This site is dedicated to the bits and bytes of InfoSec, rather than the full-length articles I publish at bloginfosec.com. The tone is one of a less serious nature and covers the daily InfoSec grind as well as thoughts and ideas that have not been developed into full-length articles (yet?). Unlike bloginfosec.com which maintains a high-level focus, here I also cover very technical areas.
Twitter feed"Wow! Accidentally found a login screen/pin bypass but can't recreate it! Any interest out there? https://t.co/orkkGqa6nH"2 days ago"RT @infosecmaverick: My colleagues @ISC2 NJ chapter are running a very cool Social Engineering conf. To speak, apply @ the link below: htt…"47 days ago"Found these oldies but goodies... The memories. https://t.co/iXUuIeeY3y"51 days ago"https://t.co/FLLab2RMT4"63 days ago"My colleagues @ISC2 NJ chapter are running a very cool Social Engineering conf. To speak, apply @ the link below: https://t.co/3p48brNC6C"84 days ago"If true I think I foresee one of the first car hacks with mass adaptation: removal of the speed limit cap. https://t.co/bFjElPFoJK"91 days ago"A little risk humor.... https://t.co/jZTaYrV8Mk"102 days ago"The @USArmy is using @nmap in it's latest CyberSec commercial. It's a long way from when nmap was used in the Matrix Trilogy back in 2003."147 days ago"Great sessions at @owasp @appsecusa 2016. Having fun catching up w/colleagues. If you're here tweet or PM me & let'… https://t.co/Xa7a02r41Y"165 days ago"Standing by the podium moderating a panel on IoT security at the 9/21 #CyberSummitNY w/@quine & @gollmann. Thanks… https://t.co/hulBWY9pWD"185 days ago