Re: SQL attack on a formmail

By Grant Taylor on Fri Dec 10 10:34:49 2021

Latest reply by The Doctor on Fri Dec 10 17:17:58 2021

[CFP] 4th International workshop in Artificial Intelligence and Industr

By Call For Papers AIoTS on Mon Nov 22 00:33:39 2021

Latest reply by Call For Papers AIoTS on Mon Nov 22 00:33:39 2021

[3 DAYS - SECOND SUBMISSION]: 2nd Joint Workshop on CPS&IoT Security an

By =?UTF-8?Q?Sergio_Gonz=C3=A1lez_Muri on Tue Jul 27 23:58:39 2021

Latest reply by =?UTF-8?Q?Sergio_Gonz=C3=A1lez_Muri on Tue Jul 27 23:58:39 2021

[DEADLINE APPROACHING - CFP]: 2nd Joint Workshop on CPS&IoT Security an

By =?UTF-8?Q?Sergio_Gonz=C3=A1lez_Muri on Wed Jul 7 00:03:31 2021

Latest reply by =?UTF-8?Q?Sergio_Gonz=C3=A1lez_Muri on Wed Jul 7 00:03:31 2021

[EXTENSION DEADLINE - CFP]: 2nd Joint Workshop on CPS&IoT Security and

By =?UTF-8?Q?Sergio_Gonz=C3=A1lez_Muri on Wed Jun 30 02:17:40 2021

Latest reply by =?UTF-8?Q?Sergio_Gonz=C3=A1lez_Muri on Wed Jun 30 02:17:40 2021

[CFP]: 2nd Joint Workshop on CPS&IoT Security and Privacy (CPSIoTSec 20

By =?UTF-8?Q?Sergio_Gonz=C3=A1lez_Muri on Mon May 17 00:38:18 2021

Latest reply by =?UTF-8?Q?Sergio_Gonz=C3=A1lez_Muri on Mon May 17 00:38:18 2021

FBI releases cybercrime report for 2020

By bizaruk on Tue Mar 30 10:10:32 2021

Latest reply by bizaruk on Tue Mar 30 10:10:32 2021

FBI: Over $4.2 billion officially lost to cybercrime in 2020

By bizaruk on Tue Mar 30 10:09:31 2021

Latest reply by bizaruk on Tue Mar 30 10:09:31 2021

Signal is down in China

By Andrej Vidak on Tue Mar 30 10:01:05 2021

Latest reply by Andrej Vidak on Tue Mar 30 10:01:05 2021

XanaNews Statistic for comp.security.misc. 1/1/2021 6:54:52 AM

By The Doctor on Fri Jan 1 13:54:56 2021

Latest reply by The Doctor on Fri Jan 1 13:54:56 2021

China's WeChat censored thousands of keywords tied to the coronavir

By strenght55 on Mon Dec 14 18:48:47 2020

Latest reply by strenght55 on Mon Dec 14 18:47:50 2020

XanaNews Statistic for comp.security.misc. 12/1/2020 7:56:22 AM

By The Doctor on Tue Dec 1 14:56:25 2020

Latest reply by The Doctor on Tue Dec 1 14:56:25 2020

Massive, China-state-funded hack hits companies around the world, repor

By kb9rqz CCRA punce gotcha on Thu Nov 26 00:50:53 2020

Latest reply by Siri Cruise on Thu Nov 26 19:30:39 2020

Japan-Linked Organizations Targeted in Long-Running and Sophisticated A

By kb9rqz CCRA punce gotcha on Thu Nov 26 00:58:42 2020

Latest reply by kb9rqz CCRA punce gotcha on Thu Nov 26 00:58:42 2020

Cybersecurity agency calls out four countries as the 'greatest stra

By kb9rqz police on Thu Nov 26 00:35:05 2020

Latest reply by kb9rqz police on Thu Nov 26 00:35:05 2020

Cybersecurity agency calls out four countries as the 'greatest strategi

By kb9rqz police on Thu Nov 26 00:33:22 2020

