Please turn on your JavaScript for this page to function normally.
hacking contest
![cyber threat](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/25143233/cyber-threat2-400x200.jpg)
10 tips for creating your security hackathon playbook
For more than 12 years, I’ve been organizing and running hackathons with the goal of finding security vulnerabilities and fixing them before a product hits the market. These …
![encryption](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/29120358/encryption-1400-400x200.jpg)
Attribute-based encryption could spell the end of data compromise
The future of data privacy is the end of compromise. With the world producing data at astounding rates, we need ways to put data to the best use while protecting against …
![Tesla interior](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110548/tesla-interior-400x200.jpg)
Hack a Tesla Model 3, get cash and the car
For this year’s edition of the Pwn2Own hacking contest at CanSecWest, Trend Micro’s Zero Day Initiative has announced a new target category: Automotive. So, aside from …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege