Category Archives: Security

Computer Security, Links and Resources (6)

Previous Post

WebAssembly: A New World Of Native Exploits On The Web

Microsoft Patches ‘Wormable’ Flaw in Windows XP, 7 and Windows 2003

Linux kernel RDS flaw affects Red Hat, Ubuntu, Debian and SUSE

The Most Expensive Lesson Of My Life: Details of SIM port hack

John McAfee ranks the biggest hacks ever

Hackers Show Proofs of Concept to Beat Hardware-Based 2FA
DEF CON hackers show how YubiKeys and RSA tokens can be spoofed and circumvented (2017)

Nearly 3,000 Bitcoin Miners Exposed Online via Telnet Ports, Without Passwords

Guerrilla Threat Modelling (or ‘Threat Modeling’ if you’re American)

Angel “Java” Lopez


Computer Security, Links and Resources (5)

Previous Post
Next Post

Adventures in Video Conferencing Part 4: What Didn’t Work Out with WhatsApp

Critical vulnerability in Grin 1.0.1 and older (fixed in 1.0.2)

Unless you want your payment card data skimmed, avoid these commerce sites

Meltdown Redux: Intel Flaw Lets Hackers Siphon Secrets from Millions of PC

Ten Malicious Libraries Found on PyPI – Python Package Index

A Method for Obtaining Digital Signatures and Public-Key Cryptosystems

mXtract – Memory Extractor & Analyzer

Researchers trick Tesla Autopilot using stickers on the road

Angel “Java” Lopez


Computer Security, Links and Resources (4)

Previous Post
Next Post

New and old posts.

Extracting TREZOR Secrets from SRAM

How Android Fought an Epic Botnet – and Won

Performing Concolic Execution on Cryptographic Primitives

Cryptography That Can’t Be Hacked

A software reverse engineering (SRE) suite of tools developed by NSA’s Research Directorate in support of the Cybersecurity mission

Hackers Can Take Control of Siri and Alexa By Whispering To Them in Frequencies Humans Can’t Hear

The Equifax Breach Exposes America’s Identity Crisis

Universal Second Factor

Angel “Java” Lopez

Computer Security, Links and Resources (3)

Previous Post
Next Post

My $169 development Chromebook
How Chrome OS, Termux, YubiKey & Duo Mobile make for great usable security

EverCrypt: A Verified Crypto Provider Engineered for Agile, Multi-Platform Performance

The EverCrypt verified cryptographic provider

What the Eff is 2FA?

Malicious remote code execution backdoor discovered in the popular bootstrap-sass Ruby gem

Detect pressed keys via microphone audio capture in real-time

It took DEF CON hackers minutes to pwn these US voting machines

A short history of cyber espionage

Angel “Java” Lopez

Computer Security, Links and Resources (2)

Previous Post
Next Post

Privilege Escalation in Ubuntu Linux (dirty_sock exploit)

Severe vulnerabilities uncovered in popular password managers

Extracting a 19 Year Old Code Execution from WinRAR

Interlace: A Productivity Tool For Pentesters and Bug Hunters – Automate and Multithread Your

Quantum Cryptography Market 2019 Industry Size, Trends, Opportunity, Global Growth, Insights and Forecast Research Report 2023

Hackers’ Own Tools Are Full of Vulnerabilities

BlackHat 2017: Multi-Stage Attack Targeting Container Developers, Presented by Aqua

Tracking desktop ransomware payments

Angel “Java” Lopez

Computer Security, Links and Resources (1)

Next Post

Old and new resources, about computer security:

Experts Recover AES256 Encryption Key From a PC’s Electromagnetic Emissions

Critical Vulnerability in JSON Web Encryption

Differential Fault Attacks on Elliptic Curve Cryptosystems

Hackers’ Own Tools Are Full of Vulnerabilities

Massive Database Leak Gives Us a Window into China’s Digital Surveillance State

New TLS Padding Oracles

@try_to_hack Makes History as First Bug Bounty Hacker to Earn Over $1 Million

How one teenager is making millions by hacking legally

Angel “Java” Lopez