Online privacy: How did we get here?
As technology has evolved over the past two centuries, so have our expectations about privacy. This new digital world allows us to connect with each other with increasing …
Bruce Schneier on power and security
In this video, Bruce Schneier talks about trust. We all trust millions of people, organizations, and systems every day — and we do it so easily that we barely notice. …
Video with NSA whistleblower Edward Snowden
This video features an interview with Edward Snowden, the man behind the most significant intelligence leak in U.S. history. Copyright © 2013 Praxis Films / Laura Poitras.
Hacking charge stations for electric cars
The vision of electric cars call for charge stations to perform smart charging as part of a global smart grid. As a result, a charge station is a sophisticated computer that …
Pirate Party on data protection
In the video below, Christian Engstr?¶m, Pirate Party MEP, discusses data protection. A common regulation to cover all of Europe is one of the arguments presented by …
A closer look at Hack In The Box 2013 Amsterdam
Here’s a look at Hack In The Box 2013 Amsterdam, that took place at the Okura Hotel on April 10-11. This year’s event is going to be remembered by the widely …
Sophisticated threats and thinking like the attacker
Sophisticated attackers are making us think differently about how we approach security. They are methodical, persistent, creative and often times well funded. Approaching …
Controlling the physical world with BacNET attack framework
The integration of computer technology to monitor the inner works of large office buildings, factories and plants has been evolving for years. These types of systems are often …
The cloud: Storms on the horizon
At its heart, the cloud is really just shorthand for shared resources. The cloud is regularly touted as the answer to all of your IT woes. But, beyond the marketing pitches …
Generalized single packet authorization for cloud computing environments
Cloud computing environments such as those provided by Amazon and Google can be your passport to powerful computing resources without having to worry about typical …
DIY: Using trust to secure embedded projects
This talk from Shmoocon 2013 provides a DIY guide to using Trusted Computing on embedded devices. The authors introduce a low-cost schematic using Atmel’s CryptoModule …
Defending the Internet at scale
A decade ago, engineers tackled the C10K scalability problems that prevented servers from handling more than 10,000 concurrent connections. This problem was solved by fixing …