Latest reply by kb9rqz police on Thu Nov 26 00:33:22 2020

Apple apps on macOS Big Sur bypass firewall and VPN connections

By -xX(HTML)Xx- on Sat Nov 21 22:03:33 2020

Latest reply by -xX(HTML)Xx- on Sat Nov 21 22:03:33 2020

Your Computer Isn't Yours

By -xX(HTML)Xx- on Sat Nov 21 18:50:33 2020

Latest reply by -xX(HTML)Xx- on Sat Nov 21 18:50:33 2020

EU moves closer to encryption ban after Austria, France attacks

By -xX(HTML)Xx- on Sat Nov 21 17:56:45 2020

Latest reply by -xX(HTML)Xx- on Sat Nov 21 17:56:45 2020

Seeking simple VOIP program

By Bounce Baby on Tue Nov 3 15:15:24 2020

Latest reply by Bounce Baby on Tue Nov 3 15:15:24 2020

XanaNews Statistic for comp.security.misc. 11/1/2020 6:12:05 AM

By The Doctor on Sun Nov 1 13:12:09 2020

Latest reply by The Doctor on Sun Nov 1 13:12:09 2020

Twitter locks account of White House press secretary Kayleigh McEnany

By Nescio Nomen on Thu Oct 15 10:04:21 2020

Latest reply by Nescio Nomen on Thu Oct 15 10:04:21 2020

XanaNews Statistic for comp.security.misc. 10/1/2020 6:03:29 AM

By The Doctor on Thu Oct 1 12:03:31 2020

Latest reply by The Doctor on Thu Oct 1 12:03:31 2020

Avast Back Door

By mail.zip2.in Anonymous Remailer on Mon Sep 14 07:25:40 2020

Latest reply by Shadow on Sat Sep 19 12:29:15 2020

A mysterious group has hijacked Tor exit nodes to perform SSL stripping

By 50's Retro on Thu Sep 3 18:58:42 2020

Latest reply by 50's Retro on Thu Sep 3 18:58:42 2020

Exclusive: ByteDance censored anti-China content in Indonesia until mid

By 305_00 on Thu Sep 3 18:49:49 2020

Latest reply by 305_00 on Thu Sep 3 18:49:49 2020

The FBI Is Secretly Using A $2 Billion Travel Company As A Global Surve

By Eddie Shimmle on Thu Sep 3 16:37:52 2020

Latest reply by Eddie Shimmle on Thu Sep 3 16:37:52 2020

XanaNews Statistic for comp.security.misc. 9/1/2020 8:03:11 AM

By The Doctor on Tue Sep 1 14:03:23 2020

Latest reply by The Doctor on Tue Sep 1 14:03:23 2020

XanaNews Statistic for comp.security.misc. 9/1/2020 1:11:53 AM

By The Doctor on Tue Sep 1 07:12:04 2020

Latest reply by The Doctor on Tue Sep 1 07:12:04 2020

How WeChat Censored the Coronavirus Pandemic

By Phantom_View on Fri Aug 28 21:08:10 2020

Latest reply by Phantom_View on Fri Aug 28 21:08:10 2020

CFP: Special Workshop on Communications and Networking Technologies for

By Jui-Yi Tsai on Fri Aug 7 11:08:07 2020

Latest reply by Jui-Yi Tsai on Fri Aug 7 11:08:07 2020

A new group devoted to transparency is exposing secrets Wikileaks chose

By yahhoo.orgs" on Sat Jul 11 21:14:32 2020

Latest reply by yahhoo.orgs" on Sat Jul 11 21:14:32 2020

'BlueLeaks' Exposes Files from Hundreds of Police Departments

By glenn@americanpatrol.com on Sat Jul 11 21:10:55 2020

Latest reply by glenn@americanpatrol.com on Sat Jul 11 21:10:55 2020

