This Black Friday, Choose Smart Devices with Cybersecurity in Mind
As we’re looking at another Black Friday, we can expect consumers to expose themselves to more cybersecurity threats thanks to their purchases. This article will look…
Ethical hacker and IT security researcher with more than 15 years of experience. Apart from an MSc Degree, ten technical certs, including OSCE or CISSP. Former speaker at DEFCON, SAS, AusCERT, Shakacon, and many more.
As we’re looking at another Black Friday, we can expect consumers to expose themselves to more cybersecurity threats thanks to their purchases. This article will look…
Which mobile operating system (OS) is more secure: iOS or Android? This straightforward question does not have a simple answer. As with most topics in IT…
Rogue devices are malicious machines placed inside networks to steal data or otherwise spy on network users. The owners of these devices might range from your…
I recently decided to analyze some binaries on an IoT camera I had Telnet access to. What should have been as easy as copying files from…
Back in 2019, Hyrum Anderson and I organized the Machine Learning Security Evasion Competition (MLSEC), where participants had to modify malware samples to remain functional and…
The FIRST 2020 Virtual Challenge Competition was organized at the end of June as a virtual version of the annual CTF (Capture the Flag) held by…
Last week, four of us from CUJO AI Labs spent three days solving complex challenges in network, cryptography, reverse engineering, programming, puzzle and other categories in…
Last year, Dr. Hyrum Anderson, now the Principal Architect (Security Machine Learning) at Microsoft, and I designed a competition, and it was a huge success. It was launched at…
The transition to work from home was a significant change in people’s lives and the ways businesses operate. Some people were provided company devices to work…