Details on the Android JCA PRNG Flaws Posted by Keith Makan August 17, 2013 Android Bitcoin Java PRNG Pseudo Random number security +
Homomorphic Encryption : What it is and what it means for the future of security Posted by Keith Makan August 17, 2013 Cryptography Encryption Homomorphic Encryption +
Wordpress Plugin - ADIF Log Search Widget XSS Vulnerability Posted by Keith Makan May 27, 2013 Word Press Word Press Exploit Word Press Plugin Word Press Vulnerability Word Press XSS XSS +
Hash Length Extension: The padding that killed your secret key Posted by Keith Makan March 19, 2013 Cryptanalysis Cryptography Hash Length Extension Attacks Hashing MACS MD5 Message Authentication Codes SHA-1 SHA-2 +
Blogger.com and the mixed scripting vulnerability Posted by Keith Makan January 12, 2013 Blogger.com Blogger.com vulnerability Mixed Display Mixed Scripting Mixed Scripting Vulnerability +
Practical Blind-Error Based SQL Injection Posted by Keith Makan December 30, 2012 Blind SQL injection Blind-Error Based Injection Error Based MySQLi MySQLi penetration testing SQL injection Web Security +
Using Server Errors to Leak Password Hashes: Blind Error Based SQL Injection Posted by Keith Makan December 29, 2012 Bit Substring-ing Blind MySQL injection Blind-Error Based Injection Error Based MySQLi SQL injection +