorize keychain access? click ...allowed. Load

Read more…
Views: 115
Comments: 0

UEFI Exploitation For The Masses

So how do you debug bios and triage a vulnerability for exploitability with no stack trace or error log? How do BIOS developers do it? Do not worry! We will explain how anyone can have debug capabilities on modern Intel platforms and show you how thi

Read more…
Views: 179
Comments: 0

All your math are belong to us

First of all, it's math. Not meth. So everybody be cool, I'm not gonna touch your central nervous system stimulant substances. Now that this is established, I can start telling my story. And this story, like all good stories, begins where it ends.

Read more…
Views: 86
Comments: 0

YOUR VOICE IS MY PASSPORT

Financial institutions, home automation products, and offices near universal cryptographic decoders have increasingly used voice fingerprinting as a method for authentication. Recent advances in machine learning and text-to-speech have shown that syn

Read more…
Views: 122
Comments: 0

Join The Community Discussion