Information Security
This note was published in May 2014. A newer revision of the REMnux distro has been released since then. Please see the...Read more
"You Have Been Selected for Family Resettlement to Australia," began the email that included the seal of the Embassy of...Read more
If you are looking to get started with malware analysis, tune into the webcast series I recorded to illustrate key tools...Read more
Examining malicious software involves a variety of tasks, some simpler than others. These efforts can be grouped into...Read more
Here's a game for information security...Read more
Perhaps the most challenging and exciting aspect of cybersecurity is the need to account for business context when making...Read more
When characterizing ill-effects of malicious software, it's too easy to focus on malware itself, forgetting that behind...Read more
When engaged in a fight, it's natural to ask yourself whether you are winning or losing. However, in the context of...Read more
The future of information security is intertwined with the evolution of IT at large and the associated business and...Read more
Despite its age, Windows XP is useful to have in your IT lab, for instance if you need to experiment with older software or...Read more