XanaNews Statistic for comp.security.misc. 7/1/2020 10:02:31 AM

By The Doctor on Wed Jul 1 16:02:35 2020

Latest reply by The Doctor on Wed Jul 1 16:02:35 2020

=?UTF-8?Q?Macs=2c_iPhones=2c_iPads_to_get_encrypted_DNS_=e2=80=93_h?= =

By Kieren Nicolas Lovell on Sun Jun 28 23:53:10 2020

Latest reply by Kieren Nicolas Lovell on Sun Jun 28 23:53:10 2020

Losing Face: Two More Cases of Third-Party Facebook App Data Exposu

By lifechangerinaction@gmail.com on Sat Feb 8 10:08:04 2020

Latest reply by lifechangerinaction@gmail.com on Sat Feb 8 10:08:04 2020

A billion medical images are exposed online, as doctors ignore warnings

By DoomtraiN (Refurbishment complete) on Thu Jan 16 13:29:22 2020

Latest reply by DoomtraiN (Refurbishment complete) on Thu Jan 16 13:29:22 2020

Surprising results after activists test facial recognition technology o

By AOL Technical Support Drone #9848, on Thu Jan 16 13:23:02 2020

Latest reply by AOL Technical Support Drone #9848, on Thu Jan 16 13:23:02 2020

Amazon's Ring Planned Neighborhood "Watch Lists" Built On Facial Recogn

By Akira3 on Mon Dec 9 07:32:37 2019

Latest reply by Akira3 on Mon Dec 9 07:32:37 2019

Home Affairs pushes its face-matching service for porn age verification

By toto@oz.com on Wed Nov 6 20:38:37 2019

Latest reply by toto@oz.com on Wed Nov 6 20:38:37 2019

NYC local event: Unigroup's 19-SEP-2019 Meeting: Tentatively: Computer

By jeffj@panix.com on Wed Sep 11 12:40:36 2019

Latest reply by jeffj@panix.com on Thu Sep 19 00:10:35 2019

Kazakhstan Begins Intercepting HTTPS Internet Traffic Of All Citizens F

By newsnet1@airmail.net on Fri Jul 26 16:50:12 2019

Latest reply by newsnet1@airmail.net on Fri Jul 26 16:50:12 2019

Wow, fancy that. Web ad giant Google to block ad-blockers in Chrome

By suge0025@gmail.com on Tue Jun 18 15:53:28 2019

Latest reply by suge0025@gmail.com on Tue Jun 18 15:53:28 2019

Free Decryptor Released for GetCrypt Ransomware

By dave@cabdab.demon.co.uk on Sat Jun 1 18:20:22 2019

Latest reply by dave@cabdab.demon.co.uk on Sat Jun 1 18:20:22 2019

Facebook Ups Surveillance Of Users To Keep Tabs On People Who Don't Lik

By Anonymous on Thu Mar 21 23:34:40 2019

Latest reply by Anonymous on Thu Mar 21 23:34:40 2019

Use an app to track your period? That data and more could end up with F

By Anonymous on Thu Mar 21 23:18:26 2019

Latest reply by Anonymous on Thu Mar 21 23:18:26 2019

Disputed N.S.A. Phone Program Is Shut Down, Aide Says

By ->X<- on Thu Mar 21 19:56:36 2019

Latest reply by PhantomView on Thu Mar 21 21:07:27 2019

Revealed: Facebook's global lobbying against data privacy laws

By Andy Leets on Thu Mar 21 20:41:18 2019

Latest reply by Andy Leets on Thu Mar 21 20:41:18 2019

Facebook's Data Deals Are Under Criminal Investigation

By Andy Leets on Thu Mar 21 20:16:27 2019

