A “dead drop” is a well-known espionage tactic of passing items or information between two parties using secret locations. The two parties never meet and any sign of communication is concealed. This tactic is commonly used by intelligence officers to interact with their assets in the field to avoid any suspicious meetings or either caught […]
Category Archives: Uncategorized
Background A point of sale (POS) system refers to the critical piece of software used by customers to execute a payment for goods or a service. This also includes the physical devices in stores, where POS terminals and systems are used to process card payments. These are often the primary targets of financially motivated organised […]
JavaScript is a programming language commonly used in web browsers. Due to its use in web browsers, it is often employed by security researchers and malicious actors to identify and exploit security vulnerabilities in browsers (e.g., the Aurora Operation). Additionally, JavaScript is also used by exploit kits to gain control over target systems and deliver […]
In 1937, one of the world’s most authoritative art historians, Abraham Bredius, was approached by a lawyer on behalf of a Dutch family estate to inspect a painting of a Christ and the Disciples at Emmaus (pictured above). Bredius dedicated many years of his life studying the artwork of Johannes Vermeer. After inspecting the painting, […]
Although I find tools like Immunity Debugger/OllyDbg more useful as a debugger/disassembler for security research and malware analysis, this does not mean that I ignore the power and capabilities of the IDA debugger/disassembler, both for individual and corporate use. Particularly, IDA’s ability to decompile a program into its source code, its extensive platform support, the […]