Tweetovi

Blokirali ste korisnika/cu @lavados

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @lavados

  1. Prikvačeni tweet
    28. pro 2019.
    Odgovor korisnicima

    This talk will have both high level explanations and really low level details on and how it is related to and , and, if the demo gods are with us, live demos.

    Poništi
  2. proslijedio/la je Tweet
    2. velj

    Now that the decisions for the fall deadline are sent out a quick reminder: we organize an artifact evaluation, you can register your paper until February 4 and then submit the artifact by February 7. Details are available at

    Poništi
  3. proslijedio/la je Tweet
    1. velj

    a bit late to the party but if you still havent watched the video from 36c3 you should do so… even if just for the lols.

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    31. sij

    Exactly 10 years ago I started at Next week I am beginning a new journey at as a prof for system security. Big thanks goes especially to all my co-authors, and to all colleagues at the chair for Network and Data Security

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    29. sij

    IAIK is looking for a System Administrator:

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    27. sij

    Per the ZombieLoad website, the new CacheOut attack is the same thing as one of the four ZombieLoad attack variants... but with its own catchy name

    Poništi
  7. proslijedio/la je Tweet
    28. sij
    Odgovor korisnicima i sljedećem broju korisnika:
    Poništi
  8. proslijedio/la je Tweet
    28. sij
    Odgovor korisnicima

    No, it was the same for ZombieLoad, this is also described in the paper from November

    Poništi
  9. 27. sij

    We sent this PoC to Intel on May 16, just hours after we got access to the patches. The paper from last year already describes the issue. Media already reported about it in November: Where's the news?

    Poništi
  10. proslijedio/la je Tweet
    27. sij

    Just published a blog on INTEL-SA-00329 concerning L1D Eviction Sampling. This vulnerability has little to no impact in virtual environments that have applied L1 Terminal Fault mitigations.

    Poništi
  11. 27. sij

    The non-AWS device used by the scammer was a TECNO K7 running Android 7. How do they control their mostly(?) automated scam campaign with that? Via an app? Via a website? Where is that hosted?

    Prikaži ovu nit
    Poništi
  12. 27. sij

    Of course this was not a regular link but one to track IP addresses and client infos. Within ~10 minutes I have two accesses from EC2 IP addresses and one from Nigeria (Lagos). Any ideas why would click links that I send to scammers?

    Prikaži ovu nit
    Poništi
  13. 27. sij

    So I got this iTunes gift card scam mail the other day and thought, that's fun, let's get some info about the scammers. As a *non-technical* person, I have no clue how to send gift cards, so I sent them a link to the Apple support page and ask how to proceed at one of the steps.

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    26. sij

    & & dig into Platform Security in their Briefing ‘Store-to-Leak Forwarding: There and Back Again’.

    Poništi
  15. proslijedio/la je Tweet
    23. sij

    New Study: Crime shows are a 'PR machine' for law enforcement 🚔

    Poništi
  16. proslijedio/la je Tweet
    24. sij

    Intel pushes for hardware-specific additions to vulnerability taxonomy

    Poništi
  17. proslijedio/la je Tweet
    23. sij

    Few highlights: * The number of submissions is back on the exponential curve * It's becoming more and more common for researchers to serve in all PCs in the same year * International collaborations are on the rise. China in particular is growing very fast!

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    23. sij

    The Security Circus 2019 update is now online:

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    23. sij

    Jo Van Buck and Daniel Gruss from are comparing a walled Italian village to leaky processors. Lessons from , , at Day Europe.

    Poništi
  20. proslijedio/la je Tweet
    23. sij
    Poništi
  21. proslijedio/la je Tweet
    18. sij

    In this talk, & show that Meltdown is still an issue on modern CPUs and present ZombieLoad - a Meltdown-type attack which leaks data across multiple privilege boundaries. Register now to save on a Briefings pass to hear this talk and more

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·