Eavesdroppers and censors can still monitor what you’re viewing even if you’re using encrypted DNS
Guest Post: Researchers have found it’s possible to identify web pages visited by a user by analysing DoH traffic.
Guest Post: Researchers have found it’s possible to identify web pages visited by a user by analysing DoH traffic.
Guest Post: The OpenSSL 3.0 project is the first major overhaul of the internal dispatch structure throughout the library.
Guest Post: Learn how to do basic live process forensics for a bind shell backdoor waiting for a connection on Ubuntu in Linux.
Guest Post: Learn to use Route Origin Validation for BGP on the host.
Why are some Internet issues so challenging to solve, while others seem to be effortless and appear to solve themselves?
The APNIC Community Honeynet Project seeks to help network engineers and network security personnel understand their online adversaries.
Guest Post: Researchers are using DNS backscatter to detect large-scale scans of IPv6 address space.
Honeypots can be useful tools for security research, teaching us about attackers’ methods.
Guest Post: MalConfScan is a new malware analysis and memory forensics tool developed by JPCERT/CC to assist with incident investigations.
TechCERT’s Dileepa Lathsara says cybersecurity is now a board-level discussion in Sri Lanka.