conferences
HITBSecConf2012: New hackathon, CTF and high-profile keynotes
Hack In The Box Security Conference is back again in Amsterdam this year for the European leg of its annual circuit. From the 21st to the 25th of May, this deep knowledge …
Pwn2Own 2012: Changed rules, bigger prizes, no more mobile hacks
Pwn2Own, one of the most anticipated hacking contests that takes place each year at the CanSecWest conference in Vancouver, British Columbia, is set to unfold under …
Questioning of incoming data crucial for security awareness
In the last six-to-twelve months, we have witnessed many different cyber attacks. Hacktivists were making a statement, the players behind the so-called Advanced Persistent …
How to foil targeted attacks
There are two types of targeted attacks aimed at organizations and companies: server-side and client-side. Server-side attacks consist of attacks on the organizations’ …
The challenges of setting up a security conference
In this podcast recorded at the SecurityByte conference held this year in Bangalore, India, the conference founder Nishchal Bhalla talks about his motivations for organizing …
A new perspective on the insider threat
When talking about the insider threat, the first that comes to mind to many (if not all) information security professionals is the threat posed by rogue insiders that …
NetWars to test the skills of infosec professionals
At SANS London 2011, Europe’s largest IT security training event, NetWars will be launched for the first time in the UK. NetWars participants compete in a mock …
Win a free ticket to Black Hat Abu Dhabi 2011
Black Hat Abu Dhabi 2011 is scheduled to be held at the Emirates Palace in Abu Dhabi on December 14-15. Help Net Security is offering a free ticket to the Briefings part of …
Kelihos, Waledac and Storm malware believed to have same author
The recent takedown of the Kelihos botnet by Microsoft has received a lot of attention, despite the fact that the botnet is rather small (around 41,000 computers located …
The m00p gang investigation: a failure or a success?
Security companies and law enforcement agencies often collaborate on cyber crime investigations, and most of these investigations do end up with the arrest, prosecution and …
Microsoft puts vulnerability exploitation into context
Recently Microsoft released the 11th volume of the Microsoft Security Intelligence Report, the most comprehensive version of this report to date. In this podcast, Tim Rains, …
SANS virtualization security course returns to London
The SANS Institute has added Security 577 Virtualization Security Fundamentals to the line-up for SANS 2011 London following popular demand. On its European début last year, …
Featured news
Resources
Don't miss
- Why AI code assistants need a security reality check
- GPS tracker detection made easy with off-the-shelf hardware
- 91% noise: A look at what’s wrong with traditional SAST tools
- AWS launches new cloud security features
- Chaining two LPEs to get “root”: Most Linux distros vulnerable (CVE-2025-6018, CVE-2025-6019)