Home 2013 June

Monthly Archives: June 2013

Clickjacking: Attacks and Defenses

0
Lin-Shung Huang from Carnegie Mellon presents a study at USENIX Security about clickjacking attack vectors and the defenses to deploy for evading this...

Symantec’s Francis deSouza on Building a Higher Order of Security Intelligence

0
Francis deSouza, President of Products and Services at Symantec, gives a keynote at RSA Conference US 2013 about the role of big data...

An Analysis of the Online Identity Battleground by aestetix

0
aestetix, a researcher of online identity issues and one of the enthusiasts that created the Nym Rights group, gave a great talk at...

IObit Advanced Mobile Care 3.2 review

0
IObit Advanced Mobile Care 3.2 is a user-friendly and dependable app for maintaining security and smooth performance of an Android device.The recent...

An Interview with Dave Kennedy on Artillery, SET, DerbyCon and pentesting

0
David Kennedy is the founder and CEO of TrustedSec, former CSO for Fortune 1000, former Marine Corps. He is the author of The...

Why is Cyber Conflicts Amnesia Dangerous? Interview with Jason Healey

0
Jason Healey is the director of the Cyber Statecraft Initiative of the Atlantic Council, focusing on international cooperation, competition and conflict in cyberspace. He...