ZORG is an open source implementation of the ZRTP protocol implementation. ZRTP provides end-to-end key exchange with Elliptic Curve Diffie-Hellmann 384bit and AES-256 SRTP encryption.
>> AUTHOR: deepcore
http://www.jhcis.ptho.moph.go.th/counter/logs/TAK_ash.html defaced by Ashiyane Digital Security Team
NetSupport Manager Agent suffers from a stack-based buffer overflow vulnerability.
Secunia Security Advisory – A vulnerability has been reported in Mac OS X, which can be exploited by malicious people to potentially compromise a vulnerable system.
http://www.chiangmai.go.th/actfile/1294441362.txt defaced by r3cog
State Department warns hundreds of Wikileak targets American Thinker (blog) …
WikiLeaks Cables Make Appearance in a Tale of Sunken Treasure and Nazi Theft New York Times ATLANTA — The latest twist in the WikiLeaks tale is a plot worthy of a Tom Clancy thriller. It is a story of international ..
Read this article: Johannesburg’s Traffic Lights Robbed Of SIM Cards
Continue reading here: Julian "Irony" Assange Threatened To Sue The Guardian Over Leak
Excerpt from: Respected Journal Will Present Evidence Of ESP