Expert analysis
The dangers of NOT passing cybersecurity legislation in 2012
According to the U.S. Government, cyber-security protection of critical infrastructure is a national priority. With 85 percent of the nation’s critical infrastructure …
Vulnerabilities in open source WAF ModSecurity
During our research of web application firewall evasion issues, we uncovered a flaw in ModSecurity that may lead to complete bypass of the installed rules, in the cases when …
Product pitch: Entrust IdentityGuard
In this podcast, Mike Moir, Product manager with Entrust, talks about Entrust IdentityGuard, an award-winning software authentication platform that helps financial …
Lessons learned from cracking 2 million LinkedIn passwords
Like everyone this week, I learned about a huge file of password hashes that had been leaked. The 120MB zip file contained 6,458,020 SHA-1 hashes of passwords for end-user …
Make your pentester work harder for his money
In this video recorded at Infosecurity 2012, Wolfgang Kandek, CTO at Qualys, talks about their recent research dealing with Java. Many modern exploits use Java as a stepping …
How fraudsters are disguising PCs to fool device fingerprinting
Cybercriminals know that financial and ecommerce providers often use fraud detection systems that monitor for anomalous transactions and behaviors. In order to bypass these …
Passing the internal scan for PCI DSS 2.0
Merchants subject to Payment Card Industry Data Security Standard (PCI DSS) rules are often blindsided by DSS changes, arrival of new payment technologies, and newly emerging …
Gamers increasingly under attack
In this video, Christopher Boyd, Senior Threat Researcher at GFI Software, talks about how scammers increasingly target gamers and gaming databases because of valuable …
When syncing sinks your browser
Google Chrome’s most recent version (v19) introduced a “tab sync” feature. When inspecting this feature from a security perspective we realized that a new …
Dissecting modern privacy concerns
In this interview, Al Raymond, VP of Privacy & Records Management at ARAMARK Corporation, discusses the nature of identity in a digital society, the implications of over …
Hack In The Box conferences
In this video, Dhillon Andrew Kannabhiran, Founder and CEO of Hack in The Box, talks about the Hack in The Box Security Conference (HITBSecConf) series. What started as a …
Privacy trends affecting security
In this podcast recorded at the RSA Conference 2012, Gant Redmon, VP of Business Development and General Counsel at Co3 Systems, talks about future privacy laws and trends …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)