Please turn on your JavaScript for this page to function normally.
Customizing defense models to reduce the window of exposure

Most organizations already have a defense model in place that is meant to protect them from attacks, but the problem is that many use an outdated one. But the threat landscape …

The Internet of Things: Vulns, botnets and detection

Does the Internet of Things scare you? It probably should. This DerbyCon video discusses why embedded device security is laughably bad, handling vendor notification, and …

Digital ship pirates: Researchers crack vessel tracking system

In the maritime business, Automated Identification Systems (AIS) are a big deal. They supplement information received by the marine radar system, are used for a wide variety …

Video: Hacking back and active defense

In this DerbyCon video, John Strand will demonstrate the Active Defense Harbinger Distribution, a DARPA funded, free Active Defense virtual machine. He will debunk many of the …

Video: Antivirus evasion techniques

This video from DerbyCon discusses the basics of the AV evasion problem, what techniques work, which ones don’t and why. The talk has a particular focus on AV evasion as …

Strengths and weaknesses of MS SmartScreen filter

Microsoft’s SmartScreen application control feature, introduced with Internet Explorer 8 and lately ported to Windows 8 is a good addition to the new OS. It might …

Video: DIY Command & Control for fun and no profit

Many security professionals have heard about Command & Control botnets, even more have been infected by them. Very few have had the opportunity to actually look inside …

Video: Recent advances in IPv6 security

There are a number of factors that make the IPv6 protocol suite interesting from a security standpoint. Firstly, being a new technology, technical personnel has much less …

Video: How the grid will be hacked

There is a never ending stream of vulnerabilities in the mechanical and cyber systems that support the grid. So, why hasn’t there been any significant breach of the …

Video: Practical exploitation using a malicious SSID

In this video from DerbyCon, Deral Heiland discusses the leveraging of SSIDs to inject various attacks into wireless devices, and management consoles. The type of injection …

RSA Conference Europe announces keynote lineup

RSA Conference announced its complete line-up of keynote speakers for the 14th annual RSA Conference Europe 2013, taking place from 29 – 31 October 2013, at Amsterdam …

Get a VIP ticket to HITBSecConf and $1337 of travel money

Following the success of the first #HITB1337Giveaway held in conjunction with HITBSecConf2013 – Amsterdam, Hack In The Box is now bringing this popular Twitter-based …

Don't miss

Cybersecurity news