I am a big fan of Git, but my love relationship only really started when I learned about the inner workings of Git. I also feel that only the Git…
A blog about IT, security and whatever crosses my mind
I am a big fan of Git, but my love relationship only really started when I learned about the inner workings of Git. I also feel that only the Git…
Recently I had the opportunity to participate in a documentary about ransomware. The journalist that conducted the interview (not with me unfortunately) wanted to see how malware in general works…
This post is inspired by a lot of questions I get about emails: Hey I got this strange email the other day… There are different mails that the security community…
IT security is a complex field, which makes protecting goods and data against attacks a really difficult and ongoing challenge. As a security professional, I give lots of people advice…
This is a totally short post, but vital information for me. I always end up searching for this online and always forget how to do it. So, in case you…
Last week I saw this tweet, which sparked a lot of interesting discussion about security of compilers.
For every programming problem that I have had in the past, there may have been a solution that I found and implemented. In most cases, the code is written and…
I have been a cloud storage user for years. I started with Dropbox, which offered over 100GB of drive space for free, through a number of promotions and collaborations (e.g.…
One day I was reading on phone malware that covertly tries to record audio, and wondered why there is no such discussion on desktop computers. I thought about WebRTC, the…
Playing around with privilege escalation techniques on my Linux box, I stumbled across an interesting exploitation method that can be used to get root privileges from a regular user account…