Latest reply by Andy Leets on Thu Mar 21 20:16:27 2019

Whistleblowers say NSA still spies on American phones in hidden program

By ->X<- on Thu Mar 21 19:42:58 2019

Latest reply by ->X<- on Thu Mar 21 19:42:58 2019

UK man fined after avoiding facial recognition scanner on street

By --Soccer4Life>> on Fri Feb 15 04:30:06 2019

Latest reply by William Unruh on Sat Feb 16 21:47:06 2019

CFP: The 24th European Symposium on Research in Computer Security (ESOR

By esorics19.publicitychair@gmail.com on Mon Jan 14 09:03:02 2019

Latest reply by alcarazsudden@gmail.com on Wed Feb 6 00:36:59 2019

For Owners Of Amazon's Ring Security Cameras, Strangers May Have Been W

By From: "!!!" on Fri Jan 18 23:23:07 2019

Latest reply by From: "!!!" on Fri Jan 18 23:23:07 2019

ESORICS 2019 - Call for Workshop Proposals [24th European Symposium on

By esorics19.publicitychair@gmail.com on Fri Jan 11 08:44:24 2019

Latest reply by esorics19.publicitychair@gmail.com on Fri Jan 11 08:44:24 2019

Death Star Security Failures

By Anonymous on Sun Nov 18 13:00:37 2018

Latest reply by Anonymous on Sun Nov 18 13:00:37 2018

Facebook Portal Non-Review: Why I Didn't Put Facebook's Camera in My Ho

By anonymous on Sat Nov 17 18:16:35 2018

Latest reply by anonymous on Sat Nov 17 18:16:35 2018

The Kingdom Came to Canada: How Saudi-Linked Digital Espionage Reached

By anonymous on Sat Nov 17 17:57:00 2018

Latest reply by anonymous on Sat Nov 17 17:57:00 2018

FCC pushes carriers to implement caller ID authentication by 2019

By anonymous on Sat Nov 17 16:36:14 2018

Latest reply by anonymous on Sat Nov 17 16:36:14 2018

Untochat - secure and anonymous chat infrastructure

By Unto Sten on Mon Oct 15 18:22:11 2018

Latest reply by Unto Sten on Mon Oct 15 18:22:11 2018

Saudi-linked Cyber Espionage Against Canadian Victim Discovered

By Dhu on Gate on Mon Oct 15 01:41:11 2018

Latest reply by Dhu on Gate on Mon Oct 15 01:41:11 2018

New tool helps users decide which countries their Internet traffic tran

By Anonymous on Thu Sep 6 10:22:10 2018

Latest reply by Anonymous on Thu Sep 6 10:22:10 2018

=?UTF-8?Q?Asp=2ENet_Training_Delhi_=E2=80=93_SSDN_Technologies?=

By Anu. SSDN on Tue Jul 17 23:40:22 2018

Latest reply by Anu. SSDN on Tue Jul 17 23:40:22 2018

[CM] study: no correlation between intelligence and password streng

By Richard Kettlewell on Thu May 17 13:27:38 2018

Latest reply by Richard Kettlewell on Thu May 17 13:27:38 2018

What happened to ciphershed.org?

By Nomen Nescio on Wed Mar 14 02:18:32 2018

Latest reply by Nomen Nescio on Wed Mar 14 02:18:32 2018

How are the remailers protecting their remailer servers

By Nomen Nescio on Mon Mar 12 00:04:15 2018

Latest reply by Nomen Nescio on Mon Mar 12 00:04:15 2018

How are the remailers protecting their remailer servers?

