Hacking with AWS: incorporating leaky buckets into your OSINT workflow

When penetration testing for an organization, what OSINT tactics can researchers employ? We discuss how hacking with AWS buckets can provide more recon data and uncover any leaks.

Read more

How brain-machine interface (BMI) technology could create an Internet of Thoughts

Several companies are developing brain-machine interface (BMI) technologies for medical applications in the near future. Will this lead to connecting the human brain to the cloud, creating an Internet of Thoughts? Or will practical, ethical, and security concerns stop progress.

Read more

A week in security (August 13 – August 19)

A round up of the security news from August 13 – 19, including an in-depth discussion of what drives the average cybercriminal to crime.

Read more

Meltdown and Spectre fallout: patching problems persist

In the days since Meltdown and Spectre have been made public, we’ve tracked which elements of the design flaw, known as speculative execution, are vulnerable and how different vendors are handling the patching process.

Read more

Meltdown and Spectre: what you need to know

2018 gets off to a rough start as manufacturers and software vendors tackle a series of severe bugs called Meltdown and Spectre that affect all modern computers.

Read more

Select your language