- Business School KV, BadenTravel Consultant, 1997 - 2000Business travel, train travel in Europe
- Business School KV, BadenSIZ PC User, 1998 - 1999Windows, office, network and Internet usage
- AWB, WettingenSIZ PC Supporter, 1999 - 1999Hardware, windows, office and network support
Besides that, I maintain computec.ch, a very popular security web site. Furthermore, I have published many papers and books. My last book has the title Die Kunst des Penetration Testing and discusses the efficient approach of doing penetration tests.
- scip AG, ZürichMember of the Board, 2003 - presentLeading and executing technical vulnerability assessments and penetration tests, development of tools, exploits and backdoors, publishing articles and papers.
- Inter-Networking AG, DietikonSecurity Consultant, 2001 - 2002Establishment of a team which is providing vulnerability assessments and execution of such projects. Additional maintenance of different security products (e.g. TrendMicro OfficeScan, Finjan SurfinGate, Symantec ESM, etc.).
- Biodata Information Technology AG, RümlangIT Security Expert, 2000 - 2001Internal consulting regarding information security issues, security testing of own products (e.g. firewalls and isdn encryption devices), publishing articles and papers.
7 things you probably don't know about the hidden 'deep' web | ZDNet
The deep and dark web may have a reputation for the illegal and illicit, but it can be a lifeline to many in oppressive and dangerous regime
The Secrecy of the Snowden Documents - Schneier on Security
The Secrecy of the Snowden Documents. Last weekend, the Sunday Times published a front-page story (full text here), citing anonymous British
Wearable fitness trackers tested for data leakage and poor security
Nine different wearable fitness trackers have been put under the microscope, in order to explore how well they are protecting users' data. A
Embedded in Academia : Defending Against Compiler-Based Backdoors
Scotty Bauer (a Utah grad student), Pascal Cuoq, and I have an article in the latest PoC||GTFO about introducing a backdoor into sudo using
Cardinals Investigated for Hacking Into Astros’ Database - The New York ...
The F.B.I. and the Justice Department are investigating whether officials for the St. Louis Cardinals hacked into the networks of the Housto
Could Emoji Passcodes be Safer for Online Bank Users?
Don't be surprised if some banking apps start to ask you for your emoji passcode sooner rather than later.
Complex Method of Obfuscation Found in Dropper RealShell
The fight against malware is never-ending for a threat researcher, and in the mobile malware arena the fight is becoming more complex at an
The real story of how the Internet became so vulnerable
Scientists worried about intruders and military threats, but they didn’t anticipate that the network’s users would attack one another.
Bypassing Jailbreak Detection Using Xcon - InfoSec Institute
In this small article, we will look at a very handful utility named Xcon for bypassing Jailbreak detection. As per the wiki page ... xCon is
Reassessing Airport Security - Schneier on Security
Reassessing Airport Security. News that the Transportation Security Administration missed a whopping 95% of guns and bombs in recent airport
6 Digits Are Better Than 4! iOS 9 to Boost Passcode Security
Apple is beefing up security on iDevices running iOS 9, by requiring users to upgrade from a 4-digit passcode to one containing 6 digits. Tw
Problematic Wassenaar Definitions - F-Secure Weblog : News from the Lab
F-Secure Security Labs brings you the latest online security news from around the world. Ensure that you are up-to-date with the latest onli
Reverse Engineering of Embedded Devices - InfoSec Institute
Introduction This article is for colleagues who are interested in studying the reverse engineering of embedded devices starting from the int
Cyber Threat Assessment Template For Special Forces - InfoSec Institute
The growing number of cyber threats highlight the risks that US critical infrastructure and Special Forces face. Once considered weak in nat