This site is dedicated to the bits and bytes of InfoSec, rather than the full-length articles I publish at bloginfosec.com. The tone is one of a less serious nature and covers the daily InfoSec grind as well as thoughts and ideas that have not been developed into full-length articles (yet?). Unlike bloginfosec.com which maintains a high-level focus, here I also cover very technical areas.
Twitter feed"Representing @owaspnyc with @RedTeamBlueTeam! Drink hacking at it's finest.... https://t.co/fKPxzda3T1"16 days ago21 days ago"Wow! Accidentally found a login screen/pin bypass but can't recreate it! Any interest out there? https://t.co/orkkGqa6nH"34 days ago"RT @infosecmaverick: My colleagues @ISC2 NJ chapter are running a very cool Social Engineering conf. To speak, apply @ the link below: htt…"78 days ago"Found these oldies but goodies... The memories. https://t.co/iXUuIeeY3y"82 days ago"https://t.co/FLLab2RMT4"95 days ago"My colleagues @ISC2 NJ chapter are running a very cool Social Engineering conf. To speak, apply @ the link below: https://t.co/3p48brNC6C"115 days ago"If true I think I foresee one of the first car hacks with mass adaptation: removal of the speed limit cap. https://t.co/bFjElPFoJK"122 days ago"A little risk humor.... https://t.co/jZTaYrV8Mk"134 days ago"The @USArmy is using @nmap in it's latest CyberSec commercial. It's a long way from when nmap was used in the Matrix Trilogy back in 2003."179 days ago