Please turn on your JavaScript for this page to function normally.
HITBSecConf2012: New hackathon, CTF and high-profile keynotes

Hack In The Box Security Conference is back again in Amsterdam this year for the European leg of its annual circuit. From the 21st to the 25th of May, this deep knowledge …

Pwn2Own 2012: Changed rules, bigger prizes, no more mobile hacks

Pwn2Own, one of the most anticipated hacking contests that takes place each year at the CanSecWest conference in Vancouver, British Columbia, is set to unfold under …

Questioning of incoming data crucial for security awareness

In the last six-to-twelve months, we have witnessed many different cyber attacks. Hacktivists were making a statement, the players behind the so-called Advanced Persistent …

How to foil targeted attacks

There are two types of targeted attacks aimed at organizations and companies: server-side and client-side. Server-side attacks consist of attacks on the organizations’ …

The challenges of setting up a security conference

In this podcast recorded at the SecurityByte conference held this year in Bangalore, India, the conference founder Nishchal Bhalla talks about his motivations for organizing …

A new perspective on the insider threat

When talking about the insider threat, the first that comes to mind to many (if not all) information security professionals is the threat posed by rogue insiders that …

NetWars to test the skills of infosec professionals

At SANS London 2011, Europe’s largest IT security training event, NetWars will be launched for the first time in the UK. NetWars participants compete in a mock …

Win a free ticket to Black Hat Abu Dhabi 2011

Black Hat Abu Dhabi 2011 is scheduled to be held at the Emirates Palace in Abu Dhabi on December 14-15. Help Net Security is offering a free ticket to the Briefings part of …

Kelihos, Waledac and Storm malware believed to have same author

The recent takedown of the Kelihos botnet by Microsoft has received a lot of attention, despite the fact that the botnet is rather small (around 41,000 computers located …

The m00p gang investigation: a failure or a success?

Security companies and law enforcement agencies often collaborate on cyber crime investigations, and most of these investigations do end up with the arrest, prosecution and …

Microsoft puts vulnerability exploitation into context

Recently Microsoft released the 11th volume of the Microsoft Security Intelligence Report, the most comprehensive version of this report to date. In this podcast, Tim Rains, …

SANS virtualization security course returns to London

The SANS Institute has added Security 577 Virtualization Security Fundamentals to the line-up for SANS 2011 London following popular demand. On its European début last year, …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools