CyberSecurity, CyberDefense, Cyber Resilience

InfoSec, SecNews, AppSec, Best Practices, Project Ideas, Source Code, etc. || Dr. Grigorios Fragkos, follow: @drgfragkos

Friday, 29 May 2015

BSides London 2015 - Virtual Terminals, POS Security and Becoming a Billionaire Overnight!

›
Yes, it is true. The talk was short-listed and it was voted for the BSides London 2015 conference ! Thank you all for voting for my talk.  ...
Tuesday, 26 May 2015

NitlovePOS - POS terminals being targeted through phishing emails

›
Cyber-criminals and fraudsters have started targeting employees working on Point-of-Sales terminals in order to get their hands on card det...
Monday, 25 May 2015

Personal Greeting for your mobile phone, using a bash script, Kali Linux and the Raspberry Pi

›
First of all, this is a quick way for making your Kali Linux speak. I am going to tell about a couple of ways to do text-to-speech on your ...
Thursday, 21 May 2015

Adult Friend Finder data breach, the aftermath...

›
Did you hear about the Adult Friend Finder data breach? Of course you did, it’s all over the news [1] [2] and it is getting major attention...
Wednesday, 20 May 2015

Logjam attack - Diffie-Hellman key exchange weakness (a quick and brief explanation)

›
A study was published regarding the security of the Diffie-Hellman key exchange. This popular cryptographic algorithm can be found amon...
‹
›
Home
View web version

About Me

drgfragkos
View my complete profile
Powered by Blogger.