Drinking From the Caffeine Firehose We Know as Shodan

0
Freelance pentest guy Dan Tentler, aka Viss, delivers a talk at Defcon 20 about different digital control and supervision systems that can be accessed...

“How safe is your browser?” – Peter Eckersley on personally identifiable information basics

0
Technology Projects Director for EFF Peter Eckersley speaks at Defcon 18 on methods for identifying a person based on different sets of information,...

F-Secure Mobile Security review

0
The inception of due mobile security is all about the measures taken for assuring it. Idle approach of doing basically nothing and...

Hacking in the Far East

0
The entry reflects an extremely interesting insight into the peculiarities of general security perception in Eastern Asia, presented by the well-known German computer security...

Create, save and store secure passwords: Interview with David Emm, Kaspersky Lab.

0
David Emm is a Senior Security Researcher at Kaspersky Lab. Today we’re gonna be talking about password security, and David’s here with some...

Beyond Information Warfare: Winn Schwartau on Attack Mindset Methodology

0
Distinguished security specialist Winn Schwartau delivers an engaging talk at DerbyCon, covering the issues of technology being exploited and weaponized. Hi! How many guys...

Criminal Education: Preventing Corporate Data Breaches

0
Art Gilliland, Senior Vice President & General Manager of HP Software Enterprise Security Products, expresses his vision of corporate information security during RSA...

6 Ways to hacker-proof your website from cyber attacks

0
Unfortunately, there is no way to guarantee that your website won’t be targeted by hackers, or that the hackers won’t be successful....

Understanding CAPTCHA-Solving Services in an Economic Context, by Marti Motoyama

0
Participating in the USENIX Security Symposium, software engineer and security researcher Marti Motoyama presents an in-depth study of automated and human-based CAPTCHA-solving services...
222,552FansLike
67,564FollowersFollow
32,600SubscribersSubscribe

Featured

Most Popular

AV Evasion: Lessons Learned

0
At DerbyCon event, Metasploit core developer David Maloney aka "Thelightcosine" presents the ins and outs of making payloads undetected by antivirus software. David: Good morning...

Latest reviews

VX – The Virus Underground

3
The German VXer and social engineer Marcell Dietl, aka SkyOut, gives a presentation at 24C3 conference organized by Chaos Computer Club (CCC) to describe...

ParetoLogic Privacy Controls review

2
#2 in Internet Privacy software ParetoLogic Privacy Controls is a robustly designed, powerful and easy-to-use tool to overwrite...

A Security Aficionado – Interview with Tom Eston

0
Tom Eston has many years of experience in penetration testing and security assessments. Currently Tom is the manager of the highly skilled Profiling...

More News