Profile cover photo
Profile photo
Anton Chuvakin
Information Security and Having Fun
Information Security and Having Fun
About
Posts

Post has shared content
Add a comment...

Post has shared content
This!
The Singularity Is Near. When Programmers Transcend 
Photo
Add a comment...

Post has attachment
An Open Letter to Android or “Android, You Are Shit!”
Dear Android: I know you are an operating system and probably cannot (yet?) read on your own. However, recent events compelled me to write this letter to you; an idea for it literally came to me in a dream. You see, I have carried an Android phone in my poc...
Add a comment...

Post has shared content
Add a comment...

Post has attachment
Add a comment...

Post has shared content
Beware the assault fork!!!
This is often paired with the assault steak knife which has an intimidating black handle.
Photo
Add a comment...

Post has attachment

Post has attachment
Monthly Blog Round-Up – December 2015
Here is my next monthly "Security Warrior" blog round-up of top 5 popular posts/topics this month: “ Why
No Open Source SIEM, EVER? ” contains some of my SIEM thinking from
2009. Is it relevant now? Well, you be the judge.  Current popularity of open sour...
Add a comment...

Post has attachment
"During a recent internal code review, Juniper discovered unauthorized code in ScreenOS that could allow a knowledgeable attacker to gain administrative access to NetScreen® devices and to decrypt VPN connections. "   <- so surreal!
Add a comment...

Post has attachment
"it’s interesting to see how many organizations achieve great results by putting together a few open source tools and custom scripts while others fail miserably with the latest #SIEM and #UEBA (#UBA) technology in their hands"  http://blogs.gartner.com/augusto-barros/2015/10/28/research-on-security-monitoring-use-cases-coming-up/
Add a comment...
Wait while more posts are being loaded