conferences
Photos: Infosec World 2014
The Infosec World Conference and Expo is currently taking place in Orlando, Florida. Help Net Security is attending so here’s a few photos from the show.
Network, engage and do business at Infosecurity Europe
Infosecurity Europe is the largest and most attended information security event in Europe. Held in central London, it is a free event featuring over 325 exhibitors presenting …
Pwn2Own 2014 ends, $850k distributed to successful hackers
Day two of the Pwn2Own hacking contest at the CanSecWest Conference in Vancouver has ended with Safari, Internet Explorer, Firefox, Chrome and Flash going down. The Vupen team …
Record prizes for Pwn2Own and Pwnium contestants
The results of the first day of the traditional Pwn2Own hacking contest at the CanSecWest Conference currently taking place in Vancouver are in, and the losers are Adobe, …
Video: RSA Conference 2014 showcase
The world’s top information security professionals and business leaders gathered in San Francisco for RSA Conference 2014. Here’s a closer look at the show, watch …
TrustyCon talks made available on video
As announced, the TrustyCon infosec conference, established by security consulting firm iSEC Partners, the Electronic Frontier Foundation (EFF) and DEF CON and held …
One of the first network firewall inventors to come to Abu Dhabi
One of the creators of the world’s first network firewall and the author of “Firewall and Internet Security: Repelling the Wily Hacker”, Bill Cheswick, will …
$2.7 million await successful Pwnium 4 contestants
Google has, once again, called security researchers to participate in its annual Pwnium contest scheduled to be held at the CanSecWest security conference in Vancouver in …
Speakers boycotting RSA Conference will speak at TrustyCon
Security consulting firm iSEC Partners, the Electronic Frontier Foundation (EFF) and DEF CON have announce that they will be kicking off a brand-new security technology …
An introduction to firmware analysis
This talk by Stefan Widmann gives an introduction to firmware analysis: It starts with how to retrieve the binary, e.g. get a plain file from manufacturer, extract it from an …
The basics of digital wireless communication
The aim of this talk by Clemens Hopfer from the 30th Chaos Communication Congress is to give an understandable insight into wireless communication, using existing systems as …
Triggering deep vulnerabilities using symbolic execution
Symbolic Execution (SE) is a powerful way to analyze programs. Instead of using concrete data values SE uses symbolic values to evaluate a large set of parallel program paths …
Featured news
Resources
Don't miss
- The soft underbelly of space isn’t in orbit, it’s on the ground
- Privacy risks sit inside the ads that fill your social media feed
- Should AI access be treated as a civil right across generations?
- What cybersecurity leaders are reading to stay ahead
- Cisco email security appliances rooted and backdoored via still unpatched zero-day