Hi everyone,
Just an annouce that the Call for Papers for the 5th edition of Hackito
Ergo Sum is out!
The final date of submission is the 31th of March!
See you at Hackito !
--[ Synopsis:
Hackito Ergo Sum is an international conference focused on
security and hacking breakthroughs from many
Hello all,
After the huge success of our first CTF, I am pleased to announce that we
will be hosting the 2nd public CTF in April.
More details and registration page can be found here:
http://ctf.notsosecure.com/
Happy Hacking!
Sid
NotSoSecure Limited,
http://www.notsosecure.com
twitter:
Saying that the malleability thing is an issue with bitcoins is like saying
that sql injection is an issue with mysql.
2014-03-07 15:58 GMT+02:00 Meaux, Kirk kirk.me...@ctcd.edu:
More to the point, has the transaction malleability issue been fixed
that caused Magic's downfall?
Even though
Hi all!
Is there any passwords analyser open source tool out there? right now I'm
running Pipal (1) and I find it very useful, but I just want to know if you are
using any other alternative.
Thanks!
Nahu.-
(1) http://www.digininja.org/projects/pipal.php
signature.asc
Description: Message
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Intrepidus Group Security Advisory
http://www.intrepidusgroup.com
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Title: Apple TV Touch
- Affected Vendor: https://www.apple.com/
- Affected Software: Safari/Facetime on iOS
- Affected Version: iOS 7 prior to 7.1
- Issue Type: Lack of user confirmation leading to a call being
established, revealing the user's identity (phone number or email address)
- Release Date: March 10, 2014
-
Nahu-
For the most part I use pipal, however, I've used PACK in the past as well.
PACK is great if you use hashcat for cracking as it generates valid masks as
input files for you.
http://thesprawl.org/projects/pack/
Daniel
On Mar 10, 2014, at 11:45 AM, Nahuel Grisolia
Julius hit the nail on the head here. Transaction malleability is not some
heretofore undiscovered bug in the Bitcoin implementation. It was a known
entity long ago, and presumably with the creator(s) awareness. It really isn’t
a problem itself; it’s perfectly mitigable with the correct
Core Security - Corelabs Advisory
http://corelabs.coresecurity.com/
Oracle VirtualBox 3D Acceleration Multiple Memory Corruption Vulnerabilities
1. *Advisory Information*
Title: Oracle VirtualBox 3D Acceleration Multiple Memory Corruption
Vulnerabilities
Advisory ID: CORE-2014-0002
Advisory
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-2873-1 secur...@debian.org
http://www.debian.org/security/ Salvatore Bonaccorso
March 11, 2014
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- ---
VMware Security Advisory
Advisory ID: VMSA-2014-0002
Synopsis:VMware vSphere updates to third party libraries
Issue date: 2014-03-11
Updated on: 2014-03-11 (initial
11 matches
Mail list logo