Hackers the movie: A retrospective
In this lecture, Don A. Bailey will take a look back at another great milestone in information security: the movie Hackers. In this retrospective from Hack in The Box 2012, …
Video: Practical exploitation of embedded systems
This video from Hack in The Box conference is an in-depth exploration of the reverse engineering and exploitation of embedded systems. It covers hardware by showing how to …
Video: History of the JavaScript security arsenal
In 2006 we had the first JavaScript port scanner. The same year we saw the incarnation of more advanced tools such as AttackAPI, Carnaval and Backframe. A year later we saw …
Video: Data mining a mountain of vulnerabilities
Every day, software developers around the world, from Bangalore to Silicon Valley, churn out millions of lines of insecure code. Veracode used static binary analysis on …
Video: Hacking Huawei VRP
Huawei routers are no longer devices only seen in China. Entire countries run their Internet infrastructure exclusively on these products and established tier 1 ISPs make …
Cyberwarfare and the developing digital arms race
According to security expert Mikko Hypp?¶nen, we might not be in a cyber war but we are in a cyber arms race, and the governments involved are the James Bond of the …
Video: Smart TV 0-day vulnerability
This video by ReVuln demonstrates a 0-day vulnerability in Smart TV, in this case a Samsung TV LED 3D. Smart TV can be used to browse the Internet, use social networks, …
Video: Why privacy matters
Privacy International asked lawyers, activists, researchers and hackers at Defcon 2012 about some of the debates that thrive at the intersection between law, technology and …
Video: Incident response and cloud computing
Moving into a cloud environment can bring many advantages to organizations in terms of flexibility, scalability and other benefits. However, it also brings a number of …
Life cycle and detection of an exploit kit
As the process of owning systems and dragging them into botnets becomes ever more commercialized, exploit kits have emerged as a favorite of attackers. Their point-click-own …
Video: Bill Gates on Windows 8, Windows Phone 8 and Surface
Here’s Bill Gates talking about the significance of this week’s launch of Windows 8, about Windows Phone 8 and Surface.
Security implications of the rise of silicon-based life forms
Computing has entered a new era marked by the emergence of a new life form, a silicon based life form, where the center of the paradigm is not human to computer interface, but …
Featured news
Resources
Don't miss
- Check for CitrixBleed 2 exploitation even if you patched quickly! (CVE-2025-5777)
- Exposure management is the answer to: “Am I working on the right things?”
- Cyberattacks are changing the game for major sports events
- Can your security stack handle AI that thinks for itself?
- July 2025 Patch Tuesday forecast: Take a break from the grind