Digital Operatives
  • Home
  • Blog
  • Careers
  • Contact
  • Products
  • Research
  • Services
Select Page

Programmatic String Deobfuscation in .NET Malware

by digitaloperatives | Nov 27, 2013 | Research

Those who have “reversed” .NET libraries would probably argue that you’re not really reversing a binary if it contains full type information. Commercial software developers and malware authors would make a similar claim and are therefore compelled to...

Defending Your Emails from Surveillance … Conveniently

by digitaloperatives | Aug 23, 2013 | Research

With the recent and ongoing disclosures of what appear to be widespread Internet surveillance programs, the public is becoming increasingly aware of the privacy risks in sending plaintext email. Even connecting to one’s email service provider using a...

Security and Trust When Everything Has a Computer in It

by digitaloperatives | Mar 10, 2013 | Research

Recently, Panic Software announced that they had opened up an HDMI display adapter cable for the latest family of Apple iOS devices, which use a proprietary I/O port named Lightning. Inside the HDMI adapter, the engineers at Panic Software found an ARM system on a...
Next Entries »

Recent Posts

  • Bug Bounty: An Economic Disadvantage for Researchers?
  • The 10 Humorous But Immutable Laws of Cloud Security
  • Defeating Cisco’s Machine Learning Based Malware Traffic Detection Algorithm
  • The Cyber-Insecurity of WeWork – Shared Offices and Cracking WiFi with Weak WPA2 Passwords
  • Idea Machine – Part 1: Automated Reconnaissance For Penetration Testing

Archives

  • July 2023
  • October 2018
  • September 2018
  • May 2018
  • September 2017
  • August 2017
  • July 2017
  • April 2015
  • February 2015
  • September 2014
  • February 2014
  • January 2014
  • November 2013
  • October 2013
  • September 2013
  • August 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • December 2012
  • November 2012
  • October 2012

Categories

  • Capture the Flag
  • Products
  • Research
  • Security News
  • Services
  • Uncategorized