• Question from a long time customer

    Updated: 2009-09-27 21:10:29
    A long time customer recently sent in the following question. Since it should be of broad interest, I asked his permission to anonymous post and answer it here. How do you know that subscribing to an anonymizer does not simply mark you for observation? We all know the NSA is capable of intercepting any electronic communication, and [...]

  • Course objective

    Updated: 2009-09-21 19:33:17
    As some of you in the course might have observed, we have opted to omit several details regarding the cryptographic constructions: e.g., construction of PRF from PRG, inner workings of any block-cipher, the Chinese Remainder Theorem, etc. So how would you be able to construct your own encryption scheme? The objective of this course is not [...]

  • HP SWFScan Tool – Adobe Flash Application Security Scanner

    Updated: 2009-09-10 22:16:21
    One of the most expanded targets lately in vulnerability research is Adobe’s Flash. It has become a common everyday occurrence on the web; everything from banners, to games, to file uploads. It’s almost hard to find a mainstream site that doesn’t have some sort of flash application running somewhere within the domain. As a result [...]

Last Months Items