conferences
How big data is transforming information security
In this video recorded at Hack In The Box 2013 Amsterdam, Eddie Schwartz, CSO at RSA, The Security Division of EMC, discusses the impact of big data on information security. …
(IN)SECURE Magazine issue 38 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 38 has been released today. Table of contents: …
Hacking charge stations for electric cars
The vision of electric cars call for charge stations to perform smart charging as part of a global smart grid. As a result, a charge station is a sophisticated computer that …
Photos: Security BSides London 2013
Security B-Sides events are free, community events organised by local individuals, with the express goal of enabling a platform for information dissemination. This …
Disruptive tech trends that will change everything
At the opening keynote for the 43rd annual ISACA North America Computer Audit, Control and Security (CACS) Conference, New York Times personal-technology columnist David Pogue …
A closer look at Hack In The Box 2013 Amsterdam
Here’s a look at Hack In The Box 2013 Amsterdam, that took place at the Okura Hotel on April 10-11. This year’s event is going to be remembered by the widely …
FAA and EASA say hijacking planes using an app is not possible
The big news last week was that, according to researcher Hugo Teso, it is possible for malicious individuals to take control of an airplane using a special framework and an …
Twitter’s recipe for security awareness
Security awareness training is an issue that has been and continues to be hotly debated both online and offline. It is also a topic that seems a little out of place at the …
Controlling the physical world with BacNET attack framework
The integration of computer technology to monitor the inner works of large office buildings, factories and plants has been evolving for years. These types of systems are often …
Hijacking airplanes with an Android phone
An extremely well attended talk by Hugo Teso, a security consultant at n.runs AG in Germany, about the completely realistic scenario of plane hijacking via a simple Android …
The cloud: Storms on the horizon
At its heart, the cloud is really just shorthand for shared resources. The cloud is regularly touted as the answer to all of your IT woes. But, beyond the marketing pitches …
Generalized single packet authorization for cloud computing environments
Cloud computing environments such as those provided by Amazon and Google can be your passport to powerful computing resources without having to worry about typical …
Featured news
Resources
Don't miss
- LiteLLM PyPI packages compromised in expanding TeamPCP supply chain attacks
- Training an AI agent to attack LLM applications like a real adversary
- You don’t have to choose between BAS or automated pentesting, you shouldn’t
- Why your phishing simulations aren’t building a security culture
- Your security stack looks fine from the dashboard and that’s the problem