Category Archives: Security

Computer Security, Links and Resources (4)

Previous Post

New and old posts.

Extracting TREZOR Secrets from SRAM

How Android Fought an Epic Botnet – and Won

Performing Concolic Execution on Cryptographic Primitives

Cryptography That Can’t Be Hacked

A software reverse engineering (SRE) suite of tools developed by NSA’s Research Directorate in support of the Cybersecurity mission

Hackers Can Take Control of Siri and Alexa By Whispering To Them in Frequencies Humans Can’t Hear

The Equifax Breach Exposes America’s Identity Crisis

Universal Second Factor

Angel “Java” Lopez

Computer Security, Links and Resources (3)

Previous Post
Next Post

My $169 development Chromebook
How Chrome OS, Termux, YubiKey & Duo Mobile make for great usable security

EverCrypt: A Verified Crypto Provider Engineered for Agile, Multi-Platform Performance

The EverCrypt verified cryptographic provider

What the Eff is 2FA?

Malicious remote code execution backdoor discovered in the popular bootstrap-sass Ruby gem

Detect pressed keys via microphone audio capture in real-time

It took DEF CON hackers minutes to pwn these US voting machines

A short history of cyber espionage

Angel “Java” Lopez

Computer Security, Links and Resources (2)

Previous Post
Next Post

Privilege Escalation in Ubuntu Linux (dirty_sock exploit)

Severe vulnerabilities uncovered in popular password managers

Extracting a 19 Year Old Code Execution from WinRAR

Interlace: A Productivity Tool For Pentesters and Bug Hunters – Automate and Multithread Your

Quantum Cryptography Market 2019 Industry Size, Trends, Opportunity, Global Growth, Insights and Forecast Research Report 2023

Hackers’ Own Tools Are Full of Vulnerabilities

BlackHat 2017: Multi-Stage Attack Targeting Container Developers, Presented by Aqua

Tracking desktop ransomware payments

Angel “Java” Lopez

Computer Security, Links and Resources (1)

Next Post

Old and new resources, about computer security:

Experts Recover AES256 Encryption Key From a PC’s Electromagnetic Emissions

Critical Vulnerability in JSON Web Encryption

Differential Fault Attacks on Elliptic Curve Cryptosystems

Hackers’ Own Tools Are Full of Vulnerabilities

Massive Database Leak Gives Us a Window into China’s Digital Surveillance State

New TLS Padding Oracles

@try_to_hack Makes History as First Bug Bounty Hacker to Earn Over $1 Million

How one teenager is making millions by hacking legally

Angel “Java” Lopez