Besides that, I maintain computec.ch, a very popular security web site. Furthermore, I have published many papers and books. My last book has the title Die Kunst des Penetration Testing and discusses the efficient approach of doing penetration tests.
- scip AG, ZürichMember of the Board, 2003 - presentLeading and executing technical vulnerability assessments and penetration tests, development of tools, exploits and backdoors, publishing articles and papers.
- Inter-Networking AG, DietikonSecurity Consultant, 2001 - 2002Establishment of a team which is providing vulnerability assessments and execution of such projects. Additional maintenance of different security products (e.g. TrendMicro OfficeScan, Finjan SurfinGate, Symantec ESM, etc.).
- Biodata Information Technology AG, RümlangIT Security Expert, 2000 - 2001Internal consulting regarding information security issues, security testing of own products (e.g. firewalls and isdn encryption devices), publishing articles and papers.
ShadowBrokers Bitcoin Transactions: Now There’s Some Taint For You!
So I was looking at the bitcoin status of the #ShadowBrokers account and something interesting began to take shape. What I noticed, with the
The Shadow Brokers EPICBANANAS and EXTRABACON Exploits
On August 15th, 2016, Cisco was alerted to information posted online by the “Shadow Brokers”, which claimed to possess disclosures from the
Content Security Policy - Wie schwer kann es sein?
Keypoints. Die Content Security Policy (CSP) ist ein wichtiges Mittel zum Schutz von Webapplikationen; Ein korrektes Umsetzen ist sehr anspr
Twitter Can Fix Twitter With Just a Few Lines of Code - JestersCourt
“tweet not sent because you’re an asshole” made me laugh. Great post as always.
Why a Bug Bounty Program Is Just One Bite of the Security Apple
When Apple announced at Black Hat that it’s launching a bug bounty program, you could hear from the peanut gallery variations of a common th
Exploit broker steals Apple thunder, offers $500,000 for iOS zero days |...
Now $200,000 seems like small change.
Your 'intimate personal massager' – cough – is spying on you
Bluetooth hack lets Australian researchers reveal your deepest desires
Group5: Syria and the Iranian Connection - The Citizen Lab
This report describes a malware operation against the Syrian Opposition. We name the operator Group5, and suspect they have not been previou
AI hackers will make the world a safer place -- hopefully
A high-stakes game of capture the flag could be the spark that launches the artificial Intelligence computing revolution.
Flaw in Samsung Pay lets hackers wirelessly skim credit cards | ZDNet
The tokens that are used to make purchases can be easily stolen and used in other hardware to make fraudulent transactions.
Severe vulnerabilities discovered in HTTP/2 protocol | ZDNet
Four high-profile bugs have been found in the protocol, potentially placing 85 million websites at risk.
Low battery levels can track online activity; research - - ITP.net
Researchers discovered that website owners could use HTML5 Battery Status API for digital marketing purposes .
Logging des Internet of Things - Vernetzte Kraftwerke verlangen neue Par...
Das Log wurde geschaffen, um Menschen über einen Status eines spezifischen Systems zu informieren. Zum Beispiel bei Problemen, um nachvollzi
Citibank IT guy deliberately wiped routers, shut down 90% of networks
It was just after 6pm on December 23, 2013, and Lennon Ray Brown, a computer engineer at the Citibank Regents Campus in Irving, Texas, was o
The Rise of the Selfie Authentication as a New Security Factor
Many online vendors are moving toward more innovative and secure methods of confirming a user's identity, including selfie authentication.
You can't turn off Cortana in the Windows 10 Anniversary Update
Cortana is here to stay in the Windows 10 Anniversary Update.