Quantcast

Securing our future 3: The Internet of Things

Mikko Hyppönen now shifts the vector of his discourse over to criminal challenges online as well as the dangers of the rapidly progressing Internet of Things. There are criminal things online as well. When we move...

Securing our future 2: Legal infringement of privacy

Judging from targeted ad campaigns on social networks, Mikko Hyppönen argues, these companies know too much about their users, which is a big privacy concern. When you go and look at these services as a customer, you...

Securing our future – Mikko Hyppönen

Mikko Hyppönen, F-Secure’s CRO and security celebrity who needs no introduction, highlights current and emerging concerns caused by ubiquity of the Internet. I am Mikko Hyppönen, and I have spent my life analyzing...

How not to suck at pen testing 6: Penetration testers code of ethics

Black Hills Information Security’s John Strand lists the essential rules, which are intended to make pen testing more efficient as the industry is moving on. John Strand: The whole gist of this entire presentation is...

Remove CryptoWall 3.0 ransomware and mitigate the file damage

While the individuals behind CryptoWall 3.0 virus remain pinned to the “most wanted” cybercriminals list, their infamous product has been up and running for months on end. Anyone who is unfortunate enough to fall...

How not to suck at pen testing 5: Hunt teaming

This part is about a really interesting, highly effective take on network penetration testing advocated by John Strand and his colleague Joff Thyer. John Strand: So, let’s talk about trying to find new areas, and...

How not to suck at pen testing 4: Bit9 issues and ISR Evilgrade attacks

John Strand dwells on a few nontrivial vectors applicable for compromising target organization’s IT infrastructure and bypassing technologies like Bit9. Also, there’s data loss prevention. As I said, we’re in...

How not to suck at pen testing 3: Mitigating structural weaknesses

The author of the presentation moves on to express his viewpoint on the correct way of handling structural vulnerabilities found during a security assessment. Another kind of offset one was antivirus. I know that this...
Recent from News
Recent from How to ...