Oh no! You're looking for something which just isn't here! Fear not however, errors are to be expected, and luckily there are tools on the sidebar for you to use in your search for what you need.
Try one of these links:Search
About
Longer entries are truncated. Click the headline of an entry to read it in its entirety.
Latest
- Encrypted mobile to landline phone calls with Asterisk 1.8
- Eight Epic Failure of Regulating Cryptography
- PrivateGSM: Blackberry/iPhone/Nokia mobile voice encryption with ZRTP or SRTP/SDES
- A couple of nice VPN provider
- Not every elliptic curve is the same: trough on ECC security
- ESSOR, European Secure Software Defined Radio (SDR)
- Product management and organization
- Remotely intercepting snom VoIP phones
- Voice communication security workshop
- 27C3 - CCC Congress CFP: We come in peace
- GSM cracking in penetration test methodologies (OSSTMM) ?
- Snake-oil security claims on crypto security product
- Web2.0 privacy leak in Mobile apps
- AES algorithm selected for use in space
- Blackberry Security and Encryption: Devil or Angel?
- Celebrating “Hackers” after 25 years
- Botnet for RSA cracking?
- Patent rights and opensource: can they co-exist?
- China Encryption Regulations
- IOScat - a Port of Netcat to Cisco IOS
- The (old) Crypto AG case and some thinking about it
- Missiles against cyber attacks?
- Mobile Security talk at WHYMCA conference
- iPhone PIN: useless encryption
- Who extract Oil in Iran? Business and UN sanction together
- Exploit code against SecurStar DriveCrypt published
- Quantum cryptography broken
- FUN! Infosecurity consideration on some well known films
- great point of view
- Encryption is not scrambling: be aware of scrambler!
- SecurStar GmbH Phonecrypt answers on the Infosecurityguard/Notrax case: absolutely unreasonable! :-)
- Evidence that infosecurityguard.com/notrax is SecurStar GmbH Phonecrypt - A fake independent research on voice crypto
- Dishonest security: The SecurStart GmbH Phonecrypt case
- About the SecurStar GmbH Phonecrypt voice encryption analysis (criteria, errors and different results)
- Licensed by Israel Ministry of Defense? How things really works!
- O3B Networks: a new satellite broadband approach
- Index of economic freedom
- Location Based Services: the big brother thanks you ;-)
- Gold-Lock Security Encryption Contest: be careful!
- Recuva: Nice windows data recovery tool
- Military contractors going commercial
- Disk encryption sometimes ‘works’
- Brazilian Electrical Blackout: preview of cyberwar
- Political conflict in Turkey between Prosecutors and Wiretappers
- Come back to blogging
- Conventionality is not morality.
- Hackers Hacking Hackers
- This is big business, this is the American way
- Russia: the best worldwide place for cybercrime business
- Iphone jailbreaking crashing towers? FUD!
- chinese espionage: the worst and more silent threat for western countries
- Criminal business model: Somali pirate case study
- Letter from a suicide hackers
- 1st august 2009: Switzerland start realtime internet interception
- UAE government placing backdoors into Blackberry devices
- Chinese Spying NSA/USA buying Cryptographic Equipment on Ebay
- Nokia World in Stuttgard 2-3 September
- Saas: is the end of the myth?
- Best advices by world leaders
- Mobile platform hacking: worms and botnet from phones?
- The real goal of online marketing: lead generation
- Voice encryption in government sectors
- Product Management
- Women as agents of future geopolitical changes
- How the various audio compression codec sounds?
- Hackers hired from UK Office of Cyber Security
- Voice Security and Privacy slides
Archives
Categories
- business (21)
- cybercrime (7)
- cyberwarfare (13)
- intelligence (19)
- interception (20)
- Kudos (3)
- management (8)
- Privacy (30)
- security (43)
- technology (33)
- Uncategorized (3)