The Computer Fraud and Abuse Act: Swartz, Auernheimer, and beyond
The Computer Fraud and Abuse Act is controversial for its broad reach and potential for misuse. In this video from Shmoocon 2013, Professor Orin Kerr and Marcia Hofmann from …
Malware analysis: Collaboration, automation and training
Whether you’re a novice or a professional at analyzing malicious code, you’ll have a desire to learn or pass on that skill. Most malicious code analysis is …
Attacking SCADA wireless systems
Leased lines are recurring costs throughout the power grid. The bottom line demands the use of wireless solutions where possible. Dare we? We already do. The video below, …
Strategies of a world-class computer security incident response team
Today’s Computer Security Incident Response Team (CSIRT) should have everything they need to mount a competent defense of the ever-changing IT enterprise: a vast array …
Protecting sensitive information on iOS devices
We’ve seen the deep technical research showing what makes iOS devices secure (or sometimes not so much). But once you grok ASLR and code signing, are you really any …
Hacking as an act of war
Once the exclusive domain of a small number of geniuses, hacking has gone mainstream as an element of national defense. The United States has established a four-star Cyber …
Security in a hyperconnected world
In this video, recorded at RSA Conference 2013, Qualys Chairman and CEO Philippe Courtot talks about the threats caused by intelligent devices as well as the changes required …
Wolfgang Kandek presents new Qualys offerings
During RSA Conference 2013 in San Francisco, presented several news announcements. In this video, Qualys CTO Wolfgang Kandek discusses the expanded FreeScan service, the …
Video: RSA Conference 2013 showcase
The world’s top information security professionals and business leaders gathered in San Francisco for RSA Conference 2013. Here’s a closer look at the show. For …
OAuth flaw allowed researcher full access to any Facebook account
A flaw in Facebook’s OAuth system that allows the communication between applications and users has enabled web application security specialist Nir Goldshlager to gain …
Video: Pirate Party MEP talks online child safety
Children and teenagers benefit hugely from being online, but they can also be targets of crime and exploitation as in any other environment. Child safety online is listed as …
EU cybercop: European Cybercrime Centre to focus on criminal gangs
The European Cybercrime Centre (EC3) at Europol in The Hague aims to become the focal point in the EU’s fight against cybercrime, through building operational and …
Featured news
Resources
Don't miss
- Attackers use “Contact Us” forms and fake NDAs to phish industrial manufacturing firms
- New framework aims to outsmart malware evasion tricks
- Finding connection and resilience as a CISO
- AI isn’t taking over the world, but here’s what you should worry about
- Agentic AI coding assistant helped attacker breach, extort 17 distinct organizations