Please turn on your JavaScript for this page to function normally.
Video: Data mining a mountain of vulnerabilities

Every day, software developers around the world, from Bangalore to Silicon Valley, churn out millions of lines of insecure code. Veracode used static binary analysis on …

Video: Hacking Huawei VRP

Huawei routers are no longer devices only seen in China. Entire countries run their Internet infrastructure exclusively on these products and established tier 1 ISPs make …

Cyberwarfare and the developing digital arms race

According to security expert Mikko Hypp?¶nen, we might not be in a cyber war but we are in a cyber arms race, and the governments involved are the James Bond of the …

Video: Smart TV 0-day vulnerability

This video by ReVuln demonstrates a 0-day vulnerability in Smart TV, in this case a Samsung TV LED 3D. Smart TV can be used to browse the Internet, use social networks, …

Video: Why privacy matters

Privacy International asked lawyers, activists, researchers and hackers at Defcon 2012 about some of the debates that thrive at the intersection between law, technology and …

Video: Incident response and cloud computing

Moving into a cloud environment can bring many advantages to organizations in terms of flexibility, scalability and other benefits. However, it also brings a number of …

Life cycle and detection of an exploit kit

As the process of owning systems and dragging them into botnets becomes ever more commercialized, exploit kits have emerged as a favorite of attackers. Their point-click-own …

Video: Bill Gates on Windows 8, Windows Phone 8 and Surface

Here’s Bill Gates talking about the significance of this week’s launch of Windows 8, about Windows Phone 8 and Surface.

Security implications of the rise of silicon-based life forms

Computing has entered a new era marked by the emergence of a new life form, a silicon based life form, where the center of the paradigm is not human to computer interface, but …

HD Moore: The wild west

HD Moore is the CSO of Rapid7 and Chief Architect of Metasploit. In the video below, recorded at Derbycon last week in Kentucky, he talks about ghost towns, highways, and …

5 bad things IT administrators do

Philip Lieberman is the President at Lieberman Software Corporation and in this video talks about five awful things that IT administrators do and offers ways to fix these actions.

Chimera: A declarative language for streaming network traffic analysis

Intrusion detection systems play a vital role in network security. Central to these systems is the language used to express policies. Ideally, this language should be …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools