Please turn on your JavaScript for this page to function normally.
Record prizes for Pwn2Own and Pwnium contestants

The results of the first day of the traditional Pwn2Own hacking contest at the CanSecWest Conference currently taking place in Vancouver are in, and the losers are Adobe, …

Video: RSA Conference 2014 showcase

The world’s top information security professionals and business leaders gathered in San Francisco for RSA Conference 2014. Here’s a closer look at the show, watch …

TrustyCon talks made available on video

As announced, the TrustyCon infosec conference, established by security consulting firm iSEC Partners, the Electronic Frontier Foundation (EFF) and DEF CON and held …

One of the first network firewall inventors to come to Abu Dhabi

One of the creators of the world’s first network firewall and the author of “Firewall and Internet Security: Repelling the Wily Hacker”, Bill Cheswick, will …

$2.7 million await successful Pwnium 4 contestants

Google has, once again, called security researchers to participate in its annual Pwnium contest scheduled to be held at the CanSecWest security conference in Vancouver in …

Speakers boycotting RSA Conference will speak at TrustyCon

Security consulting firm iSEC Partners, the Electronic Frontier Foundation (EFF) and DEF CON have announce that they will be kicking off a brand-new security technology …

An introduction to firmware analysis

This talk by Stefan Widmann gives an introduction to firmware analysis: It starts with how to retrieve the binary, e.g. get a plain file from manufacturer, extract it from an …

The basics of digital wireless communication

The aim of this talk by Clemens Hopfer from the 30th Chaos Communication Congress is to give an understandable insight into wireless communication, using existing systems as …

Triggering deep vulnerabilities using symbolic execution

Symbolic Execution (SE) is a powerful way to analyze programs. Instead of using concrete data values SE uses symbolic values to evaluate a large set of parallel program paths …

Researchers demonstrate SD memory card hacking

Security researchers Andrew “bunnie” Huang and Sean “xobs” Cross have demonstrated that the only way to be absolutely sure that no one will be able to …

Useful password hashing: How to waste computing cycles with style

Password-based authentication is widely used today, despite problems with security and usability. To control the negative effects of some of these problems, best practice …

Authentication using visual codes: what can go wrong

Several password replacement schemes have been suggested that use a visual code to log in. However the visual code can often be relayed, which opens up a major vulnerability. …

Don't miss

Cybersecurity news