Email Accounts - Powerful Skeleton Keys

The latest Article by Stefan Friedli

Read now

Content Security Policy – How hard can it be?

Michael Schneider

High-Secure Portable Storage - Part 1: Introduction and Installation of Armory

Andrea Covello

Logging the Internet of Things - Connected power plants demand a new paradigm

Rocco Gagliardi

CVSSv3 as a risk metric – a detailed view

Marc Ruef

Cyber Security – Addressing Highly Dynamic Risks

Flavio Gerbino

Checklists or Scenarios – That is the Question

Veit Hailperin

Blockchain is the future - Introduction to the revolutionary technology

Marc Ruef

RIPv6 - fail2ban failed to ban

Michael Schneider

Analysis of medical devices - A pragmatic approach

Marc Ruef

Software Without Brakes

Stefan Friedli

Implementing a Qubes OS productive laptop

Rocco Gagliardi

Securing Outdated or Unsupported Systems

Andrea Covello

mHealth - Mobile Opportunities

Flavio Gerbino

eHealth - electronic health care services

Flavio Gerbino

Cross-Site Script Inclusion - A Fameless but Widespread Web Vulnerability Class

Veit Hailperin

PowerShell Monitoring - Regain Control

Michael Schneider

Big Data, Artificial Intelligence & the Internet of Things – the future starts now

Marc Ruef

HTTPS Bicycle Attack - An Overview

Stefan Friedli

Data Centric Security using DRM infrastructure

Andrea Covello

DRM/RMS – The next generation of rights management

Marc Ruef

Belkin WeMo Switch Communications Analysis

Michael Schneider & Veit Hailperin

Approach to Testing IoT Devices

Veit Hailperin & Michael Schneider

Not Only Terrorists Have Something to Hide

Stefan Friedli

Background to the Labs Book

Marc Ruef

Inglorious Headers

Veit Hailperin

Darknet - A Look at the Virtual Black Market

Marc Ruef

OPSEC - History and Basics

Dominik Bärlocher

scip IT Security Forecast 2016

Marc Ruef

Big Brother or: How I stopped Worrying and Love Encryption

Veit Hailperin

Release of Burp Extension DetectDynamicJS

Veit Hailperin

Ransomware 101 - CryptoLocker and CryptoWall

Michael Schneider

Facebook's Ears - Threats by Audio Discovery

Dominik Bärlocher

Drones - The Next Generation of Information Warfare

Marc Ruef

Hackers - 20 Years of Awesome

Dominik Bärlocher

The Future: Personal Assistants

Dominik Bärlocher

RFID with RFIDler

Rocco Gagliardi

Peeple: Social Media Without Profile

Stefan Friedli

Healthy Paranoia - Goodbye, Passwords!

Veit Hailperin

Twelve Simple Security Tricks

Stefan Friedli

Mobile Technology in Corporate Environments - Risks of Disappearing Privacy

Flavio Gerbino

Securing out-of-band Remote Support: Part 2 of 2

Andrea Covello

Risks in iBeacon

Marc Ruef

Public Shaming and the Case Ashley Madison

Stefan Friedli

Statistical Analysis of the Ashley Madison Hack

Dominik Bärlocher

Metadata Revisited

Veit Hailperin

A First Analysis of the AshleyMadison.com Leak

Dominik Bärlocher

The Internet and the Things

Rocco Gagliardi

Offensive PowerShell - Introduction to PowerTools

Michael Schneider

The SBB Swiss Pass - New Technology, New Risks

Dominik Bärlocher

Preventing Reputational Damage by Media

Dominik Bärlocher

SAP and Principle of Least Privilege

Michael Schneider

Summary of Protection Aspects of Client Identifying Data

Flavio Gerbino

Correct Authentication for Mobile Apps

Marc Ruef

Hack in Paris 2015 - A Short Review

Veit Hailperin

Securing out-of-band Remote Support: Part 1 of 2

Andrea Covello

What You Need to Know About Duqu 2.0

Marc Ruef

Reputational Damage to Media Corporations After a Hack

Dominik Bärlocher

Logging Shell User Activity

Rocco Gagliardi

Apple Watch - A First Commentary

Stefan Friedli

Healthy Paranoia - Buckle Up!

Veit Hailperin

SwiNOG #28 - A Short Review

Veit Hailperin

A Story About Blocking PowerShell

Michael Schneider

Thought About Cross Border and Associated Subjects

Flavio Gerbino

Detection of Firewalling to Professionalize Attacks

Marc Ruef

Securing Your Home Fences

Andrea Covello

Hacker Fashion - A Not Quite Serious Test

Dominik Bärlocher & Veit Hailperin

Hard Disk Encryption Tool: Startech Enclosure

Rocco Gagliardi

A Case for Net Neutrality

Stefan Friedli

Misusing TCP Timestamps

Veit Hailperin

So Long, and Thanks for All the Superfish

Stefan Friedli

Kerberos under Attack

Michael Schneider

The Hunt for the Safe Public WiFi

Dominik Bärlocher

Some Thoughts about Privileged Identity Management and Privileged Account Management

