Close

The evolution of malware and the threat landscape - a decade in overview

Microsoft Security Intelligence Report provides summarized information from the last 10 years focusing on software vulnerabilities, software vulnerability exploits, malicious, and potentially unwanted software. The report discusses the origin of malware following it through the decade of mutation all the way upto cloud. However, the report does not cover specific threats to cloud in detail…

Share

Speaking @ 10th Annual SecureIT conference- “Practical Web Application Security and OWASP Top 10 implementation on Microsoft Platform”

On March 18th, I will be speaking at the 10th Annual SecureIT conference in a workshop titled “Practical Web Application Security and OWASP Top 10 implementation on Microsoft Platform”. This is a joint session with Tin Zaw, chapter leader and president of OWASP LA. Here is the abstract. Practical Web Application Security and OWASP Top…

Share

Optimizing Collatz Sequence with Dynamic Programming

Even though Kurtz and Simon proved that a natural generalization of the Collatz problem is algorithmically undecidable, it is still fairly easy to brute force the 3n+1 conjecture with large values of n and empirically see it converge. Project Euler's problem 14 queries about which starting number, under one million, produces the longest sequence? Since Premature optimization is often considered root…

Share