Video: TinyNuke botnet explained
In the videos below, McAfee Labs show the setup requirements for installing and deploying TinyNuke. They review the available features of TinyNuke through the control panel, …
In the videos below, McAfee Labs show the setup requirements for installing and deploying TinyNuke. They review the available features of TinyNuke through the control panel, …
If you’re a white hat and you want to continue being one, knowing what laws and industry regulations allow or not allow (or require or not require) you to do is of …
Changing a corporate security culture, or even just that of your own office or department, can sometimes seem impossible. In general, people don’t like change: they just …
Stephen Kim was a top level state department intelligence analyst. He went to prison under the Espionage Act. The Surrender The Surrender intimately documents Stephen Kim’s …
Here is video recording of a “Trust in the Cloud” panel which was a part of the Rackspace::Solve NYC event held last Thursday. Rackspace Security leader David …
Do we want algorithms that we can’t understand or question to influence how we get to live our lives? Unfortunately, as Cathy O’Neil, well-known mathematician and …
After having been ruled invalid by the ECJ, the Safe Habor Agreement is now back in the spotlight as the Commission has finally issued a communication on the Trans-Atlantic …
Car hacking is a topic that has received considerable attention from security researchers in the last year or so, and the general public and (hopefully) lawmakers are finally …
You might or might not know that some countries – especially some European ones – have (or are working on) strong data protection laws.What most people don’t …
Do you know how digitally collected information uncovers things about you which you would rather remained private? We’re already living in the age of Big Data, and are …
As part of a Harvard computer science symposium, Bruce Schneier had a public conversation with Edward Snowden. The topics were largely technical, ranging from cryptography to …
Here’s a walk through video of the Business Hall at Black Hat USA 2014. The video features: Qualys Firemon iBoss Crowdstrike Palo Alto Networks Shape Security Pwnie …