Life cycle and detection of an exploit kit
As the process of owning systems and dragging them into botnets becomes ever more commercialized, exploit kits have emerged as a favorite of attackers. Their point-click-own …
Video: Bill Gates on Windows 8, Windows Phone 8 and Surface
Here’s Bill Gates talking about the significance of this week’s launch of Windows 8, about Windows Phone 8 and Surface.
Security implications of the rise of silicon-based life forms
Computing has entered a new era marked by the emergence of a new life form, a silicon based life form, where the center of the paradigm is not human to computer interface, but …
HD Moore: The wild west
HD Moore is the CSO of Rapid7 and Chief Architect of Metasploit. In the video below, recorded at Derbycon last week in Kentucky, he talks about ghost towns, highways, and …
5 bad things IT administrators do
Philip Lieberman is the President at Lieberman Software Corporation and in this video talks about five awful things that IT administrators do and offers ways to fix these actions.
Chimera: A declarative language for streaming network traffic analysis
Intrusion detection systems play a vital role in network security. Central to these systems is the language used to express policies. Ideally, this language should be …
Mikko Hypponen: Where are we and where are we going
Mikko Hypponen is the Chief Research Officer at F-Secure. Here you can watch his keynote at this year’s Hack In Paris conference.
Fast and furious reverse engineering
Tomislav Pericin is one of the founders of ReversingLabs and the company’s Chief Software Architect. In this video, recorded at Hack in The Box Amsterdam 2012, he talks …
DDoS attacks protection advice from the EFF
Denial of service (DoS) and distributed denial of service (DDoS) attacks are increasingly common phenomena, used by a variety of actors—from activists to governments—to …
Automated hacking
The automatic tools that are available online save the attacker the trouble of studying attack methods and coming up with exploits to applications’ vulnerabilities. An …
Hardening Windows processes
Didier Stevens is an IT security consultant working for a large financial corporation in Belgium. In this video recorded at Hack in The Box 2012 Amsterdam, Didier talks about …
Bruce Schneier: Trust, security and society
Human societies run on trust. Every day, we all trust millions of people, organizations, and systems — and we do it so easily that we barely notice. But in any system of …
Featured news
Sponsored
Don't miss
- Sumo Logic discloses potential breach via compromised AWS credential
- Marina Bay Sands breach exposed data of 665,000 customers
- The 3 key stages of ransomware attacks and useful indicators of compromise
- Aqua Trivy open-source security scanner now finds Kubernetes security risks
- AI-assisted coding and its impact on developers