Please turn on your JavaScript for this page to function normally.
First Round of HITBSecConf Kuala Lumpur speakers announced

Here’s a taste of some presentations you can expect at HITBSecConf Malaysia in October. You can register here. Conference speakers Collin Mulliner (Researcher, Systems …

Defending against the BREACH attack

When Juliano and Thai disclosed the CRIME attack last year, it was clear that the same attack technique could be applied to any other compressed data, and compressed response …

Experienced employees more important than a rising security budget

Tripwire announced the results of a survey of 167 attendees at Black Hat USA 2013. Many of those surveyed – 44 percent – said that if they could change one thing …

Researchers create DIY IDS for identifying hacked smartphones

A group of researchers from LMG Security has leveraged a Verizon Samsung femtocell – a small cellular station for extending cell phone coverage range indoors or at the …

Decoy water plant attracts hackers, Chinese APT1 crew

A Trend Micro researcher that has lately concentrated on finding out just how often industrial control systems are attacked and from where has shared the latest findings of …

Engineers demonstrate PLC hack on mock oil rig

The widely known Stuxnet incident made sure that the mere mention of SCADA vulnerabilities is enough for security experts to pause. After all, sabotaging industrial control …

Techniques malware authors use to evade detection

FireEye released a new report that reveals several techniques used by advanced malware to sidestep signature-based defenses during attacks. Today’s sophisticated, …

Hacker expo and all-women keynote line coming to Hack In The Box

Hack In The Box has announced HITB2014 Amsterdam will feature an all-new Haxpo – a massive Hacker Expo open for free to professionals and the public. Haxpo will be …

Malware attacks via malicious iPhone chargers

Do you ever think twice about using someone else’s charger for recharging your iPhone? Well, you will now, as three Georgia Tech researchers have managed to install a …

NSS Labs unveils Threat Modeling and Threat Forecasting

NSS Labs announced availability of two new advisory services – Threat Modeling and Threat Forecasting – helping clients to better understand their risk and distill …

Automated remediation for APTs and 0-days

ThreatTrack Security unveiled The Spyder Initiative, a development strategy for solving the challenges cyber security professionals face, including the creation of custom, …

Accuvant launches Threat Intelligence Briefing service

Accuvant announced at Black Hat USA 2013 the availability of its new Threat Intelligence Briefing (TIB) service. Delivered by Accuvant LABS research experts, the service gives …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools