Please turn on your JavaScript for this page to function normally.
Infosecurity Europe 2016
Photos: Infosecurity Europe 2016

Taking place in London right now is Infosecurity Europe 2016. Europe’s largest information security event has more companies exhibiting than ever before, and a …

Saumil Shah, Saumil Shah, CEO at Net-Square
What 17 years as an infosec trainer have taught me

July 2016 shall see me complete 17 years in the infosec training circuit. It has been an amazing journey, with humble beginnings. How it all started I had a strong academic …

Borderless Cyber Europe
Borderless Cyber Europe 2016 to emphasize the importance of threat intelligence sharing

On 8-9 September, OASIS will host Borderless Cyber Europe 2016 at the European Commission Headquarters in Brussels, Belgium. The excitement for this year’s event has …

Black Hat
How to get your talk accepted at Black Hat

There’s a wealth of technical information security conferences all over the globe, but Black Hat USA is the only one that gathers so many of the world’s top …

HITBSecConf
Submissions open for CommSec Track at HITBSecConf Amsterdam

Alongside HITB2016AMS’s CommSec Exhibition Village there will be a separate CommSec Track (26 – 27 May). Hackers, makers, builders and breakers are invited to send …

Human element of security to the fore at IRISSCON 2015

The most neglected part of security is the human factor – and yet it’s also the most vulnerable. Several of the speakers at the recently held IRISSCON cyber crime conference …

BadBarcode: Poisoned barcodes can be used to take over systems

Researchers from Tencent’s Xuanwu Lab have proved that a specially crafted barcode can be used to execute commands on a target system, saddle it with malware, or perform …

How to become a nightmare for cyber attackers

Chris Nickerson, CEO of Lares Consulting, has been a penetration tester for the last 15 year or so. He headed red teams targeting systems and environments known and unknown, …

WiFi jamming attacks more simple and cheaper than ever

A security researcher has demonstrated that jamming WiFi, Bluetooth, and Zigbee networks is not difficult to perform but, most importantly, also not as costly as one might …

Photo: A walk through Cyber Security Europe 2015

Taking place in London this week, Cyber Security Europe 2015 features seminars and solutions on all facets of cyber security and risk mitigation, from perimeter firewalls to …

IP camera manufacturers force researcher to pull conference talk

A researcher has been forced to cancel his presentation on the vulnerabilities found on major surveillance cameras and how they can be exploited “due to legal threats …

Car hacking via compromised car diagnostic tools

Car hacking is a topic that has received considerable attention from security researchers in the last year or so, and the general public and (hopefully) lawmakers are finally …

Don't miss

Cybersecurity news