Tag Archive

Mythbusting: Anti-Virus Research considered dangerous

Published on August 18, 2017 By sanna

Everyone doing research in information security or doing any work in this field takes some risks. Since most of the „cyber stuff“ is black magic to others not working in this context, there are a lot of problems and severe misunderstandings. The Crypto Wars still haven’t been decided in favour of mathematics. Real people prefer […]

DeepSec Video: Legal Responses Against Cyber Incidents

Published on February 16, 2016 By lynx

Despite current efforts to adapt existing legal instruments to regulate hostile activities in cyber space, there is uncertainty about the legal situation of actors affected by these actions. Part of this uncertainty is due to the fact that the cyber domain is technically complex; there is a strong need for collaboration between technical and legal […]

DeepSec Video: A Death in Athens – The inherent Vulnerability of “Lawful Intercept” Programs

Published on January 20, 2016 By lynx

In politics it is en vogue to create new words by connecting them. The words „cyber“ and „lawful“ come to mind. You can add „crime“ and „intercept(ion)“, and then you got something. Actually you can combine both of the latter words with the first two. Either combination makes sense if you take a look at […]

Endangered Species: Full Disclosure in Information Security

Published on November 6, 2015 By sanna

History, fictive or real, is full of situations where doubts meet claims. Nearly every invention, every product will be eyed critically, analysed, and tested. There are even whole magazines fully dedicated to this sport, be it for example, consumer protection, reviews of computer games or the car of the year. When it comes to testing […]

DeepSec 2015 Talk: Legal Responses Against Cyber Incidents – Oscar Serrano

Published on September 19, 2015 By sanna

Like it or not, „cyber“ is here to stay. No matter what word you use, the networks have become a battlefield for various military operations. While you won’t be able to secure physical territory by keyboard (you still need boots on the ground for this), you can gain information, thwart hostile communications, and possibly sabotage […]

What is a Hacker Tool and how do you ban it?

Published on April 25, 2012 By lynx

What exactly is a hacker tool? The answer to this question depends on who you ask. To McGyver it would probably everything, to a hacker it would be any suitable tool and to a politician it would be anything that cannot be easily understood. The English Wikipedia has no entry on hacker tool. So what […]

DeepSec.net is on Strike!

Published on January 18, 2012 By lynx

You have probably heard of the Stop Online Piracy Act (SOPA) and its chilling effects on the Internet and all its users. „The originally proposed bill would allow the U.S. Department of Justice, as well as copyright holders,to seek court orders against websites accused of enabling or facilitating copyright infringement. “ (quote taken from the […]

Talk: Laws, Compliance and real Life

Published on November 3, 2011 By lynx

If you believe that computer security is all about having the right tools and an expert staff, then you are mistaken. Never forget why you have computers in the first place – because of your business. Mikhail Utin will shed light on the corporate side of security by talking about  laws, compliance and real life […]

Lessons in Trust and Malicious Code from the Staatstrojaner

Published on October 31, 2011 By lynx

Since it is Halloween we will beat an undead horse in our blog today. Zombies are all the fashion both in literature and on your computer. The question is: Are all zombies alike? Are there good and bad zombies, or only bad ones? How can you distinguish between good and evil intentions if all you […]

Dissection of Malware and Legality

Published on October 24, 2011 By lynx

You have probably seen the articles about the 0zapftis (a.k.a. the German Federal Trojan) malware used by the German police for investigation. There’s a lot going on in Germany and the German parliament, so we’d like to point out the issue of dissecting governmental malware and its relation to common sense and the law. The […]

Talk: How Terrorists Encrypt

Published on August 31, 2011 By lynx

Encryption technology has always been regarded as a weapon, due to its uses in wars and espionage. Software used for encryption was banned for export to other countries in the US. The export regulations for strong cryptography were relaxed in 1996. Some countries still consider cryptographic software as a threat. Recently there have been discussions […]