Question Your Work

Well I stumbled across the following image which I though is very interesting. From the 37singnals blog:

Why are we doing this? What problem are we solving? Is this actually useful? Are we adding value? Will this change behavior? Is there an easier way? What’s the opportunity cost? Is it really worth it?

more | comments | comments rss | posted by

Tim O’Reilly: Why I Love Hackers

Interesting speech from Tim O’Reilly on this year’s ETech event. Why does he love hackers? Check it out!

Although I agree with what he is saying, I need to add a few more things. First and foremost, hacking is a state of mind. It is not something that you can learn but it is definitely something that you can cultivate until you start understanding it. Second, hacking is not all about solving complicated problems. I don’t agree. [...]

more | comments | comments rss | posted by

The New Face of Cybercrime

The New Face of Cybercrime is quite interesting and very inspirational video footage that may open up your eyes a little bit wider.

The video features several known security experts that will make you shake your head in disbelieve when you learn how easy is to pull most of the hacks that happen today.

more | comments | comments rss | posted by

Exploiting Online Games

The world is quickly going online. While I caution against online voting, it is clear that online gaming is taking the Internet by storm. In our new age where virtual items carry real dollar value, and fortunes are won and lost over items that do not really exist, the new threats to the intrepid gamer are all too real. To protect against these hazards, you must understand them, and this groundbreaking book is the only comprehensive source of information on how to exploit computer games. Every White Hat should read it. It’s their only hope of staying only one step behind the bad guys.

more | comments | comments rss | posted by

Tiger Team Trailer for 12/25 CourtTV Show

CourtTV (TruTV) has a new series starting Dec. 25 at 11 pm called ‘Tiger Team.’ It follows a group of elite penetration testers hired to test organizations’ security using social engineering, wired/wireless penetration testing, and physically defeating security mechanisms (lock picking, dumpster diving, going through air vents/windows). They do all of this while avoiding the organizations’ various security defenses as well as law enforcement. [...]

more | comments | comments rss | posted by

24th Chaos Communication Congress

The 24th Chaos Communication Congress (24C3) is the annual four-day conference organized by the Chaos Computer Club (CCC). It takes place at the bcc Berliner Congress Center in Berlin, Germany. The Congress offers lectures and workshops on a multitude of topics and attracts a diverse audience of thousands of hackers, scientists, artists, and utopians from all around the world. The 24C3s slogan is “Volldampf voraus!” the German equivalent of full steam ahead a particular request for talks and projects featuring forward looking hands-on topics.

more | comments | comments rss | posted by

The Exploit Development Process

Alexander Sotirov, a.k.a Solar Eclipse, is a well known security researcher who specializes in buffer overflow exploit development and binary reverse engineering. In the following video, Solar gives a couple of simple advices which may come as a breakthrough for the readers who are new to the fields of binary software hacking.

To summarize his word, buffer overflow exploitation starts and finishes with a crash. [...]

more | comments | comments rss | posted by