DeepEnd Research - Library of Malware Traffic Patterns + Blog lists

Quoted from here Traffic analysis has been the primary method of malware identification and thousands of IDS signatures developed are the daily proof. Signatures definitely help but ability to visually recognize malware traffic patterns and see the trends when they change has been always an important skill for anyone tasked... [Read More]

Dirac's Lectures

Steve Flammia, on the blog Quantum Pontiff, posted this remarkable and rare 1-hour talks by Paul Dirac in New Zealand : [youtube http://www.youtube.com/watch?v=RJ2FsatUvUw] There are four of his talks currently uploaded online. The first one (the above) is on quantum mechanics; the second one is on quantum electrodynamics; the third is... [Read More]

Around the Web [Cryptography]

SSL/TLS broken again – A weakness in the RC4 stream cipher; More link : here GCHQ – Not a secure agency itself! by Dan Farrall The Tallinn Manual on the International Law Applicable to Cyber Warfare ~ Surprisingly or perhaps not; it makes no maintain of  US and Israels Stuxnet. [Read More]