High Entropy

“A Good American” opens next Week in Austrian Theatres

Posted by on March 11, 2016 at 1:37 pm

For everyone attending DeepSec 2015 we organised a private screening of the film “A Good American”. Everyone else now gets the chance to see this film in theatres beginning on 18 March 2016. Next week there will be the premiere in Vienna, Linz, and Innsbruck here in Austria. Bill Binney will be present himself, and […]

DeepSec Video: HackingTeam – How They Infected Your Android Device By 0days

Posted by on February 20, 2016 at 8:15 am

Backdoors are very popular these days. Not only cybercrime likes extra access, governments like it too. There’s even a lucrative market for insecurity. You can buy everything your IT team defends against legally. Hacking Team is/was one of the companies supplying 0days along with intrusive software to take over client systems. Attila Marosi explained at […]

DeepSec Video: Cryptography Tools, Identity Vectors for “Djihadists”

Posted by on February 5, 2016 at 8:35 am

Wherever and whenever terrorism, „cyber“, and cryptography (i.e. mathematics) meet, then there is a lot of confusion. The Crypto Wars 2.0 are raging as you read this article. Cryptography is usually the perfect scapegoat for a failure in intelligence. What about the facts? At DeepSec 2015 Julie Gommes talked about results of the studies done […]

National-Security-in-the-Middle Attack – the Crypto Wars continue

Posted by on December 3, 2015 at 3:29 pm

National security has officially reached the SSL/TLS infrastructure – at least in Kazakhstan. The Google cache features an article published by the Kazakhtelecom JSC where the introduction of a so-called national security certificate for Internet users was proudly announced. We show you some parts of the original text for educational purposes, because we have never seen the announcement […]

Terrorism – No Time for Backdoors

Posted by on November 18, 2015 at 10:41 am

Every successful project needs proper planning and a good project management. You know this from your business life, probably. Projects can’t be done without tools for communication. We all use these day by day. Email, telephone, collaboration platforms, social media, instant messengers, and more software is readily available. Access to communication tools has spread. Exchanging […]

Endangered Species: Full Disclosure in Information Security

Posted by on November 6, 2015 at 9:15 am

History, fictive or real, is full of situations where doubts meet claims. Nearly every invention, every product will be eyed critically, analysed, and tested. There are even whole magazines fully dedicated to this sport, be it for example, consumer protection, reviews of computer games or the car of the year. When it comes to testing […]

Debugging Information Security: Self Defence for Entrepreneurs

Posted by on November 5, 2015 at 5:30 pm

In our economy data leaks are a constant companion. That’s the impression one gets when reading the news. Customer portals, online shops, digital communications, plans of products, personnel data, and more can be found in department stores throughout the shadow economy. Blind faith in global networks has indeed suffered in recent years, but companies and […]

Special Screening of the Documentary “A Good American” during DeepSec 2015

Posted by on October 28, 2015 at 10:00 am

Attendees of DeepSec 2015 will receive a special treat. We have been talking to Friedrich Moser, and he has agreed to show his documentary „A Good American“ on 20 November 2015 exclusively. The private screening will take place in Vienna. It starts at 2100 at the Burg Kino, known for showing „The Third Man“. „A […]

Digital Naval Warfare – European Safe Harbor Decree has been invalidated

Posted by on October 8, 2015 at 8:01 pm

The global cargo traffic on the Internet needs to revise its routes. The Court of Justice of the European Union has declared the so-called „Safe Harbor“ agreement between the European Commission (EC) and US-American companies as invalid. The agreement was a workaround to export the EU Directive 95/46/EC on the protection of personal data to […]

The Enemy Within: Industrial Espionage and Your Network at DeepSec 2015

Posted by on September 3, 2015 at 2:52 pm

Networking is vital to aquire jobs in the business world, manage projects, and develop products. It all started with the World Wide Web, now we also interact via various clouds and social media platforms with our staff, clients, and customers. Data gets outsourced to third parties, and business letters are airily send by Instant Messenger (due […]

Security of Things – Dead Horses just get beaten with the Internet

Posted by on July 27, 2015 at 1:31 am

What do NoSQL databases and cars have in common? You can find and freely access them by using the trusty Internet. Wired magazine has published a story about a remotely controlled Jeep Cherokee. Charlie Miller and Chris Valasek have found a way to use the properties of UConnect™ combined with (design) flaws to take full […]

I spy with my little Spy, something beginning with „Anti…“

Posted by on June 27, 2015 at 6:15 pm

Anti-virus software developers made the news recently. The Intercept published an article describing details of what vendors were targeted and what information might be useful for attackers. Obtaining data, no matter how, has its place in the news since 2013 when the NSA documents went public. The current case is no surprise. This statement is not […]

Dual Use Equation: Knowledge + Vulnerability = “Cyber” Nuclear Missile

Posted by on June 21, 2015 at 10:49 pm

We all rely on software every  day, one way or another. The bytes that form the (computer) code all around us are here to stay. Mobile devices connected to networks and networked computing equipment in general is a major part of our lives now. Fortunately not all systems decide between life or death in case […]

Surveillance Article: Listening Posts for Wireless Communication

Posted by on June 18, 2015 at 8:45 am

Modern ways of communication and methods to obtain the transported data have raised eyebrows and interest in the past years. Information security specialists are used to digitally dig into the networked world. Once you take a look at buildings, geographic topology, and photographs of structures your world view expands. Coupled with the knowledge of ham […]

DeepSec 2014 Opening – Would you like to know more?

Posted by on November 20, 2014 at 9:00 am

DeepSec 2014 is open. Right now we start the two tracks with all the presentations found in our schedule. It was hard to find a selection, because we received a lot of submissions with top quality content. We hope that the talks you attend give you some new perspectives, fresh information, and new ideas how […]