• What does a mobile devices manufacturer know about its customers? 13 Nov. 2014 George Chetcuti

    Nowadays every electronic device can potentially steal our data and send it to some company in another part of the world, in absolute silence.

  • Open and Free Internet – net neutrality 11 Nov. 2014 George Chetcuti

    No blocking, no throttling, no paid prioritization, more transparency. The Internet is perhaps the most open network in history, and we have to keep it that way.

  • Netwrix Helps MSP’s Strengthen Security and Streamline Compliance for the Entire IT Infrastructure 7 Nov. 2014 George Chetcuti

    Netwrix Announces New MSP Partner Program Enabling Managed Service Provider Customers with Advanced Change and Configuration Auditing Solutions.

  • Exploiting ‘Win32k.sys Elevation of Privilege Vulnerability’ on Windows 8.1 6 Nov. 2014 George Chetcuti

    This paper (by Moritz Jodeit) analysis a zero-day privilege escalation vulnerability on Windows, and demonstrates how the vulnerability can be successfully exploited on Windows 8 and Windows 8.1.

  • How Secure is TextSecure? 4 Nov. 2014 George Chetcuti

    Security researchers from the German Gortz Institute for IT Security (Ruhr University Bochum) present the first complete description of TEXTSECURE’s complex cryptographic protocol and a thorough security analysis of TEXTSECURE.

Show More