Please turn on your JavaScript for this page to function normally.
A new defense against kernel-mode exploits

Over the past many years, there’ve been a plethora of security solutions available for Windows-based endpoints, but most of them are helpless against malicious code …

DEF CON contest to help track down illegal robocalls

The Federal Trade Commission is looking to expand the technological arsenal that can be used in the battle against illegal phone spammers by challenging DEF CON 22 attendees …

The state of GRX security

Late last year, documents from Edward Snowden’s NSA trove have revealed that Britain’s GCHQ has mounted a successful attack against Belgacom (the largest telecom …

Defeating UEFI’s SecureBoot

The Unified Extensible Firmware Interface (UEFI) is ment to replace the Basic Input/Output System (BIOS) firmware interface found on all IBM PC-compatible personal computers. …

DARPA’s Cyber Grand Challenge offers $3.75 million in prizes

Computer security experts from academia, industry and the larger security community have organized themselves into more than 30 teams to compete in DARPA’s Cyber Grand …

Improving training programs in cyber security

In this podcast, recorded at Hack In The Box Amsterdam 2014, Lisha Sterling, Developer Coordinator at Geeks Without Bounds, talks about the problems in cybersecurity …

What inspired you to start hacking?

This is a question that Jennifer Steffens, IOActive CEO, often asks hackers she meets on conferences around the world. More often than not, the answer is movies: War Games, …

Walking through Hack In The Box 2014 Amsterdam

This year’s Hack In The Box conference is being held at the De Beurs van Berlage, which is an impressive venue located in central Amsterdam. The organization, the …

Hacking for the greater good

As long as people write code, they will write code with flaws, says Katie Moussouris, former Senior Security Strategist Lead at Microsoft Security Response Center and, as of …

(IN)SECURE Magazine Infosecurity Europe special issue released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. This year’s Infosecurity Europe conference and …

The importance of continuous monitoring

In this podcast, recorded at Infosecurity Europe 2014, Corey Bodzin, VP of Product Management at Qualys, discusses the need for continuous monitoring of the growing perimeter …

Making the web a safe place to visit

The new truth is that the web browser is, increasingly, the primary threat vector for cyber attacks on the enterprise. Confidential research available to Gartner members …

Don't miss

Cybersecurity news