By Nomen Nescio on Sun Mar 11 22:51:12 2018

Latest reply by Nomen Nescio on Sun Mar 11 22:51:12 2018

Generalization of two-square or double Playfair to four-square Playfair

By Mok-Kong Shen on Thu Nov 16 22:59:27 2017

Latest reply by Mok-Kong Shen on Thu Nov 16 23:39:34 2017

TEXTCOMBINE-REV, A software for combining text files to obtain high

By William Unruh on Tue Sep 5 17:08:24 2017

Latest reply by Mok-Kong Shen on Mon Oct 9 10:20:13 2017

TEXTCOMBINE-REV, A software for combining text files to obtain high-qua

By Mok-Kong Shen on Fri Sep 1 00:46:50 2017

Latest reply by Mok-Kong Shen on Fri Sep 1 00:46:50 2017

[NZ] COPS w/ U.S.M.C. DRUG 'Underworld' =?UTF-8?Q?=E2=80=94?= DON H

By elvis-85650@notatla.org.uk on Sun Jul 16 21:41:56 2017

Latest reply by elvis-85650@notatla.org.uk on Sun Jul 16 21:41:56 2017

A software for combining text files to obtain high quality pseudo-rando

By Mok-Kong Shen on Sun Jul 9 12:08:50 2017

Latest reply by William Unruh on Fri Jul 14 15:55:57 2017

HOMOPHONE-SP, an encryption software employing homophonic substitution

By Mok-Kong Shen on Fri Jun 16 23:07:07 2017

Latest reply by Mok-Kong Shen on Fri Jun 16 23:07:07 2017

Version 2.1 of a natural language text steganography scheme

By Mok-Kong Shen on Tue Apr 18 22:16:12 2017

Latest reply by elvis-85650@notatla.org.uk on Tue May 16 12:07:02 2017

Bizarre behavior of a non-smart mobile phone

By Mok-Kong Shen on Sun May 14 21:26:56 2017

Latest reply by Mok-Kong Shen on Sun May 14 21:26:56 2017

5 DNS Servers Guaranteed to Improve Your Online Safety

By Internetado on Mon May 1 22:56:29 2017

Latest reply by Bit Twister on Tue May 2 03:19:55 2017

Correction of announcement of Version 2 of a steganographical software

By Mok-Kong Shen on Wed Apr 5 19:53:14 2017

Latest reply by Mok-Kong Shen on Wed Apr 5 19:53:14 2017

Cyber security spending to reach $90bn in 2017

By Internetado on Fri Mar 17 17:57:40 2017

Latest reply by Internetado on Fri Mar 17 17:57:40 2017

"Someone just used your password..."

By Alek on Tue Dec 6 14:04:45 2016

Latest reply by wbredstrand@gmail.com on Tue Mar 14 13:56:46 2017

problem 5: GNU's Tor endorsement undermined (was: CloudFlare, not good

By Anonymous on Sun Mar 12 19:28:15 2017

Latest reply by Anonymous on Sun Mar 12 19:28:15 2017

Secure wifi?

By Boris on Sat Mar 11 20:16:12 2017

Latest reply by Barry Margolin on Sun Mar 12 17:40:04 2017

GNU CDN? (was: CloudFlare, not good choice)

