Monthly Archives: June 2013
Clickjacking: Attacks and Defenses
Lin-Shung Huang from Carnegie Mellon presents a study at USENIX Security about clickjacking attack vectors and the defenses to deploy for evading this...
Symantec’s Francis deSouza on Building a Higher Order of Security Intelligence
Francis deSouza, President of Products and Services at Symantec, gives a keynote at RSA Conference US 2013 about the role of big data...
An Analysis of the Online Identity Battleground by aestetix
aestetix, a researcher of online identity issues and one of the enthusiasts that created the Nym Rights group, gave a great talk at...
IObit Advanced Mobile Care 3.2 review
IObit Advanced Mobile Care 3.2 is a user-friendly and dependable app for maintaining security and smooth performance of an Android device.The recent launch of...
An Interview with Dave Kennedy on Artillery, SET, DerbyCon and pentesting
David Kennedy is the founder and CEO of TrustedSec, former CSO for Fortune 1000, former Marine Corps. He is the author of The...
Why is Cyber Conflicts Amnesia Dangerous? Interview with Jason Healey
Jason Healey is the director of the Cyber Statecraft Initiative of the Atlantic Council, focusing on international cooperation, competition and conflict in cyberspace.
He...