Jouni Hiltunen

@JouniHiltunen2

Cyber security professional

Finland
Vrijeme pridruživanja: veljača 2013.

Tweetovi

Blokirali ste korisnika/cu @JouniHiltunen2

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @JouniHiltunen2

  1. proslijedio/la je Tweet
    28. ruj 2019.

    Library version (for use e.g. with afl++) of Radamsa by announced today at Hack After Dark. Exciting times.

    Poništi
  2. proslijedio/la je Tweet
    5. lip 2017.

    is looking for a vulnerability researcher for security testing team in . Apply now

    Poništi
  3. 31. lis 2016.

    I feel privileged to enjoy free hands-on fuzzing training with Radamsa by in the Crim'16. Simple but effective.

    Poništi
  4. proslijedio/la je Tweet
    1. lip 2016.

    If you’re in security and you want to actually be doing something, write malware and hack. Everyone else’s just analyzes those guys’ work

    Poništi
  5. proslijedio/la je Tweet
    5. kol 2016.

    DARPA declares Mayhem as winner of Cyber Grand Challenge

    Poništi
  6. 5. svi 2016.

    activists: when will be the era of "free" mass deployed wearable, home and public space HW?

    Poništi
  7. proslijedio/la je Tweet
    12. tra 2016.

    "Ok, we're inside the network. Time to gather and exfiltrate the data." "New orders. Instead of that, DoS the Samba server."

    Poništi
  8. proslijedio/la je Tweet
    5. ožu 2016.

    Logarithmic heat-map of 4 digit PIN frequencies; first two digits on X, last two on Y. From

    Poništi
  9. proslijedio/la je Tweet

    My hotel towel and badge uses the same insecure NFC chip. So this towel is now my badge. Full blog tomorrow.

    Poništi
  10. proslijedio/la je Tweet

    Forget logos, CVE-2015-7547 deserves its own movie! /cç /ht for the poster!

    Poništi
  11. 15. sij 2016.
    Poništi
  12. proslijedio/la je Tweet
    14. pro 2015.

    "In 32 days I've found 15 instances where an exit node is sniffing and using my credentials"

    Poništi
  13. 7. pro 2015.

    Trying to invent a cool name to an attack in which one turns on narrator in Win logon screen and plugs in headphones to eavesdrop.

    Poništi
  14. proslijedio/la je Tweet
    23. stu 2015.

    Superfish 2.0 : Dangerous Certificate on Dell Laptops breaks encrypted HTTPS Connections :

    Poništi
  15. proslijedio/la je Tweet
    9. stu 2015.

    New 4G LTE Hacks Punch Holes In Privacy

    Poništi
  16. proslijedio/la je Tweet
    2. stu 2015.
    Poništi
  17. proslijedio/la je Tweet
    30. lis 2015.

    Please, never equate crypto as your one stop security solution. It's a lie. Anyone that says it is, is lying to you.

    Poništi
  18. 27. lis 2015.

    f(x)="x is tricky tech. Often trickery and sec do not combine well" f(Intel TXT)=

    Poništi
  19. 22. lis 2015.

    Security as business enabler: Holistic 5G security mechanisms e.g for Industrial Internet to achieve the real-time requirements.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·