Flavio Gerbino

Wearables in Application

Marc Ruef

Data Fence - A Nice and Small MacOS X Security Audit Tool

Andrea Covello

Audit in a OS X System

Rocco Gagliardi

Wardialing Revisited - A Call with Consequences

Stefan Friedli

31C3 - A New Dawn

Michael Schneider

scip IT Security Forecast 2015

Marc Ruef

scip InfoCenter for Google Chrome available

Oliver Kunz

Software Defined Radio - An Introduction

Oliver Kunz

Burn Facebook 101 - How to Fabricate a Person

Dominik Bärlocher

Transport Layer Security Done Right

Michael Schneider

Logical Fallacies when Assessing Risks

Flavio Gerbino

Collecting Windows Logs with NXlog

Andrea Covello

Designing filters for ELK

Rocco Gagliardi

Bug Bounties - Getting that free Netscape Mug

Stefan Friedli

Android Lab Based on Virtual Devices

Oliver Kunz

How Data Correlation Works

Dominik Bärlocher

Skype as a Security Risk

Marc Ruef

The Basics of DNSSEC

Michael Schneider

Organizational Aspects When Protecting Business Information and Records

Flavio Gerbino

UTM Solutions Evaluation in Virtual Environments

Andrea Covello

Hacker Summer Camp (2014 Edition)

Stefan Friedli

File Integrity Checker Policy

Rocco Gagliardi

Google Glass – A Snapshot

Stefan Friedli

Kerberos Key Distribution Center Proxy Protocol

Oliver Kunz

Wearables - A Look Ahead

Dominik Bärlocher & Oliver Kunz

Wearables - No Privacy for Your Biometry

Dominik Bärlocher

Wearables - New Threats

Dominik Bärlocher

Wearables - Technology on the Body

Oliver Kunz

Wearables - New Freedom

Dominik Bärlocher

Windows Passwords - A Well Known Secret?

Michael Schneider

Functionality Testing a IDS/IPS

Marc Ruef

The Value of IT General Controls within an Organization

Flavio Gerbino

Security Testing Using Virtual Environment Made Easy

Andrea Covello

Car Hacking - An Overview

Dominik Bärlocher

Area41 - A Look Back

Marc Ruef

Security Conferences - A Waste of Time?

Stefan Friedli

Reversing JSXBIN File Type

Oliver Kunz

Oh Twitter, Where Art Thou

Dominik Bärlocher

Source Code Analysis - A Beginner's Guide

Marc Ruef

PowerShell - One Tool to Rule Them All

Michael Schneider

How to Handle Breach Incidents Involving Personal Information

Flavio Gerbino

Firewalls - Rules to Rule the Rules

Rocco Gagliardi

The Worth of Information Security in Everyday Life - Tilting at Windmills

Stefan Friedli

Android Permissions – A Top-500 Analysis 2014

Oliver Kunz

A Look Fifteen Minutes into the Future – What Might Happen with our Tech

Dominik Bärlocher

Security of Unified Communications using Microsoft Lync as an Example

Marc Ruef

Windows 8 Baseline Skeleton

Andrea Covello

On the Use of Security Concepts

Flavio Gerbino

Securing Logs in Motion

Rocco Gagliardi

Vulnerability Disclosure: Revisited – or how SnapChat refuses to learn

Stefan Friedli

Security Enhanced Linux

Oliver Kunz

They Are Watching - How Google and Facebook Track You Without Telling You

Dominik Bärlocher

scip IT Security Forecast 2014

Marc Ruef

2013: A Year in Review by scip AG

Simon Zumstein

HP TippingPoint – Analysis of the Protection Filters

Marc Ruef

When Your TV Watches You - Lessons Learned from LG's SmartAd Program

Dominik Bärlocher

iOS7 - The Seven Best New Features (apart from the graphics)

Pascal Schaufelberger

Secure Mobile Data

Rocco Gagliardi

Actions and Processes in Case of a Virus

Flavio Gerbino

OpSec on the Silk Road: Learning from Pirates

Stefan Friedli

Virtual Switch Security - An Overview

Andrea Covello

Safer Log Files

Rocco Gagliardi

The Broken Record: Talking to Business

Stefan Friedli

An Open Letter to iOS/Android App Developers

Stefan Friedli

Nmap NSE Vulscan 1.0 Released

Marc Ruef

Benchmark a Firewall Rulebase

Rocco Gagliardi

Are we even moving?

Stefan Friedli

Overview of Microsoft's security toolkit EMET

Andrea Covello

Timing of Efficient and Undiscovered Portscans

Marc Ruef & Oliver Kunz

Interpreting a Logfile with Grok

Rocco Gagliardi

Your Infosec Job is not a Movie

Stefan Friedli

Blackhat Europe 2013 – A Hasty Preview

Stefan Friedli

Virtual Environment Security Baseline Recommendations

Andrea Covello

Counting the FW1 Logfile

Rocco Gagliardi

Critical Third Party Applications: Risk and Handling

Flavio Gerbino

NAXSI Open-Source WAF

Andrea Covello

Security Log, Part 2: Requirements, Costs and Tools

Rocco Gagliardi

Security Log, Part 1: Experience with Log Management

Rocco Gagliardi

Windows 7 Stripping & Hardening, Part 3: Keep it Safe

Andrea Covello

Mac OS X Memory Analysis: An Overview

Rocco Gagliardi

Windows 7 Stripping & Hardening, Part 2: Hardening Procedures

Andrea Covello

Opinion: Flamer/sKyWIper – Facts & Myths in 5 Minutes

Stefan Friedli

Windows 7 Stripping & Hardening, Part 1: OS Tools

Andrea Covello

Structuring the Rule Name in Checkpoint Firewall

Rocco Gagliardi & scip AG

Open-Source and its Effects on Security

Marc Ruef

Basic RFID Security

Marc Ruef

Stay informed

Subscribe to our monthly security summary