-
Recent Posts
- BNR radio-interview: Hackbare gemeenteraadsverkiezingen en intransparantie daarvan
- De fraudegevoeligheid van Nederlandse verkiezingen
- Security assessment of Dutch election software
- 3FM radio interview: Gehackte sauna camerabeelden
- De verborgen wereld van Nederlandse nepdatingsites met nepprofielen en teams van chatoperators
Recent Comments
- MediaMarkt in The Wall gaat te slordig om met persoonsgegevens - Leidsche-Rijn on Password database of MediaMarkt leaks again
- Cine se afla in spatele protestelor #REZIST & Chilotareala on Massive child porn site is hiding in plain sight, and the owners behind it
- Photos d'enfants sur les réseaux sociaux | Cmic Blog on Massive child porn site is hiding in plain sight, and the owners behind it
- Pierre Dekan (via Twitter) on Massive child porn site is hiding in plain sight, and the owners behind it
- avocatnet.ro (via Twitter) on Massive child porn site is hiding in plain sight, and the owners behind it
Archives
- March 2018
- February 2018
- January 2018
- December 2017
- November 2017
- October 2017
- September 2017
- August 2017
- July 2017
- June 2017
- May 2017
- April 2017
- March 2017
- February 2017
- January 2017
- December 2016
- October 2016
- July 2016
- June 2016
- May 2016
- March 2016
- February 2016
- January 2016
- December 2015
- November 2015
- October 2015
- July 2015
- March 2015
- February 2015
- November 2014
- September 2014
- September 2012
- July 2012
- May 2012
- March 2012
- October 2011
- September 2011
- August 2011
- July 2011
- June 2011
- May 2011
- February 2011
- January 2011
- December 2010
- September 2010
- June 2010
- April 2010
- March 2010
- August 2006
- January 2005
- July 2004
- January 1970
Categories
- advertising
- analysis
- Apple
- article
- backup
- banking
- browser security
- bug
- camera
- child porn
- computer worm
- copyright
- credit card
- critical infrastructure
- cross site scripting
- cyber crime
- cyber terrorisme
- cyber warfare
- data leakage
- ddos
- deanonymization
- discussion
- drive-by
- e-voting
- election hacking
- hacking
- ICT
- interview
- jargon
- javascript
- legal
- magazine
- media
- menu
- online banking
- online dating
- osint
- password
- pentesting
- phishing
- PHP
- PHP security
- podcast
- presentation
- privacy
- process improvement
- radio
- ransomware
- responsible disclosure
- russia
- SAP
- scam
- scoping
- search engine optimization
- security
- security assessment
- security audit
- security awareness
- security vulnerability
- seo
- SNS Bank
- software development
- test
- tv
- Uncategorized
- vulnerability management
- w3c
- website
- website security
- WiFi
- wiretapping
- workshop
- zero day
Meta
Category Archives: zero day
Websites Nederlandse politieke partijen onvoldoende beveiligd
In de recente hack bij de Democratische Partij in de VS (toen Hillary Clinton presidentskandidate was), werden Clinton en haar partij in diskrediet gebracht doordat bijna twintig duizend interne mails van de partijtop op internet zijn geplaatst door WikiLeaks. Eerder publiceerde WikiLeaks meer … Continue reading
How to hack the upcoming Dutch elections – and how hackers could have hacked all Dutch elections since 2009
As everybody has read in the newspapers, the recent American elections involved multiple and severe hacking attacks. Tens of thousands of confidential and private emails from Hillary Clinton and the Democratic National Committee (DNC) were leaked via WikiLeaks. It is thought … Continue reading
Scanning an enterprise organisation for the critical Java deserialization vulnerability
On November 6, security researchers of FoxGlove Security released five zero day exploits for WebSphere, WebLogic, JBoss, Jenkins and OpenNMS. These software products are used everywhere in enterprise organizations and with the published exploits remote malicious code can be unauthenticated executed. … Continue reading
Posted in analysis, security vulnerability, zero day
25 Comments