LogoLogoLogoLogoLogo
  • Home
  • About
  • News
  • Projects
    • Research & Experiments
    • Community & Education
  • Events
  • Contact
    • General Contact
    • Media Enquiries
  • Home
  • About
  • News
  • Projects
    • Research & Experiments
    • Community & Education
  • Events
  • Contact
    • General Contact
    • Media Enquiries
Search:
March 16, 2009
in Data Centers, Development, Programming, Security, Telecommunications
by Ruan Müller

New rogue DHCP server malware

A bold new type of malware has been identified.  Its attack vector is based on hijacking the DNS settings for devices on a local area network. Any device regardless of operating system that depends on an internal or external name server can be affected. The trojan...

Read More
January 28, 2009
in Business, Security, Technology
by Ruan Müller

Vendors agree on drive cryptography standard

Techworld reports the following: The world's six largest computer drive makers have published the final specifications for a single, full-disk encryption standard that can be used across all hard disk drives, solid state drives (SSD) and encryption key management applications. Read the full article at Techworld....

Read More
December 3, 2008
in Business, Security, Technology, Telecommunications
by Ruan Müller

SonicWall License Server Problems Compromises Security

Technical problems with the license management servers at SonicWall Inc. created havoc last week for users of the company's firewall and e-mail security products, leaving many companies temporarily unprotected against spam, phishing and malware threats. The problems resulted in affected enterprise users of the SonicWALL UTM...

Read More
November 17, 2008
in Security, Technology, Telecommunications
by Ruan Müller

Lojacking Mobiles Phones Without The help From Service Providers Surfaces In FBI Documents

Triggerfish, also known as cell-site simulators or digital analyzers, are nothing new: the technology was used in the 1990s to hunt down renowned hacker Kevin Mitnick. By posing as a cell tower, triggerfish trick nearby cell phones into transmitting their serial numbers, phone numbers, and...

Read More
November 7, 2008
in Security, Technology, Telecommunications
by Ruan Müller

Wi-Fi WPA TKIP Key (Partially) Exploited by Researchers

Early coverage of the Wi-Fi WPA TKIP Key crack indicated that TKIP keys were broken, but ars technica clears up the details of the attack: They are not. "We only have a single keystream; we do not recover the keys used for encryption in generating the...

Read More
November 6, 2008
in Security, Technology, Telecommunications
by Ruan Müller

Wi-Fi WPA TKIP Key Exploited by Researchers

Via Slashdot: Researchers Erik Tews and Martin Beck 'have just opened the box on a whole new hacker playground, says Dragos Ruiu, organizer of the PacSec conference. At the conference, Tews will show how he was able to partially crack WPA encryption in order to read...

Read More
October 16, 2008
in Security, Technology
by Ruan Müller

GPU’s Used To Brute Force Crack Password Protection Schemes 10,000 Times Faster

Elcom announced that the newest version of their Distributed Password Recovery software can now brute force certain password / encryption schemes faster by using the massive parallelism of graphics processing units that support CUDA.  With the correct combination of off the shelf components available from...

Read More
October 7, 2008
in Business, Security, Technology, Telecommunications
by Ruan Müller

Canadian Digital Security Strategy Progress

A national cyber-security strategy that will seek to protect key infrastructure as well as Canadians' identities is on the way , an RCMP executive says. Details of the strategy — a partnership between the public and private sectors — will emerge over the next few months,...

Read More
September 26, 2008
in Development, Miltary, Open Source, Security, Technology
by Ruan Müller

Congress Plugs Open Source For US Military

In an important milestone for open source, a draft defense authorizing act in Congress includes wording plugging open source software. Both cost and software security appears to be considerations. "It's rare to see a concept as technical as open-source software in a federal funding bill. But...

Read More
August 26, 2008
in Security, Technology, Telecommunications
by Ruan Müller

The Internet’s Biggest Security Hole

Via Wired: Two security researchers have demonstrated a new technique to stealthily intercept internet traffic on a scale previously presumed to be unavailable to anyone outside of intelligence agencies like the National Security Agency. The tactic exploits the internet routing protocol BGP (Border Gateway Protocol) to let...

Read More
  • 1
  • 2
  • 3
  • 4
  • 5

ABOUT

Ruan Müller is an Cyber Security Specialist based out of Vancouver Canada working as a Principal Security Consultant by day, and an Independent Security Researcher at night.

He is also serves on the board at the Mainland Advanced Research Society as the Director of Operations.

News

  • BSides Vancouver 2017 has launched.
  • HARX – HAR (HTTP Archive) eXtractor Tool
  • Ready Room Briefings #01: CloudSecurity
  • Vancouver Enterprise Forum – Cyber Crime + eMoney Laundering
  • Security BSides Vancouver 2014, Drone Workshop

RESEARCH PROJECTS

HARX
PCAP VISUALIZATION
PCAP RENDERER

EVENTS

There are no upcoming events at this time.

Copyright 2017© Ruan Müller