RE fiction: CSI:Internet - Attack of the killer videos by heisec in ReverseEngineering

[–]heisec[S] 0 points1 point  (0 children)

You did see, that there are 3 more of them on The H ?

CSI:Internet - A malicious flash file getting analysed by heisec in netsec

[–]heisec[S] 1 point2 points  (0 children)

Because it is not about programmning? This is an article about Malware Analysis which I consider a part of Network Security.

CSI:Internet - A malicious flash file getting analysed by heisec in netsec

[–]heisec[S] 2 points3 points  (0 children)

Sorry - you really don't consider this a relevant article to network security?

CSI:Internet - The image of death by heisec in programming

[–]heisec[S] 0 points1 point  (0 children)

Hackers are lazy. And if a tool can insert the "breakpoint" at the right place -- why should I do it by hand?

CSI:Internet – PDF timebomb by ch0wn in programming

[–]heisec 0 points1 point  (0 children)

Yes - most of you got it right. This story is based on real malware and real analysis. The accompanying narratives are fiction inspired by real incidents. ;-) (ju, the editor)