Besides that, I maintain computec.ch, a very popular security web site. Furthermore, I have published many papers and books. My last book has the title Die Kunst des Penetration Testing and discusses the efficient approach of doing penetration tests.
- scip AG, ZürichMember of the Board, 2003 - presentLeading and executing technical vulnerability assessments and penetration tests, development of tools, exploits and backdoors, publishing articles and papers.
- Inter-Networking AG, DietikonSecurity Consultant, 2001 - 2002Establishment of a team which is providing vulnerability assessments and execution of such projects. Additional maintenance of different security products (e.g. TrendMicro OfficeScan, Finjan SurfinGate, Symantec ESM, etc.).
- Biodata Information Technology AG, RümlangIT Security Expert, 2000 - 2001Internal consulting regarding information security issues, security testing of own products (e.g. firewalls and isdn encryption devices), publishing articles and papers.
When Your CEO Won’t Take Security Awareness Training - InfoSec Resources
CEOs are often the busiest people in any organization. As security professionals, we should respect that: but what can we do when our CEO wo
Yes, Google can remotely reset Android passcodes, but there's a catch | ...
Newer Android phone and tablet owners aren't affected, but it does say something about Android's fragmentation of device security.
Here's a Spy Firm's Price List for Secret Hacker Techniques | WIRED
Zero-day exploit broker Zerodium has published a full chart of its prices for intrusion techniques affecting different software programs.
Positive Research Center: Web-application vulnerabilities: no light at t...
There has been significant growth in web applications, from official sites and ERP systems, to e-commerce and e-banking platforms, and porta
A 23-year-old Windows 3.1 system failure crashed Paris airport | ZDNet
Some of the most important networks and systems today are woefully outdated. And that isn't always a bad thing.
Drones - The Next Generation of Information Warfare
Labs: Drones - The Next Generation of Information Warfare. at Thursday, 19. November 2015 by Marc Ruef | G+. During our research, we were ab
How to check if your Android device is vulnerable to attack | ZDNet
A new open-source app scans for the most common Android vulnerabilities, including Stagefright.
Mobile malware evolves: Adware now breaks and roots your phone | ZDNet
Adware is moving from nuisance to nasty with the discovery of over 20,000 Android apps which can root your phone, making it almost impossibl
Meet the man who holds the future of the Internet in his hands — and thi...
Linus Torvalds created Linux, the operating system that dominates the online world. But a rift exists between Torvalds and security experts.
Hackers Claim Million-Dollar Bounty for iOS Zero Day Attack | WIRED
A middleman for hacking techniques has announced a taker for its million-dollar iOS hacking bounty.
Buying and Selling SCADA Zero-Days - InfoSec Resources
Current scenario How much is a zero-day for an industrial control system? Where is it possible to buy them and who are the main buyers of th
Positive Research Center: HackerSIM: Blamestorming
Recently, there have been a lot of articles about a SIM card that has some incredible features. This topic sparked a lively discussion full
Wincor Nixdorf ATM Not Available Mode privilege escalation
A vulnerability classified as critical has been found in Wincor Nixdorf ATM (the affected version is unknown).
Judge dismisses charges for man who shot down drone
Merideth said the operator was violating his privacy and spying on his family, but Hillview police arrested Merideth for firing his gun with