By Nomen Nescio on Sat Mar 11 16:17:05 2017

Latest reply by Nomen Nescio on Sat Mar 11 16:17:05 2017

Freedom 0: the utilitarian vs. the deontologist

By Nomen Nescio on Thu Mar 9 19:28:35 2017

Latest reply by Nomen Nescio on Sat Mar 11 15:37:58 2017

DoS in the mass media

By Nomen Nescio on Thu Mar 9 22:30:32 2017

Latest reply by Nomen Nescio on Thu Mar 9 22:30:32 2017

state of gnuradio freedom and security issues

By Anonymous on Wed Mar 8 19:01:47 2017

Latest reply by Anonymous on Wed Mar 8 19:01:47 2017

gnuradio project DoS attacks GNU wget users

By Nomen Nescio on Wed Mar 8 11:20:56 2017

Latest reply by Nomen Nescio on Wed Mar 8 11:20:56 2017

Get 'Cloud Management and Security' ebook ($109 value) FREE for a limit

By JEMM on Wed Feb 22 19:50:02 2017

Latest reply by JEMM on Wed Feb 22 19:50:02 2017

CFP: Twenty-second European Symposium on Research in Computer Security

By alcarazsudden@gmail.com on Mon Feb 13 13:18:43 2017

Latest reply by alcarazsudden@gmail.com on Mon Feb 13 13:18:43 2017

Gift Malaysia| premium gift in Malaysia| Coaster Art

By Coaster art on Tue Jan 31 04:51:35 2017

Latest reply by Coaster art on Tue Jan 31 04:51:35 2017

[CM] the USB killer now exists and is being mass-produced

By Jim on Tue Jan 10 17:52:38 2017

Latest reply by Jim on Tue Jan 10 17:52:38 2017

[CM] Hacking headphones to serve as a microphone

By Jim on Tue Jan 10 17:50:39 2017

Latest reply by Jim on Tue Jan 10 17:50:39 2017

Special Offers

By vasuvasu9160@gmail.com on Wed Oct 19 00:27:10 2016

Latest reply by rajesh9450640@gmail.com on Fri Nov 18 02:23:31 2016

narendra modi

By rajesh9450640@gmail.com on Fri Nov 18 02:23:02 2016

Latest reply by rajesh9450640@gmail.com on Fri Nov 18 02:23:02 2016

demonetization of rupee in India

By gopal19singh07@gmail.com on Fri Nov 18 01:15:36 2016

Latest reply by gopal19singh07@gmail.com on Fri Nov 18 01:15:36 2016

=?UTF-8?Q?CFP=3A_3rd_ACM_Cyber=E2=80=90Physical_System_Security_Worksh?

