Detecting DNS Tunneling

All kind of different services, like web browsing, email, active directory, etc., use the Domain Name System (DNS) protocol to turn IP addresses into human...

Read More

What You See is Not What You Copy

Tricking users into copying different commands from what is displayed on a web page… OK, maybe I’m late to this party but I recently came...

Read More

Do You Trust Your Computer?

These past couple weeks have been a blur. I had the opportunity to attend and speak at both AppSecUSA and DerbyCon and can not say...

Read More