simonroses.com
exploit | Simon Roses Femerling – Blog
http://www.simonroses.com/tag/exploit
Simon Roses Femerling – Blog. CyberSpace Insecurity 3.X. System Crash Image Library. Race to 0day in Nation State Operating Systems. January 16, 2015. Operating System change is coming We all know that Windows still dominates the desktop arena with Linux and MacOS trying to catch up and that Android dominates the mobile space with iOS and Windows Phone trying to catch up as … Continue reading →. Computer Network Operations (CNO). Book Review: iOS Hacker’s Handbook. November 14, 2013. June 17, 2013. Anali...
simonroses.com
Security Advisories | Simon Roses Femerling – Blog
http://www.simonroses.com/security-advisories
Simon Roses Femerling – Blog. CyberSpace Insecurity 3.X. System Crash Image Library. Clear Text Secrets in PassmanLite Could Allow Access to Passwords. Leave a Reply Cancel reply. Your email address will not be published. Search www.simonroses.com. Computer Network Operations (CNO). Simon Roses Femerling – Blog. Proudly powered by WordPress.
simonroses.com
Race to 0day in Nation State Operating Systems | Simon Roses Femerling – Blog
http://www.simonroses.com/2015/01/race-to-0day-in-nation-state-operating-systems
Simon Roses Femerling – Blog. CyberSpace Insecurity 3.X. System Crash Image Library. A Security Breach Can Hurt You, More Than You Think! Race to 0day in Nation State Operating Systems. January 16, 2015. Operating System change is coming. With the silent (or not that silent 🙂 cyber guerrilla going on in the Internet between the West and the East it is not surprising that many Nation States are developing their own operating systems to cut the dependency on USA software vendors. China: Several custom OSs.
simonroses.com
Threat Modeling | Simon Roses Femerling – Blog
http://www.simonroses.com/category/threat-modeling
Simon Roses Femerling – Blog. CyberSpace Insecurity 3.X. System Crash Image Library. Category Archives: Threat Modeling. November 26, 2014. In recent years all cyber is fashionable, and intelligence applied to the cyber world could not be less! The concept of intelligence has an offensive meaning due to the use by intelligence and military agencies, but now too many security … Continue reading →. OWASP Top Ten 2013 free workshop. July 18, 2013. AppSec: Build Rooted Detection in your App. June 4, 2013.
simonroses.com
Articles | Simon Roses Femerling – Blog
http://www.simonroses.com/articles
Simon Roses Femerling – Blog. CyberSpace Insecurity 3.X. System Crash Image Library. I often write articles in various publications. If you are interested in an article please get in touch with me. Red Seguridad ( http:/ www.borrmart.es/redseguridad.php. SIC ( http:/ www.revistasic.com/. DotNetMania ( http:/ www.dotnetmania.com/. IN)SECURE MAGAZINE ( http:/ www.net-security.org/insecuremag.php. Leave a Reply Cancel reply. Your email address will not be published. Search www.simonroses.com.
simonroses.com
Information Security | Simon Roses Femerling – Blog
http://www.simonroses.com/tag/information-security
Simon Roses Femerling – Blog. CyberSpace Insecurity 3.X. System Crash Image Library. Tag Archives: Information Security. A Security Breach Can Hurt You, More Than You Think! September 9, 2015. Week after week we read about security breaches in top websites around the world, where millions of user’s data are exposed and the company not even reply with an apology. Until now nobody in management (your typical C-level) assumed any … Continue reading →. November 26, 2014. Heartbleed: pain, blood and code.
simonroses.com
Pentest | Simon Roses Femerling – Blog
http://www.simonroses.com/category/pentest
Simon Roses Femerling – Blog. CyberSpace Insecurity 3.X. System Crash Image Library. Fristileaks 1.3 CTF Writeup. December 18, 2015. This vulnerable VM is a fun and simple CTF that can be downloaded from the awesome portal VulnHub. Note: For vmware you may need to set the MAC address to 08:00:27:A5:A6:76 to get it working. I did, see Fig 1. … Continue reading →. November 26, 2014. In recent years all cyber is fashionable, and intelligence applied to the cyber world could not be less! April 16, 2014.
simonroses.com
Software Security | Simon Roses Femerling – Blog
http://www.simonroses.com/tag/software-security
Simon Roses Femerling – Blog. CyberSpace Insecurity 3.X. System Crash Image Library. Tag Archives: Software Security. Equation APT analysis using Security Data Science platform: BinSecSweeper. September 24, 2015. As many readers already know, at VULNEX we have been working on our BinSecSweeper project whose development began in 2013 thanks to an award by US DARPA within its pilot program Cyber Fast Track (CFT) and we were the only … Continue reading →. Race to 0day in Nation State Operating Systems.
simonroses.com
Security | Simon Roses Femerling – Blog
http://www.simonroses.com/category/security
Simon Roses Femerling – Blog. CyberSpace Insecurity 3.X. System Crash Image Library. Fristileaks 1.3 CTF Writeup. December 18, 2015. This vulnerable VM is a fun and simple CTF that can be downloaded from the awesome portal VulnHub. Note: For vmware you may need to set the MAC address to 08:00:27:A5:A6:76 to get it working. I did, see Fig 1. … Continue reading →. Equation APT analysis using Security Data Science platform: BinSecSweeper. September 24, 2015. September 9, 2015. January 16, 2015. Operating Sy...
SOCIAL ENGAGEMENT