By alcarazsudden@gmail.com on Sun Oct 9 15:20:27 2016

Latest reply by alcarazsudden@gmail.com on Sun Oct 9 15:20:27 2016

TrueCrypt Audit: No NSA Backdoors

By Jim on Mon Oct 3 20:14:49 2016

Latest reply by Jim on Mon Oct 3 20:14:49 2016

DIGRAMSUB, an encryption scheme based on substitution of digrams and tr

By Mok-Kong Shen on Mon Oct 3 19:01:14 2016

Latest reply by Mok-Kong Shen on Mon Oct 3 19:01:14 2016

A simple combined PRNG based on permutation polynomials mod 2**n

By Mok-Kong Shen on Sat Sep 17 11:54:22 2016

Latest reply by Mok-Kong Shen on Sun Sep 25 23:31:49 2016

PERMPOLYSP, a block cipher employing permutation polynomials mod 2**n a

By Mok-Kong Shen on Thu Aug 18 10:59:01 2016

Latest reply by Mok-Kong Shen on Thu Aug 18 10:59:01 2016

Survey: Determining a standard for information security cultures

By snarfnel on Wed Aug 17 09:42:15 2016

Latest reply by snarfnel on Wed Aug 17 09:42:15 2016

Proposal of a fair contract signing protocol (without a trusted third p

By Mok-Kong Shen on Tue Jun 21 01:34:37 2016

Latest reply by Mok-Kong Shen on Tue Jun 21 01:34:37 2016

Location tracking of mobile phones

By Mok-Kong Shen on Sun May 29 20:01:12 2016

Latest reply by Mok-Kong Shen on Tue May 31 22:57:50 2016

FIPS PUB 181 Password Generation

By vanipratik997@gmail.com on Wed May 4 02:40:46 2016

Latest reply by vanipratik997@gmail.com on Wed May 4 02:40:46 2016

An improvement of the classical Playfair cipher

By Mok-Kong Shen on Sun Apr 17 21:12:00 2016

Latest reply by Mok-Kong Shen on Sun Apr 17 21:12:00 2016

FLEXISPY Spy Phone, Mobile Spy Ikee.B to the Federal Communications Com

By miguel902998352@gmail.com on Thu Apr 14 12:27:46 2016

Latest reply by miguel902998352@gmail.com on Thu Apr 14 12:27:46 2016

Coded sentences

By Mok-Kong Shen on Thu Apr 7 22:36:22 2016

Latest reply by Mok-Kong Shen on Tue Apr 12 21:55:39 2016

New version of RSA encryption software PROVABLEPRIME V.2.0 available

By Mok-Kong Shen on Thu Mar 10 20:52:04 2016

Latest reply by Mocchico on Fri Apr 8 19:30:18 2016

Practicality of codebook in current-day secret communications

By Mok-Kong Shen on Wed Feb 24 21:50:28 2016

Latest reply by Mok-Kong Shen on Sat Feb 27 23:23:24 2016

Doubling the block length of a given block cipher

By Mok-Kong Shen on Tue Feb 23 12:31:41 2016

Latest reply by Mok-Kong Shen on Tue Feb 23 12:31:41 2016

How to counter the security risks of shared prime factors among RSA mod

By Mok-Kong Shen on Thu Jan 14 08:28:01 2016

Latest reply by Mok-Kong Shen on Thu Jan 14 08:28:01 2016

wRe: All fascists must die

By I love female bare breasted on Thu Dec 31 07:49:45 2015

Latest reply by I love female bare breasted on Thu Dec 31 07:49:45 2015

How good is the chance of building a moderately sized quantum compu

By Mok-Kong Shen on Sun Dec 20 15:33:51 2015

Latest reply by Mok-Kong Shen on Sun Dec 20 15:33:51 2015

How good is the chance of building a moderately sized quantum computer?

By Mok-Kong Shen on Mon Nov 30 12:29:00 2015

Latest reply by Mok-Kong Shen on Mon Nov 30 12:29:00 2015

Researches in quantum computing seem to progress only extremely slowly

By Mok-Kong Shen on Tue Sep 1 13:09:25 2015

Latest reply by Mok-Kong Shen on Thu Oct 8 18:28:27 2015

[CM] Bypassing OSX Gatekeeper is simple

By RS Wood on Wed Sep 30 17:00:13 2015

Latest reply by RS Wood on Wed Sep 30 17:00:13 2015

CISCO training in Hyderabad

By golarsseo@gmail.com on Fri Sep 25 02:13:49 2015

Latest reply by golarsseo@gmail.com on Fri Sep 25 02:13:49 2015

PROGRAM ...

By jeff.clouddigitizing@gmail.com on Mon Sep 7 23:37:25 2015

Latest reply by jeff.clouddigitizing@gmail.com on Mon Sep 7 23:37:25 2015

A potential possibility of improvement of PKI for personal communic

By Mok-Kong Shen on Fri Aug 21 13:44:46 2015

Latest reply by Mok-Kong Shen on Fri Aug 21 13:44:46 2015

Anyone know what this is?

By Anonymous on Tue Aug 18 07:15:47 2015

Latest reply by Anonymous on Tue Aug 18 07:15:47 2015

[M] Laika BOSS malware detection donated by Lockheed Martin

By RS Wood on Mon Aug 17 17:59:43 2015

Latest reply by RS Wood on Mon Aug 17 17:59:43 2015

Stay away from Lenovo computers

By Jack Ryan on Sun Aug 16 20:01:56 2015

Latest reply by Jack Ryan on Sun Aug 16 20:01:56 2015

A potential possibility of improvement of PKI for personal communicatio

By Mok-Kong Shen on Sun Aug 16 11:31:13 2015

Latest reply by Mok-Kong Shen on Sun Aug 16 11:31:13 2015

[CM] the Black Hat 2015 conference, PDFs

By RS Wood on Wed Aug 12 13:49:27 2015

Latest reply by RS Wood on Wed Aug 12 13:49:27 2015

[CM] American Office of Personnel gets pwnie for epic fail of the year

By RS Wood on Sun Aug 9 18:27:51 2015

Latest reply by RS Wood on Sun Aug 9 18:27:51 2015