Please turn on your JavaScript for this page to function normally.
HITBSecConf
Featured talks at the upcoming Hack In The Box Security Conference

The 8th annual Hack In The Box Security Conference in Amsterdam will feature brand new 2 and 3-day hands-on technical trainings covering a wide variety of topics from Linux …

City
Hacking smart cities: Dangerous connections

Once just a curiosity for technology enthusiasts, the Internet of Things (IoT) has become mainstream. In fact, the IoT security market is estimated to grow from USD 7.90 …

eye
Hypervisor wiretap feature can leak data from the cloud

Bitdefender has discovered that encrypted communications can be decrypted in real-time using a technique that has virtually zero footprint and is invisible to anyone except …

Saumil Shah, Saumil Shah, CEO at Net-Square
What 17 years as an infosec trainer have taught me

July 2016 shall see me complete 17 years in the infosec training circuit. It has been an amazing journey, with humble beginnings. How it all started I had a strong academic …

lights
Developing the perfect exfiltration technique

At SafeBreach, one of our major research areas is exfiltration (sending sensitive data out of the corporate network). In one of our research projects in late 2015, we set out …

explode
Investigating exploit kits: Clear and present danger

Nick Biasini is the Outreach Engineer at Cisco Talos. He has researched a wide range of topics including exploit kits and various malware campaigns being distributed through …

keyboard
Detect observation and evade theft of sensitive data

Jacob Torrey is an Advising Research Engineer at Assured Information Security, where he leads the Computer Architectures group. He has worked extensively with low-level x86 …

HITBSecConf
Submissions open for CommSec Track at HITBSecConf Amsterdam

Alongside HITB2016AMS’s CommSec Exhibition Village there will be a separate CommSec Track (26 – 27 May). Hackers, makers, builders and breakers are invited to send …

Innovative security research comes to Singapore

Hack In The Box is set to host its first HITB GSEC security event in Singapore next month with a 3 day single track conference and an all women fireside chat session held …

Mobile SSL failures: More common than they should be

Securing your mobile application traffic is apparently more difficult than it should be, as researchers Anthony Trummer and Tushar Dalvi discovered when looking into SSL/TLS …

Rethinking security: Securing activities instead of computers

For many people involved in the infosecurity community, the notion of security is too often tied to the quality of code (resistance to specific classes of bug, for example) …

How to develop effective honeypots

Honeypots – decoy systems used for learning cyber attackers’ capabilities and potential objectives – can be very useful to organizations, businesses, and …

Don't miss

Cybersecurity news