Replicating NSA’s gadgets using open source
One peek at the leaked pages of NSA’s ANT catalog made wireless security researcher Michael Ossmann’s mind start spinning. “Could we – could I – …
One peek at the leaked pages of NSA’s ANT catalog made wireless security researcher Michael Ossmann’s mind start spinning. “Could we – could I – …
The Unified Extensible Firmware Interface (UEFI) is ment to replace the Basic Input/Output System (BIOS) firmware interface found on all IBM PC-compatible personal computers. …
In this podcast, recorded at Hack In The Box Amsterdam 2014, Lisha Sterling, Developer Coordinator at Geeks Without Bounds, talks about the problems in cybersecurity …
This is a question that Jennifer Steffens, IOActive CEO, often asks hackers she meets on conferences around the world. More often than not, the answer is movies: War Games, …
This year’s Hack In The Box conference is being held at the De Beurs van Berlage, which is an impressive venue located in central Amsterdam. The organization, the …
As long as people write code, they will write code with flaws, says Katie Moussouris, former Senior Security Strategist Lead at Microsoft Security Response Center and, as of …
For the third year in a row Sogeti organizes the social engineering challenge during Hack In The Box Amsterdam. In 2012 and 2013 they asked contestants to show weaknesses in …
Dhillon Andrew Kannabhiran is the Founder and CEO of Hack in The Box, and in this interview he introduces HITBSecConf Amsterdam and offers insight on what attendees can expect …
As part of Google’s ongoing commitment to encourage women to excel in computing and technology, Google is offering five grants to women in security to attend the Hack In …
Stefano Zanero is an Assistant Professor at Politechnico di Milano, where he focuses on systems security. Modern botnets rely on domain-generation algorithms (DGAs) to build …
A substantial security oversight is present in a variety of penetration testing tools, and it has to do with the different languages that a computer system can be set up to …
Social engineering has for a while now been cyber attackers’ best bet to enter systems and compromise accounts when actual hacking doesn’t work, or when they …