conferences
Video: Antivirus evasion techniques
This video from DerbyCon discusses the basics of the AV evasion problem, what techniques work, which ones don’t and why. The talk has a particular focus on AV evasion as …
Strengths and weaknesses of MS SmartScreen filter
Microsoft’s SmartScreen application control feature, introduced with Internet Explorer 8 and lately ported to Windows 8 is a good addition to the new OS. It might …
Video: DIY Command & Control for fun and no profit
Many security professionals have heard about Command & Control botnets, even more have been infected by them. Very few have had the opportunity to actually look inside …
Video: Recent advances in IPv6 security
There are a number of factors that make the IPv6 protocol suite interesting from a security standpoint. Firstly, being a new technology, technical personnel has much less …
Video: How the grid will be hacked
There is a never ending stream of vulnerabilities in the mechanical and cyber systems that support the grid. So, why hasn’t there been any significant breach of the …
Video: Practical exploitation using a malicious SSID
In this video from DerbyCon, Deral Heiland discusses the leveraging of SSIDs to inject various attacks into wireless devices, and management consoles. The type of injection …
RSA Conference Europe announces keynote lineup
RSA Conference announced its complete line-up of keynote speakers for the 14th annual RSA Conference Europe 2013, taking place from 29 – 31 October 2013, at Amsterdam …
Get a VIP ticket to HITBSecConf and $1337 of travel money
Following the success of the first #HITB1337Giveaway held in conjunction with HITBSecConf2013 – Amsterdam, Hack In The Box is now bringing this popular Twitter-based …
Hackers gather in Colombia for Security Zone 2013
The need for, the interest in, and the general knowledge about information security has grown exponentially in the past few years. All over the world, the need for competence, …
Microsoft, Facebook and Mozilla hunt for developers at HackWEEKDAY
This October, developers from around the globe have an opportunity to showcase their coding skills to an international audience at the HackWEEKDAY hackathon in Kuala Lumpur. …
Is your status update also a red flag for danger?
In this digital age when our whole lives are online, it is no surprise that security has become an increasing concern of many. Whilst you’re busy worrying about your …
USB “condom” protects from mobile device juice jacking
A group of Georgia Tech researchers has created quite a stir at this year’s Black Hat conference when they showcased chargers capable of installing malware on iPhones, …
Featured news
Sponsored
Don't miss
- Organizations struggle to defend against ransomware
- Critical Git vulnerability allows RCE when cloning repositories with submodules (CVE-2024-32002)
- Google fixes third exploited Chrome zero-day in a week (CVE-2024-4947)
- Is an open-source AI vulnerability next?
- OWASP dep-scan: Open-source security and risk audit tool